{"id":3191,"date":"2013-04-04T00:00:00","date_gmt":"2013-04-04T03:00:00","guid":{"rendered":"https:\/\/ids.org.br\/novo-site\/en\/carolina-dieckman-law-or-the-criminal-law-on-invasion-of-computer-and-similar-devices\/"},"modified":"2013-04-04T00:00:00","modified_gmt":"2013-04-04T03:00:00","slug":"carolina-dieckman-law-or-the-criminal-law-on-invasion-of-computer-and-similar-devices","status":"publish","type":"post","link":"https:\/\/ids.org.br\/en\/carolina-dieckman-law-or-the-criminal-law-on-invasion-of-computer-and-similar-devices\/","title":{"rendered":"Carolina Dieckman Law or The Criminal Law on Invasion of Computer and Similar Devices"},"content":{"rendered":"<p style=\"text-align: justify\"><span style=\"color: #505050\"><span style=\"font-size: x-small\"><span style=\"font-family: Verdana\">Last year the personal computer of a famous Brazilian actress was hacked and intimate photos of the beauty have found their way to the Internet. The whole episode, specially after the public in general realized that our books had no specific law to deal with this kind of problem, motivated Congress to move and approve a Law to deal with the invasion of a computer. <\/p>\n<p>Law 12,737 has entered into force yesterday and will be an important tool to combat this type of criminal practice in the digital environment. It criminalizes conduct specific to this environment and imposes penalties that may discourage behavior such as invasion of computers or computing device.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #505050\"><span style=\"font-size: x-small\"><span style=\"font-family: Verdana\">The Law protects data and sensitive information, but does not exempt the computer owner from taking basic precautions like having a security mechanism, even if a password.<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #505050\"><span style=\"font-size: x-small\"><span style=\"font-family: Verdana\">The best advice to maintain the security and privacy of intimate photos or data and information is still taking the good and old preventive measures. Basic care such as regularly changing passwords, avoiding obvious passwords and not having an unprotected Wi-fi network is still important.<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year the personal computer of a famous Brazilian actress was hacked and intimate photos of the beauty have found their way to the Internet. The whole episode, specially after the public in general realized that our books had no specific law to deal with this kind of problem, motivated Congress to move and approve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[127],"tags":[140],"acf":[],"_links":{"self":[{"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/posts\/3191"}],"collection":[{"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/comments?post=3191"}],"version-history":[{"count":0,"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/posts\/3191\/revisions"}],"wp:attachment":[{"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/media?parent=3191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/categories?post=3191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ids.org.br\/en\/wp-json\/wp\/v2\/tags?post=3191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}