Bảo mật hệ thống mạng part 8 - Pdf 16

STATE LAWS
In addition to federal computer crime statutes, many states have also developed their
own computer crime laws (see Figure 4-1). These laws differ from the federal laws with
regard to what constitutes a crime (many do not have any minimum damage amount)
and how the crime may be punished. Depending on where the crime occurred, local law
enforcement may have more interest in the case than the federal authorities. Be sure to
speak with your local law enforcement organization to understand their interest in and
their capabilities to investigate computer crime.
Table 4-1 provides a summary of the state laws. Keep in mind that state laws may
change frequently and computer crime is an area of continued research and develop
-
ment. If you have specific questions about a particular statute, consult your organiza
-
tion’s general counsel or local law enforcement.
Chapter 4: Legal Issues in Information Security
45
Figure 4-1.
U.S. states with computer crime laws
46
Network Security: A Beginner’s Guide
State Specific Computer Crimes Notes
Alabama Offense against intellectual
property
No minimum damage
level. A crime is
committed if
unauthorized access is
even attempted.
Alaska Criminal use of computer No minimum damage
level. Attacker must
obtain information

computer equipment or supplies;
offenses against computer users
Broad interpretation
of intellectual property
and crimes against
intellectual property.
Table 4-1.
Summary of State Computer Crime Laws
Chapter 4: Legal Issues in Information Security
47
State Specific Computer Crimes Notes
Georgia Computer theft; computer trespass;
computer invasion of privacy;
computer forgery; computer
password disclosure
Theft with or without the
intent to deprive the
owner is still a crime. No
minimum damage amount
except on password theft.
Hawaii Computer fraud; unauthorized
computer use
Crimes are based on
the amount of damage
actually done.
Idaho Computer crime No minimum
damage amount.
Illinois Computer tampering;
aggravated computer tampering;
computer fraud

the use of the information.
Table 4-1.
Summary of State Computer Crime Laws
(continued)
48
Network Security: A Beginner’s Guide
State Specific Computer Crimes Notes
Mississippi Computer fraud; offenses against
computer users; offenses against
computer equipment; offenses
against intellectual property
Copying information is
a crime.
Missouri Tampering with computer data;
tampering with computer
equipment; tampering with
computer users
Disclosing information or
passwords is a crime.
Possession of information
received from a computer
crime is also a crime.
Nevada Unlawful acts regarding
computers; unlawful interference
with or denial of access
to computers; forgery by
modification of information on
a computer; unlawful acts
involving electronic mail
Copying information is

property
Attempts to gain access
are considered crimes.
Table 4-1.
Summary of State Computer Crime Laws
(continued)
Chapter 4: Legal Issues in Information Security
49
State Specific Computer Crimes Notes
Oregon Computer crime Severity of the crime is
dependent upon what
was done, not how much
damage was caused.
Pennsylvania Unlawful use of computer Theft of information is not
a crime.
Rhode Island Access to computer for fraudulent
purposes; intentional access,
alteration, damage, or destruction;
computer theft; computer trespass
Unauthorized copying of
files is a crime. Forging
of e-mail headers to send
bulk e-mails is a crime.
Texas Breach of computer security;
harmful access
Perpetrator must know
that a security system
exists to prevent
unauthorized access.
Virginia Computer fraud; computer trespass;

state to state. Some states require that there must be an intent to permanently deprive the
owner of access to information for computer theft to occur. Other states require that
the owner of the information must actually be deprived of the information (so a backup
of the information might negate the violation of the law).
There is also a big difference when it comes to accessing systems. Some states require
that the system must actually be accessed for the crime to occur. Other states make the
unauthorized attempt to be the crime. Texas goes so far as to require the perpetrator to
know that a security system is in place to prevent unauthorized access for there to be a crime.
Finally, some states make the modifying or forging of e-mail headers to be a crime.
This type of statute is directed at bulk e-mail or spam.
No matter what state your organization is in, check with local law enforcement and
with your organization’s general counsel so that you understand the ramifications of the
local laws. This will directly impact when you may choose to notify law enforcement of a
computer incident.
EXAMPLES OF LAWS IN OTHER COUNTRIES
Computer crime laws in the United States vary from state to state. Internationally, laws
vary from country to country. Many countries have no computer crime laws at all. For ex
-
ample, when the ILOVEYOU virus was traced to an individual who lived in the Philip
-
pines, he could not be prosecuted because the Philippines did not have a law that made it
a crime to write and distribute a computer virus.
Computer crime laws in other countries may have an effect on computer crime inves
-
tigations in the United States as well. If an investigation shows that the attack came from a
computer system in another country, the FBI will attempt to get assistance from the law
enforcement organizations in that country. If the other country has no computer crime
laws, it is unlikely that they will assist in the investigation.
The following sections provide brief discussions of computer crime laws in three
other countries. More specific information can be found by asking representatives of the


Nhờ tải bản gốc

Tài liệu, ebook tham khảo khác

Music ♫

Copyright: Tài liệu đại học © DMCA.com Protection Status