<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Corey Varma]]></title><description><![CDATA[Corey Varma is an attorney in Chicago, Illinois with a focus in Information Technology and Privacy law, Cyberspace law, Social Media law, and Intellectual Prope]]></description><link>https://coreyvarma.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1737321642193/51f11e2a-cc4d-4fda-9547-523f30c71e10.png</url><title>Corey Varma</title><link>https://coreyvarma.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 07 Apr 2026 20:09:12 GMT</lastBuildDate><atom:link href="https://coreyvarma.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[What does “valuable consideration” mean under the California Consumer Privacy Act?]]></title><description><![CDATA[January 1, 2020 brings important new privacy rights for California residents as the California Consumer Privacy Act (“CCPA”) goes into effect. Following in the footsteps of the European Union’s General Data Protection Regulation (“GDPR”), the Califor...]]></description><link>https://coreyvarma.com/what-does-valuable-consideration-mean-under-the-california-consumer-privacy-act</link><guid isPermaLink="true">https://coreyvarma.com/what-does-valuable-consideration-mean-under-the-california-consumer-privacy-act</guid><category><![CDATA[ccpa]]></category><category><![CDATA[privacy]]></category><category><![CDATA[california]]></category><category><![CDATA[Law]]></category><dc:creator><![CDATA[Sarina Khanolkar]]></dc:creator><pubDate>Mon, 25 Nov 2019 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737322433647/5b1a6c55-e62b-4f6c-8784-782ee92646f3.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>January 1, 2020 brings important new privacy rights for California residents as the California Consumer Privacy Act (“CCPA”) goes into effect. Following in the footsteps of the European Union’s General Data Protection Regulation (“GDPR”), the California legislature enacted the CCPA which enhances privacy rights and consumer protection by providing California consumers more control over the collection, processing, sale, and disclosure of their personal information.</p>
<p>While California leads the nation in privacy protection, the CCPA has posed significant challenges to organizations subject to the new law due to its sometimes ambiguous language and broad provisions. The Act was purposefully written with broad language, giving the express authority to the California Attorney General to enact regulations and clarify specific provisions of the Act. One of the areas the Attorney General did not address in its <a target="_blank" href="https://www.oag.ca.gov/sites/all/files/agweb/pdfs/privacy/ccpa-proposed-regs.pdf">Draft Regulations</a> is the question of what is considered a “sale” under the CCPA?</p>
<p>Per the Act, “sale” is defined as “selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a consumer’s personal information by the business to another business or a third party for monetary or <strong>other valuable consideration</strong>.” <a target="_blank" href="https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?sectionNum=1798.140.&amp;highlight=true&amp;lawCode=CIV&amp;keyword=sale">Section 1798.140(t)(1)</a> (emphasis added).  However, the Act does not define what “other valuable consideration” means, which has caused challenges for businesses to determine whether they are considered a seller under the Act.</p>
<p>Until further guidance is provided by the Attorney General or the legislature, we must look to the courts in order to understand how “sale” may be defined in the context of “valuable consideration.” Since the CCPA has not seen any enforcement action, there is no case law on point. However, we can still look to California courts, which have given meaning to “valuable consideration” in other contexts.</p>
<p>One source we can look to is California contract law. The basis of any contract is consideration, which “must be an act or a return promise, bargained for and given in exchange for the promise.” <a target="_blank" href="https://scholar.google.com/scholar_case?case=17853078418934237133&amp;q=consideration&amp;hl=en&amp;#p272"><em>Simmons v. Cal. Inst. of Tech.</em>, 34 Cal. 2d 264, 272</a> (1949). Under this test, the key question is whether the exchange motivated the other party’s promise or performance. Furthermore, both parties must understand and have intended for the bargained for exchange. One common example of non-monetary consideration are nondisclosure agreements where one party agrees to allow another access to confidential information in exchange for service.</p>
<p>If valuable consideration under the CCPA is interpreted in a manner consistent with California contract law, any agreement between two parties where personal information is exchanged in order to motivate the other party’s promise or performance would be considered a sale under the CCPA. For example, when a company includes advertising cookies on their website and the advertiser is able to use the personal information to help improve retargeting or cross targeting to the consumer. In such a case, the company receives a benefit that would likely be considered a sale under the CCPA.</p>
<p>However, this may be too broad an interpretation. California courts have narrowed the scope of valuable consideration by holding, even where an exchange induces another party’s promise or performance, this exchange will be considered too remote or ancillary, and is not consideration, where the exchange is not material to the bargain. <em>See</em> <a target="_blank" href="https://scholar.google.com/scholar_case?case=3633063643610949116&amp;q=People+v.+Cardas,+137+Cal.+App.+Supp.+788&amp;hl=en&amp;as_sdt=400006#p452"><em>People v. Shira</em>, 62 Cal. App. 3d 442</a>. For example, if a company gets anonymous demographic information in return for including an advertiser’s cookies on its site, this may be considered too remote or ancillary under this line of reasoning.</p>
<p>Ultimately, the scope of the CCPA’s definition of “sale” will likely remain elusive until its meaning under the CCPA is tested.</p>
