Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:law
|
| gptkbp:alsoKnownAs |
gptkb:Computer_Fraud_and_Abuse_Act
|
| gptkbp:amendedBy |
gptkb:USA_PATRIOT_Act
gptkb:Identity_Theft_Enforcement_and_Restitution_Act |
| gptkbp:appliesTo |
computers used in interstate or foreign commerce
|
| gptkbp:codifiedIn |
gptkb:18_U.S.C._§_1030
|
| gptkbp:criminalizes |
intentional damage to computers
obtaining information from protected computers trafficking in computer passwords unauthorized access to computers |
| gptkbp:dateEnacted |
1986
|
| gptkbp:enactedBy |
gptkb:United_States_Congress
|
| gptkbp:partOf |
gptkb:Title_18_of_the_United_States_Code
|
| gptkbp:providesFor |
criminal penalties
civil remedies |
| gptkbp:relatedTo |
cybersecurity law
prosecution of hackers |
| gptkbp:subject |
computer crime
computer fraud unauthorized computer access |
| gptkbp:bfsParent |
gptkb:Title_18,_United_States_Code
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Section 1030
|