Sentences with phrase «exceeds authorized access»

Whoever -LSB-...] intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains -LSB-...] information from any protected computer -LSB-...] shall be punished as provided in subsection (c) of this section.
While there is a long list of charges (a copy of the 15 page indictment from the US District Court can be found here), the charge that has generated the most online debate is «intentionally accesses a computer without authorization or exceeds authorized access» 18 U.S.C. ยง 1030 (a)(2).
Another possibility is the Computer Fraud and Abuse Act (CFAA); it broadly prohibits gaining unauthorized access (or exceeding authorized access) to computer systems.
Does downloading a video in flagrant disregard for youtube's ToS (more on that later) constitute «exceeding authorized access» or «gaining unauthorized access?»
The reference to «computer intrusion» is not precise, but may mean that they suspect a violation of some provision of 18 USC 1030, which makes it a federal crime to access a computer without authorization, or to exceed authorized access, under certain circumstances and for certain purposes.
They rejected the reasonable expectations test used for determining exceeded authorized access, stating,
«It is a crime for anyone to exceed their authorized access to a computer or computer network or system,» explained Martin Hellmer, a supervisory special agent for the FBI, in a recent Realty Executives webinar on wire fraud.

Not exact matches

You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
(1) Every person who contravenes subsection 110 (1)(identity of offender not to be published), 111 (1)(identity of victim or witness not to be published), 118 (1)(no access to records unless authorized) or 128 (3)(disposal of R.C.M.P. records) or section 129 (no subsequent disclosure) of this Act, or subsection 38 (1)(identity not to be published), (1.12)(no subsequent disclosure), (1.14)(no subsequent disclosure by school) or (1.15)(information to be kept separate), 45 (2)(destruction of records) or 46 (1)(prohibition against disclosure) of the Young Offenders Act, chapter Y - 1 of the Revised Statutes of Canada, 1985, (a) is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years; or (b) is guilty of an offence punishable on summary conviction.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the of the situation; and 6) the client's instructions and circumstances, such as access by others to the client's devices and communications.
Before using a particular technology in the course of representing a client, an attorney must take appropriate steps to evaluate: 1) the level of security attendant to the use of that technology, including whether reasonable precautions may be taken when using the technology to increase the level of security; 2) the legal ramifications to a third party who intercepts, accesses or exceeds authorized use of the electronic information; 3) the degree of sensitivity of the information; 4) the possible impact on the client of an inadvertent disclosure of privileged or confidential information or work product; 5) the urgency of the situation; and 6) the client โ€Ÿ s instructions and circumstances, such as access by others to the client โ€Ÿ s devices and communications.
The question, then, is whether the access described in the question is «unauthorized,» or constitutes «exceed [ing] authorized access
intentionally access [ing] a computer without authorization or exceed [ing] authorized access, and thereby obtain [ing]... information from any protected computer
a b c d e f g h i j k l m n o p q r s t u v w x y z