]]></content:encoded></item><item><title><![CDATA[“Why am I getting all these Privacy Policy update emails?”]]></title><description><![CDATA[In April 2016, the European Union (“EU”) passed a sweeping new regulation, the General Data Protection Regulation (“GDPR”), which becomes effective today, May 25, 2018. Because the GDPR is a regulation, as opposed to a directive (such as the 1998 EU ...]]></description><link>https://coreyvarma.com/why-am-i-getting-all-these-privacy-policy-update-emails</link><guid isPermaLink="true">https://coreyvarma.com/why-am-i-getting-all-these-privacy-policy-update-emails</guid><category><![CDATA[privacy]]></category><category><![CDATA[information technology]]></category><category><![CDATA[Law]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Fri, 25 May 2018 17:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737320603501/2c16b536-59cb-4efa-a364-eae069327a92.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In April 2016, the European Union (“EU”) passed a sweeping new regulation, the <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN">General Data Protection Regulation</a> (“GDPR”), which becomes effective today, May 25, 2018. Because the GDPR is a regulation, as opposed to a directive (such as the 1998 EU <a target="_blank" href="https://en.wikipedia.org/wiki/Data_Protection_Directive">Data Protection Directive</a>), it does not require EU member states to enact enabling legislation because it is directly binding and applicable on EU member states.</p>
<h3 id="heading-so-why-am-i-getting-all-these-privacy-policy-update-emails">So, “why am I getting all these Privacy Policy update emails?”</h3>
<p>The GDPR applies to any organization that processes or controls the personal data of any <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1489-1-1">data subject</a> in the EU whether or not the organization is based in the EU. <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1455-1-1">Article 3</a>. Because the internet makes it easy for US-based organizations to provide services to international consumers, many US-based organizations will inevitably provide their products and services to EU-based data subjects, and are thus subject to the GDPR’s requirements.</p>
<h3 id="heading-what-does-the-gdpr-require">What does the GDPR require?</h3>
<p>For the most part the GDPR is yet another iteration of the <a target="_blank" href="http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm">Fair Information Practices</a> (“FIPs”) which were developed in 1980 by The Organisation for Economic Co-operation (“OECD”). These eight FIP principles for the protection of personal data, which anticipated the Internet and instantaneous exchange of personal data, have continued to be the backbone of privacy frameworks and legislation enacted by the EU and elsewhere:</p>
<blockquote>
<p><strong><em>Collection Limitation Principle</em></strong> <em>– There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.</em></p>
<p><strong><em>Data Quality Principle</em></strong> <em>– Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.</em></p>
<p><strong><em>Purpose Specification Principle</em></strong> <em>– The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.</em></p>
<p><strong><em>Use Limitation Principle</em></strong> <em>– Personal data should not be disclosed, made available or otherwise used for purposes other than those specified</em></p>
<p><strong><em>Security Safeguards Principle</em></strong> <em>– Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.</em></p>
<p><strong><em>Openness Principle</em></strong> <em>– There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.</em></p>
<p><strong><em>Individual Participation Principle</em></strong> <em>– An individual should have the right, among other things, to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him.</em></p>
<p><strong><em>Accountability Principle</em></strong> <em>– A data controller should be accountable for complying with measures which give effect to the principles stated above.</em></p>
</blockquote>
<p>To be sure, there are additional specific requirements under the Regulation. Though, any of the GDPR’s requirements can broadly fall under one or more of the above OECD principles. Specific requirements of the GDPR include, among others:</p>
<ul>
<li><p>A particular controller or processor should use a risk-based lens to assess its data privacy risks in an “objective” manner “by which it is established whether data processing operations involve a risk or a high risk.” <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN">Recital 76</a>. If the assessment yields a high risk, the GDPR requires a formal <strong>Data Protection Impact Assessment (“DPIA”)</strong>. <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e3546-1-1">Article 35</a>.</p>
</li>
<li><p>Appointment of a <strong>Data Protection Officer</strong> (“DPO”) for controllers and processors involved in high-risk processing activities, i.e., where one of a company’s core activities is the large-scale monitoring of individuals’ data or processing of special categories of personal data (such racial or ethnic origin, political opinions, religious or philosophical beliefs, and the like, defined in <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2051-1-1">Article 9</a>). <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e3732-1-1">Article 37</a>.</p>
</li>
<li><p>A <strong>data breach notification</strong> requirement. In the event of a personal data breach, a data controller must notify the supervisory authority (most likely the supervisory authority of the member state where the controller has its corporate headquarters) not later than 72 hours after having become aware of it. <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e3434-1-1">Article 33</a>, <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e4844-1-1">55</a>, and <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e4864-1-1">56</a>. If the data breach “is likely to result in a high risk to the rights and freedoms of individuals,” the data controller must also notify the affected data subjects “without undue delay.” <a target="_blank" href="http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e3490-1-1">Article 34</a>.</p>
</li>
</ul>
<p>As with any sweeping regulatory regime, there is still uncertainty that is (in some cases) still being resolved by guidance from EU member states’ supervisory authorities. In the coming months and years we will see how the GDPR takes hold and how EU courts will interpret its regulatory language.</p>
]]></content:encoded></item><item><title><![CDATA[Snapchat sued for allegedly violating Illinois Biometric Information Privacy Act (BIPA)]]></title><description><![CDATA[Snapchat faces a class action lawsuit accusing it of violating the Illinois Biometric Information Privacy Act (“BIPA”). The suit centers around the Snapchat app’s “lenses” feature, which allows the app to draw animated additions to a person’s face.
T...]]></description><link>https://coreyvarma.com/snapchat-sued-for-allegedly-violating-illinois-biometric-information-privacy-act-bipa</link><guid isPermaLink="true">https://coreyvarma.com/snapchat-sued-for-allegedly-violating-illinois-biometric-information-privacy-act-bipa</guid><category><![CDATA[Cyber Laws]]></category><category><![CDATA[information technology]]></category><category><![CDATA[privacy]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Mon, 18 Jul 2016 17:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737320783973/b602fee1-1afc-4525-8148-08b27e4a7512.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Snapchat faces a class action <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2016/07/Martinez-v.-Snapchat-Complaint.pdf">lawsuit</a> accusing it of violating the <a target="_blank" href="http://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57">Illinois Biometric Information Privacy Act</a> (“BIPA”). The suit centers around the Snapchat app’s “lenses” feature, which allows the app to draw animated additions to a person’s face.</p>
<p>The suit alleges Snapchat violated BIPA because its “proprietary facial recognition technology scans a user’s face . . . and collects, stores and uses, geometric data relating to the unique points and contours (i.e., biometric identifiers) of each face.”</p>
<p>Additionally, the suit alleges Snapchat never informed its users of the “specific purpose and length of term for which their biometric identifiers or information would be collected, stored and used, nor did Snapchat obtain a written consent or release from any of these users.” The suit further alleges “Snapchat does not have written, publicly available policies identifying its retention schedules or guidelines for permanently destroying users’ biometric identifiers or information.”</p>
<p>BIPA requires software companies to inform its users “in writing that a biometric identifier or biometric information is being collected or stored.” Additionally, the Act requires companies to disclose the “length of term for which a biometric identifier or biometric information is being collected, stored, and used.” Most importantly, the Act requires companies to “receive[] a written release executed by the subject of the biometric identifier or biometric information.”</p>
<p>Last year, Facebook faced a similar class action <a target="_blank" href="http://arstechnica.com/tech-policy/2015/04/chicago-man-sues-facebook-over-facial-recognition-use-in-tag-suggestions/">lawsuit</a> brought under the same Illinois law.</p>
<p>Case info: <em>Martinez et al v. Snapchat, Inc.</em>, case number 2:16-cv-05182, out of the U.S. District Court for the Central District of California.</p>
]]></content:encoded></item><item><title><![CDATA[DOJ files Motion to Vacate hearing in terrorist’s iPhone case]]></title><description><![CDATA[The Department of Justice (DOJ) filed a last minute Motion to Vacate today’s hearing regarding the San Bernardino terrorist’s encrypted iPhone. The DOJ previously sought Apple’s assistance to modify the iPhone’s software, weakening the mobile phone’s...]]></description><link>https://coreyvarma.com/doj-files-motion-to-vacate-hearing-in-terrorists-iphone-case</link><guid isPermaLink="true">https://coreyvarma.com/doj-files-motion-to-vacate-hearing-in-terrorists-iphone-case</guid><category><![CDATA[Criminal]]></category><category><![CDATA[Law]]></category><category><![CDATA[iphone]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Tue, 22 Mar 2016 17:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737322323969/4b92b122-e07e-40d7-9b07-293454c1301d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Department of Justice (DOJ) filed a last minute <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2016/03/305549490-Apple-vs-FBI-Motion-to-Vacate.pdf">Motion to Vacate</a> today’s hearing regarding the San Bernardino terrorist’s encrypted iPhone. The DOJ <a target="_blank" href="http://www.wired.com/2016/02/doj-files-motion-to-compel-apple-to-cooperate-in-san-bernardino-case/">previously</a> sought Apple’s assistance to modify the iPhone’s software, weakening the mobile phone’s security features, in order to gain access to the information stored on it. The DOJ’s request sparked a renewed debate over government access to encrypted data.</p>
<p>When Apple <a target="_blank" href="https://www.apple.com/customer-letter/">rejected</a> the DOJ’s request, the government <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2016/03/305549490-Apple-vs-FBI-Motion-to-Vacate.pdf">proposed</a> an “alternative” course of action would be to request “the [iPhone’s] source code and Apple’s private electronic signature” so it could modify the mobile phone’s software itself. But, it seems that the DOJ has now backed off their position.</p>
<p>The DOJ’s Motion indicates that the FBI has teamed up with an “outside party” to garner access to the data stored on the mobile phone. This unnamed party supposedly has the ability to defeat the iPhone’s encryption without compromising the data contained within.</p>
]]></content:encoded></item><item><title><![CDATA[New FTC Rules For Online Native Advertising]]></title><description><![CDATA[The Federal Trade Commission (FTC) recently issued guidelines regarding native advertising in a recent enforcement policy statement. These guidelines, more a reaffirmation of previous FTC enforcement actions, are aimed at regulating “promotional mess...]]></description><link>https://coreyvarma.com/new-ftc-rules-for-online-native-advertising</link><guid isPermaLink="true">https://coreyvarma.com/new-ftc-rules-for-online-native-advertising</guid><category><![CDATA[Advertising]]></category><category><![CDATA[FTC]]></category><category><![CDATA[Law]]></category><category><![CDATA[native advertising for publishers]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Sun, 27 Dec 2015 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737322223069/d0dd5675-aef3-4774-badd-6e107bc273c2.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Federal Trade Commission (FTC) recently issued guidelines regarding native advertising in a recent <a target="_blank" href="https://www.ftc.gov/system/files/documents/public_statements/896923/151222deceptiveenforcement.pdf">enforcement policy statement</a>. These guidelines, more a reaffirmation of previous FTC enforcement actions, are aimed at regulating “promotional messages integrated into and presented as non-commercial content.” This policy statement relies on the FTC’s authority to regulate deceptive commercial practices.</p>
<p>Native advertisements have been used for decades in print media (and are referred to by the portmanteau “<a target="_blank" href="http://dictionary.reference.com/browse/advertorial">advertorial</a>“). But the FTC believes the emergence of native advertisements online pose problems for consumers because native advertisements “mask the signals consumers customarily . . . rel[y] upon to recognize an advertis[ement] or promotional message.” This sometimes makes it extremely difficult for consumers to differentiate between actual content and advertisements, and are therefore deceptive:</p>
<blockquote>
<p><em>Regardless of the medium in which an advertising or promotional message is disseminated, deception occurs when consumers acting reasonably under the circumstances are misled about its nature or source, and such misleading impression is likely to affect their decisions or conduct regarding the advertised product or the advertising.</em></p>
</blockquote>
<p>The FTC policy statement explains that an advertisement’s format is deceptive if it materially misleads consumers about the advertisement’s commercial nature. In conclusion, the FTC issued guidelines that can help businesses avoid deceiving consumers:</p>
<blockquote>
<p><em>Deception occurs when an advertisement misleads reasonable consumers as to its true nature or source, including that a party other than the sponsoring advertiser is the source of an advertising or promotional message, and such misleading representation is material. In this regard, a misleading representation is material if it is likely to affect consumers’ choices or conduct regarding the advertised product or the advertisement, such as by leading consumers to give greater credence to advertising claims or to interact with advertising with which they otherwise would not have interacted.</em></p>
</blockquote>
<p>Advertisements that fall into this category of deceptive marketing are deceptive even if the communicated value of the advertisement is truthful and non-misleading.</p>
<p>The FTC vote approving the policy statement was unanimous (4-0).</p>
]]></content:encoded></item><item><title><![CDATA[Court finds Fifth Amendment protects smartphone passwords]]></title><description><![CDATA[The Fifth Amendment protects individuals from being compelled by the government to criminally incriminate themselves, stating in no uncertain terms:

“No person . . . shall be compelled in any criminal case to be a witness against himself.”

As discu...]]></description><link>https://coreyvarma.com/court-finds-fifth-amendment-protects-smartphone-passwords</link><guid isPermaLink="true">https://coreyvarma.com/court-finds-fifth-amendment-protects-smartphone-passwords</guid><category><![CDATA[fifth-amendment]]></category><category><![CDATA[privacy]]></category><category><![CDATA[Law]]></category><category><![CDATA[criminal law,]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Wed, 30 Sep 2015 17:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737322110178/f539ecba-9284-4529-90ea-6319aa83d328.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Fifth Amendment protects individuals from being compelled by the government to criminally incriminate themselves, stating in no uncertain terms:</p>
<blockquote>
<p><em>“No person . . . shall be compelled in any criminal case to be a witness against himself.”</em></p>
</blockquote>
<p>As discussed in a previous <a target="_blank" href="http://www.coreyvarma.com/2015/07/encryption-vs-fifth-amendment/">post</a>, the Fifth Amendment covers encryption of computers when the encryption “key” is a password since compelling the production of a password requires a defendant to reveal “the contents of [his] mind,” which is a testimonial act, forcing the defendant to be witness against himself. <em>See United States v. Doe (In re Grand Jury Subpoena Duces Tecum)</em>, 670 F.3d 1335, <a target="_blank" href="https://scholar.google.com/scholar_case?case=201586737907154112&amp;q#p1345">1345</a> (11th Cir. 2012).</p>
<p>A court recently extended this doctrine to encrypted smartphones. In <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/09/sec-v-huang.pdf"><em>SEC v. Huang</em></a>, the U.S. District Court for the Eastern District of Pennsylvania rejected the SEC’s attempt to compel the production of a password to decrypt a smartphone.</p>
<p>There does not seem to be a principled distinction between computer passwords, which have readily been found to be protected, and smartphone passwords, which are just smaller computers. Rather, what is interesting about this decision is the court’s application of the “foregone conclusion” exception to the Fifth amendment protection against self-incrimination.</p>
<p>The foregone conclusion exception to the Fifth Amendment provides the rule against compelling self-incrimination can be overcome if the testimonial information protected is a foregone conclusion. That is, “where the location, existence, and authenticity of the purported evidence is known <em>with reasonable particularity</em>, the contents of the individual’s mind are not used against him, and therefore no Fifth Amendment protection is available.” <em>Doe</em>, 670 F.3d at <a target="_blank" href="https://scholar.google.com/scholar_case?case=201586737907154112&amp;q#p1344">1344</a> (emphasis added).</p>
<p>While in <em>Huang</em>, based on the particular circumstances in the case, the SEC could certainly demonstrate the defendant was the sole owner of the phone, the court found that the SEC did not indicate with “reasonable particularity” the “existence” of any of the requested documents actually existing on the smartphones. And therefore the court found that the foregone conclusion doctrine did not apply.</p>
]]></content:encoded></item><item><title><![CDATA[Encryption vs. Fifth Amendment]]></title><description><![CDATA[The Fifth Amendment to the United States Constitution states:

“No person . . . shall be compelled in any criminal case to be a witness against himself.”

U.S. Const. amend. V.
Known as the prohibition against self-incrimination, this clause of the F...]]></description><link>https://coreyvarma.com/encryption-vs-fifth-amendment</link><guid isPermaLink="true">https://coreyvarma.com/encryption-vs-fifth-amendment</guid><category><![CDATA[privacy]]></category><category><![CDATA[Law]]></category><category><![CDATA[encryption]]></category><category><![CDATA[Constitution]]></category><category><![CDATA[Technology Law]]></category><category><![CDATA[criminal law,]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Mon, 27 Jul 2015 17:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737321919587/18976c2d-9d7c-4ebd-8e9d-4c87959454b6.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Fifth Amendment to the United States Constitution states:</p>
<blockquote>
<p><em>“No person . . . shall be compelled in any criminal case to be a witness against himself.”</em></p>
</blockquote>
<p><a target="_blank" href="https://www.law.cornell.edu/constitution/fifth_amendment">U.S. Const. amend. V.</a></p>
<p>Known as the prohibition against self-incrimination, this clause of the Fifth Amendment is commonly asserted by defendants in criminal trials. While its applicability in those contexts is quite settled, the Fifth Amendment’s place in the realm of computerized encryption is still a bit murky.</p>
<h3 id="heading-generally-the-right-against-self-incrimination">Generally, the Right against Self-Incrimination</h3>
<p>A criminal defendant must demonstrate three factors to successfully assert their right against self-incrimination under the Fifth Amendment: (1) compulsion, (2) a testimonial communication or act, and (3) incrimination. <em>See Fisher v. United States</em>, 425 U.S. 391, <a target="_blank" href="https://scholar.google.com/scholar_case?case=10520682160164643446&amp;q&amp;hl=en&amp;as_sdt=400006#p408">408</a> (1976).</p>
<p>The former and latter are simple enough to demonstrate. When a defendant is subpoenaed to act, the act is compelled. And an act is incriminating if the act exposes that person to criminal liability.</p>
<p>The salient question for the Fifth Amendment and the right against self-incrimination, especially within the context of technology, is whether compelling a defendant to act constitutes a “testimonial” act.</p>
<p>An act is testimonial when the government compels an individual to use “the contents of his own mind to explicitly or implicitly communicate some statement of fact” which allows law enforcement to learn facts it didn’t already know. <em>United States v. Doe (In re Grand Jury Subpoena Duces Tecum)</em>, 670 F.3d 1335, <a target="_blank" href="https://scholar.google.com/scholar_case?case=201586737907154112&amp;q#p1345">1345</a> (11th Cir. 2012) (internal citations omitted).</p>
