Our generation now is what they call the "MODERN" generation. As to compare years ago, our technologies are far much better and hi-tech. Cellphones evolved and now have computer-like features, transportation also has its progress and, of course, computers became more powerful. As people produces generations of their kind, and so with computers. However, as computers evolved, people have also developed their abilities to obstruct or intrude computer systems for their own advantage.
Because of this, government implemented laws governing computer use. One is Computer Fraud and Abuse Act. A law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer-related offenses.The Act (codified as 18 U.S.C. § 1030) governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are involved, where the crime itself is interstate in nature, or where computers are used in interstate and foreign commerce.
It was amended in 1988, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. Subsection of the act punishes anyone who not just commits or attempts to commit an offense under the Act, but also those who conspire to do so.
The following are criminal offenses under the Act:
1. Knowingly accessing a computer without authorization in order to obtain national security data
2. Intentionally accessing a computer without authorization to obtain:
o Information contained in a financial record of a financial institution, or contained in a file of a consumer reporting agency on a consumer.
o Information from any department or agency of the United States
o Information from any protected computer if the conduct involves an interstate or foreign communication
3. Intentionally accessing without authorization a government computer and affecting the use of the government's operation of the computer.
4. Knowingly accessing a protected computer with the intent to defraud and there by obtaining anything of value.
5. Knowingly causing the transmission of a program, information, code, or command that causes damage or intentionally accessing a computer without authorization, and as a result of such conduct, causes damage that results in:
o Loss to one or more persons during any one-year period aggregating at least $5,000 in value.
o The modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of one or more individuals.
o Physical injury to any person.
o A threat to public health or safety.
o Damage affecting a government computer system
6. Knowingly and with the intent to defraud, trafficking in a password or similar information through which a computer may be accessed without authorization.
This law underpinned a non-jural law which is moral law because human actions like those mentioned above are unacceptable for all.