Computer Crime: Criminal Justice Resource Manual

Front Cover
National Criminal Justice Information and Statistics Service, Law Enforcement Assistance Administration, U.S. Department of Justice, 1979 - Computer crimes - 392 pages
 

Other editions - View all

Common terms and phrases

Popular passages

Page 45 - However, the ordinary examination incident to the expression of an opinion on financial statements is not primarily or specifically designed, and cannot be relied upon, to disclose defalcations and other similar irregularities, although their discovery may result.
Page 241 - A person commits computer fraud in the second degree by intentionally and without authorization accessing, altering, damaging or destroying any computer, computer system or computer network or any computer software, program or data contained in such computer, computer system or computer network.
Page 146 - literary works' does not connote any criterion of literary merit or qualitative value: it includes catalogs, directories, and similar factual, reference, or instructional works and compilations of data. It also includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.
Page 147 - Conversion, however, may be consummated without any intent to keep and without any wrongful taking, where the initial possession by the converter was entirely lawful. Conversion may include misuse or abuse of property. It may reach use in an unauthorized manner or to an unauthorized extent of property placed in one's custody for limited use.
Page 151 - stolen" as used in the crime of interstate transportation of stolen motor vehicles includes all felonious takings of motor vehicles with the intent to deprive the owner of the rights and benefits of ownership.
Page 161 - Trade secret" means an unpatented, secret, commercially valuable plan, appliance, formula, or process, which is used for the making, preparing, compounding, treating or processing of articles or materials which are trade commodities.
Page 234 - Services" includes, but is not limited to, computer time, data processing, and storage functions. 18-5.5-102. Computer crime. 1. Any person who knowingly uses any computer, computer system, computer network, or any part thereof for the purpose of: devising or executing any scheme or artifice to defraud, obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises, or committing theft, commits computer crime.
Page xxvi - A representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or automatic means.
Page 271 - For purposes of this section, the term — "(1) 'access' means to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of, a computer, computer system, or computer network; "(2) 'computer...
Page 239 - Computer software" means a set of computer programs, procedures and associated documentation concerned with the operation of a computer system. 5. "Computer system" means a set of related, connected or unconnected computer eoulpment, devices and software.

Bibliographic information