Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National Information Infrastructure Protection Act of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $5000 in damage (such as to the integrity of data) were to result.
Other articles related to "protected computer, computer, protected computers":
... computer crime computer trespass National Information Infrastructure Protection Act ...
... The Computer Fraud and Abuse Act, 18 U.S.C ... § 1030, prohibits the intentional access of a protected computer to obtain information without authorization which causes at least $5,000 damage or loss resulting from a single unauthorized access ... proscribes the intentional and unauthorized causing of damage to a protected computer resulting from knowingly causing the transmission of a program, information, code, or command ...
... relating to cyber-terrorism are also redefined, including the term "protected computer," "damage," "conviction," "person," and "loss." Cyberterrorism was dealt with in various ways ... who either damage or gain unauthorized access to a protected computer and then commit a number of offenses ... to public health or safety, or damage to a governmental computer that is used as a tool to administer justice, national defense or national security ...
... punishments apply to those who either damage or gain unauthorized access to a protected computer and thus causes a person an aggregate loss greater than $5,000 adverseley affects someone's ... Section 814 also prohibits any extortion via a protected computer, and not just extortion against a "firm, association, educational institution, financial institution, government entity, or other legal entity" ... were expanded to include attempted illegal use or access of protected computers ...
Famous quotes containing the words computer and/or protected:
“The Buddha, the Godhead, resides quite as comfortably in the circuits of a digital computer or the gears of a cycle transmission as he does at the top of a mountain or in the petals of a flower.”
—Robert M. Pirsig (b. 1928)
“The rights and interests of the laboring man will be protected and cared for, not by the labor agitators, but by the Christian men to whom God in His infinite wisdom has given control of the property interests of the country.”
—George Baer (18421914)