Computer Law Term Paper

PAGES
3
WORDS
1015
Cite

Computer Fraud and Abuse Act was enacted into law in 1986 to deal with the hacking of computer systems operated by the American government and certain financial institutions. Through its enactment, the legislation made it a federal offense to access a protected computer without authorization or to an extent that is beyond the authorized access. However, since it was passed into law, the act has been amended severally in attempts to expand its scope and penalties. In addition, the act has developed to be an important legislation since it's used widely not only by the government to prosecute hackers but it's also used by private corporations to help protect their trade secrets and other proprietary information. Penalties and Fines in the Law:

The Computer Fraud and Abuse Act is considered as one of the most essential computer-crime laws because it was the first significant federal legislation to offer some protection against computer-based offenses. The main aim of the act was to provide legal protection for computers and computer systems in three major categories. They include computers and computer systems under direct control of some federal agencies, those that are part of a financial institution, and those involved in foreign or interstate commerce (Easttom & Taylor, 2011, p. 72).

In order to achieve its objectives, the act contains certain penalties and fines for offenders of the provisions of this legislation. These penalties and fines include a minimum of 10 years and maximum of 20 years imprisonment for offenders obtaining national security information, a maximum 10-year sentence for criminals trespassing in a government computer,...

...

The other penalties are a maximum 10-year sentence for trafficking in passwords, 20-year sentence for intentional access and reckless damage, and maximum 10-year sentence for extortion involving threats to damage computer. Furthermore, offenders in violation of the provisions of this legislation are subject to fines of up to $250,000 per incident.
Impact of the Legislation:

As previously mentioned, the act is regarded as one of the most significant laws since it's the first federal law addressing the hacking of computers and computer systems. This law has had a tremendous impact on the American society and global environment since its used by the U.S. government and private corporations to prosecute hackers and safeguard proprietary information like trade secrets respectively ("What is the Computer Fraud and Abuse Act?" n.d.). While this legislation was initially intended as a tool for national security to help in preventing hacking, it has been widely used across the American society as businesses invoked the act to protect significant proprietary information. Actually, these businesses have cited the law basically to sue former and current employees suspected of stealing information for various purposes such as competitive reasons. Therefore, the major impact of Computer Fraud and Abuse Act of 1986 is that it has helped in safeguarding important information and prosecuting hackers by government and private entities.

Judicial Case involving Computer Fraud and Abuse Act of 1986:

Since its enactment, the Computer Fraud and Abuse Act of 1986 has been used in…

Sources Used in Documents:

References:

Easttom, C. & Taylor, D.J. (2011). Computer Crime, Investigation, and the Law. Boston, MA:

Cengage Learning.

"United States v. Morris -- Bloomberg Law." (n.d.). Case Briefs. Retrieved December 3, 2012,

from http://www.casebriefs.com/blog/law/criminal-law/criminal-law-keyed-to-dressler/mens-rea/united-states-v-morris/
from http://lawschool.mikeshecket.com/criminallaw/unitedstatesvmorris.html
3, 2012, from http://searchcompliance.techtarget.com/guides/FAQ-How-has-the-Computer-Fraud-and-Abuse-Act-of-1986-evolved


Cite this Document:

"Computer Law" (2012, December 03) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/computer-law-76809

"Computer Law" 03 December 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/computer-law-76809>

"Computer Law", 03 December 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/computer-law-76809

Related Documents

Computer mediated Communication (CMC) Throughout the years, people used different means of communication to pass information from one source to another. The type of communication involved face-to-face, writing letters then sending to people, using telegrams which was the quickest means of communication, and use of telephones, although telephones were invented some years back. Today, the world has become computerized and there are new technologies that most firms have acquired to ease

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Computer Crimes Cynthia Simmons began receiving unwanted communication from an unknown assailant. She did what the experts recommend: she changed her email address, instant messenger identity and other online identifiers, nothing stopped the computer harassment. She believes the offender to be her ex-boyfriend, Jacob Myers, but even searching her computer and comparing the offending emails to that of Jacob Myers, the evidence has not been sufficient to obtain a search warrant