Computer Fraud and Abuse Act
GPTKB entity
Statements (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:United_States_federal_law
|
gptkbp:abbreviation |
gptkb:CFAA
|
gptkbp:amendedBy |
multiple times
|
gptkbp:appliesTo |
computers used in commerce or communication
federal computers financial institution computers government computers interstate or foreign commerce computers protected computers |
gptkbp:civilRemedies |
available
|
gptkbp:codifiedIn |
gptkb:18_U.S.C._§_1030
|
gptkbp:containsProvision |
criminal penalties
injunctive relief civil cause of action forfeiture of property |
gptkbp:criminalizes |
computer fraud
unauthorized access to computers causing damage to computers computer abuse obtaining information by computer trespass trafficking in passwords transmitting malicious code |
gptkbp:criticizedFor |
vague language
chilling effect on security research overbroad application |
gptkbp:dateEnacted |
1986
|
gptkbp:enactedBy |
gptkb:United_States_Congress
|
gptkbp:enforcedBy |
gptkb:Department_of_Justice
gptkb:Federal_Bureau_of_Investigation |
https://www.w3.org/2000/01/rdf-schema#label |
Computer Fraud and Abuse Act
|
gptkbp:notableCase |
gptkb:United_States_v._Aaron_Swartz
gptkb:United_States_v._Lori_Drew gptkb:United_States_v._Morris |
gptkbp:penalty |
imprisonment
fines forfeiture |
gptkbp:purpose |
combat computer-related crimes
|
gptkbp:relatedTo |
gptkb:Electronic_Communications_Privacy_Act
computer security cybercrime hacking laws |
gptkbp:section |
gptkb:Section_1030(a)(7)_-_extortion_involving_computers
Section 1030(a)(2) - unauthorized access to obtain information Section 1030(a)(4) - fraud by computer Section 1030(a)(5) - causing damage by computer Section 1030(a)(6) - trafficking in passwords |
gptkbp:sponsor |
gptkb:Senator_Paul_Trible
gptkb:Senator_William_L._Armstrong |
gptkbp:subjectOf |
gptkb:military
legal scholarship |
gptkbp:bfsParent |
gptkb:Section_1030
gptkb:Electronic_Communications_Privacy_Act_of_1986 |
gptkbp:bfsLayer |
6
|