Do Not Cross Crime Scene 1024x685 1

Prevent Employee Cyber Theft with Data Breach Prevention

 

Do Not Cross Crime Scene 1024x685 1

The Computer Fraud and Abuse Act CFAA is not a very widely known piece of federal legislation but could help companies that have been victims of employee or ex-employee theft of digital information.

According to an article over at Fox Rothschild LLP the CFAA can be used to help companies that have had employees or ex-employees steal or access unauthorized information.

You terminate an employee. Before you disable that employee’s login password, he downloads sensitive information to take with him. Ideally, that information is encrypted and can’t be read on any outside computer. But you never know what a capable hacker can do and once the information has been taken, the damage might be irreversible. The Computer Fraud and Abuse Act (CFAA) may be one way for employers to recover for their economic harm. Under the CFAA, an employee or former employee may be liable for obtaining information through intentional unauthorized access to the employer’s computer. Generally, if the person intends to defraud the employer and obtains any information worth $5,000 or more within a 1 year period, or causes damage or loss to the computer system, that person is liable for the employer’s economic harm.

CFAA has been successfully used in at least one case to protect an organization. And the employee or ex-employee doesn’t have to hack into the system. If they access a system where they know they should not be accessing they could face CFAA liability. CFAA is not limited to employees but also contractors and anyone else that has access to a company’s computer systems.

Recently at least one California court recognized that CFAA liability does not require circumvention of any technological barriers (i.e. hacking). CFAA liability can arise when an employee or former employee’s log-in information is still functioning, but: 1) the employee has lost permission to access the employer’s systems (i.e. his employment ended), 2) knows he does not have permission, and 3) logs in to obtain information anyway.

The best practice is to ensure that a detailed termination procedure is in place and that system access is terminated in a consistent timely manner.

badge w light burst white (1)
Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

More on blogs

Training That Sells: How Certifications Drive Revenue in 2026

Cybersecurity training is evolving beyond compliance. Today, MSPs can offer certifications in cybersecurity, AI awareness, and productivity tools that provide real professional value for end-users.

March Madness is Here and So is Our Full-Court Press in Cybersecurity

March Madness is all about preparation, strategy, and execution — and the same is true for cybersecurity in the age of AI. As threats accelerate,

When AI Hallucinates: What ‘The Pitt’ Reveals About Cybersecurity and the Power of Human Oversight 

AI-assisted tools promise efficiency in healthcare, but AI hallucinations can quietly introduce clinical and cybersecurity risk. As highlighted in The Pitt, human proof-checking and governance
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: