The act works in tiers, so each act has more severe consequences than the last.
For example,
unauthorised modification of material has worse consequences than basic unauthorised access to data.
Before 1990, there was no protection against data theft or modification, meaning there was nothing that could be done
to punish cyber criminals.
This act helped to fight it by giving the means to prosecute those who comitted such acts.
Click the image above to learn more.
The idea behind allowing these organisations to intercept and monitor comunications is to achieve the following: