Monday, August 4, 2008

midterm blogpost #2

Research 1 company and describe how they protect their company from internet risks.

Also, research for possible risks or dangers and/or impacts of internet - related crimes to a company.

Yahoo! encourages all thier subscribers to use thier service as long as you abide by the Yahoo! Terms of Service and Yahoo!'s prohibition on spamming and unethical marketing activities. The following are some examples of spamming that may violate the Terms of Service and Yahoo!'s Universal Spam Policy:

  • Manipulating identifiers, such as email headers, to disguise the origin of any content transmitted to or through Yahoo! computer systems.
  • Relaying email from a third party's mail servers without the permission of that third party.
  • Using or causing to be used Yahoo! computer systems to facilitate the transmission of unsolicited or unauthorized material. This includes any promotional materials, URLs, "junk mail," "chain letters," "pyramid schemes," or any other form of unauthorized solicitation that you may upload, post, email, transmit, or otherwise make available.
  • Using "robots" or otherwise harvesting other's email addresses from the Yahoo! site for purposes of sending unsolicited or unauthorized material.
  • Uploading, posting, emailing, or transmitting the same message, URL, or post multiple times.
  • Disrupting the normal flow of dialogue, or causing the screen to "scroll" faster than other users of the service are able to type, or otherwise acting in a manner that negatively affects other users' ability to engage in real-time exchanges.

Certain Yahoo! services may have additional spam guidelines explaining appropriate conduct for those services. Those additional policies are incorporated by reference into the Yahoo! Universal Spam Policy. It is the user's responsibility to check each property's guidelines for additional details regarding spam.

Violations of our Terms of Service or this Universal Spam Policy may result in legal action against you and the termination, without notice, of your Yahoo! ID and/or anything associated with it, including, but not limited to, email accounts, clubs, posts, home pages, and profiles. Nothing in this policy is intended to grant any right to transmit email to or through Yahoo! computer systems. Yahoo! does not waive any rights by the failure to enforce this policy in every instance in which it might apply.

this possible computer crimes is generally defined as any crime accomplished through
special knowledge of computer technology. All that is required is a personal
computer, a modem, and a phone line. Increasing instances of white-collar crime
involve computers as more businesses automate and information becomes an
important asset. Computers are objects of crime when they or their contents are
damaged, as when terrorists attack computer centers with explosives or gasoline,
or when a "computer virus"--a program capable of altering or erasing computer
memory--is introduced into a computer system. As subjects of crime, computers
represent the electronic environment in which frauds are programmed and
executed; an example is the transfer of money balances in accounts to
perpetrators' accounts for withdrawal....





No comments: