- Journal Archives
- Volume 19
- Volume 18
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
- 2016-2017 Symposium
- 2015-2016 Symposium
- 2014-2015 Symposium
- 2013-2014 Symposium
- 2012-2013 Symposium
- 2011-2012 Symposium
- 2010-2011 Symposium
- 2009-2010 Symposium
- 2008-2009 Symposium
- 2007-2008 Symposium
Last week the US District Court for the Northern District of California dismissed a case under the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, thereby contributing to an ever-growing debate [PDF] about the meaning of the words “exceeding authorized access.”
Despite the fact that the CFAA defines “exceeding authorized access,” the federal courts of appeals disagree as to what actions those words proscribe. Some circuits focus on “authorized access,” looking to whether the individual under fire took disallowed measures to gain control over digital content. Other circuits focus on the portion of the CFAA’s definition that refers to “obtain[ing] or alter[ing] information in the computer that the accesser is not entitled so to obtain or alter.”
To clarify the dispute, imagine a file cabinet in a locked room. The first group of circuits focuses on who has a key. If you don’t have a key, then any access of the file cabinet violates the CFAA. If you have a key, then nothing you do with the files runs afoul of the CFAA — though that doesn’t rule out contract, trade secret, or other types of disputes.
The second group of circuits focuses on the files in the cabinet. Just like the first group, if you don’t have a key, any access of the files violates the CFAA. But unlike the first group, people who were granted access with a key can still run into trouble if they use the files in a way that is contrary to a preexisting employer-employee agreement.
Though neither side fully conforms with the statutory language (perhaps, because poor drafting makes such compliance impossible), the first group seems to have the better option.
First, by focusing on who has a key, the “access” regime is far more administrable. There would only be one critical piece of evidence in the case: the key.
Second, employees would have more notice under the “access” regime. Rather than having to refer to largely arcane, frequently updated use agreements, individuals need only heed “access denied” prompts in order to comply with the CFAA (note, though, the interesting case of a technical admission to a computer system mistakenly granted to a non-worthy accesser).
Lastly, the “access” regime reins in an otherwise scary scenario in which each and every employer defines the scope of the CFAA. That is to say, under the “obtains and alters” regime, each individual company’s employer-employee use agreement demarcates the boundaries of the CFAA. Certainly, it is advantageous to all to avoid a world in which companies may unilaterally expand or contract the scope of legislation (and especially so when it has implications for felony criminal liability, as do the definitions in the CFAA).
The circuits have made little progress toward resolving this split, and the results of a case truly vary depending on which regime a court applies. As of yet, the Supreme Court has granted no certiorari petition on the issue. But, given the ubiquitous nature of digital databases, which gave rise to the CFAA in the first place, it is doubtful that this issue will fade away in the absence of Supreme Court attention.
Recent Blog Posts
- Police Body Cameras: Just Another Tool for Mass Surveillance?
- NY AG Warns Developers of Popular Health Apps Who Can’t Support Their Marketing Claims: “My Office Will Not Hesitate to Take Action.”
- Take After Will Smith by Keeping Your Driving Skills Polished (At Least for Now)
- Will Patent Litigation Still be Big in Texas? The Supreme Court Hears Arguments for TC Heartland v. Kraft Foods Group Brands
- Lyft, Drivers Settle; Punt Million Dollar Employee vs. Independent Contractor Classification Question Into the Future.
- Cybersecurity for Autonomous Vehicles
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution