The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF
|
|
|
- Melvyn Riley
- 10 years ago
- Views:
Transcription
1 The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF
2 what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research involving web applications. Some of the laws that might come into play in those situations. Ways to reduce whatever risk your research might create.
3 what do I mean by risk? A couple things. The likelihood of becoming an attractive target for a law suit or prosecution, either with or without basis. The likelihood that a court might decide that you ve run afoul of the law.
4 My goal today is not to frighten you or discourage your research. I want to help you spot a few potentially sticky situations and safely navigate them. I also want to help you think about ways to design your research to avoid trouble.
5 This is not legal advice. If you are concerned about the legality of your research, you should speak with a lawyer about your specific situation.
6 Sticky situation #1 violating terms of use
7 what are they? The terms that regulate how people can access and use the service. You ll often find a link to the terms at the bottom of a site s homepage, but sometimes you ll have to hunt around to find them.
8 what are they? Examples: Twitter: Terms Terms of Service Facebook: Terms Statement of Rights and Responsibilities Paypal: Legal Agreements Paypal User Agreement
9 Be sure to check whether more than one agreement might apply. Also see whether other agreements/policies are incorporated be reference.
10 who agrees and when? Google: You agree by clicking to accept or by actually using Google services. Twitter: You agree by accessing or using services/site. Facebook: users and others who interact with Facebook agree by using or accessing the service.
11 laws that might apply Violating terms of use could involve: Breach of contract civil claim monetary damages, if any (compensation for loss) perhaps account terminated Computer intrusion laws?
12 risky moves Agreeing (or agreeing ) to terms of use, then violating them. Causing harm to either computers or data. Invading privacy Interrupting service Damaging the system Others
13 less risky Know what the terms say before you begin your research. If possible, don t agree to them. Don t allow your research to cause harm to a computer, whoever owns the computer, or anyone whose data is stored on the computer.
14 Sticky situation #2 accessing someone else s computer without permission or authorization
15 laws that might apply Accessing someone else s computer might involve: Computer intrusion laws Computer Fraud and Abuse Act (18 U.S.C. 1030) State laws Common law trespass laws Trespass to chattels (requires harm)
16 unauthorized access The CFAA prohibits, among other things, intentionally access[ing] a computer without authorization or in excess of authorization, and thereby obtain[ing]... information from any protected computer. 18 U.S.C. 1030(a)(2)(C).
17 unauthorized access Courts have interpreted obtaining information broadly. Basically any computer connected to the internet is a protected computer. So the major limiting principle is unauthorized.
18 Folks have tried to make creative arguments for defining unauthorized to include violating terms of use... United States v. Drew Facebook v. Power Ventures United States v. Lowson
19 risky moves Getting around measures intended to keep you out of the computer or restrict access to particular data. Appearing to have bad motives. Causing harm.
20 less risky Get permission to access the computer and/or data. Use your own computers/accounts/data. Don t cause damage or interrupt service. Don t agree to or violate terms of service, if possible.
21 Sticky situation #3 intercepting or accessing other people s communications
22 laws that might apply Eavesdropping laws Wiretap Act (18 U.S.C et seq.) State laws Laws protecting routing information Pen Register Act (18 U.S.C et seq.) State laws Laws protecting stored communications Stored Communications Act (18 U.S.C et seq.) State laws
23 Helpful tip: Consent takes care of a lot of potential problems here.
24 risky moves Intercepting/accessing communications without the consent of the parties. Misusing those communications or the information that you learn from them. Breaking encryption or other measures meant to ensure the privacy of communications.
25 less risky Having consent from one or more parties before intercepting or accessing their communications. Consider intercepting or accessing your own communications rather than those of others.
26 questions? Marcia Hofmann Senior Staff Attorney, EFF
Retaliatory Hacking: Risky Business or Legitimate Corporate Security?
Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital
JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any
~ (c) S.B. NO. \ JAN 0 A BILL FOR AN ACT THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII RELATING TO LAW ENFORCEMENT. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: ' SECTION. Section
Legal and Ethical Issues Facing Computer & Network Security Researchers
Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009 Constraints on Network Research U.S. law is often unclear (and
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
The False Claims Acts What you need to know
The False Claims Acts What you need to know Why have this training? Required by federal law Employees have a duty to identify and report fraud, waste and abuse By safeguarding Medi-Cal and Medicare funding,
Bring Your Own Device Security and Privacy Legal Risks
Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Information Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
Updated Administration Proposal: Law Enforcement Provisions
Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber
No. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER
307 F.Supp.2d 521 United States District Court, S.D. New York. I.M.S. INQUIRY MANAGEMENT SYSTEMS, LTD., Plaintiff, v. BERKSHIRE INFORMATION SYSTEMS, INC., Defendant. BUCHWALD, District Judge. No. 03 Civ.
Sharing a VoiceThread
Sharing a VoiceThread Every VoiceThread is completely private by default, so you ll need to share it before anyone else can view it or comment on it. You can share your VoiceThread with one person, with
Handbook on Conducting Research on Social-Networking Websites in California 1
Handbook on Conducting Research on Social-Networking Websites in California 1 Created by David Lee and Shane Witnov 2 Samuelson Law, Technology & Public Policy Clinic, UC Berkeley School of Law for The
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:
What You Need to Know and What You Need to Do
South Central Wisconsin MLS Corporation 4801 Forest Run Road, Suite 101 Madison, WI 53704 Phone (608) 240-2800 Fax (608) 240-2801 What You Need to Know and What You Need to Do A Real Estate Broker s Risk
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas [email protected] (214) 880-8115 Michelle B. Brookshire Littler, Dallas [email protected]
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
MICHAEL D. WAKS LONG BEACH PERSONAL INJURY ATTORNEY
WHAT IS LEGAL MALPRACTICE IN CALIFORNIA? A client who sustains harm as a direct result of legal malpractice can file a civil lawsuit against the attorney who was responsible for causing that harm. MICHAEL
What Personally Identifiable Information does EducationDynamics collect?
EducationDynamics, LLC GradSchools.com Privacy Policy Thank you for visiting GradSchools.com (hereinafter referred to as the Site ), which is owned and/or operated, in whole or in part, by EducationDynamics,
Privacy Statement. Privacy Practices and Feedback
Privacy Practices and Feedback Privacy Statement Welcome to this website, a service of Questzones.net Inc (collectively, "Questzones." "we," or "us"). This statement discloses the privacy practices for
PROMOTION NAME: Boosterthon s Florida Prepaid Scholarship Contest ( Contest ) OFFICIAL RULES
PROMOTION NAME: Boosterthon s Florida Prepaid Scholarship Contest ( Contest ) DATES: Start 1/26/15; End 2/18/15 at 11:59 p.m. OFFICIAL RULES CONTEST IS OPEN TO ONLY LEGAL RESIDENTS OF THE STATE OF FLORIDA
False Claims and Whistleblower Protections All employees, volunteers, students, physicians, vendors and contractors
Policy and Procedure Title: Applies to: False Claims and Whistleblower Protections All employees, volunteers, students, physicians, vendors and contractors Number: First Created: 1/07 SY-CO-019 Issuing
OPENING INSTRUCTIONS
OPENING INSTRUCTIONS Members of the Jury: Respective Roles of Jurors and Judge You ve been chosen as jurors for this case, and you ve taken an oath to decide the facts fairly. As we begin the trial, I
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY
ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the
ELECTRONIC HEALTH RECORDS
ELECTRONIC HEALTH RECORDS Understanding and Using Computerized Medical Records CHAPTER TEN LESSON ONE Privacy and Security of Health Records Understanding HIPAA HIPAA: acronym for Health Insurance Portability
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
* IN THE. * CASE NO.: 24-C-04-007323 Defendant * * * * * * * * * * * * * * * * * * * * * * * MEMORANDUM
CAROL PRICE IN THE Plaintiff CIRCUIT COURT vs. FOR SINAI HOSPITAL OF BALTIMORE, INC. BALTIMORE CITY CASE NO.: 24-C-04-007323 Defendant MEMORANDUM This case comes before this Court on a Petition for Court
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Terms and Conditions:
Terms and Conditions: ENS, Plugpayplay and uservenet The current terms and conditions, 2010-08-01 1) Terms and Conditions: PlugPayPlay (trade mark of Easy Networking Solutions Ltd) reserve the right to
Optum Website Privacy Policy
Optum Website Privacy Policy 1 Privacy Website Privacy Policy Introduction We recognize that the privacy of your personal information is important. The purpose of this policy is to let you know how we
1. What information do we collect?
CHURNSPOTTER.IO PRIVACY POLICY Last updated: February 03, 2015 Welcome to the http://churnspotter.io Web site (the Site ) owned by PREDICSIS S.A.S, a corporation organized and existing under the laws of
Using ShopTab with an Affiliate Marketing Program
Using ShopTab with an Affiliate Marketing Program An affiliate marketing program can be a very effective way to drive revenues for a merchants and marketing networks by creating a large group of sellers
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the
30-14-1726. Definitions. As used in 30-14-1726 through 30-14-1736, the following definitions apply:
Montana Code Annotated Title 30 Trade and Commerce Chapter 14 Unfair Trade Practices and Consumer Protection 30-14-1726. Definitions. As used in 30-14-1726 through 30-14-1736, the following definitions
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
TERMS and CONDITIONS OF USE - NextSTEPS TM
TERMS and CONDITIONS OF USE - NextSTEPS TM DATED MARCH 24, 2014. These terms and conditions of use (the Terms and Conditions ) govern your use of the website known as NextSTEPS TM, https://www.stepsonline.ca/
2. "Consumer" means an individual. (same as 15 U.S.C. 1681a(c))
Combo security freeze bill with consensus areas. Where no consensus: AG language in left column, CDIA language in right column. In some cases, differences on specific points are identified in text of bill.
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING
Personal Injury Laws
CHAPTER 6 Chapter 6 Slide 1 Personal Injury Laws Lessons 6-1 Offenses Against Individuals 6-2 Intentional Torts, Negligence, and Strict Liability 6-3 Civil Procedure LESSON 6-1 Chapter 6 Slide 2 Offenses
Internet Marketing For Denver Law Firms
Internet Marketing For Denver Law Firms Table of Contents Overview... 3 Google AdWords Paid Search Ads... 6 Google Places... 9 Google Organic Search... 12 Other Internet Marketing Options... 15 Summary
COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers
COMPUTER FRAUD AND ABUSE ACT US Code as of: 01/05/99 Title 18 Sec. 1030. Fraud and related activity in connection with computers (a) Whoever - (1) having knowingly accessed a computer without authorization
Tracking Employees Via Mobile Devices: Legal or Not?
Tracking Employees Via Mobile Devices: Legal or Not? Aaron Turner President, IntegriCell Randy Sabett Counsel, ZwillGen PLLC Session ID: LAW W23 Session Classification: Intermediate This presentation is
Social Media Marketing Plan by Robert Middleton
1 Social Media Marketing Plan by Robert Middleton This plan is based on the interview with Jason Alba on Social Media and gives an outline of the steps he discusses in getting a social media plan into
Social Media Guidelines
MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with
Pinterest Beginner s Guide for Attorneys
Pinterest Beginner s Guide for Attorneys Are you looking for an additional source of website traffic and leads? Pinterest can deliver them. This guide will walk you through setting up your account, how
Small Business Guide to Monitoring your Online Reputation
Small Business Guide to Monitoring your Online Reputation Small Business Guide to Monitoring your Online Reputation Your customers are talking to each other, and to you. They are doing it in person, on
Social Media Friend or Foe?
12 Maryland Bar Journal March 2011 Social Media Friend or Foe? By Linda D. Schwartz Web 2.0 is a term used to describe Internet communications through interactive commentary or written discussions between
Understanding the Civil Involuntary Commitment Process
Understanding the Civil Involuntary Commitment Process About the Author By D. Renée Hildebrant http://www.okbar.org/obj/articles_05/021205.htm Oklahoma Bar Journal D. Renée Hildebrant is the trial court
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
a. Credit to be used primarily for personal, family, or household purposes. c. Any other purpose authorized under 15 U.S.C. 168l(b).
North Carolina General Statutes Article 2A Identity Theft Protection Act 75-61. Definitions. The following definitions apply in this Article: (1) "Business". A sole proprietorship, partnership, corporation,
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox ([email protected]) Peter D. Hardy ([email protected]) Robert Brandfass ([email protected]) (Mr. Brandfass
Website & Email Hosting Terms & Conditions
Website & Email Hosting Terms & Conditions 1-PARTIES Web Hosting Services are provided by TimeForCake Creative Media, Inc. ("TimeForCake") to Client conditional on the terms and conditions set forth below
ABUSE: HOW DO I REPORT ABUSE, NEGLECT, AND EXPLOITATION? GUIDELINES FOR DIRECT SUPPORT PROFESSIONALS WORKING IN THE INTELLECTUAL DISABILITIES SYSTEM
Disability Rights Network of Pennsylvania 1414 N. Cameron Street Second Floor Harrisburg, PA 17103-1049 (800) 692-7443 (Voice) (877) 375-7139 (TDD) www.drnpa.org ABUSE: HOW DO I REPORT ABUSE, NEGLECT,
FORMAL OPINION NO. 2013-189. Accessing Information about Third Parties Through a Social Networking Website. Facts:
FORMAL OPINION NO. 2013-189 Accessing Information about Third Parties Through a Social Networking Website Facts: Lawyer wishes to investigate an opposing party, a witness, or a juror by accessing the person
what your business needs to do about the new HIPAA rules
what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or
Verizon Wireless Family Locator 4.9 User Guide Contents
Verizon Wireless Family Locator.9 User Guide Contents Let s get started... Sign up, then activate phones!... Use the Activation Wizard... Set Up an Android... Set Up a BlackBerry... 6 Set Up a Feature...
Internet Service Provider Agreement
Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable
VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES. Health, Dental and Vision Benefits Health Care Reimbursement Account
VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
Social Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
JEWISH FAMILY SERVICE NOTICE OF PRIVACY PRACTICES
Jewish Family Service takes pride in treating our clients and each other with respect and dignity. Protecting your health information is very important to us. We want you to have a clear understanding
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
An act can be both a crime and a tort. Example reckless driving resulting in an accident
How Do Crimes and Torts Differ? A crime is an offense against society. It is a public wrong. A tort is a private or civil wrong. It is an offense against an individual. If someone commits a tort, the person
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
STOP SMART METERS. If a utility company installed a Smart Meter on your property or residence, you can do something about it. Who Can Take Action?
STOP SMART METERS If a utility company installed a Smart Meter on your property or residence, you can do something about it. 1. Owners of the property 2. People who reside in the property Who Can Take
3Degrees Group, Inc. Privacy Policy
3Degrees Group, Inc. Privacy Policy Your privacy is important to 3Degrees Group, Inc. ( 3Degrees ). The following Privacy Policy discloses the information practices followed by 3Degrees with respect to
The following is an excerpt from the 2012 Manual on Town Government. LIABILITY
Minnesota Association of Townships Document Number: RM1000 Information Library Revised: January 2012 The following is an excerpt from the 2012 Manual on Town Government. LIABILITY Any discussion of a town
Privacy Policy & Terms of Use Effective: 12/13/2011. Terms and Conditions. Changes in this Privacy Policy. Internet Privacy & Security
Privacy Policy & Terms of Use Effective: 12/13/2011 Terms and Conditions Schoology (the "Service") provided by Schoology, Inc. ("Schoology") with permission of your local school, local school district,
fraud, waste, abuse, compliance, integrity, Integrity Help Line
Policy / Procedure: KEY TERMS: fraud, waste, abuse, compliance, integrity, Integrity Help Line I. PURPOSE: To help our employees, agents and contractors understand the methods to prevent and detect fraud,
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
