Computer Fraud and Abuse Act

Results: 106



#Item
11Email / Security clearance / Internet privacy / Computing / National security / Internet / Password

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.dsca.mil

Language: English - Date: 2014-09-24 09:50:46
12Computer security / Computer network security / Crime prevention / Identity management / Internet privacy / Access control / Security clearance / Malware / Duty of confidentiality / Security / National security / Law

SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:20:43
13Hacking / Information technology audit / CFAA / Weev / Law / Computing / Computer law / 98th United States Congress / Computer Fraud and Abuse Act

Short Comment Regarding a Proposed Exemption Under 17 U.S.CItem 1.Commenter Information: Catherine R. Gellis, on behalf of herself and the Digital Age Defense project, a project focused on governmental efforts to

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2015-02-09 16:33:54
14Plea bargain / Computer Fraud and Abuse Act / Plea / Law / Hacking / Aaron Swartz

PDF Document

Add to Reading List

Source URL: ymiclassroom.com

Language: English - Date: 2014-11-05 12:49:45
15Hacking / Aaron Swartz / Computer Fraud and Abuse Act / Prosecutor / Law / Government / Prosecution

PDF Document

Add to Reading List

Source URL: ymiclassroom.com

Language: English - Date: 2014-11-03 01:54:48
16Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes

PDF Document

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Language: English - Date: 2014-07-16 02:47:23
17Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes

PDF Document

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Language: English - Date: 2014-07-16 02:47:41
18Computer Fraud and Abuse Act / Computer law / Hacking / Information technology audit / United States Federal Sentencing Guidelines / Mandatory sentencing / CFAA / Presidency of Barack Obama / Criminal law / Sentencing / Law / 98th United States Congress

Nomination of Loretta E. Lynch to be Attorney General of the United States Questions for the Record Submitted February 9, 2015 QUESTIONS FROM SENATOR FRANKEN Question 1. The Computer Fraud and Abuse Act (CFAA) has recei

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-02-17 13:56:24
19Criminal law / National Information Infrastructure Protection Act / Protected computer / Computer Fraud and Abuse Act / Title 18 of the United States Code / Computer law / Law / Information technology audit

Microsoft Word - 18usc1030.docx

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2013-10-31 15:29:59
20Security / Legal aspects of computing / Computer security / Internet privacy / Malware / Stored Communications Act / Computer Fraud and Abuse Act / Privacy / Telephone tapping / Computer law / Ethics / Law

Conducting Cybersecurity Research Legally and Ethically Aaron J. Burstein University of California, Berkeley (School of Law) Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-04-08 02:09:38
UPDATE