Works matching Computer Fraud %26 Abuse Act, 1984
Results: 97
SOCIAL MEDIA AND FEDERAL PROSECUTION: A CIRCUIT SPLIT ON CYBERCRIME AND THE INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- University of Cincinnati Law Review, 2018, v. 86, n. 1, p. 315
- By:
- Publication type:
- Article
IN DEFENSE OF SNOOPING EMPLOYERS.
- Published in:
- University of Pennsylvania Journal of Business Law, 2014, v. 16, n. 2, p. 551
- By:
- Publication type:
- Article
Hacktivism -- Political Dissent in the Final Frontier.
- Published in:
- New England Law Review, 2015, v. 49, n. 2, p. 259
- By:
- Publication type:
- Article
United States v. Nosal and the CFAA: What Does DailySudoku.com Have to Do with Computer Fraud?
- Published in:
- New England Law Review, 2014, v. 48, n. 2, p. 421
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT OR THE MODERN CRIMINAL AT WORK: THE DANGERS OF FACEBOOK FROM YOUR CUBICLE.
- Published in:
- University of Cincinnati Law Review, 2013, v. 82, n. 1, p. 359
- By:
- Publication type:
- Article
When is a Hack not a Hack: Addressing the CFAA's Applicability to the Internet Service Context.
- Published in:
- University of Chicago Legal Forum, 2013, p. 633
- By:
- Publication type:
- Article
FRAUDULENT MALATTRIBUTED COMMENTS IN AGENCY RULEMAKING.
- Published in:
- Cardozo Law Review, 2020, v. 42, n. 1, p. 1
- By:
- Publication type:
- Article
Bibliographic Notes.
- Published in:
- Canadian Law Library Review, 2019, v. 44, n. 4, p. 25
- By:
- Publication type:
- Article
WHISTLEBLOWER? MORE LIKE CYBERCRIMINAL: THE COMPUTER FRAUD AND ABUSE ACT AS APPLIED TO SARBANES-OXLEY WHISTLEBLOWERS.
- Published in:
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 1, p. 120
- By:
- Publication type:
- Article
FROM INTERNET TROLLS TO SEASONED HACKERS: PROTECTING OUR FINANCIAL INTERESTS FROM DISTRIBUTED-DENIAL-OF-SERVICE ATTACKS.
- Published in:
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 2, p. 299
- By:
- Publication type:
- Article
DEFRAGGING FEMINIST CYBERLAW.
- Published in:
- Berkeley Technology Law Journal, 2023, v. 38, n. 2, p. 797, doi. 10.15779/Z38KD1QM62
- By:
- Publication type:
- Article
GATES OF COMPUTER TRESPASS.
- Published in:
- Berkeley Technology Law Journal, 2022, v. 37, n. 4, p. 1265, doi. 10.15779/Z38GT5FG8R
- By:
- Publication type:
- Article
PLATFORMS, ENCRYPTION, AND THE CFAA: THE CASE OF WHATSAPP V. NSO GROUP.
- Published in:
- Berkeley Technology Law Journal, 2021, v. 36, n. 1, p. 469, doi. 10.15779/Z384B2X554
- By:
- Publication type:
- Article
IS TRICKING A ROBOT HACKING?
- Published in:
- Berkeley Technology Law Journal, 2019, v. 34, n. 3, p. 891, doi. 10.15779/Z38M32N99Q
- By:
- Publication type:
- Article
ALGORITHMIC AUDITING AND COMPETITION UNDER THE CFAA: THE REVOCATION PARADIGM OF INTERPRETING ACCESS AND AUTHORIZATION.
- Published in:
- Berkeley Technology Law Journal, 2018, v. 33, n. 4, p. 1307, doi. 10.15779/Z38SQ8QH9J
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: PUNISHING HACKERS AND SOLVING EMPLOYMENT DISPUTES IN THE SAME STATUTE.
- Published in:
- Northern Kentucky Law Review, 2017, v. 44, n. 1, p. 83
- By:
- Publication type:
- Article
AARON'S LAW: BRINGING SENSIBILITY TO THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Southern Illinois University Law Journal, 2014, v. 38, n. 3, p. 469
- By:
- Publication type:
- Article
PREVENTING DATA BREACHES AT LAW FIRMS: ADAPTING PROACTIVE, MANAGEMENT-BASED REGULATION TO LAW-FIRM TECHNOLOGY.
- Published in:
- Arizona Law Review, 2017, v. 59, n. 4, p. 1111
- By:
- Publication type:
- Article
THE DEMISE OF THE CFAA IN DATA SCRAPING CASES.
- Published in:
- Notre Dame Journal of Law, Ethics & Public Policy, 2020, v. 34, n. 2, p. 529
- By:
- Publication type:
- Article
The Computer Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work.
- Published in:
- National Security & Armed Conflict Law Review, 2014, p. 145
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: AN ATTRACTIVE BUT RISKY ALTERNATIVE TO TEXAS TRADE SECRET LAW.
- Published in:
- St. Mary's Law Journal, 2014, v. 45, n. 3, p. 491
- By:
- Publication type:
- Article
CTRL + SHIFT: DEFINING AUTHORIZATION UNDER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- George Mason Law Review, 2019, v. 26, n. 3, p. 965
- By:
- Publication type:
- Article
Digital Gatekeepers.
