18 USC § 1030 Computer Fraud and Abuse Act

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Computer Fraud and Abuse Act (CFAA) Preventing the Destruction of eDocuments Team 8 – Jason Conrad, Ben Sweeney, Jeff Woodward.
United States v. Nosal. The Nosal Fact Pattern Korn/Ferry computer Confidential information and trade secrets Authorized access by users logging in with.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Boyertown Area School District Acceptable Use Policy.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
INTERNET and CODE OF CONDUCT
Nicholas Beckworth Annie Billings Steven Blair Nimmida Kulwattanasopon Thomas Wootten.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Security Services Constitutional Issues in Private Security.
General Awareness Training
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Spam and The Computer Fraud and Abuse Act Richard Warner.
An Educational Computer Based Training Program CBTCBT.
Computer Crime Confucius say: "Cracker who gets busted doing one of these crimes, will spend long time in jail house soup."
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Federal Courts There are two separate court systems in the United States: 1) Federal and 2) State *Most cases heard in court are heard in State courts.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
LAW OF COMPUTER TECHNOLOGY FALL 2015 © 2015 MICHAEL I. SHAMOS Regulatory Law Michael I. Shamos, Ph.D., J.D. Institute for Software Research School of.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
INTERNET SAFETY.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Acceptable Use Policy.
Using the computer appropriately
Chapter 9: Internet Law, Social Media, and Privacy
Ogletree, Deakins, Nash, Smoak & Stewart PC
Hacking: public policy
Fundamentals of business law, 10e
Protection of CONSUMER information
Chapter 10 Cyberlaw, Social Media, and Privacy
The Criminal Law And Business
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
LAUSD Responsible Use Policy (RUP)
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Update on the Computer Fraud and Abuse Act
Knowingly access without authorization
Computer Programming I
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Laws Against Computer Hacking
Presentation transcript:

18 USC § 1030 Computer Fraud and Abuse Act

CFAA Enacted in 1986 to separate and expand computer crime laws from the more general Comprehensive Crime Control Act Amended in 1989, 1994, 1996, 2001, 2002, and 2008 Intent: criminalize hacking? Limit federal jurisdiction to gov’t/financial computers and “interstate communication” In practice: applies to almost any internet-connected computer, including smartphones

Letter of the law or spirit? “Whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer;” “…knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;” “…intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage;” “…intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss”

Protected computers “the term “protected computer” means a computer— (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or (B) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States;

MBTA v. Anderson et al. 2008 case against 4 MIT students who were planning to present at DEFCON a vulnerability they had found in the MBTA (Boston’s “BART”) chip card system (Boston’s “Clipper Card”) MBTA claimed that the students “transmitted programs to cause damage to (or attempted to transmit and damage) MBTA computers” by publishing their research through DEFCON Kind of undermined this argument by posting the students’ slides on the district court’s public website as exhibits part of the case

Facebook v. Power Ventures 2009 case against Power Ventures, which aggregated data from social media feeds with user consent The case is pending; Facebook has claims under CFAA, DMCA, Unfair Competition, Trademark, and others Is “scraping” a website making an unauthorized copy? Can Facebook’s ToS prohibit anyone other than you from logging into your account, regardless of your permission? Can we investigate potentially discriminatory practices on Facebook (or other platforms) without violating their ToSes?

Craigslist vs. 3Taps and PadMapper 2013 case in which Craigslist claimed that 3Taps (and by extension PadMapper) violated CFAA by scraping through proxies after IP block If I send you a letter saying “you are not permitted to visit allisonberke.com” and you visit it anyway, you have committed a felony

Sergei Aleynikov 2009 case of Goldman Sachs trader charged with downloading high-frequency trading code he had written while at Goldman Is it illegal to keep a copy of work you produce for your employer (even after you leave that employer)? Should it be?

Case law Current employees cannot be prosecuted under CFAA simply for violating their employer’s computer use policy Violating a website’s terms of service is not on its own supposed to be a violation of CFAA (in practice this is not settled)

Three Felonies a Day – Harvey Silverglate Destroying evidence (obstruction of justice if the company or individual is under investigation) Downloading copyrighted works (ebooks, TV episodes, movies) Giving false statements to a federal official Creating a website for an organization that then links on that website to terrorist speech Telling customers of your former employer about a security vulnerability on that employer’s computer systems