What are the Prohibited Acts according to the Computer Fraud and Abuse Act of 1984 ("CFAA")?
The CFAA prohibits:
• Computer trespassing, for example, hacking, in a government computer.
• Computer trespassing that exposes certain government, credit, financial, or computer-housed information.
• Damaging a government computer, a bank computer, or a computer used in, or affecting, interstate or foreign commerce. Examples of this type of damage include:
• various malware types, including worms, viruses, trojan horses, or time bombs;
• DoS attacks;
• other forms of malware or cyberattacks; and
• cybercrime or cyber terrorism.
• Committing fraud that involves unauthorized access to a protected computer.
• Threatening to damage a protected computer.
• Trafficking in passwords for a government computer or password trafficking that affects interstate or foreign commerce.
• Accessing a computer to commit espionage.
It is also a crime to attempt or conspire to commit any of these acts.
For more information, see here: https://www.congress.gov/bill/98th-congress/senate-bill/2864
These materials were obtained directly from the Federal Government public websites and are posted here for your review and reference only. No Claim to Original U.S. Government Works. This may not be the most recent version. The U.S. Government may have more current information. We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to. Please check the linked sources directly.