Global Information Lookup Global Information

Computer Fraud and Abuse Act information


Computer Fraud and Abuse Act
Great Seal of the United States
United States Supreme Court cases
  • Van Buren v. United States, No. 19-783, 593 U.S. ___ (2021)

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.[2]

The original 1984 bill was enacted in response to concern that computer-related crimes might go unpunished.[3] The House Committee Report to the original computer crime bill characterized the 1983 techno-thriller film WarGames—in which a young teenager (played by Matthew Broderick) from Seattle breaks into a U.S. military supercomputer programmed to predict possible outcomes of nuclear war and unwittingly almost starts World War III—as "a realistic representation of the automatic dialing and access capabilities of the personal computer."[4]

The CFAA was written to extend existing tort law to intangible property, while, in theory, limiting federal jurisdiction to cases "with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature", but its broad definitions have spilled over into contract law (see "Protected Computer", below). In addition to amending a number of the provisions in the original section 1030, the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of malicious code and denial-of-service attacks. Congress also included in the CFAA a provision criminalizing trafficking in passwords and similar items.[1]

Since then, the Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. With each amendment of the law, the types of conduct that fell within its reach were extended.

In January 2015, President Barack Obama proposed expanding the CFAA and the RICO Act in his Modernizing Law Enforcement Authorities to Combat Cyber Crime proposal.[5] DEF CON organizer and Cloudflare researcher Marc Rogers, Senator Ron Wyden, and Representative Zoe Lofgren stated opposition to this on the grounds it would make many regular Internet activities illegal, and moved further away from what they were trying to accomplish with Aaron's Law.[6][7][needs update]

  1. ^ a b Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Retrieved June 3, 2013.
  2. ^ "Who's Responsible? - Computer Crime Laws | Hackers | FRONTLINE | PBS". www.pbs.org. Retrieved November 13, 2021.
  3. ^ Schulte, Stephanie (November 2008). "The WarGames Scenario". Television and New Media. 9 (6): 487–513. doi:10.1177/1527476408323345. S2CID 146669305.
  4. ^ H.R. Rep. 98-894, 1984 U.S.C.C.A.N. 3689, 3696 (1984).
  5. ^ "Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts". whitehouse.gov. January 13, 2015. Retrieved January 30, 2015 – via National Archives.
  6. ^ "Democrats, Tech Experts Slam Obama's Anti-Hacking Proposal". Huffington Post. January 20, 2015. Retrieved January 30, 2015.
  7. ^ "Obama, Goodlatte Seek Balance on CFAA Cybersecurity". U.S. News & World Report. January 27, 2015. Retrieved January 30, 2015.

and 20 Related for: Computer Fraud and Abuse Act information

Request time (Page generated in 1.0642 seconds.)

Computer Fraud and Abuse Act

Last Update:

Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud...

Word Count : 5086

Computer fraud

Last Update:

the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA), which criminalizes computer-related acts under...

Word Count : 536

Computer trespass

Last Update:

Computer trespass is a computer crime in the United States involving unlawful access to computers. It is defined under the Computer Fraud and Abuse act...

Word Count : 650

Internet censorship in the United States

Last Update:

Amendment protection. The Computer Fraud and Abuse Act (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law (18 U.S.C. § 1030),...

Word Count : 10085

In re DoubleClick

Last Update:

three federal laws: The Stored Communications Act, the Wiretap Statute and the Computer Fraud and Abuse Act. The court held that DoubleClick was not liable...

Word Count : 1201

Morris worm

Last Update:

US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on 8:30...

Word Count : 1418

Computer crime countermeasures

Last Update:

to commit a cyber-crime, and the penalties for violation. The 2002 update on the Computer Fraud and Abuse Act expands the act to include the protection...

Word Count : 3632

Tor Ekeland

Last Update:

City based computer, trial and appellate lawyer. He is best known for representing hackers prosecuted under the Computer Fraud and Abuse Act ("CFAA"),...

Word Count : 786

Suicide of Megan Meier

Last Update:

relation to the hoax. Lori Drew was indicted and convicted by a jury of violations of the Computer Fraud and Abuse Act in 2008 over the matter. Her conviction...

Word Count : 3193

National Information Infrastructure Protection Act

Last Update:

Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse Act. The Act was enacted in 1996 as an amendment to the Computer Fraud and Abuse Act. It...

Word Count : 2473

Cybercrime

Last Update:

Police Department - Japan National Police Agency Computer Fraud and Abuse Act Computer security Computer trespass Cloud computing security Convention on...

Word Count : 8405

Robert Tappan Morris

Last Update:

prosecuted for releasing the worm, and became the first person convicted under the then-new Computer Fraud and Abuse Act (CFAA). He went on to cofound the...

Word Count : 1409

Aaron Swartz

Last Update:

later charged him with two counts of wire fraud and eleven violations of the Computer Fraud and Abuse Act, carrying a cumulative maximum penalty of $1 million...

Word Count : 16142

Christopher Doyon

Last Update:

for investigation and remediation, clearing threshold of the Computer Fraud and Abuse Act and making the DDoS a federal crime. Helped by his pro-bono attorney...

Word Count : 494

Computer security

Last Update:

with the use of economic sanctions and diplomatic pressure. The 1986 18 U.S.C. § 1030, the Computer Fraud and Abuse Act is the key legislation. It prohibits...

Word Count : 22144

Trailblazer Project

Last Update:

him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn...

Word Count : 1807

Demand Progress

Last Update:

rules, blocking expansion of the Computer Fraud and Abuse Act, under which co-founder Aaron Swartz was indicted, and other key legislative efforts. Estimated...

Word Count : 1125

Web scraping

Last Update:

copyright infringement (compilation), (2) violation of the Computer Fraud and Abuse Act ("CFAA"), and (3) trespass to chattel. However, the effectiveness of...

Word Count : 3917

NSO Group

Last Update:

sued NSO under the United States Computer Fraud and Abuse Act. In 2021, Apple filed a lawsuit against NSO in the U.S., and the US included NSO Group in its...

Word Count : 6396

Protected computer

Last Update:

Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of...

Word Count : 851

PDF Search Engine © AllGlobal.net