Talk:Legality of piggybacking: Difference between revisions
added belgium |
m Maintain {{WPBS}} and vital articles: 2 WikiProject templates. Create {{WPBS}}. Keep majority rating "C" in {{WPBS}}. Remove 2 same ratings as {{WPBS}} in {{WikiProject Law}}, {{WikiProject Computer Security}}. Tag: |
||
(9 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
{{WikiProject banner shell|class=C| |
|||
{{WikiProject Law |importance=Low}} |
|||
{{WikiProject Computer Security |importance= }} |
|||
}} |
|||
{{SubArticle|Piggybacking (internet access)}} |
{{SubArticle|Piggybacking (internet access)}} |
||
Line 16: | Line 20: | ||
|other= |
|other= |
||
}} |
}} |
||
==Host vulnerable== |
==Host vulnerable== |
||
Has any host ever been held civilly liable, criminally culpable, or otherwise legally responsible for the actions of a piggybacker? [[User:Jim.henderson|Jim.henderson]] ([[User talk:Jim.henderson|talk]]) 03:42, 23 February 2008 (UTC) |
Has any host ever been held civilly liable, criminally culpable, or otherwise legally responsible for the actions of a piggybacker? [[User:Jim.henderson|Jim.henderson]] ([[User talk:Jim.henderson|talk]]) 03:42, 23 February 2008 (UTC) |
||
Line 45: | Line 50: | ||
:§ 156.05 Unauthorized use of a computer. |
:§ 156.05 Unauthorized use of a computer. |
||
:<blockquote> A person is guilty of unauthorized use of a computer when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization. |
:<blockquote> A person is guilty of unauthorized use of a computer when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization.</blockquote> |
||
:<blockquote> Unauthorized use of a computer is a class A misdemeanor. |
:<blockquote> Unauthorized use of a computer is a class A misdemeanor. |
||
</blockquote> |
</blockquote> |
||
Line 51: | Line 56: | ||
:156.00(8), defining "unauthorized," reads: |
:156.00(8), defining "unauthorized," reads: |
||
:<blockquote>8. "Without authorization" means to use or to access a computer, computer service or computer network without the permission of the owner or lessor or someone licensed or privileged by the owner or lessor where such person knew that his or her use or access was without permission or after actual notice to such person that such use or access was without permission. It shall also mean the access of a computer service by a person without permission where such person knew that such access was without permission or after actual notice to such person, that such access was without permission. |
:<blockquote>8. "Without authorization" means to use or to access a computer, computer service or computer network without the permission of the owner or lessor or someone licensed or privileged by the owner or lessor where such person knew that his or her use or access was without permission or after actual notice to such person that such use or access was without permission. It shall also mean the access of a computer service by a person without permission where such person knew that such access was without permission or after actual notice to such person, that such access was without permission.</blockquote> |
||
:<blockquote> Proof that such person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that bypasses, defrauds or otherwise circumvents a security measure installed or used with the user's authorization on the computer, computer service or computer network shall be presumptive evidence that such person used or accessed such computer, computer service or computer network without authorization. |
:<blockquote> Proof that such person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that bypasses, defrauds or otherwise circumvents a security measure installed or used with the user's authorization on the computer, computer service or computer network shall be presumptive evidence that such person used or accessed such computer, computer service or computer network without authorization. |
||
</blockquote> |
</blockquote> |
||
Line 58: | Line 63: | ||
== Belgium == |
== Belgium == |
||
I would update the article to state that piggybacking is illegal in Belgium, but I don't have a good enough source. I'm putting a weak source here, in case someone wants to follow this case and make a proper update later: http://www.anti-malware.info/weblog/2008/10/piggybacking-is-not-allowed-in-belgium.html |
I would update the article to state that piggybacking is illegal in Belgium, but I don't have a good enough source. I'm putting a weak source here, in case someone wants to follow this case and make a proper update later: http://www.anti-malware.info/weblog/2008/10/piggybacking-is-not-allowed-in-belgium.html <span style="font-size: smaller;" class="autosigned">—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/216.93.191.240|216.93.191.240]] ([[User talk:216.93.191.240|talk]]) 20:49, 7 November 2008 (UTC)</span><!-- Template:UnsignedIP --> <!--Autosigned by SineBot--> |
||
What the hell? The link is perfect! Piggyback = theft. <span style="font-size: smaller;" class="autosigned">—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/187.34.75.142|187.34.75.142]] ([[User talk:187.34.75.142|talk]]) 17:55, 11 January 2011 (UTC)</span><!-- Template:UnsignedIP --> <!--Autosigned by SineBot--> |
|||
== External links modified == |
|||
Hello fellow Wikipedians, |
|||
I have just modified one external link on [[Legality of piggybacking]]. Please take a moment to review [https://en.wikipedia.org/enwiki/w/index.php?diff=prev&oldid=781417584 my edit]. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit [[User:Cyberpower678/FaQs#InternetArchiveBot|this simple FaQ]] for additional information. I made the following changes: |
|||
*Added archive https://web.archive.org/web/20080307063609/http://www.canlii.org/ca/sta/c-46/sec342.1.html to http://www.canlii.org/ca/sta/c-46/sec342.1.html |
|||
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs. |
|||
{{sourcecheck|checked=false|needhelp=}} |
|||
Cheers.—[[User:InternetArchiveBot|'''<span style="color:darkgrey;font-family:monospace">InternetArchiveBot</span>''']] <span style="color:green;font-family:Rockwell">([[User talk:InternetArchiveBot|Report bug]])</span> 03:36, 21 May 2017 (UTC) |
|||
== External links modified == |
|||
Hello fellow Wikipedians, |
|||
I have just modified 7 external links on [[Legality of piggybacking]]. Please take a moment to review [[special:diff/816233107|my edit]]. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit [[User:Cyberpower678/FaQs#InternetArchiveBot|this simple FaQ]] for additional information. I made the following changes: |
|||
*Added archive https://web.archive.org/web/20070926221850/http://www.todayonline.com/articles/166274.asp to http://www.todayonline.com/articles/166274.asp |
|||
*Added archive https://web.archive.org/web/20070929120544/http://www.todayonline.com/articles/170699.asp to http://www.todayonline.com/articles/170699.asp |
|||
*Added archive http://webarchive.loc.gov/all/20090429232149/http://www.ncsl.org/programs/lis/cip/hacklaw.htm to http://www.ncsl.org/programs/lis/cip/hacklaw.htm |
|||
*Added archive https://web.archive.org/web/20070525103850/http://www.techweb.com/wire/183702832 to http://www.techweb.com/wire/183702832 |
|||
*Added archive https://web.archive.org/web/20070930210610/http://www.libraryjournal.com/article/CA6423269.html to http://www.libraryjournal.com/article/CA6423269.html |
|||
*Corrected formatting/usage for http://www.westchestergov.com/idtheft/wifilaw.htm |
|||
*Added archive https://web.archive.org/web/20071112055717/http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/ to http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/ |
|||
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs. |
|||
{{sourcecheck|checked=false|needhelp=}} |
|||
Cheers.—[[User:InternetArchiveBot|'''<span style="color:darkgrey;font-family:monospace">InternetArchiveBot</span>''']] <span style="color:green;font-family:Rockwell">([[User talk:InternetArchiveBot|Report bug]])</span> 03:01, 20 December 2017 (UTC) |
Latest revision as of 02:58, 5 February 2024
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
This subarticle is kept separate from the main article, Piggybacking (internet access), due to size or style considerations. |
|
Here are some tasks awaiting attention:
|
Host vulnerable
[edit]Has any host ever been held civilly liable, criminally culpable, or otherwise legally responsible for the actions of a piggybacker? Jim.henderson (talk) 03:42, 23 February 2008 (UTC)
ipod
[edit]"Somes portable devices, such as the Apple iPod touch, allow on-street-hopping on open Wifi networks as a basic feature, and even use it for user geolocation.[specify]"
What does this mean, and why is it in the United States section? — Omegatron 06:20, 8 March 2008 (UTC)
Laws in each state
[edit]I obtained the information in the chart shown here mostly from one of the references provided Hellno2 (talk) 23:04, 10 March 2008 (UTC)
- Then reference it — Omegatron 22:56, 12 March 2008 (UTC)
- Please explain how you created this table. Provide a reference for the information in the table, meaning a reference that says "piggybacking is legal in Alabama, illegal in Alaska", etc. I don't see this information in either reference 1 or 16, which are the only ones near the table. — Omegatron 23:34, 13 March 2008 (UTC)
- I've removed the table again. Please provide a real source before replacing it. — Omegatron 14:30, 15 March 2008 (UTC)
New York Law
[edit]Though a lot of the sources suggest that New York law only criminalizes access in defiance of a security scheme (like breaking encryption or sniffing a key), I don't see language in the laws to back it up. I think it has been amended. 156.00 and 156.05 suggest that piggybacking is illegal in New York State. Am I wrong? Krapitino (talk) 15:27, 11 August 2008 (UTC)
- I checked this out with an NYS Assembly member, and they confirmed that the law had been changed, but could not give me a date. I would consider the date to be 2005 at the earliest. This is based on the publication dates of the articles in used as sources (the 2006 OSU law review article, cited resource 1, quotes a 1999 copy of New York Penal Code and the other source was 2004), and that an NYS Office of the Attorney General legislative recommendation from 2005[1] describes desired changes to Penal Code section 156. Some of these changes were adopted and some were not, and some changes not mentioned were made.
