The U.S. Federal Government passed the Computer Fraud and Abuse Act (18 U.S.C.§1030) (CFAA) in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, which included the first federal computer crime statute.
Since enacting the CFAA, congress and the federal government have amended the act multiple times to extend its reach and impose criminal and civil liability on additional malicious computer activities. These amendments have been the topic of several prominent lawsuits and one traumatic suicide, forever shrouding the CFAA in controversy.
Today, the CFAA is the leading federal law that protects digital information from unauthorized access. The law governs every computer connected to the internet and non-network computers used by the federal government or financial institutions.
Below, this comprehensive guide will list the activities the CFAA criminalizes, outline the protections it offers organizations, and discuss the outcomes of several notable supreme court cases.
Learn how UpGuard helps organizations protect their sensitive information>
When the federal government first enacted the CFAA, the act primarily criminalized the intentional use of a protected computer without authorized access.
However, over the years, through amendments and several supreme court case rulings, the CFAA’s scope has been manipulated to criminalize all of the following activities:
It’s important to note that the CFAA only covers activities committed to a protected computer. The CFAA defines “protected computers” to mean any computer:
In 2008, Congress expanded the definition of “protected computers” to include any computer used in or affecting interstate or foreign commerce. This section of the “protected computer” definition is now the widest reaching. The term “affecting” gives the CFAA regulatory control over many computer activities.
As previously stated, the CFAA governs the activities of any computer connected to the internet and non-network computers that the federal government uses. The term “computer” includes many types of high-speed data processing devices, including:
The CFAA explicitly states that it does not apply to automated typewriters, portable handheld calculators, or similar devices.
.jpeg)
In 2021, the CFAA’s definition of “exceeds authorized access” was further defined by the Van Buren v. United States Supreme Court case. The ruling of the case narrowed the protections the CFAA could offer and resolved a long-standing divide among the federal courts.
The CFAA defines “exceeds authorized access” as knowingly accessing a computer with authorization and using such access to obtain or alter information in the computer that the accessor is not permitted to obtain or alter.
The application of this definition contributed to a notable split in the federal circuit courts. The courts disagreed on whether this applied to individuals who misuse information obtained from a computer or digital database they were permitted to access.
In the case, the court annulled Van Buren’s conviction and ruled that the CFAA could not hold employees liable for misusing sensitive information they were permitted to access. This ruling was noteworthy because it narrowed how employers could use the CFAA as an enforcement tool.
Note: While employers cant use the CFAA to prosecute employees for misusing sensitive information they were permitted to access, employers can still prosecute employees for computer fraud, unlawful disclosure, computer extortion, etc.
The CFAA applies strict punishments to individuals found in violation of its statutes. The following list includes the provisions the CFAA covers and the maximum sentences first-time offenders will receive if found guilty:
Second-time offenders found in violation of the CFAA will face more severe penalties and longer sentences.
Plaintiffs must present CFAA actions to the courts within two years of either:
Note: When determining the limitation period, organizations should be aware that the two-year period starts after they become aware of the unauthorized access, even if they don’t know the perpetrator's identity (Sewell v. Bernardin).
While initially, the CFAA only protected government agencies and other organizations that operated protected computers, various employers have since used the act to prosecute negligent employees or ones who committed cyber crimes against them (commonly in retaliation for being let go).
Since the CFAA has a record of being interpreted differently by various courts in the federal circuit, the exact reach of the law is somewhat unknown. Most organizations filing CFAA lawsuits use the act’s broad “protected computer” definition to prove the defendant’s actions affected interstate or foreign commerce.
Several organizations, such as Cisco and Reuters, have filed lawsuits against employees, arguing the employee’s actions qualify as a breach of the CFAA because they could reasonably cause further damage to many computer systems, including many defined as “protected computers.”
However, the Supreme Court’s ruling in Van Buren v. United States further limited how employers could use the CFAA to criminalize the actions of disgruntled or malicious employees.
Due to the varying interpretations of the CFAA and the law’s ambiguous nature, all employers should install other protections to safeguard their sensitive information.
To adequately protect their information and computer systems from hackers and employee misuse, organizations should use the following to create ample cause of action:
Data mapping involves correlating data fields from one database to another. Employers can utilize data mapping techniques to confirm where their sensitive data resides on their internal network.
Once an organization has identified where its sensitive data is stored, it can install data privacy controls to limit who has access to various categories of information.
Zero trust is a cybersecurity model that doesn’t implicitly trust anything inside or outside its system. This data protection approach requires authentication before providing access to sensitive information.
While giving all employees full data access may seem more manageable, it’s safer to consider what information employees need and establish access restrictions based on necessary information. Sensitive information should remain encrypted behind a multi-factor authentication system (MFA) where only employees with a legitimate business need can gain access.
Organizations constructing their security programs using zero-trust architecture can increase risk resilience and gain granular control over their internal resources.
The history of the CFAA can be confusing, given the federal government has amended that act on many occasions. The following timeline aims to provide a clear record of each amendment and its impact:
The CFAA has also been the topic of many court cases. A few of these cases have made it to the U.S. Supreme Court and had vast implications on the scope and enforcement of the CFAA. The most notable court cases involving the CFAA are:
While the CFAA imposes civil and criminal liability on negligent computer activities and aims to protect organizations against malicious intent, the law’s ambiguous nature can be troubling for organizations to navigate.
The best way for organizations to protect their sensitive information without worrying about the scope of the CFAA is by installing best practices into their cybersecurity program.
UpGuard Breach Risk can empower your organization to monitor its attack surface 24/7. By utilizing the product, your organization can mitigate and remediate internal and external attacks and gain access to: