An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.
Author Edward Amoroso proposes ideas for the implementation of a National Infrastructure Protection Criteria. The proposed framework defines 10 criteria, and then identifies functions associated with each. The 10 criteria are deception, separation, diversity, commonality, depth, discretion, collection, correlation, awareness, and response.