Monday, May 31, 2010
25% increase in attempts to infect computers
Thursday, May 27, 2010
Fury over Facebook Murder
YouTube and copyright Issues
Friday, May 14, 2010
Google Earth and Privacy Issues

Sunday, May 9, 2010
Hacking
Thursday, May 6, 2010
Cyberbullying and Online Harrasment

Tuesday, May 4, 2010
Cyberlaw in Iran
Part I: Definitions
Article 1 - The meaning of law in the following terms are used:
A - Computer system
Any device or set of devices connected hardware is software that through implementation of automated data processing applications to act.
B - Communication Systems
any electronic transfer of information between a source (transmitter, the light source) and a receiver or detector light path through one or more communication protocols by which receptor is understood and interpreted.
C - Computer data
Each symbol of the events, information or concepts in a way favorable for processing in a computer system that includes a program is appropriate and makes the performance of computer systems to implement these steps. Given a financial value.
D - Data content
Each symbol of topics, concepts or instructions, such as text, sound or picture, either during or stored for the communication between computer systems or processing by a person or computer system used by the computer system and to create .
E - Data traffic
Any given by the computer in the communication chain is produced to the communication from source to destination routing and communication, including source, destination, route, time, date, size, duration and type of core services, etc. will be.
And - info (information) Data, text, images, sounds, code, computer programs, software and database or computer is created.
F - Subscribe information
any information available on service provider there and to its member services and communication services, including technical requirements and courses using the service, shared identity, IP address or postal or geographic telephone numbers and other personal details, he is.
G- Service provider
Every natural or juridical person that the user of its services can communicate with computer system provides the computer or data or the service provider rather than communication or its users to process or store.
Part II: Crimes and Punishments
Chapter One
crimes against privacy and data communications and computer systems
Part one - unauthorized access
Article 2
Anyone who intentionally and without authorization, in violation of safeguards data or computer system or communications, access to finds a fine of one million rials to six million Rials or imprisonment of ninety-one days to one year sentence be.
Part two - listening and receiving unauthorized
Article 3
Whoever intentionally and without authorization data in moving non-public in a relationship private, or from one or more computer system or telecommunications or electromagnetic waves, hear or receive a sentence of ninety-one day to one year or pay fine one million to six million Rials Rials will be sentenced.
Part three: crimes against national security
Article 4
Whoever intentionally and without authorization to transfer data in series or in computer or telecommunications system or data carrier that value for internal security or foreign country, the following acts committed crimes will be sentenced under :
A -data subject access to material or study them from one to three years imprisonment and fine of up to ten million rials hundred million rials
B-Putting these data available to persons unqualified access to imprisonment from two to ten years
C- revealing and putting these data available to the government, organization, company, or group of foreign powers or their agents to imprisonment from five to fifteen years
Note :
1-series data, data that expose them to national security or harm to national interests.
2-Regulations on series data and how they classify will provide in three months from the date of adoption of this law by the Justice Department and in cooperation with the ministries of the country, information, communications and information technology and defense forces supported.
Reference:
Sunday, May 2, 2010
Cyberlaw case in Hyderabad