Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Anthropology (1)
- Computer Law (1)
- Computer Sciences (1)
- Contracts (1)
- Criminal Law (1)
-
- Databases and Information Systems (1)
- Economics (1)
- Information Security (1)
- Intellectual Property Law (1)
- Law and Economics (1)
- Physical Sciences and Mathematics (1)
- Political Economy (1)
- Property Law and Real Estate (1)
- Rule of Law (1)
- Science and Technology Studies (1)
- Social and Behavioral Sciences (1)
- Social and Cultural Anthropology (1)
- Sociology (1)
- Theory, Knowledge and Science (1)
Articles 1 - 2 of 2
Full-Text Articles in Law
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Articles
Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.
At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …
Rights Of Access And The Shape Of The Internet, Michael J. Madison
Rights Of Access And The Shape Of The Internet, Michael J. Madison
Articles
This Article reviews recent developments in the law of access to information, that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …