Eric Goldman, Do We Need a New Federal Trade Secret Law?, Santa Clara Univ. Legal Studies Research Paper No. 35-14 (September 2014).
Orin Kerr, Does the federal computer hacking law apply to a laptop not connected to the Internet?, The Volokh Conspiracy (Aug. 25, 2014).
Timothy P. O'Toole, Digital
Defense: Meeting the Challenges That the Computer Fraud and Abuse Act Poses,
The Champion (September/October 2013).
James Juo, Unauthorized Excess - After the death of Aaron Swartz, lawmakers have proposed reforms to the Computer Fraud and Abuse Act, Los Angeles Lawyer (July/August 2013).
Danielle E. Sunberg, Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA, 62 Am. Univ. L. Rev. 1417 (2013).
Lothar Determann, Internet Freedom and Computer Abuse, 35 Hastings Comm. & Ent. L.J. 429 (March 2013).
Internet Law Treatise, Computer Fraud and Abuse Act (CFAA), Electronic Frontier Foundation (2013).
David Thaw, Criminalizing Hacking, Not Dating: Reconstructing the CFAA Intent Requirement, 103 J. Crim. L. & Criminology 907 (2013).
Andrew T. Hernacki, A Vague Law in a Smartphone World: Limiting the Scope of Unauthorized Access under the Computer Fraud and Abuse Act, 61 Am. U. L. Rev. 1543 (2012).
Warren Thomas, Lenity on Me: LVRC v. BrekkaPoints the Way toward Defining Authorization and Solving the Split Over the Computer Fraud and Abuse Act, 27 Ga. St. U. L. Rev. 379 (2011).
Garrett D. Urban, Causing Damage without Authorization: The Limitations of Current Judicial Interpretations of Employee Authorization under the Computer Fraud and Abuse Act, 52 Wm. & Mary L. Rev. 1369 (2011).
Continue reading below
"EFF, NACDL Ask Appeals Court to Block Attempt to Turn Misdemeanors into Felonies," NACDL News Release (August 6, 2010).
Orin Kerr, Vagueness Challenges to the Computer Fraud and Abuse Act, GWU Legal Research Paper No. 482 (Dec. 22 2009).
Nicholas R. Johnson, “I Agree” to Criminal Liability: Lori Drew’s Prosecution under §1030(A)(2)(C) of the Computer Fraud and Abuse Act, and Why Every Internet User Should Care, 2009 U. Ill. J.L. Tech. & Pol’y 561 (2009).
Kyle Wesley Brenton, Trade Secret Law and the Computer Fraud and Abuse Act: Two Problems and Two Solutions, U. Ill. J.L. Tech. (Sept. 1, 2009).
Continue reading below
This is a sponsored ad
WingMan Opportunity Noiacoin
The "Bitcoin" of addiction
Reid Skibell, Cybercrimes & Misdemeanors: A Reevaluation of the Computer Fraud and Abuse Act, 18 Berkley Tech. L.J. 909 (2003).
Orin Kerr, Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes, 78 NYU L. Rev. 1596 (2003).