Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of 10 on ... intentionally accesses a Federal interest computer without authorization, and....
" ... intentionally accesses a Federal interest computer without authorization, and by means of one or more instances of such conduct alters, damages, or destroys information in any such Federal interest computer... "
The Computer Abuse Amendments Act of 1990: Hearing Before the Subcommittee ... - Page 30
by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law - 1991 - 110 pages
Full view - About this book

United States Code: Containing the General and Permanent Laws of the United ...

United States - Law - 1989
...of the use of the computer; 1 So In original. Probably should be "paragraph y.". (5) intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby— (A) causes loss to one or more others of a value aggregating $1,000 or more during any...
Full view - About this book

ESEC '89: 2nd European Software Engineering Conference, University of ...

Carlo Ghezzi - Computers - 1989 - 496 pages
...particular, is of interest. That part of the statute makes it a felony if an individual "intentionally accesses a Federal interest computer without authorization,...such conduct alters, damages, or destroys information .... or prevents authorized use of any such computer or information and thereby causes loss to one...
Limited preview - About this book

Cyberspace and the Law: Your Rights and Duties in the On-line World

Edward A. Cavazos, Gavino Morin - Computers - 1994 - 215 pages
...object of the fraud and the thing obtained consists only of the use of the computer; (5) intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby — (A) causes loss to one or more others of a value aggregating $1,000 or more during...
Limited preview - About this book

Access Device Fraud and Related Financial Crimes

Jerry Iannacci - Law - 1999 - 176 pages
...290001 (b), amended par. (5) generally. Prior to amendment, par. (5) read as follows: "intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby — "(A) causes loss to one or more others of a value aggregating $1000 or more during...
Limited preview - About this book

CyberLaw: The Law of the Internet

Jonathan Rosenoer - Computers - 1997 - 362 pages
...which provides punishment (as a felony) by fine or imprisonment, or both, for one who (a) intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby — (5) causes loss to one or more others of a value aggregating $1,000 or more during...
Limited preview - About this book

A Critical Handbook of Children's Literature

Rebecca J. Lukens - 1998 - 309 pages
...object of the fraud and the thing obtained consists only of the use of the computer; "(5) intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby— "(A) causes loss to one or more others of a value aggregating $ 1 ,000 or more during...
Full view - About this book

Access Device Fraud and Related Financial Crimes

Jerry Iannacci - Law - 1999 - 176 pages
...290001 (b), amended par. (5) generally. Prior to amendment, par. (5) read as follows: "intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby — "(A) causes loss to one or more others of a value aggregating $1000 or more during...
Limited preview - About this book

Electronic Evidence and Discovery: What Every Lawyer Should Know

Michele C. S. Lange, Kristin M. Nimsger - Law - 2004 - 255 pages
...object of the fraud and the thing obtained consists only of the use of the computer; (5) intentionally accesses a Federal interest computer without authorization...authorized use of any such computer or information, and thereby — (A) causes loss to one or more others of a value aggregating $1,000 or more during...
Limited preview - About this book

Internet and the Law: Technology, Society, and Compromises

Aaron Schwabach - Computers - 2006 - 395 pages
...Abuse Act. At the time, 1030(a)(5)(A) imposed criminal penalties on anyone who: (5) intentionally accesses a Federal interest computer without authorization,...authorized use of any such computer or information, and thereby (A) causes loss to one or more others of a value aggregating $1,000 or more during any...
Limited preview - About this book

Wireless Crime and Forensic Investigation

Gregory Kipper - Computers - 2007 - 280 pages
...object of the fraud and the thing obtained consists only of the use of the computer; (5) intentionally accesses a Federal interest computer without authorization...authorized use of any such computer or information, and thereby (A) causes loss to one or more others of a value aggregating $1,000 or more during any...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF