Congresswoman proposes computer fraud law amendment to honor Aaron Swartz
Congresswoman Zoe Lofgren drafts 'Aaron's Law' bill that would exclude terms of service from Computer Fraud and Abuse Act
IDG News Service - A draft bill to exclude terms of service violations from the Computer Fraud and Abuse Act (CFAA) is to be introduced in the U.S. House of Representatives.
The proposed amendment to the anti-hacking law comes in the wake of the suicide on Friday by Internet activist and computer prodigy Aaron Swartz, who was charged with wire fraud, computer fraud and other crimes for allegedly accessing and downloading over 4 million articles from the JSTOR online database through the network of the Massachusetts Institute of Technology.
Swartz allegedly intended to distribute a significant proportion of JSTOR's archive through file-sharing sites. If convicted, he could have faced up to 35 years in prison and a fine of US$1 million.
The government was able to bring disproportionate charges against Swartz because of the broad scope of CFAA and the wire fraud statute, wrote Representative Zoe Lofgren in a post on Tuesday on the Reddit news-sharing site in which Swartz played a key role. "It looks like the government used the vague wording of those laws to claim that violating an online service's user agreement or terms of service is a violation of the CFAA and the wire fraud statute," she said.
The proposed amendment to the CFAA (Section 1030(e)(6) of title 18, United States Code) excludes access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer, if such violation constitutes the sole basis for determining that access to a protected computer is unauthorized.
Lofgren plans a similar amendment to the statute on fraud by wire, radio, or television (Section 1343 of title 18, United States Code), which states that a violation of an agreement or contractual obligation regarding Internet or computer use, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or employer is not in itself a violation of this section.
A Democrat who represents California's 19th congressional district, Lofgren said she would seek cosponsors for the bill from both the Republican and Democratic parties. The bill to amend CFAA and wire fraud statutes, which she would like to call "Aaron's Law," should be enacted separately and swiftly, she said. "It could be an important tribute to him," Lofgren said.
The CFAA makes it illegal to gain access to protected computers without authorization or in a manner that exceeds authorized access, wrote Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation in a post earlier this week. "Unfortunately, the law doesn't clearly explain what a lack of 'authorization' actually means. Creative prosecutors have taken advantage of this confusion to craft criminal charges that aren't really about hacking a computer but instead target other behavior the prosecutors don't like," she wrote.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Cybercrime and Hacking White Papers | Webcasts