Search results

Jump to navigation Jump to search
  • ...The specific legal definition varies by [[legal jurisdiction]]. Fraud is a crime, and also a [[Civil law (common law)|civil law]] violation. Defrauding peop ...ncluding mail fraud, wire fraud, phone fraud, and the Internet ([[computer crime]] and [[Internet fraud]]). The international dimensions of the web and ease ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...from the common law right of the states to legislate against many types of crime, the federal criminal law must have an appropriate jurisdictional basis to ...case. It provides that any person who violates any provision of a computer crime law, and in doing so, accesses, permits access to, causes access to or atte ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...m “conviction” shall include a conviction under the law of any State for a crime punishable by imprisonment for more than 1 year, an element of which is una ...ce on any person convicted of a violation of this section, or convicted of conspiracy to violate this section, shall order, in addition to any other sentence imp ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...lations of the terms of service as the basis for the section 1030(a)(2)(C) crime . . . the website owner-in essence [becomes the] party who ultimately defin ...damage, without authorization, to protected computer criminalizes computer crime that damages natural persons and corporations alike; (2) refusal to give de ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...deral government or certain financial institutions are involved, where the crime itself is interstate in nature, or computers used in interstate and foreig * [[USC 18 1030 | 18 USC 1030(b)]]: Conspiracy to violate (a) ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...rison, and ordered to forfeit $1,300,000. The charges included Conspiracy (crime), fraud, money laundering, and transportation of pornography, all of which ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • Obviously, discovering contraband or substantive evidence of a crime on the hard drive will be a frequent goal of a computer search. However, in ...me (such as records), contraband, fruits of crime, or instrumentalities of crime is present in a private space (such as a computer's hard drive, or other me ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...United States Attorney General|Attorney General]]. The National Electronic Crime Task Force was expanded, along with the [[President of the United States|Pr ...de making a financial transaction in the U.S. in order to commit a violent crime.<ref name=Sec315_18USC1956c7Bii>Amendment made to {{usc-clause|18|1956|(c)( ...
    142 KB (21,198 words) - 10:23, 23 August 2011