We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
A Trespass Framework for the Crime of Hacking.
- Authors
Goldfoot, Josh; Bamzai, Aditya
- Abstract
Computer crime statutes prohibit accessing a computer without "authorization. " In recent years, this element has attracted considerable controversy, with some courts expressing concern that "authorization" is so indeterminate that the Computer Fraud and Abuse Act ("CFAA") is void for vagueness. This Article argues that "authorization" under the CFAA has the same meaning as authorization under criminal physical trespass laws. This approach is more straightforward than the alternatives currently offer, and it aligns with Congress's announced intention to bring physical trespass law to computer networks. Although interpreting "authorization" under the CFAA can be difficult, near-identical difficulties also arise in the context of physical trespass. As a result, questions under the CFAA can be resolved by looking to the resolution of similar questions in the context of physical trespass. In addition, because both physical trespass and the CFAA require proof that the defendant knew his access was unauthorized, the merits of a void-for-vagueness challenge to computer trespass rise and fall with the merits of a similar challenge to physical trespass. Given the pedigree of the latter, a constitutional challenge to the former seems questionable.
- Subjects
UNITED States; TRESPASS -- Law &; legislation; COMPUTER hacking -- Law &; legislation; COMPUTER Fraud &; Abuse Act, 1984; COMPUTER access control; VAGUENESS doctrine (Constitutional law); STATE statutes (United States); CONSTITUTIONAL law; COMPUTER crimes; COMPUTER crime laws; LAW; ACTIONS &; defenses (Law)
- Publication
George Washington Law Review, 2016, Vol 84, Issue 6, p1477
- ISSN
0016-8076
- Publication type
Article