Volume 84, Number 6

Keynote

Hacking into the Computer Fraud and Abuse Act: The CFAA at 30
Senator Sheldon Whitehouse
84 Geo. Wash. L. Rev. 1437
Abstract | PDF

Articles

A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act
Patricia L. Bellia
84 Geo. Wash. L. Rev. 1442
Abstract | PDF


A Trespass Framework for the Crime of Hacking
Josh Goldfoot & Aditya Bamzai
84 Geo. Wash. L. Rev. 1477
Abstract | PDF


Consenting to Computer Use
James Grimmelmann
84 Geo. Wash. L. Rev. 1500
Abstract | PDF


The Ninth Circuit’s Deficient Examination of the Legislative History of the Computer Fraud and Abuse Act in United States v. Nosal
William A. Hall, Jr.
84 Geo. Wash. L. Rev. 1523
Abstract | PDF


Trespass, Not Fraud: The Need for New Sentencing Guidelines in CFAA Cases
Orin S. Kerr
84 Geo. Wash. L. Rev. 1544
Abstract | PDF


Measuring Computer Use Norms
Matthew B. Kugler
84 Geo. Wash. L. Rev. 1568
Abstract | PDF


A Proposed Amendment to 18 U.S.C. § 1030—The Problem of Employee Theft
Michael L. Levy
84 Geo. Wash. L. Rev. 1591
Abstract | PDF


Authority and Authors and Codes
Michael J. Madison
84 Geo. Wash. L. Rev. 1616
Abstract | PDF


The “Narrow” Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal
Jonathan Mayer
84 Geo. Wash. L. Rev. 1644
Abstract | PDF


Regulating Software When Everything Has Software
Paul Ohm and Blake Reid
83 Geo. Wash. L. Rev. 1672
Abstract | PDF


The Failure of the Computer Fraud and Abuse Act: Time to Take an Administrative Approach to Regulating Computer Crime
Ric Simmons
83 Geo. Wash. L. Rev. 1703
Abstract | PDF

SaveSave