The IT Law Wiki

Citation[]

U.S. Department of Justice, Bureau of Justice Statistics, Computer Crime: Legislative Resource Manual (Jan. 1, 1980) (full-text).

Overview[]

This report reviews traditional criminal laws, at both the state and federal level to demonstrate their applicability to computer-related crime cases. These laws cover the crimes of arson, criminal ("malicious") mischief, burglary, larceny, theft of trade secrets, embezzlement, receipt of stolen property, theft of services or labor under false pretenses, interference with use statutes, forgery, and conspiracy. Also included are laws focusing on the fraudulent use of credit cards, theft of goods moving in interstate or foreign commerce, interstate transportation of stolen property, mail and wire fraud, and interception of wire or oral communications.

A discussion of evidentiary and other procedural issues associated with the prosecution of computer-related crime encompasses such matters as administrative searches, subpoena duces tecum, search warrants, consent search, exigent circumstances, interrogations and affidavits, admission of evidence, best evidence rule, the hearsay rule, and exceptions to the hearsay rule.

Finally, the manual outlines federal and state statutes relevant to privacy and security, specifically about accessing, disclosing, and safeguarding information, and briefly reviews existing and proposed computer-related crime legislation at the federal and state levels.