SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Litigation Alert
  Ninth Circuit Holds Computer Fraud and Abuse Act Criminalizes
  Employee’s Access To Information In Violation Of Employer’s Express
  Access Limitations
  laurence f. pulgram, tyler g. newby and sebastian e. kaplan



United States v. Nosal, No. 10-10038 (April 28, 2011)           and by means of such conduct furthers the intended
(Trott, J., O’Scannlain, J., Campbell, J.)                      fraud and obtains anything of value.” In light of
                                                                the Ninth Circuit’s decision in LVRC Holdings LLC
http://www.ca9.uscourts.gov/datastore/                          v. Brekka, which construed the phrase “accesses
opinions/2011/04/28/10-10038.pdf                                . . . without authorization” to exclude the actions
Summary                                                         of individuals who had misused their otherwise
                                                                authorized access to computer systems, the district
On Thursday, April 28, 2011, the Ninth Circuit, in a split      court dismissed five of the eight counts against
decision, held that an employee could be criminally             Nosal.
liable under the Computer Fraud and Abuse Act, 18
U.S.C. § 1030 (the “CFAA”), for exceeding authorized            The Ninth Circuit’s Decision
access to an employer’s computer system by accessing            In reversing the district court, the Ninth Circuit
proprietary information in violation of the employer’s          held that “an employee ‘exceeds authorized
written policies. In so holding, the Ninth Circuit              access’ under § 1030 when he or she violates
joined several other circuits in interpreting the CFAA’s        the employer’s computer access restrictions—
“exceeds authorized access” prong to cover violations           including use restrictions.” Because the company
of an employer’s clearly disclosed computer use policy          had contractually prohibited its employees from
to misappropriate proprietary company information.              disclosing information on its computer system to
This interpretation of the CFAA also has ramifications          third parties, or from using the information except
outside the employment context, and potentially                 for legitimate business purposes, the employees
extends to enforceable terms of use policies and other          exceeded their authorization when they violated that
contracts restricting network access.                           prohibition.
Background of the Case                                          The Ninth Circuit distinguished Brekka, which
The facts of the case read like a garden-variety civil          addressed the CFAA’s access without authorization
trade secret dispute. David Nosal had worked for                prong, as opposed to the exceeding authorized
the executive search firm Korn/Ferry International,             access prong at issue in Nosal. Unlike the company
which he left to start a competing firm. Soon after             in Brekka, Korn/Ferry had made its computer access
leaving the firm, Nosal engaged three Korn/Ferry                and non-disclosure policies conspicuously clear to
employees to help set up the rival company. Those               all its employees.
employees downloaded information about executive                The Ninth Circuit addressed the concern that its
candidates from Korn/Ferry’s password-protected                 interpretation of “exceeds authorized access” would
leads database and provided that information to                 make criminals out of employees who violated their
Nosal. All Korn/Ferry employees had been required to            employer’s use policies by using work computers for
sign employment agreements prohibiting disclosure of            personal reasons. It held that the government—and
such information.                                               by extension, a plaintiff in a private civil action, which
In a federal criminal indictment, Nosal, was charged            is also available to enforce the CFAA—would still need
with violating § 1030(a)(4) of the CFAA, which imposes          to satisfy the other elements of § 1030(a)(4). Those
criminal liability for anyone who: “knowingly and               elements require proof that that (1) the defendant
with intent to defraud, accesses a protected computer           intended to defraud the company, (2) the computer
without authorization, or exceeds authorized access,            access furthered that intent, and (3) the defendant
                                                                obtained something of value through the access.



litigation newsletter                                                                                   www.fenwick.com
Implications                                               For further information, please contact:

Nosal gives greater teeth to computer access and use       Laurence F. Pulgram, Partner, Litigation Group
policies, thereby improving companies’ ability to deter    lpulgram@fenwick.com, 415.875.2390
both outsiders and insiders from stealing confidential
                                                           Tyler G. Newby, Of Counsel, Litigation Group and
business information. In Nosal, the computer use           White Collar/Regulatory Group
policy prohibited disclosure to outside parties and        tnewby@fenwick.com, 415.875.2495
use other than for legitimate business purposes.
                                                           Sebastian E. Kaplan, Associate, Litigation Group
Restrictions on disclosure create a bright line rule
                                                           skaplan@fenwick.com, 415.875.2477
that puts employees on notice. Restrictions on the
purpose of access—such as for legitimate business          ©2011 Fenwick & West LLP. All Rights Reserved.
purposes—present greater vagueness problems.
Although the majority did not explicitly criticize Korn/
                                                           the views expressed in this publication are solely those of the author, and
Ferry’s restriction for legitimate business purposes,      do not necessarily reflect the views of fenwick & west llp or its clients.
                                                           the content of the publication (“content”) should not be regarded as
it effectively replaced that standard by focusing on       advertising, solicitation, legal advice or any other advice on any particular
                                                           matter. the publication of any content is not intended to create and does
the “intent to defraud” element. This suggests that        not constitute an attorney-client relationship between you and fenwick &
companies may face difficulty enforcing a computer         west llp. you should not act or refrain from acting on the basis of any
                                                           content included in the publication without seeking the appropriate legal
use policy where an employee’s motivation falls in         or professional advice on the particular facts and circumstances at issue.

the gray area between a legitimate business purpose
and outright fraud. Where possible, computer use
policies should be drafted to prohibit actions, instead
of intentions.

Employers’ computer use policies, in addition to
being clear, must be conspicuous. Korn/Ferry’s policy
was disclosed to employees at the time of hiring and
each time an employee logged onto the Korn/Ferry
computer system.

Nosal also has implications for restrictions on access
to electronic information provided to customers or
the public. A company that provides information
on its website may be able to restrict the use of that
information through enforceable Terms of Use. By
the same token, companies who access information
on an outside website should take note of what
use restrictions exist. Nosal, however, involved the
employment context, and the Ninth Circuit has not
yet addressed whether the definition of access or
authorization will be interpreted differently for non-
employees.




2   litigation alert – may 2, 2011                                                                                 fenwick & west

Contenu connexe

En vedette

9TH, PPP installations. BIM 2, 2012
9TH, PPP  installations. BIM 2, 20129TH, PPP  installations. BIM 2, 2012
9TH, PPP installations. BIM 2, 2012Artistic Education
 
9 step performance process v2
9 step performance process v29 step performance process v2
9 step performance process v2DJ King
 
9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie mol9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie molEduworks Network
 
9 pengantar sistem informasi
9 pengantar sistem informasi9 pengantar sistem informasi
9 pengantar sistem informasiteddyhadia
 
9 Quotes to Inspire Your Day
9 Quotes to Inspire Your Day9 Quotes to Inspire Your Day
9 Quotes to Inspire Your DayAnthony Ware
 
9. personal profile
9. personal profile9. personal profile
9. personal profileMeghan Cary
 
9 tips til videoinnhold på Facebook
9 tips til videoinnhold på Facebook9 tips til videoinnhold på Facebook
9 tips til videoinnhold på FacebookKristian Mehlum Lie
 
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film ShowcaseBrandon Pridgett
 
9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoareCristiana Toma
 
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljimazornik
 
9 story points for writing your script for a life you love
9 story points for writing your script for a life you love9 story points for writing your script for a life you love
9 story points for writing your script for a life you loveSandy Peckinpah
 

En vedette (19)

9TH, PPP installations. BIM 2, 2012
9TH, PPP  installations. BIM 2, 20129TH, PPP  installations. BIM 2, 2012
9TH, PPP installations. BIM 2, 2012
 
9 step performance process v2
9 step performance process v29 step performance process v2
9 step performance process v2
 
9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie mol9th dutch flemish meeting presentation serlie mol
9th dutch flemish meeting presentation serlie mol
 
9 pengantar sistem informasi
9 pengantar sistem informasi9 pengantar sistem informasi
9 pengantar sistem informasi
 