<p>For example, being required to provide your fingerprint (or a DNA sample) pursuant to a legally obtained warrant or probable cause is not a testimonial act because you are not revealing “the contents of your mind.” Thus, you would be unable to assert your right against self-incrimination when you’re being fingerprinted. <em>See generally Schmerber v. Cal.</em>, 384 U.S. 757, <a target="_blank" href="https://scholar.google.com/scholar_case?case=9806833505253407923&amp;#p764">764</a> (1966).</p>
<p>The same is true for being compelled to unlock a safe with a physical key because it can not be correctly considered “the contents of your mind” and therefore it is not a testimonial act. <em>Doe</em>, 670 F.3d at <a target="_blank" href="https://scholar.google.com/scholar_case?case=201586737907154112&amp;q#p1345">1345</a>.</p>
<p>On the contrary, revealing the combination to a safe <em>is</em> a testimonial act because the combination to a safe constitutes the “contents of [a person’s] own mind.” Further, producing the combination to a safe explicitly or implicitly communicates a statement of fact that allows law enforcement to learn facts it didn’t already know. Therefore, providing the combination to a safe is a testimonial act that is protected by the Fifth Amendment. <em>Id.</em> at <a target="_blank" href="https://scholar.google.com/scholar_case?case=201586737907154112&amp;q#p1346">1346</a>.</p>
<h3 id="heading-encryption-and-the-right-against-self-incrimination">Encryption and the Right against Self-Incrimination</h3>
<p>Extending the <em>Doe</em> safe analogy works well for encryption. But when it comes to encryption, using the terms “key” and “combination” may become confusing to the uninitiated. So, before continuing, it’s worth clarifying that technically speaking encryption “keys” are actually “combinations” that help a computer program <a target="_blank" href="https://en.wikipedia.org/wiki/Cipher#Etymology">decipher</a> the contents of a file or disk. An encryption key is not a physical “key” that opens a lock. Rather it is a combination that provides the instructions to decipher the contents of a file or disk. As such the term encryption “key” is a misnomer. However, <a target="_blank" href="http://www.dsm.fordham.edu/~mathai/crypto.html">historically</a>, the “combinations” that are used to encrypt computer files have often been referred to as encryption “keys.”</p>
<p>But it doesn’t matter much what they’re called. What matters is that the Fifth Amendment applies to the compelled act of production of encryption keys because, as the content of a person’s mind, law enforcement would be learning new facts beyond simply the encryption key itself. So, like the production of a combination to a safe, the production of an encryption key is a “testimonial act” by a defendant of their knowledge of the existence and location of potentially incriminating files, and their control and dominion of the encrypted files.</p>
<p>Therefore, a defendant can properly assert their Fifth Amendment right against self-incrimination when being forced to decrypt files on a computer or a disk. But, there’s ways law enforcement can legally get around the Fifth Amendment using the foregone conclusion doctrine.</p>
]]></content:encoded></item><item><title><![CDATA[Complaint filed against Lenovo over pre-installed Superfish adware]]></title><description><![CDATA[A complaint has been filed against Lenovo in the U.S. District Court for the Southern District of California for Lenovo’s admitted (pdf) preloading of Superfish adware on their customers’ computers.
Superfish injects product recommendations into sear...]]></description><link>https://coreyvarma.com/complaint-filed-against-lenovo-over-pre-installed-superfish-adware</link><guid isPermaLink="true">https://coreyvarma.com/complaint-filed-against-lenovo-over-pre-installed-superfish-adware</guid><category><![CDATA[privacy]]></category><category><![CDATA[technology]]></category><category><![CDATA[Spyware]]></category><category><![CDATA[adware]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Fri, 20 Feb 2015 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737321769057/87159213-e574-4129-a8b0-bb38eae8eadb.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/02/S.D.-Cal.-15-cv-00368-dckt-000001_000-filed-2015-02-19.pdf">complaint</a> <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/02/S.D.-Cal.-15-cv-00368-dckt-000001_000-filed-2015-02-19.pdf">has been</a> filed against Lenovo in the U.S. District Court for the Southern District of California for Lenovo’s <a target="_blank" href="http://news.lenovo.com/article_display.cfm?article_id=1929">admitted</a> <a target="_blank" href="http://news.lenovo.com/article_display.cfm?article_id=1929">(pdf</a><a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/02/LENOVO-STATEMENT-ON-SUPERFISH.pdf">)</a> preloading of Superfish adware on their customers’ computers.</p>
<p>Superfish injects product recommendations into search results and displays ads on otherwise legitimate pages. But, it also includes a universal self-signed certificate authority. This universal certificate authority allows man-in-the-middle attacks to inject ads even on secure encrypted (SSL) pages without triggering browser security warnings. Thus, making Lenovo laptops vulnerable to malware and malicious man-in-the-middle attacks. Additionally, Superfish adware uses memory resources and consumes bandwidth, affecting computer and network performance.</p>
<p>The Plaintiff, a blogger from San Diego, Jessica Bennett, alleges her laptop was damaged as a result of Lenovo’s pre-installation of Superfish on her laptop.</p>
<p>The complaint requests a jury trial and class action certification. The complaint charges both Lenovo and Superfish with violations of: The California Invasion of Privacy Act (CIPA); The Federal Electronic Communications Privacy Act (ECPA); Trespass to personal chattel under California common law; and “fraudulent” business practices under California’s Unfair Competition Law.</p>
]]></content:encoded></item><item><title><![CDATA[Court finds Dish Network liable for 50+ million illegal telemarketing calls]]></title><description><![CDATA[On March 25, 2009, The U.S. Department of Justice (DOJ), on behalf of the Federal Trade Commission (FTC), filed suit against Dish Network in the U.S. District Court for the Central District of Illinois for telemarketing violations. In its suit, the D...]]></description><link>https://coreyvarma.com/court-finds-dish-network-liable-for-50-million-illegal-telemarketing-calls</link><guid isPermaLink="true">https://coreyvarma.com/court-finds-dish-network-liable-for-50-million-illegal-telemarketing-calls</guid><category><![CDATA[privacy]]></category><category><![CDATA[Lawsuits]]></category><category><![CDATA[Telemarketing]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Thu, 29 Jan 2015 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737321562791/2a96cd2f-affb-4817-acc6-a9286593e0ab.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On March 25, 2009, The U.S. Department of Justice (DOJ), on behalf of the Federal Trade Commission (FTC), <a target="_blank" href="http://www.ftc.gov/sites/default/files/documents/cases/2009/03/090325echostarcmpt.pdf">filed suit</a> against Dish Network in the U.S. District Court for the Central District of Illinois for telemarketing violations. In its suit, the DOJ was joined by California, Illinois, Ohio, and North Carolina.</p>
<p>On December 12, 2014, the court found Dish Network liable for over 50 million calls that violated the FTC’s Telemarketing Sales Rule (TSR). <em>See</em> <a target="_blank" href="http://www.law.cornell.edu/cfr/text/16/part-310">16 C.F.R. 310</a>. The court found Dish Network violated Do-Not-Call, entity-specific, and abandoned-call rules – along with various violations of state laws. The court made this decision in a partial summary judgment in favor of the FTC. <a target="_blank" href="http://www.ftc.gov/system/files/documents/cases/150121dishnetworkopinion-1.pdf"><em>U.S. v. Dish Network, LLC</em>, No. 09-3073, slip op. (C.D. Ill. Dec. 12, 2014)</a>.</p>
<p>Summary judgement is appropriate when “the movant shows that <em>there is no genuine dispute as to any material fact</em>. . .” <a target="_blank" href="http://www.law.cornell.edu/rules/frcp/rule_56#rule_56_a">Fed. R. Civ. P. 56(a)</a> (emphasis added). Here, the court found the DOJ sufficiently showed there were no disputes as to any material fact because Dish Network “failed to dispute with any evidence” the DOJ’s allegations. <em>U.S. v. Dish Network, LLC</em>, No. 09-3073, slip op. at <a target="_blank" href="http://www.ftc.gov/system/files/documents/cases/150121dishnetworkopinion-1.pdf">4</a>. Therefore, summary judgment against Dish Network was appropriate.</p>
<p>However, the court did leave questions for trial. Particularly, the court reserved the determination of penalties for trial. <em>Id.</em> at <a target="_blank" href="http://www.ftc.gov/system/files/documents/cases/150121dishnetworkopinion-1.pdf">4</a>. Penalties for violating the TSR can be up to $16,000 for each instance. <a target="_blank" href="https://www.federalregister.gov/articles/2009/01/09/E9-210/federal-civil-penalties-inflation-adjustment-act">Federal Civil Penalties Inflation Adjustment Act, 74 Fed. Reg. 857 (Jan. 9, 2009)</a> (amending <a target="_blank" href="http://www.law.cornell.edu/uscode/text/15/45#m_1_A">15 U.S.C. 45(m)(1)(A)</a>).</p>
]]></content:encoded></item><item><title><![CDATA[Can accessing a publicly available web page land you in prison under the CFAA?]]></title><description><![CDATA[The Computer Fraud and Abuse Act (CFAA) (See 18 U.S.C. § 1030) is a law that generally prohibits intentionally accessing a computer, without authorization, and obtaining information from a protected computer. Though Congress decided to leave interpre...]]></description><link>https://coreyvarma.com/can-accessing-a-publicly-available-web-page-land-you-in-prison-under-the-cfaa</link><guid isPermaLink="true">https://coreyvarma.com/can-accessing-a-publicly-available-web-page-land-you-in-prison-under-the-cfaa</guid><category><![CDATA[CyberLawyer]]></category><category><![CDATA[information security]]></category><category><![CDATA[privacy]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Wed, 21 Jan 2015 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737321362087/7fa76e0b-6f70-4d00-8094-660d05b9b685.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The <a target="_blank" href="https://coreyvarma.hashnode.dev/what-is-the-computer-fraud-and-abuse-act-cfaa">Computer Fraud and Abuse Act</a> (CFAA) (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030">18 U.S.C. § 1030</a>) is a law that generally prohibits intentionally accessing a computer, <em>without authorization</em>, and obtaining information from a protected computer. Though Congress decided to leave interpretation of “without authorization” to the courts. This causes some uncertainty in analyzing whether certain online behavior might be illegal – especially when the computer that is accessed is a publicly accessible computer. This leads us to <a target="_blank" href="http://scholar.google.com/scholar_case?case=13693917825781785020&amp;hl=en&amp;as_sdt=400006"><em>United States v. Auernheimer</em></a><em>.</em> </p>
<p>Auernheimer and his friend Spitler discovered a publicly accessible page on AT&amp;T’s website that displayed subscriber email addresses when prompted with a unique ICC ID serial number. This page was available to anyone that had the URL (which, as of 1/21/2015, is still publicly available at: <a target="_blank" href="https://dcp2.att.com/OEPNDClient/openPage?ICCID=">https://dcp2.att.com/OEPNDClient/openPage?ICCID=</a>). Auernheimer and Spitler realized that these unique ICC ID serial numbers followed a predictable pattern. The pair wrote a script that could gather email addresses by feeding the page with these predictable ICC ID serial numbers. In all, they ended up collecting around 114,000 different email addresses.</p>
<p>At trial in <em>United States v. Auernheimer</em> the key issue was determining the meaning of “without authorization” under the CFAA. And, more importantly, whether Auernheimer (Spitler accepted a plea deal and never went to trial) intentionally accessed AT&amp;T’s web servers without authorization.</p>
<p>The government argued that Auernheimer accessed AT&amp;T’s web servers “without authorization” because AT&amp;T did not design nor intend the page to be publicly available. And Auernheimer argued the page was publicly available which, by default, should grant him authorization to access the page.</p>
<p>The District Court looked to the 6th Circuit’s decision in <em>Pulte Homes</em> to help determine what “without authorization” means:</p>
<blockquote>
<p><em>Congress left the interpretation of “without authorization” to the courts, we again start with ordinary usage. The plain meaning of “authorization” is “[t]he conferment of legality; … sanction.” Commonly understood, then, a defendant who accesses a computer “without authorization” does so without sanction or permission.</em></p>
</blockquote>
<p><a target="_blank" href="http://scholar.google.com/scholar_case?case=17290635928700175894&amp;hl=en&amp;as_sdt=400006#p303"><em>Pulte Homes, Inc. v. Laborers’ International Union Of North America</em>, 648 F.3d 295, 303-04 (6th Cir. 2011)</a>.</p>
<p>In convicting Auernheimer, The District Court reasons that Auernheimer accessed AT&amp;T’s website without permission – and therefore without authorization. However, the Court mysteriously fails to convincingly identify where Auernheimer lost the permission to access a publicly available website.</p>
<p>Fortunately for Auernheimer, the 3rd Circuit overturned the conviction on appeal. Unfortunately though, the 3rd Circuit opted to forego answering the salient question of “what does ‘without authorization’ mean?” Instead, the 3rd Circuit issued an opinion vacating Auernheimer’s conviction on the basis that venue in New Jersey was improper. <a target="_blank" href="http://scholar.google.com/scholar_case?case=13693917825781785020&amp;hl=en&amp;as_sdt=2006"><em>United States v. Auernheimer</em>, 748 F. 3d 525 (3rd Cir. 2014)</a>.</p>
<p>Though the 3rd Circuit did not address the substantive question of the legality of Auernheimer’s use of a script to access the AT&amp;T page, they appeared skeptical of the original conviction. The 3rd Circuit noted that “no evidence was advanced at trial that the [script] ever breached any password gate or other code-based barrier. The [script] simply accessed the publicly facing portion of the login screen and scraped information that AT&amp;T unintentionally published.” <a target="_blank" href="http://scholar.google.com/scholar_case?case=13693917825781785020&amp;hl=en&amp;as_sdt=2006#[5]"><em>Auernheimer</em>, 748 F. 3d at 534 n.5</a>.</p>
<p>So the answer appears to be, based on the footnote in the 3rd Circuit’s opinion in <em>Auernheimer,</em> if you are not breaching a password gate or other code-based barrier, you can not be convicted of accessing a publicly available page “without authorization.”</p>
]]></content:encoded></item><item><title><![CDATA[What is the Computer Fraud and Abuse Act (CFAA)?]]></title><description><![CDATA[The Computer Fraud and Abuse Act (CFAA) (See 18 U.S.C. § 1030) is a law that, generally, prohibits intentionally accessing a computer, without authorization (or exceeding authorized access), and obtaining information from a protected computer.
Breadt...]]></description><link>https://coreyvarma.com/what-is-the-computer-fraud-and-abuse-act-cfaa</link><guid isPermaLink="true">https://coreyvarma.com/what-is-the-computer-fraud-and-abuse-act-cfaa</guid><category><![CDATA[Cyberlaw ]]></category><category><![CDATA[privacy]]></category><category><![CDATA[hacking]]></category><dc:creator><![CDATA[Corey Varma]]></dc:creator><pubDate>Sat, 03 Jan 2015 18:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737321204095/2711c3c3-3c4d-4584-8a4c-7bfa293602a9.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Computer Fraud and Abuse Act (CFAA) (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030">18 U.S.C. § 1030</a>) is a law that, generally, prohibits intentionally accessing a computer, without authorization (or exceeding authorized access), and obtaining information from a protected computer.</p>
<h3 id="heading-breadth">Breadth</h3>
<p>Because of the manner it was written and interpreted, the CFAA governs much of our regular online activity. As summarized above, the CFAA prohibits intentional access of a computer “without authorization” or “exceeding authorized access” to obtain information from a “protected computer.” Each of these elements allows from the courts sweeping discretion in applying the CFAA.</p>
<h4 id="heading-without-authorization">Without Authorization</h4>
<p>The first type of CFAA breach stems from intentionally accessing a protected computer “without authorization”.</p>
<p>“Congress did not define the phrase ‘without authorization,’ perhaps assuming that the words speak for themselves. The meaning, however, has proven to be elusive.” <em>EF Cultural Travel BV v. Explorica</em>, 274 F.3d 577, <a target="_blank" href="http://scholar.google.com/scholar_case?case=2683575157740054983&amp;q=274+F.3d+577&amp;hl=en&amp;as_sdt=2006#[10]">582 n.10</a> (1st Cir. 2001).</p>
<p>This elusive nature of “without authorization” led the lower court in <em>EF Cultural Travel BV</em> to apply a vague “reasonable expectation” standard. The reasonable expectation standard defines access without authorization as access that is not “in line with the reasonable expectations” of the website owner and its users.</p>
<p>Other courts look to “intended function” to determine whether access was authorized. <em>United States v. Morris</em>, 928 F.2d 504, <a target="_blank" href="http://scholar.google.com/scholar_case?case=551386241451639668&amp;q=928+F.2d+504&amp;hl=en&amp;as_sdt=2006#p510">510</a> (2d Cir. 1991). This approach mysteriously allows for a subjective analysis of a website’s intended function.</p>
<p>Perhaps the most sensible approach is found in <em>LVRC Holdings LLC v. Brekka</em>. The 9th Circuit held “that a person uses a computer ‘without authorization’ under [the CFAA] when the person has not received permission to use the computer for any purpose (such as when a hacker accesses someone’s computer without any permission), or when the employer has rescinded permission to access the computer and the defendant uses the computer anyway.” <em>LVRC Holdings LLC v. Brekka</em>, 581 F.3d 1127, <a target="_blank" href="http://scholar.google.com/scholar_case?case=3712527331075916393&amp;q=581+F.3d+1127&amp;hl=en&amp;as_sdt=2006#p1135">1135</a> (9th Cir. 2009).</p>
<h4 id="heading-exceeding-authorized-access">Exceeding Authorized Access</h4>
<p>The second type of CFAA breach arises when access to a protected computer “exceeds authorized access”.</p>
<p>Congress rather generously defines the term “exceeds authorized access” as “access[ing] a computer with authorization and . . . us[ing] such access to obtain or alter information in the computer that the accesser is not entitled . . . to obtain or alter.” <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#e_6">18 U.S.C. § 1030(e)(6)</a>.</p>
<p>These issues typically arise in the context of employer-employee relationships. In <em>EF Cultural Travel BV</em>, the Defendant, a former employee of the Plaintiff, was found to have exceeded his authorized access to the Plaintiff’s website by using his proprietary knowledge of the Plaintiff’s website (protected by a “broad confidentiality agreement prohibiting . . . disclosure of any information ‘which might reasonably be construed to be contrary to the interests of [the Plaintiff]'”) to assist in the development of a “web scraper” that made “wholesale use” of the Plaintiff’s information. <em>EF Cultural Travel BV</em>, 274 F.3d 577 at <a target="_blank" href="http://scholar.google.com/scholar_case?case=2683575157740054983&amp;q=274+F.3d+577&amp;hl=en&amp;as_sdt=2006#p583">583</a>.</p>
<h4 id="heading-protected-computer">Protected computer</h4>
<p>A protected computer is a computer used by a financial institution, or the U.S. Government, or more importantly, a computer affecting interstate commerce or communication. Because a protected computer is a computer affecting interstate communication, people using ordinary internet connected personal computers (and mobile devices) can been subjected to prosecution under the CFAA due to the inherent interstate nature of normal internet communication.</p>
<p>In <em>US v. Trotter,</em> the Defendant argued that his former employer’s computer network was not a “protected computer” as set forth in <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#e_2_B">18 U.S.C. § 1030(e)(2)(B)</a>. The 8th Circuit rejected this claim and affirmed the Defendant’s conviction because the Defendant admitted, at a plea hearing, that his former employer’s network was connected to the internet. The Court used this admission to determine the computer network met the statutory definition of a “protected computer.” <em>US v. Trotter</em>, 478 F.3d 918, <a target="_blank" href="http://scholar.google.com/scholar_case?case=17901114336781965618&amp;q=US+v.+Trotter,+478+F.3d+918,+921+\(8th+Cir.+2007\)&amp;hl=en&amp;as_sdt=2006#p921">921</a> (8th Cir. 2007); see also <em>United States v. Walters</em>, No. 05-15739, <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/01/005-15739-US-v-WALTERS-11CIR-20061.pdf">2</a> (11th Cir. 2006) (“the internet is an instrumentality of interstate commerce”).</p>
<p>Whereas in <em>United States v. Kane</em> the Court determined that exploiting a software bug in a video poker machine does not constitute a CFAA breach because the video poker machine was not connected to the internet. Therefore, it did not qualify as a “protected computer” affecting interstate commerce or communication. Report &amp; Recommendation of United States Magistrate Judge at <a target="_blank" href="http://www.coreyvarma.com/wp-content/uploads/2015/01/D.-Nev.-11-cr-00022-dckt-000086_000-filed-2012-10-15.pdf">6</a>, <em>United States v. Kane</em>, No. 2:11-cr-00022-MMD-GWF (D. Nev. Oct. 15, 2012). Though, the video poker machine was likely a “computer” under the definition of the CFAA (see <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#e_1">18 U.S.C. § 1030(e)(1)</a>), it was not a “protected computer.”</p>
<h3 id="heading-specific-criminal-conduct">Specific Criminal Conduct</h3>
<p>While the CFAA is written broadly, it also includes provisions prohibiting specific types of conduct such as:</p>
<ul>
<li><p>Computer espionage (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_1">18 U.S.C. § 1030(a)(1)</a>)</p>
</li>
<li><p>Computer trespassing in private or public computers (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_2">18 U.S.C. § 1030(a)(2)-(3)</a>)</p>
</li>
<li><p>Committing fraud with computer (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_4">18 U.S.C. § 1030(a)(4)</a>)</p>
</li>
<li><p>Distribution of malicious code (i.e. malware, spyware, and including DDOS attacks) (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_5">18 U.S.C. § 1030(a)(5)</a>)</p>
</li>
<li><p>Trafficking in passwords (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_6">18 U.S.C. § 1030(a)(6)</a>)</p>
</li>
<li><p>Threats to damage a protected computer (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#a_7">18 U.S.C. § 1030(a)(7)</a>)</p>
</li>
<li><p>And conspiracy or attempt to violate any of the specific criminal conduct in Sections (a)(1)-(7) (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#b">18 U.S.C. § 1030(b)</a>)</p>
</li>
</ul>
<h3 id="heading-civil-liability">Civil Liability</h3>
<p>The CFAA is mainly a criminal statute (evidenced by its location in Title 18 of the U.S. Code). However, it also includes a civil cause of action (See <a target="_blank" href="http://www.law.cornell.edu/uscode/text/18/1030#g">18 U.S.C. § 1030(g)</a>) that permits compensatory damages, injunctive and other equitable relief for any specific conduct described in 18 U.S.C. § 1030(a)-(b) if the conduct caused:</p>
<ul>
<li><p>Loss of at least $5,000 in value</p>
</li>
<li><p>Impairment, or potential impairment, of the medical examination, diagnosis, treatment, or care to one or more persons</p>
</li>
<li><p>Physical injury to any person</p>
</li>
<li><p>A threat to public health or safety</p>
</li>
<li><p>Damage affecting a computer used by or for an entity of the U.S. Government</p>
</li>
<li><p>Damage affecting 10 or more protected computers during any 1-year period</p>
</li>
</ul>
<p>Civil liability, under the CFAA, is subject to a 2-year statute of limitations.</p>
]]></content:encoded></item></channel></rss>