enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of FBI forms - Wikipedia

    en.wikipedia.org/wiki/List_of_FBI_forms

    The use of the FD-302 has been criticized as a form of institutionalized perjury due to FBI guidelines that prohibit recordings of interviews. Prominent defense lawyers and former FBI agents have stated that they believe that the method of interviewing by the FBI is designed to expose interviewees to potential perjury or false statement criminal charges when the interviewee is deposed in a ...

  3. Federal prosecution of public corruption in the United States

    en.wikipedia.org/wiki/Federal_prosecution_of...

    Several statutes, mostly codified in Title 18 of the United States Code, provide for federal prosecution of public corruption in the United States.Federal prosecutions of public corruption under the Hobbs Act (enacted 1934), the mail and wire fraud statutes (enacted 1872), including the honest services fraud provision, the Travel Act (enacted 1961), and the Racketeer Influenced and Corrupt ...

  4. Protected computer - Wikipedia

    en.wikipedia.org/wiki/Protected_computer

    Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers".

  5. Title 18 of the United States Code - Wikipedia

    en.wikipedia.org/wiki/Title_18_of_the_United...

    Title 18 of the United States Code is the main criminal code of the federal government of the United States. [1] The Title deals with federal crimes and criminal procedure . In its coverage, Title 18 is similar to most U.S. state criminal codes, typically referred to by names such as Penal Code, Criminal Code, or Crimes Code. [ 2 ]

  6. United States Code - Wikipedia

    en.wikipedia.org/wiki/United_States_Code

    The United States Code is available from the LRC at uscode.house.gov in both HTML and XML bulk formats. [ 21 ] [ 22 ] The "United States Legislative Markup" (USLM) schema of the XML was designed to be consistent with the Akoma Ntoso project (from the United Nations Department of Economic and Social Affairs ) XML schema, [ 23 ] and the OASIS ...

  7. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The only computers, in theory, covered by the CFAA are defined as "protected computers".They are defined under section to mean a computer: . exclusively for the use of a financial institution or the United States Government, or any computer, when the conduct constituting the offense affects the computer's use by or for the financial institution or the government; or

  8. Stored Communications Act - Wikipedia

    en.wikipedia.org/wiki/Stored_Communications_Act

    Section 2701 (18 U.S.C. § 2701) of the SCA provides criminal penalties for anyone who "intentionally accesses without authorization a facility through which an electronic communication service is provided or … intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in ...

  9. Making false statements - Wikipedia

    en.wikipedia.org/wiki/Making_false_statements

    Making false statements (18 U.S.C. § 1001) is the common name for the United States federal process crime laid out in Section 1001 of Title 18 of the United States Code, which generally prohibits knowingly and willfully making false or fraudulent statements, or concealing information, in "any matter within the jurisdiction" of the federal government of the United States, [1] even by merely ...