-
1
-
-
85028930629
-
-
See Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, § 2102 a, 2190-92
-
See Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, Pub. L. No. 98-473, § 2102 (a), 98 Stat. 2190, 2190-92.
-
Stat.
, vol.98
, pp. 2190
-
-
-
2
-
-
79251618752
-
-
Technically speaking, the Computer Fraud and Abuse Act was the 1986 amendment to 18 U. S. C. § 1030
-
Technically speaking, the Computer Fraud and Abuse Act was the 1986 amendment to 18 U. S. C. § 1030.
-
-
-
-
3
-
-
84910046635
-
-
See Pub. L. No. 99-474, However, it is common to refer to § 1030 as a whole as the Computer Fraud and Abuse Act. I adopt that convention here
-
See Pub. L. No. 99-474, 100 Stat. 1213 (1986). However, it is common to refer to § 1030 as a whole as the Computer Fraud and Abuse Act. I adopt that convention here.
-
(1986)
Stat.
, vol.100
, pp. 1213
-
-
-
4
-
-
79251604746
-
-
See infra Part I
-
See infra Part I.
-
-
-
-
5
-
-
79251645398
-
-
See infra Part I
-
See infra Part I.
-
-
-
-
6
-
-
79251649411
-
-
See, § 1030 a 1-3 Supp. II, criminalizing certain computer misuse relating to national security, financial records, and government property
-
See 18 U. S. C. § 1030 (a) (1) - (3) (Supp. II 1985) (criminalizing certain computer misuse relating to national security, financial records, and government property).
-
(1985)
U. S. C.
, vol.18
-
-
-
7
-
-
0242595962
-
Cybercrime's scope: Interpreting "access" and "authorization" in computer misuse statutes
-
See, 1616
-
See Orin S. Kerr, Cybercrime's Scope: Interpreting "Access" and "Authorization" in Computer Misuse Statutes, 78 N. Y. U. L. REV. 1596, 1616 (2003)
-
(2003)
N. Y. U. L. Rev.
, vol.78
, pp. 1596
-
-
Kerr, O.S.1
-
8
-
-
79251636778
-
-
reviewing, § 1030 provisions
-
(reviewing 18 U. S. C. § 1030 provisions).
-
U. S. C.
, vol.18
-
-
-
9
-
-
79251623091
-
-
See id. "The courts that have interpreted 'access' and 'without authorization' have offered a broad range of interpretations that run the gamut from quite narrow to extraordinarily broad."
-
See id. ("The courts that have interpreted 'access' and 'without authorization' have offered a broad range of interpretations that run the gamut from quite narrow to extraordinarily broad.").
-
-
-
-
10
-
-
84930971823
-
-
See, e.g., City of Chicago v. Morales, 56 noting that a criminal statute may be invalidated if it "authorizes... arbitrary and discriminatory enforcement"
-
See, e.g., City of Chicago v. Morales, 527 U. S. 41, 56 (1999) (noting that a criminal statute may be invalidated if it "authorize[s]... arbitrary and discriminatory enforcement").
-
(1999)
U. S.
, vol.527
, pp. 41
-
-
-
11
-
-
79251640135
-
-
See infra Part II. A
-
See infra Part II. A.
-
-
-
-
12
-
-
84891077723
-
-
C. D. Cal
-
259 F. R. D. 449 (C. D. Cal. 2009).
-
(2009)
F. R. D.
, vol.259
, pp. 449
-
-
-
13
-
-
79251621204
-
-
Id. at 457
-
Id. at 457.
-
-
-
-
14
-
-
79251614566
-
-
No. CR 08-00237 MHP, N. D. Cal. Apr. 13
-
No. CR 08-00237 MHP, 2009 WL 981336 (N. D. Cal. Apr. 13, 2009).
-
(2009)
Wl
, vol.2009
, pp. 981336
-
-
-
15
-
-
79251620133
-
-
*4
-
*4.
-
-
-
-
16
-
-
79251603929
-
-
See infra Part I
-
See infra Part I.
-
-
-
-
17
-
-
79251637301
-
-
See Kerr, supra note 6, at 1617 "Several recent decisions point toward remarkably expansive interpretations of unauthorized access."
-
See Kerr, supra note 6, at 1617 ("[S]everal recent decisions point toward remarkably expansive interpretations of unauthorized access.").
-
-
-
-
18
-
-
79251620949
-
-
See infra Part II. B
-
See infra Part II. B.
-
-
-
-
19
-
-
79251649164
-
-
Supreme Court's recent scrutiny of the "honest services" statute, § 1346, may make such a future much more likely
-
The Supreme Court's recent scrutiny of the "honest services" statute, 18 U. S. C. § 1346, may make such a future much more likely.
-
U. S. C.
, vol.18
-
-
-
20
-
-
79251604745
-
Court skeptical of federal anti-fraud law
-
See, Dec. 8
-
See Mark Sherman, Court Skeptical of Federal Anti-Fraud Law, DENV. POST, Dec. 8, 2009, http://www.denverpost.com/business/ci-13949538.
-
(2009)
Denv. Post
-
-
Sherman, M.1
-
21
-
-
79251646670
-
-
Comprehensive Crime Control Act of 1984, Pub. L. No. 98-473, 98 Stat. 1976
-
Comprehensive Crime Control Act of 1984, Pub. L. No. 98-473, 98 Stat. 1976.
-
-
-
-
22
-
-
85028930629
-
-
See id. § 2102 a, at
-
See id. § 2102 (a), 98 Stat. at 2190.
-
Stat.
, vol.98
, pp. 2190
-
-
-
23
-
-
79251638580
-
-
§ 1030 a 1-3 Supp. II, For the sake of simplicity, I will refer to this language as simply a prohibition on "access without authorization" or "unauthorized access."
-
18 U. S. C. § 1030 (a) (1) - (3) (Supp. II 1985). For the sake of simplicity, I will refer to this language as simply a prohibition on "access without authorization" or "unauthorized access."
-
(1985)
U. S. C.
, vol.18
-
-
-
24
-
-
79251639402
-
-
Id
-
Id.
-
-
-
-
25
-
-
79251643206
-
-
Id. § 1030 a 1
-
Id. § 1030 (a) (1).
-
-
-
-
26
-
-
79251604744
-
-
Id. § 1030 a 2
-
Id. § 1030 (a) (2).
-
-
-
-
27
-
-
79251634717
-
-
Id. § 1030 a 3
-
Id. § 1030 (a) (3).
-
-
-
-
28
-
-
84910046635
-
-
Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474
-
Computer Fraud and Abuse Act of 1986, Pub. L. No. 99-474, 100 Stat. 1213.
-
Stat.
, vol.100
, pp. 1213
-
-
-
29
-
-
79251628543
-
-
§ 1030 a 4-6 Supp. IV
-
18 U. S. C. § 1030 (a) (4) - (6) (Supp. IV 1987).
-
(1987)
U. S. C.
, vol.18
-
-
-
30
-
-
79251631971
-
-
Id. § 1030 a 4
-
Id. § 1030 (a) (4).
-
-
-
-
31
-
-
79251601390
-
-
Id. § 1030 a 5
-
Id. § 1030 (a) (5).
-
-
-
-
32
-
-
79251635966
-
-
Id. § 1030 a 6
-
Id. § 1030 (a) (6).
-
-
-
-
33
-
-
79251643205
-
-
Id. § 1030 e 2
-
Id. § 1030 (e) (2).
-
-
-
-
34
-
-
79251613187
-
-
Id
-
Id.
-
-
-
-
36
-
-
73049088185
-
-
reprinted in, 2482, detailing the preference of the Senate Judiciary Committee to limit federal jurisdiction over computer crime to instances involving a "compelling federal interest" or where "the crime itself is interstate in nature"
-
reprinted in 1986 U. S. C. C. A. N. 2479, 2482 (detailing the preference of the Senate Judiciary Committee to limit federal jurisdiction over computer crime to instances involving a "compelling federal interest" or where "the crime itself is interstate in nature").
-
(1986)
U. S. C. C. A. N.
, pp. 2479
-
-
-
37
-
-
0347973522
-
-
Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No. 103-322
-
Violent Crime Control and Law Enforcement Act of 1994, Pub. L. No. 103-322, 108 Stat. 1796.
-
Stat.
, vol.108
, pp. 1796
-
-
-
38
-
-
79251633481
-
Remarks on signing the violent crime control and law enforcement act of 1994
-
See generally
-
See generally William Jefferson Clinton, Remarks on Signing the Violent Crime Control and Law Enforcement Act of 1994, 20 U. DAYTON L. REV. 567 (1995);
-
(1995)
U. Dayton L. Rev.
, vol.20
, pp. 567
-
-
Clinton, W.J.1
-
39
-
-
79251634715
-
The struggle for effective anti-crime legislation-an analysis of the violent crime control and law enforcement act of 1994
-
Bill McCollum, The Struggle for Effective Anti-Crime Legislation-An Analysis of the Violent Crime Control and Law Enforcement Act of 1994, 20 U. DAYTON L. REV. 561 (1995).
-
(1995)
U. Dayton L. Rev.
, vol.20
, pp. 561
-
-
McCollum, B.1
-
40
-
-
79251645160
-
-
Computer Abuse Amendments Act of 1994, Pub. L. No. 103-322, tit. XXIX
-
Computer Abuse Amendments Act of 1994, Pub. L. No. 103-322, tit. XXIX, 108 Stat. 2097.
-
(2097)
Stat.
, vol.108
-
-
-
41
-
-
79251623357
-
-
Id. § 290001 b, at
-
Id. § 290001 (b), 108 Stat. at 2097-98.
-
Stat.
, vol.108
, pp. 2097-2098
-
-
-
42
-
-
85028913445
-
-
Id. § 290001 d, at, At the time, the civil provision stated: Any person who suffers damage or loss by reason of a violation of the section, other than a violation of subsection a 5 B, may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. Damages for violations of any subsection other than subsection a 5 A ii II bb or a 5 B ii II bb are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage
-
Id. § 290001 (d), 108 Stat. at 2098. At the time, the civil provision stated: Any person who suffers damage or loss by reason of a violation of the section, other than a violation of subsection (a) (5) (B), may maintain a civil action against the violator to obtain compensatory damages and injunctive relief or other equitable relief. Damages for violations of any subsection other than subsection (a) (5) (A) (ii) (II) (bb) or (a) (5) (B) (ii) (II) (bb) are limited to economic damages. No action may be brought under this subsection unless such action is begun within 2 years of the date of the act complained of or the date of the discovery of the damage.
-
Stat.
, vol.108
, pp. 2098
-
-
-
43
-
-
79251625724
-
-
§ 1030 g 1994
-
U. S. C. § 1030 (g) (1994).
-
U. S. C.
, vol.18
-
-
-
44
-
-
84903210300
-
-
See Economic Espionage Act of 1996, Pub. L. No. 104-294, tit. II, 3491
-
See Economic Espionage Act of 1996, Pub. L. No. 104-294, tit. II, 110 Stat. 3488, 3491.
-
Stat.
, vol.110
, pp. 3488
-
-
-
45
-
-
79251607755
-
-
See, § 1030 a 2 Supp. II
-
See 18 U. S. C. § 1030 (a) (2) (Supp. II 1996).
-
(1996)
U. S. C.
, vol.18
-
-
-
46
-
-
79251610525
-
-
See id. § 1030 a 2 C
-
See id. § 1030 (a) (2) (C).
-
-
-
-
48
-
-
79251604476
-
-
reprinted in, 2484 noting that "obtaining information" in the statute includes "mere observation of the data"
-
reprinted in 1986 U. S. C. C. A. N. 2479, 2484 (noting that "obtaining information" in the statute includes "mere observation of the data").
-
U. S. C. C. A. N.
, vol.1986
, pp. 2479
-
-
-
49
-
-
79251620132
-
-
§ 1030 e 8 A - D
-
18 U. S. C. § 1030 (e) (8) (A) - (D).
-
U. S. C.
, vol.18
-
-
-
50
-
-
79251625480
-
-
Id. § 1030 c 2 B i - iii
-
Id. § 1030 (c) (2) (B) (i) - (iii).
-
-
-
-
51
-
-
79251613684
-
-
Id. § 1030 e 2
-
Id. § 1030 (e) (2).
-
-
-
-
52
-
-
79251601642
-
Compare
-
§ 1030 e 2 B Supp. IV, defining a "Federal interest" computer as one "which is one of two or more computers used in committing the offense, not all of which are located in the same State"
-
Compare 18 U. S. C. § 1030 (e) (2) (B) (Supp. IV 1987) (defining a "Federal interest" computer as one "which is one of two or more computers used in committing the offense, not all of which are located in the same State")
-
(1987)
U. S. C.
, vol.18
-
-
-
53
-
-
79251613430
-
-
with, § 1030 e 2 B Supp. II, defining a "protected computer" as one "which is used in interstate or foreign commerce or communication"
-
with 18 U. S. C. § 1030 (e) (2) (B) (Supp. II 1996) (defining a "protected computer" as one "which is used in interstate or foreign commerce or communication").
-
(1996)
U. S. C.
, vol.18
-
-
-
54
-
-
79251645656
-
-
See infra notes 65-73 and accompanying text
-
See infra notes 65-73 and accompanying text.
-
-
-
-
55
-
-
79953830314
-
-
See Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism USA PATRIOT Act of 2001, Pub. L. No. 107-56
-
See Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. No. 107-56, 115 Stat. 272.
-
Stat.
, vol.115
, pp. 272
-
-
-
56
-
-
79251638579
-
-
Id. § 814, at
-
Id. § 814, 115 Stat. at 382.
-
Stat.
, vol.115
, pp. 382
-
-
-
57
-
-
79251640392
-
-
See, § 1030 e 2 B Supp. II
-
See 18 U. S. C. § 1030 (e) (2) (B) (Supp. II 2004).
-
(2004)
U. S. C.
, vol.18
-
-
-
58
-
-
79251636777
-
-
Id
-
Id.
-
-
-
-
59
-
-
79251633734
-
-
See infra notes 60-64 and accompanying text
-
See infra notes 60-64 and accompanying text.
-
-
-
-
60
-
-
79251619788
-
-
See infra notes 60-65 and accompanying text
-
See infra notes 60-65 and accompanying text.
-
-
-
-
61
-
-
79251604210
-
-
§ 1030 a 5 B v
-
18 U. S. C. § 1030 (a) (5) (B) (v);
-
U. S. C.
, vol.18
-
-
-
62
-
-
79251638579
-
-
see § 814 a 4, at
-
see § 814 (a) (4), 115 Stat. at 382.
-
Stat.
, vol.115
, pp. 382
-
-
-
63
-
-
85028916344
-
-
Former Vice President Protection Act of 2008, Pub. L. No. 110-326
-
Former Vice President Protection Act of 2008, Pub. L. No. 110-326, 122 Stat. 3560.
-
Stat.
, vol.122
, pp. 3560
-
-
-
64
-
-
79251614802
-
-
See id. § 203, at
-
See id. § 203, 122 Stat. at 3561.
-
Stat.
, vol.122
, pp. 3561
-
-
-
65
-
-
79251603928
-
-
See id
-
See id.
-
-
-
-
66
-
-
79251605792
-
-
See id. § 204, at
-
See id. § 204, 122 Stat. at 3561-62.
-
Stat.
, vol.122
, pp. 3561-3562
-
-
-
67
-
-
13044286650
-
-
§ 1030 e 2 West 2000 &Supp
-
18 U. S. C. A. § 1030 (e) (2) (West 2000 &Supp. 2009).
-
(2009)
U. S. C. A.
, vol.18
-
-
-
68
-
-
79251611895
-
-
Id
-
Id.
-
-
-
-
69
-
-
79251606851
-
-
Compare, § 1030 e 2 B
-
Compare 18 U. S. C. § 1030 (e) (2) (B) (2006)
-
(2006)
U. S. C.
, vol.18
-
-
-
70
-
-
13044286650
-
-
with, § 1030 e 2 West 2000 & Supp, emphasis added
-
with 18 U. S. C. A. § 1030 (e) (2) (West 2000 & Supp. 2009) (emphasis added).
-
(2009)
U. S. C. A.
, vol.18
-
-
-
71
-
-
79251639401
-
-
See United States v. Chesney, 571 6th Cir
-
See United States v. Chesney, 86 F.3d 564, 571 (6th Cir. 1996).
-
(1996)
F.3d
, vol.86
, pp. 564
-
-
-
72
-
-
33645572998
-
-
Gonzales v. Raich, 17
-
Gonzales v. Raich, 545 U. S. 1, 17 (2005)
-
(2005)
U. S.
, vol.545
, pp. 1
-
-
-
73
-
-
33745281175
-
-
quoting Perez v. United States, 152
-
(quoting Perez v. United States, 402 U. S. 146, 152 (1971)).
-
(1971)
U. S.
, vol.402
, pp. 146
-
-
-
74
-
-
79251641486
-
-
See id
-
See id.
-
-
-
-
75
-
-
79251630779
-
-
See id. at 18-19
-
See id. at 18-19.
-
-
-
-
76
-
-
13044286650
-
-
§ 1030 e 2 West 2000 & Supp
-
18 U. S. C. A. § 1030 (e) (2) (West 2000 & Supp. 2009).
-
(2009)
U. S. C. A.
, vol.18
-
-
-
77
-
-
79251637043
-
-
See id
-
See id.
-
-
-
-
78
-
-
79251640134
-
-
See id
-
See id.
-
-
-
-
79
-
-
79251634716
-
-
See id
-
See id.
-
-
-
-
80
-
-
79251641155
-
-
§ 1030 e 1 defines a "computer" as: an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device.
-
18 U. S. C. A. § 1030 (e) (1) defines a "computer" as: an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device[.]
-
U. S. C. A.
, vol.18
-
-
-
81
-
-
79251619019
-
-
See, e.g., Press Release, U. S. Attorney's Office, Dist. of Mass., Former Inmate Sentenced for Hacking Prison Computer Dec. 22, 2009, available at, illustrating how a person hacking one prison computer can have a significant effect on the lives of hundreds of government officials outside prison walls
-
See, e.g., Press Release, U. S. Attorney's Office, Dist. of Mass., Former Inmate Sentenced for Hacking Prison Computer (Dec. 22, 2009), available at http://www.cybercrime.govt/janoskosent.pdf (illustrating how a person hacking one prison computer can have a significant effect on the lives of hundreds of government officials outside prison walls).
-
-
-
-
82
-
-
79251607991
-
-
Cf. United States v. Jeronimo-Bautista, 1273-74 10th Cir
-
Cf. United States v. Jeronimo-Bautista, 425 F.3d 1266, 1273-74 (10th Cir. 2005).
-
(2005)
F.3d
, vol.425
, pp. 1266
-
-
-
83
-
-
79251610897
-
-
See, § 1030 e 1
-
See 18 U. S. C. A. § 1030 (e) (1).
-
U. S. C. A.
, vol.18
-
-
-
84
-
-
79251625479
-
-
Cf. United States v. Mitra, 496 7th Cir
-
Cf. United States v. Mitra, 405 F.3d 492, 496 (7th Cir. 2005).
-
(2005)
F.3d
, vol.405
, pp. 492
-
-
-
85
-
-
79251639099
-
-
See, § 1030 a 2
-
See 18 U. S. C. A. § 1030 (a) (2).
-
U. S. C. A.
, vol.18
-
-
-
86
-
-
79251627084
-
-
See Kerr, supra note 6, at 1597
-
See Kerr, supra note 6, at 1597.
-
-
-
-
87
-
-
79251618255
-
-
See id. at 1619-21
-
See id. at 1619-21.
-
-
-
-
88
-
-
79251642255
-
-
See id. at 1622-24
-
See id. at 1622-24.
-
-
-
-
89
-
-
79251631721
-
-
See discussion infra Part II. A
-
See discussion infra Part II. A.
-
-
-
-
90
-
-
79251626384
-
-
See discussion infra Part II. A
-
See discussion infra Part II. A.
-
-
-
-
91
-
-
79251618504
-
-
See discussion infra Part II. B
-
See discussion infra Part II. B.
-
-
-
-
92
-
-
84891077723
-
-
451 C. D. Cal
-
259 F. R. D. 449, 451 (C. D. Cal. 2009).
-
(2009)
F. R. D.
, vol.259
, pp. 449
-
-
-
93
-
-
79251643443
-
-
*, N. D. Cal. Apr. 13
-
* 4 (N. D. Cal. Apr. 13, 2009).
-
(2009)
WL 981336
, vol.2009
, pp. 4
-
-
-
94
-
-
77952687733
-
-
United States v. Williams, 1845
-
United States v. Williams, 128 S. Ct. 1830, 1845 (2008).
-
(2008)
S. Ct.
, vol.128
, pp. 1830
-
-
-
95
-
-
84930971823
-
-
See City of Chicago v. Morales, 56
-
See City of Chicago v. Morales, 527 U. S. 41, 56 (1999).
-
(1999)
U. S.
, vol.527
, pp. 41
-
-
-
96
-
-
84878438257
-
-
Giaccio v. Pennsylvania, 402
-
Giaccio v. Pennsylvania, 382 U. S. 399, 402 (1966).
-
(1966)
U. S.
, vol.382
, pp. 399
-
-
-
97
-
-
79251618751
-
-
Id. at 402-03
-
Id. at 402-03.
-
-
-
-
98
-
-
79251640647
-
-
See Wainwright v. Stone, 22-23, "For the purpose of determining whether a state statute is too vague and indefinite to constitute valid legislation 'we must take the statute as though it read precisely as the highest court of the State has interpreted it.'"
-
See Wainwright v. Stone, 414 U. S. 21, 22-23 (1973) ("For the purpose of determining whether a state statute is too vague and indefinite to constitute valid legislation 'we must take the statute as though it read precisely as the highest court of the State has interpreted it.'").
-
(1973)
U. S.
, vol.414
, pp. 21
-
-
-
99
-
-
79251624669
-
-
See id
-
See id.
-
-
-
-
100
-
-
79251624936
-
-
See id
-
See id.
-
-
-
-
101
-
-
79251611896
-
-
See id
-
See id.
-
-
-
-
102
-
-
84930971823
-
-
See, e.g., City of Chicago v. Morales, 64, 92, 112, invalidating a Chicago ordinance under a broad reading while the dissent would have upheld the statute under a narrow reading
-
See, e.g., City of Chicago v. Morales, 527 U. S. 41, 64, 92, 112 (1999) (invalidating a Chicago ordinance under a broad reading while the dissent would have upheld the statute under a narrow reading).
-
(1999)
U. S.
, vol.527
, pp. 41
-
-
-
103
-
-
84878223689
-
-
Coates v. City of Cincinnati, 616
-
Coates v. City of Cincinnati, 402 U. S. 611, 616 (1971).
-
(1971)
U. S.
, vol.402
, pp. 611
-
-
-
104
-
-
79251647172
-
-
See id. at 611 quoting CINCINNATI, OHIO, Code § 901-L6 1956
-
See id. at 611 (quoting CINCINNATI, OHIO, Code § 901-L6 (1956)).
-
-
-
-
105
-
-
79251610524
-
-
Id. at 612 quoting City of Cincinnati v. Coates, 249 Ohio
-
Id. at 612 (quoting City of Cincinnati v. Coates, 255 N. E.2d 247, 249 (Ohio 1970)).
-
(1970)
N. E.2d
, vol.255
, pp. 247
-
-
-
106
-
-
79251613682
-
-
Id. at 614
-
Id. at 614
-
-
-
-
107
-
-
77951728816
-
-
quoting Connally v. Gen. Constr. Co., 391
-
(quoting Connally v. Gen. Constr. Co., 269 U. S. 385, 391 (1926)).
-
(1926)
U. S.
, vol.269
, pp. 385
-
-
-
108
-
-
79251640389
-
-
See id
-
See id.
-
-
-
-
109
-
-
84872128600
-
-
See, e.g., Kolender v. Lawson, 357
-
See, e.g., Kolender v. Lawson, 461 U. S. 352, 357 (1983).
-
(1983)
U. S.
, vol.461
, pp. 352
-
-
-
110
-
-
79251614309
-
-
Id. at 358
-
Id. at 358.
-
-
-
-
111
-
-
79251637300
-
-
Id. at 357
-
Id. at 357.
-
-
-
-
112
-
-
79251623614
-
-
See id. at 358
-
See id. at 358.
-
-
-
-
113
-
-
84910665554
-
-
See Shuttlesworth v. City of Birmingham, 90
-
See Shuttlesworth v. City of Birmingham, 382 U. S. 87, 90 (1965).
-
(1965)
U. S.
, vol.382
, pp. 87
-
-
-
114
-
-
79251630258
-
-
Id
-
Id.
-
-
-
-
115
-
-
79251620401
-
-
See id
-
See id.
-
-
-
-
116
-
-
84891057391
-
-
Compare Kolender, at
-
Compare Kolender, 461 U. S. at 358
-
U. S.
, vol.461
, pp. 358
-
-
-
117
-
-
79251601389
-
-
with, at
-
with Shuttles Worth, 382 U. S. at 90.
-
U. S.
, vol.382
, pp. 90
-
-
Worth, S.1
-
118
-
-
84891057391
-
-
Compare Kolender, at
-
Compare Kolender, 461 U. S. at 358
-
U. S.
, vol.461
, pp. 358
-
-
-
119
-
-
79251622488
-
-
with Shuttlesworth, at
-
with Shuttlesworth, 382 U. S. at 90.
-
U. S.
, vol.382
, pp. 90
-
-
-
120
-
-
84891057391
-
-
at
-
Kolender, 461 U. S. at 358.
-
U. S.
, vol.461
, pp. 358
-
-
Kolender1
-
121
-
-
79251626863
-
-
Id
-
Id.
-
-
-
-
122
-
-
79251622744
-
-
Id
-
Id.
-
-
-
-
123
-
-
79251620131
-
-
Id
-
Id.
-
-
-
-
124
-
-
79251633482
-
-
Id
-
Id.
-
-
-
-
125
-
-
84878438257
-
-
See Giaccio v. Pennsylvania, 402-03
-
See Giaccio v. Pennsylvania, 382 U. S. 399, 402-03 (1966).
-
(1966)
U. S.
, vol.382
, pp. 399
-
-
-
126
-
-
84891057391
-
-
See Kolender, at
-
See Kolender, 461 U. S. at 358.
-
U. S.
, vol.461
, pp. 358
-
-
-
127
-
-
84891077723
-
-
See United States v. Drew, 458 C. D. Cal, noting "there is a considerable amount of controversy" as to the meaning of "without authorization"
-
See United States v. Drew, 259 F. R. D. 449, 458 (C. D. Cal. 2009) (noting "there is a considerable amount of controversy" as to the meaning of "without authorization");
-
(2009)
F. R. D.
, vol.259
, pp. 449
-
-
-
128
-
-
79251617205
-
-
see Kerr, supra note 6, at 1622-24 discussing ambiguities in the concept of authorization to access computers
-
see Kerr, supra note 6, at 1622-24 (discussing ambiguities in the concept of authorization to access computers).
-
-
-
-
129
-
-
79251628315
-
-
See Kerr, supra note 6, at 1630 "Although courts have struggled to distinguish between these two phrases, prohibitions against exceeding authorization appear to reflect concerns that users with some rights to access a computer network could otherwise use those limited rights as an absolute defense to further computer misuse."
-
See Kerr, supra note 6, at 1630 ("Although courts have struggled to distinguish between these two phrases, prohibitions against exceeding authorization appear to reflect concerns that users with some rights to access a computer network could otherwise use those limited rights as an absolute defense to further computer misuse.").
-
-
-
-
130
-
-
79251631481
-
-
See id. at 1637-40 describing cases in which two parties are "bound by a contract that implicitly or explicitly regulates access to a computer, and one side uses the computer in a way that arguably breaches the contract"
-
See id. at 1637-40 (describing cases in which two parties are "bound by a contract that implicitly or explicitly regulates access to a computer, and one side uses the computer in a way that arguably breaches the contract").
-
-
-
-
131
-
-
79251633733
-
-
See id. at 1640-42 discussing the courts' difficulties with interpreting "unauthorized access"
-
See id. at 1640-42 (discussing the courts' difficulties with interpreting "unauthorized access").
-
-
-
-
132
-
-
79251611415
-
-
Id
-
Id.
-
-
-
-
133
-
-
79251638035
-
-
See Kerr, supra note 6, at 1598-99
-
See Kerr, supra note 6, at 1598-99.
-
-
-
-
134
-
-
79251627328
-
-
See generally id. at 1624-32 discussing the conflicting definitions of "access" and "authorization" in case law
-
See generally id. at 1624-32 (discussing the conflicting definitions of "access" and "authorization" in case law).
-
-
-
-
135
-
-
77951715794
-
-
Smith v. Goguen, 574
-
Smith v. Goguen, 415 U. S. 566, 574 (1974).
-
(1974)
U. S.
, vol.415
, pp. 566
-
-
-
136
-
-
79251623890
-
-
See A. HUGH SCOTT & KATHLEEN BURDETTE SHIELDS, COMPUTER AND INTELLECTUAL PROPERTY CRIME: FEDERAL AND STATE LAW 4-3 Supp. 2006 "Congress has steadily increased the breadth of the coverage of the CFAA.... Thus, invasion of or damage to any computer connected to the Internet, or to the information on those computers... is now a federal crime under 18 U. S. C. § 1030."
-
See A. HUGH SCOTT & KATHLEEN BURDETTE SHIELDS, COMPUTER AND INTELLECTUAL PROPERTY CRIME: FEDERAL AND STATE LAW 4-3 (Supp. 2006) ("Congress has steadily increased the breadth of the coverage of the CFAA.... Thus, invasion of or damage to any computer connected to the Internet, or to the information on those computers... is now a federal crime under 18 U. S. C. § 1030.").
-
-
-
-
137
-
-
79251646669
-
-
See id. at 4-25 to -26
-
See id. at 4-25 to -26.
-
-
-
-
138
-
-
79251627823
-
-
See id. at 4-16 "The notion of 'accessing' a computer is central to the CFAA...."
-
See id. at 4-16 ("[T]he notion of 'accessing' a computer is central to the CFAA....").
-
-
-
-
139
-
-
79251647586
-
-
See id. at 4-3 "The original 1984 version of the statute was limited to protecting federal government computers, defense or foreign relations information of the United States, and information of a financial institution or credit reporting agency."
-
See id. at 4-3 ("The original 1984 version of the statute was limited to protecting federal government computers, defense or foreign relations information of the United States, and information of a financial institution or credit reporting agency.").
-
-
-
-
140
-
-
79251635486
-
-
See Kerr, supra note 6, at 1641 describing the development of computer technology since the 1970s
-
See Kerr, supra note 6, at 1641 (describing the development of computer technology since the 1970s).
-
-
-
-
141
-
-
13044286650
-
-
See, § 1030 e 2 B West 2000 & Supp, "The term 'protected computer' means a computer... which is used in or affecting interstate or foreign commerce or communication...."
-
See 18 U. S. C. A. § 1030 (e) (2) (B) (West 2000 & Supp. 2009) ("[T]he term 'protected computer' means a computer... which is used in or affecting interstate or foreign commerce or communication....").
-
(2009)
U. S. C. A.
, vol.18
-
-
-
142
-
-
79251614308
-
-
Id. § 1030 e 1 "The term 'computer' means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device...."
-
Id. § 1030 (e) (1) ("[T]he term 'computer' means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device....").
-
-
-
-
143
-
-
79251606850
-
-
Id. "The term 'computer'... does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device....". Perhaps future courts will construe "other similar device" broadly to exempt common items that have been computerized, but as of now we have no sign that courts will take that approach
-
Id. ("[T]he term 'computer'... does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...."). Perhaps future courts will construe "other similar device" broadly to exempt common items that have been computerized, but as of now we have no sign that courts will take that approach.
-
-
-
-
144
-
-
79251625479
-
-
See, e.g., United States v. Mitra, 495 7th Cir, adopting a broad interpretation of § 1030 e 1, limited only by its explicit exceptions
-
See, e.g., United States v. Mitra, 405 F.3d 492, 495 (7th Cir. 2005) (adopting a broad interpretation of § 1030 (e) (1), limited only by its explicit exceptions).
-
(2005)
F.3d
, vol.405
, pp. 492
-
-
-
145
-
-
79251615060
-
-
§ 1030 e 1
-
18 U. S. C. A. § 1030 (e) (1).
-
U. S. C. A.
, vol.18
-
-
-
146
-
-
79251631010
-
-
Id. § 1030 a 2 C "Whoever... intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any protected computer... shall be punished...."
-
Id. § 1030 (a) (2) (C) ("Whoever... intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any protected computer... shall be punished....").
-
-
-
-
147
-
-
79251645397
-
-
Scott & Shields, supra note 121, at 4-25 explaining that the broad definition of protected computer combined with a global Internet means that home computers with online access fall within the CFAA's reach
-
Scott & Shields, supra note 121, at 4-25 (explaining that the broad definition of protected computer combined with a global Internet means that home computers with online access fall within the CFAA's reach).
-
-
-
-
148
-
-
84891077723
-
-
See United States v. Drew, C. D. Cal
-
See United States v. Drew, 259 F. R. D. 449 (C. D. Cal. 2009).
-
(2009)
F. R. D.
, vol.259
, pp. 449
-
-
-
149
-
-
79251626382
-
-
See, e.g., Times Topics: Lori Drew, last visited Apr. 12, 2010
-
See, e.g., Times Topics: Lori Drew, http://topics.nytimes.com/top/ reference/timestopics/people/d/lori-drew/index.html?scp=1-spot&sq=Lori%20 Drew&st=cse (last visited Apr. 12, 2010).
-
-
-
-
150
-
-
79251613429
-
-
at
-
Drew, 259 F. R. D. at 452.
-
F. R. D.
, vol.259
, pp. 452
-
-
Drew1
-
151
-
-
79251612387
-
-
Id
-
Id.
-
-
-
-
152
-
-
46749157023
-
A hoax turned fatal draws anger but no charges
-
Nov. 28, at, "In a report filed with the Sheriff's Department, Lori Drew said she created the MySpace profile of 'Josh Evans' to win Megan's trust and learn how Megan felt about her daughter."
-
Christopher Maag, A Hoax Turned Fatal Draws Anger But No Charges, N. Y. TIMES, Nov. 28, 2007, at A23 ("In a report filed with the Sheriff's Department, Lori Drew said she created the MySpace profile of 'Josh Evans' to win Megan's trust and learn how Megan felt about her daughter.").
-
(2007)
N. Y. Times
-
-
Maag, C.1
-
153
-
-
79251613429
-
-
at
-
Drew, 259 F. R. D. at 452.
-
F. R. D.
, vol.259
, pp. 452
-
-
Drew1
-
154
-
-
79251607378
-
-
Id
-
Id.
-
-
-
-
155
-
-
79251630017
-
-
Id
-
Id.
-
-
-
-
156
-
-
84891077723
-
-
Indictment at 6, Drew, No. 08-00582, WL 2078622
-
Indictment at 6, Drew, 259 F. R. D. 449 (No. 08-00582), 2008 WL 2078622.
-
(2008)
F. R. D.
, vol.259
, pp. 449
-
-
-
157
-
-
79251613185
-
-
at
-
Drew, 259 F. R. D. at 454.
-
F. R. D.
, vol.259
, pp. 454
-
-
Drew1
-
158
-
-
79251647831
-
-
Id
-
Id.
-
-
-
-
159
-
-
79251615845
-
-
Indictment, supra note 140, at 6-7
-
Indictment, supra note 140, at 6-7.
-
-
-
-
160
-
-
79251641154
-
-
Id. at 9
-
Id. at 9.
-
-
-
-
161
-
-
84891077723
-
-
See Notice of Motion; Motion to Dismiss Indictment for Vagueness, Drew, No. 08-00582, WL 2848959
-
See Notice of Motion; Motion to Dismiss Indictment for Vagueness, Drew, 259 F. R. D. 449 (No. 08-00582), 2008 WL 2848959.
-
(2008)
F. R. D.
, vol.259
, pp. 449
-
-
-
162
-
-
79251628542
-
-
Id
-
Id.
-
-
-
-
163
-
-
84891077723
-
-
See Supplement to Rule 29 Motion at 4, Drew, No. 08-00582, 2008 WL 5381025 "If a person or business actually grants permission for the act, conditioned on some understanding that turns out to be false, then the act is still authorized for the purposes of criminal law."
-
See Supplement to Rule 29 Motion at 4, Drew, 259 F. R. D. 449 (No. 08-00582), 2008 WL 5381025 ("If a person or business actually grants permission for the act, conditioned on some understanding that turns out to be false, then the act is still authorized for the purposes of criminal law.").
-
F. R. D.
, vol.259
, pp. 449
-
-
-
164
-
-
79251614059
-
-
at, "If a website's terms of service controls what is 'authorized' and what is 'exceeding authorization'... section 1030 a 2 C would be unacceptably vague because it is unclear whether any or all violations of terms of service will render the access unauthorized, or whether only certain ones will."
-
Drew, 259 F. R. D. at 464 ("[I]f a website's terms of service controls what is 'authorized' and what is 'exceeding authorization'... section 1030 (a) (2) (C) would be unacceptably vague because it is unclear whether any or all violations of terms of service will render the access unauthorized, or whether only certain ones will.");
-
F. R. D.
, vol.259
, pp. 464
-
-
Drew1
-
165
-
-
84891077723
-
-
see Reply to Government Response to Defense Rule 29 at 5-6, Drew, No. 08-00582
-
see Reply to Government Response to Defense Rule 29 at 5-6, Drew, 259 F. R. D. 449 (No. 08-00582)
-
F. R. D.
, vol.259
, pp. 449
-
-
-
166
-
-
79251640390
-
-
outlining the defense's arguments regarding the fair warning canons
-
WL 54313 (outlining the defense's arguments regarding the fair warning canons).
-
(2009)
WL 54313
-
-
-
167
-
-
79251614059
-
-
at
-
Drew, 259 F. R. D. at 464-65.
-
F. R. D.
, vol.259
, pp. 464-465
-
-
Drew1
-
168
-
-
79251630016
-
-
Id. at 468
-
Id. at 468.
-
-
-
-
169
-
-
79251624937
-
-
See id. at 459-60
-
See id. at 459-60.
-
-
-
-
170
-
-
79251649162
-
-
Id. at 462 "The vast majority of the courts that have considered the issue have held that a website's terms of service/use cannot define what is and/or is not authorized access vis-a-vis that website."
-
Id. at 462 ("[T]he vast majority of the courts (that have considered the issue) have held that a website's terms of service/use cannot define what is (and/or is not) authorized access vis-a-vis that website.").
-
-
-
-
171
-
-
79251637042
-
-
Id. at 465 "By utilizing violations of the terms of service as the basis for the section 1030 a 2 C crime, that approach makes the website owner-in essence-the party who ultimately defines the criminal conduct. This will lead to further vagueness problems."
-
Id. at 465 ("[B]y utilizing violations of the terms of service as the basis for the section 1030 (a) (2) (C) crime, that approach makes the website owner-in essence-the party who ultimately defines the criminal conduct. This will lead to further vagueness problems.").
-
-
-
-
172
-
-
79251603677
-
-
See id. at 463-65 noting the ability of website owners to "unilaterally amend... the terms with minimal notice to users" and stating that statutes that do not define the criminal offense with sufficient definiteness encourage discriminatory enforcement
-
See id. at 463-65 (noting the ability of website owners to "unilaterally amend... the terms with minimal notice to users" and stating that statutes that do not define the criminal offense with sufficient definiteness encourage discriminatory enforcement).
-
-
-
-
173
-
-
79251637807
-
-
Id. at 466
-
Id. at 466.
-
-
-
-
174
-
-
84872128600
-
-
Id. at 467 quoting Kolender v. Lawson, 358, citation omitted
-
Id. at 467 (quoting Kolender v. Lawson, 461 U. S. 352, 358 (1983)) (citation omitted).
-
(1983)
U. S.
, vol.461
, pp. 352
-
-
-
175
-
-
79251630520
-
-
Id. at 463
-
Id. at 463.
-
-
-
-
176
-
-
79251635238
-
Website development and hosting agreements for terms of service
-
See generally, in, at, 476-81, PLI Patents, Copyrights, Trademarks, & Literary Property, Course Handbook Series No. 587, 2000 providing website owners with an overview of points to consider in drafting a Terms of Service agreement
-
See generally Jessica R. Friedman & Gerry A. Fifer, Website Development and Hosting Agreements for Terms of Service, in REPRESENTING THE NEW MEDIA COMPANY 2000, at 467, 476-81 (2000) (PLI Patents, Copyrights, Trademarks, & Literary Property, Course Handbook Series No. 587, 2000) (providing website owners with an overview of points to consider in drafting a Terms of Service agreement).
-
(2000)
Representing the New Media Company 2000
, pp. 467
-
-
Friedman, J.R.1
Fifer, G.A.2
-
177
-
-
79251632916
-
-
See Drew, at
-
See Drew, 259 F. R. D. at 466.
-
F. R. D.
, vol.259
, pp. 466
-
-
-
178
-
-
79251622241
-
-
Id
-
Id.
-
-
-
-
179
-
-
79251610269
-
-
Terms of Service require that "all registration information you submit is truthful and accurate." Id. at 454
-
The Terms of Service require that "all registration information you submit is truthful and accurate." Id. at 454.
-
-
-
-
180
-
-
79251617736
-
-
NEWSWEEK, Nov. 5, "According to public documents obtained by NEWSWEEK-including professional license information, voter registration and utility and telephone service applications-Anderson is five years older than he claims."
-
Jessica Bennett, Is Age Just a Number?, NEWSWEEK, Nov. 5, 2007, http://www.newsweek.com/id/62330 ("According to public documents obtained by NEWSWEEK-including professional license information, voter registration and utility and telephone service applications-Anderson is five years older than he claims.").
-
(2007)
Is Age Just A Number?
-
-
Bennett, J.1
-
181
-
-
41249093156
-
A passive approach to regulation of virtual worlds
-
See, 420, "The typical consumer does not read a terms-of-service contract because the costs of doing so primarily the time spent reading outweigh the benefits, which are most often essentially zero.". The forewoman of the Lori Drew jury appears to be a rare exception. When she spoke to the press after the trial, she expressed the view that she "always" read Terms of Service and that a person "absolutely" should be held liable if they are "lazy" and do not read the entire agreement
-
See Jacob Rogers, A Passive Approach to Regulation of Virtual Worlds, 76 GEO. WASH. L. REV. 405, 420 (2008) ("The typical consumer does not read a terms-of-service contract because the costs of doing so (primarily the time spent reading) outweigh the benefits, which are most often essentially zero."). The forewoman of the Lori Drew jury appears to be a rare exception. When she spoke to the press after the trial, she expressed the view that she "always" read Terms of Service and that a person "absolutely" should be held liable if they are "lazy" and do not read the entire agreement.
-
(2008)
Geo. Wash. L. Rev.
, vol.76
, pp. 405
-
-
Rogers, J.1
-
182
-
-
79251617478
-
Jurors wanted to convict Lori Drew of felonies, but lacked evidence
-
See, Dec. 1
-
See Kim Zetter, Jurors Wanted To Convict Lori Drew of Felonies, but Lacked Evidence, WIRED, Dec. 1, 2008, http://www.wired.com/threatlevel/2008/12/ jurors-wanted-t/.
-
(2008)
Wired
-
-
Zetter, K.1
-
183
-
-
79251635485
-
Woman guilty of minor charges for my space
-
See, Nov. 27, at
-
See Ashley Surdin, Woman Guilty of Minor Charges for My Space Hoax, WASH. POST, Nov. 27, 2008, at A10.
-
(2008)
Hoax, Wash. Post
-
-
Surdin, A.1
-
184
-
-
84882430099
-
-
See, e.g., Shamrock Foods Co. v. Gast, 964-65 D. Ariz, detailing the split among courts over the meaning of the word "authorization" in the CFAA
-
See, e.g., Shamrock Foods Co. v. Gast, 535 F. Supp. 2d 962, 964-65 (D. Ariz. 2008) (detailing the split among courts over the meaning of the word "authorization" in the CFAA).
-
(2008)
F. Supp. 2d
, vol.535
, pp. 962
-
-
-
185
-
-
79251614804
-
-
*, N. D. Cal. Apr. 13
-
* 3 (N. D. Cal. Apr. 13, 2009).
-
(2009)
WL 981336
, vol.2009
, pp. 3
-
-
-
186
-
-
79251636493
-
-
*1
-
*1.
-
-
-
-
187
-
-
79251623615
-
-
Id
-
Id.
-
-
-
-
188
-
-
79251607122
-
-
Id
-
Id.
-
-
-
-
189
-
-
79251647830
-
-
Id
-
Id.
-
-
-
-
190
-
-
79251624671
-
-
Superseding Indictment at 2-3, Nosal, No. CR 08-00237 MHP
-
Superseding Indictment at 2-3, Nosal, 2009 WL 981336 (No. CR 08-00237 MHP).
-
WL 981336
, vol.2009
-
-
-
192
-
-
13044286650
-
-
§ 1030 a 4 West 2000 & Supp
-
18 U. S. C. A. § 1030 (a) (4) (West 2000 & Supp. 2009).
-
(2009)
U. S. C. A.
, vol.18
-
-
-
193
-
-
79251624670
-
-
Id. "Whoever... knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value... shall be punished...."
-
Id. ("Whoever... knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value... shall be punished....").
-
-
-
-
194
-
-
84882335090
-
-
See, e.g., Int'l Airport Ctrs., L. L. C. v. Citrin, 420-21 7th Cir, distinguishing this case in what appears to be dicta by finding that "Citrin's breach of his duty of loyalty terminated his agency relationship... and with it his authority to access the laptop, because the only basis of his authority had been that relationship"
-
See, e.g., Int'l Airport Ctrs., L. L. C. v. Citrin, 440 F.3d 418, 420-21 (7th Cir. 2006) (distinguishing this case in what appears to be dicta by finding that "Citrin's breach of his duty of loyalty terminated his agency relationship... and with it his authority to access the laptop, because the only basis of his authority had been that relationship");
-
(2006)
F.3d
, vol.440
, pp. 418
-
-
-
195
-
-
62749176471
-
Agency, code, or contract: Determining employees' authorization under the computer fraud and abuse act
-
see also, 823-24, outlining the agency-based interpretation of authorization and the Seventh Circuit's adoption of it in Citrin
-
see also Katherine Mesenbring Field, Agency, Code, or Contract: Determining Employees' Authorization Under the Computer Fraud and Abuse Act, 107 MICH. L. REV. 819, 823-24 (2009) (outlining the agency-based interpretation of authorization and the Seventh Circuit's adoption of it in Citrin).
-
(2009)
Mich. L. Rev.
, vol.107
, pp. 819
-
-
Field, K.M.1
-
196
-
-
79251640646
-
-
See Kerr, supra note 6, at 1632-37 describing several cases in which employees exceeded authorized use by using "their employers' computers in ways that exceeded the scope of their employment"
-
See Kerr, supra note 6, at 1632-37 (describing several cases in which employees exceeded authorized use by using "their employers' computers in ways that exceeded the scope of their employment").
-
-
-
-
197
-
-
79251604475
-
-
*5
-
*5.
-
-
-
-
198
-
-
79251604448
-
-
See id
-
See id.
-
-
-
-
199
-
-
79251602910
-
-
*5
-
*5.
-
-
-
-
200
-
-
79251612386
-
-
*, S. D. Tex. Feb. 3, 2009
-
* 10 (S. D. Tex. Feb. 3, 2009);
-
(2009)
WL 255862
, pp. 10
-
-
-
201
-
-
84882346402
-
-
Black & Decker US, Inc. v. Smith, 933-34, W. D. Tenn
-
Black & Decker (US), Inc. v. Smith, 568 F. Supp. 2d 929, 933-34 (W. D. Tenn. 2008);
-
(2008)
F. Supp. 2d
, vol.568
, pp. 929
-
-
-
202
-
-
85028932333
-
-
Diamond Power Int'l, Inc. v. Davidson, 1341-43, N. D. Ga
-
Diamond Power Int'l, Inc. v. Davidson, 540 F. Supp. 2d 1322, 1341-43 (N. D. Ga. 2007);
-
(2007)
F. Supp. 2d
, vol.540
, pp. 1322
-
-
-
203
-
-
79251643204
-
-
B & B Microscopes v. Armogida, 758 W. D. Pa
-
B & B Microscopes v. Armogida, 532 F. Supp. 2d 744, 758 (W. D. Pa. 2007);
-
(2007)
F. Supp. 2d
, vol.532
, pp. 744
-
-
-
204
-
-
79251642256
-
-
*, E. D. Pa. July 13, 2007
-
* 2-4 (E. D. Pa. July 13, 2007);
-
(2007)
WL 2043377
, pp. 2-4
-
-
-
205
-
-
79251612922
-
-
*, M. D. Fla. Aug. 1, 2006
-
* 5 (M. D. Fla. Aug. 1, 2006);
-
(2006)
WL 2683058
, pp. 5
-
-
-
206
-
-
84882292638
-
-
Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 499 D. Md
-
Int'l Ass'n of Machinists & Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479, 499 (D. Md. 2005).
-
(2005)
F. Supp. 2d
, vol.390
, pp. 479
-
-
-
208
-
-
79251620679
-
-
*5-6
-
*5-6.
-
-
-
-
209
-
-
79251625478
-
-
Id
-
Id.
-
-
-
-
210
-
-
84903164520
-
-
1132-35 9th Cir
-
581 F.3d 1127, 1132-35 (9th Cir. 2009).
-
(2009)
F.3d
, vol.581
, pp. 1127
-
-
-
211
-
-
79251625972
-
-
See 18 U. S. C. A. § 1030 e 2 West 2000 & Supp. 2009 defining "protected computer"
-
See 18 U. S. C. A. § 1030 (e) (2) (West 2000 & Supp. 2009) (defining "protected computer").
-
-
-
-
212
-
-
79251625973
-
-
See supra note 123 and accompanying text
-
See supra note 123 and accompanying text.
-
-
-
-
213
-
-
84872128600
-
-
Kolender v. Lawson, 357-58
-
Kolender v. Lawson, 461 U. S. 352, 357-58 (1983)
-
(1983)
U. S.
, vol.461
, pp. 352
-
-
-
214
-
-
77951715794
-
-
citing Smith v. Goguen, 574
-
(citing Smith v. Goguen, 415 U. S. 566, 574 (1974)).
-
(1974)
U. S.
, vol.415
, pp. 566
-
-
|