Basic Elements of a Computer Fraud and Abuse Act – “Fraud” Claim

The Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030, is predominately a criminal law that also permits those who have suffered a “damage” or “loss” to bring civil claims for its violations. The CFAA has a list of prohibitions but the most common one that individuals and business use for civil claims is contained in subsection (a)(4) of the CFAA, what I call the “fraud” provision, which is violated by:

Whoever … knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period; (18 U.S.C. § 1030(a)(4))

Sounds pretty simple, eh?

Ha! Guess again — there is nothing simple about it!

There are tens of thousands of pages case law and commentary attempting to explain all of the nuances involved in the prosecution or defense of a civil claim under this fraud provision of the CFAA. Even the United States Circuit Courts of Appeal cannot all agree on how it should be applied, much less the numerous United States District Courts still struggling with the issues. To provide even a cursory overview of this subject would require the volume of a lengthy law review article (which, by the way, I am currently writing).

The purpose of this post is not to overwhelm the reader with all of the details — trust me, I know that all 3 of you who actually read this would never come back! Plus, that is what my law review article will be for–to save readers money by their not having to purchase Ambien to go to sleep! But seriously …

With so much talk about computer fraud and hacking in the news these days, I simply want to give you “40,000 foot overview” of what elements must be proven, in very generic terms, to state a claim under this fraud provision of the CFAA. Here goes, hot off the press from a case handed down on March 30, 2011 stating that a claim under subsection (a)(4) the CFAA has four elements:

  1. a defendant has accessed a protected computer;
  2. has done so without authorization or by exceeding such authorization as was granted;
  3. has done so knowingly and with intent to defraud; and
  4. as a result has furthered the intended fraud and obtained anything of value.

Scottrade, Inc. v. Broco Investments, Inc., 10 Civ. 03 537, 2011 WL 1226467 *9 (S.D.N.Y. Mar. 30, 2011).

“Complex, but it has only 4 elements?” you say? Yeah, I here ya–I know, we lawyers have a way of overly complicating everything, so if you don’t believe me, just go give it a try yourself and tell me how it works out for you when that Federal Judge says “so, was it access without authorization or access by exceeding authorization?”

Published by Shawn E. Tuma

Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at stuma@spencerfane.com.

Join the Conversation

12 Comments

  1. I look forward to reading your ‘long review’, and learning more about this subject, though it likely is not the same here in Canada. In just a period of 4 years, I had my credit card info from the internet, stolen, 3 times! I was really ticked about it. I was so lucky that my credit card companies knew my spending history, and having a perfect credit rating, so contacted me as soon as something fishy showed up. These thieves are so darn smart and good at their job, I think it has to be very difficult to keep a step ahead of them. Really tough laws need to be implemented, and even with tough laws, they will figure them out quickly as well, and things will have to be changed yet again to protect us. A vicious circle all around.

Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Business Cyber Risk

Subscribe now to keep reading and get access to the full archive.

Continue reading