Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Dan Nunn

That's what you can do when you own Congress.


21 posted on 10/31/2005 9:22:29 PM PST by Iconoclast2 (Two wings of the same bird of prey . . .)
[ Post Reply | Private Reply | To 14 | View Replies ]


To: Iconoclast2

Does one consent to this invasion by opening the CD wrapper, or is "computer crime" involved (Oregon law):

(2) Any person commits computer crime who knowingly accesses, attempts to access or uses, or attempts to use, any computer, computer system, computer network or any part thereof for the purpose of:

(a) Devising or executing any scheme or artifice to defraud;

(b) Obtaining money, property or services by means of false or fraudulent pretenses, representations or promises; or

(c) Committing theft, including, but not limited to, theft of proprietary information.

(3) Any person who knowingly and without authorization alters, damages or destroys any computer, computer system, computer network, or any computer software, program, documentation or data contained in such computer, computer system or computer network, commits computer crime.

(4) Any person who knowingly and without authorization uses, accesses or attempts to access any computer, computer system, computer network, or any computer software, program, documentation or data contained in such computer, computer system or computer network, commits computer crime.

(5)(a) A violation of the provisions of subsection (2) or (3) of this section shall be a Class C felony. Except as provided in paragraph (b) of this subsection, a violation of the provisions of subsection (4) of this section shall be a Class A misdemeanor.


22 posted on 10/31/2005 9:32:44 PM PST by Iconoclast2 (Two wings of the same bird of prey . . .)
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson