CYBERCRIME'S SCOPE: INTERPRETING "ACCESS" AND "AUTHORIZATION" IN COMPUTER MISUSE STATUTES
It is long, but it goes into the case-law surrounding the words "access" and "authorization". Two words that appear in pretty much all Computer Security laws on the book. The interpretation of said is very tricky, and as of 2003 very inconsistant. Very recommneded read!
It is long, but it goes into the case-law surrounding the words "access" and "authorization". Two words that appear in pretty much all Computer Security laws on the book. The interpretation of said is very tricky, and as of 2003 very inconsistant. Very recommneded read!