Chapter 5&6

1234567891011121314151617181920
Across
  1. 5. USED IN CFAA CRITICISM (CATALYST) - ACTIVIST WHOSE PROSECUTION HIGHLIGHTED ARGUMENTS THAT CFAA IS OVERLY PUNITIVE
  2. 7. VOLUNTARY FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY RISK MANAGEMENT
  3. 8. INCENTIVIZED VULNERABILITY REPORTING THROUGH STRUCTURED COMPANY PROGRAMS
  4. 9. INFORMATION PROTECTED UNDER THE EEA AND DTSA THAT MUST HAVE VALUE AND BE KEPT CONFIDENTIAL
  5. 10. REQUIRED LEGAL CONNECTION BETWEEN ACCESS CIRCUMVENTION AND POSSIBLE INFRINGEMENT
  6. 13. ONE OF ORIN KERR'S THEORIES - VIOLATES GENERAL SOCIETAL EXPECTATIONS OF COMPUTER USE
  7. 14. LEAD AGENCY FOR ASSET RESPONSE, WHICH INCLUDES HELPING COMPANIES AND GOVERNMENTS PROTECT ASSETS AND MITIGATE HARMS
  8. 15. ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE
  9. 16. INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS
  10. 19. ONE OF ORIN KERR'S THEORIES - VIOLATIONS VIA BYPASSING TECHNICAL CONTROLS
  11. 20. 2015 FEDERAL LAW CREATING A LEGISLATIVE FRAMEWORK FOR IMPROVING U.S. CYBERSECURITY
Down
  1. 1. LAW PREVENTING DOMAIN NAME SQUATTING
  2. 2. PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS
  3. 3. MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT
  4. 4. ONE OF THE SEVEN PROHIBITED ACTS UNDER THE CFAA - USE OF HACKING TO OBTAIN CLASSIFIED/NATIONAL SECURITY INFORMATION
  5. 6. 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS
  6. 11. CFAA AND ESPIONAGE ACT CASE INVOLVING THEFT OF AEROSPACE TRADE SECRETS FOR CHINA (FORMAT: EXAMPLEVEXAMPLE
  7. 12. ONE OF ORIN KERR'S THEORIES - VIOLATION ARISING FROM BREACHING AN AGREEMENT, POLICY, OR TERMS OF SERVICE
  8. 17. RESTRICTS THE ABILITY OF INDIVIDUALS TO CIRCUMVENT ACCESS CONTROLS THAT PROTECT COPYRIGHTED MATERIAL.
  9. 18. ONE OF THE FIVE PRINCIPLES IN THE NIST FRAMEWORK - IMPLEMENT SAFEGUARDS TO DELIVER SERVICES