skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 66401 Find in a Library
Title: FEDERAL COMPUTER SYSTEMS PROTECTION ACT
Journal: RUTGERS JOURNAL OF COMPUTERS, TECHNOLOGY AND THE LAW  Volume:7  Issue:2  Dated:(1980)  Pages:343-365
Author(s): J RODDY
Corporate Author: Rutgers University
School of Law
United States of America
Date Published: 1980
Page Count: 23
Sponsoring Agency: Rutgers University
Newark, NJ 07102
Format: Article
Language: English
Country: United States of America
Annotation: THE NATURE AND CAUSES OF COMPUTER CRIME, THE INADEQUACY OF EXISTING STATE AND FEDERAL LEGISLATION IN DEALING WITH FORMS OF COMPUTER CRIME, AND PROPOSED FEDERAL LEGISLATION DESIGNED TO DEAL WITH COMPUTER CRIME ARE DISCUSSED.
Abstract: MANAGEMENT LAXITY, EASE OF ACCESS, LARGE PROFITS, AND LOW RISK OF DETECTION MAKE COMPUTER CRIME ATTRACTIVE TO EMPLOYEES WHOSE JOBS AND COMPUTER KNOWLEDGE MAKE IT CONVENIENT FOR THEM TO MANIPULATE COMPUTER OPERATIONS FOR PERSONAL GAIN. COMPOUNDING THE PROBLEM IS THE INADEQUACY OF EXISTING LAWS IN COVERING THE KINDS OF COMPUTER TRANSACTIONS THAT CAN DIVERT THE FUNDS OF A BUSINESS OR GOVERNMENT AGENCY TO PERSONAL GAIN. FEDERAL BILL S. 240 IS DESIGNED TO DEAL WITH THE NATURE OF COMPUTER CRIME MANIFESTED UNDER FEDERAL JURISDICTION. THE BILL EFFECTIVELY PROSCRIBES ALMOST ANY UNAUTHORIZED ACCESSING OF A COMPUTER OWNED OR OPERATED BY THE UNITED STATES, CERTAIN FINANCIAL INSTITUTIONS, AND ENTITIES AFFECTING INTERSTATE COMMERCE. SPECIFICALLY, S. 240 ARMS PROSECUTORS WITH A WEAPON AGAINST FOUR MAIN CATEGORIES OF COMPUTER CRIME: THE INTRODUCTION OF FRAUDULENT RECORDS OR DATA INTO THE COMPUTER SYSTEM; THE UNAUTHORIZED USE OF COMPUTER-RELATED FACILITIES; THE ALTERATION OR DESTRUCTION OF INFORMATION OR FILES; AND THE STEALING, WHETHER BY ELECTRONIC MEANS OR OTHERWISE, OF MONEY, FINANCIAL INSTRUMENTS, PROPERTY, SERVICES, OR VALUABLE DATA. UNDER THE BILL, THESE ACTIONS ARE PUNISHABLE BY A FINE OF UP TO TWO AND ONE-HALF TIMES THE ILLEGAL GAIN AND UP TO 15 YEARS IN PRISON. S. 240, ALTHOUGH HAVING A NUMBER OF WEAKNESSES, IS A CRITICAL FIRST STEP IN PROVIDING A STATUTE UNDER WHICH COMPUTER CRIME CAN BE UNAMBIGUOUSLY PROSECUTED. DETECTION OF THE CRIME ITSELF, HOWEVER, REMAINS A MAJOR PROBLEM. SPECIALLY TRAINED INVESTIGATORS ARE NEEDED. FOOTNOTES ARE PROVIDED. (RCB)
Index Term(s): Computer related crime; Federal Code; Federal government; Legislation
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=66401

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.