SlideShare una empresa de Scribd logo
1 de 64
THE EVOLVING COMPUTER
 FRAUD AND ABUSE ACT
  An Overview and Update of
       Recent Activity
         Dallas Bar Association
         Computer Law Section
             April 23, 2012
 Civil Litigation Lawyers
         Criminal Lawyers
         Employment Lawyers
         Family Lawyers
         In-house Counsel
         Business & Transactional Lawyers
         Technology & Privacy Lawyers


www.brittontuma.com                          2
 History and Original Purpose of CFAA
         Why?
         What Does the CFAA Prohibit?
         Examples of Most Common CFAA Violations
         Most Controversial Issues Under CFAA
         Recent CFAA Developments


www.brittontuma.com                                 3
BRIEF HISTORY OF
    THE CFAA



                   4
www.brittontuma.com   5
www.brittontuma.com   6
Comprehensive Crime Control Act of 1984
           Criminal statute
           Wire & mail fraud
           Response to movie War Games




www.brittontuma.com                             7
Computer Fraud and Abuse Act of 1986
           Hacking of “Government interest”
            computers
           Criminal only
           3 major amendments (9 total)
           Added private cause of action in ’94
           2008 most recent


www.brittontuma.com                                8
Why is the Computer Fraud
                      and Abuse Act important?


       Primary Law for Misuse of Computers
       Computers …



www.brittontuma.com                               9
“Everything has a
          computer in it nowadays.”
                            -Steve Jobs




www.brittontuma.com                       10
WHAT IS A COMPUTER?




                      11
The CFAA says
          has a processor or stores data

               “the term ‘computer’ means an electronic, magnetic, optical,
               electrochemical, or other high speed data processing device
               performing logical, arithmetic, or storage functions, and
               includes any data storage facility or communications facility
               directly related to or operating in conjunction with such device,
               but …”

          “such term does not include an automated typewriter or
          typesetter, a portable hand held calculator, or other similar
          device;”

www.brittontuma.com                                                                12
The Fourth Circuit says

         “If a device is ‘an electronic … or other high speed data
         processing device performing logical, arithmetic, or
         storage functions,’ it is a computer. This definition
         captures any device that makes use of an electronic
         data processor, examples of which are legion.”

                                         -United States v. Kramer



www.brittontuma.com                                                  13
What about




www.brittontuma.com   14
The Fourth Circuit says
         “’Just think of the common household items that
         include microchips and electronic storage devices, and
         thus will satisfy the statutory definition of “computer.”’

         “’That category can include coffeemakers, microwave
         ovens, watches, telephones, children’s toys, MP3
         players, refrigerators, heating and air-conditioning
         units, radios, alarm clocks, televisions, and DVD
         players, . . . .”
                                          -United States v. Kramer

www.brittontuma.com                                                   15
The CFAA applies only to “protected” computers

         This may limit the problem of applying it to alarm
         clocks, toasters, and coffee makers

         Protected = connected to the Internet

        Any situations where these devices are connected?



www.brittontuma.com                                           16
• TI-99               • Leap Frog Leapster   • iPhone 4
    • 3.3 MHz Processor   • 96 MHz Processor     • 800 MHz Processer
    • 16 KB of RAM        • 128 MB of RAM        • 512 MB of RAM



www.brittontuma.com                                                    17
66 MHz =
        fastest
        desktop in 80s


        96 MHz = child’s
        toy today


        250 MHz =
        fastest super
        computer in 80s

        800 MHz =
        standard
        telephone today

www.brittontuma.com        18
WHAT DOES THE CFAA
     PROHIBIT?



                     19
CFAA prohibits the access of a protected
     computer that is

          Without authorization, or
          Exceeds authorized access


www.brittontuma.com                             20
Where the person accessing
          Obtains information
          Commits a fraud
          Obtains something of value
          Transmits damaging information
          Causes damage
          Traffics in passwords
          Commits extortion

www.brittontuma.com                         21
“I am the wisest man alive,
              for I know one thing, and that
              is that I know nothing.”
                                                 -Socrates
     Overly simplistic list

     Very complex statute

     Superficially it appears deceptively straightforward

     Many pitfalls
www.brittontuma.com                                          22
Two Most Problematic Issues
           “Loss” Requirement
              • Confuses lawyers and judges alike
           Unauthorized / Exceeding Authorized Access
              • Evolving jurisprudence
              • Interpreted by many Circuits
              • New conflict on April 10, 2012
www.brittontuma.com                                      23
Limited civil remedy
          Procedurally complex with many cross-
           references
          “damage” ≠ “damages”
          Must have $5,000 “loss”
          Loss requirement is jurisdictional threshold



www.brittontuma.com                                       24
What is a “loss”?
         “any reasonable cost to any victim, including the cost of
         responding to an offense, conducting a damage assessment, and
         restoring the data, program, system, or information to its
         condition prior to the offense, and any revenue lost, cost
         incurred, or other consequential damages incurred because of
         interruption of service.”



