Computer Fraud and Abuse Act of 1986
The Computer Fraud and Abuse Act was passed by the United States Congress in 1986, with the intent to decrease cracking of computer systems and to address federal computer-related offenses. The Act
governs cases with federal interest, where computers of
the federal government or certain financial institutions are involved, or where computers are
used in interstate and foreign commerce.
Basically what The Computer Fraud and Abuse Act is saying if you abuse your computer privilege by cracking into some one's computer to harm it in any way it is a crime. Depending on how much damage you do by hacking into some one's personal information determines the amount of trouble you get into. In other words, use a computer and Internet service as it was created to do and you wont get into any trouble.
Here are some of the "Rules" I found researching this Act:
- Knowingly accessing a computer without authorization in order to obtain national security data
- Intentionally accessing a computer without authorization to obtain:
- Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer;
- Information from any department or agency of the United States; or
- Information from any protected computer.
- Intentionally accessing without authorization a government computer and affecting the use of the government's operation of the computer.
- Knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value.
- Knowingly causing the transmission of a program, information, code,
or command that causes damage or intentionally accessing a computer
without authorization, and as a result of such conduct, causes damage
that results in:
- Loss to one or more persons during any one-year period aggregating at least $5,000 in value.
- The modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of one or more individuals.
- Physical injury to any person.
- A threat to public health or safety.
- Damage affecting a government computer system
- Knowingly and with the intent to defraud, trafficking in a password or similar information through which a computer may be accessed without authorization.