Computer fraud

Results: 842



#Item
561Criminal law / National Information Infrastructure Protection Act / Computer Fraud and Abuse Act / Protected computer / Title 18 of the United States Code / Computer law / Law / Information technology audit

COMPUTER FRAUD AND ABUSE ACT US Code as of: [removed] – Title 18 Sec[removed]Fraud and related activity in connection with computers (a) Whoever (1) having knowingly accessed a computer without authorization or exceeding

Add to Reading List

Source URL: www.nrotc.navy.mil

Language: English - Date: 2011-04-07 12:49:19
562Computing / Email / Computer crimes / Confidence tricks / Social engineering / Phishing / Internet fraud / Password / Spam / Spamming / Internet / Cybercrime

Rutgers will never ask you for your personal information in email. Never respond to emails asking for your password or Social Security Number. Never share your password with anyone. Avoid becoming a victim of Internet fr

Add to Reading List

Source URL: ncs.newark.rutgers.edu

Language: English - Date: 2013-07-25 13:28:04
563Business organizations / Internet fraud / Panix / Identity theft / Credit card / Fraud / Federal Trade Commission / Computer crime / Consumer protection / Crimes / Law / Ethics

Summer Fraud Awareness Final Draft.pub

Add to Reading List

Source URL: www.coloradoattorneygeneral.gov

Language: English - Date: 2011-07-11 11:31:43
564Computing / Computer-mediated communication / Information technology management / Marketing / Electronic commerce / Email spam / Spam / Pop-up ad / Anti-spam techniques / Internet / Email / Spamming

Be a Savvy Senior Fraud Protection Strategies for Seniors on the Internet fact sheet

Add to Reading List

Source URL: www.bcli.org

Language: English - Date: 2014-01-01 12:51:00
565Crimes / Fraud / Social issues / Identity theft / Identity fraud / Credit card fraud / Organized crime / Authentication / Computer crime / Security / Ethics / Identity

Identity Fraud: A Critical National and Global Threat Foreword In its continued effort to provide cutting edge research, the Economic Crime Institute has partnered with LexisNexis to conduct this research study on Iden

Add to Reading List

Source URL: www.lexisnexis.com

Language: English - Date: 2008-06-27 05:38:01
566Information technology audit / Cybercrime / Crimes / Computer network security / Protected computer / Computer Fraud and Abuse Act / Racket / Legal aspects of computing / Computer crime / Computer law / Law / Criminal law

Order Code[removed]Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-04-21 18:07:40
567Law / Cybercrime / Computer network security / Protected computer / Mail and wire fraud / Bank fraud / Racket / United States Code / National Information Infrastructure Protection Act / Crime / Computer law / Criminal law

Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C[removed]and Related Federal Criminal Laws Charles Doyle

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-06-04 20:45:20
568Government / Election fraud / Electronic voting / Information society / Voting machine / Election recount / Audit / Ballot / Computer security / Politics / Elections / Election technology

MS&T Standard Document Template

Add to Reading List

Source URL: www.fec.gov

Language: English - Date: 2013-11-27 11:30:27
56998th United States Congress / Computer Fraud and Abuse Act / Hacking / Information technology audit / United States v. Lori Drew / CFAA / Presidency of Barack Obama / Racketeer Influenced and Corrupt Organizations Act / Crime / Computer law / Criminal law / Law

. The Obama Administration’s Cybersecurity Proposal: Criminal Provisions Gina Stevens Legislative Attorney

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2011-09-13 15:39:55
570Email / Internet / Computer-mediated communication / Social engineering / Phishing / LANDesk / Internet fraud / Malware / Automatic call distributor / Spamming / Cybercrime / Confidence tricks

Microsoft Word - Document1

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2014-04-07 14:34:21
UPDATE