Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,628,385 papers from all fields of science
Search
Sign In
Create Free Account
Protected computer
Known as:
18 U.S.C. § 1030
, Federal interest computer
Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Computer Fraud and Abuse Act
Cybercrime
National Information Infrastructure Protection Act
United States v. Ancheta
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Involving Family Members of People with Dementia in the Music Therapy Process at a Residential Care Facility
P. Dennis
2012
Corpus ID: 73191756
The therapeutic use of music with older adults with dementia is widely documented, and family involvement is encouraged in both…
Expand
Review
2012
Review
2012
The CARD Act on Campus
J. Hawkins
2012
Corpus ID: 150916317
In February 2010, the Credit Card Accountability, Responsibility, and Disclosure (“CARD”) Act intervened in student credit card…
Expand
2010
2010
The Establishment of the Melkite Catholic Millet in 1848 and the Politics of Identity in Tanzimat Syria
Bruce Masters
2010
Corpus ID: 130827888
In 1848, Sultan Abdulmecid granted the Melkite Catholic community official status as an "autonomous religious community" ( millet…
Expand
2009
2009
Vagueness Challenges to the Computer Fraud and Abuse Act
Orin S. Kerr
2009
Corpus ID: 153826396
This Article argues that the void for vagueness doctrine requires courts to adopt narrow interpretations of the Computer Fraud…
Expand
2009
2009
Antitrust Oversight of an Antitrust Dispute: An Institutional Perspective on the Net Neutrality Debate
Jonathan E. Nuechterlein
Journal on Telecommunications and High Technology…
2009
Corpus ID: 34128701
Several years after its first appearance in the telecommunications lexicon, the term “net neutrality” remains elusive, in part…
Expand
2007
2007
Who Owns 'Hillary.Com'? Political Speech and the First Amendment in Cyberspace
Jacqueline D. Lipton
2007
Corpus ID: 153124001
In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to…
Expand
2005
2005
Confusion is the Key: A Trademark Law Analysis of Keyword Banner Advertising
K. M. Saunders
2005
Corpus ID: 153971076
Keyword banner advertising is a form of targeted online marketing practice whereby a banner ad is displayed on a search engine…
Expand
2005
2005
Making Spectrum Reform "Thinkable"
James B. Speta
Journal on Telecommunications and High Technology…
2005
Corpus ID: 21607648
INTRODUCTION 183 I. THE SPECTRUM REFORM IDEA HAS ITS TIME COME? ..... 188 II. THE CURRENT AGENDA FOR TELECOMMUNICATIONS REFORM…
Expand
Review
2003
Review
2003
A Survey of Cybercrime in the United States
A. Burstein
2003
Corpus ID: 151104315
Several commentators have questioned whether cyberlaw is a meaningful category within law. 1 Few areas of law, these critics…
Expand
2000
2000
Protected Petitioning or Unlawful Retaliation? The Limits of First Amendment Immunity for Lawsuits Under the Fair Housing Act
David Godschalk
2000
Corpus ID: 141772994
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE