12 Dec 2022

153

The Computer Fraud and Abuse Act of 1986 (CFAA)

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 488

Pages: 2

Downloads: 0

Law/Policy Description 

The CFAA (Computer Fraud and Abuse Act) refers to the 1984 cybersecurity bill passed by the Congress as an amendment of the previous computer fraud law. CFAA was part of the significant policy changes dubbed the 1984 Comprehensive Crime Control Act that was aimed at improving the security of private computers from access by hackers or other cyber criminals. The CFAA law forbids or bars individuals from accessing personal computers without permission. However, before the introduction of computer-specific policies, most computer fraud cases were generally prosecuted as wire and mail fraud. The existing applying regulation was considered by many as insufficient in prosecuting criminals, which was the reason Congress drafted the CFAA. 

However, it is important to note that since 1984, the CFAA policies have been expanded several times by the USA PATRIOT ACT in 1989, 1994, 1996, as well as 2001. It was also extended by the Identity Theft Enforcement and Restitution Act in 2003 and 2008, leading to extensions of the provisions and conduct (Mehra, 2010). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Human Behaviors Associated with the Act 

Several human behaviors or activities are associated with the 1984 Computer Fraud and Abuse Act. The initial 1984 CFAA Bill was introduced due to the increasing concern that computer-connected offenders might walkout scot-free, without facing any legal retribution because of the loopholes existing in the constitution at the moment. Some of the behaviors associated with the Act include trespassing in government-owned computers, retrieving national security information, accessing a personal network with intent to defraud, intentionally damaging by knowing transfer or transmission, and many others (Doyle, 2010). 

Behaviors the Example is Attempting to Support or Change 

The House of Committee Report during the drafting of the bills was mainly intended to respond to the first computer crime bill drafted in the wake of the 1983 techno-thriller movie WarGames , whereby an innovative and highly skilled Broderick Mathew is depicted breaking into a highly secured U.S. military workstation or supercomputer preset to forecast the potential results of nuclear war. Broderick unwittingly almost triggers the Third World War. The film was used as a realistic representation of the access capabilities and automatic dialing abilities of personal computers. Therefore, the Computer Fraud and Abuse Act was, and is still, necessarily intended to change any hacking offenses and other illegal cybercrime behaviors (Doyle, 2010). 

Behaviors the Act Actually Enforces 

As such, the CFAA primarily attempts to enforce specific desired behaviors among American citizens concerning the privacy of personal computers. Firstly, citizens should learn to access or obtain information from personal computers by seeking permission. Citizens should also act responsibly by avoiding trespassing or retrieving data from government-owned databases without authorization as well as negligently causing damage and loss personal computer and information. 

Side Effects of the Act 

According to Jarrett & Bailie (2010), the introduction of cybercrime laws like the CFAA has significantly reduced computer-related criminal cases in the country. The bill introduced harsh penalties, which has subsequently scared off offenders. For example, for just obtaining national security information without permission, a criminal can serve up to 10 years in prison. 

References 

Doyle, C. (2010). Cybercrime: An overview of the Federal Computer Fraud and Abuse Statute and related federal criminal laws. Congressional Research Service. DIANE Publishing. 

Jarrett, H. M., & Bailie, M. W. (2010).  Prosecution of Computer justice.gov . Office of Legal Education Executive Office for United States Attorneys . 

Mehra, S. K. (2010). Law and cybersecurity in the United States today. The American Journal of Comparative Law, 58, 659-685. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). The Computer Fraud and Abuse Act of 1986 (CFAA).
https://studybounty.com/the-computer-fraud-and-abuse-act-of-1986-cfaa-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 441

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 117

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration