Statements (23)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:law
|
gptkbp:alsoKnownAs |
gptkb:Computer_Fraud_and_Abuse_Act
|
gptkbp:amendedBy |
gptkb:USA_PATRIOT_Act
gptkb:Identity_Theft_Enforcement_and_Restitution_Act |
gptkbp:appliesTo |
computers used in interstate or foreign commerce
|
gptkbp:codifiedIn |
gptkb:18_U.S.C._§_1030
|
gptkbp:criminalizes |
intentional damage to computers
obtaining information from protected computers trafficking in computer passwords unauthorized access to computers |
gptkbp:dateEnacted |
1986
|
gptkbp:enactedBy |
gptkb:United_States_Congress
|
https://www.w3.org/2000/01/rdf-schema#label |
Section 1030
|
gptkbp:partOf |
gptkb:Title_18_of_the_United_States_Code
|
gptkbp:providesFor |
criminal penalties
civil remedies |
gptkbp:relatedTo |
cybersecurity law
prosecution of hackers |
gptkbp:subject |
computer crime
computer fraud unauthorized computer access |
gptkbp:bfsParent |
gptkb:Title_18,_United_States_Code
|
gptkbp:bfsLayer |
5
|