This document discusses laws, investigations, and ethics related to computer security. It begins by outlining the objectives of reviewing computer crime laws, investigative techniques for determining if a crime has been committed and gathering evidence, and ethical constraints for security professionals. It then provides details on types of computer crimes and applicable laws, methods for investigating computer crimes, and guidelines regarding privacy, proprietary data, and legal liability issues in computer security.