Computer trespass
Encyclopedia
Computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

 trespass
Trespass
Trespass is an area of tort law broadly divided into three groups: trespass to the person, trespass to chattels and trespass to land.Trespass to the person, historically involved six separate trespasses: threats, assault, battery, wounding, mayhem, and maiming...

is a computer crime
Computer crime
Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health...

 in Kansas
Kansas
Kansas is a US state located in the Midwestern United States. It is named after the Kansas River which flows through it, which in turn was named after the Kansa Native American tribe, which inhabited the area. The tribe's name is often said to mean "people of the wind" or "people of the south...

, North Carolina
North Carolina
North Carolina is a state located in the southeastern United States. The state borders South Carolina and Georgia to the south, Tennessee to the west and Virginia to the north. North Carolina contains 100 counties. Its capital is Raleigh, and its largest city is Charlotte...

, Oklahoma
Oklahoma
Oklahoma is a state located in the South Central region of the United States of America. With an estimated 3,751,351 residents as of the 2010 census and a land area of 68,667 square miles , Oklahoma is the 28th most populous and 20th-largest state...

, Pennsylvania
Pennsylvania
The Commonwealth of Pennsylvania is a U.S. state that is located in the Northeastern and Mid-Atlantic regions of the United States. The state borders Delaware and Maryland to the south, West Virginia to the southwest, Ohio to the west, New York and Ontario, Canada, to the north, and New Jersey to...

, Rhode Island
Rhode Island
The state of Rhode Island and Providence Plantations, more commonly referred to as Rhode Island , is a state in the New England region of the United States. It is the smallest U.S. state by area...

, Tennessee
Tennessee
Tennessee is a U.S. state located in the Southeastern United States. It has a population of 6,346,105, making it the nation's 17th-largest state by population, and covers , making it the 36th-largest by total land area...

, Virginia
Virginia
The Commonwealth of Virginia , is a U.S. state on the Atlantic Coast of the Southern United States. Virginia is nicknamed the "Old Dominion" and sometimes the "Mother of Presidents" after the eight U.S. presidents born there...

, and Washington.

Virginia

In Virginia, computer trespass consists of, with malicious intent
Malice (legal term)
Malice is a legal term referring to a party's intention to do injury to another party. Malice is either expressed or implied. Malice is expressed when there is manifested a deliberate intention unlawfully to take away the life of a human being...

, copying, altering, or erasing data from a computer, causing a computer to malfunction, causing an electronic funds transfer
Electronic funds transfer
Electronic funds transfer is the electronic exchange or transfer of money from one account to another, either within a single financial institution or across multiple institutions, through computer-based systems....

, etc. The element of "malicious" intent was added by the Virginia General Assembly
Virginia General Assembly
The Virginia General Assembly is the legislative body of the Commonwealth of Virginia, and the oldest legislative body in the Western Hemisphere, established on July 30, 1619. The General Assembly is a bicameral body consisting of a lower house, the Virginia House of Delegates, with 100 members,...

 in 2005 by House Bill 2215. Civil liability can be imposed regardless of intent under the terms of § 18.2-152.12. The law bans unauthorized installation and use of software keyloggers but not specifically hardware keylogger
Hardware keylogger
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer...

s. There are felony
Felony
A felony is a serious crime in the common law countries. The term originates from English common law where felonies were originally crimes which involved the confiscation of a convicted person's land and goods; other crimes were called misdemeanors...

provisions if damage is caused of $1,000 or more, or if software is installed in violation of this law on more than five computers of another.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK