A Code-Based Approach to Unauthorized Access Under the Computer Fraud Abuse Act
نویسنده
چکیده
Thirty years ago, Congress passed the Computer Fraud and Abuse Act ("CFAA ") to combat the emerging problem of computer crime. The statute's core prohibitions targeted one who "accesses" a computer "without authorization" or who "exceeds authorized access." Over time, the incremental statutory changes and large-scale technological changes have dramatically expanded the potential scope of the CFAA. The question of what constitutes unauthorized access has taken on far greater significance than it had thirty years ago, and courts remain deeply divided on this question. This Article explores the text, purpose, and history of the CFAA, as well as a range of normative considerations that should guide interpretation of the statute. This Article concludes that courts should pursue a narrow and "code-based" understanding of unauthorized access under the CFAA-both in terms of what it means to access a computer without authorization and in terms of what it means to exceed authorized access. The CFAA has strayed far from its original purpose: Congress failed to define key terms in the CFAA, and courts have overlooked limiting principles within the statute. From a normative perspective, even if it is desirable to provide owners of networked computer systems with stronger legal protection for their systems, the CFAA's unauthorized access provisions are not the proper vehicle for doing so.
منابع مشابه
Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study
Background We aimed to identify the indicators of healthcare fraud and abuse in general physicians’ drug prescription claims, and to identify a subset of general physicians that were more likely to have committed fraud and abuse. Methods We applied data mining approach to a major health insurance organization dataset of private sector general physicians’ prescription claims. It involved 5 ste...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملWhy Offensive Security Needs Engineering Textbooks
Offensive security—or, in plain English, the practice of exploitation—has greatly enhanced our understanding of what it means for computers to be trustworthy. Having grown from hacker conventions that fit into a single room into a distinct engineering discipline in all but the name, offensive computing has so far been content with a jargon and an informal “hacker curriculum”. Now that it is unm...
متن کاملConsenting to Computer Use
The federal Computer Fraud and Abuse Act ("CFAA ") makes it a crime to "access[] a computer without authorization or exceed[] authorized access." Courts and commentators have struggled to explain what types of conduct by a computer user are "without authorization." But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a...
متن کاملBeyond WarGames: How the Computer Fraud and Abuse Act Should Be Interpreted in the Employment Context
The nation's most impoitant computer crime statute, the Computer Fraud and Abuse Act of 1986 ("CFAA"), has made its way into the employment relationship. This has generated a surge of academic alarm and more than a few confused courts. The legal quandary, however, comes down to a single word: "authorization." What does it mean to have it? When does an employee lose it? And why should it matter ...
متن کامل