- Jurisdiction
- Virginia
A high school uses a web site to post homework and events and such, and tells students to register. So a student goes the site, clicks the "Register" button then has to choose "Register as Student" or "Register as Teacher." He clicks "Register as Teacher," creates a fake teacher account, uses that account to create fake awards (the ButtHurt award, for example), grants those awards to his buddies, and clicks "Print." The awards print out in the prinicipal's office. The principal marches down the hall into homeroom and presents the awards. The awardees immediately crack under pressure and rat out the awarder. Busted.
So, is that computer fraud?
I found this DOJ briefing: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
It seems to me that Dr. ButtHurt's actions might be called "Accessing a Computer and Obtaining Information § 1030(a)(2)," and that he might have "exceeded authorized access" in a manner consistent with "(3) the authorizing party did not expressly prohibit the defendant from using its data for the improper purpose, but the defendant was acting against the authorizing party's interests."
§ 1030(a)(2) reads "Whoever (2) intentionally accesses (check) ... and thereby obtains —
(A) information contained in a financial record ... (nope)
(B) information from any department or agency of the United States; (nope)
or
(C) information from any protected computer (hmm, maybe, but did he really obtain it or put it there?)
Thoughts?
So, is that computer fraud?
I found this DOJ briefing: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf
It seems to me that Dr. ButtHurt's actions might be called "Accessing a Computer and Obtaining Information § 1030(a)(2)," and that he might have "exceeded authorized access" in a manner consistent with "(3) the authorizing party did not expressly prohibit the defendant from using its data for the improper purpose, but the defendant was acting against the authorizing party's interests."
§ 1030(a)(2) reads "Whoever (2) intentionally accesses (check) ... and thereby obtains —
(A) information contained in a financial record ... (nope)
(B) information from any department or agency of the United States; (nope)
or
(C) information from any protected computer (hmm, maybe, but did he really obtain it or put it there?)
Thoughts?