Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ...n credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity th ...'identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has become commonplace. ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ==Proving computer theft== ...lifornia computer crime law contains a typical provision defining computer theft: "Any person who intentionally accesses or causes to be accessed any comput ...
    2 KB (403 words) - 20:20, 22 February 2009
  • ...y of the U.S. state of North Carolina to prevent or discourage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...Act gave the right to sue for Monetary damages in the event of [[Identity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 ...
    3 KB (488 words) - 13:02, 12 November 2011

Page text matches

  • ...s held that the employee's use did not constitute a violation of the state theft of services law.[[FN79]] ...that may be the subject of the offense of theft; Hancock v. State [[FN80]] theft includes making a printout copy of the program.[[FN81]] Accessing confident ...
    1 KB (179 words) - 12:07, 18 February 2009
  • ...States code to provide, for the first time, federal criminal liability for theft of trade secrets. The EEA is largely based on the Uniform Trade Secret Act ...ction, therefore, many states have enacted statutes that either punish the theft of trade secrets per se or punish unauthorized access to computer systems t ...
    709 bytes (109 words) - 11:10, 18 February 2009
  • ...crime, presumably because their traditional prohibitions against physical theft are adequate. ...omplete online application forms to obtain a credit card, and he committed theft by accepting credit card and using it to obtain over $12,000 worth of merch ...
    1 KB (159 words) - 12:04, 18 February 2009
  • ...tortion, and malicious mischief. Computer crime laws may also overlap with theft of government property, transportation of stolen property across state line ...
    708 bytes (103 words) - 18:35, 22 February 2009
  • ...[[FN72]] This is particularly true if the issue is not theft of money, but theft of time, services, or information. In addition, the fact that most computer ...
    867 bytes (150 words) - 17:52, 22 February 2009
  • ==Drafting instructions to jury—Computer theft—access== The instruction listing the elements of computer theft—access provides:[[FN71]] ...
    862 bytes (140 words) - 21:35, 22 February 2009
  • The instruction listing the elements of computer theft—taking, transferring, concealing, or retaining provides:[[FN72]] '''The elements of the crime of computer theft in this case are:''' ...
    961 bytes (149 words) - 21:36, 22 February 2009
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp See, for example, BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    615 bytes (82 words) - 12:15, 28 February 2009
  • ==Proving computer theft== ...lifornia computer crime law contains a typical provision defining computer theft: "Any person who intentionally accesses or causes to be accessed any comput ...
    2 KB (403 words) - 20:20, 22 February 2009
  • ...r-related crime areas, including suspected theft of trade secrets,[[FN11]] theft of computer components,[[FN12]] and hacking.[[FN13]] As the use of informan ...
    1 KB (204 words) - 18:25, 22 February 2009
  • ...physical taking of anything, there was no taking sufficient to constitute theft. ...
    2 KB (272 words) - 03:33, 18 February 2009
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    485 bytes (64 words) - 17:00, 1 March 2009
  • ...y of the U.S. state of North Carolina to prevent or discourage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...Act gave the right to sue for Monetary damages in the event of [[Identity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 ...
    3 KB (488 words) - 13:02, 12 November 2011
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    516 bytes (62 words) - 03:00, 5 March 2009
  • ...he NSPA if the programs are solely in an intangible form.[[FN62]] However, theft of tangible computer hardware is protected by the NSPA, because such are "g ...
    614 bytes (90 words) - 11:06, 18 February 2009
  • ...eral proscriptions of interstate transportation of stolen property,[[FN8]] theft of government property,[[FN9]] mail and wire fraud,[[FN10]] and embezzlemen ...
    637 bytes (87 words) - 14:51, 17 February 2009
  • ...harges.[[FN24]] The charge of computer crime may be interpreted to include theft or malicious mischief as a lesser included offense. The advantage of such a ...
    771 bytes (121 words) - 13:52, 22 February 2009
  • ...heft, according to the [[Federal Trade Commission]]. This form of identity theft occurs when a criminal opens credit in another individual's name. In the cr ...0. In some states, credit freezing fees are waived for victims of identity theft. In late 2007, the credit bureaus started to introduce "online" credit fre ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...s have specific statutes that directly or indirectly criminally punish the theft of trade secrets.[[FN2]] They are: Arkansas,[[FN3]] California,[[FN4]] Colo ...
    1 KB (185 words) - 12:44, 18 February 2009
  • ...computer crime laws also appear in computer crime prosecutions pursuant to theft, malicious mischief, and other state and federal laws. ...
    1 KB (204 words) - 03:10, 17 February 2009
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)