Across
- 5. USED IN CFAA CRITICISM (CATALYST) - ACTIVIST WHOSE PROSECUTION HIGHLIGHTED ARGUMENTS THAT CFAA IS OVERLY PUNITIVE
- 7. VOLUNTARY FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY RISK MANAGEMENT
- 8. INCENTIVIZED VULNERABILITY REPORTING THROUGH STRUCTURED COMPANY PROGRAMS
- 9. INFORMATION PROTECTED UNDER THE EEA AND DTSA THAT MUST HAVE VALUE AND BE KEPT CONFIDENTIAL
- 10. REQUIRED LEGAL CONNECTION BETWEEN ACCESS CIRCUMVENTION AND POSSIBLE INFRINGEMENT
- 13. ONE OF ORIN KERR'S THEORIES - VIOLATES GENERAL SOCIETAL EXPECTATIONS OF COMPUTER USE
- 14. LEAD AGENCY FOR ASSET RESPONSE, WHICH INCLUDES HELPING COMPANIES AND GOVERNMENTS PROTECT ASSETS AND MITIGATE HARMS
- 15. ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE
- 16. INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS
- 19. ONE OF ORIN KERR'S THEORIES - VIOLATIONS VIA BYPASSING TECHNICAL CONTROLS
- 20. 2015 FEDERAL LAW CREATING A LEGISLATIVE FRAMEWORK FOR IMPROVING U.S. CYBERSECURITY
Down
- 1. LAW PREVENTING DOMAIN NAME SQUATTING
- 2. PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS
- 3. MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT
- 4. ONE OF THE SEVEN PROHIBITED ACTS UNDER THE CFAA - USE OF HACKING TO OBTAIN CLASSIFIED/NATIONAL SECURITY INFORMATION
- 6. 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS
- 11. CFAA AND ESPIONAGE ACT CASE INVOLVING THEFT OF AEROSPACE TRADE SECRETS FOR CHINA (FORMAT: EXAMPLEVEXAMPLE
- 12. ONE OF ORIN KERR'S THEORIES - VIOLATION ARISING FROM BREACHING AN AGREEMENT, POLICY, OR TERMS OF SERVICE
- 17. RESTRICTS THE ABILITY OF INDIVIDUALS TO CIRCUMVENT ACCESS CONTROLS THAT PROTECT COPYRIGHTED MATERIAL.
- 18. ONE OF THE FIVE PRINCIPLES IN THE NIST FRAMEWORK - IMPLEMENT SAFEGUARDS TO DELIVER SERVICES