- Published in:
- Texas Law Review, 2021, v. 99, n. 5, p. 951
- By:
- Publication type:
- Article
ZERO-DAY RESPONSIBILITY: THE BENEFITS OF A SAFE HARBOR FOR CYBERSECURITY RESEARCH.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2017, v. 57, n. 4, p. 483
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: HACKING INTO THE AUTHORIZATION DEBATE.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- By:
- Publication type:
- Article
PERCEPTION VERSUS PUNISHMENT IN CYBERCRIME.
- Published in:
- Journal of Criminal Law & Criminology, 2019, v. 109, n. 2, p. 313
- By:
- Publication type:
- Article
"OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
EMPLOYEE ACCESS "WITHOUT AUTHORIZATION" UNDER THE COMPUTER FRAUD AND ABUSE ACT: A CASE STUDY.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
COMMENT: UNITED STATES V. NOSAL II.
- Published in:
- Loyola of Los Angeles Entertainment Law Review, 2017, v. 37, n. 3, p. 305
- By:
- Publication type:
- Article
Protecting Deceptive Academic Research Under the Computer Fraud and Abuse Act.
- Published in:
- Yale Law & Policy Review, 2018, v. 37, n. 1, p. 385
- By:
- Publication type:
- Article
INTELLECTUAL PROPERTY.
- Published in:
- Bench & Bar of Minnesota, 2021, v. 78, n. 6, p. 35
- By:
- Publication type:
- Article
Understanding Proposed Legislation for Digital Assets.
- Published in:
- Journal of Financial Planning, 2014, v. 27, n. 4, p. 16
- By:
- Publication type:
- Article
THE NEED TO CRIMINALIZE REVENGE PORN: HOW A LAW PROTECTING VICTIMS CAN AVOID RUNNING AFOUL OF THE FIRST AMENDMENT.
- Published in:
- Chicago-Kent Law Review, 2015, v. 90, n. 1, p. 247
- By:
- Publication type:
- Article
AUTOMATION IS NOT "HACKING": WHY COURTS MUST REJECT ATTEMPTS TO USE THE CFAA AS AN ANTI-COMPETITIVE SWORD.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 416
- By:
- Publication type:
- Article
TWENTY YEARS OF WEB SCRAPING AND THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 372
- By:
- Publication type:
- Article
DATA PRIVACY REGULATION IN THE AGE OF SMARTPHONES.
- Published in:
- Touro Law Review, 2015, v. 31, n. 4, p. 981
- By:
- Publication type:
- Article
THE CHAOS OF THE CFAA: FACEBOOK'S SUCCESSFUL CFAA CLAIM AFFECTS WEBSITE OWNERS, COMPETITORS, AND YOU.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 831
- By:
- Publication type:
- Article
BIOMETRICS: THE FUTURE IS IN YOUR HANDS.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 663
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: AS CONFLICT RAGES ON, THE UNITED STATES v. NOSAL RULING PROVIDES EMPLOYERS CLEAR GUIDANCE.
- Published in:
- Loyola of Los Angeles Law Review, 2014, v. 47, n. 3, p. 901
- By:
- Publication type:
- Article
SHOOTING THE MESSENGER: REMEDIATION OF DISCLOSED VULNERABILITIES AS CFAA "LOSS".
- Published in:
- Richmond Journal of Law & Technology, 2023, v. 29, n. 1, p. 89
- By:
- Publication type:
- Article
BROKEN.
- Published in:
- Harvard Journal of Law & Technology, 2019, v. 32, n. 2, p. 479
- By:
- Publication type:
- Article
MICROSOFT THE BOTNET HUNTER: THE ROLE OF PUBLIC-PRIVATE PARTNERSHIPS IN MITIGATING BOTNETS.
- Published in:
- Harvard Journal of Law & Technology, 2014, v. 28, n. 1, p. 237
- By:
- Publication type:
- Article
HACKTIVISM AND THE FIRST AMENDMENT: DRAWING THE LINE BETWEEN CYBER PROTESTS AND CRIME.
- Published in:
- Harvard Journal of Law & Technology, 2013, v. 27, n. 1, p. 301
- By:
- Publication type:
- Article
CRIMINAL TRESPASS AND COMPUTER CRIME.
- Published in:
- William & Mary Law Review, 2020, v. 62, n. 2, p. 571
- By:
- Publication type:
- Article
USA: Preliminary Injunction on basis of Computer Fraud and Abuse Act.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 3, p. 75, doi. 10.9785/cri-2022-230304
- Publication type:
- Article
USA: Legality of Scraping Publicly Available Information.
- Published in:
- Computer Law Review International, 2020, v. 21, n. 3, p. 89, doi. 10.9785/cri-2020-210307
- Publication type:
- Article
It's Not Just Physical: Finding a Neutral Interpretation of Authorization Under the Computer Fraud and Abuse Act.
- Published in:
- ABA Journal of Labor & Employment Law, 2014, v. 29, n. 2, p. 373
- By:
- Publication type:
- Article
Abusing the Computer Fraud and Abuse Act: Why Broad Interpretations of the CFAA Fail.
- Published in:
- Hamline Law Review, 2013, v. 36, n. 1, p. 1
- By:
- Publication type:
- Article
BREAKING INTO AN EMPTY HOUSE: A THEORY OF REMEDIES FOR CFAA UNAUTHORIZED ACCESS TO NON-PROPRIETARY INFORMATION.
- Published in:
- Albany Law Review, 2018, v. 82, n. 2, p. 555
- By:
- Publication type:
- Article
PROSECUTING THE CIA: DOES THE COMPUTER FRAUD AND ABUSE ACT ALLOW FOR LIABILITY?
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- By:
- Publication type:
- Article