SlideShare a Scribd company logo
1 of 60
Computer Fraud andAbuse Act A Lunch Sampler With A Little Something For Everyone Dallas Bar Association Computer Law Section August 22, 2011 Shawn E. Tuma www.shawnetuma.com
2 Wouldn’t be the first time
3 Enjoy!
4 Something for every practice ,[object Object]
Criminal Lawyers
Employment Lawyers
Family Lawyers
In-house Counsel
Business & Transactional Lawyers
Technology & Privacy Lawyerswww.shawnetuma.com
5 Topics to be covered ,[object Object]
Why?
What Does the CFAA Prohibit?
Most Controversial Issues Under CFAA
Examples of Most Common CFAA Violations
Proposed Amendments to the CFAAwww.shawnetuma.com
6 Brief history of the cfaa www.shawnetuma.com
7 History of CFAA www.shawnetuma.com
8 History of CFAA www.shawnetuma.com
9 History of CFAA Comprehensive Crime Control Act of 1984 ,[object Object]
Wire & mail  fraud
Response to movie War Gameswww.shawnetuma.com
10 History of CFAA Computer Fraud and Abuse Act of 1986 ,[object Object]
Criminal only
3 major amendments (9 total)
Added private cause of action in ’94
2008 most recentwww.shawnetuma.com
11 Why? Why is the Computer Fraud and Abuse Act important? ,[object Object]
Computers … www.shawnetuma.com
12 Steve Jobs says … Do you know who Steve Jobs is? Do you know what Steve Jobs recently said? “Everything has a computer in it nowadays.”  www.shawnetuma.com
13 What is a Computer? www.shawnetuma.com
14 What is a computer? The CFAA says “the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …” “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;” www.shawnetuma.com
15 What is a computer? The Fourth Circuit says “If a device is ‘an electronic … or other high speed data processing device performing logical, arithmetic, or storage functions,’ it is a computer.  This definition captures any device that makes use of an electronic data processor, examples of which are legion.” -United States v. Kramer www.shawnetuma.com
16 What is a computer? What about www.shawnetuma.com
17 Anything with a microchip The Fourth Circuit says “’Just think of the common household items that include microchips and electronic storage devices, and thus will satisfy the statutory definition of “computer.”’ “’That category can include coffeemakers, microwave ovens, watches, telephones, children’s toys, MP3 players, refrigerators, heating and air-conditioning units, radios, alarm clocks, televisions, and DVD players, . . . .” -United States v. Kramer www.shawnetuma.com
18 What is a “protected” computer? The CFAA applies only to “protected” computers This may limit the problem of applying it to alarm clocks, toasters, and coffee makers Protected = connected to the Internet Any situations where these devices are connected? www.shawnetuma.com
19 Perspective ,[object Object]
3.3 MHz Processor
16 KB of RAM
Leap Frog Leapster
96 MHz Processor
128 MB of RAM
iPhone 4
800 MHz Processer
512 MB of RAMwww.shawnetuma.com
20 Perspective 66 MHz = fastest desktop in 80s 96 MHz = child’s toy today 250 MHz = fastest super computer in 80s 800 MHz = standard telephone today www.shawnetuma.com
21 What does the cfaa prohibit? www.shawnetuma.com
22 Statutory Language CFAA prohibits the access of a protected computer that is ,[object Object]
Exceeds authorized accesswww.shawnetuma.com
23 Statutory Language Where the person accessing ,[object Object]
Commits a fraud
Obtains something of value
Transmits damaging information
Causes damage
Traffics in passwords
Commits extortionwww.shawnetuma.com
24 Very Complex Statute “I am the wisest man alive, for I know one thing, and that is that I know nothing.” -Socrates ,[object Object]
Very complex statute
Superficially it appears deceptively straightforward
Many pitfallswww.shawnetuma.com

More Related Content

What's hot

The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminati
Riaz Zalil
 
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection LawsChapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
UAF_BA330
 
Sedition Act Act 15
Sedition Act Act 15Sedition Act Act 15
Sedition Act Act 15
Aki Haris
 

What's hot (20)

H.E. HRH Ernest Rauthschild
H.E. HRH Ernest RauthschildH.E. HRH Ernest Rauthschild
H.E. HRH Ernest Rauthschild
 
UAPA and Constituition
UAPA and ConstituitionUAPA and Constituition
UAPA and Constituition
 
Scientology
ScientologyScientology
Scientology
 
The secret order of the illuminati
The secret order of the illuminatiThe secret order of the illuminati
The secret order of the illuminati
 
Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law Privacy , defamation; sting operation Under Media Law
Privacy , defamation; sting operation Under Media Law
 
Effect of media trial in the society
Effect of media trial in the society Effect of media trial in the society
Effect of media trial in the society
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
The Use of Law of Sedition and Unlawful Activities by Government of India Da...
The Use of Law of Sedition and Unlawful Activities by Government  of India Da...The Use of Law of Sedition and Unlawful Activities by Government  of India Da...
The Use of Law of Sedition and Unlawful Activities by Government of India Da...
 
Copyright in performance
Copyright in performanceCopyright in performance
Copyright in performance
 
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection LawsChapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Sedition Act Act 15
Sedition Act Act 15Sedition Act Act 15
Sedition Act Act 15
 
March on Washington
March on WashingtonMarch on Washington
March on Washington
 
Introduction to human rights with a special focus on indian constitution, uni...
Introduction to human rights with a special focus on indian constitution, uni...Introduction to human rights with a special focus on indian constitution, uni...
Introduction to human rights with a special focus on indian constitution, uni...
 
BLACK SULU ISLAMIC GOLD LOAN
BLACK SULU ISLAMIC GOLD LOANBLACK SULU ISLAMIC GOLD LOAN
BLACK SULU ISLAMIC GOLD LOAN
 
ORIGINAL ROYAL ICJ-ICC/ QUO WARRANTO
ORIGINAL ROYAL ICJ-ICC/ QUO WARRANTOORIGINAL ROYAL ICJ-ICC/ QUO WARRANTO
ORIGINAL ROYAL ICJ-ICC/ QUO WARRANTO
 
criminalization of politics
 criminalization of politics criminalization of politics
criminalization of politics
 
Constitution
ConstitutionConstitution
Constitution
 
EXIGENCIES AND AMERICA'S CAMPAIGN TO CREATE A MASTER RACE
 EXIGENCIES AND AMERICA'S CAMPAIGN TO CREATE A MASTER RACE EXIGENCIES AND AMERICA'S CAMPAIGN TO CREATE A MASTER RACE
EXIGENCIES AND AMERICA'S CAMPAIGN TO CREATE A MASTER RACE
 
Child protection- Social action litigation as a catalyst
Child protection- Social action litigation as a catalystChild protection- Social action litigation as a catalyst
Child protection- Social action litigation as a catalyst
 

Similar to Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)

Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 

Similar to Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11) (20)

Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...Overview and Update on the Computer Fraud and Abuse Act (CFAA)  for the Data ...
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Website Compliance 2009
Website Compliance 2009Website Compliance 2009
Website Compliance 2009
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ppt by
Ppt by Ppt by
Ppt by
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer FraudFraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Newethics
NewethicsNewethics
Newethics
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 

More from Shawn Tuma

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)

Editor's Notes

  1. Good afternoon, thank you all very much for having me here to speak today. My name is Shawn Tuma and I am an attorney at Shields, Britton & Fraser in Plano.I have a peculiar interest in the Computer Fraud and Abuse Act and have been watching as it has developed over the last several years and then, within the last 6 mos. or so has become one of the most relevant laws anywhere.
  2. First CLE presentationApril 2000 – Y2K Litigation!
  3. Today giving you a sampler platter!A broad overview with enough information that will valuable to all lawyers, regardless of practice.
  4. Who knows what movie this was from?Anyone remember?Early 80s - 1983
  5. Movie War Games!
  6. The first stab at the CFAA was this.Began to fear that with advancing technology the wire and mail fraud laws wouldn’t be sufficient.
  7. Then we get the CFAA
  8. Why? Because this is the primary law that is used to pursue those who misuse a computer to commit crimes, defraud, etc. Computers are everywhere and are involved in virtually everything!
  9. CFAA’s definition of computer:Remember the “But”!!!
  10. Protected Computer – more narrowLimits – some, for nowThink of homes where everything is automated via connection to the internet.
  11. TI-99 was my first computer in early 80s.Daughter Clara (who started kindergarten today) has a Leapster!
  12. To put it into perspective, compare the fastest desktop of the 80s withClara’s LeapsterCray SupercomputeriPhone 4!Now you see why, what seem silly to us today, clearly falls within the technical criteria for what the drafters initially considered to be a computer.
  13. Now that we know what it applies to, let’s take about what the CFAA prohibits.
  14. This is an overly broad generalization but, generally speaking, the CFAA prohibits wrongfully accessing a computer where the person
  15. Not too long ago I was talking with someone about a case they had involving criminal indictment for the CFAA.I offered help but was rebuffed – told: “I’ve read the statute, I’ve got it”Ok – best of luck to you (and your clients!)!
  16. What would your advice, as a lawyer, be in this situation?
  17. Have you heard these words lately???
  18. Personal Information – PI = your name and a combination of the other information.
  19. This is what is currently the most common proposed amendments.
  20. Who knows what this beauty is?Better yet, who knows why I have included it?
  21. Why? (Remember what Steve Jobs said last December – everything has a computer in it nowadays!)The CFAA is what is most commonly used to deal with misuse of computers.
  22. Presentation slides – available on my website: www.shawnetuma.comThis was taken from an article coming out in Fall 2011 in the University of South Carolina Law Review – the article will also be available once it is published.