1993-10-04 - Re: FBI on BBS operator liability (fwd)

Header Data

From: smb@research.att.com
To: “L. Detweiler” <ld231782@longs.lance.colostate.edu>
Message Hash: e0bb139e97a87a9e6e31eab63ddd79ffc02956e54c6c7ca8adcf56bcccac5bf8
Message ID: <9310041054.AA10031@toad.com>
Reply To: N/A
UTC Datetime: 1993-10-04 10:54:38 UTC
Raw Date: Mon, 4 Oct 93 03:54:38 PDT

Raw message

From: smb@research.att.com
Date: Mon, 4 Oct 93 03:54:38 PDT
To: "L. Detweiler" <ld231782@longs.lance.colostate.edu>
Subject: Re: FBI on BBS operator liability (fwd)
Message-ID: <9310041054.AA10031@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


	 (just utilizing resources is not prosecutable).

It's worth mentioning that that's true of Federal law, but isn't
necessarily true of state law.  For example, California Penal Code
section 502 provides for the conviction of anyone who ``knowingly and
without permission accesses or causes to be accessed any computer,
computer system, or computer network''.  Some other states have similar
provisions.

			--Steve Bellovin





Thread