Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
-
Upload
shawn-tuma -
Category
Technology
-
view
15.764 -
download
0
description
Transcript of Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud
![Page 1: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/1.jpg)
FRAUD 2.0An Overview of the Laws that
Help Businesses and Individuals Combat Computer Fraud
Shawn E. Tumawww.brittontuma.com
Association of Certified Fraud Examiners
November 8, 2012
![Page 2: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/2.jpg)
2
THINK ABOUT THIS …
www.brittontuma.com
![Page 3: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/3.jpg)
3www.brittontuma.com
Did You Know?
[SEE FOLLOING VIDEO]https://vimeo.com/2030361
![Page 4: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/4.jpg)
4
WHAT DOES THAT MEAN TO YOU?
www.brittontuma.com
![Page 5: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/5.jpg)
5
STUXNET?
www.brittontuma.com
![Page 6: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/6.jpg)
6
NON COMPUTER RELATED FRAUD?
www.brittontuma.com
![Page 7: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/7.jpg)
7
As of September 2012, cybercrime
• costs $110 billion annually
• 18 adults every second are victims
• 556,000,000 adults every year are victims
• 46% of online adults are victims
• mobile devices are trending
2012 Norton Cybercrime Reportwww.brittontuma.com
The Statistics
![Page 8: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/8.jpg)
8
What is fraud?• Fraud is, in its simplest form, deception
• Black’s Law Dictionary
• all multifarious means which human ingenuity can devise, and which are resorted to by one individual to get advantage over another by false suggestions or suppression of the truthwww.brittontuma.com
Fraud?
![Page 9: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/9.jpg)
9
Traditional vehicles for fraud?• verbal communication
• written communication
• in person
• through mail
• over wirewww.brittontuma.com
Fraud?
![Page 10: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/10.jpg)
10
What do computers do?
EFFICIENCY!www.brittontuma.com
![Page 11: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/11.jpg)
11
FRAUD 2.0
www.brittontuma.com
![Page 12: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/12.jpg)
12
Computer Fraud = Fraud 2.0• Deception, through the use of a computer
• “old crimes committed in new ways … using computers and the Internet to make the task[s] easier”
• computer hacking, data theft, theft of money, breaches of data security, privacy breaches, computer worms, Trojan horses, viruses, malware, denial of service attacks
• mouse and keyboard = modern fraudster tools of choice
www.brittontuma.com
Fraud 2.0
![Page 13: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/13.jpg)
13
Who knows the percentage of businesses that suffered at least one act of computer fraud in last
year?
90%(Ponemon Institute Study)
www.brittontuma.com
Fraud 2.0
![Page 14: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/14.jpg)
14
Computer Fraud and Abuse Act
Federal Law – 18 U.S.C § 1030
www.brittontuma.com
The Law!
![Page 15: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/15.jpg)
15
BRIEF HISTORY OF THE CFAA
![Page 16: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/16.jpg)
16
History of CFAA
www.brittontuma.com
![Page 17: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/17.jpg)
17
History of CFAA
www.brittontuma.com
![Page 18: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/18.jpg)
18
Why?
Primary Law for Misuse of Computers
Computers …
Why is the Computer Fraud and Abuse Act important?
www.brittontuma.com
![Page 19: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/19.jpg)
19www.brittontuma.com
“Everything has a computer in it nowadays.”
-Steve Jobs
Why Computers?
![Page 20: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/20.jpg)
20
WHAT IS A COMPUTER?
![Page 21: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/21.jpg)
21www.brittontuma.com
has a processor or stores data
“the term ‘computer’ means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but …”
IMPORTANT! “such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device;”
The CFAA says
What is a computer?
![Page 22: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/22.jpg)
22www.brittontuma.com
What about
What is a computer?
![Page 23: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/23.jpg)
23www.brittontuma.com
“’Just think of the common household items that include microchips and electronic storage devices, and thus will satisfy the statutory definition of “computer.”’
“’That category can include coffeemakers, microwave ovens, watches, telephones, children’s toys, MP3 players, refrigerators, heating and air-conditioning units, radios, alarm clocks, televisions, and DVD players, . . . .”
-United States v. Kramer
The Fourth Circuit says
Anything with a microchip
![Page 24: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/24.jpg)
24www.brittontuma.com
This may limit the problem of applying it to alarm clocks, toasters, and coffee makers
The CFAA applies only to “protected” computers
Protected = connected to the Internet
Any situations where these devices are connected?
What is a “protected” computer?
![Page 25: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/25.jpg)
25www.brittontuma.com
•TI-99 •3.3 MHz Processor•16 KB of RAM
•Leap Frog Leapster•96 MHz Processor•128 MB of RAM
•iPhone 5•1.02 GHz Processer•1 GB of RAM
Perspective
![Page 26: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/26.jpg)
26www.brittontuma.com
66 MHz = fastest desktop in 80s
96 MHz = child’s toy today
250 MHz = fastest super computer in 80s
1.02 GHz = telephone today
Perspective
![Page 27: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/27.jpg)
27
WHAT DOES THE CFAA PROHIBIT?
![Page 28: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/28.jpg)
28
Statutory Language
CFAA prohibits the access of a protected computer that is
Without authorization, or Exceeds authorized access
www.brittontuma.com
![Page 29: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/29.jpg)
29
Statutory Language
Where the person accessing Obtains information
Commits a fraud
Obtains something of value
Transmits damaging information
Causes damage
Traffics in passwords
Commits extortion
www.brittontuma.com
![Page 30: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/30.jpg)
30
Very Complex Statute
Overly simplistic list
Very complex statute
Superficially it appears deceptively straightforward
Many pitfalls
www.brittontuma.com
“I am the wisest man alive, for I know one thing, and that is that I know nothing.”
-Socrates
![Page 31: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/31.jpg)
31
Very Complex Statute
Two Most Problematic Issues
“Loss” Requirement
• Confuses lawyers and judges alike
Unauthorized / Exceeding Authorized Access
• Evolving jurisprudence
• Interpreted by many Circuits
• New conflict on April 10, 2012www.brittontuma.com
![Page 32: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/32.jpg)
32
Civil Remedy
Limited civil remedy Procedurally complex with many
cross-references
“damage” ≠ “damages”
Must have $5,000 “loss”
Loss requirement is jurisdictional threshold
www.brittontuma.com
![Page 33: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/33.jpg)
33
Civil Remedy
What is a “loss”?“any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.”
Loss = cost (unless interruption of service)
www.brittontuma.com
![Page 34: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/34.jpg)
34
Civil Remedy
What can qualify as a “loss”? Investigation and response costs
• Forensics analysis and investigation• Diagnostic measures• Restoration of system• Bartered services for investigation / restoration
Value of employees’ time Attorneys’ fees if leading investigation
www.brittontuma.com
![Page 35: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/35.jpg)
35
Civil Remedy
What is not a “loss”? Lost revenue (unless interruption of
service)
Value of trade secrets
Lost profits
Lost customers
Lost business opportunities
Privacy and Personally Identifiable Informationwww.brittontuma.com
![Page 36: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/36.jpg)
36
Civil Remedy
Privacy and Personally Identifiable Information
iTracking
Hacking / data breach
Browser cookies
REMEMBER: Loss is only required for civil remedy – not criminal violation
www.brittontuma.com
![Page 37: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/37.jpg)
37
Civil Remedy
What would you advise? Wrongful access of your client’s
computer
Considering a CFAA claim
Your advice would be to ________?
www.brittontuma.com
![Page 38: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/38.jpg)
38
Civil Remedy
Remedies Available
• Economic damages
• Loss damage
• Injunctive relief
Not Available• Exemplary damages
• Attorneys’ fees
www.brittontuma.com
![Page 39: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/39.jpg)
39
Basic Elements
Elements of broadest CFAA Claim1. Intentionally access computer;
2. Without authorization or exceeding authorized access;
3. Obtained information from any protected computer; and
4. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000.
www.brittontuma.com
![Page 40: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/40.jpg)
40
Basic Elements
Elements of CFAA Fraud Claim1. Knowingly and with intent to defraud;
2. Accesses a protected computer;
3. Without authorization or exceeding authorized access;
4. By doing so, furthers the intended fraud and obtains anything of value; and
5. Victim incurred a loss to one or more persons during any 1-year period of at least $5,000.
www.brittontuma.com
![Page 41: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/41.jpg)
41
WRONGFUL ACCESS
![Page 42: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/42.jpg)
42
Wrongful Access
General Access Principles Access by informational / data use
≠ technician
Must be knowing or intentional access
≠ accidental access
www.brittontuma.com
![Page 43: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/43.jpg)
43
Wrongful Access
“without authorization” Outsiders No rights Not defined Only requires intent to
access, not harm Hacker!
“exceeds authorized” Insiders Some rights CFAA defines: access
in a way not entitled Necessarily requires
limits of authorization Employees, web
users, etc.
www.brittontuma.com
Two Types of Wrongful Access
![Page 44: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/44.jpg)
44
Wrongful Access
When does authorization terminate?
As of April 10, 2012, there are (once again) three general lines of cases: Trilogy of Access Theories
• Agency Theory
• Intended-Use Analysis
• Access Means Accesswww.brittontuma.com
![Page 45: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/45.jpg)
45
Wrongful Access
Ways to establish limits for Intended-Use
Contractual• Policies: computer use, employment & manuals
• Website Terms of Service
Technological• Login and access restrictions
• System warnings
Training and other evidence of notification
Notices of intent to use CFAA
www.brittontuma.com
![Page 46: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/46.jpg)
46
Wrongful Access
Contractual limits should Clearly notify of limits
Limit authorization to access information
Limit use of information accessed
Terminate access rights upon violation
Indicate intent to enforce by CFAA
Goal: limit or terminate authorizationwww.brittontuma.com
![Page 47: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/47.jpg)
47
Wrongful AccessExamples
Employment SituationsMost common scenario is employment• Employee access and take customer account
information
• Employee accesses and takes or emails confidential information to competitor
• Employee improperly deletes data and email
• Employee deletes browser history
• Employee accessing their Facebook, Gmail, Chase accounts at work
www.brittontuma.com
![Page 48: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/48.jpg)
48
Wrongful AccessExamples
Family Law SituationsHave you ever logged into your significant other’s email or Facebook to see what they’re saying to others?
DON’T ANSWER THAT!
• Estranged spouse in Arkansas did after separation
• NTTA account?
• Bank account?
• Cancelling services via online accounts?
www.brittontuma.com
![Page 49: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/49.jpg)
49
Wrongful AccessExamples
Sharing Website LoginsHave you ever borrowed or shared website login credentials and passwords for limited access sites (i.e., online accounts)?
DON’T ANSWER THAT!
• Recent case held that permitting others to use login credentials for paid website was viable CFAA claim
• The key factor here was the conduct was prohibited by the website’s agreed to Terms of Service
www.brittontuma.com
![Page 50: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/50.jpg)
50
Wrongful AccessExamples
Misuse of WebsitesEver created a fake profile or used a website for something other than its intended purpose?
DON’T ANSWER THAT!
• Myspace Mom case
• Fake login to disrupt legitimate website sales
• Accessing website to gain competitive information when prohibited by TOS
• Creating fake Facebook to research opposing parties
www.brittontuma.com
![Page 51: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/51.jpg)
51
Wrongful AccessExamples
Hacking & Private InformationHacking was original purpose for CFAA• Hacking and obtaining private information
• (president’s educational records)
• Tracking individuals through geo-tagging
• Website collection of private information
• All fit within the prohibitions of the CFAA
• Loss is the problem, from a civil standpoint
www.brittontuma.com
![Page 52: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/52.jpg)
52
Wrongful AccessExamples
What about …
• Hacking a car?
• Hacking a person?
• What else?
www.brittontuma.com
![Page 53: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/53.jpg)
53
Non-AccessExamples
What about …
• Denial of Service Attacks
• Password Trafficking
www.brittontuma.com
![Page 54: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/54.jpg)
54
OTHER LAWS FOR COMBATING FRAUD
2.0
![Page 55: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/55.jpg)
55
Federal Laws
Federal Laws for Combating Fraud 2.0• Electronic Communications Privacy Act - 18
U.S.C. § 2510
• Wiretap Act ≠ intercept communications
• Stored Communications Act ≠ comm. at rest
• Fraud with Access Devices - 18 U.S.C. § 1029
• devices to obtain passwords, phishing, counterfeit devices, scanning receivers, drive through swipe cards
• Identity Theft – 18 U.S.C. § 1028
www.brittontuma.com
![Page 56: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/56.jpg)
56
Texas Laws
Texas Laws for Combating Fraud 2.0• Breach of Computer Security Act (Tx. Penal Code §
33.02)
• knowingly access a computer without effective consent of owner
• Fraudulent Use or Possession of Identifying Info (TPC § 32.51
• Unlawful Interception, Use, or Disclosure of Wire, Oral or Electronic Communications (TPC § 16.02)
• Unlawful Access to Stored Communications (TPC § 16.04)
• Identity Theft Enforcement and Protection Act (BCC § 48.001)
• Consumer Protection Against Computer Spyware Act (BCC § 48.051)
• Anti-Phishing Act (BCC § 48.003)
www.brittontuma.com
![Page 57: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/57.jpg)
57
• Welcome to the world of Fraud 2.0!
• Why? Remember what Jobs said
• CFAA is very broad and covers all kinds of computer fraud (sometimes)
• Courts’ interpretation of the CFAA is changing all the time – you must stay updated!
• Many other Federal and Texas laws also available for combating computer fraud
www.brittontuma.com
Conclusion
![Page 58: Fraud 2.0 - The Laws that Help Businesses Combat Computer Fraud](https://reader038.fdocuments.in/reader038/viewer/2022102823/546256f6af7959b92a8b47bc/html5/thumbnails/58.jpg)
58www.brittontuma.com
Do You Want to Know More?
www.brittontuma.com
www.shawnetuma.com
Shawn E. Tumad. 469.635.1335m. 214.726.2808
e. [email protected]@shawnetuma
Copyright © 2012