Preview

Computer Fraud Act Of 1984

Powerful Essays
Open Document
Open Document
2247 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Fraud Act Of 1984
Overview

Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything
…show more content…
It mandates penalties for anyone who accesses a computer in an unauthorized manner or exceeds one’s access rights. This is a powerful law because companies can use it to prosecute employees when they use the rights the companies have given them to carry out fraudulent activities.

Other federal laws that address hacking include the following:

Computer Fraud and Abuse Act of 1984
The Computer Fraud and Abuse Act (CFAA) of 1984 protect certain types of information that the government maintains as sensitive. The Act defines the term “classified computer,” and imposes punishment for unauthorized or misused access into one of these protected computers or systems. The Act also mandates fines and jail time for those who commit specific computer – related actions, such as trafficking in passwords or extortion by threatening a computer. In 1992, Congress amended the CFAA to include malicious code, which was not included in the original Act.

The Cyber Security Enhancement Act of 2002
This Act mandates that hackers who carry out certain computer crimes might now get life Sentences in jail if the crime could result in another’s bodily harm or possible death. This means that if hackers disrupt a 911 system, they could spend the rest of their days in

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Patriot Act Essay

    • 461 Words
    • 2 Pages

    In addition, the act is a threat to civil liberties because it destroys portions of the Bill of Rights in the Constitution. Those amendment rights include freedom of speech and assembly; unreasonable search and seizure; right to due process of law; speedy trial; and excessive cruel and unusual punishments. Furthermore, the act gives government authorities to tap into any phones of citizens or monitor everyday uses of the internet. The scariest part is that any Americans can be labeled as domestic terrorists if they engage in even normal criminal acts. On the other hand, the USA FREEDOM Act (Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act) was passed to impose limits on bulk collection of telecommunication data on citizens by intelligence agencies. The act extended the Patriot Act provision that involves roving wiretaps and lone wolf…

    • 461 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Patriot Act

    • 843 Words
    • 4 Pages

    This includes, broad new authority to compel information from ISPs, friends, relatives, businesses and others, all without informing you. Immunity for businesses that voluntarily turn over your information to law enforcement. Extra punishment for use of cryptography no connection to terrorism needed. Instant police access to your credit reports upon certification that they are sought "in connection with their duties", again with no connection to terrorism needed.…

    • 843 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Patriot Act

    • 1920 Words
    • 8 Pages

    References: Clare, M. S. (2003). The effect of the USA patriot act on workplace privacy. Practical Lawyer, 49(1), 35-45. Retrieved on November 30, 2012 from http://search.proquest.com/docview/274316503?accountid=32521.…

    • 1920 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The computer misuse act is a law in the UK that legislates against certain activities using computers, such as hacking in to other peoples systems, misusing software or helping a person to gain access to protected files on someone else’s computer.…

    • 2005 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Online Business Crime

    • 294 Words
    • 2 Pages

    All businesses, including web businesses, must comply with laws and regulations. Internet businesses can encounter a wider base of laws more quickly when crossing traditional boundaries. Some online businesses have faced legal troubles for committing a crime, breach of contract, and engaging in a tortious action. For example, Ninjavideo.net faced criminal charges for providing users the access to illegally download infringing copies of copyrighted movies and television programs. This is an example of online business crime since the items were copyrighted and it is against the law to reproduce copyrighted items without permission. A breach of contract occurs when one party of a business contract fails to uphold the agreement made. Facebook.com was under investigation for breach of contract when it was found out that personal information was being transmitted to third party companies via apps even when users had set their privacy settings to strict. This is a breach of contract since it breaks Facebook.com rule of keeping user privacy secure. Tortious interference of business happens when someone causes intentional interference to another business or an individual 's reputation in order to drive business away. An example of a business being accused of tort was when America Online (AOL) was sued by its users and competitor internet service providers alleging that AOL caused damage to the users’ computers and blocked utilization of competitors’ software. This is an example of tort since AOL intentionally interfered with another business’ customers.…

    • 294 Words
    • 2 Pages
    Good Essays