Читайте также: |
|
The explosive growth in the use of computers in the business world in the past few years has brought with it a corresponding increase in computer misuse.
Traditional (precomputer) state and federal laws applicable to such crimes as trespass and larceny are not necessarily appropriate for prosecution of cases of computer fraud and computer theft. For example, one court held that a city employee’s use of the city’s computer facilities in his private sales venture could not support a theft conviction absent’ any evidence that the city deprived of any part of value or use of the computer. In some cases, use of a computer has not been deemed “property” within traditional theft statutes.
Computer crimes fall mainly into three broad categories: simple unauthorized access, theft of information, and theft of funds. Among schemes that have been subjects of litigation are stealing a competitor’s computer program; paying an accomplice to delete adverse information and insert favorable false information into the defendant’s credit file; a bank’s president having his account computer coded so that his checks would be removed and held rather than posted so he could later remove the actual checks without their being debited, and a disgruntled exemployee’s inserting a “virus” into his former employer’s computer to destroy its records.
Some estimate that losses due to computer misuse may be as high as $35 to $40 billion per year (including thefts of funds, losses of computer programs and data, losses of trade secrets, and damage done to computer hardware). These estimates may not be reliable, but it is clear that a substantial amount of computer crime is never discovered and a high percentage of that which is discovered is never reported because companies do not want publicity about the inadequacy of their computer controls and financial institutions, such as banks, fear that reports of large losses of funds, even when insured, are likely to cause depositors to withdraw their funds in the interest of safety. Whatever the actual loss due to computer misuse, both Congress and the state legislatures have passed statutes to deal specifically with computer crime.
At least 45 states have passed laws dealing with computer crime. Most of the statutes comprehensively address the problem, outlawing computer trespass (unauthorized access); damage to computer or software (e.g. use of ‘viruses’); theft or misappropriation of computer services, and unauthorized obtaining or disseminating of information via computer. There have been relatively few prosecutions under these state laws or the federal acts, leading some experts to suggest that the problem of computer crime has been overestimated.
Дата добавления: 2015-07-20; просмотров: 186 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Task 11. Render the following article into English paying special attention to the words and expressions in bold type. | | | Privacy and More at Risk. |