     Loss = cost          (unless interruption of service)


www.brittontuma.com                                                      25
What can qualify as a “loss”?
           Investigation and response costs
              •   Forensics analysis and investigation
              •   Diagnostic measures
              •   Restoration of system
              •   Bartered services for investigation / restoration
           Value of employees’ time
           Attorneys’ fees if leading investigation


www.brittontuma.com                                                   26
What is not a “loss”?
          Lost revenue (unless interruption of service)
          Value of trade secrets
          Lost profits
          Lost customers
          Lost business opportunities
          Privacy and Personally Identifiable Information

www.brittontuma.com                                          27
Privacy and Personally Identifiable Information
          iTracking
          Hacking / data breach
          Browser cookies


     REMEMBER: Loss is only required for civil remedy –
     not criminal violation


www.brittontuma.com                                       28
What would you advise?
          Wrongful access of your client’s
           computer
          Considering a CFAA claim
          Your advice would be to ________?



www.brittontuma.com                            29
Remedies
          Available
                 •    Economic damages
                 •    Loss damage
                 •    Injunctive relief

          Not Available
                 •    Exemplary damages
                 •    Attorneys’ fees



www.brittontuma.com                       30
Elements of broadest CFAA Claim
         1. Intentionally access computer;
         2. Without authorization or exceeding authorized
            access;
         3. Obtained information from any protected
            computer; and
         4. Victim incurred a loss to one or more persons
            during any 1-year period of at least $5,000.

www.brittontuma.com                                         31
Procedural Points
          2 year limitations
          Concurrent jurisdiction
          No preemption
          No Rule 9 heightened pleading




www.brittontuma.com                        32
WRONGFUL ACCESS




                  33
General Access Principles
          Access by informational / data use
          ≠ technician
          Must be knowing or intentional access
          ≠ accidental access




www.brittontuma.com                                34
Two Types of Wrongful Access
    “without authorization”        “exceeds authorized”
        Outsiders                    Insiders
        No rights                    Some rights
        Not defined                  CFAA defines: access in
        Only requires intent to       a way not entitled
         access, not harm             Necessarily requires
        Hacker!                       limits of authorization
                                      Employees, web users,
                                       etc.
www.brittontuma.com                                              35
First step should be “which is it”?
     Instead, confusion of the two
          Lawyers plead both
          Courts don’t usually indicate which – or care –
           go straight to the outcome
          Case outcomes do not reflect Congressional
           framework

www.brittontuma.com                                          36
“without authorization”
          Clear when hacker
          Question is whether “exceeds” morphs into
           “without”
                Insider authorized for some computers
                Insider authorized for some locations
                Insider authorized for intended use

          United States v. Morris
                Unauthorized system and intended use

www.brittontuma.com                                      37
When does authorization terminate?
         As of April 10, 2012, there are (once again) three
         general lines of cases: Trilogy of Access Theories
             • Agency Theory
             • Intended-Use Analysis
             • Access Means Access


www.brittontuma.com                                           38
Agency Theory
         Employee’s breach of duty of loyalty to his employer
         terminated his right to access the computer based on
         common law agency principles.
            International Airport Centers, LLC v. Citrin (7th Cir. 2006)
             •   Seventh Circuit
             •   Earlier case




www.brittontuma.com                                                         39
Intended-Use Analysis
      Authorization continues until terminated by the grantor but
      exceeding prior contractual access and use limitations exceeds
      authorized access.
         United States v. Teague (8th Cir. 2011); United States v. Tolliver (3rd Cir.
          2011); United States v. Rodriguez (11th Cir. 2010); United States v. John (5th
          Cir. 2010), EF Cultural Travel BV v. Explorica, Inc. (1st Cir. 2001), United
          States v. Morris (2nd Cir. 1991)
          •   Majority view (overly simplified)
          •   Prior notice of limits is vital
          •   Emphasizes need for contractual limits

www.brittontuma.com                                                                    40
Access Means Access
      Once authorization to access is granted, the authorization
      continues until expressly terminated by the grantor, regardless
      of how it is used.
         United States v. Nosal (9th Cir. 2012); LVRC Holdings LLC v. Brekka (9th Cir.
          2009)
          •   Ninth Circuit + trending with district courts
          •   April 28, 2011  moved away in Nosal I
          •   April 10, 2012  moved back in Nosal II



www.brittontuma.com                                                                   41
Ways to establish limits for Intended-Use
          Contractual
             •   Policies: computer use, employment & manuals
             •   Website Terms of Service

