The diversity and variety found in various state enactments was well demonstrated by Anne W. Branscomb in Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime, an important study conducted in 1990. This study was dedicated predominantly to assessing how adequately existing laws might address problems presented by rogue programs or intrusive code. Branscomb distilled from existing enactments ten discrete ways in which states have acted to devise protective legislation. Branscombs taxonomy, which has since been adopted by a number of authoritative sources, among them, the American Criminal Law Reviews annual survey of white collar crime, includes:
It should thus be apparent that state enactments are broader and more flexible than corresponding federal laws. They are certainly more frequently revisited and amended, thus permitting rapid response to particularized problems arising from changing technology. Over the past decade, much competent scholarship has compared and contrasted the various state approaches to computer crime legislation, and only some of this work is cited in this chapter. An examination of the state laws and this commentary highlights the directions in which the states are moving and may indicate future trends. Legislative Challenges Presented by Computer-Related Crimes In its relatively short history, computer-related criminal legislation has been subjected to its share of critical examination. Two overarching problems have emerged: (1) deciding exactly what is to be protected and (2) drafting statutory language that provides that protection without being overinclusive or underinclusive, even as technologies advance at breakneck speed. Generally speaking, three types of harms have been addressed: (1) unauthorized intrusion, (2) unauthorized alteration or destruction of information, and (3) the insertion of malicious programming code. Although 49 states now have computer crime legislation to address these problems, some early commentators questioned the need for discrete computer-related criminal legislation. They felt many of the offensive acts could be addressed through traditional laws governing property and theft. Despite these assertions, however, difficulties arose in applying general criminal statutes governing theft of property to electronically stored and manipulated information. The legal definitions of property, theft, and damages were historically too narrow to encompass emerging offenses. Traditional laws against larceny and embezzlement, for example, often required that stolen property actually be taken and carried away or that the suspect demonstrate an intent to deprive the owner of his or her property. These common law statutory requirements have little bearing when applied to offenses against intangible information, which often remains with the owner even after being compromised and which is rarely carried away in the traditional sense. It did not take long for legislators to suspect that traditional criminal statutes were not ideally suited to the prohibition and prosecution of emerging computer-related offenses. This remained the case even after efforts by some states to expand traditional notions of property to pertain to intangibles. Not only did computer technology change the form and way such crimes as fraud and larceny are committed, but it led to the development of new kinds of crimes. Ultimately, new laws had to be passed.
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.