Cyber Law: What You Need to Know

As the digital landscape rapidly evolved, new legislation and regulations were needed to protect the rights and interests of individuals and organizations going online and to promote the secure and responsible use of the technology that enables electronic communications. Today, cyber law addresses a wide range of issues, from privacy and intellectual property to cybersecurity and freedom of expression in the digital age.

Cyber Law - A Gavel on a Laptop

Why Did Cyber Law Become Necessary?

As technology and electronic communications developed, it became clear that the legal framework existing at the dawn of the digital age would not be adequate to ensure a secure, fair, and inclusive internet for all users. The laws, regulations and legal precedents that encompass what is now called cyber law seek to address:

Types of Cybercrime Addressed by Cyber Law

While the internet and other digital forms of communication have been beneficial in many ways, their emergence also offered criminals multiple new avenues for targeting and defrauding unsuspecting individuals, businesses, and organizations. Thus a significant percentage of the statutes and regulations related to cyber law address these various cybercrimes, including:

Key U.S. Cyber Law Statutes

In the United States, multiple federal statutes have been enacted to address cybercrimes and a wide range of cyber-related activities, from computer hacking and fraud to online harassment and intellectual property theft. Some of these key laws Include:

Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030)

Enacted in 1986 as an amendment to the first federal computer fraud law, the CFAA initially addressed hacking but has since been amended multiple times to address a broader range of conduct. The Act prohibits intentionally accessing a computer without authorization or in excess of authorization. However, because the CFAA fails to define precisely what "without authorization" means, civil libertarians assert that it could be used to criminalize nearly every aspect of computer activity, even those that most people consider innocuous.

Identity Theft and Assumption Deterrence Act (18 U.S.C. § 1028)

Enacted in 1998, the Identity Theft and Assumption Deterrence Act prohibits anyone from misusing another person's identifying information, whether personal or financial, including:

In 2004, the Act was amended to establish the offense of aggravated identity theft, which involves using another's information in connection with certain federal crimes or in relation to an act of terrorism.

Digital Millennium Copyright Act (DMCA)

Passed in 1998, the DMCA amended U.S. copyright law to address the relationship between copyright and the internet by:

  1. Establishing protections for online service providers in the event their users engage in copyright infringement.
  2. Encouraging copyright owners to give greater access to their works in digital formats by providing them with legal protections against unauthorized access.
  3. Making it unlawful to provide false copyright management information or to remove or alter that type of information in certain circumstances.

Child Online Privacy Protection Act (COPPA)

COPPA aims to protect the privacy of children under the age of 13 by requiring that website owners: