Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
The Computer Fraud and Abuse Act (CFAA) is a law that was passed by U.S. Congress in 1986 to reduce the hacking and cracking of government or other sensitive institutional computer systems. The act states that anyone who engages in the following will be subject ranging from fines to imprisonment.
Accesses information without authorization to obtain information related to national defense, foreign relations or other restricted data.
Access a computer without authorization and obtains information contained in financial records or from a financial institution.
Accesses a U.S. department agency computer without authorization.
Accesses a federal computer without authorization and with the intention to defraud.
The Computer Fraud and Abuse Act prohibits the use of federal and certain computers of financial institutions beyond the bounds of the authorization given to the person. This is mainly to eliminate or at least reduce cases of fraud and abuse where federal protected computers are involved. Some believe that the powers of the CFAA are too wide-sweeping. Specifically, there is debate around what constitutes "authorized" access, as there are court precedents that have defined this very broadly.
Protected computers include computers that are used exclusively by the U.S. government or a financial institution as well as computers used for (or that affect) foreign commerce or interstate communication or commerce. This includes computers in locations outside of the United States.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an...
What is a Security Posture? Security posture definition refers to the ability an organization has to protect its information technology...
Trending NewsLatest GuidesReviewsTerm of the Day