Innovation or Exploitation? (Audio)

Download audio from iTunes or download mp3 directly from CIS.
Watch video from the Innovation or Exploitation talk.

 

Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer.

This event aimed to provide a geek perspective on the CFAA. Leading researchers, tinkerers, and entrepreneurs explained the broad reach of computer trespass law and their first-hand experience with its chilling effects. All agree that serious intrusions warrant a remedy. But how can the law better distinguish between innovation and exploitation?
 
Speakers:
Ed Felten, Princeton University
Jennifer Granick, Stanford University
Brewster Kahle, Internet Archive
Jonathan Mayer, Stanford University
Alex Stamos, Artemis Internet
Dan Auerbach, Electronic Frontier Foundation

 

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd> <p> <br> <img><u><strike><sup>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Once you hit Save, your comment will be held for moderation before being published. You will not see a confirmation message once you hit the Save button but please be assured your comment has been submitted and we will review it.