1. The chosen law and its impact on society The law on fraud and related activities connected with computers has helped in the reduction of the cyber-related crimes because it has been greatly applicable in the court processes to prosecute the violators. There have been many cases where the cyber criminals have been hacking into computer systems of corporations and governments and stealing or damaging the information system. Those criminals have to be prosecuted and judged according to the law Moussa Sissoko Hotspur Jersey , and this particular law has been applicable in cases where computer frauds have been experienced in the United States. It has also helped to prosecute the person that discloses information to unauthorized parties without the knowledge of the related organizations or the government. That has helped to protect companies in the United States from the disclosure of their information and the usage of the same in a way that is likely to impact negatively such an institution. The disclosure of sensitive information can have a negative impact on an organization including the tainting of its image that has a serious consequence of for instance the loss of its customers. When there is a law in place that protects those organizations from the disclosure of their sensitive information, it makes the people with an evil intention to fear because they know that their actions will culminate to serious consequences due to the penalties accompanying the violation of that law. The law places the accountability on the side of the actual perpetrators instead of involving others that may be innocent in light of the committed crime. It has also helped to counteract the defrauding of traffic of information through which computers are being accessed, hence resulting in successful communications and reduced disruptions. 2. The penalties and fines that exist for offenders of the selected law The violators of this law are liable to fines and imprisonment terms between 5 and ten years depending on the type of crime committed under the various sections of this particular law. The fines range from $250 Mousa Dembele Hotspur Jersey ,000 and $500,000 for organizations. In case the damage exceeds $5,000 or other qualifying circumstances Michel Vorm Hotspur Jersey , the victims may claim compensations for a civil cause of action for the damages caused under the subsection 1030. Also, in case there is any property or facilities used to accomplish the offenses described in the various paragraphs of the subsection 1030 of this law, those facilities or properties are subject to confiscation. The offenders may also be ordered to pay restitution. 2.1. Articles and judicial cases that provide details on how this law was exercised and realized convictions There are cases where this law has been applied in the prosecution and judging of the offenders. For example Kyle Walker Hotspur Jersey , this law was used to indict an Internet Activist known as Aaron Swartz after he allegedly downloaded academic papers from the MIT campus. The Justice Department Found him guilty of computer fraud that is, using the computer to disclose or steal information without authorization under the Computer Fraud Act. He was threatened with an up to 50 years imprisonment. The law was also used to convict a journalist known as Mathew Keys due to felony hacking charges. The offender has deployed from GFOX-40 Company and after that, he disclosed the username and the password for a server that was owned by Tribune Company Kieran Trippier Hotspur Jersey , a parent company to the Fox-40. He encouraged the members to use those credentials and access the victim company. He was sentenced to 25 years of imprisonment after it was discovered that a hacker used the information he disclosed to alter the LA Times News story that had serious consequences. 鈥?br > 3. Analyze the effectiveness of the law at convicting offenders to determine any modifications that should be made to the law. The critics claim that the law is not as elaborate as to cover more crimes involving computer crime. It opens loopholes for the criminal to get scot free due to the lack of coverage of some specific types of unauthorized access to computer or information systems (Kerr, 2010). The law provides for the activities that entail unauthorized access to the information systems and stealing or disclosing information to unauthorized persons. The law covers almost every activity of computer fraud and the related activities. That makes it cover even the activities that do not directly involve the use of the computer to commit fraud. It also covers the unlawful use of the disclosed information so as or ensure that all participants, whether indirect or direct Kevin Wimmer Hotspur Jersey , are brought to book. 4. Change or ratification of the law and how changes will impact society and those convicted of the crime. The law has been criticized in several cases because of its unfairness in incorporating even the people that have no direct involvement in a given crime and its narrowness that makes it not to cover all computer fraud crimes. The law should be strengthened further so as to for instance increase the maximum sentence for crimes involving hacking and also expand the definition of unauthorized access (Davik, 2004). That will make sure that unauthorized access even to the personal information systems or portals is included. It will make the proper to be responsible and to respect the privacy of information of other individuals, organizations and the government. The other modification is to remove the clause that leads to the prosecution of the people that use information availed freely to the public by the owners. That will also put the responsibility of safeguarding information in the hands of the owners Josh Onomah Hotspur Jersey , not only the judicial system. 5. Summarize the challenges the prosecution faced in a trial from your research and whether you believe they could have handled the challenges differently. In the first case involving Swartz, the court did not h