30.04.2015 Views

Probate & Trust Law Section Conference Manual ... - Minnesota CLE

Probate & Trust Law Section Conference Manual ... - Minnesota CLE

Probate & Trust Law Section Conference Manual ... - Minnesota CLE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

iii. Minn. Stat. § 609.891: Unauthorized computer access. A person is guilty<br />

of unauthorized computer access if the person intentionally and without<br />

authorization attempts to or does penetrate a computer security system and<br />

may be subject to felony penalties of imprisonment for up to ten years or<br />

to payment of a fine of not more than $20,000, or both.<br />

f. 18 USC §1030. The Computer Fraud and Abuse Act. Criminalizes intentional<br />

access of a computer without authorization or exceeding authorization and<br />

thereby obtaining financial data or information from a protected (e.g., private)<br />

computer.<br />

i. The U.S. Department of Justice has stated that violating a term of service<br />

on Facebook or Match.com is a federal crime under the CFAA, however it<br />

is not their intention to prosecute such “minor” violations. U.S. v. Nosal,<br />

No. 10-10038, D.C. No. 3:08-cr-00237 (9 th Cir. April 10, 2012); see also,<br />

testimony presented by DOJ on 11-15-11 before Subcommittee of U.S.<br />

House Judiciary Committee.<br />

ii. For example, the DOJ prosecuted a mom under the CFAA who posed as a<br />

17–year–old and cyber–bullied her daughter’s classmate, which<br />

MySpace’s terms of service prohibiting lying about identifying<br />

information, including age. U.S. v. Drew, 259 F.R.D. 449 (C.D. Cal.<br />

2009).<br />

iii. Many courts have interpreted the CFAA narrowly so that the crime<br />

“exceeds authorized access” is limited to violations of restrictions<br />

on access to information, and not restrictions on its use (i.e.<br />

misappropriation). See e.g., Nosal, i.d; LVRC Holdings LLC v. Brekka,<br />

581 F.3d 1127 (9 th Cir. 2009); Shamrock Foods Co. v. Gast, 535 F. Supp.<br />

2d 962 (D. Ariz. 2008); Orbit One Commc’ns, Inc. v. Numerex Corp., 692<br />

F. Supp. 2d 373 (S.D.N.Y. 2010); Diamond Power Int’l Inc. v. Davidson,<br />

540 F. Supp. 2d 1322 (N.D. Ga. 2007); Int’l Ass’n of Machinists &<br />

Aerospace Workers v. Werner-Masuda, 390 F. Supp. 2d 479 (D. Md.<br />

2005).<br />

iv. However, the DOJ did have at least one “success”– the 11 th Circuit has<br />

held that it is a federal crime under the for an SSA employee to access<br />

social security records of 17 people for no business reason.<br />

U.S. v. Rodriguez, 2010 WL 5253231 (11th Cir. Dec. 27, 2010).<br />

v. Under either of these evolving standards, a fiduciary does not have<br />

authorized access (no matter the use or purpose) if the terms of service of<br />

the applicable digital asset provider prohibit it.<br />

g. 18 USC Chapter 121. The Stored Wire and Electronic Communications and<br />

Transactional Records Access Act (the “SWA”). Contains provisions regarding (i)<br />

unlawful access to a stored communication, (ii) privacy of customer<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!