Verified Document

Computer Law Term Paper

Computer Fraud and Abuse Act was enacted into law in 1986 to deal with the hacking of computer systems operated by the American government and certain financial institutions. Through its enactment, the legislation made it a federal offense to access a protected computer without authorization or to an extent that is beyond the authorized access. However, since it was passed into law, the act has been amended severally in attempts to expand its scope and penalties. In addition, the act has developed to be an important legislation since it's used widely not only by the government to prosecute hackers but it's also used by private corporations to help protect their trade secrets and other proprietary information. Penalties and Fines in the Law:

The Computer Fraud and Abuse Act is considered as one of the most essential computer-crime laws because it was the first significant federal legislation to offer some protection against computer-based offenses. The main aim of the act was to provide legal protection for computers and computer systems in three major categories. They include computers and computer systems under direct control of some federal agencies, those that are part of a financial institution, and those involved in foreign or interstate commerce (Easttom & Taylor, 2011, p. 72).

In order to achieve its objectives, the act contains certain penalties and fines for offenders of the provisions of this legislation. These penalties and fines include a minimum of 10 years and maximum of 20 years imprisonment for offenders obtaining national security information, a maximum 10-year sentence for criminals trespassing in a government computer,...

The other penalties are a maximum 10-year sentence for trafficking in passwords, 20-year sentence for intentional access and reckless damage, and maximum 10-year sentence for extortion involving threats to damage computer. Furthermore, offenders in violation of the provisions of this legislation are subject to fines of up to $250,000 per incident.
Impact of the Legislation:

As previously mentioned, the act is regarded as one of the most significant laws since it's the first federal law addressing the hacking of computers and computer systems. This law has had a tremendous impact on the American society and global environment since its used by the U.S. government and private corporations to prosecute hackers and safeguard proprietary information like trade secrets respectively ("What is the Computer Fraud and Abuse Act?" n.d.). While this legislation was initially intended as a tool for national security to help in preventing hacking, it has been widely used across the American society as businesses invoked the act to protect significant proprietary information. Actually, these businesses have cited the law basically to sue former and current employees suspected of stealing information for various purposes such as competitive reasons. Therefore, the major impact of Computer Fraud and Abuse Act of 1986 is that it has helped in safeguarding important information and prosecuting hackers by government and private entities.

Judicial Case involving Computer Fraud and Abuse Act of 1986:

Since its enactment, the Computer Fraud and Abuse Act of 1986 has been used in…

Sources used in this document:
References:

Easttom, C. & Taylor, D.J. (2011). Computer Crime, Investigation, and the Law. Boston, MA:

Cengage Learning.

"United States v. Morris -- Bloomberg Law." (n.d.). Case Briefs. Retrieved December 3, 2012,

from http://www.casebriefs.com/blog/law/criminal-law/criminal-law-keyed-to-dressler/mens-rea/united-states-v-morris/
from http://lawschool.mikeshecket.com/criminallaw/unitedstatesvmorris.html
3, 2012, from http://searchcompliance.techtarget.com/guides/FAQ-How-has-the-Computer-Fraud-and-Abuse-Act-of-1986-evolved
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Mediated Communication CMC Throughout the Years,
Words: 1235 Length: 4 Document Type: Essay

Computer mediated Communication (CMC) Throughout the years, people used different means of communication to pass information from one source to another. The type of communication involved face-to-face, writing letters then sending to people, using telegrams which was the quickest means of communication, and use of telephones, although telephones were invented some years back. Today, the world has become computerized and there are new technologies that most firms have acquired to ease

Computer Security Information in the 21st Century,
Words: 599 Length: 2 Document Type: Essay

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Law of Purchasing and Supply
Words: 758 Length: 2 Document Type: Case Study

Law of Purchasing Supply What constitutes a contractual 'offer' according to English law? Your report should include references to common law, statute law, and European Union Law where appropriate. A contractual offer is when two parties display a willingness to enter into a contract. They understand that it will be binding once the offeree accepts the agreement. When a party is requested to offer a contract, this invitation to treat can be

Computer Forensics: Generally, Forensics Can Be Described
Words: 917 Length: 3 Document Type: Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Law and Police Powers Recent
Words: 3246 Length: 9 Document Type: Term Paper

Better still, don't let it happen. (para. 61) In the United States, citizens take a dim view of unbridled police powers. They were condemnatory of Samuel a. Alito, a young U.S. President Ronald Reagan administration lawyer, and Supreme Court nominee, who took an expansive view of government law-enforcement powers in manycases where he was called upon to balance the prerogatives of police and prosecutors with the rights of individuals, according

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now