Consenting to Computer Use
نویسنده
چکیده
The federal Computer Fraud and Abuse Act ("CFAA ") makes it a crime to "access[] a computer without authorization or exceed[] authorized access." Courts and commentators have struggled to explain what types of conduct by a computer user are "without authorization." But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows. In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen's taxonomy of consent, I argue that we should distinguish between the factual question of what uses a computer owner manifests her consent to and the legal question of what uses courts will deem her to have consented to. Doing so allows us to distinguish the different kinds of questions presented by different kinds of CFAA cases, and to give clearer and more precise answers to all of them. Some cases require careful fact-finding about what reasonable computer users in the defendant's position would have known about the owner's expressed intentions; other cases require frank policy judgments about which kinds of unwanted uses should be considered serious enough to trigger the CFAA.
منابع مشابه
Use of Computer and Internet in Agricultural Extension as perceived by Extension Workers
The purpose of this study was to determine computer and Internet use in agricultural extension by Extension Workers (EWs). This study used a descriptive-correlational design.Population for the study consisted of all extension workers (N= 320) in Isfahan Province, Iran. A stratified sampling technique and census was used to select EWs (n = 200). Overall, findings indicate that EWs have access to...
متن کاملUnwanted but consensual sexting among young adults: Relations with attachment and sexual motivations
A wide body of research has examined unwanted but consensual sex in a face-to-face context, focusing on intercourse, petting, kissing, and other sexual activity that people consent to even though they do not want to. Recent research has shown many people engage in sexual interactions via computer-mediated mediums; yet, to date, there are no studies that have investigated whether unwanted but co...
متن کاملComputer assisted instruction during quarantine and computer vision syndrome
Computer vision syndrome (CVS) is a set of visual, ocular, and musculoskeletal symptoms that result from long-term computer use. These symptoms include eyestrain, dry eyes, burning, pain, redness, blurred vision, etc, which increase with the duration of computer use. Currently, with the closure of schools and universities due to the continued COVID19 pandemic many universities have taken the pr...
متن کاملAssessing of Sleepiness, Insomnia and Sleep Quality among University Students: Association between Computer Use and Sleep Quality
Purpose: To investigate associations between computer use data and sleep quality among university students. Materials and Methods: This descriptive, cross-sectional study was performed on 312 students of Tehran University of Medical Sciences, Iran. Data was collected using Epworth Sleepiness Scale (ESS), Insomnia Severity Index (TSI), Pittsburgh Sleep Quality Index (PSQI), and a background...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملImproving consenting practise in ENT surgery – measures that lead to effective change
Methods Consenting standards were compiled from ENT UK / BAOHNS patient leaflets for tonsillectomy, grommet insertion, septoplasty, rigid oesophagoscopy, functional endoscopic sinus surgery (FESS) and mastoidectomy. Prospective analysis of complications documented on consent forms was performed (n = 56). Deficient areas were raised amongst the department and pre-prepared stickers were produced ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016