Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On June 3, 2021, the United States Supreme Court issued a 6-3 opinion in Van Buren v. United States, No. 19-783, resolving the circuit split regarding what it means to “exceed authorization” for purposes of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. §1030 et seq. The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to “exceed authorization,” and the statute does not — as the government had argued — cover behavior, like Van Buren’s, where a person accesses information which he is authorized to access but does so for improper purposes. This was a long-awaited decision interpreting the CFAA, which has become an important statute in both criminal and civil enforcement relating to computer crime and hacking.
Continue reading by getting
started with a subscription.
By Jonathan Moskin and Rachel Pauley
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
By Stéphanie Faber and Charles Helleputte
Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.
By Ed Lanquist, Jr. and Dominic Rota
At what point does a “smart” computing system, or advanced software program, qualify as AI in the eyes of pertinent regulatory or judicial authorities? When is an individual considered to have merely deployed an AI-based computing tool to assist with creating a work of art or conceiving of a technological innovation? Each of these questions is explored in this article, giving consideration to currently prevailing guidelines from administrative bodies and the courts.
By Peter Collins
In the hands of a motivated insider with only average technical proficiency, AI becomes a uniquely effective tool with which to penetrate an organization’s complete security infrastructure for any number of malicious purposes.