Computer Fraud and Abuse Act

GPTKB entity

Statements (84)
Predicate Object
gptkbp:instance_of gptkb:United_States_federal_law
gptkbp:allows unauthorized access to computer systems
exceeding authorized access
theft of information
trafficking in passwords
unauthorized access to computers
gptkbp:amended_by gptkb:Computer_Abuse_Amendments_Act_of_1994
gptkb:Cybersecurity_Enhancement_Act_of_2014
gptkb:USA_PATRIOT_Act
gptkb:multiple_times
several times
gptkbp:applies_to gptkb:computer
data
gptkbp:enacted_by gptkb:1986
gptkb:United_States_Congress
October 12, 1986
gptkbp:enforces gptkb:Federal_Bureau_of_Investigation
gptkb:security_services
gptkbp:has_been_used_to_prosecute gptkb:Espionage
phishing schemes
malware distribution
gptkbp:has_facilitated the development of cybersecurity policies
gptkbp:has_influenced state laws on computer crime
gptkbp:has_led_to high-profile prosecutions
increased awareness of cybercrime
https://www.w3.org/2000/01/rdf-schema#label Computer Fraud and Abuse Act
gptkbp:is_affected_by cybersecurity policy
computer crime legislation
gptkbp:is_cited_in gptkb:legal_case
legal cases involving computer crimes
gptkbp:is_considered a landmark legislation
a key law in combating cybercrime
a tool for law enforcement
a key law in cybersecurity
a deterrent against cybercrime
a foundational law for internet governance
gptkbp:is_criticized_for gptkb:lack_of_clarity
vagueness
overreach
potential misuse
chilling effect on research
impact on security researchers
impact on ethical hacking
potential chilling effect on research
gptkbp:is_debated_in academic settings
policy discussions
cybersecurity conferences
legal circles
gptkbp:is_influenced_by technological advancements
gptkbp:is_often_discussed_in academic literature
cybersecurity forums
gptkbp:is_often_referenced_in academic literature
policy discussions
gptkbp:is_part_of gptkb:Title_18_of_the_United_States_Code
U. S. legal framework on cybercrime
the broader framework of U. S. cybersecurity law
the legal framework for digital privacy
the U. S. legal response to the rise of the internet
gptkbp:is_related_to gptkb:security
data protection laws
intellectual property laws
internet law
computer security measures
gptkbp:is_relevant_to gptkb:individuals
businesses
government agencies
gptkbp:is_subject_to judicial interpretation
gptkbp:legal_issue gptkb:Espionage
gptkb:Cybermen
various cases
multiple cases
identity thieves
gptkbp:penalty_shootout identity theft
hacking
computer-related fraud
gptkbp:related_to gptkb:Digital_Millennium_Copyright_Act
gptkb:Electronic_Communications_Privacy_Act
cybersecurity
information security
computer crime
gptkbp:signed_by gptkb:Sir_Ronald_Reagan
gptkbp:bfsParent gptkb:Robert_Tappan_Morris
gptkb:United_States_v._Morris
gptkbp:bfsLayer 6