enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire ...

  3. Electronic Communications Privacy Act - Wikipedia

    en.wikipedia.org/wiki/Electronic_Communications...

    The seizure of a computer, used to operate an electronic bulletin board system, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, does not constitute an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. s 2510, et seq., as amended by Title ...

  4. Van Buren v. United States - Wikipedia

    en.wikipedia.org/wiki/Van_Buren_v._United_States

    Computer Fraud and Abuse Act. Van Buren v. United States, 593 U.S. ___ (2021), was a United States Supreme Court case dealing with the Computer Fraud and Abuse Act (CFAA) and its definition of "exceeds authorized access" in relation to one intentionally accessing a computer system they have authorization to access.

  5. Protected computer - Wikipedia

    en.wikipedia.org/wiki/Protected_computer

    Protected computer. Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National ...

  6. Internet censorship in the United States - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship_in_the...

    The Computer Fraud and Abuse Act (CFAA) was enacted in 1986 as an amendment to an existing computer fraud law (18 U.S.C. § 1030), which was part of the Comprehensive Crime Control Act of 1984. The CFAA prohibits accessing a computer without authorization, or in excess of authorization. [18] Since 1986, the Act was amended in 1989, 1994, 1996 ...

  7. United States v. Morris (1991) - Wikipedia

    en.wikipedia.org/wiki/United_States_v._Morris_(1991)

    United States v. Morris was an appeal of the conviction of Robert Tappan Morris for creating and releasing the Morris worm, one of the first Internet-based worms. This case resulted in the first conviction under the Computer Fraud and Abuse Act. In the process, the dispute clarified much of the language used in the law, which had been heavily ...

  8. United States v. Swartz - Wikipedia

    en.wikipedia.org/wiki/United_States_v._Swartz

    In United States of America v.Aaron Swartz, Aaron Swartz, an American computer programmer, writer, political organizer and Internet activist, was prosecuted for multiple violations of the Computer Fraud and Abuse Act of 1986 (CFAA), after downloading academic journal articles through the MIT computer network from a source for which he had an account as a Harvard research fellow.

  9. United States v. John (2010) - Wikipedia

    en.wikipedia.org/wiki/United_States_v._John_(2010)

    Computer Fraud and Abuse Act. In United States v. John, 597 F.3d 263 (2010) [1] United States Court of Appeals for the Fifth Circuit interpreted the term "exceeds authorized access" in the Computer Fraud and Abuse Act 18 U.S.C. §1030 (e) (6) [2] and concluded that access to a computer may be exceeded if the purposes for which access has been ...