In five pages the federal and state laws created to prevent the increasing instances of computer crime are discussed. Five sources are cited in the bibliography.