Works matching DE "COMPUTER fraud laws"
Results: 31
PROCESAL PENAL.
- Published in:
- Actualidad Jurídica (1578-956X), 2013, n. 34, p. 231
- Publication type:
- Article
UNDERSTANDING THE COMPLEXITIES OF CIVIL DISOBEDIENCE FOR CYBERSPACE PROTESTS IN THE CASE OF AARON SWARTZ.
- Published in:
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 2, p. 196
- By:
- Publication type:
- Article
COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Publication type:
- Article
AARON'S LAW: BRINGING SENSIBILITY TO THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Southern Illinois University Law Journal, 2014, v. 38, n. 3, p. 469
- By:
- Publication type:
- Article
The Computer Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work.
- Published in:
- National Security & Armed Conflict Law Review, 2014, p. 145
- By:
- Publication type:
- Article
NARROWING IT DOWN TO ONE NARROW VIEW: CLARIFYING AND LIMITING THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Charleston Law Review, 2013, v. 7, n. 3, p. 489
- By:
- Publication type:
- Article
"OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
CRIMINALIZING HACKING, NOT DATING: RECONSTRUCTING THE CFAA INTENT REQUIREMENT.
- Published in:
- Journal of Criminal Law & Criminology, 2013, v. 103, n. 3, p. 907
- By:
- Publication type:
- Article
Protecting Deceptive Academic Research Under the Computer Fraud and Abuse Act.
- Published in:
- Yale Law & Policy Review, 2018, v. 37, n. 1, p. 385
- By:
- Publication type:
- Article
Survey of Computer Fraud and Abuse Act Cases.
- Published in:
- Business Lawyer, 2011, v. 67, n. 1, p. 321
- By:
- Publication type:
- Article
TWENTY YEARS OF WEB SCRAPING AND THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 372
- By:
- Publication type:
- Article
A HYBRID APPROACH TO ANALYZING AUTHORIZATION IN THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Journal of Science & Technology Law, 2015, v. 21, n. 2, p. 357
- By:
- Publication type:
- Article
Communications Policy and Cultural Political Economy: Charting the Collapse of the Neoliberal Consensus in the United States.
- Published in:
- International Journal of Communication (19328036), 2021, v. 15, p. 3698
- By:
- Publication type:
- Article
SHOOTING THE MESSENGER: REMEDIATION OF DISCLOSED VULNERABILITIES AS CFAA "LOSS".
- Published in:
- Richmond Journal of Law & Technology, 2023, v. 29, n. 1, p. 89
- By:
- Publication type:
- Article
BROKEN.
- Published in:
- Harvard Journal of Law & Technology, 2019, v. 32, n. 2, p. 479
- By:
- Publication type:
- Article
It's Not Just Physical: Finding a Neutral Interpretation of Authorization Under the Computer Fraud and Abuse Act.
- Published in:
- ABA Journal of Labor & Employment Law, 2014, v. 29, n. 2, p. 373
- By:
- Publication type:
- Article
WHAT DOES THIS MEAN? EXAMINING LEGISLATIVE AMBIGUITIES IN THE CYBERSECURITY ACT OF 2015 AND THE POTENTIAL FOR A FUTURE CIRCUIT SPLIT ON INTERPRETATION.
- Published in:
- Seton Hall Law Review, 2018, v. 48, n. 1, p. 275
- By:
- Publication type:
- Article
A FORTRESS MADE OF CLOUDS: COPYRIGHT LAW, THE COMPUTER FRAUD AND ABUSE ACT, AND CLOUD COMPUTING.
- Published in:
- Southern Law Journal, 2016, v. 26, n. 2, p. 191
- By:
- Publication type:
- Article
CYBER NEUTRALITY: A TEXTUAL ANALYSIS OF TRADITIONAL JUS IN BELLO NEUTRALITY RULES THROUGH A PURPOSEBASED LENS.
- Published in:
- Air Force Law Review, 2014, v. 71, p. 69
- By:
- Publication type:
- Article
REINING IN THE ROGUE EMPLOYEE: THE FOURTH CIRCUIT LIMITS EMPLOYEE LIABILITY UNDER THE CFAA.
- Published in:
- American University Law Review, 2013, v. 62, n. 5, p. 1417
- By:
- Publication type:
- Article
A VAGUE LAW IN A SMARTPHONE WORLD: LIMITING THE SCOPE OF UNAUTHORIZED ACCESS UNDER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- American University Law Review, 2012, v. 61, n. 5, p. 1543
- By:
- Publication type:
- Article
Exceeding Authorized Access in the Workplace: Prosecuting Disloyal Conduct Under the Computer Fraud and Abuse Act.
- Published in:
- American Business Law Journal, 2013, v. 50, n. 2, p. 281, doi. 10.1111/ablj.12010
- By:
- Publication type:
- Article
The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring.
- Published in:
- American Business Law Journal, 2011, v. 48, n. 2, p. 285, doi. 10.1111/j.1744-1714.2011.01116.x
- By:
- Publication type:
- Article
COMPUTER HACKERS ON THE CUL-DE-SAC: MYSPACE SUICIDE INDICTMENT UNDER THE COMPUTER FRAUD AND ABUSE ACT SETS DANGEROUS PRECEDENT.
- Published in:
- Widener Law Review, 2011, v. 17, n. 1, p. 261
- By:
- Publication type:
- Article
Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act.
- Published in:
- University of Chicago Law Review, 2020, v. 87, n. 5, p. 1437
- By:
- Publication type:
- Article
Virtual Reality Exceptionalism.
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 20, n. 3, p. 839
- By:
- Publication type:
- Article
Hacking into Federal Court: Employee "Authorization" Under the Computer Fraud and Abuse Act.
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2011, v. 13, n. 3, p. 543
- By:
- Publication type:
- Article
Hacking into the Computer Fraud and Abuse Act: The CFAA at 30.
- Published in:
- 2016
- By:
- Publication type:
- Speech
COMPUTER FRAUD AND ABUSE OR PROSECUTORIAL FRAUD AND ABUSE: TIME FOR CHANGE.
- Published in:
- Journal of Law, Technology & the Internet, 2014, v. 6, n. 1, p. 67
- By:
- Publication type:
- Article
CRIME IN THE EVOLVED DIGITAL AGE.
- Published in:
- Journal of Technology Law & Policy, 2015, v. 20, n. 1, p. 19
- By:
- Publication type:
- Article
SPOILING FOR A FIGHT: HACKING BACK WITH THE ACTIVE CYBER DEFENSE CERTAINTY ACT.
- Published in:
- South Dakota Law Review, 2020, v. 65, n. 3, p. 467
- By:
- Publication type:
- Article