Computer trespassing is abhorrent, he asserted, even if no damage is done, because it destroys trust in the system.
The campaign is not promoting any approach, "code of conduct," position, or recommendation other than the need to raise awareness of the positive and negative consequences of the analog-to-digital shift and of the fact that tools and resources exist to help people make intelligent, informed choices about how best to develop, manage, and use information technology whether it is in the home, corporation, or classroom.
That is why teenagers face many social problems. Teenagers often do not think wisely before they take an action.
At the same time, other computer systems maintain logs, and so a trace of at least some activities may exist, whereas espionage activity may take place with paper documents, access to which may not leave any observable traces.
He noted that the Justice Department has asked the Congress to amend the Computer Fraud and Abuse Act because the ethics of computer usage have evolved and users' roles have changed since This often takes place during riots but can also happen as a stand-alone event, e.
Rotenberg also emphasized the threat from insiders, suggesting that the federal statute be revamped altogether to focus on actual harm and criminalizing "people who cause damage and people who intend to cause damage.