È legale pubblicare la password e l'email di viticim?

1

Con così tante identità rubate negli ultimi dieci anni, conosciamo un sacco di email e un sacco di password.

I due seguenti database sono legali ai sensi delle leggi federali statunitensi?

  1. Pubblica un database in cui viene identificata l'identità della vittima con le password conosciute della vittima

  2. Pubblica un database che ha una tabella di indirizzi email e un'altra tabella di password che sono state violate senza associarsi a nessuna vittima.

posta CppLearner 08.12.2013 - 00:56
fonte

1 risposta

2

Dipende dal tuo stato (ma è simile) È illegale! Ad esempio per state of kansas:

Statute 21-3755: Computer crime; computer password disclosure; computer trespass. (a) As used in this section:

  (1)   "Access" means to instruct, communicate with, store data in, retrieve data from or otherwise make use of any resources of a

computer, computer system or computer network.

  (2)   "Computer" means an electronic device which performs work using programmed instruction and which has one or more of the

capabilities of storage, logic, arithmetic or communication and includes all input, output, processing, storage, software or communication facilities which are connected or related to such a device in a system or network.

  (3)   "Computer network" means the interconnection of communication lines, including microwave or other means of electronic

communication, with a computer through remote terminals, or a complex consisting of two or more interconnected computers.

  (4)   "Computer program" means a series of instructions or statements in a form acceptable to a computer which permits the

functioning of a computer system in a manner designed to provide appropriate products from such computer system.

  (5)   "Computer software" means computer programs, procedures and associated documentation concerned with the operation of a

computer system.

  (6)   "Computer system" means a set of related computer equipment or devices and computer software which may be connected or

unconnected.

  (7)   "Financial instrument" means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange,

credit card, debit card or marketable security.

  (8)   "Property" includes, but is not limited to, financial instruments, information, electronically produced or stored data,

supporting documentation and computer software in either machine or human readable form.

  (9)   "Services" includes, but is not limited to, computer time, data processing and storage functions and other uses of a computer,

computer system or computer network to perform useful work.

  (10)   "Supporting documentation" includes, but is not limited to, all documentation used in the construction, classification,

implementation, use or modification of computer software, computer programs or data.

  (b) (1)   Computer crime is:

  (A)   Intentionally and without authorization accessing and damaging, modifying, altering, destroying, copying, disclosing or

taking possession of a computer, computer system, computer network or any other property;

  (B)   using a computer, computer system, computer network or any other property for the purpose of devising or executing a scheme or

artifice with the intent to defraud or for the purpose of obtaining money, property, services or any other thing of value by means of false or fraudulent pretense or representation; or

  (C)   intentionally exceeding the limits of authorization and damaging, modifying, altering, destroying, copying, disclosing or

taking possession of a computer, computer system, computer network or any other property.

  (2)   Computer crime is a severity level 8, nonperson felony.

  (3)   In any prosecution for computer crime, it is a defense that the property or services were appropriated openly and avowedly

under a claim of title made in good faith.

  (c) (1)   Computer password disclosure is the unauthorized and intentional disclosure of a number, code, password or other means of

access to a computer or computer network.

  (2)   Computer password disclosure is a class A nonperson misdemeanor.

  (d)   Computer trespass is intentionally, and without authorization accessing or attempting to access any computer, computer

system, computer network or computer software, program, documentation, data or property contained in any computer, computer system or computer network. Computer trespass is a class A nonperson misdemeanor.

  (e)   This section shall be part of and supplemental to the Kansas criminal code.

Altro: link
Altro: link

    
risposta data 08.12.2013 - 01:19
fonte

Leggi altre domande sui tag