0 оценок0% нашли этот документ полезным (0 голосов)
8 просмотров1 страница
The electronic communications Privacy Act of 1986 protects someone from accessing your stored emails or intercepting electronic communications. The Steve Jackson Games case created the dichotomy of intercept / storage for email. Other laws include: your state criminal laws for unauthorized computer access, possibly theft of service, some states allow for impersonating another, etc.
The electronic communications Privacy Act of 1986 protects someone from accessing your stored emails or intercepting electronic communications. The Steve Jackson Games case created the dichotomy of intercept / storage for email. Other laws include: your state criminal laws for unauthorized computer access, possibly theft of service, some states allow for impersonating another, etc.
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате DOC, PDF, TXT или читайте онлайн в Scribd
The electronic communications Privacy Act of 1986 protects someone from accessing your stored emails or intercepting electronic communications. The Steve Jackson Games case created the dichotomy of intercept / storage for email. Other laws include: your state criminal laws for unauthorized computer access, possibly theft of service, some states allow for impersonating another, etc.
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате DOC, PDF, TXT или читайте онлайн в Scribd
They have broken a lot of crimes. One in particular, the Electronic Communications Privacy Act of 1986. The ECPA protects someone from accessing your stored emails or intercepting electronic communications. However, the Steve Jackson Games case created the dichotomy of intercept/storage for email. Other laws include: your state criminal laws for unauthorized computer access, possibly theft of service, some states allow for impersonating another, etc... What state are you in?