9 Quotes to Inspire Your Day
9 Quotes to Inspire Your Day9 Quotes to Inspire Your Day
9 Quotes to Inspire Your Day
 
9. tcp ip
9. tcp ip9. tcp ip
9. tcp ip
 
Present from ipad
Present from ipadPresent from ipad
Present from ipad
 
9th gymnasium of kalamaria
9th  gymnasium of kalamaria9th  gymnasium of kalamaria
9th gymnasium of kalamaria
 
9tex BD Profile
9tex BD Profile9tex BD Profile
9tex BD Profile
 
9. personal profile
9. personal profile9. personal profile
9. personal profile
 
9 space pup
9  space pup9  space pup
9 space pup
 
9 tips til videoinnhold på Facebook
9 tips til videoinnhold på Facebook9 tips til videoinnhold på Facebook
9 tips til videoinnhold på Facebook
 
9. sinfonia
9. sinfonia9. sinfonia
9. sinfonia
 
9 tibermacine
9 tibermacine9 tibermacine
9 tibermacine
 
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
9th Annual James E. Dykes Communicator Banquet & Student Film Showcase
 
9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare9 sucuri cu puteri vindecatoare uluitoare
9 sucuri cu puteri vindecatoare uluitoare
 
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
9. znaci prepoznavanja dominantnog stila kontakta u radu sa roditeljima
 
9 story points for writing your script for a life you love
9 story points for writing your script for a life you love9 story points for writing your script for a life you love
9 story points for writing your script for a life you love
 
9. primary management of trauma patient(52) Dr. RAHUL TIWARI
9. primary management of trauma patient(52) Dr. RAHUL TIWARI9. primary management of trauma patient(52) Dr. RAHUL TIWARI
9. primary management of trauma patient(52) Dr. RAHUL TIWARI
 

Similaire à 9th circuit

ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
 
How to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdfHow to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdfDavid Steinfeld, Esq.
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...David Sweigert
 
Current Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptCurrent Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptVidyaAdsule1
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...William Tanenbaum
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"Patton Boggs LLP
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWilliam Tanenbaum
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...William Tanenbaum
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...Jason Coombs
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Ten Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderTen Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderBrian Miller, Solicitor
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Establishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse ActEstablishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse ActDavid Sweigert
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part IRyan K. Hew
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Servicesubtitle
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertbsookman
 

Similaire à 9th circuit (20)

ODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and LicensingODI Queensland - Open Data Essentials - Law and Licensing
ODI Queensland - Open Data Essentials - Law and Licensing
 
How to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdfHow to combat cybersquatting or cyberpiracy.pdf
How to combat cybersquatting or cyberpiracy.pdf
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
 
Current Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.pptCurrent Ethical Issues for Legal Professionals.ppt
Current Ethical Issues for Legal Professionals.ppt
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
JOBS Act Rulemaking Comments on SEC File Number S7-06-13 Dated September 13, ...
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Ten Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud ProviderTen Questions You Should Ask Your Cloud Provider
Ten Questions You Should Ask Your Cloud Provider
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Establishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse ActEstablishing violations of Computer Fraud and Abuse Act
Establishing violations of Computer Fraud and Abuse Act
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part I
 
Legal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud ServiceLegal & Commercial, Issues of a Cloud Service
Legal & Commercial, Issues of a Cloud Service
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Dan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpertDan glover casl computer software_mc_t_lexpert
Dan glover casl computer software_mc_t_lexpert
 

Plus de Andres Baytelman

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyAndres Baytelman
 
Fraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresFraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresAndres Baytelman
 
Cohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanCohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanAndres Baytelman
 
Muestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanMuestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanAndres Baytelman
 
Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Andres Baytelman
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Andres Baytelman
 
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaFraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaAndres Baytelman
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasAndres Baytelman
 
Fraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesFraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesAndres Baytelman
 
Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Andres Baytelman
 
Fraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónFraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónAndres Baytelman
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Andres Baytelman
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Andres Baytelman
 
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Andres Baytelman
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFEAndres Baytelman
 
Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Andres Baytelman
 
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Andres Baytelman
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesAndres Baytelman
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)Andres Baytelman
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas Andres Baytelman
 

Plus de Andres Baytelman (20)

Fraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la leyFraude corporativo. bajo las faldas de la ley
Fraude corporativo. bajo las faldas de la ley
 
Fraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadoresFraude corporativo y correo electrónico de los trabajadores
Fraude corporativo y correo electrónico de los trabajadores
 
Cohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelmanCohecho y lavado. columna df abr. andrés baytelman
Cohecho y lavado. columna df abr. andrés baytelman
 
Muestras de prensa Andrés Baytelman
Muestras de prensa Andrés BaytelmanMuestras de prensa Andrés Baytelman
Muestras de prensa Andrés Baytelman
 
Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)Procurement en la empresa privada (diario financiero)
Procurement en la empresa privada (diario financiero)
 
Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11Entrevista ciper fraude corporativo 18.10.11
Entrevista ciper fraude corporativo 18.10.11
 
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importaFraude Corporativo: quiénes lo cometen, por qué, y por qué importa
Fraude Corporativo: quiénes lo cometen, por qué, y por qué importa
 
Fraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticiasFraude corporativo: las buenas noticias
Fraude corporativo: las buenas noticias
 
Fraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymesFraude Corporativo: quién se preocupa de las pymes
Fraude Corporativo: quién se preocupa de las pymes
 
Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)Fraude corporativo y hotline (diario financiero ene 13)
Fraude corporativo y hotline (diario financiero ene 13)
 
Fraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturaciónFraude corporativo y sobrefacturación
Fraude corporativo y sobrefacturación
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
Ec. y neg. 21.08.12 (anuncio ingreso a pw c)
 
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados. Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
Profesionalizar el fraude corporativo: CFEs vs. Auditores y Abogados.
 
Indice manual de certificación ACFE
Indice manual de certificación ACFEIndice manual de certificación ACFE
Indice manual de certificación ACFE
 
Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012Diario Financiero 12 de junio 2012
Diario Financiero 12 de junio 2012
 
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
Ley 20.393. Buscando buenas prácticas para una mala ley (seminario CNC)
 
Embajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientesEmbajadas en washington con problemas para ser aceptados como clientes
Embajadas en washington con problemas para ser aceptados como clientes
 
FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)FCPA - UK Bribery Act (y otras)
FCPA - UK Bribery Act (y otras)
 
México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas México: Aprueban Responsabilidad Penal de Empresas
México: Aprueban Responsabilidad Penal de Empresas
 

Dernier

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Dernier (20)

