One of the major presentations/requirements in the IS Policy class is the presentation about policy creation for a specific topic. I chose the topic on Property, Privacy and Ethics since it overlaps with information security. 75 more words
Tags » CFAA
To have a valid CFAA claim, there must be an access to a computer.
The Computer Fraud and Abuse Act is often referred to as an “access crime” because the act that is prohibited is accessing a computer. 255 more words
Using Single Individual Password to Access News Site to Share Info With Others is Not CFAA Interruption of Service
A person’s use of his single individual use password to access a news site to access content that he then shared with over 100 other people did not cause any impairment to the integrity or availability of data or loss due to interruption of service as required to bring a civil claim under the Computer Fraud and Abuse Act. 12 more words
96 more words
The U.S. Eastern District of Louisiana recently sided with employers in the on-going judicial debate over interpreting the Computer Fraud and Abuse Act “CFAA”. See Associated Pump & Supply Co., LLC v.
85 more words
On April 24, 2013, a jury convicted Defendant David Nosal of three counts of computer fraud in violation of the Computer Fraud and Abuse Act “CFAA”, 18 U.S.C.
Lack of $5k Loss Leads to Dismissal of CFAA Claim Against Ex-Spouse for Surreptitious Computer Monitoring
In Morgan v. Preston, 2013 WL 5963563 (M.D. Tenn. Nov. 7 2013), the U.S. District Court for the Middle District of Tennessee dismissed a Computer Fraud and Abuse Act claim brought by one ex-spouse against the other. 93 more words