The Computer Fraud and Abuse Act, 18 U.S.C. §1030 et seq., was enacted in 1984 (and amended multiple times thereafter) to target hackers who accessed computers to steal information or disrupt network functionality. Over 25 years later, the interpretation of the statute continues as litigants attempt to expand the act’s reach to new factual scenarios in a rapidly changing computerized world.
For example, the issue of what constitutes “unauthorized access” under the statute, particularly as it relates to employer-employee relationships and proprietary database misuse, has come under the judicial microscope during the past several years, resulting in varying approaches in the federal courts.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Not a Bloomberg Law Subscriber?
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]m