Knowledge (XXG)

Computer trespass

Source 📝

272:(B) No person, in any manner and by any means, including, but not limited to, computer hacking, shall knowingly gain access to, attempt to gain access to, or cause access to be gained to any computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service without the consent of, or beyond the scope of the express or implied consent of, the owner of the computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service or other person authorized to give consent. 66: 102: 178: 25: 307:
to update the language to better fit modern law and society. Kerr wrote in his essay, "Trespass, Not Fraud: The Need for New Sentencing Guidelines in CFAA Cases," that since the language is so vague in the act, you could be punished in a way that doesn't reflect the crime you committed. He stresses
216:
A computer trespass is defined as accessing a computer without proper authorization and gaining financial information, information from a department or agency from any protected computer. Each state has its own laws regarding computer trespassing but they all echo the federal act in some manner.
298:
have expressed such concerns. In one of Curtis's essays, "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform." She expresses how, with the passage of time, the CFAA becomes a more cruel law with the current language used in the act. She then suggests that the
280:
Under federal law, the punishment for committing a computer trespass is imprisonment for no more than 10 or 20 years, depending on the severity of the crime committed. (subsection (a) (b) (c) (1) (A) (B))
289:
Years after the CFAA was put into law, many have become uncomfortable with the law's language because of the drastic difference between today's technology and the technology of the 1980s. Legal scholars such as
250:
A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and:
482: 364: 304: 112: 269:(A) No person shall knowingly use or operate the property of another without the consent of the owner or person authorized to give consent. 38: 164: 146: 52: 308:
how the language stresses the financial fraud language more than any other part in the law, leaving the rest vague in meaning.
344: 201: 182: 128: 205: 332: 253:
1. he or she does so with an intent to commit or attempt to commit or further the commission of any felony; or
317: 300: 124: 44: 512: 435:"Lawriter - ORC - 2913.04 Unauthorized use of property - computer, cable, or telecommunication property" 359: 322: 295: 483:"Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform | UW School of Law" 327: 408: 349: 235: 79:
Please help update this article to reflect recent events or newly available information.
193: 506: 197: 458: 384: 459:"18 U.S. Code § 1030 - Fraud and related activity in connection with computers" 385:"18 U.S. Code § 1030 - Fraud and related activity in connection with computers" 177: 354: 291: 231: 434: 234:
in New York one must knowingly use a computer, computer service, or
256:
2. he or she thereby knowingly gains access to computer material.
200:
involving unlawful access to computers. It is defined under the
95: 59: 18: 409:"New York Penal - Article 156 - § 156.10 Computer Trespass" 120: 16:
Computer crime involving unlawful access to computers
303:
should take the act into review and refer it to the
365:National Information Infrastructure Protection Act 244: 285:Criticism of the Computer Fraud and Abuse act 109:The examples and perspective in this article 8: 53:Learn how and when to remove these messages 165:Learn how and when to remove this message 147:Learn how and when to remove this message 181:Computer trespassing is very similar to 176: 376: 242:commit (or attempt) some further crime. 259:Computer trespass is a class E felony. 7: 14: 463:LII / Legal Information Institute 389:LII / Legal Information Institute 34:This article has multiple issues. 100: 64: 23: 230:To be found guilty of computer 42:or discuss these issues on the 1: 221:Examples of state legislation 345:Computer Fraud and Abuse Act 246:§ 156.10 Computer trespass. 202:Computer Fraud and Abuse act 123:, discuss the issue on the 529: 415:. onecle. 15 February 2014 312:Notable computer breaches 73:This article needs to be 333:2017 Equifax data breach 328:2013 Target data breach 318:2013 Yahoo! data breach 301:United States Congress 262: 238:without authorization 186: 360:List of data breaches 323:2014 eBay data breach 180: 129:create a new article 121:improve this article 111:may not represent a 187: 350:Computer security 190:Computer trespass 175: 174: 167: 157: 156: 149: 131:, as appropriate. 94: 93: 57: 520: 497: 496: 494: 493: 487:UW School of Law 479: 473: 472: 470: 469: 455: 449: 448: 446: 445: 431: 425: 424: 422: 420: 405: 399: 398: 396: 395: 381: 305:Eighth Amendment 236:computer network 170: 163: 152: 145: 141: 138: 132: 104: 103: 96: 89: 86: 80: 68: 67: 60: 49: 27: 26: 19: 528: 527: 523: 522: 521: 519: 518: 517: 503: 502: 501: 500: 491: 489: 481: 480: 476: 467: 465: 457: 456: 452: 443: 441: 433: 432: 428: 418: 416: 407: 406: 402: 393: 391: 383: 382: 378: 373: 341: 314: 287: 278: 267: 228: 223: 214: 171: 160: 159: 158: 153: 142: 136: 133: 118: 105: 101: 90: 84: 81: 78: 69: 65: 28: 24: 17: 12: 11: 5: 526: 524: 516: 515: 505: 504: 499: 498: 474: 450: 439:codes.ohio.gov 426: 413:www.onecle.com 400: 375: 374: 372: 369: 368: 367: 362: 357: 352: 347: 340: 337: 336: 335: 330: 325: 320: 313: 310: 296:Tiffany Curtis 286: 283: 277: 274: 266: 263: 261: 260: 257: 254: 251: 227: 224: 222: 219: 213: 210: 194:computer crime 173: 172: 155: 154: 115:of the subject 113:worldwide view 108: 106: 99: 92: 91: 72: 70: 63: 58: 32: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 525: 514: 511: 510: 508: 488: 484: 478: 475: 464: 460: 454: 451: 440: 436: 430: 427: 414: 410: 404: 401: 390: 386: 380: 377: 370: 366: 363: 361: 358: 356: 353: 351: 348: 346: 343: 342: 338: 334: 331: 329: 326: 324: 321: 319: 316: 315: 311: 309: 306: 302: 297: 293: 284: 282: 275: 273: 270: 264: 258: 255: 252: 249: 248: 247: 243: 241: 237: 233: 225: 220: 218: 211: 209: 207: 203: 199: 198:United States 195: 191: 184: 179: 169: 166: 151: 148: 140: 130: 126: 122: 116: 114: 107: 98: 97: 88: 76: 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 513:Computer law 490:. Retrieved 486: 477: 466:. Retrieved 462: 453: 442:. Retrieved 438: 429: 417:. Retrieved 412: 403: 392:. Retrieved 388: 379: 288: 279: 271: 268: 245: 239: 229: 215: 189: 188: 161: 143: 134: 110: 82: 74: 50: 43: 37: 36:Please help 33: 492:2018-10-22 468:2018-10-22 444:2018-10-22 394:2018-10-22 371:References 355:Cybercrime 276:Punishment 212:Definition 137:March 2016 85:March 2016 39:improve it 292:Orin Kerr 125:talk page 45:talk page 507:Category 339:See also 232:trespass 226:New York 208:§ 1030) 206:U.S.C 18 119:You may 196:in the 183:hacking 75:updated 419:12 May 192:is a 127:, or 421:2016 294:and 265:Ohio 240:and 204:. ( 509:: 485:. 461:. 437:. 411:. 387:. 48:. 495:. 471:. 447:. 423:. 397:. 185:. 168:) 162:( 150:) 144:( 139:) 135:( 117:. 87:) 83:( 77:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
worldwide view
improve this article
talk page
create a new article
Learn how and when to remove this message
Learn how and when to remove this message

hacking
computer crime
United States
Computer Fraud and Abuse act
U.S.C 18
trespass
computer network
Orin Kerr
Tiffany Curtis
United States Congress
Eighth Amendment
2013 Yahoo! data breach
2014 eBay data breach
2013 Target data breach
2017 Equifax data breach
Computer Fraud and Abuse Act
Computer security
Cybercrime
List of data breaches
National Information Infrastructure Protection Act

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.