Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ar first line of defense against unauthorized data access and the physical theft of records. Organizations must understand the need for physical security, c ...assets and interruption to business activities; and prevent compromise or theft of information and information processing facilities. This section provides ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ay be considerable. In a case in which the defendant has been charged with theft from a computer system by means of changing the programming, it will be use ...
    2 KB (267 words) - 15:20, 22 February 2009
  • Most computer crime cases involve theft, damage to computer equipment or software, trespass, or invasion of privacy ...
    1 KB (212 words) - 20:17, 22 February 2009
  • ...il:''' Evidence supported defendant's conviction for third degree computer theft; defendant, who was employee of company, admitted that he accessed company' ...
    4 KB (562 words) - 12:09, 18 February 2009
  • ...use Act (CFAA), arising from access to secure university computer site and theft of Social Security numbers and biographical information, university's expen ...
    2 KB (272 words) - 21:48, 22 February 2009
  • ...en receives greater publicity than a case involving a comparable amount of theft not involving computers. In such a situation, news reports may reveal inacc ...
    2 KB (371 words) - 19:07, 22 February 2009
  • ...assets and interruption to business activities; and prevent compromise or theft of information and information processing facilities. This section provides ...7799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users are aware of information ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...ions also define two computer crimes, computer damage[[FN65]] and computer theft.[[FN66]] For each crime, an instruction lists the elements of two types of ...
    3 KB (448 words) - 21:08, 22 February 2009
  • N.Y. Penal Law § 165.15 Theft of services.<br> Wash. Rev. Code § 9A.56.020 Theft--Definition, defense.<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • :* Theft of confidential information ...
    3 KB (469 words) - 13:30, 10 April 2007
  • * '''Physical Theft:''' As assets become smaller and more efficient with hot swappable drives, ...
    4 KB (588 words) - 17:23, 26 March 2007
  • ...aims as part of an insurance fraud,[[FN1]] sham insurance policies,[[FN2]] theft by use of credit cards,[[FN3]] communications between co-conspirators,[[FN4 ...
    3 KB (506 words) - 20:06, 22 February 2009
  • :* Theft/Destruction Detection devices, where applicable, should be utilized to prevent theft and safeguard the equipment. They should provide continuous coverage. Detec ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...ling PII. PII can also be exploited by criminals to Stalking or [[identity theft|steal the identity]] of a person, or to plan a person's murder or robbery, ...[Social Security Number Protection Act of 2005]] and (proposed) [[Identity Theft Prevention Act of 2005]] each sought to limit the distribution of an indivi ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...4, 1996, in 2001 by the [[USA PATRIOT Act]], and in 2008 by the [[Identity Theft Enforcement and Restitution Act]]. Subsection (b) of the act punishes anyon ===Identity Theft Enforcement and Restitution Act=== ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...provides for five degrees of computer damage and five degrees of computer theft. The punishments are correlated with that state's classification of misdeme ...
    4 KB (680 words) - 12:52, 18 February 2009
  • :[[Media:ID-Theft-MDP-2006090101.ppt]] ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...[[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST]]. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...n credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity th ...'identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has become commonplace. ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • * [[Identity theft]] * [[Proving computer theft]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
View ( | ) (20 | 50 | 100 | 250 | 500)