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

9th circuit

  • 1. Litigation Alert Ninth Circuit Holds Computer Fraud and Abuse Act Criminalizes Employee’s Access To Information In Violation Of Employer’s Express Access Limitations laurence f. pulgram, tyler g. newby and sebastian e. kaplan United States v. Nosal, No. 10-10038 (April 28, 2011) and by means of such conduct furthers the intended (Trott, J., O’Scannlain, J., Campbell, J.) fraud and obtains anything of value.” In light of the Ninth Circuit’s decision in LVRC Holdings LLC http://www.ca9.uscourts.gov/datastore/ v. Brekka, which construed the phrase “accesses opinions/2011/04/28/10-10038.pdf . . . without authorization” to exclude the actions Summary of individuals who had misused their otherwise authorized access to computer systems, the district On Thursday, April 28, 2011, the Ninth Circuit, in a split court dismissed five of the eight counts against decision, held that an employee could be criminally Nosal. liable under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (the “CFAA”), for exceeding authorized The Ninth Circuit’s Decision access to an employer’s computer system by accessing In reversing the district court, the Ninth Circuit proprietary information in violation of the employer’s held that “an employee ‘exceeds authorized written policies. In so holding, the Ninth Circuit access’ under § 1030 when he or she violates joined several other circuits in interpreting the CFAA’s the employer’s computer access restrictions— “exceeds authorized access” prong to cover violations including use restrictions.” Because the company of an employer’s clearly disclosed computer use policy had contractually prohibited its employees from to misappropriate proprietary company information. disclosing information on its computer system to This interpretation of the CFAA also has ramifications third parties, or from using the information except outside the employment context, and potentially for legitimate business purposes, the employees extends to enforceable terms of use policies and other exceeded their authorization when they violated that contracts restricting network access. prohibition. Background of the Case The Ninth Circuit distinguished Brekka, which The facts of the case read like a garden-variety civil addressed the CFAA’s access without authorization trade secret dispute. David Nosal had worked for prong, as opposed to the exceeding authorized the executive search firm Korn/Ferry International, access prong at issue in Nosal. Unlike the company which he left to start a competing firm. Soon after in Brekka, Korn/Ferry had made its computer access leaving the firm, Nosal engaged three Korn/Ferry and non-disclosure policies conspicuously clear to employees to help set up the rival company. Those all its employees. employees downloaded information about executive The Ninth Circuit addressed the concern that its candidates from Korn/Ferry’s password-protected interpretation of “exceeds authorized access” would leads database and provided that information to make criminals out of employees who violated their Nosal. All Korn/Ferry employees had been required to employer’s use policies by using work computers for sign employment agreements prohibiting disclosure of personal reasons. It held that the government—and such information. by extension, a plaintiff in a private civil action, which In a federal criminal indictment, Nosal, was charged is also available to enforce the CFAA—would still need with violating § 1030(a)(4) of the CFAA, which imposes to satisfy the other elements of § 1030(a)(4). Those criminal liability for anyone who: “knowingly and elements require proof that that (1) the defendant with intent to defraud, accesses a protected computer intended to defraud the company, (2) the computer without authorization, or exceeds authorized access, access furthered that intent, and (3) the defendant obtained something of value through the access. litigation newsletter www.fenwick.com
  • 2. Implications For further information, please contact: Nosal gives greater teeth to computer access and use Laurence F. Pulgram, Partner, Litigation Group policies, thereby improving companies’ ability to deter lpulgram@fenwick.com, 415.875.2390 both outsiders and insiders from stealing confidential Tyler G. Newby, Of Counsel, Litigation Group and business information. In Nosal, the computer use White Collar/Regulatory Group policy prohibited disclosure to outside parties and tnewby@fenwick.com, 415.875.2495 use other than for legitimate business purposes. Sebastian E. Kaplan, Associate, Litigation Group Restrictions on disclosure create a bright line rule skaplan@fenwick.com, 415.875.2477 that puts employees on notice. Restrictions on the purpose of access—such as for legitimate business ©2011 Fenwick & West LLP. All Rights Reserved. purposes—present greater vagueness problems. Although the majority did not explicitly criticize Korn/ the views expressed in this publication are solely those of the author, and Ferry’s restriction for legitimate business purposes, do not necessarily reflect the views of fenwick & west llp or its clients. the content of the publication (“content”) should not be regarded as it effectively replaced that standard by focusing on advertising, solicitation, legal advice or any other advice on any particular matter. the publication of any content is not intended to create and does the “intent to defraud” element. This suggests that not constitute an attorney-client relationship between you and fenwick & companies may face difficulty enforcing a computer west llp. you should not act or refrain from acting on the basis of any content included in the publication without seeking the appropriate legal use policy where an employee’s motivation falls in or professional advice on the particular facts and circumstances at issue. the gray area between a legitimate business purpose and outright fraud. Where possible, computer use policies should be drafted to prohibit actions, instead of intentions. Employers’ computer use policies, in addition to being clear, must be conspicuous. Korn/Ferry’s policy was disclosed to employees at the time of hiring and each time an employee logged onto the Korn/Ferry computer system. Nosal also has implications for restrictions on access to electronic information provided to customers or the public. A company that provides information on its website may be able to restrict the use of that information through enforceable Terms of Use. By the same token, companies who access information on an outside website should take note of what use restrictions exist. Nosal, however, involved the employment context, and the Ninth Circuit has not yet addressed whether the definition of access or authorization will be interpreted differently for non- employees. 2 litigation alert – may 2, 2011 fenwick & west