Implementing a Policy Review to Ensure You Are Protected Under The Computer Fraud and Abuse Act, Part 1: Why You Should Conduct a Policy Review
Ambrose McCall will be presenting "The Computer Fraud and Abuse Act: Navigating the New Normal of Workplace Technology and Cybersecurity" on Thursday, October 12, 2017, at the 22nd Annual Labor & Employment Seminar. This year's Seminar will be held at the Hilton Chicago-Northbrook in Northbrook, Illinois. Please visit our website for more details.
One size rarely fits all, especially where technology is concerned. So too is employer coverage under the Computer Fraud and Abuse Act (“CFAA”). Cookie-cutter molds for aspects of your business simply do not work.
Certain situations readily qualify for coverage under the CFAA, such as when current or former employees hack into employer databases or files that were always off-limits to the employee, such as:
- Databases that contain highly protected financial data with account numbers that employees could use to misappropriate funds;
- Digital files that contain confidential business strategies that the employee accesses to alter, delete, or erase its digital files so that the employer must reconstruct the file, which usually involves significant costs to the employer; and
- Digital files with confidential proprietary client contact and marketing data that a current employee, acting as a conduit to a former employee who now lacks authorized access, removes or transfers with the purpose of permanently damaging the digital files at great cost to the employer.
The employer's protections under the CFAA, however, extend beyond these more common examples. The CFAA also can protect employers that enforce existing policies against current employees who may have arguably exceeded their authorized access to the employer’s computers, networks, and digital files.
The humility that comes with experience has taught many of us that no magic policy language exists that can transform an employee's marginal violation of your authorized access policy into a clear violation which is covered by the CFAA. Therefore, employers should examine their policies and processes as a whole with an eye toward determining whether their policies and practices work cohesively to prohibit an employee's access to designated computers, networks, and digital files, and that the employer is adequately protected from employee misconduct under the CFAA. In Part 2 of this series, we will provide detailed guidance on how to conduct your policy review and questions that you should consider throughout the policy review to ensure you are protected under the CFAA.
Topics
Featured Insights

Event
Apr 23, 2026
Driving Ahead: Insights from Industry Leaders Auto Finance Seminar

Consumer Crossroads: Where Financial Services and Litigation Intersect
Mar 13, 2026
DOJ Settlement with Car Retailer Highlights SCRA Repossession Risks

Privacy, Cyber & AI Decoded Alert
Mar 11, 2026
Compliance Considerations for GDPR Consent in Biotech Clinical Research

Press Release
Mar 4, 2026
Marcia Mueller Named the 2026 Mentorship Award Winner by YWCA Northwestern Illinois

Press Release
Mar 3, 2026
Hinshaw Announces New Administrative Leadership Appointments

In The News
Feb 27, 2026
Hinshaw Partners Examine Implications for Nursing Homes of New Illinois Aid-in-Dying Law

In The News
Feb 24, 2026
Lucy Wang Authors Law360 “Expert Analysis” on Why Attorney Civility Means More in 2026

Press Release
Feb 13, 2026
Hinshaw Team Wins Appeal in Criminal Indictment of Waukegan City Clerk Janet Kilkelly

Press Release
Feb 10, 2026
Hinshaw Trial Team Secures $0 Defense Verdict in $15 Million Auto Accident Trial

Press Release
Feb 5, 2026
Hinshaw Legal Team Secures Directed Verdict in Florida Equine Fraud Case

Press Release
Feb 4, 2026
Hinshaw Celebrates 17 Consecutive Years of Being Named an Equality 100 Award Winner
![[Video] New Regulatory Priorities Under Mayor Mamdani’s NYC Department of Consumer and Worker Protection](/a/web/oHiTWa7kRy3Ht1brq6k4BT/bkMx39/new-york-city-skyline.jpg)
