(1) This chapter is known as “Unauthorized Access to Information Technology.”

Ask a business law question, get an answer ASAP!
Thousands of highly rated, verified business lawyers.
Click here to chat with a lawyer about your rights.

(2) This part is known as “Computer Abuse and Data Recovery Act.”