Computer Fraud and Abuse Act

Results: 106



#Item
61COMPUTER FRAUD AND ABUSE ACT US Code as of: [removed] – Title 18 Sec[removed]Fraud and related activity in connection with computers (a) Whoever (1) having knowingly accessed a computer without authorization or exceeding

COMPUTER FRAUD AND ABUSE ACT US Code as of: [removed] – Title 18 Sec[removed]Fraud and related activity in connection with computers (a) Whoever (1) having knowingly accessed a computer without authorization or exceeding

Add to Reading List

Source URL: www.nrotc.navy.mil

Language: English - Date: 2011-04-07 12:49:19
62Order Code[removed]Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Order Code[removed]Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-04-21 18:07:40
63.  The Obama Administration’s Cybersecurity Proposal: Criminal Provisions Gina Stevens Legislative Attorney

. The Obama Administration’s Cybersecurity Proposal: Criminal Provisions Gina Stevens Legislative Attorney

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2011-09-13 15:39:55
64.  Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle

. Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2011-01-18 15:42:46
65Microsoft Word - Chung - Print Day IV.doc

Microsoft Word - Chung - Print Day IV.doc

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:40:16
66Order Code[removed]CRS Report for Congress Received through the CRS Web  Cybercrime: An Overview of the Federal

Order Code[removed]CRS Report for Congress Received through the CRS Web Cybercrime: An Overview of the Federal

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2005-09-02 14:32:28
67Volume 6, Spring Issue, 1993  COMPUTER NETWORK ABUSE Michael P. Dierks*  INTRODUCTION

Volume 6, Spring Issue, 1993 COMPUTER NETWORK ABUSE Michael P. Dierks* INTRODUCTION

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:40:14
68Harvard Journal o f Law & Technology Volume 9, Number I Winter 1996 THE LIMITS OF COMPUTER CONVERSION

Harvard Journal o f Law & Technology Volume 9, Number I Winter 1996 THE LIMITS OF COMPUTER CONVERSION" U N I T E D S T A T E S V, C O L L I N S

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2011-02-11 21:40:41
69Case 2:11-cv[removed]RB Document 43 Filed[removed]Page 1 of 32  IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA  LINDA EAGLE,

Case 2:11-cv[removed]RB Document 43 Filed[removed]Page 1 of 32 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA LINDA EAGLE,

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-03-13 00:15:50
70Computer Fraud Working Group Report

Computer Fraud Working Group Report

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:20:32