The IT Law Wiki
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 11: Line 11:
 
The scope of any [[authorization]] hinges upon the facts of each case. Where the case involves exceeding authorized access, establishing the scope of [[authorized access]] may be difficult. The extent of [[authorization]] may turn upon the contents of an [[employment agreement]] or similar document, a [[terms of service]] notice, or a [[log-on]] [[banner]] outlining the permissible purposes for [[access]]ing a [[computer]] or [[computer network]]. <ref> ''See'' [[Southwest Airlines v. Farechaser|Southwest Airlines Co. v. Farechase, Inc.]], 318 F.Supp.2d 435 (N.D. Tex. 2004)([http://scholar.google.com/scholar_case?case=9920151187319414662&q=318+F.Supp.2d+435&hl=en&as_sdt=2002 full-text]) ([[user agreement]]); [[EF Cultural Travel v. Zefer|EF Cultural Travel BV v. Zefer Corp.]], 318 F.3d 58 (1st Cir. 2003)([http://scholar.google.com/scholar_case?case=1587830690568515562&q=318+F.3d+58&hl=en&as_sdt=2002 full-text]) (various [[site]] [[notice]]s); [[Register.com v. Verio|Register.com, Inc. v. Verio, Inc.]], 126 F. Supp. 2d 238, 253 (S.D.N.Y. 2000) ([[terms of use]] [[notice]]); [[AOL v. LCGM|America Online, Inc. v. LCGM, Inc.]], 46 F.Supp.2d 444, 450-51 (E.D. Va. 1998)([http://scholar.google.com/scholar_case?case=3406319925307490703&q=46+F.Supp.2d+444&hl=en&as_sdt=2002 full-text]) ([[terms of service]] [[agreement]]); [[EF Cultural Travel v. Explorica|EF Cultural Travel BV v. Explorica, Inc.]], 274 F.3d 577 (1st Cir. 2001)([http://scholar.google.com/scholar_case?case=2683575157740054983&q=274+F.3d+577&hl=en&as_sdt=2002 full-text]) ([[employee confidentiality agreement]]).</ref>
 
The scope of any [[authorization]] hinges upon the facts of each case. Where the case involves exceeding authorized access, establishing the scope of [[authorized access]] may be difficult. The extent of [[authorization]] may turn upon the contents of an [[employment agreement]] or similar document, a [[terms of service]] notice, or a [[log-on]] [[banner]] outlining the permissible purposes for [[access]]ing a [[computer]] or [[computer network]]. <ref> ''See'' [[Southwest Airlines v. Farechaser|Southwest Airlines Co. v. Farechase, Inc.]], 318 F.Supp.2d 435 (N.D. Tex. 2004)([http://scholar.google.com/scholar_case?case=9920151187319414662&q=318+F.Supp.2d+435&hl=en&as_sdt=2002 full-text]) ([[user agreement]]); [[EF Cultural Travel v. Zefer|EF Cultural Travel BV v. Zefer Corp.]], 318 F.3d 58 (1st Cir. 2003)([http://scholar.google.com/scholar_case?case=1587830690568515562&q=318+F.3d+58&hl=en&as_sdt=2002 full-text]) (various [[site]] [[notice]]s); [[Register.com v. Verio|Register.com, Inc. v. Verio, Inc.]], 126 F. Supp. 2d 238, 253 (S.D.N.Y. 2000) ([[terms of use]] [[notice]]); [[AOL v. LCGM|America Online, Inc. v. LCGM, Inc.]], 46 F.Supp.2d 444, 450-51 (E.D. Va. 1998)([http://scholar.google.com/scholar_case?case=3406319925307490703&q=46+F.Supp.2d+444&hl=en&as_sdt=2002 full-text]) ([[terms of service]] [[agreement]]); [[EF Cultural Travel v. Explorica|EF Cultural Travel BV v. Explorica, Inc.]], 274 F.3d 577 (1st Cir. 2001)([http://scholar.google.com/scholar_case?case=2683575157740054983&q=274+F.3d+577&hl=en&as_sdt=2002 full-text]) ([[employee confidentiality agreement]]).</ref>
   
