• Do you have credits to spend? Why not pick up some VOD rentals? Find out how!

Cybercrime: Unauthorized Access Laws in Your State

Hot Mega

I'm too lazy to set a usertitle.
Not sure of the accuracy of the penal codes but FWIW....

California

CAL. PENAL CODE § 502 (c) Except as provided in subdivision (h), any person who commits any of the following acts is guilty of a public offense:

(1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data.
(2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network.
(3) Knowingly and without permission uses or causes to be used computer services.
(4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system, or computer network.
(5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user of a computer, computer system, or computer network.
(6) Knowingly and without permission provides or assists in providing a means of accessing a computer, computer system, or computer network in violation of this section.
(7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.
(8) Knowingly introduces any computer contaminant into any computer, computer system, or computer network.
(9) Knowingly and without permission uses the Internet domain name of another individual, corporation, or entity in connection with the sending of one or more electronic mail messages, and thereby damages or causes damage to a computer, computer system, or computer network.

http://www.cybertelecom.org/security/crimestates.htm
 

absolutehell

The best things in life are Free!
Thanks for the post.Many commit those intentionally, but those who do out of ignorance, their number is pretty large too.
 

Hot Mega

I'm too lazy to set a usertitle.
Thanks for the post.Many commit those intentionally, but those who do out of ignorance, their number is pretty large too.

I suppose you just get a packet sniffer and follow their little footprints back to their dung hole, store the data separately so the asshats can't access your computer and delete it then let CHFIs and the authorities do the rest.

Hopefully it will be found they have several counts against them whereby it becomes a criminal charge multiplier and they end up getting fucked in jail better than they tried fucking their vics.

I think California has the most comprehensive laws against this.
 

Hot Mega

I'm too lazy to set a usertitle.
Top