Tags » CFAA

Get to know our CFAA Tutors

Are you wondering who our tutors are? What makes them special? What is their tutoring philosophy?

We interviewed a few of them to find out. First is Caitlin, one of our current Graduate Assistants at the Center for Academic Achievement, and also writing, study skills and Sociology tutor. Discover more about her:

How to punish a 'hacker'? Federal prosecutors go too far in Matthew Keys case

Matthew Keys is not a nice person—at least based on his recent track record. The former Reuters employee helped to vandalize the website of the… 472 more words


Jury finds journalist guilty of aiding Anonymous in media hacking case

A journalist was found guilty by a California jury yesterday for conspiring with members of the hacker group Anonymous to alter the website of his former employer. 456 more words


Fifth Circuit: Accessing Computer Per Later-Overturned Order Does Not Violate CFAA

In Land and Bay Gauging L.L.C. v. Shor, –Fed.Appx — (5th Cir. Aug. 21, 2015), the Fifth Circuit recently held that accessing a computer under the authority of a court order that authorizes the access is sufficient to render the access as being authorized, even if the order is later overturned. 125 more words

Computer Fraud And Abuse Act

MSPOLIS - Policy Report on Property, Privacy and Ethics

One of the major presentations/requirements in the IS Policy class is the presentation about policy creation for a specific topic. I chose the topic on Property, Privacy and Ethics since it overlaps with information security. 75 more words


The CFAA Requires Access of a Computer -- Not Just Access to Information

To have a valid CFAA claim, there must be an access to a computer.

The Computer Fraud and Abuse Act is often referred to as an “access crime” because the act that is prohibited is accessing a computer. 255 more words

Computer Fraud And Abuse Act