Net Deals Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Theft or bribery concerning programs receiving Federal funds

    en.wikipedia.org/wiki/Theft_or_bribery...

    Theft or bribery concerning programs receiving federal funds (sometimes referred to as program fraud or program bribery) is a federal crime under 18 U.S.C. § 666. The purpose of this statute is protect the integrity of the vast sums of money distributed through federal programs. The section is designed to facilitate the prosecution of persons ...

  3. Fraud Enforcement and Recovery Act of 2009 - Wikipedia

    en.wikipedia.org/wiki/Fraud_Enforcement_and...

    The Fraud Enforcement and Recovery Act of 2009, or FERA, Pub. L. 111–21 (text) (PDF), S. 386, 123 Stat. 1617, enacted May 20, 2009, is a public law in the United States enacted in 2009. The law enhanced criminal enforcement of federal fraud laws, especially regarding financial institutions, mortgage fraud, and securities fraud or commodities ...

  4. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The Computer Fraud and Abuse Act of 1986 ( CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law ( 18 U.S.C. § 1030 ), which had been included in the Comprehensive Crime Control Act of 1984. [ 1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and ...

  5. Federal prosecution of public corruption in the United States

    en.wikipedia.org/wiki/Federal_prosecution_of...

    The federal bribery statute, 18 U.S.C. § 201 (b), criminalizes the corrupt promise or transfer of any thing of value to influence an official act of a federal official, a fraud on the United States, or the commission or omission of any act in violation of the official's duty. [ 33] 18 U.S.C. § 201 (b) (1)– (2) provides:

  6. Red Flags Rule - Wikipedia

    en.wikipedia.org/wiki/Red_Flags_Rule

    The Red Flags Rule was created by the Federal Trade Commission (FTC), along with other government agencies such as the National Credit Union Administration (NCUA), to help prevent identity theft. The rule was passed in January 2008, and was to be in place by November 1, 2008, but due to push-backs by opposition, the FTC delayed enforcement ...

  7. Cybercrime - Wikipedia

    en.wikipedia.org/wiki/Cybercrime

    The legal definition of computer fraud varies by jurisdiction, but typically involves accessing a computer without permission or authorization. Forms of computer fraud include hacking into computers to alter information, distributing malicious code such as computer worms or viruses , installing malware or spyware to steal data, phishing , and ...

  8. Whistleblower Protection Act - Wikipedia

    en.wikipedia.org/wiki/Whistleblower_Protection_Act

    The Whistleblower Protection Act of 1989, 5 U.S.C. 2302(b)(8)-(9), Pub.L. 101-12 as amended, is a United States federal law that protects federal whistleblowers who work for the government and report the possible existence of an activity constituting a violation of law, rules, or regulations, or mismanagement, gross waste of funds, abuse of authority or a substantial and specific danger to ...

  9. Whistleblower protection in the United States - Wikipedia

    en.wikipedia.org/wiki/Whistleblower_protection...

    A whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. The Whistleblower Protection Act was made into federal law in the United States in 1989. Whistleblower protection laws and regulations guarantee freedom of speech ...