skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 65604 Find in a Library
Title: PROSECUTION OF COMPUTER CRIME
Journal: JOURNAL OF SYSTEMS MANAGEMENT  Volume:29  Issue:12  Dated:(DECEMBER 1978)  Pages:6-11
Author(s): J L BOOCKHOLDT; J S HORVITZ
Corporate Author: Assoc for Systems Management
United States of America
Date Published: 1978
Page Count: 6
Sponsoring Agency: Assoc for Systems Management
Cleveland, OH 44138
Format: Article
Language: English
Country: United States of America
Annotation: FOLLOWING A REVIEW OF THE NATURE OF COMPUTER-RELATED CRIME AND THE STATE AND FEDERAL STATUTES UNDER WHICH SUCH CRIMES ARE CURRENTLY PROSECUTED, PROPOSED FEDERAL LEGISLATION BEARING ON COMPUTER CRIME IS EVALUATED.
Abstract: THE USE OF COMPUTERS AND COMPUTER-RELATED MATERIAL FOR PERSONAL GAIN HAS GROWN WITH THE EXPANDED USE OF COMPUTERS. ALTHOUGH NUMEROUS METHODS EXIST FOR PROSECUTING THE PERPETRATOR OF A COMPUTER-RELATED CRIME, FEW STATUTES HAD BEEN PASSED WITH COMPUTER CRIMES IN MIND. FEDERAL LAWS ARE LIMITED TO CRIMES AGAINST THE GOVERNMENT OF OFFENSES OF AN INTERSTATE CHARACTER, AND THE DEGREE OF PROTECTION OFFERED BY STATES HAS VARIED. THE NEED FOR GREATER UNIFORMITY IN LAWS ADDRESSING COMPUTER CRIMES IS APPARENT. THE FEDERAL COMPUTER SYSTEM PROTECTION ACT HAS RECENTLY BEEN SUBMITTED FOR CONGRESSIONAL REVIEW IN AN ATTEMPT TO IMPROVE THE PROSECUTION OF COMPUTER CRIME. THE LEGISLATION WOULD APPLY TO ANY COMPUTER SYSTEM OR COMPUTER NETWORK WHICH EITHER OPERATES IN INTERSTATE COMMERCE OR IS OWNED OR OPERATED BY AN ENTITY OPERATING IN OR AFFECTING INTERSTATE COMMERCE. PENALTIES ARE PROVIDED FOR ANYONE WHO ACCESSES A COMPUTER FOR THE PURPOSE OF EXECUTING A SCHEME TO DEFRAUD OR FOR OBTAINING MONEY, PROPERTY, OR SERVICES THROUGH FRAUDULENT PRETENSES. ADDITIONAL PENALTIES EXIST FOR ANYONE WHO INTENTIONALLY AND WITHOUT AUTHORIZATION ACCESSES, ALTERS, DAMAGES, OR DESTROYS ANY COMPUTER HARDWARE, SOFTWARE, OR COMPUTER-STORED DATA. VIOLATORS MAY BE FINED UP TO $50,000, IMPRISONED UP TO 15 YEARS, OR BOTH. ALTHOUGH THE PROPOSED BILL DOES NOT COVER ALL POSSIBLE COMPUTER OFFENSES, IT IS A SIGNIFICANT ADVANCEMENT FOR THE DETERRENCE AND PROSECUTION OF COMPUTER-RELATED OFFENSES. REFERENCES ARE PROVIDED. (RCB)
Index Term(s): Computer related crime; Critiques; Federal government; Laws and Statutes; Legislation
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=65604

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.