Computer Fraud and Abuse Act

Results: 106



#Item
81PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT _____________ No[removed]_____________

PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT _____________ No[removed]_____________

Add to Reading List

Source URL: www2.ca3.uscourts.gov

Language: English - Date: 2014-04-11 12:09:33
82SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2012-03-29 09:56:37
83October 24, 2000  Ron Olson, South Dakota Corn Growers Association. Darrell Cruea, South Dakota Department of Agriculture.

October 24, 2000 Ron Olson, South Dakota Corn Growers Association. Darrell Cruea, South Dakota Department of Agriculture.

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2011-07-18 18:12:34
84Computer Fraud & Abuse Act

Computer Fraud & Abuse Act

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2012-02-21 10:18:39
85October 1, 1986  CONGRESSIONAL RECORD — SENATE As a general rule, conduct which is illegal under section 705 of the Com­

October 1, 1986 CONGRESSIONAL RECORD — SENATE As a general rule, conduct which is illegal under section 705 of the Com­

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2011-07-18 18:17:22
86United States House of Representatives Subcommittee on Crime, Terrorism, Homeland Security and Investigations

United States House of Representatives Subcommittee on Crime, Terrorism, Homeland Security and Investigations "Investigating and Prosecuting 21st Century Cyber Threats" Wednesday, March 13, [removed]Rayburn House Office

Add to Reading List

Source URL: www.loc.gov

Language: English - Date: 2014-02-28 20:16:46
87World Socialist Web Site  wsws.org The Internet’s Own Boy: Documentary about “hacktivist” Aaron Swartz

World Socialist Web Site wsws.org The Internet’s Own Boy: Documentary about “hacktivist” Aaron Swartz

Add to Reading List

Source URL: intsse.com

Language: English
88Computer Fraud Working Group Report

Computer Fraud Working Group Report

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:32
89FOR PUBLICATION  UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant,

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellant,

Add to Reading List

Source URL: cdn.ca9.uscourts.gov

Language: English - Date: 2012-10-12 08:44:32
90COMPUTERS AND TRADE SECRETS: Making Certain that In-House and Outside Counsel Protect Their Client’s Trade Secrets R. Mark Halligan Nixon Peabody LLP

COMPUTERS AND TRADE SECRETS: Making Certain that In-House and Outside Counsel Protect Their Client’s Trade Secrets R. Mark Halligan Nixon Peabody LLP

Add to Reading List

Source URL: tradesecretshomepage.com

Language: English - Date: 2012-04-18 14:30:20