Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

SelectedWorks

CFAA

Articles 1 - 2 of 2

Full-Text Articles in Law

Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin May 2011

Hey! You! Get Off Of My Cloud: Defining And Protecting The Metes And Bounds Of Privacy, Security, And Property In Cloud Computing, Timothy D. Martin

Timothy D Martin

Cloud computing is a growing force in today’s interconnected technological world. It allows people and organizations to purchase computing power and resources on an as-needed, pay-as-you-go basis. Users can employ it to satisfy modest needs, such as simple word-processing tasks, or to create large-scale enterprise applications delivered on the web. But cloud computing raises questions of functionality, security, confidentiality, ethics, enforcement, and data ownership. The lack of a clear body of law defining and regulating law enforcement’s access to electronic data and ability to prosecute related crimes creates other risks and erodes confidence in cloud computing. This paper begins with …


The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie Jun 2009

The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie

John M Ivancie Jr.

This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …