Eric Goldman, Do We Need a New Federal Trade Secret Law?, Santa Clara Univ. Legal Studies Research Paper No. 35-14 (September 2014).
Orin Kerr, Does the federal computer hacking law apply to a laptop not connected to the Internet?, The Volokh Conspiracy (Aug. 25, 2014).
Timothy P. O'Toole, Digital Defense: Meeting the Challenges That the Computer Fraud and Abuse Act Poses, The Champion (September/October 2013).
James Juo, Unauthorized Excess - After the death of Aaron Swartz, lawmakers have proposed reforms to the Computer Fraud and Abuse Act, Los Angeles Lawyer (July/August 2013).
Danielle E. Sunberg, Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA, 62 Am. Univ. L. Rev. 1417 (2013).
Lothar Determann, Internet Freedom and Computer Abuse, 35 Hastings Comm. & Ent. L.J. 429 (March 2013).
Internet Law Treatise, Computer Fraud and Abuse Act (CFAA), Electronic Frontier Foundation (2013).
David Thaw, Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement, 103 J. Crim. L. & Criminology 907 (2013).
Andrew T. Hernacki, A Vague Law in a Smartphone World: Limiting the Scope of Unauthorized Access under the Computer Fraud and Abuse Act, 61 Am. U. L. Rev. 1543 (2012).
Warren Thomas, Lenity on Me: LVRC v. BrekkaPoints the Way toward Defining Authorization and Solving the Split Over the Computer Fraud and Abuse Act, 27 Ga. St. U. L. Rev. 379 (2011).
Garrett D. Urban, Causing Damage without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization under the Computer Fraud and Abuse Act, 52 Wm. & Mary L. Rev. 1369 (2011).
"EFF, NACDL Ask Appeals Court to Block Attempt to Turn Misdemeanors into Felonies," NACDL News Release (August 6, 2010).
Orin Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, GWU Legal Research Paper No. 482 (Dec. 22 2009).
Nicholas R. Johnson, “I Agree” to Criminal Liability: Lori Drew’s Prosecution under §1030(A)(2)(C) of the Computer Fraud and Abuse Act, and Why Every Internet User Should Care, 2009 U. Ill. J.L. Tech. & Pol’y 561 (2009).
Kyle Wesley Brenton, Trade Secret Law and the Computer Fraud and Abuse Act: Two Problems and Two Solutions, U. Ill. J.L. Tech. (Sept. 1, 2009).
Reid Skibell, Cybercrimes & Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 Berkley Tech. L.J. 909 (2003).
Continue reading below
Cross-Examination Trial Pack
NACDL’s new Cross-Examination Trial Pack includes three of our best-selling Cross-Examination resources: “Damage Control: Situational Cross-Examination Techniques Trial Guide”, "Ultimate Cross 2.0: Audio Recordings & Written Materials" and "Sample Cross-Examination Questions."
This masterful collection of cross-examination resources provide countless tips, techniques and strategies for a variety of criminal case-specific scenarios. Learn to cross-examine a variety of trial witnesses!
Death Investigation: Forensic Pathology in the Courtroom and Cause & Manner of Death (2022)
This unique program provides criminal defense lawyers with an accurate and clear overview of forensic pathology and the countless factors to consider in a death investigation and will methodically explain what happens during an autopsy to determine cause and manner of death.
You'll uncover the different types of medicolegal death investigations, what to request from your MDI expert, quality benchmarks for accreditation and certification, guidelines and standards, common terminology and frequently asked questions.
The Psychology of Persuasion & Storytelling for Criminal Defense Lawyers
This Trial Resource Guide is a masterful collection of practical tips, techniques and strategies focused solely on using the arts and sciences of persuasion to improve your storytelling skills at trial.
You'll learn how to master the ability to communicate with juries, deliver powerful openings and closings, perform convincing cross-examinations, use effective courtroom choreography and non-verbal communication, identify and develop the optimal theme and theory for your case, and offer compelling arguments during mitigation and sentencing.
Zealous Advocacy in Sexual Assault & Child Victims Cases (2022)
Defending charges of sexual assault and child abuse can be daunting — but with the right tools, it doesn’t have to be.
Every year, NACDL identifies the hottest topics and most pressing issues when defending these cases, and brings-in nationally-renowned lawyers and experts to help you prepare for battle. This year’s 13th Annual Defending Sex Cases training program is our best yet; packed with topics and speakers you won’t want to miss!
Orin Kerr, Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78 NYU L. Rev. 1596 (2003).