Computer Fraud and Abuse Act

News & Analysis as of

Cybersecurity Litigation Monthly Newsletter

As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more

How Website Operators Use CFAA To Combat Data-Scraping

“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more

Socially Aware - Volume 5, Issue 5 - August 2014

In This Issue: - Data for the Taking: Using the Computer Fraud and Abuse Act to Combat Web Scraping - Google Glass Into Europe: A Small Step or a Giant Leap? - Drugs and the Internet: FDA Distributes New...more

Data for the Taking: Using the Computer Fraud and Abuse Act to Combat Web Scraping

“Web scraping” or “web harvesting”—the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders”—accounted for 18% of site visitors and 23% of all Internet traffic in...more

Common Flaws in Computer Fraud Class Actions: Lawsuits claiming unauthorized use of smartphone tracking technology are lacking key...

A number of class actions have recently been filed in federal district courts, predicated, in part, on alleged violations of the federal computer crime statute, the Computer Fraud and Abuse Act, complaining of tracking...more

Facebook Updates Its Policies for Deceased Users

According to a February 21, 2014, news release, Facebook has made two updates to its policies regarding the accounts of deceased users. Previously, Facebook allowed one of two options for a deceased user’s account. ...more

Privacy Class Action – Theories of Liability – 2013 Year in Review

One hot area of data privacy litigation over the past several years has been data breach class actions brought under the California Confidentiality of Medical Information Act (“CMIA”), which provides that a person may recover...more

Ownership of Business-Related Social Media Accounts

Social media platforms have become an increasingly important means for companies to build and manage their brands and to interact with their customers, in many cases eclipsing companies’ traditional “.com” websites. Social...more

Google is No Cookie Monster, says Delaware Federal Court

In a decisive victory for Google and several co-defendants, a Delaware federal court dismissed the claims of a putative class of individuals who alleged that they were injured by Google’s practice of circumventing certain...more

Taking Advantage of a Video Poker Glitch Can Land you in Jail in Nevada

Imagine a poker player who played an extraordinary amount of video poker and in doing so discovered a software bug that would allow him to achieve significant payouts through a series of unusual moves. These moves would...more

The Conflicting Rulings on Employee Data Theft

Employers should include access restrictions in agreements, limit access with technology and consider the jurisdiction. In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime...more

LEGISLATIVE UPDATE: Rep. Zoe Lofgren Proposes New Legislation, Including A Civil Cause Of Action For Trade Secret Misappropriation

We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more

The 9th Circuit: Employees Are Free to Steal from the Company Computers

Yesterday the 9th Circuit Court of Appeals issued an opinion holding that limiting an employee’s access to the company computers solely for business purposes, i.e. not stealing the data for a competitor, cannot be the...more

13 Results
|
View per page
Page: of 1