In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the interstate nature of most Internet communication.
The Computer Fraud and Abuse Act is both a criminal law and a statute that creates a private right of action, allowing compensation and injunctive or other equitable relief to anyone harmed by a violation of this law. These provisions have allowed private companies to sue disloyal employees for damages for the misappropriation of confidential information (trade secrets).
There have been criminal convictions for CFAA violations in the context of civil law, for breach of contract or terms of service violations. Many common and insignificant online acts, such as password-sharing and copyright infringement, can transform a CFAA misdemeanor into a felony. The punishments are severe, similar to sentences for selling or importing drugs, and may be disproportionate. Prosecutors have used the CFAA to protect private business interests and to intimidate free-culture activists, deterring undesirable, yet legal, conduct.
One such example regarding the harshness of the law was shown in United States vs. Tyler King, where King refused initial offers by the government for involvement in a conspiracy to "gain unauthorized access" to a computer system for a small company that an ex-girlfriend of King worked for. His role, even while not directly involved, resulted in 6.5 years imprisonment. No financial motive was established. A non-profit was started to advocate against further harshness against others targeted under the broad law.
Professor of Law Ric Simmons notes that many provisions of the CFAA merely combine identical language to pre-existing federal laws with "the element of “access[ing] a protected computer without authorization, or [by] exceed[ing] authorized access," meaning that "the CFAA merely provides an additional charge for prosecutors to bring if the defendant used a computer while committing the crime." Professor Joseph Olivenbaum has similarly criticized the CFAA's "computer-specific approach," noting both the risk of redundancy and resultant definitional problems.
The CFAA increasingly presents real obstacles to journalists reporting stories important to the public’s interest. As data journalism increasingly becomes “a good way of getting to the truth of things . . . in this post-truth era,” as one data journalist told Google, the need for further clarity around the CFAA increases.
As per Star Kashman, an expert in cybersecurity law, the CFAA presents some challenges in cases related to Search Engine Hacking (also known as Google Dorking). Although Kashman states that accessing publicly available information is legal under the CFAA, she also notes that in many cases Search Engine Hacking is ultimately prosecuted under the CFAA. Kashman believes prosecuting cases of Google Dorking under the CFAA could render the CFAA void for vagueness by making it illegal to access publicly available information.
Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Retrieved June 3, 2013. https://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf
"Who's Responsible? - Computer Crime Laws | Hackers | FRONTLINE | PBS". www.pbs.org. Retrieved November 13, 2021. https://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html
Schulte, Stephanie (November 2008). "The WarGames Scenario". Television and New Media. 9 (6): 487–513. doi:10.1177/1527476408323345. S2CID 146669305. /wiki/Doi_(identifier)
A representative of GTE Telenet (November 10, 1983). "Hearing". Subcommittee on Crime. Transcribed in: House Committee on the Judiciary (July 24, 1984). House Report No. 98-894. pp. 10–11. Accompanies H.R. 5616. Metadata on Congress.gov. Could become available on GovInfo. Reproduced in: United States Code Congressional and Administrative News (U.S.C.C.A.N.). Vol. 4 (98th Congress—Second Session 1984 ed.). St. Paul, Minn.: West Publishing Co. 1984. pp. 3689–3710 (whole report), particularly pp. 3695–3696 (specific pages with statement from hearing). https://www.congress.gov/bill/98th-congress/house-bill/5616
Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Retrieved June 3, 2013. https://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf
"Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts". whitehouse.gov. January 13, 2015. Retrieved January 30, 2015 – via National Archives. https://obamawhitehouse.archives.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat
"Democrats, Tech Experts Slam Obama's Anti-Hacking Proposal". Huffington Post. January 20, 2015. Retrieved January 30, 2015. http://www.huffingtonpost.com/2015/01/20/obama-hackers_n_6511700.html
Geller, Eric; Gerstein, Josh (June 3, 2021). "Supreme Court narrows scope of sweeping cybercrime law". Politico. Retrieved June 3, 2021. https://www.politico.com/news/2021/06/03/supreme-court-cybercrime-law-491764
Varma, Corey (January 3, 2015). "What is the Computer Fraud and Abuse Act". CoreyCarma.com. Retrieved June 10, 2015. http://www.coreyvarma.com/2015/01/what-is-the-computer-fraud-and-abuse-act-cfaa/#protected_computer
Legal Information Institute, Cornell University Law School. "18 USC 1030". https://www.law.cornell.edu/uscode/text/18/1030
United States v. Morris (1991), 928 F.2d 504, 505 (2d Cir. 1991). /wiki/United_States_v._Morris_(1991)
U.S. v. Lori Drew, scribd https://www.scribd.com/doc/23406419/Governments-Trial-Memo
US v Lori Drew, psu.edu Kyle Joseph Sassman, https://wikispaces.psu.edu/display/IST432TEAM24/United+States+v.+Lori+Drew
Staff, Ars (July 2, 2009). "'MySpace mom' Lori Drew's conviction thrown out". Ars Technica. Retrieved March 31, 2020. https://arstechnica.com/tech-policy/2009/07/myspace-mom-lori-drews-conviction-thrown-out/
"FindLaw's United States Eleventh Circuit case and opinions". Findlaw. Retrieved March 31, 2020. https://caselaw.findlaw.com/us-11th-circuit/1549806.html
David Gilbert (December 6, 2013). "PayPal 14 'Freedom Fighters' Plead Guilty to Cyber-Attack". International Business Times. http://www.ibtimes.co.uk/articles/528058/20131206/paypal-14-freedom-fighters-plead-guilty-cyber.htm
Alexa O'Brien (December 5, 2013). "Inside the 'PayPal 14' Trial". The Daily Beast. http://www.thedailybeast.com/articles/2013/12/05/inside-the-paypal-14-trial.html
See Internet Activist Charged in M.I.T. Data Theft, By NICK BILTON New York Times, July 19, 2011, 12:54 PM, as well as the Indictment https://bits.blogs.nytimes.com/2011/07/19/reddit-co-founder-charged-with-data-theft/
Dave Smith, Aaron Swartz Case: U.S. DOJ Drops All Pending Charges Against The JSTOR Liberator, Days After His Suicide, International Business Times, January 15, 2013. http://www.ibtimes.com/aaron-swartz-case-us-doj-drops-all-pending-charges-against-jstor-liberator-days-after-his-suicide
U.S. v. Nosal, uscourts.gov, 2011 http://www.ca9.uscourts.gov/datastore/opinions/2011/04/28/10-10038.pdf
Appeals Court: No Hacking Required to Be Prosecuted as a Hacker, By David Kravets, Wired, April 29, 2011 https://www.wired.com/threatlevel/2011/04/no-hacking-required/
Kravets, David (April 24, 2013). "Man Convicted of Hacking Despite Not Hacking". Wired. https://www.wired.com/threatlevel/2013/04/man-convicted-of-hacking-despite-no-hacking/
"Nos. 14-10037, 14-10275" (PDF). https://cdn.ca9.uscourts.gov/datastore/opinions/2016/07/05/14-10037.pdf
"Docket for 16-1344". www.supremecourt.gov. Retrieved March 31, 2020. https://www.supremecourt.gov/docket/docketfiles/html/public/16-1344.html
US v Adekeye Indictment. see also Federal Grand Jury indicts former Cisco Engineer By Howard Mintz, 08/05/2011, Mercury News https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0B-VQYa94fZpfZDY4MGQ1YjItYmEyZS00MGI4LWE0N2EtMmMzZmY0NTE5MTdj&hl=en_US&pli=1
US v Sergey Aleynikov, Case 1:10-cr-00096-DLC Document 69 Filed 10/25/10 https://www.wired.com/images_blogs/threatlevel/2010/11/Aleynikov-Sergey-Motion-to-Seal.pdf
Ex-Goldman Programmer Described Code Downloads to FBI (Update1), David Glovin and David Scheer. July 10, 2009, Bloomberg https://www.bloomberg.com/apps/news?pid=newsarchive&sid=a2GvteRoihQE
Plea Agreement, U.S. District Court, Eastern District of Michigan, Southern Division. via debbieschlussel.com http://www.debbieschlussel.com/archives/hezbospyplea.pdf
Sibel Edmond's Boiling Frogs podcast 61 Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds http://www.boilingfrogspost.com/tag/podcast-episode/
"United States of America v. Neil Scott Kramer" (PDF). Archived from the original (PDF) on August 16, 2011. Retrieved March 18, 2012. https://web.archive.org/web/20110816002424/http://www.ca8.uscourts.gov/opndir/11/02/101983P.pdf
Poulsen, Kevin (May 7, 2013). "Feds Drop Hacking Charges in Video-Poker Glitching Case". Wired. https://www.wired.com/threatlevel/2013/05/video-poker-hacking-dismissed/
No Expansion of CFAA Liability for Monetary Exploit of Software Bug | New Media and Technology Law Blog http://newmedialaw.proskauer.com/2013/11/13/no-expansion-of-cfaa-liability-for-monetary-exploit-of-software-bug/
"United States v. Gilberto Valle". Electronic Frontier Foundation. March 6, 2015. Retrieved March 31, 2020. https://www.eff.org/cases/united-states-v-gilberto-valle
"Second Circuit Adopts Narrow Construction of Federal Computer Fraud Statute, Joins Circuit Split". Jackson Lewis. December 10, 2015. Retrieved March 31, 2020. https://www.jacksonlewis.com/publication/second-circuit-adopts-narrow-construction-federal-computer-fraud-statute-joins-circuit-split
Marks, Joseph (April 24, 2020). "The Cybersecurity 202: There's finally a Supreme Court battle coming over the nation's main hacking law". The Washington Post. Retrieved July 15, 2020. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2020/04/24/the-cybersecurity-202-there-s-finally-a-supreme-court-battle-coming-over-the-nation-s-main-hacking-law/5ea1ade6602ff140c1cc5f51/
Fung, Brian; de Vogue, Ariane; Cole, Devan (June 3, 2021). "Supreme Court sides with police officer who improperly searched license plate database". CNN. Retrieved June 3, 2021. https://www.cnn.com/2021/06/03/politics/supreme-court-cybercrime-law-case/index.html
Gelman, Lauren (September 22, 2003). "Ninth Circuit Court of Appeals: Stored Communications Act and Computer Fraud and Abuse Act Provide Cause of Action for Plaintiff". Center for Internet and Society. Stanford University. http://cyberlaw.stanford.edu/packets001500.shtml
US v Jacob Citrin, openjurist.org http://openjurist.org/440/f3d/418/international-airport-centers-llc-v-citrin
U.S. v Brekka 2009 https://www.wired.com/images_blogs/threatlevel/2009/09/brekka.pdf
Kravets, David, Court: Disloyal Computing Is Not Illegal, Wired, September 18, 2009. https://www.wired.com/threatlevel/2009/09/disloyalcomputing/
Kravets, David (August 20, 2013). "IP Cloaking Violates Computer Fraud and Abuse Act, Judge Rules". Wired. https://www.wired.com/threatlevel/2013/08/ip-cloaking-cfaa/
Craigslist v. 3taps |Digital Media Law Project http://www.dmlp.org/threats/craigslist-v-3taps
3Taps Can't Shake Unauthorized Craigslist Access Claims – Law360 http://www.law360.com/articles/465944
See the links to the original lawsuit documents which are indexed here http://www.groklaw.net/staticpages/index.php?page=SonyHotz#c167a_02
techdirt.com 2011 8 9, Mike Masnick, "Sending Too Many Emails to Someone Is Computer Hacking" https://www.techdirt.com/articles/20110809/03492415447/court-says-sending-too-many-emails-to-someone-is-computer-hacking.shtml
Hall, Brian, Sixth Circuit Decision in Pulte Homes Leaves Employers With Few Options In Response To Union High Tech Tactics, Employer Law Report, 3 August 2011. Retrieved 27 January 2013. http://www.employerlawreport.com/2011/08/articles/labor-relations/sixth-circuit-decision-in-pulte-homes-leaves-employers-with-few-options-in-response-to-union-high-tech-tactics/#axzz2JEeJ24GX
https://www.employerlawreport.com/files/2013/09/Pulte-Homes.pdf [bare URL PDF] https://www.employerlawreport.com/files/2013/09/Pulte-Homes.pdf
Farivar, Cyrus (July 12, 2016). "Startup that we all forgot gets small win against Facebook on appeal". Ars Technica. Retrieved March 31, 2020. https://arstechnica.com/tech-policy/2016/07/startup-that-we-all-forgot-gets-small-win-against-facebook-on-appeal/
Lee, Timothy B. (September 9, 2019). "Web scraping doesn't violate anti-hacking law, appeals court rules". Ars Technica. Retrieved March 31, 2020. https://arstechnica.com/tech-policy/2019/09/web-scraping-doesnt-violate-anti-hacking-law-appeals-court-rules/
Lee, Timothy B. (March 30, 2020). "Court: Violating a site's terms of service isn't criminal hacking". Ars Technica. Retrieved March 31, 2020. https://arstechnica.com/tech-policy/2020/03/court-violating-a-sites-terms-of-service-isnt-criminal-hacking/
