Blog Posts Tagged with "Computer Fraud and Abuse Act"
CFAA Does Not Bar Misappropriation when Employee Authorized
September 27, 2012 Added by:David Navetta
The CFAA only permits claims for accessing a protected computer “without authorization” and “exceeds authorized access” “only when an individual accesses a computer without permission or obtains or alters information on a computer beyond that which he is authorized to access...”
Comments (0)
Ninth Circuit Narrows Computer Fraud and Abuse Act Reach
May 07, 2012 Added by:David Navetta
The crux is the recent application of the Computer Fraud and Abuse Act criminalizing violations of website terms of use and employer restrictions on employee computer uses, stemming in particular from what the statute’s term “exceeds authorized access” does and does not mean...
Comments (0)
EFF's 2011 in Review: Hacking Laws
December 31, 2011 Added by:Electronic Frontier Foundation
2011 has been a landmark year for prosecutions under the Computer Fraud and Abuse Act (CFAA), with the feds pursuing aggressive, high-profile cases against members of Anonymous and LulzSec, as well as open access advocate Aaron Swartz...
Comments (0)
Use of Facebook at Work Does Not Violate the CFAA
May 24, 2011 Added by:David Navetta
Frankly, had the court held otherwise virtually every employee with computer access around the country – or rather, at least within the Middle District of Florida - would have been subject to a CFAA counterclaim if fired and thereafter attempting to sue in response...
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps