Preview

Computer Fraud Act Essay

Good Essays
Open Document
Open Document
549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Fraud Act Essay
Computer Fraud and Abuse Act
The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986 intended to reduce cracking of computer systems and to address federal computer-related offenses. The Computer Fraud and Abuse Act (codified as 18 U.S.C. § 1030 governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are involved, where the crime itself is interstate in nature, or computers used in interstate and foreign commerce. It was amended in 1988, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. Subsection (b) of the act punishes anyone who not just commits or attempts to commit an offense under the
…show more content…

§ 1030(e)(2) to mean a computer:
• exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
• which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States;
Criminal Offenses Under The Computer Fraud and Abuse Act
1. Knowingly accessing a computer without authorization in order to obtain national security data
2. Intentionally accessing a computer without authorization to obtain: o Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer. o Information from any department or agency of the United States o Information from any protected computer if the conduct involves an interstate or foreign


You May Also Find These Documents Helpful

  • Satisfactory Essays

    i. At what value information is recorded in the financial statements (i.e. the measurement principle).…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Henrietta Lacks

    • 477 Words
    • 2 Pages

    Personal information. Compiled from credit applications you've filled out, this information normally includes your name, current and recent addresses, Social Security Number, date of birth, and current and previous employers.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Rsm220-Week 01 Slides

    • 2259 Words
    • 10 Pages

    1. Identification, measurement, and communication of financial information about; 2. Economic entities to; 3. Interested persons.…

    • 2259 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Snowden Affair Dbq

    • 1009 Words
    • 5 Pages

    after the 9/11 attacks. Document 4 specifically goes over how the act affects the cyber and internet in dealing with U.S. security and protection along with how the act affects e-commerce and allows the government and officials acting on the defense and protection of national security and domestic security to monitor internet activities. The act allows for the government to have more power and ability to detect and prevent terrorism via the internet and computer technologies, such as powers to investigate and act on serious cybercrimes. Furthermore, the act labels act of computer trespassing of terrorism. The act also allows gives law enforcement more authority to acquire electronic data, communications and internet activity to track criminals and suspicious activities. Allows for a court under jurisdiction to issue warrants that allows for electronic searches for anywhere in the country. Document 4 also reviews the issues that the USA PATRIOT act creates such as the concerns with privacy and civil liberties of U.S. citizens since the act allows for government and law enforcement more power to monitor and investigate cyber activities. The act also deals with issues regarding E-commerce that may make the ability to conduct e-commerce more difficult,…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Statute of Frauds clearly identifies what contracts have to be presented in the written format in order to remain enforceable (Reilly, 2000), therefore written agreements should be signed by all parties to be binding. The Statute of Frauds is a rule of law requiring certain kinds of written contracts, not oral contracts since they are vague and frequently don't provide sufficient proof of the terms agreed upon by each parties. Oral contracts create more complications and are the main reason for difficulties in the business. Although the status contains many technicalities, its primary purpose is to prevent injury from fraudulent conduct.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Flowchart In Health Care

    • 1598 Words
    • 7 Pages

    Financial data: The data collected for the purpose of managing the assets and expenses of a business…

    • 1598 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The computer misuse act is a law in the UK that legislates against certain activities using computers, such as hacking in to other peoples systems, misusing software or helping a person to gain access to protected files on someone else’s computer.…

    • 2005 Words
    • 9 Pages
    Better Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The statute of fraud is defined as, “a law that requires that certain contracts be in writing, and that those contracts be signed by the parties who are to be bound by the contract”. [1] The policy that underpins the Statue of Frauds was established during the reign of King Charles II through a statutory enactment requiring a written record for specified types of contracts. [2] These specified types of contracts could not be enforced unless a memorandum of it is written and signed by the party to be charged. [3] The basic rules include: 1. the stature does not require the entire contract to be written, but only a memorandum of it, 2. only the party who is to be charged, that is, against whom enforcement is sought, need to have signed it, and 3. The consequence of noncompliance is usually unenforceability, not invalidity. [4] This was to ensure that a person could not seek to enforce an obligation of the kind covered by the statute purely on the basis of unreliable and possibly perjured oral testimony, but would have to produce some adequate written record of the contract. [5] The writing can also help reduce the chance of any future litigation by giving the parties the opportunity to take a second look at the terms and conditions of their agreement before it becomes final. [6] Because of the advancement of communication through technology the adaptation of “writing” and “signature” has been required to take account of communication by other forms, particularly including electronic and media. [7]…

    • 326 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    data and are subject to consequences as described above. All internet and Intranet related equipment,…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case 2: Soliciting Funds

    • 730 Words
    • 3 Pages

    Authorizes the Department of Justice (DOJ) to commence a civil action to enjoin unauthorized persons or entities from accessing or transmitting computer commands commonly referred to as botnets that would impair the integrity or availability of 100 or more computers used by financial institutions or the federal government or that affect interstate or foreign commerce or communications during any one-year period, including by denying access to the computers, installing unwanted software, or obtaining information without authorization. Allows DOJ to enjoin the alienation or disposal of, or to seek restraining orders prohibiting the disposal of, property obtained as a result of such a violation” (congress.gov…

    • 730 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Prison

    • 1277 Words
    • 6 Pages

    The USA Patriot Act is The act, as a response to the terrorist attacks of September 11th, significantly weakened restrictions on law enforcement agencies ' gathering of intelligence within the United States; expanded the Secretary of the Treasury’s authority to regulate financial transactions, particularly those involving foreign individuals and entities; and broadened the discretion of law enforcement and immigration authorities in detaining and deporting immigrants suspected of terrorism-related acts (Freedom of Speech Network, 2009). The overall point to the Patriot Act is to deter and punish anyone who commits any terrorist attacks in the Unites States or around the word. To also improve law enforcement tools so that they can better serve, protect, and handle terrorist attacks. This is done by making the United States stronger to prevent, detect, and prosecute anything having to do with funding any terrorist activity. Subject to special scrutiny foreign jurisdictions, foreign financial institutions, and classes of international transactions or types of accounts that are susceptible to criminal abuse. To require all appropriate elements of the financial services industry to…

    • 1277 Words
    • 6 Pages
    Better Essays