当断路器跳闸时:重置CFAA以打击流氓员工访问

Obie C. Okuh
{"title":"当断路器跳闸时:重置CFAA以打击流氓员工访问","authors":"Obie C. Okuh","doi":"10.2139/SSRN.1712950","DOIUrl":null,"url":null,"abstract":"This article focuses on the narrow question of whether the Computer Fraud & Abuse Act (18 U.S.C. § 1030 et. seq) should be available to a private-sector employer as a vehicle to litigate classic employee misappropriation cases when such employee’s conduct does not result in damage to the employer’s electronic system, computer's circuitry or programming, or interruption of service. The current circuit split regarding the construction and application of the CFAA’s access authorization provisions to employment cases has meant that an employer’s likely recovery under the statute depends in most instances upon factors external to the employee’s alleged conduct and more on whether and to what extent the court in a particular jurisdiction is willing to voyage into the subjective mindset of the employee during the alleged conduct.After examining legislative history of the CFAA, this article argues that the original intent of Congress was to target legislation against outside hackers, and employees of the company were not originally contemplated within the reach of the statute. However, as computer crimes became more sophisticated, Congress took steps to increase protection for owners of commercial information by factoring employee access into the CFAA provisions, albeit without crafting the amendments properly. Further, the article explains the theoretical underpinnings of the circuit split and argues that the split reflects divergent views on how to apply theories of contract, agency, and code-based approaches to the concept of “authorization” within the cyber security and computer information system context. While proffering a draft amendment to the statute, this article concludes by urging law makers or courts to 1) eliminate or exempt the “exceeding authorization” analysis when applying the statute to classic employee misappropriation cases; 2) end inquiries that focus on the employee’s subjective intent at the time of the access or the employee’s subsequent use of the information obtained; and 3) focus strictly on the unauthorized nature of the employee’s intrusion upon the employer’s protected computer information – this strict approach should render an employer’s inability to prove the employee’s breach of explicit contractual prohibition or a trespass of system code an automatic bar to recovery under the statute.","PeriodicalId":177971,"journal":{"name":"Economic Perspectives on Employment & Labor Law eJournal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"When Circuit Breakers Trip: Resetting the CFAA to Combat Rogue Employee Access\",\"authors\":\"Obie C. Okuh\",\"doi\":\"10.2139/SSRN.1712950\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article focuses on the narrow question of whether the Computer Fraud & Abuse Act (18 U.S.C. § 1030 et. seq) should be available to a private-sector employer as a vehicle to litigate classic employee misappropriation cases when such employee’s conduct does not result in damage to the employer’s electronic system, computer's circuitry or programming, or interruption of service. The current circuit split regarding the construction and application of the CFAA’s access authorization provisions to employment cases has meant that an employer’s likely recovery under the statute depends in most instances upon factors external to the employee’s alleged conduct and more on whether and to what extent the court in a particular jurisdiction is willing to voyage into the subjective mindset of the employee during the alleged conduct.After examining legislative history of the CFAA, this article argues that the original intent of Congress was to target legislation against outside hackers, and employees of the company were not originally contemplated within the reach of the statute. However, as computer crimes became more sophisticated, Congress took steps to increase protection for owners of commercial information by factoring employee access into the CFAA provisions, albeit without crafting the amendments properly. Further, the article explains the theoretical underpinnings of the circuit split and argues that the split reflects divergent views on how to apply theories of contract, agency, and code-based approaches to the concept of “authorization” within the