enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    Broadened the definition of "protected computer" in 18 U.S.C. § 1030(e)(2) to the full extent of Congress's commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and; Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.

  3. Protected computer - Wikipedia

    en.wikipedia.org/wiki/Protected_computer

    Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers".

  4. Title 18 of the United States Code - Wikipedia

    en.wikipedia.org/wiki/Title_18_of_the_United...

    In its coverage, Title 18 is similar to most U.S. state criminal codes, typically referred to by names such as Penal Code, Criminal Code, or Crimes Code. [2] Typical of state criminal codes is the California Penal Code. [3] Many U.S. state criminal codes, unlike the federal Title 18, are based on the Model Penal Code promulgated by the American ...

  5. National Information Infrastructure Protection Act - Wikipedia

    en.wikipedia.org/wiki/National_Information...

    Pursuant to its authority under section 994(p) of title 28, United States Code, the United States Sentencing Commission shall amend the Federal sentencing guidelines to ensure that any individual convicted of a violation of section 1030 of title 18, United States Code, can be subjected to appropriate penalties, without regard to any mandatory ...

  6. United States v. John (2010) - Wikipedia

    en.wikipedia.org/wiki/United_States_v._John_(2010)

    In United States v.John, 597 F.3d 263 (2010) [1] United States Court of Appeals for the Fifth Circuit interpreted the term "exceeds authorized access" in the Computer Fraud and Abuse Act 18 U.S.C. §1030(e)(6) [2] and concluded that access to a computer may be exceeded if the purposes for which access has been given are exceeded.

  7. United States v. Riggs - Wikipedia

    en.wikipedia.org/wiki/United_States_v._Riggs

    The indictment charged both Riggs and Neidorf with seven violations of federal statutes: counts 1 and 2 alleged violations of 18 USC § 1343 [6] , counts 3 and 4 alleged violations of 18 USC § 2314 [7] (interstate transportation of stolen property), and counts 5-7 alleged violations of 18 USC § 1030 [8] (computer fraud and abuse). [5]

  8. NYC comptroller asks feds to decide whether Cuomo violated ...

    www.aol.com/nyc-comptroller-asks-feds-decide...

    A declared mayoral candidate, city Comptroller Brad Lander, is asking US health officials to determine whether ex-Gov. Andrew Cuomo's controversial March 25, 2020 order requiring nursing homes to ...

  9. Robert Tappan Morris - Wikipedia

    en.wikipedia.org/wiki/Robert_Tappan_Morris

    In 1989, Morris was indicted for violating United States Code Title 18 (18 U.S.C. § 1030), the Computer Fraud and Abuse Act (CFAA). [1] He was the first person to be indicted under this act. In December 1990, he was sentenced to three years of probation, 400 hours of community service, and a fine of $10,050 plus the costs of his supervision.