NCJ Number
105947
Date Published
Unknown
Length
13 pages
Annotation
After reviewing the nature of computer crime and liability issues, this paper presents security measures that can reduce damage and liability risks.
Abstract
Most computer crimes encompass sabotage, theft of services, property crimes, data crimes, and financial crimes. Computers are especially vulnerable to electronic interception, which includes wiretaps, bugging, 'browsing,' 'piggyback' entry, electromagnetic pickups, and 'between-the-lines' entry. Sources of potential liability are frauds and abuses, natural disasters, mechanical malfunctions, personnel errors, unresolved contractual obligations, warranty matters, consumer disputes, and strict product liability laws. Liability can be controlled in the areas of data collection, types of data collected, the correction of erroneous data, who has data access, data dissemination, data safeguards, notice to users, and legal obligations. Computer security can be implemented through organizational procedures, access control, personnel procedures, hardware protection, data controls, and terminal safeguards.