{"id":6375,"date":"2021-06-04T08:49:57","date_gmt":"2021-06-04T12:49:57","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=6375"},"modified":"2021-08-03T11:01:49","modified_gmt":"2021-08-03T15:01:49","slug":"supreme-court-issues-ruling-limit-under-cfaa","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/supreme-court-issues-ruling-limit-under-cfaa\/","title":{"rendered":"Supreme Court Issues Ruling Limit Under CFAA"},"content":{"rendered":"\n<p>The Supreme Court has issued a ruling limiting what is considered a felony under the Computer Fraud and Abuse Act (CFAA).<\/p>\n\n\n\n<p>This was exemplified in the case of Nathan Van Buren, a former Georgia police sergeant, who used his own login credentials to obtain information about a license plate from a law enforcement database.<\/p>\n\n\n\n<p>The sergeant searched for money and purposes outside of law enforcement, in direct violation of department policy. He was charged with a crime under the CFAA, convicted in May 2018 and sentenced to 18 months in prison.<\/p>\n\n\n\n<p>The federal appeals court upheld the decision, only to be overturned by the Supreme Court in a 6-3 decision that said Van Buren had not violated the CFAA.<\/p>\n\n\n\n<p>Judges noted that the Cybersecurity Act does not make it a crime to obtain information from a computer if the person has access to a machine despite improper motives.<\/p>\n\n\n\n<p>This landmark ruling could have a ripple effect on government prosecutions.<\/p>\n\n\n\n<p>The CFAA originally banned access to certain financial information but has since expanded the scope to include all information that comes from or influences a computer used in interstate or foreign trade and communications.<\/p>\n\n\n\n<p>Violations of the CFAA result in a substantial fine and imprisonment that can last up to 10 years. Persons who suffer loss or damage due to CFAA violations can also seek damages.<\/p>\n\n\n\n<p>When Van Buren appealed his conviction to the U.S. Court of Appeals, he argued that the &#8220;exceeds authorized access&#8221; clause in the CFFA applies only to those who have received information to which their computer access does not extend, and not to those who misuse existing access.<\/p>\n\n\n\n<p>While the appeals court ruled against it, the Supreme Court agreed with Van Buren&#8217;s argument.<\/p>\n\n\n\n<p>The case revolved around the word: as used in the CFAA&#8217;s prohibition on obtaining or modifying information on a computer committed by the access that is not authorized to receive or modify information.<\/p>\n\n\n<p>The majority of the court disagreed with the government, because the statute is structured in such a way, and &#8220;because without &#8216;so,&#8217;,&#8221; it could be interpreted as containing all kinds of restrictions on the right to information.<\/p>\n\n<p>For more information, read the <a href=\"https:\/\/arstechnica.com\/tech-policy\/2021\/06\/supreme-court-limits-reach-of-hacking-law-that-us-used-to-prosecute-aaron-swartz\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in Arstechnica.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Supreme Court has issued a ruling limiting what is considered a felony under the Computer Fraud and Abuse Act (CFAA).<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-6375","post","type-post","status-publish","format-standard","hentry","category-government-public-sector"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=6375"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6375\/revisions"}],"predecessor-version":[{"id":6388,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6375\/revisions\/6388"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=6375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=6375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=6375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}