0% found this document useful (0 votes)
99 views

Information Technology and The Law

This document discusses three scenarios related to cybercrime and contract law: 1. The first scenario describes a phishing email scam that tricks someone into transferring money from their account, which constitutes the cybercrime of fraud. 2. The second scenario involves a group of hackers launching a distributed denial of service (DDoS) attack to crash the servers of an online newspaper in retaliation for investigative reports, which constitutes the cybercrime of unauthorized access. 3. The third scenario presents three companies responding to an offer for leather jackets. Only one acceptance is valid as a contract, as it was sent to the correct email and included the offered terms, while the others proposed changes or were sent to the wrong address.

Uploaded by

Abid Hasan Mumin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Information Technology and The Law

This document discusses three scenarios related to cybercrime and contract law: 1. The first scenario describes a phishing email scam that tricks someone into transferring money from their account, which constitutes the cybercrime of fraud. 2. The second scenario involves a group of hackers launching a distributed denial of service (DDoS) attack to crash the servers of an online newspaper in retaliation for investigative reports, which constitutes the cybercrime of unauthorized access. 3. The third scenario presents three companies responding to an offer for leather jackets. Only one acceptance is valid as a contract, as it was sent to the correct email and included the offered terms, while the others proposed changes or were sent to the wrong address.

Uploaded by

Abid Hasan Mumin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Continuous Assessment

1. What is cyberspace? Answer with reference to William Gibson’s definition of cyberspace. How 15
does it differ from Internet? Explain the nature of cyberspace with reference to ACLU v. Reno,
521 US 843.

2. Examine the following facts and determine with reasons whether they constitute cybercrimes or not and 15
if they constitute cybercrimes, give their names:

(i) X sends an email to Y suggesting that Y has won a jackpot. However, to claim the jackpot money
Y must transfer some money from his account to a specified account. Accordingly, Y follows a
link given in the email and logs on to his account and transfers the money to the specified account.
Later Y discovers that a huge amount of money is transferred from his account to an unknown
account.

(ii) Twilight.com is a popular online Bangla daily. The newspaper publishes a series of investigative
reports on the covert activities of Gangchil, a notorious drug smuggling network. Gangchil
employs Demonoid, a team of sophisticated hackers, to give trouble to twillight.com. Demonoid
distribute BOTs (Robot network) on the network and they spread through internet to amplify attack
on twilight.com. The twilight.com server receives massive access requests and at some point, being
unable to handles those requests, crashes. Legitimate users are now unable to access twilight.com.

3. Read the following fact very carefully and answer the question that follows. 10

Phoenix Apparels Ltd. sent offers through email to various prospective buyers to sell their
newly designed leather jackets. The offer reads as follows:

5000 pieces of Apache leather jackets will be sold at 15000.00 taka each. The
offer must be accepted as a whole and before 1 August 2018. No further
negotiation is intended.

A. A. Khan
Manager (Sales)
Phoenix Apparels Ltd.
[email protected]
Cat’s Eye, FashionPro and Summer Dale were among the prospective buyers who received
the offer.

Cat’s Eye received the email and sent an email accepting the offer and the email was sent to
[email protected] on 24 July 2018 and Mr. Khan read the email on that day. However,
Phoenix’s designated information system is [email protected].

FashionPro accepted the offer and sent an email to [email protected] which was retrieved
on 27 July 2018. But in that email FashionPro intended to pay 14000.00 taka for each jacket.
The email enters Phoenix’s information system.

Summer Dale accepted the offer and sent an email to [email protected] and the email
entered there on 23 July 2018. Mr. Khan never read that email.

Discuss among whom the sale contract will be completed.

You might also like