Curtiss, Tiffany (2016), "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform", Washington Law Review, 91 (4) https://www.law.uw.edu/wlr/print-edition/print-edition/vol-91/4/computer-fraud-and-abuse-act-enforcement-cruel-unusual-and-due-for-reform
"A Voice from Prison Blog | Criminal Justice Reform & Constitutional Rights". A Voice from Prison. Retrieved October 25, 2022. https://avoicefromprison.com/
"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft". www.justice.gov. August 13, 2020. Retrieved October 25, 2022. https://www.justice.gov/usao-ndny/pr/texas-man-sentenced-57-months-computer-hacking-and-aggravated-identity-theft
"A Voice from Prison Blog | Criminal Justice Reform & Constitutional Rights". A Voice from Prison. Retrieved October 25, 2022. https://avoicefromprison.com/
Christian Sandvig; Karrie Karahalios (July 1, 2006). "Most of what you do online is illegal. Let's end the absurdity". The Guardian. /wiki/Karrie_Karahalios
18 U.S.C. § 1030(a)(4) /wiki/Title_18_of_the_United_States_Code
Simmons, Ric (2016). "The Failure of the Computer Fraud and Abuse Act: Time to Take an Administrative Approach to Regulating Computer Crime". The George Washington University Law School. https://www.gwlr.org/the-failure-of-the-computer-fraud-and-abuse-act-time-to-take-an-administrative-approach-to-regulating-computer-crime/
Olivenbaum, Joseph M. (1997). : Rethinking Federal Computer Legislation. 27 Seton Hall Law Review 574.
Baranetsky, Victoria. "Data Journalism and the Law". Columbia Journalism Review. Retrieved October 16, 2020. https://www.cjr.org/tow_center_reports/data-journalism-and-the-law.php/
Baranetsky, Victoria. "Data Journalism and the Law". Columbia Journalism Review. Retrieved October 16, 2020. https://www.cjr.org/tow_center_reports/data-journalism-and-the-law.php/
Kashman, Star (2023). "Google Dorking or Legal Hacking: From the CIA Compromise to Your Cameras at Home, We Are Not as Safe as We Think". Wash. J. L. Tech. & Arts. 18 (2).
Reilly, Ryan J. (January 15, 2013). "Congresswoman Introduces 'Aaron's Law' Honoring Swartz". Huffington Post. http://www.huffingtonpost.com/2013/01/15/zoe-lofgren-aarons-law-swartz_n_2483770.html
H.R. 2454 at Congress.gov; H.R. 2454 Archived July 15, 2018, at the Wayback Machine at GovTrack; H.R. 2454 Archived November 12, 2013, at the Wayback Machine at OpenCongress. S. 1196 at Congress.gov; S. 1196 Archived July 15, 2018, at the Wayback Machine at GovTrack; S. 1196 Archived November 12, 2013, at the Wayback Machine at OpenCongress. https://www.congress.gov/bill/113th-congress/house-bill/2454
Musil, Steven (January 15, 2013). "New 'Aaron's Law' aims to alter controversial computer fraud law". CNET News. Retrieved October 19, 2021. https://news.cnet.com/8301-1023_3-57564193-93/new-aarons-law-aims-to-alter-controversial-computer-fraud-law/
Sasso, Brendan (January 16, 2013). "Lawmakers slam DOJ prosecution of Swartz as 'ridiculous, absurd'". The Hill. Retrieved January 16, 2013. https://thehill.com/policy/technology/139354-lawmakers-slam-doj-prosecution-of-swartz-as-ridiculous-absurd/
Sasso, Brendan (January 16, 2013). "Lawmakers slam DOJ prosecution of Swartz as 'ridiculous, absurd'". The Hill. Retrieved January 16, 2013. https://thehill.com/policy/technology/139354-lawmakers-slam-doj-prosecution-of-swartz-as-ridiculous-absurd/
Reilly, Ryan J. (January 15, 2013). "Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself". Huffingtonpost.com. Retrieved January 16, 2013. http://www.huffingtonpost.com/2013/01/15/darrell-issa-aaron-swartz-_n_2481450.html
Dekel, Jonathan (May 1, 2014). "Swartz doc director: Oracle and Larry Ellison killed Aaron's Law". Postmedia. Archived from the original on October 3, 2018. Retrieved May 1, 2014. https://web.archive.org/web/20181003014431/https://o.canada.com/technology/swartz-doc-director-oracle-and-larry-ellison-killed-aarons-law
H.R. 1918 at Congress.govS. 1030 at Congress.gov https://www.congress.gov/bill/114th-congress/house-bill/1918
Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Retrieved June 3, 2013. https://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf