Examples of Computer Fraud in a sentence
Coverage will include Employee Theft, Forgery and Alteration, Computer Fraud, and Funds Transfer Fraud.
Unauthorized use of these systems is strictly prohibited and is subject to prosecution under the Computer Fraud and Abuse Act of 1986 and Title 18, U.S. Code Sec.
These laws and regulations may apply but are not limited to: The Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability and Accountability Act of 1996; the E- Government Act of 2002, the Clinger- Cohen Act of 1996; the Medicare Modernization Act of 2003, and the corresponding implementing regulations.
Coverage includes Public Employee Dishonesty, Forgery and Alteration, Theft, Disappearance and Destruction, Robbery and Safe Burglary, Computer Fraud with Funds Transfer.
Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, 94 Minn.