Question: For this discussion forum, select an update to Computer Intrusion Laws from 2009 to current. Discuss the act, provide us a link to the act
For this discussion forum, select an update to Computer Intrusion Laws from 2009 to current. Discuss the act, provide us a link to the act and why i. this type of . gislation important. For humpl , due to more c Der attacks. new cyber threats r. cassar updates to existing laws. Cop , zer intrusion and g be cri. c. II.vo.ving hacking electronic devices 1- on th. rise itin de ad ence...en di techn. logy. . audition w this advancement, the lowe and _wat_ e: regarding In revive cybe crimes are also being u, det. d the Computer -a_d and Abus- Act VI 198- or CI AA wa. established to 1.rb d, erpuerally gumming access on a cultputs- widiout pio" _razulu.issuon er outside of =sch-( fized access as a "e" In0. to the onginal federal :wouter fraud law NACDL, .. d.). A common issue with both acts is the extent and definition of exceeding authori ed access . he love questions in excera.ng access only means acce_:1ing file. nat sumerne did not have access to, or if it include: the misuse of & pro ed and authorized access (supreme coz i. uling Limits CI AA Reach 20cly. In a recent case in 2021, Van Bure.. v: U.ited States, former police sergeant Nathan Van Buren used his patrol car computer to access the law enforcement datal ase in exchange for money (Opinions on the Court - 2020 - Van Bure.. vs US, 2021). This is a violation of the police department policy which prohibits obtaining information from the dalat ase for no -law enforcement purposes. However, under the CFAA, he did not "exceed authorized access". According to the court opinion, CFAA only applies if he accessed information that he did not have approved authorization to access. Since Van Buren did have approval to access the law enforcement i formation, he did not violate the act interpretation of this act, among others, has been inconsistent for some time. 'n laci, the recent opinion released regarding Van Buren vs United States conflicts with the _leventh Federal Circuit's decision the an individual exceeds authorized ucress when that access is used to viclute any policy or terms of use (Fattah, 2021). This act has aided in detecting crimes such us the theft of debit and credit card information, as well as the sale of an cryanizations trade secrets from its own employees, bri ging individuals or groups with truly malicious intent to justice. Employers and organizations can sue former e.npl yee. who have stolen private or vital information with the intent to sell to competitor: or on the black market because of CFAA However, the (FAA needs to be updated to provide specificity and to resauve the possibility of manipulation and prosecutorial abuse. It is incredibly important that this computer intrusion law and all others remain relevant und up to date as technology continues to improve and advance. These laws protect all computer and internet users by controlling and eliminating harm and damage to people, information and data, systems and infrastructure. They project rights and provide guidelines and standards that define acceptable cyber behavior. If these law: and regulations are not consistently upheld and updates, loopholes such as the onc former Sergeant Van Buren. used will continue to occur, increase, and worsen, especially us technology becomes mor: advanced and couple . The Computer Fraud and Abuse Act is far from perfect and requires additional amendments and revisions. References