Computer Fraud and Abuse Act

Results: 106



#Item
71Cybercrime / Crimes / Information technology audit / Computer network security / Protected computer / Computer Fraud and Abuse Act / Mail and wire fraud / Racket / United States Code / Computer law / Criminal law / Law

. Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws Charles Doyle Senior Specialist in American Public Law

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:25:02
72Law / Computer network security / Information technology audit / Cybercrime / Computer Fraud and Abuse Act / Hacking / United States v. Lori Drew / Protected computer / Mandatory sentencing / Crime / Computer law / Criminal law

. Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis Charles Doyle Senior Specialist in American Public Law

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:22:59
73Criminal law / Crime / Computer Fraud and Abuse Act / Computer crime / Identity theft / Patriot Act / Legal aspects of computing / Computer fraud / United States Code / Computer law / Law / Information technology audit

. Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws Charles Doyle

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:53:42
74Computer Fraud and Abuse Act / Hacking / Law / Authorization / CFAA / United States v. Morris / Criminal law / Computing / United States v. Lori Drew / Computer law / Information technology audit / 98th United States Congress

PDF Document

Add to Reading List

Source URL: btlj.org

Language: English - Date: 2013-04-18 02:52:55
75Information technology audit / Criminal law / Hacking / Cyber-bullying / United States v. Lori Drew / Computer Fraud and Abuse Act / United States v. Morris / Authorization / Protected computer / Computer law / Law / Computing

United States House of Representatives Subcommittee on Crime, Terrorism, Homeland Security and Investigations "Investigating and Prosecuting 21st Century Cyber Threats" Wednesday, March 13, [removed]Rayburn House Office

Add to Reading List

Source URL: www.volokh.com

Language: English - Date: 2013-08-28 23:58:10
76Criminal law / Security / Computer crimes / Hacking / Computer Fraud and Abuse Act / Identity theft / Computer security / Organized crime / Asset forfeiture / Law / Information technology audit / Crimes

STATEMENT OF RICHARD W. DOWNING DEPUTY CHIEF COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION CRIMINAL DIVISION

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2012-03-15 13:27:35
77Finance / Goldman Sachs / Hull Trading Company / High-frequency trading / Goldman / Computer Fraud and Abuse Act / Investment / Sergey Aleynikov / Financial economics

United States Attorney Southern District of New York FOR IMMEDIATE RELEASE DECEMBER 10, 2010 CONTACT:

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2012-03-15 13:27:23
78Industrial relations / Management / United Kingdom labour law / Unfair dismissal in the United Kingdom / Wrongful dismissal / Computer Fraud and Abuse Act / Dismissal / Constructive dismissal / Employment Tribunal / Termination of employment / Labour law / Human resource management

February[removed]Employer Update Using the Computer Fraud

Add to Reading List

Source URL: www.weil.com

Language: English - Date: 2014-03-26 17:33:27
79Criminal law / Government / National Information Infrastructure Protection Act / Protected computer / Computer Fraud and Abuse Act / Title 18 of the United States Code / United States Code / Computer law / Law / Information technology audit

Computer Fraud & Abuse Act

Add to Reading List

Source URL: www.flmd.uscourts.gov

Language: English - Date: 2013-06-14 17:23:11
80Email / Security clearance / Internet privacy / Computing / National security / Internet / Password

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.afsbeurope.army.mil

Language: English - Date: 2010-09-22 08:17:00
UPDATE