Korn/Ferry V. Case Study

Great Essays
FACTS: David Nosal was a self-employed entrepreneur who opened a business mimicking his former employer Korn/Ferry’s business strategy. Korn/ Ferry operated an executive search firm, which employed several workers, who were given access to the company computer systems with the use of log in credentials. This granted employees access to critical business information, such as names and contact information for clients and others. Nosal, now a direct competitor of Korn/Ferry, asked some of Korn/Ferry employees to use their computer privileges, to access and obtain pertinent information, then supply the information to him in order to gain a competitive edge. Further, Korn/Ferry had a previously established policy in place, which prevented employees …show more content…
The impact of the CFAA laws in the government’s broad terms, would, “criminalize a broad range of day-to-day activity,” in turn affecting millions of individuals with the term “exceeds authorized access,” in which the court did not agree with United States v. Nosal, 642 F.3d 781 (9th Cir. 2011). The court considered that if Congress created the law with the intention to criminalize millions of citizens, the language used in the statute would have been more clearly worded and concise. This interpation would have granted Korn/Ferry the power to federally charge all employees who misused the company’s computer systems, by exceeding their authorized access. Since the company grants access to computer systems for business purposes, checking personal e-mails or reading the news, could be considered misuse, or exceeding authorized access, and punishable by federal law. The court sided with Nosal’s interpretation of a more narrow approach to the term exceeding authorized access. By this perspective, the courts viewed the Korn/Ferry as providing access to employees to their databases, who in turn, then misused the information that was obtained from the company legitimately. Further, the courts relied on the ruling of LVRC Holdings LLC v. Brekka, 581 F. 3d 1127 (9th Cir.2009) which discussed the CFAA …show more content…
Congress’s intent with the CFAA was to focus on computer hackers who use means like back-door access, stolen identification, or computer attacks to steal information. In United States v. Nosal, none of these criminal activities occurred. Employees were given privileges, allowing legally access to information in the company’s databases, and should not be considered as hackers or cyber criminals, as the CFAA was intended. The CFAA’s intent does not accurately depict the crime that occurred in United States v. Nosal, and the law should not be applied or interpreted to fit the crime, much as the federal government had tried. The access granted to the computer systems by the employer to the employees was legitimate, and the violation only occurred when the employees decided to misuse the given information by giving it to

Related Documents

  • Improved Essays

    Yoely Brach Case Summary

    • 1247 Words
    • 5 Pages

    We do not believe, at this time, that Yoely or his representatives have the right to any computer records, despite him already retaining access to a user account with access to the records. If Yoely believes that he has a monetary claim against the Company, then let him provide documentation to substantiate any such claims, and only then should we discuss what limited access is necessary. 2) There was never any discussion amongst any partners to grant Yoely any interest in the company. There was talk with Yoely about 7% commission of the Amazon net profit – to which he never agreed to and not agreement was finalized. Accordingly, so long that Yoely doesn’t provide us with any reason to believe that he has rights to the Company’s proprietary information, we do not feel obliged to grant him access to the partners’ emails regarding the business…

    • 1247 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Village Key Case

    • 516 Words
    • 3 Pages

    This case is between Joseph Gupton and Village Key & Saw Shop, Inc. In this case it delineates that Gupton had owned a locksmith-alarm business. However, in 1989, the business started to go downward due to financial problems, so Village Key decided to buy the business from Gupton. They took over the bills and accounts and signed a promissory note.…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The critical implications of the decision of Haque & Ors v Minister for Immigration & Anor [2015] FCCA 1765 (2 July 2015) in terms of the binding nature of opinions of Medical Officers of the Commonwealth (“MOC”) appointed by the Minister, are as it is stated in regulation 2.25A of the Migration Regulations 1994 (Cth) the (“Regulations”). In that the opinion of the MOC is to be taken as to be correct in determining whether a person meets the requirements of Public Interest Criteria (“PIC”) 4005. The delegate of the Minister is not to form their own opinion on whether or not an applicant meets the requirements of PIC 4005.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Allen Lopez Case Summary

    • 828 Words
    • 4 Pages

    The respondent became frustrated with the alleged unfair treatment of lower-level employees and created and published a critical website speaking against the management practices and the discrimination of a fictional company that had astonishing similarities to the petitioner. The website gained publicity from the media and high-tech websites. The petitioner held a meeting with the executives to decide whether the respondent should be fired and whether legal action need to be taken to have the respondent’s website removed for the internet. The petitioner and the respondent have agreed to have their case resolved in arbitration and will adhere to the ruling handed down.…

    • 828 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The landmark Supreme Court case I want to talk about is Korematsu v. United States (1944). The case was decision from government ordered Japanese American into internment camp during World War II following Executive Order 9066. However, Korematsu refused going to the camps because he argued the order violating to 15th Amendment, so he was arrested and convicted the District Court. After the war, he continued to appeal to the United States Supreme Court to request his justice. As a result, Congress enacted the Japanese American Evacuation Claims Act of 1948 to provide some money to compensate to Japanese Americans who lost their homes or businesses during the internment.…

    • 191 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Biby Case Summary

    • 636 Words
    • 3 Pages

    Held: Court ruled in favor of the university. It cited a university policy that it has the right to search the employees' computers for legitimate reason. In this case, not only was there a policy allowing the un university to search employees email but the search took place within the discovery period for arbitration. This case likewise affirms that the employees have less expectation of privacy in the workplace…

    • 636 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Clayton Anderson Ethics in the Profession Midterm The Ethical Case of AshleyMadison.com To begin discussing this case you must know some of the history and information about the website. First off the name Ashley Madison was not a real person it actually comes from the conjunction of two popular female names “Ashley” and “Madison”. The Website has a slogan which is “Life is short. Have an affair.”.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Evidences- where the case went wrong: According to the file there was just one evidence against Morton and that evidence was a note found at the crime scene. That note was signed with “I L Y,” for I love you, and “M,” for Michael, who was Christine’s husband. (Bazelon, 2012). That note was all about a husband’s anger over his wife as she did not let him have sex with her at the night of Morton’s birthday.…

    • 1048 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The 1980 court case, Armstrong V. Kline, drew from parents of children with exceptionalities becoming upset with the education system’s 180-day school year rule1. Beginning in January of 1980, they decided that enough was enough and they needed to do something before summer vacation came so, their child/children would not lose everything they learned during the school year1. The parents took on the court case, filing three class action lawsuits, all of which were against Caryl Kline, the secretary of education and chief official of the Department of Education1. The result of this particular case relieved me but, the fact it had to become a court case, I found to be absolutely ridiculous. Also, the terminology they used while describing the…

    • 751 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    H.R. 5800/S. 2981- Secure Data Act of 2014 The United States Constitution under the Fourth Amendment ensures our right to be free from unreasonable searches and seizures, and by extension has been interpreted to protect our right of privacy. The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” (The Charters of Freedom). There has been much controversy as to what is considered to be protected under constitutional law relating to one’s right of privacy. Although a reasonable right to privacy is not explicitly stated in the Constitution, this particular right has developed into a civil liberty protected by the Fourth, Fifth and Fourteenth amendments.…

    • 1800 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The Fourth Amendment grants property rights to citizens against unreasonable searches and seizures. Consent is one of the most frequently used exceptions to the Fourth Amendment. Determining if a person has the authority to grant consent is an issue unique to computers. Today, technology enables multiple users to log on to a computer using multiple passwords and profiles and create multiple accounts and screen names. A password is analogous to a key that can be used to open a locked container.…

    • 1746 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    The Fourth Amendment is comprehensive and highly valued by American citizens and reflects the framers belief that the government should not be allowed to interfere in some aspects of a citizen’s life. The Fourth Amendment clearly protects a person’s home and personal property, but their electronic communications are less defined and protected under current law. When the Constitution was written, paper records were all that existed and these were protected; electronic records should qualify equally and be considered the same as “papers and effects.”…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Fourth Amendment Debate

    • 1538 Words
    • 7 Pages

    The topic of constitutional rights has long been a hot button that brings out fierce opinions and conflict. One specific topic that draws more attention than the others is the fourth amendment, or the protection from illegal search and seizure. This protection is fiercely enforced in the physical realm, but is grossly overlooked and abused in the digital by means of hacking and data collection requests. One instance of this is the longstanding practice of data turnover orders by the government towards companies such as Microsoft and Apple. On April 14, 2016 Microsoft filed suit due to the fact that “Over the past 18 months, the U.S. government has required that we maintain secrecy regarding 2,576 legal demands” (blog.microsoft.com)…

    • 1538 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Amendments to the CFAA have been added over the years to address crimes which use the computer to defraud and destroy data. Legislation has been enacted to protect victims of malicious code and denial-of-service attack (Department of Justice, n.d.). The CFAA was not intended to be a catch all statute for cyber-related crimes. “Congress addressed federalism concerns in the CFAA by limiting federal jurisdiction to Prosecuting Computer Crimes cases with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature” (Department of Justice, n.d., p.4). Over the years, the CFAA has taken on different meanings in how it has been applied by federal prosecutors.…

    • 1516 Words
    • 7 Pages
    Superior Essays