|
![]() |
|||
|
||||
OverviewThe federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimises computer systems. It is a computer security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions. Subsection 1030(b) makes it a crime to attempt to commit any of these offences. Subsection 1030(c) catalogues the penalties for committing them, penalties that range from imprisonment for not more than a year for simple cyberspace trespassing to a maximum of life imprisonment when death results from intentional computer damage. Subsection 1030(d) preserves the investigative authority of the Secret Service. Subsection 1030(e) supplies common definitions. Subsection 1030(f) disclaims any application to otherwise permissible law enforcement activities. Subsection 1030(g) creates a civil cause of action of victims of these crimes. Full Product DetailsAuthor: Charles DoylePublisher: Nova Science Publishers Inc Imprint: Nova Science Publishers Inc Weight: 0.296kg ISBN: 9781606922545ISBN 10: 1606922548 Pages: 155 Publication Date: 10 August 2009 Audience: College/higher education , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of Contents"Preface; Introduction; Trespassing in Government Cyberspace (18 U.S.C. 1030(a)(3); Intent; Unauthorized Access; Affects the Use; Jurisdiction; Penalties; Other Crimes; Obtaining Information by Unauthorized Computer Access; (18 U.S.C. 1030(a)(2)); Intent; Unauthorized Access; Obtaining Information & Jurisdiction; Consequences; Other Crimes; Causing Computer Damage (18 U.S.C. 1030(a)(5)); Intent; Unauthorized Activity; Damage; Jurisdiction; Consequences; Other Crimes; Computer Fraud (18 U.S.C. 1030(a)(4)); Jurisdiction; Intent; Consequences; Other Crimes; Extortionate Threats (18 U.S.C. 1030(a)(7)); Jurisdiction; Threat of ""Damage""; Intent; Threats; Consequences; Other Crimes; Trafficking in Computer Access (18 U.S.C. 1030(a)(6)); Jurisdiction; Intent; Consequences; Other Crimes; Computer Espionage (18 U.S.C. 1030(a)(1)); Jurisdiction; Intent; Consequences; Other Crimes; Appendices; Selected Bibliography; 18 U.S.C. 1030; 18 U.S.C.1956. Laundering of monetary instruments; RICO Predicate Offenses (""Racketeering Activities""); Federal Crimes of Terrorism; 18 U.S.C. 1992; Index."ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |