Class 5 : Electronic Intercepts & Access to Stored Data Flashcards
In order to violate 18 USC 1030(a)(2)(C), what MUST be done intentionally
**Intentionally applies to “accesses a computer without authorization”
**Intentionally applies to “exceeds authorized access”
**Intentionally does not apply to “and thereby obtains… information from any protected computer”
Two Ways Courts View Access
Entry and interaction
Entry
You did not access a computer unless you actually entered.
Interaction
You did not access until you in some way interacted with the computer.
What is a protected computer?
A computer either Exclusively used or that use is Affected by or for
- *A FINANCIAL INSTITUTION
- The US GOVERNMENT
A computer used IN OR Affecting
- Interstate (commerce or communication) or
- Foreign ( commerce or communication of the United States)
What are the two “prongs” both of which are necessary to violate 18 USC 1030(a)(2)
**Access - **protected computer
Wiretapping and Electronic Surveillance “Intercept”
“Intercept” means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device
18 USC 2510(4)
Intercept
- ** Using a device
- **Acquire the contents of a communication
- ** That communication must be
- ** The acquisition must be contemporaneous with the transmission
Device
an object, machine, or piece of equipment that has been made for some special purpose