25.4 Summary
In this chapter we tried to give you a brief overview of how the law
of computer crime is likely to affect you in your operation of a Unix
system. Because this is a fast-moving field, we have shied away from
detailed discussions of laws and specific techniques: instead, we
have stressed principles and ground rules that have withstood the
test of time—or at least the test of the past 10 years.
With any luck, you will never need to use any of the material in this
chapter. If you do, we suggest that you seek legal assistance.
Reading a book is no substitute for speaking to a human being.
|