Project 2: Congressional Written and Oral Statements

 

Step 6: Computer Crime Comparison Table

Now that you have identified CFAA clones from at least three states, you will compare and contrast them with one another and the CFAA. Be sure to include specific vulnerabilities that the statutes are intended to address regarding computer access. Document your conclusions in the first section of the titled “Statute Comparisons.” This table will aid you in developing your solutions.