          Technological
             •   Login and access restrictions
             •   System warnings

          Training and other evidence of notification
          Notices of intent to use CFAA
www.brittontuma.com                                             42
Contractual limits should
          Clearly notify of limits
          Limit authorization to access information
          Limit use of information accessed
          Terminate access rights upon violation
          Indicate intent to enforce by CFAA
     Goal: limit or terminate authorization
www.brittontuma.com                                    43
The following examples are situations that may
       constitute a wrongful access under the CFAA
            I say “may” because …
                      •   We’re talking about law!
                      •   Evolving jurisprudence
                      •   Access limits are huge factor
                      •   Facts can vary greatly




www.brittontuma.com                                       44
Employment Situations
           Most common scenario is employment
           •   Employee access and take customer account information
           •   Employee accesses and takes or emails confidential information
               to competitor
           •   Employee improperly deletes data and email
           •   Employee deletes browser history 
           •   Employee accessing their Facebook, Gmail, Chase accounts at
               work 



www.brittontuma.com                                                             45
Family Law Situations
           Have you ever logged into your significant other’s email or Facebook
           to see what they’re saying to others?
           DON’T ANSWER THAT!
           •   Estranged spouse in Arkansas did after separation
           •   NTTA account?
           •   Bank account?
           •   Cancelling services via online accounts?




www.brittontuma.com                                                               46
Sharing Website Logins
           Have you ever borrowed or shared website login credentials and
           passwords?
           DON’T ANSWER THAT!
           •   Recent case held that permitting others to use login credentials
               for paid website was viable CFAA claim
           •   The key factor here was the conduct was prohibited by the
               website’s agreed to Terms of Service




www.brittontuma.com                                                               47
Misuse of Websites
           Ever created a fake profile or used a website for
           something other than its intended purpose?
           DON’T ANSWER THAT!
           •   Myspace Mom case
           •   Fake login to disrupt legitimate website sales
           •   Accessing website to gain competitive information when
               prohibited by TOS
           •   Creating fake Facebook to research opposing parties


www.brittontuma.com                                                     48
Hacking & Private Information
           Hacking was original purpose for CFAA
           •   Hacking and obtaining private information
           •   Tracking individuals through geo-tagging
           •   Website collection of private information
           •   All fit within the prohibitions of the CFAA
           •   Loss is the problem, from a civil standpoint



www.brittontuma.com                                           49
Employee Social Media Passwords
           How about asking an employee or prospective employee for the
           login and password to their Facebook account?
           •   Is this unauthorized access?
               •      Coerced?
           •   Facebook’s terms of service prohibit sharing of password with
               anyone else, or anything else that may jeopardize the security
               of the account
           •   The CFAA prohibits aiding and abetting!
           •   In the 5th, 1st, 2nd, 3rd, 8th, and 11th Circuits this could be a
               problem
www.brittontuma.com                                                                50
What about …
           • Hacking a car?
           • Hacking a person?
           • What else?




www.brittontuma.com              51
“ACCESS” &
THE NEW (OLD)
CIRCUIT SPLIT


                52
Three Main Cases
           •   United States v. John (5th Cir. 2010)
           •   United States v. Rodriguez (11th Cir. 2010)
           •   United States v. Nosal (9th Cir. 2012)
       And Two Minor Ones
           •   United States v. Tolliver (3rd Cir. 2011)
           •   United States v. Teague (8th Cir. 2011)



www.brittontuma.com                                          53
United States v. John (5th Cir. 2010)
           •   Intended-Use Analysis / “exceeding authorized access” case
           •   Citigroup had policies that clearly prohibited the unlawful use of
               information obtained from computer system
           •   Employee used her access to customer accounts to obtain
               information to give to others to commit fraud
           •   Rule: access to a computer may be exceeded if the purposes for
               which access have been given are exceeded and the employee is
               actually aware of those limitations on purpose through policies
               or contractual agreements.
           •   Rodriguez: similar but obtained info to be a creeper to women

