We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is a Protected Computer?

Mary McMahon
By
Updated: May 16, 2024

A protected computer is a computer vital to the interests of the United States government. Lawmakers have established special legal provisions for such computers, resulting in harsher penalties for unauthorized access or data destruction when a protected computer is involved. The Computer Fraud and Abuse Act, revised several times since its introduction in 1986, discusses computers in this class. Several other laws addressing fraud and security concerns also discuss protected computers.

Computers used for important government business, including the storage and transmission of secure information, are protected computers. Likewise with computers involved in interstate or foreign commerce, including those operated by financial institutions. Computers overseas can be protected under the law if they meet the qualifications, allowing the United States government to pursue harsh penalties when overseas hacking compromises security or damages data.

Simply gaining unauthorized access to a protected computer, even without doing anything, is a crime under the law. If a hacker removes or damages data, the penalties are more severe, varying based on the amount of data involved and the level of security. A person who knowingly introduces malware to a protected computer can also be severely punished under the law, especially if the malicious software damages the integrity of the data. Some of these crimes may be considered felonies when the value of the data is high.

If a computer qualifies as a special computer, it may be held in a secure facility where physical access is limited with the goal of protecting the information it contains. Access codes and layers of security can also restrict access within the computer itself. A protected computer can also be set up with limited network connections. If there is no need to connect to the Internet, it can be left on a local network only. Internet connections are secured to limit the possibility of intrusion and unauthorized access, as well as to control the release of information over the Internet.

Cybercrime is a topic of concern to many governments, and in addition to the United States, a number of nations have laws specifically covering computers used for government business. Compromises to these computers could pose a national security threat or interfere with economic activity. Information technology personnel use a number of measures to secure government computers and make them difficult for hackers to attack. The added penalties for hacks of government computers are intended to create an extra layer of security by acting as a deterrent.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.