The Computer Abuse Amendments Act of 1990: Hearing Before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, Second Session, on S. 2476 ... July 31, 1990, Volume 4

Front Cover

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Other editions - View all

Common terms and phrases

Popular passages

Page 24 - Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises...
Page 20 - Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation...
Page 31 - ... intentionally accesses a Federal interest computer without authorization, and by means of one or more instances of such conduct alters, damages, or destroys information in any such Federal interest computer...
Page 5 - FRANK) introduced the following bill; which was referred to the Committee on the Judiciary A BILL To amend title 18 of the United States Code to strengthen the laws against the counterfeiting of trademarks, and for other purposes.
Page 83 - Thompson, Ken; Reflections on Trusting Trust (Deliberate Software Bugs): Communications of the ACM, Vol 27, Aug 1984.
Page 48 - CBEHA represents the leading edge of American high technology companies in computers, business equipment and telecommunications. Its members had combined sales of more than $185 billion in 1986, representing 4.3X of our nation's gross national product.
Page 87 - ... professionals and better internal policies at private firms, universities, and governmental institutions to regulate usage of computer resources. "If hackers cannot win the admiration of their colleagues when they succeed at their clever stunts, they may be less likely to do them in the first place. And if the owners of computer facilities make clear (and vigorously enforce) rules about what is acceptable and unacceptable conduct when using the system, this too may cut down on the incidence of...
Page 51 - Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 75 - My name is Marc Rotenberg and I am the director of the Washington Office of Computer Professionals for Social Responsibility (CPSR).
Page 85 - National Security vs. Access to Computer Databases: A New Threat to Freedom of Information," Software Law Journal (Winter 1987).

Bibliographic information