Crime And Security Essay

PAGES
2
WORDS
710
Cite

In the Facebook v. Power Ventures case, the former brought a lawsuit against the latter, alleging violations of several Acts – specifically the Computer Fraud and Abuse Act (CFAA) as appertains to this discussion. Of concern was the move by Power Ventures to facilitate the aggregation of the social media accounts of a user such that the user could use just a single website to view activities (including messages and posts by friends) in the said social media accounts. In essence, users of the Power Ventures website, Power.com, had an option of accessing their profile on Facebook via the said website. It is important to note that although third parties are permitted by Facebook to make use of applications in their interactions with users of the social media site, Power Ventures eventually elected to bypass terms of use as highlighted by Facebook with regard to information access and gathering. The court, in this case, “held that, by continuing to access knowingly Facebook’s computers and by taking, copying, and making use of Facebook’s data, Power Ventures violated the CFAA…” (Weakley, 2017, p. 7/17). Although authorization could be delegated by users, the said authorization could not only be superseded, but...

...

On May 9th 2017, Power Ventures (the petitioner) filed for a writ of certiorari against Facebook (the respondent). The issue to be determined was whether Power Ventures which had the authorization of Facebook users to gain access to their data, a move that Facebook challenged and prohibited, was in violation of the CFAA. In this case, according to Romeo and Robertson (2017), “on October 10, 2017, the U.S. Supreme Court denied a petition for writ of certiorari challenging the Ninth Circuit’s holding that Power Ventures, Inc. had violated the Computer Fraud and Abuse Act (CFAA) by accessing Facebook user accounts.”
In recent times, there have been a number of prosecutions for the violation of the CFAA for authorized access. One such case was Brown Jordan Int’l Inc. v. Carmicle in 2017. In this particular case, it was held that an employee, Carmicle, who was until his termination a national manager at Brown Jordan, had during his employ violated CFAA provisions via the access of the email accounts of other employees without authorization. The said authorized access did not involve hacking because at the time, the password issued for all users was in essence a generic…

Cite this Document:

"Crime And Security" (2018, February 25) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/crime-and-security-essay-2169141

"Crime And Security" 25 February 2018. Web.20 April. 2024. <
https://www.paperdue.com/essay/crime-and-security-essay-2169141>

"Crime And Security", 25 February 2018, Accessed.20 April. 2024,
https://www.paperdue.com/essay/crime-and-security-essay-2169141

Related Documents

Crime Analysis: CPTED CPTED -- Crime Prevention through Environmental Design Before committing a criminal act, offenders often make several decisions with regard to the effort expended and chances of being apprehended. Crime prevention through environmental design (CPTED) seeks to influence the decisions an offender makes, prior to committing a criminal act, via the alteration of the constructed environment. In addition to explaining the function of CPTED, this text will, amongst other

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Crime Causation Diversion: Comparison of Juvenile Diversion, Intervention, And Prevention Programs Operating in California The objective of this study is to compare juvenile diversion, intervention, and prevention programs operating California. This study will examine how programs work to reduce juvenile crime and then conduct an analysis of the relationship between program premise and goals and one of more major causes of juvenile delinquent behavior. One of the provisions to juvenile offenders is

Crime and Intelligence Analysis The Roles of Crime Analysis and Intelligence Analysis in the Future of Policing and Homeland Security The state of this country after the September 11 attacks was of utter shock and disbelief at what had taken place in New York City. One of the most important questions on everybody's mind was whether the United States was safe from another such attack. This question of safety is one that

Crime Scene Investigations: Many crime scene investigations revolved around safeguarding the crime scenes, protecting physical evidence, and gathering and transferring the evidence for scientific evaluation. This process is based on the role that physical evidence plays in the overall investigation and determination of a suspected criminal activity. Notably, the ability for physical evidence to play its role in the overall investigation process is dependent on actions that are taken early enough

Crime -- Abstracts and Introduction Dependent variable: Crime Independent Variable: halting rising crime rate Control variable: government spending on law enforcement Tentative hypothesis: If government spending on law enforcement increases, then the overall rising crime rates could be halted. Rasinski (1989) studied the relationship between the effects of question wording/phrasing on public support for government spending. He points out that analysis of question phrasing studies around the General Social Survey expenses objects demonstrated constant phrasing