Note: this article was previously posted on Norse’s DarkMatters. A Florida middle school student’s prank — with a computer — resulted in his being arrested and charged with felony “hacking.” His crime? He used teacher’s password to login and change the desktop background on the computer.
Tag: computer fraud
3 Important Points on Computer Use Policies
IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today’s businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are…
How a Small Law Firm was Used for an Extensive Cyberattack
TO GET TO THE POINT (click here) INTRODUCTION I recently had the pleasure of reading a guest blog post on Peter Vogel‘s Internet, Information Technology & e-Discovery Blog that was authored by John Ansbach. This alone is important because I have a world of respect for Peter and John.
Law Firm Cybersecurity: I Hate to Say I Told You So But …
Hey! Any chance you’ve heard anything in the news lately about law firms being under cyber attack? If not, first, crawl out from under that rock; second, take a look at these articles. Wow. Can you believe it? Law firms? Under cyber attack? What is this world coming to?
3 Key Takeaways About Texas’ Unauthorized Access Law
The Dallas Court of Appeals recently decided a civil case involving claims under Texas’ unauthorized access of computer law that provides some helpful guidance for this relatively new law that has very little case law construing it. The 3 takeaways that follow are the key legal principles that apply to this law as set forth…
Court Order Provides CFAA Authorization to Access Computer, Even if Later Overturned
A party who accesses a computer pursuant to a court order authorizing him to seize and access the computer will not be found in violation of the Computer Fraud and Abuse Act if such order is later overturned. “An essential element of a CFAA claim under 10 U.S.C. § 1030 is that the [defendant] accesses a…
Would increasing CFAA penalties via the CISA Amendment really even help? I don’t think so.
As the Cybersecurity Information Sharing Act (CISA) is making its way through the Senate, it has stirred up more controversy with Senator Sheldon Whitehouse’s proposed amendment to the Computer Fraud and Abuse Act (CFAA), that he argues, would give law enforcement more tools to fight hackers. The Amendment would provide for increased sentences (up to…
Does the CFAA Apply to Lenovo’s SuperFish Malware Lawsuits?
For me personally, the timeline of events surrounding the discovery of Lenovo’s SuperFish malware is ironic. Just a couple of days before it was discovered, I had a telephone call with a friend named Jon Stanley. Jon is someone I consider to be an elder statesman of the CFAA as he has been digging deep…
Will Changes to the CFAA Deter Hackers? | Norse DarkMatters
Read my latest post on Norse’s DarkMatters: Will Changes to the CFAA Deter Hackers?
Honored to be part of the Team: From 44 Felony Counts to One Misdemeanor, Plea Entered in U.S. v. Salinas CFAA Case
A plea deal has been entered in the case of US v. Salinas. Mr. Salinas’ legal team successfully negotiated an agreement that reduced a 44 felony count indictment down to a single misdemeanor count. Tor Ekeland led Salinas’ legal team and did the heavy lifting on getting this deal done. I am honored that Tor invited…
You must be logged in to post a comment.