z-logo
open-access-imgOpen Access
Interpreting the Computer Fraud and Abuse Act
Author(s) -
Lee Goldman
Publication year - 2012
Publication title -
pittsburgh journal of technology law and policy
Language(s) - English
Resource type - Journals
ISSN - 2164-800X
DOI - 10.5195/tlp.2012.104
Subject(s) - computer fraud , wrongdoing , hacker , scope (computer science) , computer security , computer science , internet privacy , law , business , political science , programming language
Computers play an integral role in today’s society.  While computers provide many benefits, they are increasingly used as tools for wrongdoing, causing estimated losses of billions of dollars each year. Computer hackers can, among other things, fraudulently alter accounts, steal business or personal information, and corrupt or disable computer systems.  Congress enacted and has repeatedly amended the Computer Fraud and Abuse Act (“CFAA”) to combat the increasing proliferation of computer crimes. This article argues that the Courts of Appeals have not adequately interpreted the foundational terms of the Act and recommends an interpretation of the Act that builds upon the narrower definitions to comprehensively define the scope of the Act’s coverage.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here