gptkbp:instanceOf
|
gptkb:law
|
gptkbp:amendedBy
|
1989
1994
1996
2001
2008
|
gptkbp:appliesTo
|
computers used in interstate or foreign commerce
federal computers
protected computers
|
gptkbp:codifiedIn
|
gptkb:18_U.S.C._§_1030
|
gptkbp:criminalizes
|
computer fraud
unauthorized access to computers
trafficking in passwords
damage to computer systems
theft of information
|
gptkbp:criticizedFor
|
vague language
chilling effect on security research
overbroad application
|
gptkbp:dateEnacted
|
1986
|
gptkbp:enactedBy
|
gptkb:United_States_Congress
|
gptkbp:enforcedBy
|
gptkb:Federal_Bureau_of_Investigation
gptkb:United_States_Department_of_Justice
|
gptkbp:fullName
|
gptkb:Computer_Fraud_and_Abuse_Act
|
https://www.w3.org/2000/01/rdf-schema#label
|
CFAA
|
gptkbp:jurisdiction
|
gptkb:United_States
|
gptkbp:notableCase
|
gptkb:United_States_v._Aaron_Swartz
gptkb:United_States_v._Lori_Drew
United States v. Andrew Auernheimer
|
gptkbp:providesFor
|
criminal penalties
civil remedies
|
gptkbp:relatedTo
|
gptkb:Electronic_Communications_Privacy_Act
cybercrime law
|
gptkbp:subject
|
cybersecurity
computer crime
unauthorized computer access
|
gptkbp:bfsParent
|
gptkb:Computer_Fraud_and_Abuse_Act
|
gptkbp:bfsLayer
|
7
|