From: smb@research.att.com
To: “L. Detweiler” <ld231782@longs.lance.colostate.edu>
Message Hash: e0bb139e97a87a9e6e31eab63ddd79ffc02956e54c6c7ca8adcf56bcccac5bf8
Message ID: <9310041054.AA10031@toad.com>
Reply To: N/A
UTC Datetime: 1993-10-04 10:54:38 UTC
Raw Date: Mon, 4 Oct 93 03:54:38 PDT
From: smb@research.att.com
Date: Mon, 4 Oct 93 03:54:38 PDT
To: "L. Detweiler" <ld231782@longs.lance.colostate.edu>
Subject: Re: FBI on BBS operator liability (fwd)
Message-ID: <9310041054.AA10031@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
(just utilizing resources is not prosecutable).
It's worth mentioning that that's true of Federal law, but isn't
necessarily true of state law. For example, California Penal Code
section 502 provides for the conviction of anyone who ``knowingly and
without permission accesses or causes to be accessed any computer,
computer system, or computer network''. Some other states have similar
provisions.
--Steve Bellovin
Return to October 1993
Return to “smb@research.att.com”
1993-10-04 (Mon, 4 Oct 93 03:54:38 PDT) - Re: FBI on BBS operator liability (fwd) - smb@research.att.com