메뉴 건너뛰기




Volumn 107, Issue 5, 2009, Pages 819-852

Agency, code, or contract: determining employees' authorization under the computer fraud and abuse act

Author keywords

[No Author keywords available]

Indexed keywords


EID: 62749176471     PISSN: 00262234     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (10)

References (250)
  • 1
    • 62749139411 scopus 로고    scopus 로고
    • The most recent federal survey indicated that 77 million people in the United States use a computer at work. BUREAU OF LABOR STATISTICS, COMPUTER AND INTERNET USE AT WORK IN 2003, at 1 (2005), available at http://www.bls.gov/news. release/pdf/ciuaw.pdf.
    • The most recent federal survey indicated that 77 million people in the United States use a computer at work. BUREAU OF LABOR STATISTICS, COMPUTER AND INTERNET USE AT WORK IN 2003, at 1 (2005), available at http://www.bls.gov/news. release/pdf/ciuaw.pdf.
  • 2
    • 0038897362 scopus 로고    scopus 로고
    • Information Technology and the U.S. Productivity Revival: What Do the Industry Data Say?, 92
    • For a discussion of the link between IT use and productivity in the workplace, see
    • For a discussion of the link between IT use and productivity in the workplace, see Kevin J. Stiroh, Information Technology and the U.S. Productivity Revival: What Do the Industry Data Say?, 92 AM. ECON. REV. 1559 (2002).
    • (2002) AM. ECON. REV , vol.1559
    • Stiroh, K.J.1
  • 3
    • 62749119418 scopus 로고    scopus 로고
    • 18 U.S.C § 1030 (2006).
    • 18 U.S.C § 1030 (2006).
  • 4
    • 62749110374 scopus 로고    scopus 로고
    • See COMPUTER CRIME & INTELLECTUAL PROP. SECTION, U.S. DEP'T OF JUSTICE, PROSECUTING COMPUTER CRIMES 2 (2007) [hereinafter PROSECUTING COMPUTER CRIMES], available at http://www.usdoj.gov/criminal/cybercrime/ccmanual.
    • See COMPUTER CRIME & INTELLECTUAL PROP. SECTION, U.S. DEP'T OF JUSTICE, PROSECUTING COMPUTER CRIMES 2 (2007) [hereinafter PROSECUTING COMPUTER CRIMES], available at http://www.usdoj.gov/criminal/cybercrime/ccmanual.
  • 5
    • 62749157439 scopus 로고    scopus 로고
    • 18 U.S.C § 1030(a)(2)(C), (a)(4), (g) (emphasis added).
    • 18 U.S.C § 1030(a)(2)(C), (a)(4), (g) (emphasis added).
  • 6
    • 62749199682 scopus 로고    scopus 로고
    • See, e.g., Int'l Airport Ctrs., L.L.C. v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006);
    • See, e.g., Int'l Airport Ctrs., L.L.C. v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006);
  • 7
    • 62749167748 scopus 로고    scopus 로고
    • ViChip Corp. v. Lee, 438 F. Supp. 2d 1087, 1100 (N.D. Cal. 2006);
    • ViChip Corp. v. Lee, 438 F. Supp. 2d 1087, 1100 (N.D. Cal. 2006);
  • 8
    • 62749111225 scopus 로고    scopus 로고
    • Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000).
    • Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000).
  • 9
    • 62749120956 scopus 로고    scopus 로고
    • See, e.g., Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 968 (D. Ariz. 2008);
    • See, e.g., Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 968 (D. Ariz. 2008);
  • 10
    • 62749119417 scopus 로고    scopus 로고
    • Diamond Power Int'l., Inc. v. Davidson, 540 F. Supp. 2d 1322, 1343 (N.D. Ga. 2007);
    • Diamond Power Int'l., Inc. v. Davidson, 540 F. Supp. 2d 1322, 1343 (N.D. Ga. 2007);
  • 11
    • 62749187350 scopus 로고    scopus 로고
    • Lockheed Martin Corp. v. Speed, No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at *15 (M.D. Fla. Aug. 1, 2006).
    • Lockheed Martin Corp. v. Speed, No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at *15 (M.D. Fla. Aug. 1, 2006).
  • 12
    • 62749203325 scopus 로고    scopus 로고
    • See, e.g., Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008);
    • See, e.g., Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008);
  • 13
    • 62749098521 scopus 로고    scopus 로고
    • Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479, 498 (D. Md. 2005);
    • Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479, 498 (D. Md. 2005);
  • 14
    • 62749200681 scopus 로고    scopus 로고
    • SecureInfo Corp. v. Telos Corp., 387 F. Supp. 2d 593, 608-10 (E.D. Va. 2005).
    • SecureInfo Corp. v. Telos Corp., 387 F. Supp. 2d 593, 608-10 (E.D. Va. 2005).
  • 15
    • 84888491658 scopus 로고    scopus 로고
    • § 1030g, allowing any person who suffers damage by a violation of the CFAA to maintain a civil action for compensatory damages and injunctive relief or other equitable relief
    • 18 U.S.C. § 1030(g) (allowing any person who suffers damage by a violation of the CFAA to "maintain a civil action" for "compensatory damages and injunctive relief or other equitable relief).
    • 18 U.S.C
  • 16
    • 62749114634 scopus 로고    scopus 로고
    • Civil suits under the CFAA have also been brought by website operators against users of electronic data gatherers, Christine D. Galbraith, Access Denied: Improper Use of the Computer Fraud and Abuse Act to Control Information on Publicly Accessible Internet Websites, 63 MD. L. REV. 320, 322-23 2004
    • Civil suits under the CFAA have also been brought by website operators against users of electronic data gatherers, Christine D. Galbraith, Access Denied: Improper Use of the Computer Fraud and Abuse Act to Control Information on Publicly Accessible Internet Websites, 63 MD. L. REV. 320, 322-23 (2004),
  • 17
    • 62749165808 scopus 로고    scopus 로고
    • and by internet service providers against spammers, Saul Hansell, Microsoft Sues 15 Organizations In Broad Attack On Spam E-Mail, N.Y. TIMES, June 18, 2003, at Cl.
    • and by internet service providers against spammers, Saul Hansell, Microsoft Sues 15 Organizations In Broad Attack On Spam E-Mail, N.Y. TIMES, June 18, 2003, at Cl.
  • 18
    • 62749115905 scopus 로고    scopus 로고
    • See Paul S. Chan & John K. Rubiner, Access Denied: Using the Computer Fraud and Abuse Act to Restrict Employee Mobility, COMP. & INTERNET LAW., June 2006, at 12, 12-14.
    • See Paul S. Chan & John K. Rubiner, Access Denied: Using the Computer Fraud and Abuse Act to Restrict Employee Mobility, COMP. & INTERNET LAW., June 2006, at 12, 12-14.
  • 19
    • 62749187351 scopus 로고    scopus 로고
    • 18 U.S.C § 1030(a)(2).
    • 18 U.S.C § 1030(a)(2).
  • 20
    • 62749150724 scopus 로고    scopus 로고
    • Compare United States v. Czubinski, 106 F.3d 1069, 1071-72 (1st Cir. 1997, finding access unauthorized without discussing how to determine authorization, United States v. Morris, 928 F.2d 504, 510-11 (2d Cir. 1991, finding that lack of authorization is not limited to outsiders, but not discussing alternative interpretations of authorization, and Shurgard Storage Ctrs, Inc. v. Safeguard Self Storage, Inc, 119 F. Supp. 2d 1121, 1123 (WD. Wash. 2000, applying an agency-based interpretation, of authorization without noting alternatives, with Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 964-65 (D. Ariz. 2008, noting the existence of different interpretations, Black & Decker (U.S, Inc. v. Smith, 568 F. Supp. 2d 929, 933-34 (W.D. Tenn. 2008, interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008, same, and Lockheed Martin Corp. v. Speed, No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at *12-14 M.D. Fla
    • Compare United States v. Czubinski, 106 F.3d 1069, 1071-72 (1st Cir. 1997) (finding access unauthorized without discussing how to determine authorization), United States v. Morris, 928 F.2d 504, 510-11 (2d Cir. 1991) (finding that lack of authorization is not limited to outsiders, but not discussing alternative interpretations of authorization), and Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1123 (WD. Wash. 2000) (applying an agency-based interpretation, of authorization without noting alternatives), with Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 964-65 (D. Ariz. 2008) (noting the existence of different interpretations), Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 933-34 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008) (same), and Lockheed Martin Corp. v. Speed, No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at *12-14 (M.D. Fla. Aug. 1, 2006) (same).
  • 21
    • 62749185414 scopus 로고    scopus 로고
    • See, e.g., Shurgard, 119 F. Supp. 2d at 1125.
    • See, e.g., Shurgard, 119 F. Supp. 2d at 1125.
  • 22
    • 62749095145 scopus 로고    scopus 로고
    • WILLIAM A. GREGORY, THE LAW OF AGENCY AND PARTNERSHIP 10-11 (3d ed. 2001).
    • WILLIAM A. GREGORY, THE LAW OF AGENCY AND PARTNERSHIP 10-11 (3d ed. 2001).
  • 23
    • 62749163709 scopus 로고    scopus 로고
    • Id. at 13
    • Id. at 13.
  • 24
    • 62749172285 scopus 로고    scopus 로고
    • RESTATEMENT (SECOND) OF AGENCY § 112 (1958);
    • RESTATEMENT (SECOND) OF AGENCY § 112 (1958);
  • 25
    • 62749138315 scopus 로고    scopus 로고
    • GREGORY, supra note 14, at 103
    • GREGORY, supra note 14, at 103.
  • 26
    • 62749139252 scopus 로고    scopus 로고
    • Shurgard, 119 F. Supp. 2d at 1123.
    • Shurgard, 119 F. Supp. 2d at 1123.
  • 27
    • 62749144872 scopus 로고    scopus 로고
    • RESTATEMENT (SECOND) OF AGENCY § 112.
    • RESTATEMENT (SECOND) OF AGENCY § 112.
  • 28
    • 62749107460 scopus 로고    scopus 로고
    • Shurgard, 119 F. Supp. 2d at 1125.
    • Shurgard, 119 F. Supp. 2d at 1125.
