The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair Competitors and Disgruntled Employees/In-House Defense Quarterly/In-House Defense Quarterly


The innovative spark and drive that has brought a bountiful return to many in the course of the information and technological

age in which we live has not been limited

to those pioneering new approaches. Unfortunately, it has also filtered down to those who would, if left to their devices, secretly harvest the fruits of others’ labors and creativity. In 1984, to combat what was described as a “growing wave of computer crime,” Congress passed what was called “The Counterfeit Access Device and Computer

Fraud and Abuse Act.” This article explains the Act and its reaches.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Williams Kastner | Attorney Advertising

Written by:


Williams Kastner on:

Popular Topics
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.