
Have you ever borrowed a smartphone without asking? Modified a URL? Scraped a website? Called an undocumented API? Congratulations: you might have violated federal law! A 1986 statute, the Computer Fraud and Abuse Act (CFAA), provides both civil and criminal remedies for mere "unauthorized" access to a computer.
This event aimed to provide a geek perspective on the CFAA. Leading researchers, tinkerers, and entrepreneurs explained the broad reach of computer trespass law and their first-hand experience with its chilling effects. All agree that serious intrusions warrant a remedy. But how can the law better distinguish between innovation and exploitation?Speakers:Ed Felten, Princeton UniversityJennifer Granick, Stanford UniversityBrewster Kahle, Internet ArchiveJonathan Mayer, Stanford UniversityAlex Stamos, Artemis InternetDan Auerbach, Electronic Frontier Foundation
Download audio from iTunes or download mp3 directly from CIS.
Watch video from the Innovation or Exploitation talk.