杏十八新茶分享

 

United States v. Nosal

Summarized by:

  • Court: 9th Circuit Court of Appeals Archives
  • Area(s) of Law: Civil Law
  • Date Filed: 04-10-2012
  • Case #: 10-10038
  • Judge(s)/Court Below: Chief Judge Kozinski for the Court; Circuit Judges Pregerson, McKeown, Wardlaw, Gould, Paez, Clifton, Bybee, and Murguia; Circuit Judges Silverman and Tallman Dissenting

The Court held that 鈥渆xceeds authorized access鈥 in the Computer Fraud and Abuse Act 18 U.S.C. 搂 1030 鈥渋s limited to violations of restrictions on access to information, and not restrictions on its use.鈥

The government charged David Nosal with violating the Computer Fraud and Abuse Act (CFAA) under 18 U.S.C. 搂 1030(a)(4), 鈥渇or aiding and abetting the Korn/Ferry employees in 鈥渆xceed[ing their] authorized access鈥 with intent to defraud,鈥 when he left the firm and convinced some of its employees to log in to the company鈥檚 computers and send him confidential information. 鈥淣osal filed a motion to dismiss the CFAA counts, arguing that the statute targets only hackers, not individuals who access a computer with authorization but then misuse information they obtain by means of such access.鈥 When the district court rejected his argument, 鈥淣osal filed a motion for reconsideration and a second motion to dismiss.鈥 The district court reversed and 鈥渄ismissed counts 2 and 4-7 for failure to state an offense. The government appeal[ed].鈥 Nosal鈥檚 narrow interpretation of 鈥渨ithout authorization鈥 and 鈥渆xceeds authorized access鈥 鈥渕aintains the CFAA鈥檚 focus on hacking rather than turning it into a sweeping Internet-policing mandate.鈥 The Court considered that 鈥淐ongress obviously meant 鈥渆xceeds authorized access鈥 to have the same meaning throughout section 1030.鈥 The Court reasoned that 鈥渢he government鈥檚 proposed interpretation of the CFAA allows private parties to manipulate their computer-use and personnel policies so as to turn these relationships into ones policed by the criminal law鈥 and 鈥渂asing criminal liability on violations of private computer use polices can transform whole categories of otherwise innocuous behavior into federal crimes simply because a computer is involved.鈥 The Court held that 鈥渆xceeds authorized access鈥 鈥渋s limited to violations of restrictions on access to information, and not restrictions on its use鈥 and 鈥淸b]ecause Nosal鈥檚 accomplices had permission to access . . ., the government鈥檚 charges fail to meet the element [of the statute] . . .鈥 AFFIRMED.

Advanced Search


Back to Top