CATEGORY:

Blog

Officer’s Criminal Conviction for Hacking Reversed

The Court found the “without authorization” clause protects computers from external threat actors, while the “exceeds authorized access” clause protects information from internal threat actors, or “hackers” within the organization who obtain information from areas where their access does not extend.

Read More »

TRAINING BULLETINS

Stone Busailah Training Bulletins and case summaries are prepared for the general information of our clients and friends. The summaries of recent court opinions and other legal developments may be pertinent to you or your association. Please be aware this material is not necessarily inclusive of all the legal authority you should consider when making your decisions. Thus, while every effort has been made to ensure accuracy, you should not act on the information contained herein without seeking more specific legal advice on the application and interpretation of this information to any particular matter.

OTHER TRAININGS

Looking for other trainings? Click button below to browse all trainings.

CONNECT WITH US

We’ll be happy to answer all of your questions.

GET OUR ASSISTANCE NOW