Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National Information Infrastructure Protection Act of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $5000 in damage (such as to the integrity of data) were to result.
Other articles related to "protected computer, computer, protected computers":
... cyber-terrorism are also redefined, including the term "protected computer," "damage," "conviction," "person," and "loss." Cyberterrorism was dealt with in various ways ... who either damage or gain unauthorized access to a protected computer and then commit a number of offenses ... or safety, or damage to a governmental computer that is used as a tool to administer justice, national defense or national security ...
... computer crime computer trespass National Information Infrastructure Protection Act ...
... The Computer Fraud and Abuse Act, 18 U.S.C. 1030, prohibits the intentional access of a protected computer to obtain information without authorization which causes at least $5,000 damage or loss. 1030(a)(5)(A) proscribes the intentional and unauthorized causing of damage to a protected computer resulting from knowingly causing the transmission of a program ...
... that punishments apply to those who either damage or gain unauthorized access to a protected computer and thus causes a person an aggregate loss greater than $5,000 adverseley affects someone's medical ... Section 814 also prohibits any extortion via a protected computer, and not just extortion against a "firm, association, educational institution, financial institution, government ... Punishments were expanded to include attempted illegal use or access of protected computers ...
Famous quotes containing the words computer and/or protected:
“Family life is not a computer program that runs on its own; it needs continual input from everyone.”
—Neil Kurshan (20th century)
“Guns have metamorphosed into cameras in this earnest comedy, the ecology safari, because nature has ceased to be what it always had beenwhat people needed protection from. Now nature tamed, endangered, mortalneeds to be protected from people.”
—Susan Sontag (b. 1933)