Search icone
Search and publish your papers

Computer Crime Rules According to Computer Fraud and Abuse Act (CFAA)

About the author

General public

About the document

Published date
documents in English
2 pages
General public
0 times
Validated by
  1. It is apparently wrong to consider the CFAA as too broad
  2. It is also specified through the CFAA that any person who intentionally gains unauthorized access to a computer or even surpassed the required authorized access and hence illegally obtains confidential information can be said to have a malicious intent
  3. According the CFAA a computer crime would also occur when an individual gains access without authorization to a non-public computer of a government's agency or department
  4. It is also specified in the CFAA that whenever knowingly a person causes the transmission of information
  5. It would also be against the law to defraud traffics knowingly and with the intent to do so in any given password or related information that could lead to an unauthorized access to a computer
  6. Generally in all the provisions of the CFAA, it has been made that an act becomes a computer crime where the perpetrator causes actual harm and where the intent is malicious

Computer crime has today become a global phenomenon. It entails the use of a computer to commit a crime or even the criminal exploitation of a computer or the internet. It can as well involve offences committed against people or groups of people mainly with the criminal motive of harming the victim's reputation, causing physical or mental harm whether directly or indirectly to the victim. Determining whether a computer related offense is a crime or not may be difficult. This paper brings out what the rules of computer crime should be, with regard to various cases computer crimes whose committers think that they did nothing wrong. The central question is whether the law against unauthorized access a good idea or whether there is the need for some other standards such as whether the perpetrator caused any actual arm and whether the perpetrator acted maliciously such as the intent of causing harm. The Computer Fraud and Abuse Act (CFAA) clarifies all these and it has been amended several time to make it specific.

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages