Computer trespass

Computer crime involving unlawful access to computers


title: "Computer trespass" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["computer-law"] description: "Computer crime involving unlawful access to computers" topic_path: "law" source: "https://en.wikipedia.org/wiki/Computer_trespass" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Computer crime involving unlawful access to computers ::

::figure[src="https://upload.wikimedia.org/wikipedia/commons/c/c4/Backlit_keyboard.jpg" caption="hacking]]."] ::

Computer trespass is a computer crime in the United States involving unlawful access to computers. It is defined under the Computer Fraud and Abuse Act. (U.S.C 18 § 1030)

Definition

A computer trespass is defined as accessing a computer without proper authorization and gaining financial information, information from a department or agency from any protected computer. Each state has its own laws regarding computer trespassing but they all echo the federal act in some manner.

Examples of state legislation

New York

To be found guilty of computer trespass in New York one must knowingly use a computer, computer service, or computer network without authorization and commit (or attempt) some further crime.{{quotation|§ 156.10 Computer trespass. :A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and: :1. he or she does so with an intent to commit or attempt to commit or further the commission of any felony; or :2. he or she thereby knowingly gains access to computer material. :Computer trespass is a class E felony.{{cite web | url =http://law.onecle.com/new-york/penal/PEN0156.10_156.10.html | title =New York Penal - Article 156 - § 156.10 Computer Trespass | last = | first = | date =15 February 2014 | website =www.onecle.com | publisher =onecle | access-date =12 May 2016 | quote = | archive-date =13 May 2016 | archive-url =https://web.archive.org/web/20160513175401/http://law.onecle.com/new-york/penal/PEN0156.10_156.10.html | url-status =live

Ohio

(A) No person shall knowingly use or operate the property of another without the consent of the owner or person authorized to give consent.

(B) No person, in any manner and by any means, including, but not limited to, computer hacking, shall knowingly gain access to, attempt to gain access to, or cause access to be gained to any computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service without the consent of, or beyond the scope of the express or implied consent of, the owner of the computer, computer system, computer network, cable service, cable system, telecommunications device, telecommunications service, or information service or other person authorized to give consent.

Punishment

Under federal law, the punishment for committing a computer trespass is imprisonment for no more than 10 or 20 years, depending on the severity of the crime committed. (subsection (a) (b) (c) (1) (A) (B))

Criticism of the Computer Fraud and Abuse act

Years after the CFAA was put into law, many have become uncomfortable with the law's language because of the drastic difference between today's technology and the technology of the 1980s. Legal scholars such as Orin Kerr and Tiffany Curtis have expressed such concerns. In one of Curtis's essays, "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform." She expresses how, with the passage of time, the CFAA becomes a more cruel law with the current language used in the act. She then suggests that the United States Congress should take the act into review and refer it to the Eighth Amendment to update the language to better fit modern law and society. Kerr wrote in his essay, "Trespass, Not Fraud: The Need for New Sentencing Guidelines in CFAA Cases," that since the language is so vague in the act, you could be punished in a way that doesn't reflect the crime you committed. He stresses how the language stresses the financial fraud language more than any other part in the law, leaving the rest vague in meaning.

Notable computer breaches

References

References

  1. "18 U.S. Code § 1030 - Fraud and related activity in connection with computers".
  2. "Lawriter - ORC - 2913.04 Unauthorized use of property - computer, cable, or telecommunication property.".
  3. "18 U.S. Code § 1030 - Fraud and related activity in connection with computers".
  4. "Computer Fraud and Abuse Act Enforcement: Cruel, Unusual, and Due for Reform {{!}} UW School of Law".

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

computer-law