What is the law on computer fraud and abuse?

Computer fraud and abuse Act is the Federal Law of the United States forbidding unauthorized access or using protected computers. The law created by Congress in 1986 in response to the growing popularity of computers is subject to numerous modifications since its foundation. Treters for its violation are quite strict, up to 20 years in prison is possible for a certain violation.

The extent of the law on computer fraud and abuse is limited to certain types of computers that the government considers to be worthy of protection. In the initial act, protection was mainly limited to computers intended for government use. The later provisions have expanded this definition to include computers used by financial institutions and computer systems inside the US and abroad, which are used in interstate trade and communication.

Courts have long rushed over the uncertainty that the law displays when defining "unethathorized or" AuthorizovAne "use the computer. This discussion has been caused by several important legal questions, even at what time, the former employee's authorization to use the computer system. Although the case -law varies, it generally decides to expire when an employee starts working for a rival company and could therefore use information about the former employer to help his competition. The District Court, caused some earlier decisions to insist that the authorization cannot be canceled while the employee is working for the company even when using the acquired data to help a competitive business

In addition to information protection, such as National Security or Trade Secrets, Computer Scam and Abuse Act, it also protects against the use of a protected computer to commit fraud, or to obtain value items illegally. This may include a change or removal of records or the use of information obtained to commit fraud. Punishment for thisThe type of violation may include up to five years in prison, fines and seizure of any goods or items obtained by fraudulent activities.

The provisions of the law on computer fraud and abuse remain in the constant changing atmosphere of the computer world in constant flow. When they were created at the age of 80, governments just began to use computers in everyday activities and the private sector barely began to see the capacity of computer innovation. Given that the rules and boundaries of privacy and protected information continue to move, it is likely that the law will continue to see regular additions and changes in the future.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?