Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act is a United States federal statue enacted in 1986 intended to reduce malicious interference with computer systems and prevent data theft. The CFAA can be violated in one of two... more +
The Computer Fraud and Abuse Act is a United States federal statue enacted in 1986 intended to reduce malicious interference with computer systems and prevent data theft. The CFAA can be violated in one of two ways: 1) trespassing into a computer system in which one has no authorization or 2) exceeding the scope of one's authorization within a computer system. less -
News & Analysis as of

Trade Secrets and Removal Based on Copyright Preemption

Jurisdiction and removal may not sound like hot topics, but these considerations are critical and sometimes dispositive. Real talk: Certain state court systems are terrible places to litigate. It’s one thing to litigate a...more

DOJ Deputy Assistant AG Delivers Testimony at Senate Subcommittee Hearing Regarding Cyber Crime

On July 8, the DOJ’s Deputy Assistant AG, David Bitkower, delivered his testimony before the Senate Judiciary Subcommittee on Crime and Terrorism’s hearing entitled, “Cyber Crime: Modernizing Our Legal Framework for the...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

The Cards Hack the Astros – So What Law Applies? [audio]

In a developing story, The New York Times is reporting that the FBI is investigating the St. Louis Cardinals for hacking into the Houston Astros’ computer networks to steal the Astros’ internal baseball operation intelligence...more

Strategies For Businesses Protecting Electronic Data Within California

Part One: The Computer Fraud And Abuse Act (18 U.S.C. § 1030 Et Seq.) - Data security is top-of-mind in today's corporate world. According to The Ponemon Institute's 2015 Cost of Data Breach Study, the average total...more

Florida Enacts Law Providing for Civil Remedy Against Cyber Fraud and Abuse

On May 14, Florida Governor Rick Scott signed the Computer Abuse and Data Recovery Act (CADRA) into law. CADRA is intended to provide a remedy to businesses for harm or loss caused by unauthorized access to protected...more

Satisfying the Computer Fraud and Abuse Act’s Jurisdictional Requirements Can Be Complicated

The parties in a Computer Fraud and Abuse Act case moved for partial summary judgment. Among the issues were whether the plaintiff had incurred the requisite $5,000 in qualifying losses, and whether the complaint was...more

New Rulings Address BYOD Policies

Bring Your Own Device (BYOD) policies are on the rise, meaning that an increasing number of employees are using their personal devices to access company servers. But, with the prevalence of a new employment trend inevitably...more

March 2015 Recap

March 2015—like January and February—saw decisions on a variety of fronts from ND Cal judges. ND Cal judges demonstrated their willingness to apply the Supreme Court’s decisions in Nautilus and Alice to invalidate patents on...more

A Modern Game of Hide and Go Seek? Some Lessons Learned Following Sony and Other Widely-Publicized Data Breaches

While the recent hack of Sony was prominent news because of the celebrity ties and potential geo-political implications, other prominent cyber-attacks over the last few months are enough to give any company pause. The January...more

Inside Job – Judge Labson Freeman Applies the CFAA Restrictively

Koninklijke Phillips N.V., et. al. v. Elec-Tech Int’l Co., Ltd., et al.,, Case No. 14-cv-02737 (BLF) (March 20, 2015) - Plaintiff Koninklijke Phillips N.V. (Phillips) and its subsidiary Phillips Lumileds Lighting...more

Responding to Insider Data Theft

Our 2015 monthly Privacy Issues Wednesday webinar series continued this month with Jonathan Cain and Paul Pelletier’s Responding to Insider Data Theft & Disclosure presentation. Jonathan and Paul discussed how distinguishing...more

What Recent Case Law Can Teach About BYOD Workplaces

Bring Your Own Device (“BYOD”) is a movement that is changing the IT landscape of workplaces. In a BYOD workplace, employees use their own mobile device—smartphones, tablets, laptops, etc.—for both work and personal use. ...more

Developments in Privacy and Cybersecurity Legislation

On January 13, 2015, the Obama Administration presented to Congress an updated legislative proposal to improve American cybersecurity and data privacy protection....more

Fourth Circuit Upholds Federal Criminal Conviction for Accessing Former Employer's Database

The federal Computer Fraud and Abuse Act (CFAA) was primarily intended to deter and punish database hacking by third parties. Employers involved in disputes with former employees have attempted to use CFAA in response to...more

President Presses For Action On Cybersecurity Legislation In State Of The Union

On January 20, 2015, President Obama delivered his sixth State of the Union address, during which he pressed for Congress to take action to combat cybersecurity threats. He called on Congress to “finally pass the legislation...more

Advertising Law - January 2015 #3

President Obama Focuses on Cybersecurity, Privacy, Data Breach Notification - Data security and privacy concerns received special attention in President Obama’s State of the Union address where the President advocated...more

White House Proposal: Beef Up Anti-Hacking Laws and Resolve a Circuit Split

President Obama wants to go where the Supreme Court refused to tread.  As part of his  cybersecurity and privacy initiatives, which we discussed last week, the President would strengthen the federal anti-hacking provisions of...more

Alert: Obama Makes Cybersecurity A National Priority

Over the past two weeks, President Obama has made clear that cybersecurity continues to be a concern, and he and the administration are increasing their focus on the issue. ...more

The Cyber Security State of the Union: Obama Commits “to Protect a Free and Open Internet”

In last week’s State of the Union address, President Barack Obama continued his ongoing push for nationwide privacy legislation to “better meet the evolving threat of cyber-attacks, combat identity theft, and protect our...more

President Obama Announces New Legislative Proposal Focused on Improving the Nation’s Cybersecurity

In response to the recent wave of high-profile data breaches, President Obama has revealed proposed legislation aimed at improving the nation’s cybersecurity by increasing certain privacy protections, streamlining the...more

State Of The Union “Sneak Peek” Highlights Administration Cybersecurity Initiatives

As part of a series of “sneak peeks” announced in advance of the State of the Union address on Tuesday, January 20th, President Obama made remarks last week before the Federal Trade Commission, the Department of Homeland...more

What Obama's Proposed Anti-Hacking Legislation Means for Entrepreneurs

The slew of highly publicized data breaches over the past few years has brought the issue of cyber-security truly to the mainstream -- most recently reaching our living rooms through President Barack Obama’s State of the...more

President Obama Proposes New Data Privacy Legislation

On January 12, President Obama announced new privacy initiatives to combat identity theft, enhance consumer security, and improve data privacy online and in the classroom. His main legislative proposals call for (i) a...more

President Obama’s 2015 Priorities Include Cybersecurity

During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more

83 Results
|
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×