www.brittontuma.com                                                                 54
Recent Intended-Use Cases
           United States v. Tolliver (3rd Cir. 2011)
               • Exceeded authorized access case
               • Bank employee looking up customer account information to
                 aid and abet a fraud scheme – the bank’s policies prohibited
                 looking up info without a business purpose
           United States v. Teague (8th Cir. 2011)
               •      Exceeding authorized access case
               •      Employee of contractor for Dept. of Education with
                      privileged access to National Student Loan Data System
                      used that access to look up Barak Obama’s records
www.brittontuma.com                                                             55
United States v. Nosal (9th Cir. 2012)
           •   Access Means Access / “exceeding authorized access” case
           •   Company had a policy that restricted use and disclosure of
               information to legitimate company business
           •   Former employee encouraged others still there to steal trade
               secret info for them to use in starting competing business
               (charged with aiding and abetting)
           •   Rule: “‘exceeds authorized access’ in the CFAA is limited to
               violations of restrictions on access to information, and not
               restrictions on its use.”



www.brittontuma.com                                                           56
United States v. Nosal (9th Cir. 2012)
           •   Why? Nosal had clear unequivocal notice that what he was
               doing was wrong and prohibited by the policies and he was not
               entitled to obtain that information for that purpose
           •   Court found the language “to access a computer with
               authorization and to use such access to obtain or alter
               information in the computer that the accesser is not entitled so
               to obtain or alter” to be ambiguous
               •      Reverted to Rule of Lenity
           •   Looked to all the fears of hypothetical potential crimes



www.brittontuma.com                                                               57
John v. Nosal Split – What Can We Do?
           •   John will prohibit misuse of information accessed or obtained
           •   Nosal will only prohibit an unauthorized access
           •   Conditional Authorization?
               •      In addition to having “John Policies” that prohibit misuse of
                      the information obtained,
               •      Provision that makes authorization to access the computer
                      conditional on that access being for proper purposes and
                      not for improper purposes, and retroactively revoking that
                      authorization if for an improper purpose
           •   Supreme Court?
www.brittontuma.com                                                                   58
Pulte Homes, Inc. v. Laborers’ International Union of North
       America (6th Cir. 2011)
           •   An “intentional transmission” case – not unauthorized access
           •   After Pulte fired a union employee the union orchestrated a
               barrage of emails, telephone calls, and faxes that were so
               voluminous that it shut down Pulte’s computer system and
               telephones, interfering with its business
           •   Violated § 1030(a)(5)(A): “knowingly cause the transmission of a
               program, information, code, or command, and as a result of
               such conduct, intentionally cause damage without
               authorization, to a protected computer.”
           •   Think about the implications: emails, calls, faxes?

www.brittontuma.com                                                               59
PROPOSED AMENDMENTS




                      60
Hacking, Data Breach & Privacy
         •   Hacking = biggest news event of 2011
         •   46 States  Breach Notification Laws
         •   Administration & Congress want to act
         •   Employers asking for social media logins
         •   Vehicle of choice is to amend the CFAA – but has lost
             a lot of steam since 2011




www.brittontuma.com                                                  61
Unauthorized Access Amendment
         • Proposed Amendment in Senate last Fall
         • Resolve disagreements about Unauthorized Access
         • Felony-level unauthorized access can’t be solely
           premised on violation of a contractual obligation or
           agreement
         • This proposal would narrow the CFAA




www.brittontuma.com                                               62
 Why? Remember what Jobs said
         CFAA is very broad and covers all kinds of
          computer misuse (sometimes)
         CFAA is complex with lots of pitfalls
         Proposed Amendments to broaden and tighten
          the CFAA
         Courts’ interpretation of the CFAA is changing all
          the time – you must stay updated!

www.brittontuma.com                                            63
64

Más contenido relacionado

La actualidad más candente

Delitos informáticos abel
Delitos informáticos abelDelitos informáticos abel
Delitos informáticos abelAbel Uriel
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Firewall
FirewallFirewall
FirewallApo
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Delitos informáticos abel
Delitos informáticos abelDelitos informáticos abel
Delitos informáticos abel
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Firewall
FirewallFirewall
Firewall
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Destacado

Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...Shawn Tuma
 
Protecting corporate assets from departing employees
Protecting corporate assets from departing employeesProtecting corporate assets from departing employees
Protecting corporate assets from departing employeesRobert B. Fitzpatrick, PLLC
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The LawSaimaRafiq
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Securityprimeteacher32
 
Tax Fraud research paper
Tax Fraud research paperTax Fraud research paper
Tax Fraud research paperpankaj bhargava
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Luthansa
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerPresentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerBelinda Isamar
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Destacado (16)

Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
 
Protecting corporate assets from departing employees
Protecting corporate assets from departing employeesProtecting corporate assets from departing employees
Protecting corporate assets from departing employees
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Computer and Network Security
Computer and Network SecurityComputer and Network Security
Computer and Network Security
 
Tax Fraud research paper
Tax Fraud research paperTax Fraud research paper
Tax Fraud research paper
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerPresentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Sql Server 2012
Sql Server 2012Sql Server 2012
Sql Server 2012
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Similar a Dallas Bar Association Computer Law Section Overview of Evolving Computer Fraud and Abuse Act

Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer FraudFraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer FraudShawn Tuma
 
2013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v12013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v1Shawn Tuma
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_bsookman
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyIFLP
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kkajairo
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageShawn Tuma
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 

Similar a Dallas Bar Association Computer Law Section Overview of Evolving Computer Fraud and Abuse Act (20)

Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer FraudFraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
 
2013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v12013.05.16 cfaa powerpoint for ima.v1
2013.05.16 cfaa powerpoint for ima.v1
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A6704d01
A6704d01A6704d01
A6704d01
 
Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_Sookman federal circuit_internet_and_copyright_
Sookman federal circuit_internet_and_copyright_
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6
 
04 privacy
04 privacy04 privacy
04 privacy
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate Espionage
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 

Más de Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital EngagementShawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene ChecklistShawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response ChecklistShawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity UpdateShawn Tuma
 

Más de Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Dallas Bar Association Computer Law Section Overview of Evolving Computer Fraud and Abuse Act

