{"id":444,"date":"2025-04-25T00:33:20","date_gmt":"2025-04-25T00:33:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/?p=444"},"modified":"2025-04-25T00:33:20","modified_gmt":"2025-04-25T00:33:20","slug":"policy-analysis-cybercrime-punishments","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/25\/policy-analysis-cybercrime-punishments\/","title":{"rendered":"Policy Analysis: Cybercrime Punishments"},"content":{"rendered":"\n<p>Cyber Punishments<\/p>\n\n\n\n<p><br>Through the years cybercrimes have been happening more frequently and policies have<br>needed to be created and adjusted because now we are currently in \u2018the age of technology\u2019, with<br>people of all ages with phones and access to the internet. With that access comes the higher<br>ability for people to be manipulated and scammed through emails, texts, or any other form of<br>cybercrime imaginable. Thankfully, the governments and other companies seem to be learning<br>about these cybercrimes and punishments, and adjusting those punishments. Sometimes just as<br>much as regular crimes. They have punishments and laws for both companies not following the<br>correct guidelines within cybersecurity and for people who actually commit cybercrimes.<br>In the article \u201cCyber Crime in the Society: Problems and Preventions\u201d the author<br>mentions that for cybercrimes the computer or electronics can be used as tools for the crime with<br>an individual as the target or with the devices as the target (Dashora 2011). According to Mike<br>Doyle in the book \u201cCybercrime: An Overview of the Federal Computer Fraud and Abuse Statute<br>and Related Federal Criminal Laws\u201d, The Computer Fraud &amp; Abuse Act (CFAA) is a cyber law<br>that essentially outlaws any actions that victimizes computer systems. This victimization can<br>include computer trespassing or hacking, exposure of any sensitive information like government<br>information or credit information, committing fraud, espionage, and more (Doyle 2014). Dashora<br>includes cyber defamation, cyber stalking, and certain pornography as those types of crimes as<br>well (nDashora 2011). In the article \u201cCybersecurity Laws &amp; Regulations 2024\u201d it is mentioned<br>that cybercrimes like denial of service, phishing, electronic theft, and more have different laws<br>and punishments that go with them, depending on which occurs and to whom because, the<br>punishments seem to get more severe when the government is a victim (McNicholas 2023). <\/p>\n\n\n\n<p>The laws and policies around these crimes, made by the Federal Trade Commision<br>(FTC), Securities &amp; Exchange Commission (SEC), and others, include parts of cybersecurity like<br>monitoring, detection, prevention, and mitigation against threats, as well as how to proceed in<br>case of a threat. In many cases when the minimum requirements of these policies are not met,<br>there are punishments for the companies not following the guidelines. These punishments are<br>typically fines (McNicholas 2023).<br>In Doyle\u2019s book it is also mentioned that there are different pentaties depending on what<br>crime is committed and the exact damage that is done during said crime. For example, the<br>penalties for attempts to violate or actually violate the punishment can be either up to 10 years in<br>prison, up to $100,000 in fines, or some of both. For damage to computers it depends on whether<br>the damage was intentional or not and how much damage was done to the devices. For damages<br>the punishments can be up to 20 years in prison and\/ or up to $250,000 in fines (Doyle 2014).<br>In the \u201cCybercrime and the Law: CFAA\u201d article it is mentioned at the beginning that the<br>creation of the CFAA originated in 1984 after a movie came out depicting a student hacking into<br>the US nuclear sites and having access to the bombs. As a result of the worry the movie caused,<br>the president at the time, Ronald Regan, passed this law. Though before it included less detail<br>and it has been edited many times since then to outline more crimes and punishments (Berris<br>2020).<br>Because of the fact that the CFAA outlines the range of punishments for different types<br>of cybercrimes it lines up with the policies that the FTC and SEC place to better prepare<br>companies and even the government from them. If you have minimal cybersecurity or less than<br>what is required then you put yourself and any potential customers at risk of exposure, fraud, and a number of other possible crimes. So those national cybersecurity policies aim to help everyone<br>better protect themselves from the crimes listed in the CFAA (Doyle 2014). <\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p><br>Berris, Peter G. \u201cComputer Fraud and Abuse Act (CFAA) and the 116th Congress.\u201d Congressional<br>Research Service, 21 Sept. 2020, crsreports.congress.gov\/product\/pdf\/R\/R46536.<br>Dashora, Kamini. \u201cCyber Crime in the Society: Problems and Preventions.\u201d Journal of Alternative<br>Perspectives in the Social Sciences, Vol 3, no. No 1, 2011, pp. 240\u2013259.<br>Doyle, Mike. Cybercrime an Overview of the Federal Computer Fraud and Abuse Statute and Related<br>Federal Criminal Laws. CreateSpace Independent Publishing Platform, 2014.<br>McNicholas, Edward, and Kevin Angle. Cybersecurity Laws and Regulations USA 2024. Global Legal<br>Group, 2023.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Punishments Through the years cybercrimes have been happening more frequently and policies haveneeded to be created and adjusted because now we are currently in \u2018the age of technology\u2019, withpeople of all ages with phones and access to the internet. With that access comes the higherability for people to be manipulated and scammed through emails,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/25\/policy-analysis-cybercrime-punishments\/\">Read More<\/a><\/div>\n","protected":false},"author":27605,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":34},"categories":[34],"tags":[35,36],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/444"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/users\/27605"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/comments?post=444"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/444\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/444\/revisions\/445"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/media?parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/categories?post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/tags?post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}