  • 29
    • 62749102034 scopus 로고    scopus 로고
    • Id. at 1129
    • Id. at 1129.
  • 30
    • 62749154845 scopus 로고    scopus 로고
    • 440 F.3d 418 (7th Cir. 2006).
    • 440 F.3d 418 (7th Cir. 2006).
  • 31
    • 62749142382 scopus 로고    scopus 로고
    • Id. at 419
    • Id. at 419.
  • 32
    • 62749129252 scopus 로고    scopus 로고
    • Id. at 420
    • Id. at 420.
  • 33
    • 62749112483 scopus 로고    scopus 로고
    • Id. at 420-21
    • Id. at 420-21.
  • 34
    • 62749129706 scopus 로고    scopus 로고
    • Id
    • Id.
  • 35
    • 62749204937 scopus 로고    scopus 로고
    • See, e.g., ViChip Corp. v. Lee, 438 F. Supp. 2d 1087, 1100 (N.D. Cal. 2006).
    • See, e.g., ViChip Corp. v. Lee, 438 F. Supp. 2d 1087, 1100 (N.D. Cal. 2006).
  • 36
    • 62749136857 scopus 로고    scopus 로고
    • See, e.g., Richard Warner, The Employer's New Weapon: Employee Liability Under the Computer Fraud and Abuse Act, 12EMP. RTS. &EMP. POL'Y J. 11, 12, 23 (2008).
    • See, e.g., Richard Warner, The Employer's New Weapon: Employee Liability Under the Computer Fraud and Abuse Act, 12EMP. RTS. &EMP. POL'Y J. 11, 12, 23 (2008).
  • 37
    • 62749086583 scopus 로고    scopus 로고
    • See, e.g, Chan & Rubiner, supra note 10, at 16
    • See, e.g., Chan & Rubiner, supra note 10, at 16.
  • 38
    • 62749138806 scopus 로고    scopus 로고
    • Id. at 14
    • Id. at 14.
  • 39
    • 62749150725 scopus 로고    scopus 로고
    • Shepardizing the opinion establishes that thirty-one cases have cited Citrin since the decision was issued in March 2006. Opinion last Shepardized using LexisNexis on December 5, 2008.
    • Shepardizing the opinion establishes that thirty-one cases have cited Citrin since the decision was issued in March 2006. Opinion last Shepardized using LexisNexis on December 5, 2008.
  • 40
    • 62749202541 scopus 로고    scopus 로고
    • See infra Section III.B. 1.
    • See infra Section III.B. 1.
  • 41
    • 0242595962 scopus 로고    scopus 로고
    • Orin S. Kerr, Cybercrime's Scope: Interpreting Access and Authorization in Computer Misuse Statutes, 78 N.YU. L. REV. 1596, 1600 (2003).
    • Orin S. Kerr, Cybercrime's Scope: Interpreting "Access" and "Authorization" in Computer Misuse Statutes, 78 N.YU. L. REV. 1596, 1600 (2003).
  • 42
    • 62749193701 scopus 로고    scopus 로고
    • at
    • Id. at 1644-45.
  • 43
    • 62749117126 scopus 로고    scopus 로고
    • Id. at 1649
    • Id. at 1649.
  • 44
    • 62749114178 scopus 로고    scopus 로고
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (WD. Tenn. Aug. 13, 2008).
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (WD. Tenn. Aug. 13, 2008).
  • 45
    • 62749129254 scopus 로고    scopus 로고
    • 928 F.2d 504 (2d Cir. 1991).
    • 928 F.2d 504 (2d Cir. 1991).
  • 46
    • 62749112485 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1649
    • Kerr, supra note 32, at 1649.
  • 47
    • 62749083568 scopus 로고    scopus 로고
    • Morris, 928 F.2d at 510.
    • Morris, 928 F.2d at 510.
  • 48
    • 62749189773 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1632
    • Kerr, supra note 32, at 1632.
  • 49
    • 62749110375 scopus 로고    scopus 로고
    • Notably, the intended function test can be somewhat broader than a code-based interpretation of authorization, as other courts have interpreted it to mean that the scope of a user's authorization derives from the expected norms of intended use or the nature of the relationship established between the computer owner and the user. United States v. Phillips, 477 F.3d 215, 219 (5th Cir. 2007). However, the operation of the intended functions test in the Morris case specifically translates into a code-based approach of authorization, because Morris used holes in programs to allow himself greater access than he would otherwise have had. Morris, 928 F.2d at 510.
    • Notably, the intended function test can be somewhat broader than a code-based interpretation of authorization, as other courts have interpreted it to mean that the scope of a user's authorization derives from the expected norms of intended use or the nature of the relationship established between the computer owner and the user. United States v. Phillips, 477 F.3d 215, 219 (5th Cir. 2007). However, the operation of the intended functions test in the Morris case specifically translates into a code-based approach of authorization, because Morris used holes in programs to allow himself greater access than he would otherwise have had. Morris, 928 F.2d at 510.
  • 50
    • 62749112684 scopus 로고    scopus 로고
    • No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at * 16-25 (M.D. Fla. Aug. 1, 2006).
    • No. 6:05-cv-1580-Orl-31KRS, 2006 U.S. Dist. LEXIS 53108, at * 16-25 (M.D. Fla. Aug. 1, 2006).
  • 51
    • 62749103760 scopus 로고    scopus 로고
    • Id. at * 3
    • Id. at * 3.
  • 52
    • 62749099490 scopus 로고    scopus 로고
    • Id. at * 12
    • Id. at * 12.
  • 53
    • 62749197486 scopus 로고    scopus 로고
    • The court noted that the use of agency principles to determine that an employee was without authorization suggests that the term exceeds authorized access should not apply to situations involving a person with some level of authorization (i.e., insiders). Id. at * 18-19.
    • The court noted that the use of agency principles to determine that an employee was "without authorization" suggests that the term "exceeds authorized access" should not apply to situations involving a person with some level of authorization (i.e., insiders). Id. at * 18-19.
  • 54
    • 62749126913 scopus 로고    scopus 로고
    • As such, the court concluded, the agency-based interpretation effectively shaves 'exceeds authorized access' down to amere sliver of what its plain meaning suggests. Id. at *17.
    • As such, the court concluded, the agency-based interpretation "effectively shaves 'exceeds authorized access' down to amere sliver of what its plain meaning suggests." Id. at *17.
  • 55
    • 62749152630 scopus 로고    scopus 로고
    • Id. at * 22-23
    • Id. at * 22-23.
  • 56
    • 62749169787 scopus 로고    scopus 로고
    • See id. at *15
    • See id. at *15.
  • 57
    • 62749149471 scopus 로고    scopus 로고
    • Id. at * 15
    • Id. at * 15.
  • 58
    • 62749118107 scopus 로고    scopus 로고
    • Id. at * 15-16
    • Id. at * 15-16.
  • 59
    • 62749159258 scopus 로고    scopus 로고
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008);
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008);
  • 60
    • 62749187519 scopus 로고    scopus 로고
    • B&B Microscopes v. Armogida, 532 F. Supp. 2d 744, 758 (W.D. Pa. 2007).
    • B&B Microscopes v. Armogida, 532 F. Supp. 2d 744, 758 (W.D. Pa. 2007).
  • 61
    • 62749159254 scopus 로고    scopus 로고
    • See, e.g., Black & Decker, 568 F. Supp. 2d at 936; Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 968 (D. Ariz. 2008);
    • See, e.g., Black & Decker, 568 F. Supp. 2d at 936; Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 968 (D. Ariz. 2008);
  • 62
    • 62749147188 scopus 로고    scopus 로고
    • Brett Senior & Assoes, v. Fitzgerald, No. 06-1412, 2007 WL 2043377, at *3 (E.D. Pa. July 13, 2007);
    • Brett Senior & Assoes, v. Fitzgerald, No. 06-1412, 2007 WL 2043377, at *3 (E.D. Pa. July 13, 2007);
  • 63
    • 62749142392 scopus 로고    scopus 로고
    • Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479, 494-98 (D. Md. 2005); SecureInfo Corp. v. Telos Corp., 387 F. Supp. 2d 593, 608-10 (E.D. Va. 2005).
    • Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479, 494-98 (D. Md. 2005); SecureInfo Corp. v. Telos Corp., 387 F. Supp. 2d 593, 608-10 (E.D. Va. 2005).
  • 64
    • 62749150866 scopus 로고    scopus 로고
    • Foods, 535
    • See, e.g, at
    • See, e.g., Shamrock Foods, 535 F. Supp. 2d at 968.
    • F. Supp , vol.2 d , pp. 968
    • Shamrock1
  • 65
    • 62749136853 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1637
    • Kerr, supra note 32, at 1637.
  • 66
    • 62749162509 scopus 로고    scopus 로고
    • See, e.g., Am. Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444, 448 (E.D. Va. 1998) (finding that use of an AOL account to obtain, email addresses of other users constituted unauthorized access of information because it violated AOL's terms of service). Courts have varied in their acceptance of the contract-based interpretation of authorization. Some courts hesitate in using terms of service agreements to determine authorization.
    • See, e.g., Am. Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444, 448 (E.D. Va. 1998) (finding that use of an AOL account to obtain, email addresses of other users constituted unauthorized access of information because it violated AOL's terms of service). Courts have varied in their acceptance of the contract-based interpretation of authorization. Some courts hesitate in using terms of service agreements to determine authorization.
  • 67
    • 62749094214 scopus 로고    scopus 로고
    • See Am. Online, Inc. v. Nat'l Health Care Disc., Inc., 121 F. Supp. 2d 1255, 1273 (N.D. Iowa 2000). However, other courts have found unauthorized access using a contract-based interpretation even when the access was not specifically prohibited by the contract.
    • See Am. Online, Inc. v. Nat'l Health Care Disc., Inc., 121 F. Supp. 2d 1255, 1273 (N.D. Iowa 2000). However, other courts have found unauthorized access using a contract-based interpretation even when the access was not specifically prohibited by the contract.
  • 68
    • 62749159623 scopus 로고    scopus 로고
    • See Register.com, Inc. v. Verio, Inc., 126 F. Supp. 2d 238, 248 (S.D.N.Y. 2000).
    • See Register.com, Inc. v. Verio, Inc., 126 F. Supp. 2d 238, 248 (S.D.N.Y. 2000).
  • 69
    • 62749150726 scopus 로고    scopus 로고
    • See, e.g., EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001);
    • See, e.g., EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (1st Cir. 2001);
  • 70
    • 62749156314 scopus 로고    scopus 로고
    • United States v. Czubinski, 106 F.3d 1069, 1071 (1st Cir. 1997);
    • United States v. Czubinski, 106 F.3d 1069, 1071 (1st Cir. 1997);
  • 71
    • 62749202542 scopus 로고    scopus 로고
    • Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008);
    • Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008);
  • 72
    • 62749109303 scopus 로고    scopus 로고
    • Hewlett-Packard Co. v. Byd:Sign, Inc., No. 6:05-CV-456, 2007 WL 275476, at * 15 (E.D. Tex. Jan. 25, 2007).
    • Hewlett-Packard Co. v. Byd:Sign, Inc., No. 6:05-CV-456, 2007 WL 275476, at * 15 (E.D. Tex. Jan. 25, 2007).
  • 73
    • 62749110377 scopus 로고    scopus 로고
    • EF Cultural Travel BV v. Zefer Corp, 318 F.3d 58, 62 (1st Cir. 2003, quoting 18 U.S.C. § 1030(e)6, 2006, alteration, in original
    • EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) (quoting 18 U.S.C. § 1030(e)(6) (2006)) (alteration, in original);
  • 74
    • 62749154465 scopus 로고    scopus 로고
    • Explorica, 21A F.3d at 581 (quoting 18 U.S.C § 1030(e)(6) (2006)) (alteration in original).
    • Explorica, 21A F.3d at 581 (quoting 18 U.S.C § 1030(e)(6) (2006)) (alteration in original).
  • 75
    • 62749160514 scopus 로고    scopus 로고
    • Scrapers are computer programs that are able to quickly gather all the information on a website. Explorica, 274 F. 3d at 579.
    • Scrapers are computer programs that are able to quickly gather all the information on a website. Explorica, 274 F. 3d at 579.
  • 76
    • 62749183331 scopus 로고    scopus 로고
    • Zefer, 318 F.3d at 62-63;
    • Zefer, 318 F.3d at 62-63;
  • 77
    • 62749149472 scopus 로고    scopus 로고
    • Explorica, 274 F.3d at 579.
    • Explorica, 274 F.3d at 579.
  • 78
    • 62749179514 scopus 로고    scopus 로고
    • Explorica, 274 F.3d at 583.
    • Explorica, 274 F.3d at 583.
  • 79
    • 62749162506 scopus 로고    scopus 로고
    • In Zefer, the court noted that the lack of authorization also implicitly extended to Zefer, the company that created the scraper, even though it was not a party to the confidentiality agreement. 318 F.3d at 63.
    • In Zefer, the court noted that the lack of authorization also implicitly extended to Zefer, the company that created the scraper, even though it was not a party to the confidentiality agreement. 318 F.3d at 63.
  • 80
    • 62749149047 scopus 로고    scopus 로고
    • Id. at 63-64. The court noted that [i]t is also of some use for future litigation among other litigants in this circuit to indicate that, with rare exceptions, public website providers ought to say just what non-password protected access they purport to forbid.
    • Id. at 63-64. The court noted that "[i]t is also of some use for future litigation among other litigants in this circuit to indicate that, with rare exceptions, public website providers ought to say just what non-password protected access they purport to forbid."
  • 81
    • 62749126914 scopus 로고    scopus 로고
    • Id. at 64
    • Id. at 64.
  • 82
    • 62749202909 scopus 로고    scopus 로고
    • 106 F.3d 1069, 1071 (1st Cir. 1997).
    • 106 F.3d 1069, 1071 (1st Cir. 1997).
  • 83
    • 62749184795 scopus 로고    scopus 로고
    • Id. at 1078
    • Id. at 1078.
  • 84
    • 62749200682 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1634
    • Kerr, supra note 32, at 1634.
  • 85
    • 62749106648 scopus 로고    scopus 로고
    • Hewlett-Packard Co. v. Byd:Sign, Inc., No. 6:05-CV-456, 2007 WL 275476, at *12 (E.D. Tex. Jan. 25, 2007).
    • Hewlett-Packard Co. v. Byd:Sign, Inc., No. 6:05-CV-456, 2007 WL 275476, at *12 (E.D. Tex. Jan. 25, 2007).
  • 86
    • 62749127115 scopus 로고    scopus 로고
    • Id. at *1
    • Id. at *1.
  • 87
    • 62749177161 scopus 로고    scopus 로고
    • Id. at *13
    • Id. at *13.
  • 88
    • 62749193703 scopus 로고    scopus 로고
    • Id
    • Id.
  • 89
    • 62749141100 scopus 로고    scopus 로고
    • Id.;
    • Id.;
  • 90
    • 62749202908 scopus 로고    scopus 로고
    • see also Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008) (noting that the employee's authorization was limited to access in furtherance of the employer's business based on language in an employment agreement).
    • see also Modis, Inc. v. Bardelli, 531 F. Supp. 2d 314, 319 (D. Conn. 2008) (noting that the employee's authorization was limited to access in furtherance of the employer's business based on language in an employment agreement).
  • 91
    • 62749096507 scopus 로고    scopus 로고
    • Hewlett-Packard, 2007 WL 275476, at *13.
    • Hewlett-Packard, 2007 WL 275476, at *13.
  • 92
    • 62749166885 scopus 로고    scopus 로고
    • Indeed, most cases following Citrin and Speed that outline the conflict between an agency-based approach and a code-based approach fail to mention the possibility of a contractbased approach entirely, even when there exists a contract capable of being interpreted as defining authorization.
    • Indeed, most cases following Citrin and Speed that outline the conflict between an agency-based approach and a code-based approach fail to mention the possibility of a contractbased approach entirely, even when there exists a contract capable of being interpreted as defining authorization.
  • 93
    • 62749184796 scopus 로고    scopus 로고
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 934-36 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008) (outlining the divide between courts applying an agency-based approach and those applying a code-based approach and adopting the latter without substantial consideration of the employment agreements relating to the employee's authorization).
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 934-36 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008) (outlining the divide between courts applying an agency-based approach and those applying a code-based approach and adopting the latter without substantial consideration of the employment agreements relating to the employee's authorization).
  • 94
    • 62749113304 scopus 로고    scopus 로고
    • 18 U.S.C § 1030(a)(4) (2006).
    • 18 U.S.C § 1030(a)(4) (2006).
  • 95
    • 62749126560 scopus 로고    scopus 로고
    • Courts opting for an agency-based interpretation use legislative history to find that the CFAA's scope has been broadened over time such that it reaches and can be invoked by employers and that the CFAA was designed to reach insiders as well as outsiders. See, e.g., Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1127-29 (W.D. Wash. 2000);
    • Courts opting for an agency-based interpretation use legislative history to find that the CFAA's scope has been broadened over time such that it reaches and can be invoked by employers and that the CFAA was designed to reach insiders as well as outsiders. See, e.g., Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1127-29 (W.D. Wash. 2000);
  • 96
    • 62749132779 scopus 로고    scopus 로고
    • Airport Ctrs., L.L.C. v. Citrin
    • Courts adopting a code-based interpretation often argue that the legislative history supports a narrow view of authorization
    • Int'l Airport Ctrs., L.L.C. v. Citrin, 440 F.3d 417 (7th Cir. 2006). Courts adopting a code-based interpretation often argue that the legislative history supports a narrow view of authorization.
    • (2006) 440 F.3d 417 (7th Cir
    • Int'l1
  • 97
    • 62749156700 scopus 로고    scopus 로고
    • See, e.g., Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 965-66 (D. Ariz. 2008).
    • See, e.g., Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 965-66 (D. Ariz. 2008).
  • 98
    • 62749151512 scopus 로고    scopus 로고
    • William N. Eskridge, Jr., Legislative History Values, 66 CHI.-KENT L. REV. 365, 439 (1990).
    • William N. Eskridge, Jr., Legislative History Values, 66 CHI.-KENT L. REV. 365, 439 (1990).
  • 99
    • 62749107459 scopus 로고    scopus 로고
    • Use of legislative history is declining generally, but many courts still employ it where the statutory text is ambiguous. CHRISTIAN E. MAMMEN, USING LEGISLATIVE HISTORY IN AMERICAN STATUTORY INTERPRETATION 26 (2002).
    • Use of legislative history is declining generally, but many courts still employ it where the statutory text is ambiguous. CHRISTIAN E. MAMMEN, USING LEGISLATIVE HISTORY IN AMERICAN STATUTORY INTERPRETATION 26 (2002).
  • 100
    • 62749150310 scopus 로고    scopus 로고
    • Using legislative history as evidence of specific intent, as I do here, is, historically, the main justification for examining such materials. Eskridge, supra note 72, at 369-70
    • Using legislative history as evidence of specific intent, as I do here, "is, historically, the main justification for examining such materials." Eskridge, supra note 72, at 369-70.
  • 101
    • 62749197223 scopus 로고    scopus 로고
    • Initially, the CFAA was primarily aimed at outsiders, such as hackers or other persons outside of the computer system at issue. See H.R. REP. NO. 98-894, at 10-12 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3695-97. Insiders, by contrast, are those who are somehow legitimately connected to the computer system at issue. In employment-related CFAA cases, issues of insider liability acquire acute importance, because employees are generally considered insiders in light of their employer-sanctioned access.
    • Initially, the CFAA was primarily aimed at outsiders, such as hackers or other persons outside of the computer system at issue. See H.R. REP. NO. 98-894, at 10-12 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3695-97. Insiders, by contrast, are those who are somehow legitimately connected to the computer system at issue. In employment-related CFAA cases, issues of insider liability acquire acute importance, because employees are generally considered insiders in light of their employer-sanctioned access.
  • 102
    • 62749126332 scopus 로고    scopus 로고
    • H.R. REP. NO. 98-894, at 10, reprinted in 1984 U.S.CCA.N. at 3695.
    • H.R. REP. NO. 98-894, at 10, reprinted in 1984 U.S.CCA.N. at 3695.
  • 103
    • 62749118523 scopus 로고    scopus 로고
    • Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, 98 Stat. 2190 (codified as amended at 18 U.S.C § 1030 (2006)) [hereinafter 1984 CFAA].
    • Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, 98 Stat. 2190 (codified as amended at 18 U.S.C § 1030 (2006)) [hereinafter 1984 CFAA].
  • 104
    • 62749195050 scopus 로고    scopus 로고
    • See S. REP. NO. 104-357, at 11 (1996);
    • See S. REP. NO. 104-357, at 11 (1996);
  • 105
    • 62749202543 scopus 로고    scopus 로고
    • H.R. REP. NO. 99-612, at 7, 10-11 (1986);
    • H.R. REP. NO. 99-612, at 7, 10-11 (1986);
  • 106
    • 62749184173 scopus 로고    scopus 로고
    • S. REP. NO. 99-432, at 5-7 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2483-85.
    • S. REP. NO. 99-432, at 5-7 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2483-85.
  • 107
    • 62749154846 scopus 로고    scopus 로고
    • H.R. REP. NO. 98-894, at 21, reprinted in 1984 U.S.C.C.A.N. at 3707.
    • H.R. REP. NO. 98-894, at 21, reprinted in 1984 U.S.C.C.A.N. at 3707.
  • 108
    • 62749099909 scopus 로고    scopus 로고
    • Joseph B. Tompkins, Jr. & Linda A. Mar, The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem, 6 COMPUTER/L.J. 459, 465 (1986).
    • Joseph B. Tompkins, Jr. & Linda A. Mar, The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem, 6 COMPUTER/L.J. 459, 465 (1986).
  • 109
    • 62749199684 scopus 로고    scopus 로고
    • H.R. REP. NO. 98-894, at 15, 22, reprinted in 1984 U.S.C.C.A.N. at 3701, 3708, The 1984 Act] adds a clause excluding from these sections coverage of a person authorized to access a computer who merely exceeds such authorization by the incidental use of the computer, in, for example, doing one's homework or playing computer games
    • H.R. REP. NO. 98-894, at 15, 22, reprinted in 1984 U.S.C.C.A.N. at 3701, 3708 ("[The 1984 Act] adds a clause excluding from these sections coverage of a person authorized to access a computer who merely exceeds such authorization by the incidental use of the computer .... in, for example, doing one's homework or playing computer games.").
  • 110
    • 62749112007 scopus 로고    scopus 로고
    • See Tompkins & Mar, supra note 79, at 465
    • See Tompkins & Mar, supra note 79, at 465.
  • 111
    • 62749186821 scopus 로고    scopus 로고
    • H.R. REP. NO. 99-612, at 7.
    • H.R. REP. NO. 99-612, at 7.
  • 112
    • 62749143887 scopus 로고    scopus 로고
    • Id
    • Id.
  • 113
    • 62749154847 scopus 로고    scopus 로고
    • Id
    • Id.
  • 114
    • 62749147189 scopus 로고    scopus 로고
    • Id. at 7, 10-11;
    • Id. at 7, 10-11;
  • 115
    • 62749132780 scopus 로고    scopus 로고
    • SEN. REP. NO. 99-432, at 5-7 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2482-85.
    • SEN. REP. NO. 99-432, at 5-7 (1986), reprinted in 1986 U.S.C.C.A.N. 2479, 2482-85.
  • 116
    • 62749121453 scopus 로고    scopus 로고
    • S. REP. NO. 99-432, at 6, reprinted in 1986 U.S.C.C.A.N. at 2483-84.
    • S. REP. NO. 99-432, at 6, reprinted in 1986 U.S.C.C.A.N. at 2483-84.
  • 117
    • 62749121452 scopus 로고    scopus 로고
    • S. REP. NO. 99-432, at 8, reprinted in 1986 U.S.C.C.A.N. at 2486.
    • S. REP. NO. 99-432, at 8, reprinted in 1986 U.S.C.C.A.N. at 2486.
  • 118
    • 62749141104 scopus 로고    scopus 로고
    • 1984 CFAA, supra note 76.
    • 1984 CFAA, supra note 76.
  • 119
    • 62749088865 scopus 로고    scopus 로고
    • Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, 100 Stat. 1213, § 2(g)(6) (codified as amended at 18 U.S.C § 1030 (2006)) [hereinafter 1986 CFAA].
    • Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, 100 Stat. 1213, § 2(g)(6) (codified as amended at 18 U.S.C § 1030 (2006)) [hereinafter 1986 CFAA].
  • 120
    • 62749140608 scopus 로고    scopus 로고
    • S. REP. NO. 99-432, at 9, reprinted in 1986 U.S.CCA.N. at 2486;
    • S. REP. NO. 99-432, at 9, reprinted in 1986 U.S.CCA.N. at 2486;
  • 121
    • 62749166215 scopus 로고    scopus 로고
    • H.R. REP. NO. 99-612, at 11.
    • H.R. REP. NO. 99-612, at 11.
  • 122
    • 62749185416 scopus 로고    scopus 로고
    • See 1984 CFAA, supra note 76, at § 2102(a).
    • See 1984 CFAA, supra note 76, at § 2102(a).
  • 123
    • 62749124710 scopus 로고    scopus 로고
    • See 18 U.S.C § 1030(e)(6).
    • See 18 U.S.C § 1030(e)(6).
  • 124
    • 62749121450 scopus 로고    scopus 로고
    • Further amendments to the CFAA do not provide any more information about what Congress intended to determine insider authority. The most significant amendments to the CFAA after 1986 reference insider unauthorized users multiple times, but primarily to explain that provisions do reach insiders exceeding their authorized access. See S. REP. NO. 104-357, at 6, 9-11 1996, The later committee reports on the CFAA again, make it clear that Congress wants to include insiders who are exceeding their authorized access purposefully and with an intent to harm, but these discussions fail to clarify what insider actions cause a person to exceed authorization
    • Further amendments to the CFAA do not provide any more information about what Congress intended to determine insider authority. The most significant amendments to the CFAA after 1986 reference insider unauthorized users multiple times, but primarily to explain that provisions do reach insiders exceeding their authorized access. See S. REP. NO. 104-357, at 6, 9-11 (1996). The later committee reports on the CFAA again, make it clear that Congress wants to include insiders who are exceeding their authorized access purposefully and with an intent to harm, but these discussions fail to clarify what insider actions cause a person to exceed authorization.
  • 125
    • 62749119420 scopus 로고    scopus 로고
    • See id. at 11;
    • See id. at 11;
  • 126
    • 62749096509 scopus 로고    scopus 로고
    • S. REP. NO. 101-544, at 5 (1990).
    • S. REP. NO. 101-544, at 5 (1990).
  • 127
    • 62749165809 scopus 로고    scopus 로고
    • See, e.g., Wis. Pub. Intervenor v. Mortier, 501 U.S. 597, 622 (1991) (Scalia, J., concurring) (objecting to the practice of utilizing legislative history for the purpose of giving authoritative content to the meaning of a statutory text).
    • See, e.g., Wis. Pub. Intervenor v. Mortier, 501 U.S. 597, 622 (1991) (Scalia, J., concurring) (objecting to "the practice of utilizing legislative history for the purpose of giving authoritative content to the meaning of a statutory text").
  • 128
    • 62749150309 scopus 로고    scopus 로고
    • See MAMMEN, supra note 73, at 156;
    • See MAMMEN, supra note 73, at 156;
  • 129
    • 34548305111 scopus 로고    scopus 로고
    • see also Adam N. Steinman, Less is More? Textualism, Intentionalism, and a Better Solution to the Class Action Fairness Act's Appellate Deadline Riddle, 92 IOWA L. REV. 1183, 1218 (2007) (Both, textualists and intentionalists agree that statutory language can be ambiguous, and in those situations, it is proper for judges to consult not only the statute's text but also its context, including the legislative intent underlying that statute.).
    • see also Adam N. Steinman, "Less" is "More"? Textualism, Intentionalism, and a Better Solution to the Class Action Fairness Act's Appellate Deadline Riddle, 92 IOWA L. REV. 1183, 1218 (2007) ("Both, textualists and intentionalists agree that statutory language can be ambiguous, and in those situations, it is proper for judges to consult not only the statute's text but also its context, including the legislative intent underlying that statute.").
  • 130
    • 62749138316 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1602
    • Kerr, supra note 32, at 1602.
  • 131
    • 62749148095 scopus 로고    scopus 로고
    • Id. at 1602-03.
    • Id. at 1602-03.
  • 132
    • 62749168815 scopus 로고    scopus 로고
    • Id. at 1603
    • Id. at 1603.
  • 133
    • 62749200683 scopus 로고    scopus 로고
    • Id
    • Id.
  • 134
    • 62749098153 scopus 로고    scopus 로고
    • Id. at 1603-04.
    • Id. at 1603-04.
  • 135
    • 62749184797 scopus 로고    scopus 로고
    • Id. at 1603-05.
    • Id. at 1603-05.
  • 136
    • 62749087223 scopus 로고    scopus 로고
    • Id. at 1605-07 (noting that trespass and burglary statutes require physical entry onto property, which one cannot do in cyberspace);
    • Id. at 1605-07 (noting that trespass and burglary statutes require physical entry onto property, which one cannot do in cyberspace);
  • 137
    • 78649306246 scopus 로고    scopus 로고
    • CTRL〉〈ALT〉〈DEL〉: Rethinking Federal Computer Crime Legislation, 27
    • same with regard to trespass and larceny, 〈
    • Joseph M. Olivenbaum, 〈CTRL〉〈ALT〉〈DEL〉: Rethinking Federal Computer Crime Legislation, 27 SETON HALL L. REV. 574, 577 (1997) (same with regard to trespass and larceny).
    • (1997) SETON HALL L. REV , vol.574 , pp. 577
    • Olivenbaum, J.M.1
  • 138
    • 62749150728 scopus 로고    scopus 로고
    • See, e.g., Lund v. Commonwealth, 232 S.E.2d 745, 748 (Va. 1977) (stating that unauthorized use of a computer is not subject to the larceny statute).
    • See, e.g., Lund v. Commonwealth, 232 S.E.2d 745, 748 (Va. 1977) (stating that unauthorized use of a computer is not subject to the larceny statute).
  • 139
    • 62749169789 scopus 로고    scopus 로고
    • E.g., United States v. Girard, 601 F.2d 69, 71 (2d Cir. 1979) (concluding that the government has a property interest in information);
    • E.g., United States v. Girard, 601 F.2d 69, 71 (2d Cir. 1979) (concluding that the government has a property interest in information);
  • 140
    • 62749141103 scopus 로고    scopus 로고
    • United States v. Seidlitz, 589 F.2d 152, 160 (4th Cir. 1978) (finding that the defendant's unauthorized use and accessing of computerized information was akin to being an intruder on the physical property of another).
    • United States v. Seidlitz, 589 F.2d 152, 160 (4th Cir. 1978) (finding that the defendant's unauthorized use and accessing of computerized information was akin to being an intruder on the physical property of another).
  • 141
    • 62749108955 scopus 로고    scopus 로고
    • As Kerr notes, even those courts willing to find that a crime had been committed by computer misuse often only punished computer misuse as theft when it resulted in significant harm. Kerr, supra note 32, at 1613
    • As Kerr notes, even those courts willing to find that a crime had been committed by computer misuse often only punished computer misuse as theft when it resulted in significant harm. Kerr, supra note 32, at 1613.
  • 142
    • 62749136079 scopus 로고    scopus 로고
    • Id.;
    • Id.;
  • 144
    • 62749157440 scopus 로고    scopus 로고
    • Donald G. Ingraham, On Charging Computer Crime, 2 COMPUTER/L.J. 429, 429-30 (1980).
    • Donald G. Ingraham, On Charging Computer Crime, 2 COMPUTER/L.J. 429, 429-30 (1980).
  • 145
    • 62749083780 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1602
    • Kerr, supra note 32, at 1602.
  • 146
    • 62749156701 scopus 로고    scopus 로고
    • For example, a well-publicized event involving pirate bulletin boards between the time the act was first passed and the 1986 amendments sparked congressional concern over this type of computer crime, leading to the development of a provision in the Act regarding trafficking of stolen passwords. H.R. REP. NO. 99-612, at 6 (1986);
    • For example, a well-publicized event involving "pirate bulletin boards" between the time the act was first passed and the 1986 amendments sparked congressional concern over this type of computer crime, leading to the development of a provision in the Act regarding trafficking of stolen passwords. H.R. REP. NO. 99-612, at 6 (1986);
  • 147
    • 62749188674 scopus 로고    scopus 로고
    • see also 1986 CFAA, supra note 89.
    • see also 1986 CFAA, supra note 89.
  • 148
    • 62749158886 scopus 로고    scopus 로고
    • Significant additions to the statute also came in 1994 to address the growing use of worms and viruses by computer criminals. Violent Crime Control and Law Enforcement Act of 1994 Pub. L. No. 103-322;
    • Significant additions to the statute also came in 1994 to address the growing use of "worms" and "viruses" by computer criminals. Violent Crime Control and Law Enforcement Act of 1994 Pub. L. No. 103-322;
  • 149
    • 62749148098 scopus 로고    scopus 로고
    • Stat. 1796, § 290001;
    • Stat. 1796, § 290001;
  • 150
    • 62749168816 scopus 로고
    • S
    • CONG. REC. S 16,421 (1993).
    • (1993) CONG. REC , vol.421 , pp. 16
  • 151
    • 62749155214 scopus 로고    scopus 로고
    • In other words, it constitutes the purpose value of the legislative history that, once identified, can serve as the starting point for resolving statutory ambiguities. Eskridge, supra note 72, at 394.
    • In other words, it constitutes the purpose value of the legislative history that, once identified, can serve as the starting point for resolving statutory ambiguities. Eskridge, supra note 72, at 394.
  • 152
    • 62749180708 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1644-45
    • Kerr, supra note 32, at 1644-45.
  • 153
    • 62749140609 scopus 로고    scopus 로고
    • Lany Lessig, The Laws of Cyberspace, in READINGS IN CYBERETHICS 134, 136 (Richard A. Spinello & Herman T. Tavani, eds., 2d. ed. 2004).
    • Lany Lessig, The Laws of Cyberspace, in READINGS IN CYBERETHICS 134, 136 (Richard A. Spinello & Herman T. Tavani, eds., 2d. ed. 2004).
  • 154
    • 62749151513 scopus 로고    scopus 로고
    • Admittedly, the purist would argue that this is just redefining computer misuse to capture actions within the broader category of traditional crimes using a computer, and to some extent this may be true. However, if, as 1 argue below, there is some justification for deviation from a strict code-based approach to authorization, this form of contract-based interpretation, where liability is found only where there is a clear violation of a specific contractual definition of misused access, may be the best option for respecting the congressional expression that the CFAA targets crimes of computer misuse.
    • Admittedly, the purist would argue that this is just redefining computer misuse to capture actions within the broader category of traditional crimes using a computer, and to some extent this may be true. However, if, as 1 argue below, there is some justification for deviation from a strict code-based approach to authorization, this form of contract-based interpretation, where liability is found only where there is a clear violation of a specific contractual definition of misused access, may be the best option for respecting the congressional expression that the CFAA targets crimes of computer misuse.
  • 155
    • 62749155988 scopus 로고    scopus 로고
    • See William N. Eskridge, Jr., Spinning Legislative Supremacy, 78 GEO. L.J. 319, 324 (1989) (The legislature itself might have a meta-intent that judicial interpreters exercise policymaking discretion.).
    • See William N. Eskridge, Jr., Spinning Legislative Supremacy, 78 GEO. L.J. 319, 324 (1989) ("The legislature itself might have a meta-intent that judicial interpreters exercise policymaking discretion.").
  • 156
    • 62749193470 scopus 로고    scopus 로고
    • Notably, courts have opted for liberal judicial interpretation consistent with a statute's policy goals where legislative history provides little assistance as to the meaning of a disputed phrase in other modem statutes, such as the Superfund Act. E.g., United States v. Aceto Agric. Chems. Corp., 872 F.2d 1373, 1380 (8th Cir. 1989).
    • Notably, courts have opted for "liberal judicial interpretation" consistent with a statute's policy goals where legislative history provides little assistance as to the meaning of a disputed phrase in other modem statutes, such as the Superfund Act. E.g., United States v. Aceto Agric. Chems. Corp., 872 F.2d 1373, 1380 (8th Cir. 1989).
  • 157
    • 62749197225 scopus 로고    scopus 로고
    • See 18 U.S.C § 1030(e) (2006).
    • See 18 U.S.C § 1030(e) (2006).
  • 158
    • 62749158159 scopus 로고    scopus 로고
    • 1984 CFAA, supra note 76, at § 2102(a).
    • 1984 CFAA, supra note 76, at § 2102(a).
  • 159
    • 62749197487 scopus 로고    scopus 로고
    • This was despite the fact that that [t]he whole issue of defining the word 'computer' ha[d] plagued the consideration of computer crime legislation since its early days. H.R. REP. NO. 98-894, at 23 1984, reprinted in 1984 U.S.C.C.A.N. 3689, 3709
    • This was despite the fact that that "[t]he whole issue of defining the word 'computer' ha[d] plagued the consideration of computer crime legislation since its early days." H.R. REP. NO. 98-894, at 23 (1984), reprinted in 1984 U.S.C.C.A.N. 3689, 3709.
  • 160
    • 84888491658 scopus 로고    scopus 로고
    • § 1030e
    • See 18 U.S.C. § 1030(e).
    • 18 U.S.C
  • 161
    • 62749190909 scopus 로고    scopus 로고
    • Tompkins & Mar, supra note 79, at 464;
    • Tompkins & Mar, supra note 79, at 464;
  • 162
    • 62749170911 scopus 로고
    • U.S. attorneys push to clarify vague '84 DP crime law
    • July 1, at
    • Mitch Betts, U.S. attorneys push to clarify vague '84 DP crime law, COMPUTERWORLD, July 1, 1985, at 22.
    • (1985) COMPUTERWORLD , pp. 22
    • Betts, M.1
  • 163
    • 62749205399 scopus 로고    scopus 로고
    • See Int'l Airport Ctrs., L.L.C v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006) (noting how the distinction between without authorization and exceeding authorized access is paper thin).
    • See Int'l Airport Ctrs., L.L.C v. Citrin, 440 F.3d 418, 420 (7th Cir. 2006) (noting how the distinction between "without authorization" and "exceeding authorized access" is "paper thin").
  • 164
    • 62749119741 scopus 로고    scopus 로고
    • See PROSECUTING COMPUTER CRIMES, supra note 3
    • See PROSECUTING COMPUTER CRIMES, supra note 3.
  • 165
    • 62749183333 scopus 로고    scopus 로고
    • See 141 CONG. REC. S9422 (1995) (The need to reevaluate our computer statutes on a continual basis is inevitable ....);
    • See 141 CONG. REC. S9422 (1995) ("The need to reevaluate our computer statutes on a continual basis is inevitable ....");
  • 166
    • 62749130677 scopus 로고
    • recording statements of numerous senators concerning how the law is adapting and that the amendments are to address effectively known evils of computer misuse, S
    • CONG. REC. S14,453 (1986) (recording statements of numerous senators concerning how the law is adapting and that the amendments are to "address effectively known evils of computer misuse");
    • (1986) CONG. REC , pp. 14-453
  • 167
    • 62749187352 scopus 로고    scopus 로고
    • S. REP. NO. 101-544, at 5 (1990) (discussing changes to the law to address worms and viruses);
    • S. REP. NO. 101-544, at 5 (1990) (discussing changes to the law to address worms and viruses);
  • 168
    • 62749180709 scopus 로고    scopus 로고
    • H.R. REP. NO. 99-612, at 4 (1986) (stating that Congress is clarifying the existing laws to deal with the emergence of a new type of computer abuse through the amendments).
    • H.R. REP. NO. 99-612, at 4 (1986) (stating that Congress is "clarifying the existing laws to deal with the emergence of a new type of computer abuse" through the amendments).
  • 169
    • 62749122113 scopus 로고    scopus 로고
    • Congressional perceptions of computer criminals and the particular threats they pose appear to drive the language and provisions of the CFAA. In the early years of the statute, the focus was on hackers, who were seen by Congress as prankster-youths who were in fact trespassers with the potential to cause serious problems. See H.R. REP. NO. 99-612, at 5;
    • Congressional perceptions of computer criminals and the particular threats they pose appear to drive the language and provisions of the CFAA. In the early years of the statute, the focus was on "hackers," who were seen by Congress as prankster-youths who were in fact trespassers with the potential to cause serious problems. See H.R. REP. NO. 99-612, at 5;
  • 170
    • 62749158885 scopus 로고    scopus 로고
    • H.R. REP. NO. 98-894, at 10 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3695-96.
    • H.R. REP. NO. 98-894, at 10 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3695-96.
  • 171
    • 62749116377 scopus 로고    scopus 로고
    • A federal computer-crime act was seen as needed to both provide for prosecution of these hackers as well as deter their criminal activities. H.R. REP. NO. 99-612, at 5-6. Similarly, a well-publicized event involving pirate bulletin boards between when, the first act was passed and the 1986 amendments sparked congressional concern over this type of computer crime, leading to the development of a provision in the Act regarding trafficking of stolen passwords
    • A federal computer-crime act was seen as needed to both provide for prosecution of these hackers as well as deter their criminal activities. H.R. REP. NO. 99-612, at 5-6. Similarly, a well-publicized event involving "pirate bulletin boards" between when, the first act was passed and the 1986 amendments sparked congressional concern over this type of computer crime, leading to the development of a provision in the Act regarding trafficking of stolen passwords.
  • 172
    • 62749185415 scopus 로고    scopus 로고
    • Id. at 6;
    • Id. at 6;
  • 173
    • 62749174080 scopus 로고    scopus 로고
    • see also 1986 CFAA, supra note 89.
    • see also 1986 CFAA, supra note 89.
  • 174
    • 62749091945 scopus 로고    scopus 로고
    • Significant additions to the statute also came in 1994 to address the growing use of worms and viruses by computer criminals. Violent Crime Control and Law Enforcement Act of 1994 Pub. L. No. 103-322;
    • Significant additions to the statute also came in 1994 to address the growing use of "worms" and "viruses" by computer criminals. Violent Crime Control and Law Enforcement Act of 1994 Pub. L. No. 103-322;
  • 175
    • 62749187520 scopus 로고    scopus 로고
    • CONG. REC. S 16,421 (1993). In 2002, the statute was again amended to make sure that it captured computer crimes committed by terrorists. See generally, COMPUTER CRIME & INTELLECTUAL PROPERTY SECTION, U.S. DEP'T OF JUSTICE, FIELD GUIDANCE ON NEW AUTHORITIES THAT RELATE TO COMPUTER CRIME AND ELECTRONIC EVIDENCE ENACTED IN THE USA PATRIOT ACT OF 2001 (2001), http://www.usdoj.gov/ criminal/cybercrime/PatriotAct.htm.
    • CONG. REC. S 16,421 (1993). In 2002, the statute was again amended to make sure that it captured computer crimes committed by terrorists. See generally, COMPUTER CRIME & INTELLECTUAL PROPERTY SECTION, U.S. DEP'T OF JUSTICE, FIELD GUIDANCE ON NEW AUTHORITIES THAT RELATE TO COMPUTER CRIME AND ELECTRONIC EVIDENCE ENACTED IN THE USA PATRIOT ACT OF 2001 (2001), http://www.usdoj.gov/ criminal/cybercrime/PatriotAct.htm.
  • 176
    • 62749202911 scopus 로고    scopus 로고
    • See 18 U.S.C § 1030 (2006).
    • See 18 U.S.C § 1030 (2006).
  • 177
    • 0041638216 scopus 로고
    • Congressional Commentary on Judicial Interpretations of Statutes: Idle Chatter or Telling Response?, 93
    • discussing the concerns raised by courts and commentators over the use of legislative inaction, in statutory interpretation, See, e.g
    • See, e.g., James J. Brudney, Congressional Commentary on Judicial Interpretations of Statutes: Idle Chatter or Telling Response?, 93 MICH. L. REV. 1, 66-67 (1994) (discussing the concerns raised by courts and commentators over the use of legislative inaction, in statutory interpretation).
    • (1994) MICH. L. REV , vol.1 , pp. 66-67
    • Brudney, J.J.1
  • 178
    • 0041959358 scopus 로고
    • Interpreting Legislative Inaction, 87
    • See, e.g
    • See, e.g., William N. Eskridge, Jr., Interpreting Legislative Inaction, 87 MICH. L. REV. 67, 67 (1988).
    • (1988) MICH. L. REV , vol.67 , pp. 67
    • Eskridge Jr., W.N.1
  • 179
    • 62749102033 scopus 로고    scopus 로고
    • Cf. Galbraith, supra note 9, at 368 (calling for congressional amendment to the CFAA to clarify authorization in cases involving public websites, which arguably are also insider cases).
    • Cf. Galbraith, supra note 9, at 368 (calling for congressional amendment to the CFAA to clarify authorization in cases involving public websites, which arguably are also "insider" cases).
  • 180
    • 62749094218 scopus 로고    scopus 로고
    • See RICHARD A. POSNER, THE FEDERAL COURTS: CRISIS AND REFORM 290 (1985) (Often when there are political pressures to do something about a problem but the legislature cannot agree exactly what to do about it, it will pass a statute to the effect (as well as the undisclosed purpose) of which is to dump the problem in the lap of the courts ....);
    • See RICHARD A. POSNER, THE FEDERAL COURTS: CRISIS AND REFORM 290 (1985) ("Often when there are political pressures to do something about a problem but the legislature cannot agree exactly what to do about it, it will pass a statute to the effect (as well as the undisclosed purpose) of which is to dump the problem in the lap of the courts ....");
  • 181
    • 62749159856 scopus 로고    scopus 로고
    • see also Eskridge, supra note 72, at 386
    • see also Eskridge, supra note 72, at 386.
  • 182
    • 38849165172 scopus 로고    scopus 로고
    • Paul Diller, Intrastate Preemption, 87 B.U. L. REV. 1113, 1147 (2007) (Legislative ambiguity is also frequently an intentional recognition of the limitations of the legislative process by the legislature itself. Legislation is necessarily forward-looking and cannot anticipate the circumstances that may arise years ahead concerning a particular application of legislation.);
    • Paul Diller, Intrastate Preemption, 87 B.U. L. REV. 1113, 1147 (2007) ("Legislative ambiguity is also frequently an intentional recognition of the limitations of the legislative process by the legislature itself. Legislation is necessarily forward-looking and cannot anticipate the circumstances that may arise years ahead concerning a particular application of legislation.");
  • 184
    • 84963456897 scopus 로고    scopus 로고
    • notes 76-84 and accompanying text
    • See supra notes 76-84 and accompanying text.
    • See supra
  • 185
    • 62749193082 scopus 로고    scopus 로고
    • S. REP. NO. 104-357, at 9, 11 (1996).
    • S. REP. NO. 104-357, at 9, 11 (1996).
  • 186
    • 62749203327 scopus 로고    scopus 로고
    • Commentary, The Database Debate: In Support of an Inequitable Solution, 13 ALB. L
    • noting that congressional ambiguity regarding database legislation suggests a desire to leave much of the law open to judicial interpretation
    • Cf. Dov S. Greenbaum, Commentary, The Database Debate: In Support of an Inequitable Solution, 13 ALB. L.J. SCI. & TECH. 431, 499 (2003) (noting that congressional ambiguity regarding database legislation suggests a desire to leave much of the law open to judicial interpretation);
    • (2003) J. SCI. & TECH , vol.431 , pp. 499
    • Cf1    Dov, S.2    Greenbaum3
  • 187
    • 62749184175 scopus 로고    scopus 로고
    • Tiffany M. Wong, Comment, Defendants' Standing to Oppose Lead Plaintiff Appointment Under the Private Securities Litigation Reform Act of 1995, 2003 U. CHI. LEGAL F. 833, 846 (noting that silence in the Private Securities Litigation Reform Act with respect to the most adequate plaintiff presumption raises the question of whether the text was intentionally left vague to give courts discretion).
    • Tiffany M. Wong, Comment, Defendants' Standing to Oppose Lead Plaintiff Appointment Under the Private Securities Litigation Reform Act of 1995, 2003 U. CHI. LEGAL F. 833, 846 (noting that silence in the Private Securities Litigation Reform Act with respect to the most adequate plaintiff presumption "raises the question of whether the text was intentionally left vague to give courts discretion").
  • 188
    • 11844282123 scopus 로고    scopus 로고
    • See Patricia L. Bellia, Defending Cyberproperty, 79 N.YU. L. REV. 2164, 2258 (2004);
    • See Patricia L. Bellia, Defending Cyberproperty, 79 N.YU. L. REV. 2164, 2258 (2004);
  • 189
    • 62749160517 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1651
    • Kerr, supra note 32, at 1651.
  • 190
    • 38949159565 scopus 로고    scopus 로고
    • Section IIB. 1
    • See supra Section IIB. 1.
    • See supra
  • 191
    • 62749130076 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1651
    • Kerr, supra note 32, at 1651.
  • 192
    • 62749156315 scopus 로고    scopus 로고
    • Bellia, supra note 133, at 2258
    • Bellia, supra note 133, at 2258.
  • 193
    • 38949192938 scopus 로고    scopus 로고
    • See note 128, at, stating that considerations of judicial administration may be useful where there is uncertainty as to the conect statutory interpretation
    • See POSNER, supra note 128, at 289 (stating that considerations of judicial administration may be useful where there is uncertainty as to the conect statutory interpretation).
    • supra , pp. 289
    • POSNER1
  • 194
    • 62749083570 scopus 로고    scopus 로고
    • See supra Section II.B.2.
    • See supra Section II.B.2.
  • 195
    • 62749084406 scopus 로고    scopus 로고
    • This notion that it is acceptable for the courts to branch out somewhat in their interpretation of the statute in these insider cases may even be supported under other jurisprudential theories of statutory interpretation. Although there are a wide variety of views on statutory interpretation, one clear divide exists between those that view judges as honest agents, whose role it is to carry out the commands of the legislature by closely adhering to a statute's text and legislative history, and those that argue that courts should consider the cooperative nature of lawmaking, the importance of context, and the need for statutes to evolve over time. See ESKRIDGE, supra note 129, at 141-42;
    • This notion that it is acceptable for the courts to branch out somewhat in their interpretation of the statute in these insider cases may even be supported under other jurisprudential theories of statutory interpretation. Although there are a wide variety of views on statutory interpretation, one clear divide exists between those that view judges as "honest agents," whose role it is to carry out the commands of the legislature by closely adhering to a statute's text and legislative history, and those that argue that courts should consider the cooperative nature of lawmaking, the importance of context, and the need for statutes to evolve over time. See ESKRIDGE, supra note 129, at 141-42;
  • 196
    • 62749203538 scopus 로고    scopus 로고
    • Eskridge, supra note 113, at 320-21 (1989). Arguably, many of the honest agent variety could find that courts should adopt a different interpretation of authorization when the case involves an insider; the legislative history suggests those situations are different and perhaps require a bit more independent judgment by the honest agent.
    • Eskridge, supra note 113, at 320-21 (1989). Arguably, many of the "honest agent" variety could find that courts should adopt a different interpretation of authorization when the case involves an insider; the legislative history suggests those situations are different and perhaps require a bit more independent judgment by the honest agent.
  • 197
    • 62749200684 scopus 로고    scopus 로고
    • See ESKRIDGE, supra note 129, at 124. Additionally, those who are more open to a dynamic, evolutionary perspective to statutory interpretation might argue that courts should have the opportunity to provide an interpretation that better responds to the different context present in the insider situation.
    • See ESKRIDGE, supra note 129, at 124. Additionally, those who are more open to a dynamic, evolutionary perspective to statutory interpretation might argue that courts should have the opportunity to provide an interpretation that better responds to the different context present in the insider situation.
  • 198
    • 62749160518 scopus 로고    scopus 로고
    • See id. at 142.
    • See id. at 142.
  • 199
    • 62749162127 scopus 로고    scopus 로고
    • See Warner, supra note 27, at 12
    • See Warner, supra note 27, at 12.
  • 200
    • 62749193081 scopus 로고    scopus 로고
    • See supra Section II.B. 1.
    • See supra Section II.B. 1.
  • 201
    • 62749153664 scopus 로고    scopus 로고
    • Agency principles should not be used to interpret words in a statute without a careful examination of the impact of such incorporation. See Deborah A. DeMott, Statutory Ingredients in Common Law Change: Issues in the Development of Agency Doctrine, in COMMERCIAL LAW AND COMMERCIAL PRACTICE 57, 83 Sarah Worthington ed, 2003, Transplanting common-law doctrines into statutory settings requires care and close attention to statutory purpose and the operative meaning of common-law doctrines
    • Agency principles should not be used to interpret words in a statute without a careful examination of the impact of such incorporation. See Deborah A. DeMott, Statutory Ingredients in Common Law Change: Issues in the Development of Agency Doctrine, in COMMERCIAL LAW AND COMMERCIAL PRACTICE 57, 83 (Sarah Worthington ed., 2003) ("[Transplanting common-law doctrines into statutory settings requires care and close attention to statutory purpose and the operative meaning of common-law doctrines.").
  • 202
    • 62749136852 scopus 로고    scopus 로고
    • Other commentators have noted how strikingly broad the agency-based theory of authorization is. E.g., Kerr, supra note 32, at 1633.
    • Other commentators have noted how "strikingly broad" the agency-based theory of authorization is. E.g., Kerr, supra note 32, at 1633.
  • 203
    • 62749186822 scopus 로고    scopus 로고
    • Deborah A. DeMott, Beyond Metaphor: An Analysis of Fiduciary Obligation, 1988 DUKE L.J. 879, 879.
    • Deborah A. DeMott, Beyond Metaphor: An Analysis of Fiduciary Obligation, 1988 DUKE L.J. 879, 879.
  • 204
    • 0000012314 scopus 로고
    • The Fiduciary Relationship: Its Economic Character and Legal Consequences, 66
    • Robert Cooter & Bradley J. Freedman, The Fiduciary Relationship: Its Economic Character and Legal Consequences, 66 N.Y.U. L. REV. 1045, 1045-46 (1991);
    • (1991) N.Y.U. L. REV , vol.1045 , pp. 1045-1046
    • Cooter, R.1    Freedman, B.J.2
  • 205
    • 62749167519 scopus 로고    scopus 로고
    • DeMott, supra note 144, at 879, 882
    • DeMott, supra note 144, at 879, 882.
  • 206
    • 62749185954 scopus 로고    scopus 로고
    • Cf. Michael J. Phillips, Employer Sexual Harassment Liability Under Agency Principles: A Second Look at Meritor Savings Bank, FSB v. Vinson, 44 VAND. L. REV. 1229, 1255-56 (1991) (arguing against the use of agency principles in employment sexual harassment cases and stating that because of the poor fit between agency rules and sexual harassment law courts tend to apply different rules in different settings, often in an apparently manipulative, result-oriented fashion);
    • Cf. Michael J. Phillips, Employer Sexual Harassment Liability Under Agency Principles: A Second Look at Meritor Savings Bank, FSB v. Vinson, 44 VAND. L. REV. 1229, 1255-56 (1991) (arguing against the use of agency principles in employment sexual harassment cases and stating that because of the poor fit between agency rules and sexual harassment law "courts tend to apply different rules in different settings, often in an apparently manipulative, result-oriented fashion");
  • 207
    • 62749105148 scopus 로고    scopus 로고
    • Dawn K. McGee, Note, Potential Liability for Misrepresentations in Residential Real Estate Transactions: Let the Broker Beware, 16 FORDHAM URB. L.J. 127, 150-51 (1988) ([C]ourts are ... imposing] broker liability for misrepresentation or nondisclosure on a result-oriented basis.).
    • Dawn K. McGee, Note, Potential Liability for Misrepresentations in Residential Real Estate Transactions: Let the Broker Beware, 16 FORDHAM URB. L.J. 127, 150-51 (1988) ("[C]ourts are ... imposing] broker liability for misrepresentation or nondisclosure on a result-oriented basis.").
  • 208
    • 62749134858 scopus 로고    scopus 로고
    • See, e.g., Meinhard v. Salmon, 164 N.E. 545, 546 (N.Y. 1928) (A trustee is held to something stricter than the morals of the market place. Not honesty alone, but the punctilio of an honor the most sensitive, is then the standard of behavior.);
    • See, e.g., Meinhard v. Salmon, 164 N.E. 545, 546 (N.Y. 1928) ("A trustee is held to something stricter than the morals of the market place. Not honesty alone, but the punctilio of an honor the most sensitive, is then the standard of behavior.");
  • 209
    • 62749184176 scopus 로고    scopus 로고
    • see also Robert C Clark, Agency Costs versus Fiduciary Duties, in PRINCIPALS AND AGENTS: THE STRUCTURE OF BUSINESS 55, 75-76 (John W Pratt & Richard J. Zeckhauser eds., 1985);
    • see also Robert C Clark, Agency Costs versus Fiduciary Duties, in PRINCIPALS AND AGENTS: THE STRUCTURE OF BUSINESS 55, 75-76 (John W Pratt & Richard J. Zeckhauser eds., 1985);
  • 210
    • 62749151690 scopus 로고    scopus 로고
    • Robert W. Tuttle, The Fiduciary's Fiduciary: Legal Ethics in Fiduciary Representation, 1994 U. ILL. L. REV. 889, 896.
    • Robert W. Tuttle, The Fiduciary's Fiduciary: Legal Ethics in Fiduciary Representation, 1994 U. ILL. L. REV. 889, 896.
  • 211
    • 62749126916 scopus 로고    scopus 로고
    • Frank H. Easterbrook, Foreword, The Court and the Economic System, 98 HARV. L. REV. 4, 60 (1984).
    • Frank H. Easterbrook, Foreword, The Court and the Economic System, 98 HARV. L. REV. 4, 60 (1984).
  • 212
    • 62749202545 scopus 로고    scopus 로고
    • Int'l Airport Ctrs., L.L.C v. Citrin, 440 F.3d 418, 419 (7th Cir. 2006); Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000).
    • Int'l Airport Ctrs., L.L.C v. Citrin, 440 F.3d 418, 419 (7th Cir. 2006); Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1125 (W.D. Wash. 2000).
  • 213
    • 62749192435 scopus 로고    scopus 로고
    • Citrin, 440 F.3d at 419-20.
    • Citrin, 440 F.3d at 419-20.
  • 214
    • 62749142393 scopus 로고    scopus 로고
    • Warner, supra note 27, at 20-21
    • Warner, supra note 27, at 20-21.
  • 215
    • 62749193704 scopus 로고    scopus 로고
    • RESTATEMENT (SECOND) OF AGENCY § 112 (1958).
    • RESTATEMENT (SECOND) OF AGENCY § 112 (1958).
  • 216
    • 62749203539 scopus 로고    scopus 로고
    • See id. § 108(2).
    • See id. § 108(2).
  • 217
    • 62749158157 scopus 로고    scopus 로고
    • See H.R. REP. NO. 98-894, at 15 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3701 (excluding unauthorized access for use that is incidental, such as doing homework or playing computer games).
    • See H.R. REP. NO. 98-894, at 15 (1984), reprinted in 1984 U.S.CCA.N. 3689, 3701 (excluding unauthorized access for use that is "incidental," such as doing homework or playing computer games).
  • 218
    • 62749195049 scopus 로고    scopus 로고
    • Notably, the Third Restatement of Agency tightens some of these conceptual gaps that present opportunities for differing outcomes because it evaluates whether authority was actually present in a situation rather than whether circumstances terminated it. See RESTATEMENT (THIRD) OF AGENCY § 306 reporter's notes (2006). Under a Third Restatement interpretation of access without authorization, section 2.01 could be used to find that the employee never had authority for the specific action because it was unreasonable for him to believe that his employer wished him to take the action of, for example, deleting incriminating files or downloading confidential information that will later be used to compete with the employer.