- If someone better at Wiki than I wants to update sources or rewrite the section, feel free, but a reversion would be incorrect.
- § 156.05 Unauthorized use of a computer.
A person is guilty of unauthorized use of a computer when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization.
Unauthorized use of a computer is a class A misdemeanor.
- 156.00(8), defining "unauthorized," reads:
8. "Without authorization" means to use or to access a computer, computer service or computer network without the permission of the owner or lessor or someone licensed or privileged by the owner or lessor where such person knew that his or her use or access was without permission or after actual notice to such person that such use or access was without permission. It shall also mean the access of a computer service by a person without permission where such person knew that such access was without permission or after actual notice to such person, that such access was without permission.
Proof that such person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that bypasses, defrauds or otherwise circumvents a security measure installed or used with the user's authorization on the computer, computer service or computer network shall be presumptive evidence that such person used or accessed such computer, computer service or computer network without authorization.
Belgium
[edit]I would update the article to state that piggybacking is illegal in Belgium, but I don't have a good enough source. I'm putting a weak source here, in case someone wants to follow this case and make a proper update later: http://www.anti-malware.info/weblog/2008/10/piggybacking-is-not-allowed-in-belgium.html —Preceding unsigned comment added by 216.93.191.240 (talk) 20:49, 7 November 2008 (UTC)
What the hell? The link is perfect! Piggyback = theft. —Preceding unsigned comment added by 187.34.75.142 (talk) 17:55, 11 January 2011 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified one external link on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20080307063609/http://www.canlii.org/ca/sta/c-46/sec342.1.html to http://www.canlii.org/ca/sta/c-46/sec342.1.html
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 03:36, 21 May 2017 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified 7 external links on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20070926221850/http://www.todayonline.com/articles/166274.asp to http://www.todayonline.com/articles/166274.asp
- Added archive https://web.archive.org/web/20070929120544/http://www.todayonline.com/articles/170699.asp to http://www.todayonline.com/articles/170699.asp
- Added archive http://webarchive.loc.gov/all/20090429232149/http://www.ncsl.org/programs/lis/cip/hacklaw.htm to http://www.ncsl.org/programs/lis/cip/hacklaw.htm
- Added archive https://web.archive.org/web/20070525103850/http://www.techweb.com/wire/183702832 to http://www.techweb.com/wire/183702832
- Added archive https://web.archive.org/web/20070930210610/http://www.libraryjournal.com/article/CA6423269.html to http://www.libraryjournal.com/article/CA6423269.html
- Corrected formatting/usage for http://www.westchestergov.com/idtheft/wifilaw.htm
- Added archive https://web.archive.org/web/20071112055717/http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/ to http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 03:01, 20 December 2017 (UTC)
- C-Class law articles
- Low-importance law articles
- WikiProject Law articles
- C-Class Computer Security articles
- Unknown-importance Computer Security articles
- C-Class Computer Security articles of Unknown-importance
- C-Class Computing articles
- Unknown-importance Computing articles
- All Computing articles
- All Computer Security articles