Hacking into the Computer Fraud and Abuse Act: The CFAA at 30
Senator Sheldon Whitehouse
84 Geo. Wash. L. Rev. 1437
Abstract | PDF
A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act
Patricia L. Bellia
84 Geo. Wash. L. Rev. 1442
Abstract | PDF
A Trespass Framework for the Crime of Hacking
Josh Goldfoot & Aditya Bamzai
84 Geo. Wash. L. Rev. 1477
Abstract | PDF
Consenting to Computer Use
James Grimmelmann
84 Geo. Wash. L. Rev. 1500
Abstract | PDF
The Ninth Circuit’s Deficient Examination of the Legislative History of the Computer Fraud and Abuse Act in United States v. Nosal
William A. Hall, Jr.
84 Geo. Wash. L. Rev. 1523
Abstract | PDF
Trespass, Not Fraud: The Need for New Sentencing Guidelines in CFAA Cases
Orin S. Kerr
84 Geo. Wash. L. Rev. 1544
Abstract | PDF
Measuring Computer Use Norms
Matthew B. Kugler
84 Geo. Wash. L. Rev. 1568
Abstract | PDF
A Proposed Amendment to 18 U.S.C. § 1030—The Problem of Employee Theft
Michael L. Levy
84 Geo. Wash. L. Rev. 1591
Abstract | PDF
Authority and Authors and Codes
Michael J. Madison
84 Geo. Wash. L. Rev. 1616
Abstract | PDF
The “Narrow” Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal
Jonathan Mayer
84 Geo. Wash. L. Rev. 1644
Abstract | PDF
Regulating Software When Everything Has Software
Paul Ohm and Blake Reid
83 Geo. Wash. L. Rev. 1672
Abstract | PDF
The Failure of the Computer Fraud and Abuse Act: Time to Take an Administrative Approach to Regulating Computer Crime
Ric Simmons
83 Geo. Wash. L. Rev. 1703
Abstract | PDF
SaveSave