YoVDO

Supreme Court's Van Buren Ruling on the CFAA - Implications and Analysis

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Technology Policy Courses Cybercrime Courses Data Protection Courses Digital Privacy Courses Computer Fraud and Abuse Act Courses

Course Description

Overview

Explore the implications of the Supreme Court's Van Buren ruling on the Computer Fraud and Abuse Act (CFAA) in this 92-minute webinar hosted by ACM's US Technology Policy Committee (USTPC). Delve into a comprehensive discussion moderated by USTPC Law Subcommittee Chair and former Assistant U.S. Attorney Andy Grosso, featuring expert panelists Alan Butler, Cindy Cohn, Mark Rasch, and Eric Vandevelde. Gain insights into the CFAA's background, charges, and scope, examining key cases like EFF vs EPIC and LinkedIn vs hiQ. Analyze the concepts of exceeding authorized access, anticompetitive practices, and privacy violations. Understand the significance of amicus briefs, updates to privacy laws, and the criminal justice information service policy. Discover why this case was brought to federal court and its potential impact on future interpretations of the CFAA.

Syllabus

Introduction
CFAA Background
EFF vs EPIC
CFAA Charges
What is the Scope of the CFAA
Who is Setting the Norms
Exceeding Authorized Access
Folder X vs Folder
Iq vs LinkedIn
Iq vs Ring
Anticompetitive
Mail Bomb
Van Buren
Similar Cases
amicus brief
privacy violations
updates to privacy law
criminal justice information service policy
Why was this case brought in federal court


Taught by

Association for Computing Machinery (ACM)

Related Courses

Introduction to Personal Branding
University of Virginia via Coursera
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX
Privacy, Reputation, and Identity in a Digital Age Teach-Out
University of Michigan via Coursera
Protection de la vie privée dans le monde numérique
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Tatort Internet - Angriffsvektoren und Schutzmaßnahmen
openHPI