Back to Search Start Over

Consenting to Computer Use.

Authors :
Grimmelmann, James
Source :
George Washington Law Review; Dec2016, Vol. 84 Issue 6, p1500-1522, 23p
Publication Year :
2016

Abstract

The federal Computer Fraud and Abuse Act ("CFAA ") makes it a crime to "access [] a computer without authorization or exceed[] authorized access. '' Courts and commentators have struggled to explain what types of conduct by a computer user are "without authorization. " But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows. In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen's taxonomy of consent, I argue that we should distinguish between the factual question of what uses a computer owner manifests her consent to and the legal question of what uses courts will deem her to have consented to. Doing so allows us to distinguish the different kinds of questions presented by different kinds of CFAA cases, and to give clearer and more precise answers to all of them. Some cases require careful fact-finding about what reasonable computer users in the defendant's position would have known about the owner's expressed intentions; other cases require frank policy judgments about which kinds of unwanted uses should be considered serious enough to trigger the CFAA. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00168076
Volume :
84
Issue :
6
Database :
Complementary Index
Journal :
George Washington Law Review
Publication Type :
Academic Journal
Accession number :
119711102