|
The develpment of the computer created the opportunity for previously unheard of criminal actiivity.Computer crime has been used to describe criminal actiivity,but its nature and extent is difficult to determine.In addition, the traditional legal machinery is often ineffective against unconventional computer crime.Difficulties with the application of traditional criminnal laws to computer crime arise because much of the property involved does not fit well into categories of property subject to theft.A program,for example,may exist only in the form of magnetic impluse and,when misappropriated,the originl is not removed from the owner''s possession.Prosecution under traditional theft statue could be futile. Where an individual enters a computer system with the intent to modification of computer data and for the purpose of benefit himself or other person, can a burglary statute be applied? Access to the computer can be gained via remote terminals located at one''s own home,or via secret telephone codes. Can the non-traditional forms of "breaking"and "enntering" be covered by traditional law? Therefore this paper will discuss the application of traditional criminal laws with regard to various forms of computer abuse. Some existing laws can be used to provide avenues for prosecution ,but there is the need for legislation which specifically deals with the threat of computer crime is widely recognized today. This paper also will handle the subject of criminal legislation.
|