Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ...n credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity th ...'identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has become commonplace. ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ==Proving computer theft== ...lifornia computer crime law contains a typical provision defining computer theft: "Any person who intentionally accesses or causes to be accessed any comput ...
    2 KB (403 words) - 20:20, 22 February 2009
  • ...y of the U.S. state of North Carolina to prevent or discourage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...Act gave the right to sue for Monetary damages in the event of [[Identity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 ...
    3 KB (488 words) - 13:02, 12 November 2011

Page text matches

  • ...s held that the employee's use did not constitute a violation of the state theft of services law.[[FN79]] ...that may be the subject of the offense of theft; Hancock v. State [[FN80]] theft includes making a printout copy of the program.[[FN81]] Accessing confident ...
    1 KB (179 words) - 12:07, 18 February 2009
  • ...States code to provide, for the first time, federal criminal liability for theft of trade secrets. The EEA is largely based on the Uniform Trade Secret Act ...ction, therefore, many states have enacted statutes that either punish the theft of trade secrets per se or punish unauthorized access to computer systems t ...
    709 bytes (109 words) - 11:10, 18 February 2009
  • ...crime, presumably because their traditional prohibitions against physical theft are adequate. ...omplete online application forms to obtain a credit card, and he committed theft by accepting credit card and using it to obtain over $12,000 worth of merch ...
    1 KB (159 words) - 12:04, 18 February 2009
  • ...tortion, and malicious mischief. Computer crime laws may also overlap with theft of government property, transportation of stolen property across state line ...
    708 bytes (103 words) - 18:35, 22 February 2009
  • ...[[FN72]] This is particularly true if the issue is not theft of money, but theft of time, services, or information. In addition, the fact that most computer ...
    867 bytes (150 words) - 17:52, 22 February 2009
  • ==Drafting instructions to jury—Computer theft—access== The instruction listing the elements of computer theft—access provides:[[FN71]] ...
    862 bytes (140 words) - 21:35, 22 February 2009
  • The instruction listing the elements of computer theft—taking, transferring, concealing, or retaining provides:[[FN72]] '''The elements of the crime of computer theft in this case are:''' ...
    961 bytes (149 words) - 21:36, 22 February 2009
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp See, for example, BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    615 bytes (82 words) - 12:15, 28 February 2009
  • ==Proving computer theft== ...lifornia computer crime law contains a typical provision defining computer theft: "Any person who intentionally accesses or causes to be accessed any comput ...
    2 KB (403 words) - 20:20, 22 February 2009
  • ...r-related crime areas, including suspected theft of trade secrets,[[FN11]] theft of computer components,[[FN12]] and hacking.[[FN13]] As the use of informan ...
    1 KB (204 words) - 18:25, 22 February 2009
  • ...physical taking of anything, there was no taking sufficient to constitute theft. ...
    2 KB (272 words) - 03:33, 18 February 2009
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    485 bytes (64 words) - 17:00, 1 March 2009
  • ...y of the U.S. state of North Carolina to prevent or discourage [[identity theft]] as well as guarding and protecting individual [[privacy]]. ...Act gave the right to sue for Monetary damages in the event of [[Identity theft]]. The Act covers everything from rights to penalties. SESSION LAW 2005-414 ...
    3 KB (488 words) - 13:02, 12 November 2011
  • BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp ...
    516 bytes (62 words) - 03:00, 5 March 2009
  • ...he NSPA if the programs are solely in an intangible form.[[FN62]] However, theft of tangible computer hardware is protected by the NSPA, because such are "g ...
    614 bytes (90 words) - 11:06, 18 February 2009
  • ...eral proscriptions of interstate transportation of stolen property,[[FN8]] theft of government property,[[FN9]] mail and wire fraud,[[FN10]] and embezzlemen ...
    637 bytes (87 words) - 14:51, 17 February 2009
  • ...harges.[[FN24]] The charge of computer crime may be interpreted to include theft or malicious mischief as a lesser included offense. The advantage of such a ...
    771 bytes (121 words) - 13:52, 22 February 2009
  • ...heft, according to the [[Federal Trade Commission]]. This form of identity theft occurs when a criminal opens credit in another individual's name. In the cr ...0. In some states, credit freezing fees are waived for victims of identity theft. In late 2007, the credit bureaus started to introduce "online" credit fre ...
    4 KB (663 words) - 12:59, 12 November 2011
  • ...s have specific statutes that directly or indirectly criminally punish the theft of trade secrets.[[FN2]] They are: Arkansas,[[FN3]] California,[[FN4]] Colo ...
    1 KB (185 words) - 12:44, 18 February 2009
  • ...computer crime laws also appear in computer crime prosecutions pursuant to theft, malicious mischief, and other state and federal laws. ...
    1 KB (204 words) - 03:10, 17 February 2009
  • ...ar first line of defense against unauthorized data access and the physical theft of records. Organizations must understand the need for physical security, c ...assets and interruption to business activities; and prevent compromise or theft of information and information processing facilities. This section provides ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ay be considerable. In a case in which the defendant has been charged with theft from a computer system by means of changing the programming, it will be use ...
