Subsection (a)(4) is violated if a person
knowingly and with intent to defraud, accesses a protected computer without authorization or in
excess of authorized access and by means of such conduct obtains anything of value. 18 U.S.C.
§ 1030(a)(4). And a violation of subsection (a)(5)(A) occurs when a person intentionally
accesses a protected computer without authorization and as a result of such conduct causes or
recklessly causes damage.