enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Protected computer - Wikipedia

    en.wikipedia.org/wiki/Protected_computer

    Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers".

  3. File:The Occupational Pension Schemes (Master Trusts ...

    en.wikipedia.org/wiki/File:The_Occupational...

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Pages for logged out editors learn more

  4. Title 18 of the United States Code - Wikipedia

    en.wikipedia.org/wiki/Title_18_of_the_United...

    Title 18 of the United States Code is the main criminal code of the federal government of the United States. [1] The Title deals with federal crimes and criminal procedure . In its coverage, Title 18 is similar to most U.S. state criminal codes, typically referred to by names such as Penal Code, Criminal Code, or Crimes Code. [ 2 ]

  5. Federal prosecution of public corruption in the United States

    en.wikipedia.org/wiki/Federal_prosecution_of...

    Several statutes, mostly codified in Title 18 of the United States Code, provide for federal prosecution of public corruption in the United States.Federal prosecutions of public corruption under the Hobbs Act (enacted 1934), the mail and wire fraud statutes (enacted 1872), including the honest services fraud provision, the Travel Act (enacted 1961), and the Racketeer Influenced and Corrupt ...

  6. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    Broadened the definition of "protected computer" in 18 U.S.C. § 1030(e)(2) to the full extent of Congress's commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and; Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.

  7. Title V of the Patriot Act - Wikipedia

    en.wikipedia.org/wiki/Title_V_of_the_Patriot_Act

    Section 1030 of Title 18 of the U.S. Code specifies punishments for various computer crimes. This includes unauthorized access via a computer to: restricted data relating to the design, manufacture, or use of atomic weapons; the production of special nuclear material; or the use of special nuclear material in the production of energy [19]

  8. Economic Espionage Act of 1996 - Wikipedia

    en.wikipedia.org/wiki/Economic_Espionage_Act_of_1996

    The Economic Espionage Act of 1996 (Pub. L. 104–294 (text), 110 Stat. 3488, enacted October 11, 1996) was a 6 title Act of Congress dealing with a wide range of issues, including not only industrial espionage (e.g., the theft or misappropriation of a trade secret and the National Information Infrastructure Protection Act), but the insanity defense, matters regarding the Boys & Girls Clubs of ...

  9. United States Code Congressional and Administrative News

    en.wikipedia.org/wiki/United_States_Code...

    Among other documents, U.S.C.C.A.N. publishes the full text of new federal laws, presidential proclamations, executive orders, federal regulations and sentencing guidelines. Prior to the 99th Congress, the legislative history materials in contained only a House or Senate report. It is recommended by the Bluebook as a citation source.