    2 KB (267 words) - 15:20, 22 February 2009
  • Most computer crime cases involve theft, damage to computer equipment or software, trespass, or invasion of privacy ...
    1 KB (212 words) - 20:17, 22 February 2009
  • ...il:''' Evidence supported defendant's conviction for third degree computer theft; defendant, who was employee of company, admitted that he accessed company' ...
    4 KB (562 words) - 12:09, 18 February 2009
  • ...use Act (CFAA), arising from access to secure university computer site and theft of Social Security numbers and biographical information, university's expen ...
    2 KB (272 words) - 21:48, 22 February 2009
  • ...en receives greater publicity than a case involving a comparable amount of theft not involving computers. In such a situation, news reports may reveal inacc ...
    2 KB (371 words) - 19:07, 22 February 2009
  • ...assets and interruption to business activities; and prevent compromise or theft of information and information processing facilities. This section provides ...7799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users are aware of information ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...ions also define two computer crimes, computer damage[[FN65]] and computer theft.[[FN66]] For each crime, an instruction lists the elements of two types of ...
    3 KB (448 words) - 21:08, 22 February 2009
  • N.Y. Penal Law § 165.15 Theft of services.<br> Wash. Rev. Code § 9A.56.020 Theft--Definition, defense.<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • :* Theft of confidential information ...
    3 KB (469 words) - 13:30, 10 April 2007
  • * '''Physical Theft:''' As assets become smaller and more efficient with hot swappable drives, ...
    4 KB (588 words) - 17:23, 26 March 2007
  • ...aims as part of an insurance fraud,[[FN1]] sham insurance policies,[[FN2]] theft by use of credit cards,[[FN3]] communications between co-conspirators,[[FN4 ...
    3 KB (506 words) - 20:06, 22 February 2009
  • :* Theft/Destruction Detection devices, where applicable, should be utilized to prevent theft and safeguard the equipment. They should provide continuous coverage. Detec ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...ling PII. PII can also be exploited by criminals to Stalking or [[identity theft|steal the identity]] of a person, or to plan a person's murder or robbery, ...[Social Security Number Protection Act of 2005]] and (proposed) [[Identity Theft Prevention Act of 2005]] each sought to limit the distribution of an indivi ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...4, 1996, in 2001 by the [[USA PATRIOT Act]], and in 2008 by the [[Identity Theft Enforcement and Restitution Act]]. Subsection (b) of the act punishes anyon ===Identity Theft Enforcement and Restitution Act=== ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...provides for five degrees of computer damage and five degrees of computer theft. The punishments are correlated with that state's classification of misdeme ...
    4 KB (680 words) - 12:52, 18 February 2009
  • :[[Media:ID-Theft-MDP-2006090101.ppt]] ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...[[Business Software Alliance]], [[SIIA]] and [[Federation Against Software Theft|FAST]]. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...n credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity th ...'identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has become commonplace. ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • * [[Identity theft]] * [[Proving computer theft]] ...
    9 KB (1,069 words) - 20:29, 22 February 2009
  • ...h most people associate with ID theft, decreased as a percentage of all ID theft complaints for the sixth year in a row. The fraud begins with either the theft of the physical card or the compromise of data associated with the account, ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...uirements under other legislation, federal anti-spam legislation, identity theft/ criminal code etc.) that govern the protection of personal information in * Personal Information Protection and Identity Theft Prevention Act ('PIPITPA') (not yet in force) ...
    18 KB (2,700 words) - 16:17, 29 August 2014
  • ...7799 defines Personnel Security objectives to reduce risks of human error, theft, fraud, or misuse of facilities; ensure that users are aware of information ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...or the roles for which they are considered, in order to reduce the risk of theft, fraud or misuse of facilities. ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • ...ient to allow the institution time to detect and react to an authenticator theft before the attacker can decrypt the stolen authenticators.<br> ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • :* Disclosure or theft of confidential customer information to unauthorized parties (e.g., hackers ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...ominative use defense did not apply because defendant, makers of the Grand Theft Auto game series, did not use plaintiff's trademarked strip club logo to de ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • ...[communications] placed over their facilities in order to combat fraud and theft of service." United States v. Villanueva, 32 F. Supp. 2d 635, 639 (S.D.N.Y. ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • ...ustomer identity information, and passwords, the risk of data and identity theft is very real.<br> ...in December and then lost, putting 1.2 million people at risk of identity theft. In May 2005, Time Warner Inc. announced that it had shipped similar inform ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ..., Civ. Action No. 8-00 CB78 (E.D. Tex. 2000). Plaintiffs alleged claims of theft, trespassing and stalking based upon Yahoo!’s use of cookies. ...included in the definition of foreseeable harm only the crimes of identity theft and stalking. The court also held that if a broker obtained a person’s soci ...
    21 KB (3,283 words) - 13:26, 26 April 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)