-
Courts in the UK tried to use this act as justification to arrest two hackers in 1986 who illegally accessed computer systems, but it was overturned as hacking did not fit the act's definition of forgery,
-
Updated criminal offenses to include the definitions of computers and networking devices.
-
Punishes hackers ho knowingly accessing a computer without authorization, was revised multiple times in order to keep up ith technological advancements
-
A center created during the outbreak of the morris worm that attempts to provide information on computer and security problems,
-
The supreme court rules that Title 18 of the United States Penal Code could be extended from wire tapping to hacking, allowing FBI agents to target hacker and phreaker groups.
-
After the Morris Worm was released, the act now covers the indirect ways of breaching computer security.
-
Criminalizes the production and dismantling of technology or services used to protect copyrighted works.
-
Enforces stricter policies on how companies store data of their customers to keep them safe from hackers.
-
This law is very broad, and outlaws all tools a hacker is capable of using in order to perform malicious acts.
-
Gave the amendment more power to determine what illegal activity online.