  • 1. THE EVOLVING COMPUTER FRAUD AND ABUSE ACT An Overview and Update of Recent Activity Dallas Bar Association Computer Law Section April 23, 2012
  • 2.  Civil Litigation Lawyers  Criminal Lawyers  Employment Lawyers  Family Lawyers  In-house Counsel  Business & Transactional Lawyers  Technology & Privacy Lawyers www.brittontuma.com 2
  • 3.  History and Original Purpose of CFAA  Why?  What Does the CFAA Prohibit?  Examples of Most Common CFAA Violations  Most Controversial Issues Under CFAA  Recent CFAA Developments www.brittontuma.com 3
  • 4. BRIEF HISTORY OF THE CFAA 4
  • 7. Comprehensive Crime Control Act of 1984  Criminal statute  Wire & mail fraud  Response to movie War Games www.brittontuma.com 7
  • 8. Computer Fraud and Abuse Act of 1986  Hacking of “Government interest” computers  Criminal only  3 major amendments (9 total)  Added private cause of action in ’94  2008 most recent www.brittontuma.com 8
  • 9. Why is the Computer Fraud and Abuse Act important?  Primary Law for Misuse of Computers  Computers … www.brittontuma.com 9
  • 10. “Everything has a computer in it nowadays.” -Steve Jobs www.brittontuma.com 10
  • 11. WHAT IS A COMPUTER? 11
  • 12. The CFAA says has a processor or stores data “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.brittontuma.com 12
  • 13. The Fourth Circuit says “If a device is ‘an electronic … or other high speed data processing device performing logical, arithmetic, or storage functions,’ it is a computer. This definition captures any device that makes use of an electronic data processor, examples of which are legion.” -United States v. Kramer www.brittontuma.com 13
  • 15. The Fourth Circuit says “’Just think of the common household items that include microchips and electronic storage devices, and thus will satisfy the statutory definition of “computer.”’ “’That category can include coffeemakers, microwave ovens, watches, telephones, children’s toys, MP3 players, refrigerators, heating and air-conditioning units, radios, alarm clocks, televisions, and DVD players, . . . .” -United States v. Kramer www.brittontuma.com 15
  • 16. The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.brittontuma.com 16
  • 17. • TI-99 • Leap Frog Leapster • iPhone 4 • 3.3 MHz Processor • 96 MHz Processor • 800 MHz Processer • 16 KB of RAM • 128 MB of RAM • 512 MB of RAM www.brittontuma.com 17
  • 18. 66 MHz = fastest desktop in 80s 96 MHz = child’s toy today 250 MHz = fastest super computer in 80s 800 MHz = standard telephone today www.brittontuma.com 18
  • 19. WHAT DOES THE CFAA PROHIBIT? 19
  • 20. CFAA prohibits the access of a protected computer that is  Without authorization, or  Exceeds authorized access www.brittontuma.com 20
  • 21. Where the person accessing  Obtains information  Commits a fraud  Obtains something of value  Transmits damaging information  Causes damage  Traffics in passwords  Commits extortion www.brittontuma.com 21
  • 22. “I am the wisest man alive, for I know one thing, and that is that I know nothing.” -Socrates  Overly simplistic list  Very complex statute  Superficially it appears deceptively straightforward  Many pitfalls www.brittontuma.com 22
  • 23. Two Most Problematic Issues  “Loss” Requirement • Confuses lawyers and judges alike  Unauthorized / Exceeding Authorized Access • Evolving jurisprudence • Interpreted by many Circuits • New conflict on April 10, 2012 www.brittontuma.com 23
  • 24. Limited civil remedy  Procedurally complex with many cross- references  “damage” ≠ “damages”  Must have $5,000 “loss”  Loss requirement is jurisdictional threshold www.brittontuma.com 24
  • 25. What is a “loss”? “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” Loss = cost (unless interruption of service) www.brittontuma.com 25
  • 26. What can qualify as a “loss”?  Investigation and response costs • Forensics analysis and investigation • Diagnostic measures • Restoration of system • Bartered services for investigation / restoration  Value of employees’ time  Attorneys’ fees if leading investigation www.brittontuma.com 26
  • 27. What is not a “loss”?  Lost revenue (unless interruption of service)  Value of trade secrets  Lost profits  Lost customers  Lost business opportunities  Privacy and Personally Identifiable Information www.brittontuma.com 27
  • 28. Privacy and Personally Identifiable Information  iTracking  Hacking / data breach  Browser cookies REMEMBER: Loss is only required for civil remedy – not criminal violation www.brittontuma.com 28
  • 29. What would you advise?  Wrongful access of your client’s computer  Considering a CFAA claim  Your advice would be to ________? www.brittontuma.com 29
  • 30. Remedies  Available • Economic damages • Loss damage • Injunctive relief  Not Available • Exemplary damages • Attorneys’ fees www.brittontuma.com 30
  • 31. Elements of broadest CFAA Claim 1. Intentionally access computer; 2. Without authorization or exceeding authorized access; 3. Obtained information from any protected computer; and 4. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000. www.brittontuma.com 31
  • 32. Procedural Points  2 year limitations  Concurrent jurisdiction  No preemption  No Rule 9 heightened pleading www.brittontuma.com 32
  • 34. General Access Principles  Access by informational / data use  ≠ technician  Must be knowing or intentional access  ≠ accidental access www.brittontuma.com 34
  • 35. Two Types of Wrongful Access “without authorization” “exceeds authorized”  Outsiders  Insiders  No rights  Some rights  Not defined  CFAA defines: access in  Only requires intent to a way not entitled access, not harm  Necessarily requires  Hacker! limits of authorization  Employees, web users, etc. www.brittontuma.com 35
  • 36. First step should be “which is it”? Instead, confusion of the two  Lawyers plead both  Courts don’t usually indicate which – or care – go straight to the outcome  Case outcomes do not reflect Congressional framework www.brittontuma.com 36
  • 37. “without authorization”  Clear when hacker  Question is whether “exceeds” morphs into “without”  Insider authorized for some computers  Insider authorized for some locations  Insider authorized for intended use  United States v. Morris  Unauthorized system and intended use www.brittontuma.com 37
  • 38. When does authorization terminate? As of April 10, 2012, there are (once again) three general lines of cases: Trilogy of Access Theories • Agency Theory • Intended-Use Analysis • Access Means Access www.brittontuma.com 38
  • 39. Agency Theory Employee’s breach of duty of loyalty to his employer terminated his right to access the computer based on common law agency principles.  International Airport Centers, LLC v. Citrin (7th Cir. 2006) • Seventh Circuit • Earlier case www.brittontuma.com 39
  • 40. Intended-Use Analysis Authorization continues until terminated by the grantor but exceeding prior contractual access and use limitations exceeds authorized access.  United States v. Teague (8th Cir. 2011); United States v. Tolliver (3rd Cir. 2011); United States v. Rodriguez (11th Cir. 2010); United States v. John (5th Cir. 2010), EF Cultural Travel BV v. Explorica, Inc. (1st Cir. 2001), United States v. Morris (2nd Cir. 1991) • Majority view (overly simplified) • Prior notice of limits is vital • Emphasizes need for contractual limits www.brittontuma.com 40
  • 41. Access Means Access Once authorization to access is granted, the authorization continues until expressly terminated by the grantor, regardless of how it is used.  United States v. Nosal (9th Cir. 2012); LVRC Holdings LLC v. Brekka (9th Cir. 2009) • Ninth Circuit + trending with district courts • April 28, 2011  moved away in Nosal I • April 10, 2012  moved back in Nosal II www.brittontuma.com 41
