Computer Fraud and Abuse Act

GPTKB entity

Statements (53)
Predicate Object
gptkbp:instanceOf gptkb:United_States_federal_law
gptkbp:abbreviation gptkb:CFAA
gptkbp:amendedBy multiple times
gptkbp:appliesTo computers used in commerce or communication
federal computers
financial institution computers
government computers
interstate or foreign commerce computers
protected computers
gptkbp:civilRemedies available
gptkbp:codifiedIn gptkb:18_U.S.C._§_1030
gptkbp:containsProvision criminal penalties
injunctive relief
civil cause of action
forfeiture of property
gptkbp:criminalizes computer fraud
unauthorized access to computers
causing damage to computers
computer abuse
obtaining information by computer trespass
trafficking in passwords
transmitting malicious code
gptkbp:criticizedFor vague language
chilling effect on security research
overbroad application
gptkbp:dateEnacted 1986
gptkbp:enactedBy gptkb:United_States_Congress
gptkbp:enforcedBy gptkb:Department_of_Justice
gptkb:Federal_Bureau_of_Investigation
https://www.w3.org/2000/01/rdf-schema#label Computer Fraud and Abuse Act
gptkbp:notableCase gptkb:United_States_v._Aaron_Swartz
gptkb:United_States_v._Lori_Drew
gptkb:United_States_v._Morris
gptkbp:penalty imprisonment
fines
forfeiture
gptkbp:purpose combat computer-related crimes
gptkbp:relatedTo gptkb:Electronic_Communications_Privacy_Act
computer security
cybercrime
hacking laws
gptkbp:section gptkb:Section_1030(a)(7)_-_extortion_involving_computers
Section 1030(a)(2) - unauthorized access to obtain information
Section 1030(a)(4) - fraud by computer
Section 1030(a)(5) - causing damage by computer
Section 1030(a)(6) - trafficking in passwords
gptkbp:sponsor gptkb:Senator_Paul_Trible
gptkb:Senator_William_L._Armstrong
gptkbp:subjectOf gptkb:military
legal scholarship
gptkbp:bfsParent gptkb:Section_1030
gptkb:Electronic_Communications_Privacy_Act_of_1986
gptkbp:bfsLayer 6