Small Business Computer Crime Prevention Act, H.R. 3075: Hearing Before the Subcommittee on Antitrust and Restraint of Trade Activities Affecting Small Business of the Committee on Small Business, House of Representatives, Ninety-eighth Congress, First Session, Washington, D.C., July 14, 1983

Front Cover

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

Common terms and phrases

Popular passages

Page 61 - Amends the Small Business Act to establish a Small Business Computer Crime and Security Task Force, and for other purposes.
Page 27 - Nycum, and I produced the definitive manual on computer crime investigation and prosecution, "Criminal Justice Resource Manual on Computer Crime, for the Bureau of Justice Statistics of the US Department of Justice. Susan Hubbell Nycum My name is Susan Hubbell Nycum.
Page 62 - Act is amended by 20 striking out "and" at the end of paragraph ( 1 ) , by striking 21 out the period at the end of paragraph (2) and inserting in 22 lieu thereof ", and", and by adding at the end thereof the 23 following new paragraph : 24...
Page 32 - July 14, 1983, and without objection, it will be admitted into the record. You may proceed in any way you see fit.
Page 22 - Thank you. Thank you for your testimony. Thank you, Mr. Chairman. Mr.
Page 27 - Section 2 (a) The Congress hereby finds that — (1) there is increased dependency on, and proliferation of, information technology (including computers, data networks, and other communication devices) in the small business community; (2) such technology has permitted and expanded criminal activity against small business; (3) small businesses in particular frequently lack the education and awareness of computer security techniques and technologies which would enable them to protect their computer...
Page 4 - ... and finally you wind up with a skeleton which just cannot live because you have taken all the productive parts away. That is the type of scheme that has been operating to subvert this Public Health Service hospital system. Mr. MOODY. I might add to this comment that the impact on the industry — I would like to point out that we are talking about more than some selfish concern for the seamen that we represent, because our concern, as we have clearly demonstrated over the last decade, for the...
Page 57 - July 14, 1983 but hope that these written comments will be of value to you in your consideration of this important bill.
Page 6 - A thief, for example, can use a firm's computer to place orders for various merchandise and have that property delivered to selected locations.
Page 6 - By tying an unauthorized terminal into a system that does not authenticate terminal entry, the "browser" could gain access to the computer for a variety of purposes.

Bibliographic information