AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
The officer and the government agreed that the officer accessed the computer with authorization, but they disagreed on whether he was "entitled so to obtain" the information. The term "exceeds authorized access" means "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter," according to the statute. The question in the case was whether the officer's conduct "exceeds authorized access" under the CFAA. He used valid credentials to access information he was authorized to obtain, but he did so for non-law-enforcement purposes, which violated a department policy. In this case, a police officer allegedly accepted money from a criminal to log into a law-enforcement database and search for a license plate number. United States focuses on how to interpret the CFAA, which generally targets computer hackers and makes it a crime to intentionally access a computer without authorization or to exceed authorized access. Here's what employers need to know about the ruling. "This is a common concern in business settings, where employees have daily access to work computers and proprietary data," noted Scott Wenner, an attorney with Schnader in New York City and San Francisco. ![]() ![]() ![]() However, the court said, the act does not cover people who misuse information that is otherwise available to them. Supreme Court found that a person violates the CFAA when he or she accesses a computer with authorization but obtains information-such as files, folders or databases-located in areas of the computer that are off-limits to him or her. Do employees who are authorized to access information on a work computer violate the Computer Fraud and Abuse Act (CFAA) if they use such information for unauthorized purposes?
0 Comments
Read More
Leave a Reply. |