Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...rehabilitating the defendant, deterring him or her and others from similar crimes, and recognizing the rights of the victims and doing what can be done for t ...
    2 KB (366 words) - 21:39, 22 February 2009
  • Computer related crimes have been federal offenses since 1984 when Congress passed the Counterfeit ...
    2 KB (272 words) - 10:53, 18 February 2009
  • ...be the object of a subpoena, a discovery request, or a search and seizure, crimes involving unauthorized access to a computer or electronic communications, o ...
    2 KB (381 words) - 15:37, 22 February 2009
  • Florida Computer Crimes Act — Fla. Stat. ch. 815<br> ...a Statutes (Full Volume 1995): CHAPTER 815 - CHAPTER 815: COMPUTER-RELATED CRIMES<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • ...al deposit insurance of institutions convicted of certain money laundering crimes; : '''1998 Money Laundering and Financial Crimes Strategy Act''' ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • Note that these exceptions generally do not cover crimes that have already occurred, ''even'' in extreme cases where murderers have ...
    4 KB (669 words) - 15:05, 22 March 2007
  • ...s, laptop computers, and network servers in the course of committing their crimes. In some cases, computers provide the means of committing crime. For exampl ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • ...still be employed help a defendant avoid or mitigate punishment for their crimes.<br> ...
    6 KB (1,070 words) - 10:18, 11 August 2009
  • Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, [[phishing]] and espionage. There ...rieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...authorized bulk e-mails to provider's customers violated Virginia Computer Crimes Act's prohibition against use of computer or computer network without autho ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • ...ion of "universal jurisdiction" is not the same as that enacted in the War Crimes Law (Belgium) which is an assertion of extraterritorial jurisdiction that w ...respassing on ISP's property, the causes of action under Virginia Computer Crimes Act, the Federal Computer Fraud and Abuse Act, as well as common law trespa ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • * [[Financial crimes]] [[Category:Crimes]] ...
    15 KB (2,222 words) - 15:20, 12 November 2011
  • ...entity]] of a person, or to plan a person's murder or robbery, among other crimes. As a response to these threats, many website privacy policies specificall ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • Computer-related crimes. Adam G. Ciongoli, Jennifer A. DeMarrais, and James Wehner, 31 Am.Crim.L.Re Securities Crimes App 56, Sentencing Guidelines. ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • ...passwords, and threatening to damage a computer. Attempts to commit these crimes are also criminally punishable. ...ion was liable for trespass to chattels and violation of Virginia Computer Crimes Act (VCCA) based upon acts of e-mailers. ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...conduct. The court included in the definition of foreseeable harm only the crimes of identity theft and stalking. The court also held that if a broker obtain ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ...ronic communication," see U.S. Department of Justice, Prosecuting Computer Crimes (Office of Legal Education 2007), section II.A.4. Agents and prosecutors ma ...not apply in hundreds of different situations. In cases involving computer crimes or computer evidence, however, seven exceptions are especially pertinent: ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • * [[Financial crimes]] ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...period, the same time limitations that have been applied to more fleeting crimes do not control the staleness inquiry for child pornography"); United States ...g on computer media . . . which constitute evidence" of enumerated federal crimes). In cases where the computer is merely a storage device for evidence, fail ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...ree counts and agreed to forfeit money received in the commission of these crimes. On June 25, 2007, the remaining two were convicted of spamming out million ...
    26 KB (4,026 words) - 12:15, 5 May 2011
View ( | ) (20 | 50 | 100 | 250 | 500)