Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National Information Infrastructure Protection Act of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $5000 in damage (such as to the integrity of data) were to result.
Other articles related to "computer, protected computer, protected computers":
... The Computer Fraud and Abuse Act, 18 U.S.C. 1030, prohibits the intentional access of a protected computer to obtain information without authorization which causes at least $5,000 damage or loss resulting from a. 1030(a)(5)(A) proscribes the intentional and unauthorized causing of damage to a protected computer resulting from knowingly causing the transmission of a program, information ...
... Terms relating to cyber-terrorism are also redefined, including the term "protected computer," "damage," "conviction," "person," and "loss." Cyberterrorism was dealt with in various ways ... Penalties apply to those who either damage or gain unauthorized access to a protected computer and then commit a number of offenses ... public health or safety, or damage to a governmental computer that is used as a tool to administer justice, national defense or national security ...
... computer crime computer trespass National Information Infrastructure Protection Act ...
... who either damage or gain unauthorized access to a protected computer and thus causes a person an aggregate loss greater than $5,000 adverseley affects someone's ... Section 814 also prohibits any extortion via a protected computer, and not just extortion against a "firm, association, educational institution, financial ... expanded to include attempted illegal use or access of protected computers ...
Famous quotes containing the words computer and/or protected:
“The analogy between the mind and a computer fails for many reasons. The brain is constructed by principles that assure diversity and degeneracy. Unlike a computer, it has no replicative memory. It is historical and value driven. It forms categories by internal criteria and by constraints acting at many scales, not by means of a syntactically constructed program. The world with which the brain interacts is not unequivocally made up of classical categories.”
—Gerald M. Edelman (b. 1928)
“Wasnt marriage, like life, unstimulating and unprofitable and somewhat empty when too well ordered and protected and guarded. Wasnt it finer, more splendid, more nourishing, when it was, like life itself, a mixture of the sordid and the magnificent; of mud and stars; of earth and flowers; of love and hate and laughter and tears and ugliness and beauty and hurt?”
—Edna Ferber (18871968)