Three Steps That Allow Companies to Use the Computer Fraud and Abuse Act for Misuse of Computers and Information – Even in the Ninth Circuit

more+
less-

Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable steps to actively resist and prevent such misuses, and (3) clearly and conspicuously notifying the transgressor that his authorization has been terminated.

LOADING PDF: If there are any problems, click here to download the file.

Written by:

more+
less-

Scheef & Stone, L.L.P. on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×
Loading...
×
×