As technology continues to evolve, the courts are being asked to apply existing laws to the new technology. In some cases, the answer is fairly straightforward, but in other cases it is more complicated and can yield varying outcomes based on how each court understands the technology and the legislators’ intent in passing the law. The presentation addressed cases over the past year in three main areas: (1) “unauthorized access” under the Computer Fraud and Abuse Act (CFAA), (2) encryption, and (3) searches and seizures generally.
Host a Webinar with CSIAC
Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?
Want to find out more about this topic?
Request a FREE Technical Inquiry!