Packets is production of the Stanford Center for Internet & Society (CIS). It is written by members of the Stanford Law and Technology Association (SLATA), and edited by CIS staff, fellows and volunteer attorneys.
Our purpose is to provide the legal community with a concise description of recently decided cyberlaw-related cases, and where possible, to point to the original decisions. We urge you to forward Packets wherever you please, and to take from it any content you would like.
The writers on the Packets Editorial Board are: Sarah Craven, Elisabeth Derby, Shannon Kenealy, Julia Kripke, Leslie Liang, Charlin Lu, Scott Noveck, Lillian Pan, and Olga Shishkova.
Packets are online at: http://cyberlaw.stanford.edu/packets
Applying “Expected Norms of Intended Use,” Court Upholds Conviction for Accessing Protected Computer Without Authorization
Phillips raised several challenges to his conviction under the Computer Fraud and Abuse Act for intentionally accessing a protected computer without authorization. The Fifth Circuit, holding that questions of “authorization” should be understood with reference to “expected norms of intended use,” rejected these challenges and upheld Phillips’ conviction.
United States v. Cristopher Andrew Phillips, No. 05-51271 (5th Cir. Jan. 24, 2007).
Hernandez v. Hillsides, Inc., 48 Cal.Rptr.3d 780 (Cal.App. 2 Dist. 2006), cert. granted, 53 Cal.Rptr.3d 801 (Cal. 2007).
Blue Nile, Inc. v. Ice.Com, Inc., No. C06-1002RSL (W.D. Wash. 2007).
Doe v. MySpace, Inc., No. A-06-CA-983-SS (W.D. Tex. 2007).
FC Investment Group v. IFX Markets, Ltd, No. 04-1939 (PLF), 2007 WL 325355 (D.D.C. Feb. 6, 2007)
Brilliance Audio, Inc. v. Haights Cross Communications, Inc., WL 188103 (6th Cir. Jan. 26, 2007). .