{"id":1306,"date":"2019-08-22T18:12:36","date_gmt":"2019-08-22T18:12:36","guid":{"rendered":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/"},"modified":"2019-08-22T18:12:36","modified_gmt":"2019-08-22T18:12:36","slug":"what-to-know-employees-and-computer-fraud-in-the-workplace","status":"publish","type":"post","link":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/","title":{"rendered":"What to Know: Employees and Computer Fraud in the Workplace"},"content":{"rendered":"

When an employer discovers that a departing employee has misappropriated information using a computer, there may be a remedy under the Computer Fraud and Abuse Act (CFAA). In many cases, employees who misappropriate information using a computer expose themselves to potential civil and criminal liability under the CFAA<\/a>.<\/p>\n

The Computer Fraud and Abuse Act
<\/u><\/strong>The Computer Fraud and Abuse Act gives employers a civil cause of action against an employee who \u201cintentionally accesses a computer without authorization or exceeds authorized access\u201d and obtains or misuses certain information obtained from the computer.\u00a0 18 U.S.C. \u00a7 1030.\u00a0 While the CFAA defines the phrase \u201cexceeds authorized access,\u201d it does not define \u201cwith authorization\u201d or \u201cwithout authorization.\u201d\u00a0 These terms have been interpreted differently by the various circuits, causing the
reach<\/a> of the CFAA to vary by jurisdiction.<\/p>\n

Some federal Circuit Courts of Appeal construe the Computer Fraud and Abuse Act narrowly, holding that an employer must show that the employee had specifically<\/em> exceeded express limitations on access.\u00a0 Other circuits construe the CFAA more expansively, holding that an employee\u2019s authority to access information automatically terminates when the employee forms the intent to leave his employer and is therefore no longer a \u201cloyal\u201d agent.\u00a0<\/p>\n

In United States v. Rodriguez<\/em><\/a>, <\/em>628 F.3d 1258 (11th<\/sup> Cir. 2010), the 11th<\/sup> Circuit aligned with the narrower approach, albeit in a manner that still results in a fairly broad interpretation of the CFAA.\u00a0 In Rodriguez<\/em>, a TeleService representative of the Social Security Administration (SSA), was prosecuted under the CFAA for accessing personal records of 17 different individuals for non-business reasons.\u00a0 The defendant challenged his conviction, arguing that because he accessed only databases that he was authorized to use, he did not violate the statute.\u00a0 The Eleventh Circuit rejected his argument, noting the SSA had a policy which stated that employees may only access personal information in the course of assisting individuals with questions concerning their social security.\u00a0 Therefore, the defendant violated the CFAA by exceeding his authority to access the government computer by obtaining personal information for a nonbusiness reason.\u00a0<\/p>\n

The Eleventh Circuit had occasion to review its stance on the CFAA recently in Maye v. United States, <\/em>2019 WL 1858211 (April 25, 2019).\u00a0 In Maye<\/em>, the defendant accessed the National Crime Information Center federal database to research and obtain information about his co-defendant\u2019s lovers.\u00a0 Not surprisingly, he was only authorized to access this database for law enforcement purposes, and he had been trained accordingly.\u00a0 Because he was not authorized to access the database for this purpose, he was found to have violated the CFAA.\u00a0\u00a0<\/p>\n

Maye\u2019s habeas corpus<\/a><\/em> challenges following his conviction were unsuccessful.\u00a0 After he had completed his period of incarceration, Maye filed another petition challenging his conviction.\u00a0 This time he argued that the underlying indictment did not state a claim for a violation of the CFAA. \u00a0The district court rejected his argument, and he appealed to the 11th<\/sup> Circuit.\u00a0<\/p>\n

The 11th<\/sup> Circuit found that Maye\u2019s petition was foreclosed by U.S.<\/em> v. Rodriguez.<\/em>\u00a0 Under the \u201cprior precedent rule\u201d, because the Rodriguez <\/em>court was the first panel to interpret the definition of \u201cexceeds authorized access\u201d under the CFAA, all subsequent panels of the 11th<\/sup> Circuit are bound by Rodriguez <\/em>unless the first panel\u2019s holding is overruled by the 11th<\/sup> Circuit sitting en banc<\/em> or by the Supreme Court.\u00a0 Applying Rodriguez<\/em>, the 11th<\/sup> Circuit concluded that the indictment plainly stated a Computer Fraud and Abuse Act claim and that Maye was therefore not entitled to relief from his conviction.<\/p>\n

While, like Rodriguez<\/em>, Maye<\/em> does not involve a departing employee that misappropriated information, the case is still a good reminder that, particularly within the 11th<\/sup> Circuit, when an employer discovers that a departing employee has misappropriated information using a computer, there may be a remedy under the CFAA.<\/p>\n","protected":false},"excerpt":{"rendered":"

When an employer discovers that a departing employee has misappropriated information using a computer, there may be a remedy under the Computer Fraud and Abuse Act (CFAA). In many cases, employees who misappropriate information using a computer expose themselves to potential civil and criminal liability under the CFAA. The Computer Fraud and Abuse ActThe Computer […]<\/p>\n","protected":false},"author":5,"featured_media":1307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_mo_disable_npp":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4,9],"tags":[],"acf":[],"yoast_head":"\nWhat to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.\" \/>\n<meta property=\"og:description\" content=\"When an employer discovers that a departing employee has misappropriated information using a computer, there may be a remedy under the Computer Fraud and Abuse Act (CFAA). In many cases, employees who misappropriate information using a computer expose themselves to potential civil and criminal liability under the CFAA. The Computer Fraud and Abuse ActThe Computer […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/\" \/>\n<meta property=\"og:site_name\" content=\"Berman Fink Van Horn P.C.\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-22T18:12:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Berman Fink Van Horn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Berman Fink Van Horn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/\",\"url\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/\",\"name\":\"What to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.\",\"isPartOf\":{\"@id\":\"https:\/\/www.bfvlaw.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg\",\"datePublished\":\"2019-08-22T18:12:36+00:00\",\"dateModified\":\"2019-08-22T18:12:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.bfvlaw.com\/#\/schema\/person\/0d284d556606ade11404fcbd125efdb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage\",\"url\":\"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg\",\"contentUrl\":\"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg\",\"width\":1000,\"height\":668,\"caption\":\"computer fraud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bfvlaw.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Know: Employees and Computer Fraud in the Workplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bfvlaw.com\/#website\",\"url\":\"https:\/\/www.bfvlaw.com\/\",\"name\":\"Berman Fink Van Horn P.C.\",\"description\":\"A Business Law Firm In Atlanta\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bfvlaw.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bfvlaw.com\/#\/schema\/person\/0d284d556606ade11404fcbd125efdb9\",\"name\":\"Berman Fink Van Horn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bfvlaw.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/deb7805c35c49d2de3c1f64d329a518a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/deb7805c35c49d2de3c1f64d329a518a?s=96&d=mm&r=g\",\"caption\":\"Berman Fink Van Horn\"},\"url\":\"https:\/\/www.bfvlaw.com\/author\/bfv\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/","og_locale":"en_US","og_type":"article","og_title":"What to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.","og_description":"When an employer discovers that a departing employee has misappropriated information using a computer, there may be a remedy under the Computer Fraud and Abuse Act (CFAA). In many cases, employees who misappropriate information using a computer expose themselves to potential civil and criminal liability under the CFAA. The Computer Fraud and Abuse ActThe Computer […]","og_url":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/","og_site_name":"Berman Fink Van Horn P.C.","article_published_time":"2019-08-22T18:12:36+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg","type":"image\/jpeg"}],"author":"Berman Fink Van Horn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Berman Fink Van Horn","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/","url":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/","name":"What to Know: Employees and Computer Fraud in the Workplace - Berman Fink Van Horn P.C.","isPartOf":{"@id":"https:\/\/www.bfvlaw.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage"},"image":{"@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg","datePublished":"2019-08-22T18:12:36+00:00","dateModified":"2019-08-22T18:12:36+00:00","author":{"@id":"https:\/\/www.bfvlaw.com\/#\/schema\/person\/0d284d556606ade11404fcbd125efdb9"},"breadcrumb":{"@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#primaryimage","url":"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg","contentUrl":"https:\/\/www.bfvlaw.com\/wp-content\/uploads\/2022\/06\/computer-fraud.jpg","width":1000,"height":668,"caption":"computer fraud"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bfvlaw.com\/what-to-know-employees-and-computer-fraud-in-the-workplace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bfvlaw.com\/"},{"@type":"ListItem","position":2,"name":"What to Know: Employees and Computer Fraud in the Workplace"}]},{"@type":"WebSite","@id":"https:\/\/www.bfvlaw.com\/#website","url":"https:\/\/www.bfvlaw.com\/","name":"Berman Fink Van Horn P.C.","description":"A Business Law Firm In Atlanta","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bfvlaw.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.bfvlaw.com\/#\/schema\/person\/0d284d556606ade11404fcbd125efdb9","name":"Berman Fink Van Horn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bfvlaw.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/deb7805c35c49d2de3c1f64d329a518a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/deb7805c35c49d2de3c1f64d329a518a?s=96&d=mm&r=g","caption":"Berman Fink Van Horn"},"url":"https:\/\/www.bfvlaw.com\/author\/bfv\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/posts\/1306"}],"collection":[{"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/comments?post=1306"}],"version-history":[{"count":0,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/posts\/1306\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/media\/1307"}],"wp:attachment":[{"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/media?parent=1306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/categories?post=1306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bfvlaw.com\/wp-json\/wp\/v2\/tags?post=1306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}