Computer trespass

Computer trespass is a computer crime in Kansas, North Carolina, New York,[1] Oklahoma, Pennsylvania, Rhode Island, Tennessee, Virginia, and Washington.[2]

New York

To be found guilty of computer trespass in New York one must knowingly use a computer, computer service, or computer network without authorization and commit (or attempt) some further crime.

§ 156.10 Computer trespass.
A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and:
1. he or she does so with an intent to commit or attempt to commit or further the commission of any felony; or
2. he or she thereby knowingly gains access to computer material.
Computer trespass is a class E felony.[3]

Virginia

In Virginia, computer trespass consists of, with malicious intent, copying, altering, or erasing data from a computer, causing a computer to malfunction, causing an electronic funds transfer, etc.[4] The element of "malicious" intent was added by the Virginia General Assembly in 2005 by House Bill 2215.[5] Civil liability can be imposed regardless of intent under the terms of § 18.2-152.12.[6] The law bans unauthorized installation and use of software keyloggers but not specifically hardware keyloggers. There are felony provisions if damage is caused of $1,000 or more, or if software is installed in violation of this law on more than five computers of another.

References

  1. "New York Penal - Article 156 - § 156.10". Retrieved 8 May 2013.
  2. Statutes by State - Computer Trespass.
  3. "New York Penal - Article 156 - § 156.10 Computer Trespass". http://www.onecle.com/. onecle. 15 February 2014. Retrieved 12 May 2016. External link in |website= (help)
  4. § 18.2-152.4, Code of Virginia.
  5. House Bill 2215, Virginia General Assembly.
  6. § 18.2-152.12, Code of Virginia.

See also


This article is issued from Wikipedia - version of the 9/17/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.