Matches in DBpedia 2014 for { <http://dbpedia.org/resource/United_States_v._John_(2010)> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- United_States_v._John_(2010) abstract "In United States v. John, 597 F.3d 263 (2010) United States Court of Appeals for the Fifth Circuit interpreted the term “exceeds authorized access” in the Computer Fraud and Abuse Act 18 U.S.C. §1030(e)(6) and concluded that access to a computer may be exceeded if the purposes for which access has been given are exceeded.In particular, the court ruled that an employee would exceed authorized access to a protected computer if he or she used that access to obtain or steal information as part of criminal scheme.This case addresses the issue of the distinction between authorized access to information and subsequent use of information obtained through an authorized access for the purposes of CFAA.".
- United_States_v._John_(2010) wikiPageExternalLink 08-10459-CR0.wpd.pdf.
- United_States_v._John_(2010) wikiPageID "34920470".
- United_States_v._John_(2010) wikiPageRevisionID "558804364".
- United_States_v._John_(2010) citations "25920.0".
- United_States_v._John_(2010) court United_States_Court_of_Appeals_for_the_Fifth_Circuit.
- United_States_v._John_(2010) dateDecided "2010-02-09".
- United_States_v._John_(2010) decisionBy Priscilla_Owen.
- United_States_v._John_(2010) fullName "United States of America v. Dimetriace Eva Lavon John".
- United_States_v._John_(2010) hasPhotoCollection United_States_v._John_(2010).
- United_States_v._John_(2010) judges "Jerry E. Smith, Priscilla Owen and Catharina Haynes".
- United_States_v._John_(2010) keywords Computer_Fraud_and_Abuse_Act.
- United_States_v._John_(2010) name "United States v. John".
- United_States_v._John_(2010) opinions "The Fifth Circuit affirmed appellant's convictions, but vacated her sentence and remanded for further proceedings.".
- United_States_v._John_(2010) priorActions "District Court for the Northern District of Texas convicted the defendant of conspiracy to commit access device fraud, fraud in connection with an access device and exceeding authorized access to the employer's computer internal system.".
- United_States_v._John_(2010) subject Category:United_States_Court_of_Appeals_for_the_Fifth_Circuit_cases.
- United_States_v._John_(2010) subject Category:United_States_computer_case_law.
- United_States_v._John_(2010) comment "In United States v. John, 597 F.3d 263 (2010) United States Court of Appeals for the Fifth Circuit interpreted the term “exceeds authorized access” in the Computer Fraud and Abuse Act 18 U.S.C.".
- United_States_v._John_(2010) label "United States v. John (2010)".
- United_States_v._John_(2010) sameAs m.0k0r2sr.
- United_States_v._John_(2010) sameAs Q7893338.
- United_States_v._John_(2010) sameAs Q7893338.
- United_States_v._John_(2010) wasDerivedFrom United_States_v._John_(2010)?oldid=558804364.
- United_States_v._John_(2010) isPrimaryTopicOf United_States_v._John_(2010).