In this chapter we tried to give you a brief overview of how the law of computer crime is likely to affect you in your operation of a Unix system. Because this is a fast-moving field, we have shied away from detailed discussions of laws and specific techniques: instead, we have stressed principles and ground rules that have withstood the test of time ”or at least the test of the past 10 years . With any luck, you will never need to use any of the material in this chapter. If you do, we suggest that you seek legal assistance. Reading a book is no substitute for speaking to a human being. |