The document discusses information technology (IT) law and various types of cybercrimes. It begins by defining what constitutes a computer and examines perspectives from different industries and jurisdictions. It then explores the relationship between law and computer technology, how IT law emerged from legal issues involving computers, and sources of IT law. The document distinguishes between computer crimes, where the computer is the target, and cyber crimes, which are enabled by computers but may have existed previously. It proceeds to examine examples of computer fraud, hacking, unauthorized data modification, and dissemination of malicious software.