Preview

1984 Comprehensive Crime Control Act (CFA)

Good Essays
Open Document
Open Document
1035 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
1984 Comprehensive Crime Control Act (CFA)
Objectives
After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:
• Overviewed the history of the Computer Fraud and Abuse Act (CFAA)and its objectives.
• Discussed both the broad and narrow interpretations of the law by various circuit courts.
• Analyzed the broad interpretation of the law and identified key aspects of the law that deem the CFAA unconstitutional.
• Proposed a probable solution to the broad interpretation of the law.
Summary
The author traces the CFAA history to the 1984 Comprehensive Crime Control Act (CCCA) which was narrow in scope, with the purpose to address unauthorized access computer crimes. As computers in households
…show more content…
• The author contends that the broad interpretation of the law is unconstitutional. …show more content…
In particular, that 45% of the court circuits have adopted as broad interpretation of the law while only 36% have adopted a narrow interpretation of the law (Mikulic, 2016). The cautionary tale that the author spelled out in part I of the article was in particular an eye opener. The famous hacker and “internet troll” (Lennard, 2014) Weev (Andrew Auernheimer) was “sentenced to 41 months in federal prison for revealing to media outlets that AT&T had configured its servers to allow the harvesting of iPad owners' unsecured email addresses” (EFF, 2013). Both Weev and co-defendant Daniel Spitler used “a script that [exploited] the security hole to collect roughly 120,000 email addresses” (EFF, 2013). Weev was indicted under the provisions of the CFAA law, in particular the broad interpretation of the law. In which Weev had exploited a security hole that AT&T had failed to secure. I found that the author described a strong case where millions of Americans can be punished under the broad scope of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The U.S. Patriots Act

    • 2872 Words
    • 12 Pages

    Cited: 2. "Another Cave-In on the Patriot Act." New York Times. N.p., 11 Feb. 2006. Web. 21 May 2013.…

    • 2872 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Every Year the FBI record the number of criminal acts and the number of people arrested. They call it the Uniform Criminal Act (UCR) which is the most widely used source of national crime and delinquency statistics. Many question whether it’s valid or not because less than half of all victims report the crime to the police. They came up with a solution by creating the National Crime Victimization Survey (NVS) that address the non reporting issue. NCVS collects information on crimes suffered by individuals and households. Another survey called Self-Report is used to measure the extent of delinquency. They can describe, in detail, their recent and lifetime participation in criminal activity. This report is given in groups, so they can ensure…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cyberbully Pros And Cons

    • 1037 Words
    • 5 Pages

    With the court allowing broad interpretation of CFAA for non-hacking crimes, invites the government to overextend their reach. For example the use of CFAA and its broad language has been used against disloyal employees. Ex-employees who took information from their former employer, and as act of vengeance seek to criminal charges through the CFAA. As with the Drew case, the interpretation by the court extends beyond just that case have a far larger impact upon society, giving greater power the government. Currently Circuit Courts are divided between a broad and narrow interpretation of the CFAA "The court suggested that reading the CFAA more expansively could result in potential liability for any employee who "checked the latest Facebook posting or sporting event scores in contravention of his employer's use policy."Construing the statute as one "meant to target hackers," the court held that a broader view could transform the CFAA "into a vehicle for imputing liability to workers who access computers or information in bad faith, or who disregard a use policy" (Dial, Moya, & Townsend,…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Just like defining “Law,” cruel punishment has no universally expected definition. The existing legal systems define cruel punishment in terms that best suit the applicability of their legal system as well as considering the expected morals in a particular society. The complexity surrounding definition of cruel and unusual punishment has been made possible by the elasticity of society and therefore flexibility of morals. What is moral in one society is definitely not moral in another society. However, due to the need of conformity and standardization that has been occasioned by globalization, most societies do share the same legal system and as a result they share a common definition as far as cruel and unusual punishment is concerned. This way, it becomes easier for a legal system to define cruel punishment in a way that best suits the applicability of their various laws without arising inconsistencies and repugnancies to justice as well as law and morality of a society.…

    • 2195 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Civil Rights

    • 1045 Words
    • 5 Pages

    403 U.S. 217; 91 S. Ct. 1940; 29 L. Ed. 2d 438; 1971 U.S. LEXIS 27…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    There were many advances in information technology that resulted in new ethical issues necessitating the creation of certain acts that the government had to implement. The two that will be discussed in this paper are the PATRIOT Act of 2001, and the Fair Credit Reporting Act of 1970. Both of these acts were deemed necessary due to increasing terrorist threats for the PATRIOT Act, and for fairness in obtaining credit for the Fair Credit Reporting Act.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Of Cyber Law

    • 1874 Words
    • 8 Pages

    The definition of cyber law is the term that encapsulates the legal issues related to the use of the internet or technological interactions. The ethics and legal issues surrounding cyber laws in Australia are in the focus of privacy issues today. The leading factors of concern related to the current cyber law policies in Australia, and all across the world, include the lack of privacy offered to users of the internet, insignificant means being taken to protect users from cyber threats, the lack of protection against cyber bullying and the rising hazard of cyber-crime due to a deficiency of sufficient protection against cyber-criminals.…

    • 1874 Words
    • 8 Pages
    Powerful Essays

Related Topics