cyber security and computer information system context. While proffering a draft amendment to the statute, this article concludes by urging law makers or courts to 1) eliminate or exempt the “exceeding authorization” analysis when applying the statute to classic employee misappropriation cases; 2) end inquiries that focus on the employee’s subjective intent at the time of the access or the employee’s subsequent use of the information obtained; and 3) focus strictly on the unauthorized nature of the employee’s intrusion upon the employer’s protected computer information – this strict approach should render an employer’s inability to prove the employee’s breach of explicit contractual prohibition or a trespass of system code an automatic bar to recovery under the statute.\",\"PeriodicalId\":177971,\"journal\":{\"name\":\"Economic Perspectives on Employment & Labor Law eJournal\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Economic Perspectives on Employment & Labor Law eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/SSRN.1712950\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Economic Perspectives on Employment & Labor Law eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.1712950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

本文关注的是一个狭义的问题,即当雇员的行为没有对雇主的电子系统、计算机电路或编程造成损害或服务中断时,私营部门雇主是否可以使用《计算机欺诈和滥用法》(18 U.S.C.§1030 et. seq)作为诉讼经典雇员盗用案件的工具。目前的巡回法院对CFAA的准入授权条款在就业案件中的解释和应用存在分歧,这意味着在大多数情况下,雇主根据该法规可能获得的赔偿取决于雇员被指控的行为之外的因素,而更多地取决于特定司法管辖区的法院是否以及在多大程度上愿意在被指控的行为期间进入雇员的主观心态。在研究了CFAA的立法历史之后,本文认为国会最初的意图是针对外部黑客的立法,而公司的员工最初并没有考虑在法规的范围内。然而,随着计算机犯罪变得越来越复杂,国会采取措施,通过将雇员访问纳入CFAA条款,增加对商业信息所有者的保护,尽管没有适当地起草修正案。此外,本文解释了电路分裂的理论基础,并认为这种分裂反映了关于如何在网络安全和计算机信息系统背景下将合同、代理和基于代码的方法的理论应用于“授权”概念的不同观点。本文在提出修订草案的同时,敦促立法者或法院:1)在将法规适用于典型的雇员盗用案件时,消除或豁免“超授权”分析;2)终止针对员工获取信息时的主观意图或员工随后使用所获得信息的询问;3)严格关注雇员侵入雇主受保护的计算机信息的未经授权的性质——这种严格的方法应该使雇主无法证明雇员违反明确的合同禁止或侵入系统代码,从而自动妨碍法律规定的赔偿。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
When Circuit Breakers Trip: Resetting the CFAA to Combat Rogue Employee Access
This article focuses on the narrow question of whether the Computer Fraud & Abuse Act (18 U.S.C. § 1030 et. seq) should be available to a private-sector employer as a vehicle to litigate classic employee misappropriation cases when such employee’s conduct does not result in damage to the employer’s electronic system, computer's circuitry or programming, or interruption of service. The current circuit split regarding the construction and application of the CFAA’s access authorization provisions to employment cases has meant that an employer’s likely recovery under the statute depends in most instances upon factors external to the employee’s alleged conduct and more on whether and to what extent the court in a particular jurisdiction is willing to voyage into the subjective mindset of the employee during the alleged conduct.After examining legislative history of the CFAA, this article argues that the original intent of Congress was to target legislation against outside hackers, and employees of the company were not originally contemplated within the reach of the statute. However, as computer crimes became more sophisticated, Congress took steps to increase protection for owners of commercial information by factoring employee access into the CFAA provisions, albeit without crafting the amendments properly. Further, the article explains the theoretical underpinnings of the circuit split and argues that the split reflects divergent views on how to apply theories of contract, agency, and code-based approaches to the concept of “authorization” within the cyber security and computer information system context. While proffering a draft amendment to the statute, this article concludes by urging law makers or courts to 1) eliminate or exempt the “exceeding authorization” analysis when applying the statute to classic employee misappropriation cases; 2) end inquiries that focus on the employee’s subjective intent at the time of the access or the employee’s subsequent use of the information obtained; and 3) focus strictly on the unauthorized nature of the employee’s intrusion upon the employer’s protected computer information – this strict approach should render an employer’s inability to prove the employee’s breach of explicit contractual prohibition or a trespass of system code an automatic bar to recovery under the statute.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信