News & Analysis as of

Federal Bureau of Investigation Computer Fraud and Abuse Act (CFAA)

Proskauer - Blockchain and the Law

App Store Protected by CDA Immunity (and Limitation of Liability) for Losses from Fraudulent Crypto Wallet App

Background - The issue of fraudulent crypto-related mobile apps has received much attention of late. Back in July 2022, the FBI issued a notice, warning financial institutions and investors about instances where criminals...more

Weintraub Tobin

The Continuing Battle Over LinkedIn Profiles and the Applicability of the Computer Fraud and Abuse Act

Weintraub Tobin on

Over two and a half years ago, this column analyzed a Ninth Circuit case titled HiQ Labs, Inc. v. LinkedIn Corporation, in which the Court agreed with a lower court that had issued a preliminary injunction against LinkedIn...more

Freeman Law

U.S. Supreme Court Narrows Computer Fraud & Abuse Act

Freeman Law on

The U.S. Supreme Court recent decision in Van Buren v. United States significantly impacts the scope of the Computer Fraud & Abuse Act (“CFAA”).  The case carries implications for computer fraud prosecutions, employee abuse...more

Jackson Walker

Supreme Court Restricts Use of Computer Fraud and Abuse Act

Jackson Walker on

In its recent decision in Van Buren v. United States, the U.S. Supreme Court narrowed the scope of the Computer Fraud and Abuse Act (CFAA) and its potential use by employers to ensure computer security and protection for...more

Jackson Lewis P.C.

Supreme Court Adopts Narrow Interpretation Of Computer Fraud And Abuse Act

Jackson Lewis P.C. on

In a landmark decision, the U.S. Supreme Court has ruled that the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030 et seq., does not prohibit improper use of computer information to which an individual has authorized...more

Constangy, Brooks, Smith & Prophete, LLP

CFAA Conviction Requires Some Kind Of A "Hack," Supreme Court Says

Mere "misuse" of information is not enough. The U.S. Supreme Court decided yesterday that a criminal conviction under the Computer Fraud and Abuse Act cannot be based merely on misusing information obtained through a...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches

Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old. However, around...more

King & Spalding

Four Indicted On Charges Related To Yahoo Hacks

King & Spalding on

On March 15, 2017, the United States announced the indictment of four defendants for their roles in the hacks of Yahoo’s network, systems, and user accounts. The indictment stems from an investigation conducted by the Federal...more

Robinson+Cole Data Privacy + Security Insider

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Orrick - Trade Secrets Group

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Gray Reed

The Cards Hack the Astros – So What Law Applies? [audio]

Gray Reed on

In a developing story, The New York Times is reporting that the FBI is investigating the St. Louis Cardinals for hacking into the Houston Astros’ computer networks to steal the Astros’ internal baseball operation intelligence...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide