Computer Fraud and Abuse Act
GPTKB entity
Statements (84)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:United_States_federal_law
|
gptkbp:allows |
unauthorized access to computer systems
exceeding authorized access theft of information trafficking in passwords unauthorized access to computers |
gptkbp:amended_by |
gptkb:Computer_Abuse_Amendments_Act_of_1994
gptkb:Cybersecurity_Enhancement_Act_of_2014 gptkb:USA_PATRIOT_Act gptkb:multiple_times several times |
gptkbp:applies_to |
gptkb:computer
data |
gptkbp:enacted_by |
gptkb:1986
gptkb:United_States_Congress October 12, 1986 |
gptkbp:enforces |
gptkb:Federal_Bureau_of_Investigation
gptkb:security_services |
gptkbp:has_been_used_to_prosecute |
gptkb:Espionage
phishing schemes malware distribution |
gptkbp:has_facilitated |
the development of cybersecurity policies
|
gptkbp:has_influenced |
state laws on computer crime
|
gptkbp:has_led_to |
high-profile prosecutions
increased awareness of cybercrime |
https://www.w3.org/2000/01/rdf-schema#label |
Computer Fraud and Abuse Act
|
gptkbp:is_affected_by |
cybersecurity policy
computer crime legislation |
gptkbp:is_cited_in |
gptkb:legal_case
legal cases involving computer crimes |
gptkbp:is_considered |
a landmark legislation
a key law in combating cybercrime a tool for law enforcement a key law in cybersecurity a deterrent against cybercrime a foundational law for internet governance |
gptkbp:is_criticized_for |
gptkb:lack_of_clarity
vagueness overreach potential misuse chilling effect on research impact on security researchers impact on ethical hacking potential chilling effect on research |
gptkbp:is_debated_in |
academic settings
policy discussions cybersecurity conferences legal circles |
gptkbp:is_influenced_by |
technological advancements
|
gptkbp:is_often_discussed_in |
academic literature
cybersecurity forums |
gptkbp:is_often_referenced_in |
academic literature
policy discussions |
gptkbp:is_part_of |
gptkb:Title_18_of_the_United_States_Code
U. S. legal framework on cybercrime the broader framework of U. S. cybersecurity law the legal framework for digital privacy the U. S. legal response to the rise of the internet |
gptkbp:is_related_to |
gptkb:security
data protection laws intellectual property laws internet law computer security measures |
gptkbp:is_relevant_to |
gptkb:individuals
businesses government agencies |
gptkbp:is_subject_to |
judicial interpretation
|
gptkbp:legal_issue |
gptkb:Espionage
gptkb:Cybermen various cases multiple cases identity thieves |
gptkbp:penalty_shootout |
identity theft
hacking computer-related fraud |
gptkbp:related_to |
gptkb:Digital_Millennium_Copyright_Act
gptkb:Electronic_Communications_Privacy_Act cybersecurity information security computer crime |
gptkbp:signed_by |
gptkb:Sir_Ronald_Reagan
|
gptkbp:bfsParent |
gptkb:Robert_Tappan_Morris
gptkb:United_States_v._Morris |
gptkbp:bfsLayer |
6
|