Jump to content

Computer trespass

From Wikipedia, the free encyclopedia
Computer trespassing is very similar to hacking.

Computer trespass is a computer crime in the United States involving unlawful access to computers. It is defined under the Computer Fraud and Abuse Act. (U.S.C 18 § 1030)

Definition

[edit]

A computer trespass is defined as accessing a computer without proper authorization and gaining financial information, information from a department or agency from any protected computer.[1] Each state has its own laws regarding computer trespassing but they all echo the federal act in some manner.

Examples of state legislation

[edit]

New York

[edit]

To be found guilty of computer trespass in New York one must knowingly use a computer, computer service, or computer network without authorization and commit (or attempt) some further crime.

§ 156.10 Computer trespass.

A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and:
1. he or she does so with an intent to commit or attempt to commit or further the commission of any felony; or
2. he or she thereby knowingly gains access to computer material.
Computer trespass is a class E felony.[2]

Ohio

[edit]

(A) No person shall knowingly use or operate the property of another without the consent of the owner or person authorized to give consent.

(B) No person, in any manner and by any means, including, but not limited to, computer hacking, shall knowingly gain access to, attempt to gain access to, or cause access to be gained to any computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service without the consent of, or beyond the scope of the express or implied consent of, the owner of the computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service or other person authorized to give consent.[3]

Punishment

[edit]

Under federal law, the punishment for committing a computer trespass is imprisonment for no more than 10 or 20 years, depending on the severity of the crime committed.[4] (subsection (a) (b) (c) (1) (A) (B))

Criticism of the Computer Fraud and Abuse act

[edit]

Years after the CFAA was put into law, many have become uncomfortable with the law's language because of the drastic difference between today's technology and the technology of the 1980s. Legal scholars such as Orin Kerr and Tiffany Curtis have expressed such concerns. In one of Curtis's essays, "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform." She expresses how, with the passage of time, the CFAA becomes a more cruel law with the current language used in the act. She then suggests that the United States Congress should take the act into review and refer it to the Eighth Amendment to update the language to better fit modern law and society.[5] Kerr wrote in his essay, "Trespass, Not Fraud: The Need for New Sentencing Guidelines in CFAA Cases," that since the language is so vague in the act, you could be punished in a way that doesn't reflect the crime you committed. He stresses how the language stresses the financial fraud language more than any other part in the law, leaving the rest vague in meaning.

Notable computer breaches

[edit]

See also

[edit]

References

[edit]
  1. ^ "18 U.S. Code § 1030 - Fraud and related activity in connection with computers". LII / Legal Information Institute. Archived from the original on 2019-10-25. Retrieved 2018-10-22.
  2. ^ "New York Penal - Article 156 - § 156.10 Computer Trespass". www.onecle.com. onecle. 15 February 2014. Archived from the original on 13 May 2016. Retrieved 12 May 2016.
  3. ^ "Lawriter - ORC - 2913.04 Unauthorized use of property - computer, cable, or telecommunication property". codes.ohio.gov. Archived from the original on 2018-10-23. Retrieved 2018-10-22.
  4. ^ "18 U.S. Code § 1030 - Fraud and related activity in connection with computers". LII / Legal Information Institute. Archived from the original on 2019-10-25. Retrieved 2018-10-22.
  5. ^ "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform | UW School of Law". UW School of Law. Archived from the original on 2018-10-24. Retrieved 2018-10-22.