25.4 Summary

In this chapter we tried to give you a brief overview of how the law of computer crime is likely to affect you in your operation of a Unix system. Because this is a fast-moving field, we have shied away from detailed discussions of laws and specific techniques: instead, we have stressed principles and ground rules that have withstood the test of time?or at least the test of the past 10 years.

With any luck, you will never need to use any of the material in this chapter. If you do, we suggest that you seek legal assistance. Reading a book is no substitute for speaking to a human being.

    Part VI: Appendixes