Computer Fraud and Abuse Act (USA)
GPTKB entity
Statements (40)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:United_States_federal_law
|
gptkbp:allows |
civil lawsuits
|
gptkbp:amendedBy |
multiple times
|
gptkbp:appliesTo |
computers used in interstate or foreign commerce
protected computers |
gptkbp:category |
United States federal criminal legislation
Computer law Cybercrime law |
gptkbp:codifiedIn |
gptkb:18_U.S.C._§_1030
|
gptkbp:criminalizes |
unauthorized computer access
trafficking in passwords computer-related theft extortion involving computers computer-related fraud |
gptkbp:criticizedFor |
vague language
chilling effect on security research overbroad application |
gptkbp:dateEnacted |
1986
|
gptkbp:enactedBy |
gptkb:United_States_Congress
|
gptkbp:enforcedBy |
gptkb:Federal_Bureau_of_Investigation
gptkb:United_States_Department_of_Justice |
gptkbp:focusesOn |
gptkb:fraud
computer crime unauthorized access to computers protection of federal computers protection of financial institution computers protection of government computers |
https://www.w3.org/2000/01/rdf-schema#label |
Computer Fraud and Abuse Act (USA)
|
gptkbp:interpretedBy |
Van Buren v. United States (2021)
|
gptkbp:notableCase |
gptkb:United_States_v._Aaron_Swartz
gptkb:United_States_v._Lori_Drew United States v. Andrew Auernheimer |
gptkbp:penalty |
imprisonment
fines |
gptkbp:relatedTo |
cybersecurity
hacking laws |
gptkbp:subjectOf |
legal reform debates
Supreme Court interpretation |
gptkbp:bfsParent |
gptkb:Cyber_Crime
|
gptkbp:bfsLayer |
8
|