The Common Law System

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

The Common Law System:

There are three principal categories of laws in the legal system, which is referred to as the Common Law system. These categories of laws under the Common Law system are criminal law, civil law, and administrative law, each of which is used to address different circumstances, and levy various penalties upon the perpetrator.

Criminal law serves to sustain social peace and safety and consists of the laws that the police and other law enforcement agencies work with. It includes laws against acts such as murder, assault, robbery, and arson. There are several criminal laws in place to protect society against computer crime, including the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act, and the Identity Theft and Assumption Deterrence Act. These laws are developed by elected representatives who serve in the legislative branch of government and must adhere to the country’s constitution. All laws are open to judicial review by the courts. If a court finds that a law is unconstitutional, it has the power to render it invalid.

Civil law is designed to preserve social order and outlines the laws that govern issues requiring impartial arbitration, such as contract disagreements and real estate transactions. Civil laws also lay the groundwork for the executive branch of government to execute its duties. Like criminal laws, civil laws are put into effect by the elected representatives who serve in the legislative branch of government and are subject to the same constitutional restraints and judicial review procedures.

Administrative law: 

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?