Matches in SemOpenAlex for { <https://semopenalex.org/work/W286641542> ?p ?o ?g. }
Showing items 1 to 63 of
63
with 100 items per page.
- W286641542 startingPage "83" @default.
- W286641542 abstract "IntroductionPortable equipment, such as laptop computers, flash drives, portable hard drives and smart phones, can improve employee productivity in the modern workplace.^sup1^ Coupled with internet access, this equipment also allows the employee to work off site while still permitting access to the employer's computer network.^sup2^ Unfortunately, this technology also makes it incredibly easy for an employee to take information from the company's computer system.^sup3^ If this occurs, the company may have a claim against the employee under the Computer Fraud and Abuse Act (CFAA).^sup4^Under the CFAA, a civil remedy may be available to the employer if the employee accessed the computer authorization.^sup5^ However, there is currently a split among federal courts on the definition of authorization, specifically whether an employee, who was given permission to access the employer's computer system as part of the employment arrangement, falls within this definition when the employee accesses the information for an improper purpose, such as to misappropriate the information.^sup6^Stating a claim under the CFAA for access authorization can be tricky for the employer though. And while a number of articles address the statute and existing case law, there do not appear to be any case studies discussing the CFAA that can be used in the classroom to instruct future business owners.^sup7^ This article provides such a case study along with a discussion about the nuances of the statute and how it is treated in different jurisdictions. To explain these nuances, this article will begin with the case study in Part I. This case study will be used to introduce the current state of the law concerning employee access to information authorization under the CFAA. It will attempt to clarify the underlying circumstances that may permit an employer to properly state a claim for recovery in each jurisdiction. Teaching objectives for the case study are found in Part II. Part III is a teaching note on the CFAA with emphasis on the specific sections typically asserted against former employees for accessing information from the computer system authorization along with a comparison of case law interpreting the phrase authorization under the statute. This part provides suggested answers to the discussion questions to illustrate the application of the law to the facts in the case study.I. A Case Study on the CFAA with Discussion Questions Harper, Miller, & Associates, Inc., a graphic design firm, has been in business for twenty years. The company currently employs forty-two people. In the course of the company's twenty years of business, Harper, Miller, & Associates, Inc., spent a considerable amount of money perfecting the originality of its graphic designs. As a result, the company developed a reputation as a good company that offers unique designs at fair prices. It was this reputation that led Candice Jones to apply for a position at the company. She was hired by the company as a Designer I right out of college five years ago.When Ms. Jones was hired she signed an employment agreement that stated, in part: Candice Jones shall not divulge or communicate to any person (other than those whose province it is to know the same or with proper authority) any of the trade secrets or other confidential information of Harper, Miller, & Associates, Inc., its subsidiaries and/or affiliated companies which she may (whether heretofore or hereafter) have received or obtained during the course of this Agreement with Harper, Miller, & Associates, Inc. This restriction shall continue to apply after the termination of this Agreement without limit in point of time but shall cease to apply to information or knowledge which may come into the public domain. Further, Ms. Jones recognizes and agrees that certain messages and materials simply must not be sent or accessed on company equipment or through company systems, these include materials accessed for personal gain. …" @default.
- W286641542 created "2016-06-24" @default.
- W286641542 creator A5008851590 @default.
- W286641542 date "2013-01-01" @default.
- W286641542 modified "2023-09-27" @default.
- W286641542 title "Employee Access Without Authorization under the Computer Fraud and Abuse Act: A Case Study" @default.
- W286641542 hasPublicationYear "2013" @default.
- W286641542 type Work @default.
- W286641542 sameAs 286641542 @default.
- W286641542 citedByCount "0" @default.
- W286641542 crossrefType "journal-article" @default.
- W286641542 hasAuthorship W286641542A5008851590 @default.
- W286641542 hasConcept C108759981 @default.
- W286641542 hasConcept C108827166 @default.
- W286641542 hasConcept C111919701 @default.
- W286641542 hasConcept C144133560 @default.
- W286641542 hasConcept C17319257 @default.
- W286641542 hasConcept C17744445 @default.
- W286641542 hasConcept C199539241 @default.
- W286641542 hasConcept C2780008327 @default.
- W286641542 hasConcept C38652104 @default.
- W286641542 hasConcept C41008148 @default.
- W286641542 hasConcept C52592926 @default.
- W286641542 hasConceptScore W286641542C108759981 @default.
- W286641542 hasConceptScore W286641542C108827166 @default.
- W286641542 hasConceptScore W286641542C111919701 @default.
- W286641542 hasConceptScore W286641542C144133560 @default.
- W286641542 hasConceptScore W286641542C17319257 @default.
- W286641542 hasConceptScore W286641542C17744445 @default.
- W286641542 hasConceptScore W286641542C199539241 @default.
- W286641542 hasConceptScore W286641542C2780008327 @default.
- W286641542 hasConceptScore W286641542C38652104 @default.
- W286641542 hasConceptScore W286641542C41008148 @default.
- W286641542 hasConceptScore W286641542C52592926 @default.
- W286641542 hasLocation W2866415421 @default.
- W286641542 hasOpenAccess W286641542 @default.
- W286641542 hasPrimaryLocation W2866415421 @default.
- W286641542 hasRelatedWork W111588792 @default.
- W286641542 hasRelatedWork W114600230 @default.
- W286641542 hasRelatedWork W1507995624 @default.
- W286641542 hasRelatedWork W1560964395 @default.
- W286641542 hasRelatedWork W164840047 @default.
- W286641542 hasRelatedWork W182310148 @default.
- W286641542 hasRelatedWork W192221830 @default.
- W286641542 hasRelatedWork W1979602374 @default.
- W286641542 hasRelatedWork W198245147 @default.
- W286641542 hasRelatedWork W230548592 @default.
- W286641542 hasRelatedWork W245634615 @default.
- W286641542 hasRelatedWork W273548639 @default.
- W286641542 hasRelatedWork W279313544 @default.
- W286641542 hasRelatedWork W287254695 @default.
- W286641542 hasRelatedWork W2994462727 @default.
- W286641542 hasRelatedWork W324758032 @default.
- W286641542 hasRelatedWork W50751357 @default.
- W286641542 hasRelatedWork W177401808 @default.
- W286641542 hasRelatedWork W2336487088 @default.
- W286641542 hasRelatedWork W2342184471 @default.
- W286641542 hasVolume "5" @default.
- W286641542 isParatext "false" @default.
- W286641542 isRetracted "false" @default.
- W286641542 magId "286641542" @default.
- W286641542 workType "article" @default.