Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project

Pennsylvania

Dont be a FOOL; The Law is Not DIY
Navigation Links:
:: Home :: Feedback ::
:: Disclaimer :: Sitemap ::

Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

Cybercrime

Pennsylvania Statute Title 18 § 3933 . Unlawful use of computer.

(a) Offense defined.-- A person commits the offense of unlawful use of a computer if he, whether in person, electronically or through the intentional distribution of a computer virus:

  1. accesses , exceeds authorization to access, alters, damages or destroys any computer, computer system, computer network , computer software, computer program or data base or any part thereof, with the intent : to interrupt the normal functioning of an organization or to devise or execute any scheme or artifice to defraud or deceive or control property or services by means of false or fraudulent pretenses, representations or promises;
  2. intentionally and without authorization accesses , alters, interferes with the operation of, damages or destroys any computer, computer system, computer network , computer software, computer program or computer data base or any part thereof;
  3. intentionally or knowingly and without authorization gives or publishes a password, identifying code, personal identification number or other confidential information about a computer, computer system, computer network or data base.
intentionally or knowingly engages in a scheme or artifice, including, but not limited to, a denial of service attack, upon any computer, computer system, computer network, computer software, computer program, computer server or data base or any part thereof that is designed to block, impede or deny the access of information or initiation or completion of any sale or transaction by users of that computer, computer system, computer network, computer software, computer program, computer server or data base or any part thereof.

Municipal Broadband


Change is in the Airwaves: A Documentary about the Philadelphia Wireless Initiative from George Rausch on Vimeo.

VoIP

Trials and Market Deployments

Cable Open Access

 

Web services provided by Wyoming.com
:: Home :: About Us :: Contact Us :: Sitemap :: Discussion :: Disclaimer :: Search ::