enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire ...

  3. Electronic Communications Privacy Act - Wikipedia

    en.wikipedia.org/wiki/Electronic_Communications...

    The seizure of a computer, used to operate an electronic bulletin board system, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, does not constitute an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. s 2510, et seq., as amended by Title ...

  4. Van Buren v. United States - Wikipedia

    en.wikipedia.org/wiki/Van_Buren_v._United_States

    Computer Fraud and Abuse Act. Van Buren v. United States, 593 U.S. ___ (2021), was a United States Supreme Court case dealing with the Computer Fraud and Abuse Act (CFAA) and its definition of "exceeds authorized access" in relation to one intentionally accessing a computer system they have authorization to access.

  5. Computer fraud - Wikipedia

    en.wikipedia.org/wiki/Computer_fraud

    Computer fraud is the use of computers, the Internet, Internet devices, and Internet services to defraud people or organizations of resources. [1] In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act (CFAA), which criminalizes computer-related acts under federal jurisdiction and directly combats the insufficiencies of existing laws.

  6. United States v. Morris (1991) - Wikipedia

    en.wikipedia.org/wiki/United_States_v._Morris_(1991)

    United States v. Morris was an appeal of the conviction of Robert Tappan Morris for creating and releasing the Morris worm, one of the first Internet-based worms. This case resulted in the first conviction under the Computer Fraud and Abuse Act. In the process, the dispute clarified much of the language used in the law, which had been heavily ...

  7. Stored Communications Act - Wikipedia

    en.wikipedia.org/wiki/Stored_Communications_Act

    CLOUD Act. The Stored Communications Act (SCA, codified at 18 U.S.C. Chapter 121 §§ 2701–2713) [1] is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-party Internet service providers (ISPs). It was enacted as Title II of the Electronic ...

  8. Computer crime countermeasures - Wikipedia

    en.wikipedia.org/wiki/Computer_crime_countermeasures

    The Computer Fraud and Abuse Act passed in 1986 is one of the broadest statutes in the US used to combat cyber-crime. It has been amended a number of times, most recently by the US Patriot Act of 2002 and the Identity theft enforcement and Restitution Act of 2008.

  9. Protected computer - Wikipedia

    en.wikipedia.org/wiki/Protected_computer

    Protected computer. Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National ...