{"id":445871,"date":"2010-03-19T00:06:00","date_gmt":"2010-03-19T04:06:00","guid":{"rendered":"http:\/\/techdirt.com\/articles\/20100305\/0404088432.shtml"},"modified":"2010-03-19T00:06:00","modified_gmt":"2010-03-19T04:06:00","slug":"courts-stretching-computer-hacking-law-in-dangerous-ways","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/445871","title":{"rendered":"Courts Stretching Computer Hacking Law In Dangerous Ways"},"content":{"rendered":"<p><a href=\"http:\/\/twitter.com\/InternetLaw\/statuses\/10000479767\" >Michael Scott<\/a> points us to a very interesting analysis of how to different appeals courts have <a href=\"http:\/\/www.theiplawblog.com\/archives\/-webtech-the-seventh-and-ninth-circuits-split-on-what-constitutes-without-authorization-within-the-meaning-of-the-computer-fraud-and-abuse-act.html\" >very different interpretations of our federal anti-hacking law<\/a>.  The Computer Fraud and Abuse Act was passed by Congress to create criminal sanctions for malicious computer hacking.  The problem, of course, is that whenever you have politicians passing laws about technology, they may be a bit vague.  So, the way hacking was defined was effectively to say that the perpetrator accessed info &#8220;without authorization&#8221; or (more troubling) that the activity &#8220;exceeds authorized access.&#8221;  Now, it&#8217;s pretty obvious what&#8217;s <i>meant<\/i> by this.  If you&#8217;re breaking into parts of a computer system where you don&#8217;t belong for nefarious purposes, you&#8217;re probably violating this law.<\/p>\n<p>But that&#8217;s not how all courts are interpreting it.  The article notes that the Seventh Circuit, in International Airport Centers, LLC v. Citrin, found that an employee violated this law by deleting information on his laptop (which would have presented evidence of a breach of contract by the guy), after he had resigned.  Obviously, that&#8217;s a totally different situation than what the CFAA was intended to cover, but the court found that once he quit, he was no longer authorized to use the laptop, and doing so was effectively hacking.  That seems like an extreme stretch of the law.  But at least some other courts are following suit:<\/p>\n<blockquote><p><i><br \/>\nFor example, in a case in the U. S. District Court for the Eastern District of Missouri, the district court relied upon the Citrin decision and held that, even if employees were authorized to access their employer&#8217;s computer records, they cannot use such authorization (and, hence, their access can become &#8220;unauthorized&#8221;), if they use the information for their own interests&#8230;. The court concluded that the employer sufficiently alleged that the employees &#8220;acted without authorization when they obtained [the employer&#8217;s] information for their personal use and in contravention of their fiduciary duty to their employer.&#8221;<br \/>\n<\/i><\/p><\/blockquote>\n<p>Yes, you read that right.  If you use your employer&#8217;s computer simply to access the company&#8217;s data for your personal use, you may be guilty of computer hacking.  That&#8217;s quite clearly not what the law was intended to cover.<\/p>\n<p>Thankfully, the Ninth Circuit (which all too often comes out with weird decisions) seems to have gotten this one right:<\/p>\n<blockquote><p><i><br \/>\nIn declining to adopt the Seventh Circuit&#8217;s interpretation of &#8220;without authorization,&#8221; the court held that a &#8220;person uses a computer &#8216;without authorization&#8217;&#8230; [only] [1] when the person has not received permission to use the computer for any purpose (such as when a hacker accesses someone&#8217;s computer without any permission), or [2] when the employer has rescinded to access the computer and the defendant uses the computer anyway.&#8221;&#8230; The Ninth Circuit declined to hold that the &#8220;defendant&#8217;s authorization to obtain information stored in a company computer is &#8216;exceeded&#8217; if the defendant breaches a state law duty of loyalty to an employer&#8221; because no such language was found in the CFAA&#8230;.  The Ninth Circuit noted that because the CFAA was &#8220;primarily a criminal statute,&#8221; and because there was ambiguity as to the meaning of the phrase &#8220;without authorization,&#8221; it would construe any ambiguity against the government&#8230;.<br \/>\n<\/i><\/p><\/blockquote>\n<p>Obviously, I agree that this is the proper interpretation of the law &#8212; and stretching the definition of criminal hacking &#8220;without authorization&#8221; to things like accessing personal information on an employer&#8217;s computer is dangerous.  Of course, with the split rulings, it&#8217;s likely that eventually this will get to the Supreme Court to sort out, and hopefully they get it right.  Or, in the meantime, Congress could clarify the law &#8212; but chances are they&#8217;d just make it worse.<\/p>\n<p><a href=\"http:\/\/techdirt.com\/articles\/20100305\/0404088432.shtml\">Permalink<\/a> | <a href=\"http:\/\/techdirt.com\/articles\/20100305\/0404088432.shtml#comments\">Comments<\/a> | <a href=\"http:\/\/techdirt.com\/article.php?sid=20100305\/0404088432&#038;op=sharethis\">Email This Story<\/a><br \/>\n <br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=2108a6913f46cb563f64cccdf86251b9&#038;p=1\"><img decoding=\"async\" alt=\"\" style=\"border: 0;\" border=\"0\" src=\"http:\/\/ads.pheedo.com\/img.phdo?s=2108a6913f46cb563f64cccdf86251b9&#038;p=1\"\/><\/a><br \/>\n<!-- foo --><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=BS-agN_tQL4:7hZv6rDVK5Q:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?i=BS-agN_tQL4:7hZv6rDVK5Q:D7DqB2pKExk\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=BS-agN_tQL4:7hZv6rDVK5Q:c-S6u7MTCTE\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?d=c-S6u7MTCTE\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/techdirt\/feed\/~4\/BS-agN_tQL4\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michael Scott points us to a very interesting analysis of how to different appeals courts have very different interpretations of our federal anti-hacking law. The Computer Fraud and Abuse Act was passed by Congress to create criminal sanctions for malicious computer hacking. The problem, of course, is that whenever you have politicians passing laws about [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-445871","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/445871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=445871"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/445871\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=445871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=445871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=445871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}