The Computer Abuse Amendments Act of 1990: Hearing Before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, Second Session, on S. 2476 ... July 31, 1990, Volume 4
U.S. Government Printing Office, 1991 - Computer crimes - 110 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
action ADAPSO adequate alter amended approach appropriate authority believe bill cause Chairman changes civil clear command commerce Committee COMPUTER ABUSE computer crime computer fraud computer networks computer security computer systems computer users computer viruses concern conduct contained CPSR create criminal damage definition Department destroy destructive develop effective efforts electronic ethics existing fact Federal Federal interest files hackers harm hearing important improve individual industry institutions intent interest Internet involving issues John Justice law enforcement legislation loss malicious means obtained offense Operation person potential problems proposed prosecution prosecutors protect provision puter questions raise reasonable recent reckless responsible result Richard risk Rotenberg scope Senator Humphrey Senator Leahy Service standard statement statute Subcommittee technical term Testimony Thank threat tion transmission unauthorized United University virus Worm
Page 24 - Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises...
Page 31 - ... intentionally accesses a Federal interest computer without authorization, and by means of one or more instances of such conduct alters, damages, or destroys information in any such Federal interest computer...
Page 5 - FRANK) introduced the following bill; which was referred to the Committee on the Judiciary A BILL To amend title 18 of the United States Code to strengthen the laws against the counterfeiting of trademarks, and for other purposes.
Page 83 - Thompson, Ken; Reflections on Trusting Trust (Deliberate Software Bugs): Communications of the ACM, Vol 27, Aug 1984.
Page 48 - CBEHA represents the leading edge of American high technology companies in computers, business equipment and telecommunications. Its members had combined sales of more than $185 billion in 1986, representing 4.3X of our nation's gross national product.
Page 87 - ... professionals and better internal policies at private firms, universities, and governmental institutions to regulate usage of computer resources. "If hackers cannot win the admiration of their colleagues when they succeed at their clever stunts, they may be less likely to do them in the first place. And if the owners of computer facilities make clear (and vigorously enforce) rules about what is acceptable and unacceptable conduct when using the system, this too may cut down on the incidence of...
Page 51 - Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 75 - My name is Marc Rotenberg and I am the director of the Washington Office of Computer Professionals for Social Responsibility (CPSR).