ARTICLE
14 July 2021

New Decision Narrows Scope Of Georgia Computer Trespass Statute

SM
Sheppard Mullin Richter & Hampton

Contributor

Sheppard Mullin is a full service Global 100 firm with over 1,000 attorneys in 16 offices located in the United States, Europe and Asia. Since 1927, companies have turned to Sheppard Mullin to handle corporate and technology matters, high stakes litigation and complex financial transactions. In the US, the firm’s clients include more than half of the Fortune 100.
The Georgia Supreme Court recently concluded that Georgia's equivalent of the CFAA should be viewed narrowly, similar to the US Supreme Court's recent, similar decision in Van Buren.
United States Georgia Technology

The Georgia Supreme Court recently concluded that Georgia's equivalent of the CFAA should be viewed narrowly, similar to the US Supreme Court's recent, similar decision in Van Buren. In Kinslow v. State, the Georgia Supreme Court held that even if there is unauthorized use of a computer or computer network, there must be enough evidence to prove that the defendant used the computer network knowingly without authority and with the intention of obstructing or interfering with the use of data.

The court acknowledged that in the case at hand, the defendant lacked authority when he altered his employer's computer network settings in such a way that his supervisor's emails were forwarded to defendant's personal email address. However, there was not enough evidence to prove that the defendant had the intention to obstruct or interfere with the flow of data in the form of emails, as the supervisor still received emails that were intended for him. The court went through a deep analysis of each of the elements of the statute. Applying the canons of construction, it found that there must be evidence of the intention to obstruct and interfere, which was lacking in this case. As a result, the court overturned the defendant's felony conviction under Georgia's computer trespass law.

Putting It Into Practice: This case shows that the scope of state computer trespass/fraud statutes may be narrowed, similar to the narrowed scope of CFAA.  As we noted following the Van Buren  decision, companies should think about regularly auditing and updating access rights to their IT systems.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More