Computer Fraud and Abuse Act
GPTKB entity
Properties (53)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:United_States_federal_law
|
gptkbp:allows |
theft of information
trafficking in passwords unauthorized access to computers |
gptkbp:amends |
gptkb:Cybersecurity_Enhancement_Act_of_2014
USA PATRIOT Act |
gptkbp:appliesTo |
computer systems
|
gptkbp:enactedBy |
gptkb:United_States_Congress
1986 |
gptkbp:enforces |
gptkb:Federal_Bureau_of_Investigation
|
gptkbp:hasSections |
identity theft
computer fraud exceeding authorized access trafficking in passwords computer-related extortion damage to computers national defense information fraud and related activity in connection with computers |
https://www.w3.org/2000/01/rdf-schema#label |
Computer Fraud and Abuse Act
|
gptkbp:includesProvisionsFor |
civil lawsuits
|
gptkbp:isAssociatedWith |
internet governance
computer security measures |
gptkbp:isAttendedBy |
Identity_Theft_Enforcement_and_Restitution_Act_of_2008
Computer_Abuse_Amendments_Act_of_1994 Computer_Fraud_and_Abuse_Act_of_2016 |
gptkbp:isCitedIn |
court rulings
Congressional hearings |
gptkbp:isConsidered |
landmark legislation
|
gptkbp:isCriticizedFor |
vague definitions
civil liberties advocates overreach impact on free speech chilling effect on innovation |
gptkbp:isDiscussedIn |
legal literature
|
gptkbp:isExaminedBy |
academic studies
federal prosecutions |
gptkbp:isInfluencedBy |
technological advancements
shaping cyber law |
gptkbp:isPartOf |
gptkb:Title_18_of_the_United_States_Code
cybersecurity legislation U.S._legal_framework_for_technology |
gptkbp:isReferencedIn |
policy discussions
|
gptkbp:isRelatedTo |
data protection laws
privacy laws Digital Millennium Copyright Act Electronic Communications Privacy Act |
gptkbp:isSubjectTo |
judicial interpretation
|
gptkbp:isSupportedBy |
law enforcement agencies
|
gptkbp:isUsedIn |
court cases
|
gptkbp:provides |
computer-related crimes
|
gptkbp:relatedTo |
identity theft
cybercrime hacking |