Statements (23)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:law | 
| gptkbp:alsoKnownAs | gptkb:Computer_Fraud_and_Abuse_Act | 
| gptkbp:amendedBy | gptkb:USA_PATRIOT_Act gptkb:Identity_Theft_Enforcement_and_Restitution_Act | 
| gptkbp:appliesTo | computers used in interstate or foreign commerce | 
| gptkbp:codifiedIn | gptkb:18_U.S.C._§_1030 | 
| gptkbp:criminalizes | intentional damage to computers obtaining information from protected computers trafficking in computer passwords unauthorized access to computers | 
| gptkbp:dateEnacted | 1986 | 
| gptkbp:enactedBy | gptkb:United_States_Congress | 
| gptkbp:partOf | gptkb:Title_18_of_the_United_States_Code | 
| gptkbp:providesFor | criminal penalties civil remedies | 
| gptkbp:relatedTo | cybersecurity law prosecution of hackers | 
| gptkbp:subject | computer crime computer fraud unauthorized computer access | 
| gptkbp:bfsParent | gptkb:Title_18,_United_States_Code | 
| gptkbp:bfsLayer | 5 | 
| https://www.w3.org/2000/01/rdf-schema#label | Section 1030 |