StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Fraud and Abuse Act - Essay Example

Cite this document
Summary
In the paper “Computer Fraud and Abuse Act,” the author discusses computer fraud, which entails committing fraud through using unauthorized access to information technology, and such acts are prohibited by the United States Computer Fraud and Abuse Act…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Computer Fraud and Abuse Act
Read Text Preview

Extract of sample "Computer Fraud and Abuse Act"

Download file to see previous pages

This refers to the involvement of the federal government’s computers or prescribed financial bodies in instances where the committed crime is of an interstate nature. To clarify the provisions of the original Act further, trafficking in passwords, rebuffing service attacks and malicious distribution of codes was also criminalized by the CFAA. The Act also underwent several amendments in a bid to eliminate overlaps and fill loopholes between 1989 and 2008. With examples, this paper will question the legitimate effect of the CFAA: Has it been a success or failure in preventing computer fraud and abuse?

This question is driven by the vagueness of the law, which has the potential of exposing it to flaws and prosecutorial abuse. By its definition, the Act can be perceived from two angles in terms of the computers it covers (Granville, 2003). The covered computers are referred to as protected computers, and in this sense, theoretically, a protected computer is defined as one meant for exclusive use by the government of the United States or by a financial institution. It also refers to any other computer which uses the government or financial institution is injuriously affected by conduct that constitutes an offense.

This includes computers not within the United States, which affect foreign or interstate communication and commerce of the United States. . Since Congress did not describe clearly what was meant by that, it raises questions as to whether prosecutors will be of the opinion that a violator of terms of service of a website deserves time in jail or not (Jarrett & Bailie, 2010). Would such an opinion be reasonable or excessively harsh? Further, does the law need to separate the way it treats criminal intentions on the Internet that result in grave harm to the security of social, civic, and financial institutions from what is considered everyday Internet activity?

In the light of the current scramble for the Internet, lawmakers need to quantify the effectiveness of the CFAA and decide on how to respond to various stakeholders and interested parties. For instance, some foreign countries are seeking control over the Internet; powerful individuals and corporate organizations want it shaped in ways beneficial to them while undermining national interests; military regimes are spying, attacking and oppressing both private and public institutions; and intelligence and law enforcing agencies are seeking to monitor and mine it (Jarrett & Bailie, 2010).

An analysis of these areas will enable lawmakers to determine the success or failure of the CFAA so far, and whether or not reforms are required. In the widespread example of the Aaron law, it is open to argument whether Aaron Swartz committed a federal crime by downloading content from JSTOR, a well-known archive for academic documents, on which he had an account. After JSTOR administrators became aware of the downloads in 2011, they blocked them and did not pursue criminal charges. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Fraud and Abuse Act Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/law/1486889-computer-fraud-and-abuse-act
(Computer Fraud and Abuse Act Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/law/1486889-computer-fraud-and-abuse-act.
“Computer Fraud and Abuse Act Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1486889-computer-fraud-and-abuse-act.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Fraud and Abuse Act

Intellectual Property and Cyber Law Issues

These laws are incorporated in the information technology act, 2000.... Each of these rights is protected under the information Technology act of 2000.... Cyber crime A cyber crime is regarded as any crime or offense that violates The Information Technology act 2000.... Consequently, cyber crimes are defined as any form of malpractice that involves tampering with computer based resources, cyber fraud, cyber based intimidation, and computer hackings are some of the major cyber crimes....
8 Pages (2000 words) Essay

Computer laws in US. Computer Fraud and Abuse Act

Crimes such as cyber-stalking, child pornography, fraud and scams, hacking copyright violations, malicious code are some of the computer crimes that are now easily committed because of the internet.... CFAA was modified for the second time in 1994 so as to deal with the act of malicious code such as viruses, worms and other programs designed with an aim of changing or damaging data on the computer (Title 18 U.... The National Information act (NIIA) was enacted in 1996 to protect computer systems against those who access them using other people's authorization....
5 Pages (1250 words) Research Paper

Managing Enterprise Information Integrity

Prominent government policies on information security include the 1986 Computer Fraud and Abuse Act (CFA Act), which is the foundation of most computer and information-related federal laws.... The Computer Fraud and Abuse Act, which was last amended in 2006, helps to deter computer-related acts of unlawful information use, dissemination and access (IT Governance In... The 1996 National Information Infrastructure Protection act amended the 1986 law, increasing penalties for information-related crimes....
4 Pages (1000 words) Case Study

Categories of Computer Crime

rotective Measures in the Prevention and Mitigation of Computer CrimesComputer Fraud and Abuse Act (CFAA)The Computer Fraud and Abuse Act (CFAA) prohibits the distribution of computer code or placement in the market stream if the purpose is to inflict destruction or financial loss.... dentity Theft and Assumption Deterrence act of 1998 (ITADA)The U.... Department of Justice acts against identity theft and fraud cases under the 1998 Identity Theft and Assumption Deterrence act....
2 Pages (500 words) Essay

Sony versus Hotz court case and decision

Sony sued Hotz for allegedly violating the Digital Millenium Copyright Act (DMCA), being involved in decryption of keys, and violating the Computer Fraud and Abuse Act.... The conglomerate is widely known for its manufacture of a wide variety of electronic products.... The PlayStation 3 is one of Sony's key products....
1 Pages (250 words) Article

Criminal laws related to the Internet

Congress and the courts are actively considering the design and implementation of such laws as Computer Fraud and Abuse Act (1984), Electronic Communications Privacy Act, and Children's Online Privacy Protection Act (1988).... There should also be international mediators (countries) that act to resolve international disputes....
1 Pages (250 words) Essay

E-Movements

One of the biggest ethical issues in… To counter such unauthorized access, many laws have been passed, like Computer Fraud and Abuse Act (CFAA), which was designed in 1984, and deals with penalties for the intruders who E-Movements Question Information security is generally defined as the protection of information from a wide variety of threats, such as, gettingaccessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information....
1 Pages (250 words) Research Paper

A Sociological Perspective of Cybercrime

It covers so many illegal activities which included but not limited to cyber bullying, financial fraud, traditional hacking, distribution of pornography, spread of computer viruses, creation of websites for spread of hate and trading in economic secretes.... The term cybercrime is a broad one and is used in reference to crime computer on a computer, some hardware or the internet....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us