  • 42. Ways to establish limits for Intended-Use  Contractual • Policies: computer use, employment & manuals • Website Terms of Service  Technological • Login and access restrictions • System warnings  Training and other evidence of notification  Notices of intent to use CFAA www.brittontuma.com 42
  • 43. Contractual limits should  Clearly notify of limits  Limit authorization to access information  Limit use of information accessed  Terminate access rights upon violation  Indicate intent to enforce by CFAA Goal: limit or terminate authorization www.brittontuma.com 43
  • 44. The following examples are situations that may constitute a wrongful access under the CFAA  I say “may” because … • We’re talking about law! • Evolving jurisprudence • Access limits are huge factor • Facts can vary greatly www.brittontuma.com 44
  • 45. Employment Situations Most common scenario is employment • Employee access and take customer account information • Employee accesses and takes or emails confidential information to competitor • Employee improperly deletes data and email • Employee deletes browser history  • Employee accessing their Facebook, Gmail, Chase accounts at work  www.brittontuma.com 45
  • 46. Family Law Situations Have you ever logged into your significant other’s email or Facebook to see what they’re saying to others? DON’T ANSWER THAT! • Estranged spouse in Arkansas did after separation • NTTA account? • Bank account? • Cancelling services via online accounts? www.brittontuma.com 46
  • 47. Sharing Website Logins Have you ever borrowed or shared website login credentials and passwords? DON’T ANSWER THAT! • Recent case held that permitting others to use login credentials for paid website was viable CFAA claim • The key factor here was the conduct was prohibited by the website’s agreed to Terms of Service www.brittontuma.com 47
  • 48. Misuse of Websites Ever created a fake profile or used a website for something other than its intended purpose? DON’T ANSWER THAT! • Myspace Mom case • Fake login to disrupt legitimate website sales • Accessing website to gain competitive information when prohibited by TOS • Creating fake Facebook to research opposing parties www.brittontuma.com 48
  • 49. Hacking & Private Information Hacking was original purpose for CFAA • Hacking and obtaining private information • Tracking individuals through geo-tagging • Website collection of private information • All fit within the prohibitions of the CFAA • Loss is the problem, from a civil standpoint www.brittontuma.com 49
  • 50. Employee Social Media Passwords How about asking an employee or prospective employee for the login and password to their Facebook account? • Is this unauthorized access? • Coerced? • Facebook’s terms of service prohibit sharing of password with anyone else, or anything else that may jeopardize the security of the account • The CFAA prohibits aiding and abetting! • In the 5th, 1st, 2nd, 3rd, 8th, and 11th Circuits this could be a problem www.brittontuma.com 50
  • 51. What about … • Hacking a car? • Hacking a person? • What else? www.brittontuma.com 51
  • 52. “ACCESS” & THE NEW (OLD) CIRCUIT SPLIT 52
  • 53. Three Main Cases • United States v. John (5th Cir. 2010) • United States v. Rodriguez (11th Cir. 2010) • United States v. Nosal (9th Cir. 2012) And Two Minor Ones • United States v. Tolliver (3rd Cir. 2011) • United States v. Teague (8th Cir. 2011) www.brittontuma.com 53
  • 54. United States v. John (5th Cir. 2010) • Intended-Use Analysis / “exceeding authorized access” case • Citigroup had policies that clearly prohibited the unlawful use of information obtained from computer system • Employee used her access to customer accounts to obtain information to give to others to commit fraud • Rule: access to a computer may be exceeded if the purposes for which access have been given are exceeded and the employee is actually aware of those limitations on purpose through policies or contractual agreements. • Rodriguez: similar but obtained info to be a creeper to women www.brittontuma.com 54
  • 55. Recent Intended-Use Cases United States v. Tolliver (3rd Cir. 2011) • Exceeded authorized access case • Bank employee looking up customer account information to aid and abet a fraud scheme – the bank’s policies prohibited looking up info without a business purpose United States v. Teague (8th Cir. 2011) • Exceeding authorized access case • Employee of contractor for Dept. of Education with privileged access to National Student Loan Data System used that access to look up Barak Obama’s records www.brittontuma.com 55
  • 56. United States v. Nosal (9th Cir. 2012) • Access Means Access / “exceeding authorized access” case • Company had a policy that restricted use and disclosure of information to legitimate company business • Former employee encouraged others still there to steal trade secret info for them to use in starting competing business (charged with aiding and abetting) • Rule: “‘exceeds authorized access’ in the CFAA is limited to violations of restrictions on access to information, and not restrictions on its use.” www.brittontuma.com 56
  • 57. United States v. Nosal (9th Cir. 2012) • Why? Nosal had clear unequivocal notice that what he was doing was wrong and prohibited by the policies and he was not entitled to obtain that information for that purpose • Court found the language “to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter” to be ambiguous • Reverted to Rule of Lenity • Looked to all the fears of hypothetical potential crimes www.brittontuma.com 57
  • 58. John v. Nosal Split – What Can We Do? • John will prohibit misuse of information accessed or obtained • Nosal will only prohibit an unauthorized access • Conditional Authorization? • In addition to having “John Policies” that prohibit misuse of the information obtained, • Provision that makes authorization to access the computer conditional on that access being for proper purposes and not for improper purposes, and retroactively revoking that authorization if for an improper purpose • Supreme Court? www.brittontuma.com 58
  • 59. Pulte Homes, Inc. v. Laborers’ International Union of North America (6th Cir. 2011) • An “intentional transmission” case – not unauthorized access • After Pulte fired a union employee the union orchestrated a barrage of emails, telephone calls, and faxes that were so voluminous that it shut down Pulte’s computer system and telephones, interfering with its business • Violated § 1030(a)(5)(A): “knowingly cause the transmission of a program, information, code, or command, and as a result of such conduct, intentionally cause damage without authorization, to a protected computer.” • Think about the implications: emails, calls, faxes? www.brittontuma.com 59
  • 61. Hacking, Data Breach & Privacy • Hacking = biggest news event of 2011 • 46 States  Breach Notification Laws • Administration & Congress want to act • Employers asking for social media logins • Vehicle of choice is to amend the CFAA – but has lost a lot of steam since 2011 www.brittontuma.com 61
  • 62. Unauthorized Access Amendment • Proposed Amendment in Senate last Fall • Resolve disagreements about Unauthorized Access • Felony-level unauthorized access can’t be solely premised on violation of a contractual obligation or agreement • This proposal would narrow the CFAA www.brittontuma.com 62
  • 63.  Why? Remember what Jobs said  CFAA is very broad and covers all kinds of computer misuse (sometimes)  CFAA is complex with lots of pitfalls  Proposed Amendments to broaden and tighten the CFAA  Courts’ interpretation of the CFAA is changing all the time – you must stay updated! www.brittontuma.com 63
  • 64. 64

