News & Analysis as of

Hackers Computer Fraud and Abuse Act (CFAA)

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

Company Awarded Damages After Former Employee Hacks Its Systems And Hijacks Its Website

by Jackson Lewis P.C. on

A company can recover damages from its former employee in connection with his hacking into its payroll system to inflate his pay, accessing its proprietary files without authorization and hijacking its website, a federal...more

Four Indicted On Charges Related To Yahoo Hacks

by King & Spalding on

On March 15, 2017, the United States announced the indictment of four defendants for their roles in the hacks of Yahoo’s network, systems, and user accounts. The indictment stems from an investigation conducted by the Federal...more

(Alleged) Spammer Squares Off With (Alleged) Hacker, Highlighting Risk of Cyber Threats

What’s in a name? Obviously a lot, as businesses in all industries invest significant time and money to protect their reputations. But, in some sectors, the line between positive and pejorative can be quite thin. Take...more

Companies May Soon Have a New Defense Against Cyber-Attacks

by Jackson Lewis P.C. on

The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and...more

Arming Employers Against Internal Hackers, the 11th Circuit Clarifies CFAA’s “Loss” Requirement

by Butler Snow LLP on

The Eleventh Circuit ruled last week in a wrongful discharge turned Computer Fraud and Abuse Act (“CFAA”) case, spinning the employee’s case against his employer on its head. The facts of Brown Jordan International, Inc. v....more

You Asked: Can My Employees Hack My Company?

by Baker Donelson on

Yes! Employees and other insiders – think Edward Snowden – can, and in fact, do play a role in most data breaches or cyber-security incidents. Companies must ensure their data protection policies include not only training but...more

Password sharing and “head-slap hacks”: What employers can do

If you have ever wondered why your company’s data is not as secure as it should be, take a look in the mirror. A study by the Ponemon Institute, commissioned by Experian and released in May, found that the majority of...more

Ninth Circuit Rules that CFAA Imposes Criminal Penalties When Terminated Users Try To Access Systems With Borrowed Passwords

by Reed Smith on

It can be a violation of the federal Computer Fraud and Abuse Act (“CFAA”) to “access[] a protected computer without authorization.” The CFAA clearly applies when criminals with no connection to a company try to force their...more

Criminal Sanctions in a Trade Secret Dispute

by Fisher Phillips on

Just a few days after the Major League Baseball season opens next month, former St. Louis Cardinals scouting director Chris Correa will attend a sentencing hearing where he faces to up to five years in prison, a $250,000...more

Another Cyber Coverage Gap? Some Carriers Resisting Coverage Of Commercial Cyber Fraud

by King & Spalding on

In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more

The FBI’s “Cyber Most Wanted”

We’ve all heard of the FBI’s “Most Wanted” list, but fewer people know that the FBI has a special most wanted list just for computer criminals. The FBI’s “Cyber’s Most Wanted” list features the FBI’s most wanted computer...more

Breaking News: Hacker’s Conviction Affirmed Despite Lower Court’s Error

This week, the United States Supreme Court upheld a conviction under the Computer Fraud and Abuse Act despite the Court’s acknowledgement that the jury had been wrongfully instructed on the elements of the crime charged. ...more

Time Is Precious with Computer-Hacking Claims

by Dorsey & Whitney LLP on

A recent ruling shows that plaintiffs must act fast when using a federal criminal statute for a civil suit. The U.S. Court of Appeals for the Second Circuit in August addressed the proper application of the statute of...more

Disgruntled Former Tribune Company Employee Who Aided Hacking Convicted; Could Face Jail Time

by King & Spalding on

On October 7, 2015, former Tribune Company employee Matthew Keys was convicted of three felonies stemming in part from assistance he provided to the hacking collective Anonymous to alter content on the LA Times’ website. ...more

Feds continue to prosecute hackers

Sergey Vovnenko, a Ukrainian hacker, was charged in New Jersey federal court this week for wire fraud conspiracy, unauthorized computer access and aggravated identity theft for allegedly hacking into networks of financial...more

Federal Court Dismisses Computer Fraud and Abuse Act Claim That Was Filed Against Our Clients

Here’s a recent victory we obtained on behalf of our clients SunEdison, Inc., et al. The individual defendants (then-current employees of SunPower, Inc.) were alleged to have violated the federal Computer Fraud and Abuse Act...more

Ashley Madison data breach update

Anonymous users of the almost 40 million users of the Ashley Madison website have filed suit against internet service providers (ISPs) GoDaddy and Amazon alleging that they have been damaged because the ISPs hosted the stolen...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

The Cards Hack the Astros – So What Law Applies? [audio]

by Gray Reed & McGraw on

In a developing story, The New York Times is reporting that the FBI is investigating the St. Louis Cardinals for hacking into the Houston Astros’ computer networks to steal the Astros’ internal baseball operation intelligence...more

Lenovo’s Unsecure Adware On Consumer PCs Prompts Class Action Lawsuits

by King & Spalding on

Security experts recently discovered that about 50 different consumer PC models sold by Lenovo since September 2014 were shipped with adware known as Superfish Visual Discovery that could be exploited by hackers to spoof...more

TRO LLC – GET IT? Sprung From Prison, Hacker Creates Hedge Fund That Shorts Stocks Of Companies With Security Vulnerabilities

Self-proclaimed Internet troll and hacker Andrew “weev” Auernheimer has big plans now that he’s been sprung from prison. We identified Auernheimer’s imprisonment and appeal as one of the top trade secret stories of...more

Access Of Computer System With Log-In Credentials Is Not Unlawful “Hacking”

by Fenwick & West LLP on

A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more

Can Violating Social Media Terms of Use Make You Guilty of Violating the CFAA?

by Ifrah PLLC on

LinkedIn has filed a suit against John Does in response to a spate of “data scraping” perpetrated by unknown individuals, in violation of the website’s terms and conditions.This is the latest federal case in the Northern...more

A Weapon Against Hackers on the Home Front

by Dorsey & Whitney LLP on

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

29 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!