Faking It: Calculating Loss in Computer Crime Sentencing Jennifer S. Granick, Esq. Stanford Law School Center for Internet and Society

Slides:



Advertisements
Similar presentations
Forensic Victimology 2nd Edition Chapter Fifteen: Forensic Victimology and Civil Remedy in Premises Liability Cases.
Advertisements

Criminal Law Chapter 5.
Criminal Justice Today
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
A TRAINER, IN THE ABSENCE OF SUBSTANTIAL EVIDENCE TO THE CONTRARY, IS RESPONSIBLE FOR THE CONDITION OF EACH HORSE HE ENTERS IN A RACE. A TRAINER SHALL.
Types of Laws video video CRIMINAL LAW CIVIL LAW.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Types of Violent Crime:. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2 Copyright.
MINNESOTA MALTREATMENT LAWS Sexual abuse Neglect Mental injury Physical abuse.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Assessment. 1. Health and Safety at Work Law states which of the following: 1.You have a right to a safe workplace 2.Your employer must keep you safe.
Criminal Forensic Psychiatry Principles and Practices Law of Crimes Forensic Questions Forensic Assessment Treatment Court Movement San Mateo Pathways.
Criminal Forensic Psychiatry ACGME Requirement Treatment Court Competency to Stand Trial Forensic Report 1.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
*Most law deals with civil law instead of criminal law *The primary goal of civil law is not to punish but to protect people by helping them avoid problems.
 A body of rights, obligations, and remedies that is applied by courts in civil proceedings to provide relief for persons who have suffered harm from.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
General Awareness Training
AIRCRAFT ACCIDENT INVESTIGATION FOR FIRST RESPONDERS WHY DO WE DO THIS? WHO SAYS SO?
Spam and The Computer Fraud and Abuse Act Richard Warner.
Intentional Torts Law in Action – Ch. 15.
Business Law. Your neighbor Shana is using a multipurpose woodcutting machine in her basement hobby shop. Suddenly, because of a defect in the two-year.
Civil Law Security Services. Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
Sutton Public Schools Anti-Bullying Law Overview.
Introduction to Criminal Justice
 Four sources of law: Constitutions Statutes Case law Administrative regulations  Main types of laws include: Civil law Criminal law.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART What Is a Crime? Section 3.1.
Legal Aid of Cambodia Bangkok, August 2015 Mr. RUN Saray Executiva Director and Lawyer Legal Aid of Cambodia V ICTIM ’ S REMEDIESPresented.
Chapter 9 Enhancing Information/Computer Security.
CHAPTER THREE 3-1 TORT LAW. TORT LAW IS BASED ON THE IDEA THAT EVERYONE IN OUR SOCIETY HAS CERTAIN RIGHTS Along With Having Certain Rights, Everyone Has.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
 Discussion  Any inappropriate, unwanted, or cruel behavior (verbal or physical) that targets a person or group of people.  Can you think of examples.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
CRIMES Used by permission. For Educational purposes only.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
 Understand the four elements of the tort of negligence  Understand the reasonable person standard  Understand how foreseeability (ability to anticipate.
 Crime – _______________________________ _______________________________________  Elements of a Crime: › A duty to do or not to do a certain thing ›
TYPES OF LAW. CIVIL LAW Civil Law deals with wrongs against a group or individual. The harmed individual becomes the plaintiff in a civil law suit and.
Torts Chapter 6. Basis of Tort Law What is a Tort? –A tort is a civil injury designed to provide a remedy (damages) for injury to a protected interest.
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
Unit 2 Chapter 5 Legal Environments of Business (LEB)
Purpose of Sentencing. Denunciation  express society’s disapproval of the offence.  “Send a message”  the action is against the law and the values.
SENTENCING AND CORRECTIONS CHAPTER 15 PAGES
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
U.S. JUSTICE Defining & Classifying Crime & Criminals.
Crime-Tort Jeopardy Business Related Crimes Elements of a Crime Classify Defenses Elements of a Tort Types of Torts Civil Procedure $100100$100100$100100$100100$100100$100100$
THE AIMS OF PUNISHMENT AND PRINCIPLES OF SENTENCING 1 Lady Justice Hallett DBE and Dame Linda Dobbs DBE.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Bosnia & Herzegovina Statistical Training
Crimes Against Persons
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Update on the Computer Fraud and Abuse Act
CRJ 306 Competitive Success/snaptutorial.com
CRJ 306 Education for Service-- snaptutorial.com.
CRJ 306 Teaching Effectively-- snaptutorial.com
Confidential Records and Protected Disclosures
Warm Up: 1/27/15 GOOD MORNING!
Section 3.1.
CRJ 306 OUTLET Experience Tradition/crj306outlet.com
Forensic and Investigative Accounting
Negligence Ms. Weigl.
Chapter 4 Criminal Law and Procedure
Law For Business And Personal Use
A HUMAN RIGHTS-BASED APPROACH TO TRAFFICKING IN PERSONS
Presentation transcript:

Faking It: Calculating Loss in Computer Crime Sentencing Jennifer S. Granick, Esq. Stanford Law School Center for Internet and Society

18 U.S.C (a)(1) unauthorized access to classified information; (a)(2) unauthorized access and obtaining any information from a protected computer (misdemeanor); (a)(3) access that interferes with the ability to use a government computer; (a)(4) access with the intent to defraud if the intruder obtains anything of value > $5K. (a)(5) transmissions or access that caused damage AND $5K loss or special harm

First Incidents that cause measurable pecuniary harm will be prosecuted where incidents that cause more difficult to measure non- pecuniary harm may go unpunished.

Second Victim has tremendous power to affect the prosecution and sentence, independent of anything the offender might do.

Third Losses that the law says we should not count against defendants (forensic investigation, worries about harm to reputation) get counted anyway.

Damage Defined Any impairment to the integrity or availability of data, a program, a system, or information. 18 USC 1030(e)(8).

Loss Defined Any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service. (e)(11)

Special Harm The modification or impairment, or potential modification or impairment, of the medical examination, diagnosis, treatment, or care of 1 or more individuals; access that causes physical injury to any person; a threat to public health or safety; or damage affecting a computer system used by or for a government entity in furtherance of the administration of justice, national defense, or national security.

Sentencing Loss Defined Actual loss includes the following pecuniary harm, regardless of whether such pecuniary harm was reasonably foreseeable: any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other damages incurred because of interruption of service. 2B1.1, comment 3AViii

Problems Intangible harm Incidents vary in severity (socially defined) Repairing system No forensics Court review Only $$ gets punished Trivial incidents may cost more (victim defined) Improving System Forensic Investigation Low standard of proof

Goals of Sentencing 1.to provide punishment levels that reflect the seriousness of the offense; 2.to provide fairness in meeting the purposes of sentencing; 3.to provide just punishment; 4.to provide certainty in meeting the purposes of sentencing.

Improvements Figure out how to value intangible harms. Reach consensus on cognizable losses and depend less on victim assessment. Train responders to distinguish between cognizable and excluded losses. Use a non-monetary measure like # of machines/people affected. Raise standards for fact finding at sentencing.