Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

CFAA

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 31 - 35 of 35

Full-Text Articles in Law

Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban Mar 2011

Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban

William & Mary Law Review

No abstract provided.


The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie Jun 2009

The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie

John M Ivancie Jr.

This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …


Rights Of Access And The Shape Of The Internet , Michael J. Madison Feb 2003

Rights Of Access And The Shape Of The Internet , Michael J. Madison

Michael J. Madison

This Article reviews recent developments in the law of "access" to "information," that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …


Rights Of Access And The Shape Of The Internet, Michael J. Madison Jan 2003

Rights Of Access And The Shape Of The Internet, Michael J. Madison

Articles

This Article reviews recent developments in the law of access to information, that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …


The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky Jan 2000

The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky

Richmond Journal of Law & Technology

The "interruption of computer services to authorized users," involves a violation of a series of federal and state computer-related crime laws which are designed to protect the authorized users of computer systems.Because most of these laws have only recently been legislated, and since few people have ever actually been charged with such violations, there is very little history or case law in this area. However, as computer-related crimes continue to escalate, these statutes could prove to be a positive force in efforts to catch the electronic criminals of the future. "Although there has never been accurate nationwide reporting of computer …