Notas del editor

  1. Good afternoon, thank you all very much for having me here to speak today. My name is Shawn Tuma and I am an attorney at BrittonTuma in Plano – excited to announce in a few weeks we will be moving in to the Shops at Legacy so anyone who needs to come have an excuse for happy hour on a patio – I mean a meeting with some attorneys – please let us know! I have a peculiar interest in the Computer Fraud and Abuse Act and have been watching as it has developed over the last several years and then, within the last 6 mos. or so has become one of the most relevant laws anywhere.
  2. Who knows what movie this was from?Anyone remember?Early 80s – 1983
  3. Movie War Games!
  4. The first stab at the CFAA was this.Began to fear that with advancing technology the wire and mail fraud laws wouldn’t be sufficient.
  5. Then we get the CFAA
  6. Why? Because this is the primary law that is used to pursue those who misuse a computer to commit crimes, defraud, etc. Computers are everywhere and are involved in virtually everything!
  7. CFAA’s definition of computer:Remember the “But”!!!
  8. Protected Computer – more narrowLimits – some, for nowThink of homes where everything is automated via connection to the internet.
  9. TI-99 was my first computer in early 80s.Daughter Clara (who started kindergarten today) has a Leapster!
  10. To put it into perspective, compare the fastest desktop of the 80s withClara’s LeapsterCray SupercomputeriPhone 4!Now you see why, what seem silly to us today, clearly falls within the technical criteria for what the drafters initially considered to be a computer.
  11. Now that we know what it applies to, let’s take about what the CFAA prohibits.
  12. This is an overly broad generalization but, generally speaking, the CFAA prohibits wrongfully accessing a computer where the person
  13. Not too long ago I was talking with someone about a case they had involving criminal indictment for the CFAA.I offered help but was rebuffed – told: “I’ve read the statute, I’ve got it”Ok – best of luck to you (and your clients!)!
  14. What would your advice, as a lawyer, be in this situation?
  15. Why? (Remember what Steve Jobs said last December – everything has a computer in it nowadays!)The CFAA is what is most commonly used to deal with misuse of computers.
  16. Presentation slides – available at www.brittontuma.comThis was taken from an article coming out in Fall 2011 in the University of South Carolina Law Review – the article will also be available once it is published.