    • Notably, the Third Restatement of Agency tightens some of these conceptual gaps that present opportunities for differing outcomes because it evaluates whether authority was actually present in a situation rather than whether circumstances terminated it. See RESTATEMENT (THIRD) OF AGENCY § 306 reporter's notes (2006). Under a Third Restatement interpretation of access "without authorization," section 2.01 could be used to find that the employee never had authority for the specific action because it was unreasonable for him to believe that his employer wished him to take the action of, for example, deleting incriminating files or downloading confidential information that will later be used to compete with the employer.
  • 220
    • 62749202546 scopus 로고    scopus 로고
    • 18 U.S.C § 1839(3) (2006); UNIF. TRADE SECRETS ACT § 1(4) (1985).
    • 18 U.S.C § 1839(3) (2006); UNIF. TRADE SECRETS ACT § 1(4) (1985).
  • 221
    • 62749103231 scopus 로고    scopus 로고
    • See Chan & Rubiner, supra note 10, at 12
    • See Chan & Rubiner, supra note 10, at 12.
  • 222
    • 62749099907 scopus 로고    scopus 로고
    • H.R. REP. NO. 104-788, at 7 (1996), reprinted in 1996 U.S.CCA.N. 4021, 4026.
    • H.R. REP. NO. 104-788, at 7 (1996), reprinted in 1996 U.S.CCA.N. 4021, 4026.
  • 223
    • 62749097813 scopus 로고    scopus 로고
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 930 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. .13, 2008).
    • See, e.g., Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 930 (W.D. Tenn. 2008), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. .13, 2008).
  • 224
    • 62749137051 scopus 로고    scopus 로고
    • Peter J. Pizzi, Disloyal Employees: Computer Abuse Law Turns on Meaning of 'Without Authorization', N.Y. LJ., Sept. 5, 2006, at 5, 9.
    • Peter J. Pizzi, Disloyal Employees: Computer Abuse Law Turns on Meaning of 'Without Authorization', N.Y. LJ., Sept. 5, 2006, at 5, 9.
  • 225
    • 62749139409 scopus 로고    scopus 로고
    • Warner, supra note 27, at 13
    • Warner, supra note 27, at 13.
  • 226
    • 62749116378 scopus 로고
    • Defining the Scope of Controlling Shareholders' Fiduciary Responsibilities, 22
    • See
    • See J.A.C. Hetherington, Defining the Scope of Controlling Shareholders' Fiduciary Responsibilities, 22 WAKE FOREST L. REV. 9,11 (1987).
    • (1987) WAKE FOREST L. REV , vol.9 , pp. 11
    • Hetherington, J.A.C.1
  • 227
    • 62749168194 scopus 로고    scopus 로고
    • See Phillips, supra note 146, at 1255
    • See Phillips, supra note 146, at 1255.
  • 228
    • 62749205674 scopus 로고    scopus 로고
    • GREGORY, supra note 14, at 5, (noting that agency relations may be created by mistake);
    • GREGORY, supra note 14, at 5, (noting that agency relations may be created by "mistake");
  • 230
    • 62749183535 scopus 로고    scopus 로고
    • See supra Section II.B.1.
    • See supra Section II.B.1.
  • 231
    • 62749138121 scopus 로고    scopus 로고
    • See, e.g., Kerr, supra note 32, at 1650 (discussing the contract-based approach with respect to website owners and internet users).
    • See, e.g., Kerr, supra note 32, at 1650 (discussing the contract-based approach with respect to website owners and internet users).
  • 232
    • 62749123979 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1646 (Regulation by contract offers a significantly weaker form of regulation than regulation by code.);
    • Kerr, supra note 32, at 1646 ("Regulation by contract offers a significantly weaker form of regulation than regulation by code.");
  • 233
    • 62749162128 scopus 로고    scopus 로고
    • see also Bellia, supra note 133, at 2258 (discussing due process concerns raised by allowing a network, owner's posted usage policy to potentially determine criminal liability);
    • see also Bellia, supra note 133, at 2258 (discussing due process concerns raised by allowing a network, owner's posted usage policy to potentially determine criminal liability);
  • 234
    • 35648994217 scopus 로고    scopus 로고
    • note 9, at, criticizing the use of an employment contract to define unauthorized access in a CFAA case
    • Galbraith, supra note 9, at 345-49 (criticizing the use of an employment contract to define unauthorized access in a CFAA case).
    • supra , pp. 345-349
    • Galbraith1
  • 235
    • 62749158527 scopus 로고    scopus 로고
    • Ken, supra note 32, at 1650. Because interpretations in the civil context can be applied to criminal prosecutions under the CFAA, this main concern feeds into other concerns-specifically, that the computer owner will be able to define the scope of criminality.
    • Ken, supra note 32, at 1650. Because interpretations in the civil context can be applied to criminal prosecutions under the CFAA, this main concern feeds into other concerns-specifically, that the computer owner will be able to define the scope of criminality.
  • 236
    • 62749155216 scopus 로고    scopus 로고
    • Id. at 1651. And, if it is not clear to a user that he is operating under a contract, there is the potential for due process violations.
    • Id. at 1651. And, if it is not clear to a user that he is operating under a contract, there is the potential for due process violations.
  • 237
    • 62749169033 scopus 로고    scopus 로고
    • Bellia, supra note 133, at 2258
    • Bellia, supra note 133, at 2258.
  • 238
    • 62749138317 scopus 로고    scopus 로고
    • Kerr, supra note 32, at 1646
    • Kerr, supra note 32, at 1646.
  • 239
    • 62749120941 scopus 로고    scopus 로고
    • E.g., id. 1650 (discussing the click-through restrictions a computer network owner could create to define access).
    • E.g., id. 1650 (discussing the click-through restrictions a computer network owner could create to define access).
  • 240
    • 62749112010 scopus 로고    scopus 로고
    • E.g., id. at 1646 (discussing how a seventeen-year-old can easily misrepresent her age in order to access a site that requires users to indicate that they are at least eighteen years old before access is granted).
    • E.g., id. at 1646 (discussing how a seventeen-year-old can easily misrepresent her age in order to access a site that requires users to indicate
  • 241
    • 62749190907 scopus 로고    scopus 로고
    • Bellia, supra note 133, at 2234-41;
    • Bellia, supra note 133, at 2234-41;
  • 242
    • 62749167520 scopus 로고    scopus 로고
    • Galbraith, supra note 9, at 321-24; Kerr, supra note 32.
    • Galbraith, supra note 9, at 321-24; Kerr, supra note 32.
  • 243
    • 62749122606 scopus 로고    scopus 로고
    • Defendant Timothy C. Smith's Reply in Support of his Motion to Dismiss at 3, Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 933-34 (W.D. Tenn. 2008) (No. l:07-cv-01201-JDT-sta), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008) (citing the Employment Access Agreement).
    • Defendant Timothy C. Smith's Reply in Support of his Motion to Dismiss at 3, Black & Decker (U.S.), Inc. v. Smith, 568 F. Supp. 2d 929, 933-34 (W.D. Tenn. 2008) (No. l:07-cv-01201-JDT-sta), interlocutory appeal granted, No. 07-1201, 2008 WL 3850825 (W.D. Tenn. Aug. 13, 2008) (citing the Employment Access Agreement).
  • 244
    • 62749159625 scopus 로고    scopus 로고
    • See supra Section II.B. 1.
    • See supra Section II.B. 1.
  • 245
    • 62749133370 scopus 로고    scopus 로고
    • See, e.g., Black & Decker, 568 F. Supp. 2d at 933-37 (outlining the divide between courts applying an agency-based approach and those applying a code-based approach and adopting the latter without substantial consideration of the employment agreements relating to the employee's authorization).
    • See, e.g., Black & Decker, 568 F. Supp. 2d at 933-37 (outlining the divide between courts applying an agency-based approach and those applying a code-based approach and adopting the latter without substantial consideration of the employment agreements relating to the employee's authorization).
  • 246
    • 62749130077 scopus 로고    scopus 로고
    • Indeed, an unconscionability analysis drawn, from contract law could unnecessarily confuse the CFAA analysis and may be a factor that courts could take into account when deciding whether to use a contract to define authorization in a particular CFAA employment case
    • Indeed, an unconscionability analysis drawn, from contract law could unnecessarily confuse the CFAA analysis and may be a factor that courts could take into account when deciding whether to use a contract to define authorization in a particular CFAA employment case.
  • 247
    • 62749165164 scopus 로고    scopus 로고
    • See supra Section I.C.
    • See supra Section I.C.
  • 248
    • 62749182664 scopus 로고    scopus 로고
    • See supra Section III.B.l.
    • See supra Section III.B.l.
  • 249
    • 62749091946 scopus 로고    scopus 로고
    • Ian Ayres & Robert Gertner, Filling Gaps in Incomplete Contracts: An Economic Theory of Default Rules, 99 YALE LJ. 87, 97, 128 (1989).
    • Ian Ayres & Robert Gertner, Filling Gaps in Incomplete Contracts: An Economic Theory of Default Rules, 99 YALE LJ. 87, 97, 128 (1989).
  • 250
    • 20444452557 scopus 로고    scopus 로고
    • Information-eliciting penalty default rules that place the burden on employers have been found beneficial in other employment contexts where the default offers (1) more protection for employees who are generally ignorant of the laws governing their employment relationships and (2) forces the better informed employers to educate employees about the terms governing the employment relationship. Rachel Leiser Levy, Comment, Judicial Interpretation of Employee Handbooks: The Creation of a Common Law Information-Eliciting Penalty Default Rule, 72 U. CHI. L. REV. 695, 697-98 2005
    • Information-eliciting penalty default rules that place the burden on employers have been found beneficial in other employment contexts where the default offers (1) more protection for employees who are generally ignorant of the laws governing their employment relationships and (2) forces the better informed employers to educate employees about the terms governing the employment relationship. Rachel Leiser Levy, Comment, Judicial Interpretation of Employee Handbooks: The Creation of a Common Law Information-Eliciting Penalty Default Rule, 72 U. CHI. L. REV. 695, 697-98 (2005).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.