Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project
Georgia Dont be a FOOL; The Law is Not DIY
Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

gaga

Cybercrime

GA. CODE § 16-9-92 (18) "Without authority" includes the use of a computer or computer network in a manner that exceeds any right or permission granted by the owner of the computer or computer network.

§ 16-9-93.  Computer crimes defined; exclusivity of article; civil remedies; criminal penalties
    (a)  Computer theft. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
    (1) Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession;
    (2) Obtaining property by any deceitful means or artful practice; or
    (3) Converting property to such person's use in violation of an agreement or other known legal obligation to make a specified application or disposition of such property

shall be guilty of the crime of computer theft.

(b)  Computer Trespass. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
    (1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
    (2) Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or
    (3) Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists

shall be guilty of the crime of computer trespass.

Municipal Broadband

VoIP

  • Internet phones peachy in Georgia?, CNET 10/27/2003
  • PSC Commissioner Stan Wise Keynotes March 16 Policy Briefing Luncheon, Georgia Public Policy Foundation May 10, 2004 (Stan Wise, president of the National Association of Regulatory Utility Commissioners and a member of the Georgia Public Service Commission...warned Congress that states could lose $13 billion a year if they are unable to tax the emerging Voice-Over-Internet Protocol (VOIP)... testified on NARUC's support of VoIP regulation)
  • Telecom / IT Policy Highlights 4.01 December 2003 - January 2004 GCATT
  • The Testimony of The Honorable Stan Wise  President, National Association of Regulatory Utility Commissioners (NARUC) Before Senate Commerce Committee Feb. 24, 2004 ("resolved... that the FCC should confirm its tentative decision that certain phone-to-phone calls over IP networks are telecommunications services")
  • Trials and Market Deployment
  • AT&T Trials 8.5 VoIP, The Digest May 21, 1998 (VoIP trial in Atlanta)
  • Web services provided by Wyoming.com
    : Home : About Us : Contact Us : Sitemap : Discussion : Newsletter :
    : ADA : Broadband : Crime : Copyright : DNS : ECommerce : EGovt : First Amendment :
    : Intl : Privacy : Security : SPAM : Statistics : VoIP : Vote :
    : Feedback : Disclaimer : Search :
    © Cybertelecom ::