[aklug] Re: Why hacking isn't fun anymore

From: Tim Gibney <timgibney76@gmail.com>
Date: Sun Aug 08 2010 - 17:19:14 AKDT

Sounds like any employer would be prosecuted for doing facebook and blog
searching tools on perspective employees then. Lol
But seriously, how is this different from sneaking into a file cabinet at HR
from work? It should be illegal as this as well as opening others mail. I am
in favor of this law and you are free to hack your own computers. But if
neither the computer nor the data is not yours then you need to be
prosecuted under law. I am disturbed on employers looking up potential
information on me. This is why I created another email address besides this
one. What I do outside of work is no one elses business.

On Sat, Aug 7, 2010 at 7:40 PM, Christopher Howard <choward@indicium.us>wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Alaska Statute 11.46.740. Criminal use of computer.
>
> (a) A person commits the offense of criminal use of a computer if,
> having no right to do so or any reasonable ground to believe the person
> has such a right, the person knowingly accesses, causes to be accessed,
> or exceeds the person's authorized access to a computer, computer
> system, computer program, computer network, or any part of a computer
> system or network, and, as a result of or in the course of that access,
>
> (1) obtains information concerning a person;
>
> (2) introduces false information into a computer, computer system,
> computer program, or computer network with the intent to damage or
> enhance the data record or the financial reputation of a person;
>
> (3) introduces false information into a computer, computer system,
> computer program, or computer network and, with criminal negligence,
> damages or enhances the data record or the financial reputation of a
> person;
>
> (4) obtains proprietary information of another person;
>
> (5) obtains information that is only available to the public for a fee;
>
> (6) introduces instructions, a computer program, or other information
> that tampers with, disrupts, disables, or destroys a computer, computer
> system, computer program, computer network, or any part of a computer
> system or network; or
>
> (7) encrypts or decrypts data.
>
> (b) In this section, "proprietary information" means scientific,
> technical, or commercial information, including a design, process,
> procedure, customer list, supplier list, or customer records that the
> holder of the information has not made available to the public.
>
> (c) Criminal use of a computer is a class C felony.
>
> - --
> Christopher Howard
> frigidcode.com
> theologia.indicium.us
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.15 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iEYEARECAAYFAkxeJzcACgkQQ5FLNdi0BcV2jgCfUmdX1iRSCqPdUH+tAbBP+3lp
> Lw8AmwfeVytxjgmk2IBqjWbTY49b+HZJ
> =5Owl
> -----END PGP SIGNATURE-----
> ---------
> To unsubscribe, send email to <aklug-request@aklug.org>
> with 'unsubscribe' in the message body.
>
>

---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Sun Aug 8 17:19:26 2010

This archive was generated by hypermail 2.1.8 : Sun Aug 08 2010 - 17:19:26 AKDT