Note: Many of the documents in these subdirectories are in Adobe Acrobat format (pdf). If you do not already have a copy of the free Acrobat Reader, you can download it from Adobe's website.
International Agreements
Council of
Europe
• Council of Europe Convention on Cybercrime (2001). (Word
Document) (html)
• Explanation of the Council of Europe Convention on Cybercrime (2001).
(website)
United Nations
• United Nations General Assembly Resolution 55-63: Combating the
Criminal Misuse of Information Technologies (2000). (English
pdf) (French pdf) (Russian
pdf) (Spanish pdf)
APEC
• APEC Cybersecurity Strategy (2002). (Word
Document) (html)
G8
• G8 Communiqué, Statement of Principles, and Action Plan
(1997). (pdf) (Word
Document)
• G8 Data Preservation Checklists. (html) (website)
• G8 Principles on the Availability of Data Essential to Protecting
Public Safety. (html) (website)
• G8 Recommendations for Tracing Networked Communications Across
National Borders in Terrorist and Criminal Investigations. (html) (website)
Organization
of American States
• Permanent Council of the Organization of American States Final
Report on the Meetings of Government Experts on Cyber Crime (1999). (pdf)
Resources on Drafting Cybercrime Laws
• Legal
Frameworks for Combating Cybercrime: Components of Substantive Network
Crimes Laws: How to Criminalize Attacks on Computer Networks and Information. Prepared by the Computer Crime
and Intellectual Property Section, U.S. Department of Justice. (pdf) (Word
Document)
• Legal
Frameworks for Combating Cybercrime: Drafting Procedural Laws:
Empowering Law Enforcement with the Legal Tools Needed
to Investigate and Deter Cybercrime. Prepared by the Computer Crime
and Intellectual Property Section, U.S. Department
of Justice. (pdf) (Word
Document)
• Legal
Resources Available on the Internet. (html)
24-Hour Points-of-Contact Network
• Network of 24-Hour Points-of-Contact for High-tech Cases: Protocol Statement and Registration Form. (pdf) (Word Document)
United States Laws Criminalizing Attacks on Computer Networks and Governing the Collection of Electronic Evidence
• Computer
Fraud and Abuse Act (18 U.S.C. § 1030). (pdf) (Word
Document)
• Interception
of Communications (18 U.S.C. § 2510 et. seq.). (pdf) (Word
Document)
• Electronic
Communications Privacy Act (18 U.S.C. § 2701 et. seq.). (pdf) (Word
Document)
• Pen Register
and Trap and Trace Devices (18 U.S.C. § 3121 et. seq.). (pdf) (Word
Document)
• Federal
Rules of Criminal Procedure: Rule 41 (Search and Seizure). (pdf) (Word
Document)
Publications of the Computer Crime and Intellectual Property Section, U.S. Department of Justice
• Searching
and Seizing Electronic Evidence. Revised Edition, July 2002. (pdf)
• Prosecuting
Intellectual Property Crimes. November 2000. (pdf)