Verified Document

Problems With The The Computer Fraud And Abuse Act Term Paper

Computer Fraud and Abuse Act A failed and flawed law

Technology has changed faster than the laws that exist to protect the public. Protecting information, particularly sensitive government information, was thought to be challenging and to pose additional dilemmas in terms of its regulation. With this in mind, Congress passed the Computer Fraud and Abuse Act in 1984. The CFAA "outlaws conduct that victimizes computer systems. It is a cyber-security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud" (Doyle 2014:1-2). The CFAA's provisions ban the trespassing of data; the damaging of or use of threats to damage data; or trafficking in the passwords and other sensitive data of a wide range of computers containing protected information (Doyle 2014:1-2).

The law was passed during the pre-Internet era "as a narrow statute enacted for the reasonable goal of combating malicious hackers: people who break into computer systems and steal valuable data (like credit-card numbers) or do real economic damage" (Wu 2013). However, because of the vague wording of the law, it has been increasingly deployed by prosecutors in a much wider range of cases in a manner that makes many legal scholars profoundly uncomfortable (Wu 2013). "Over the years, Congress expanded the statute five times, adding private rights of action and making misdemeanors into felonies. Both private litigants and the Justice Department began to use the law against not only hackers but also otherwise legitimate users who violate the 'terms of service policies that come with nearly every piece of software and service we use on computers today" (Wu 2013). Thus, the original intention and spirt of the law has been violated and needless amounts of time and energy...

Thus the law does not "criminalize acts in which the offending employee merely 'exceeds authorized access to computers in his own department'" (Doyle 2014: 4). The law is limited in scope to those who are not entitled to access government computers or who engage in interdepartmental trespass. But other concerns have arisen regarding outside unauthorized use that may technically violate 'terms of service' agreements (which arguably are written in such a lengthy and confusing manner they are impossible for a user to truly agree to when he or she clicks a button). For example, Aaron Swartz was threatened with thirty-five years in prison because of violating terms-of-service by downloading too many academic articles as an authorized guest on the MIT network (Wu 2013). Swartz, terrified in the face of the upcoming prosecution, committed suicide as a result.
Inadequacies

The law has been heavily criticized by a number of groups, including civil libertarian organizations. The notion of "without authorization" is not clearly defined and while the statute does define "exceeds authorized access," there is concern that "the meaning of that phrase has been subject to considerable dispute" in the courts and is not consistently enforced ("The Computer Fraud and Abuse Act reform," 2014). The law has also been criticized for excessively harsh penalties. "Compounding this problem is the CFAA's disproportionately harsh penalty scheme. Even first-time offenses for accessing a protected computer without sufficient 'authorization' can be punishable by up to five years…

Sources used in this document:
References

Computer Fraud And Abuse Act Reform. (2014). EFF. Retrieved from:

https://www.eff.org/issues/cfaa

Doyle, C. (2014). Cybercrime: An overview of the Federal Computer Fraud and Abuse Statute and related federal criminal laws. Retrieved from:

http://www.fas.org/sgp/crs/misc/97-1025.pdf
http://www.newyorker.com/news/news-desk/fixing-the-worst-law-in-technology
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Fraud and Abuse Act
Words: 2541 Length: 7 Document Type: Term Paper

Computer Fraud and Abuse Act Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to

Computer Crimes With Emphasis on Child Pornography
Words: 1221 Length: 4 Document Type: Term Paper

Computer Crime As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals. Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals and schools to corporate businesses and government agencies. In this day and age, it seems as though

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Computer Surveillance: Qualitative Attempt to
Words: 4976 Length: 19 Document Type: Term Paper

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

Mortgage Fraud
Words: 13949 Length: 38 Document Type: Term Paper

Mortgage Fraud If a rash of armed bank robberies swept across America next year, and if in these robberies criminals absconded with $30 billion dollars, one may be certain that a public panic would ensue. The banking system would likely be changed forever. If thousands of armed thugs went rampaging across the nation forcing people out of their homes, into the streets, and then destroying the properties, leaving the occupants homeless

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now