Innovation or Exploitation: The Limits of Computer Trespass Law
Course Demo. No credit provided in demo mode.
Faculty: Dan Auerbach - Ed Felten - Jennifer Granick - Brewster Kahle - Alex Stamos - Jonathan Mayer -
In 1984, Congress passed the Computer Fraud and Abuse Act. This criminal law statute was passed when most people?s relationship with their computers was direct and straightforward. Computer access was at a fixed location (desktop computer) and authorization was based on simple password access. In today?s world of mobile and cloud computing, users? relationships to their computers and data has significantly increased in complexity. Users have multiple access points to their data through the introduction of smart phones, tablets, and the Internet. The amount of data has grown exponentially since 1984. Banking, shopping, and even dating are now easily done online.
This course examines the current limits of computer trespass law in America. The panel, made up of experienced technology attorneys and professionals, will present an overview of Computer Fraud and Abuse Act of 1984, commonly referred to as CFAA. What was this statute meant to do? How are violations defined? Is the statute in need of reform? Why? The panel will discuss several case studies to determine whether CFAA is working effectively in today?s world of social media and cloud based computing. The panel will consider what type of reforms initiatives are in development to bring CFAA to the 21st Century. The panel will discuss the federal indictments of Aaron Swartz and examine if CFAA was properly used. The course will then end with a question and answer session, taking questions from the attending audience.