βˆ’
In one case, however, an insider (a person with some limited [[authorization]] to [[use]] a [[system]]) strayed so far beyond the bounds of his [[authorization]] that the court treated him as having acted [[without authorization]].<ref>''See'' [[U.S. v. Morris|United States v. Morris]], 928 F.2d 504 (2d Cir. 1991)([http://scholar.google.com/scholar_case?case=551386241451639668&q=928+F.2d+504&hl=en&as_sdt=2002 full-text]). Gauging whether an individual has exceeded authorized access based upon whether the defendant used the technological features of the [[computer system]] as "reasonably expected" was criticized by one court as too vague an approach. [[EF Cultural Travel v. Zefer]], 318 F.3d at 63 (in a civil case under Β§1030(a)(4), involving whether use of a [[web scraper]] exceeded authorized access, the court rejected inferring "reasonable expectations" test in favor of express language on the part of the plaintiff).</ref> Typically, however, persons who are [[employee]]s or [[licensee]]s of the entity whose [[computer]] they used are held liable for exceeding authorized access as opposed to [[unauthorized access]].<ref>''See [[EF Cultural Travel v. Explorica]],'' 274 F.3d at 582-84 (holding that a former [[employee]] who violated a [[confidentiality agreement]] by providing [[information]] about [[access]]ing a [[protected computer]] [[system]] could be liable for exceeding authorized access).</ref>
+
In one case, however, an insider (a person with some limited [[authorization]] to use a [[system]]) strayed so far beyond the bounds of his [[authorization]] that the court treated him as having acted [[without authorization]].<ref>''See'' [[U.S. v. Morris|United States v. Morris]], 928 F.2d 504 (2d Cir. 1991)([http://scholar.google.com/scholar_case?case=551386241451639668&q=928+F.2d+504&hl=en&as_sdt=2002 full-text]). Gauging whether an individual has exceeded authorized access based upon whether the defendant used the technological features of the [[computer system]] as "reasonably expected" was criticized by one court as too vague an approach. [[EF Cultural Travel v. Zefer]], 318 F.3d at 63 (in a civil case under Β§1030(a)(4), involving whether use of a [[web scraper]] exceeded authorized access, the court rejected inferring "reasonable expectations" test in favor of express language on the part of the plaintiff).</ref> Typically, however, persons who are [[employee]]s or [[licensee]]s of the entity whose [[computer]] they used are held liable for exceeding authorized access as opposed to [[unauthorized access]].<ref>''See [[EF Cultural Travel v. Explorica]],'' 274 F.3d at 582-84 (holding that a former [[employee]] who violated a [[confidentiality agreement]] by providing [[information]] about [[access]]ing a [[protected computer]] [[system]] could be liable for exceeding authorized access).</ref>
 
 
 
In ''[[SecureInfo v. Telos|SecureInfo Corp. v. Telos Corp.]],''<ref>387 F.Supp.2d 593 (E.D. Va. 2005)([http://scholar.google.com/scholar_case?case=15862711997311359221&q=387+F.Supp.2d+593&hl=en&as_sdt=2002 full-text]).</ref> the court dismissed a claim that defendants, who gained [[access]] to a [[protected computer]] due to [[breach]] of a [[software license]] by a [[licensee]], either exceeded authorized access or gained [[unauthorized access]]. The court believed that the [[licensee]] had given the defendants [[authority]] to [[use]] the [[computer system]], which undercut the plaintiff's [[unauthorized use]] claim.<ref>''Id.'' at 608-09.</ref> Moreover, since it was the [[licensee]] and not the defendants who agreed to the [[term]]s of the [[license]], the defendants were not bound to the [[use limitations]], and therefore, had not exceeded authorized access.<ref>''Id.'' at 609-10.</ref> The court noted, however, that had the [[licensee]] &mdash; as opposed to the persons who gained [[access]] to the [[system]] via the [[licensee]] &mdash; been sued for exceeding authorized use, they may have been found liable under theory set forth in ''[[EF Cultural Travel v. Zefer]].''<ref>''Id.'' at 609 (''citing [[EF Cultural Travel v. Explorica]]'', 274 F.3d at 582).</ref>
 
In ''[[SecureInfo v. Telos|SecureInfo Corp. v. Telos Corp.]],''<ref>387 F.Supp.2d 593 (E.D. Va. 2005)([http://scholar.google.com/scholar_case?case=15862711997311359221&q=387+F.Supp.2d+593&hl=en&as_sdt=2002 full-text]).</ref> the court dismissed a claim that defendants, who gained [[access]] to a [[protected computer]] due to [[breach]] of a [[software license]] by a [[licensee]], either exceeded authorized access or gained [[unauthorized access]]. The court believed that the [[licensee]] had given the defendants [[authority]] to [[use]] the [[computer system]], which undercut the plaintiff's [[unauthorized use]] claim.<ref>''Id.'' at 608-09.</ref> Moreover, since it was the [[licensee]] and not the defendants who agreed to the [[term]]s of the [[license]], the defendants were not bound to the [[use limitations]], and therefore, had not exceeded authorized access.<ref>''Id.'' at 609-10.</ref> The court noted, however, that had the [[licensee]] &mdash; as opposed to the persons who gained [[access]] to the [[system]] via the [[licensee]] &mdash; been sued for exceeding authorized use, they may have been found liable under theory set forth in ''[[EF Cultural Travel v. Zefer]].''<ref>''Id.'' at 609 (''citing [[EF Cultural Travel v. Explorica]]'', 274 F.3d at 582).</ref>
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)