How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Dwayne B. Your Own Question
Dwayne B.
Dwayne B., Attorney
Category: Legal
Satisfied Customers: 32775
Experience:  Began practicing law in 1992
11068102
Type Your Legal Question Here...
Dwayne B. is online now
A new question is answered every 9 seconds

What proof is required (what conditions need to be met) to consider so

Customer Question

What proof is required (what conditions need to be met) to consider someone guilty for computer trespass versus not meeting the requirements?
Submitted: 3 years ago.
Category: Legal
Expert:  Dwayne B. replied 3 years ago.

JD 1992 :

Hello, and thank you for contacting Just Answer. I am an expert here and I look forward to assisting you today.

JD 1992 :

First they have to prove a malicious intent on the part of the trespasser.

JD 1992 :

Then, they have to have done of the following:

JD 1992 :













prev | next

 


§ 18.2-152.4. Computer trespass; penalty.


A. It shall be unlawful for any person, with malicious intent, to:


1. Temporarily or permanently remove, halt, or otherwise disable any computer data, computer programs or computer software from a computer or computer network;


2. Cause a computer to malfunction, regardless of how long the malfunction persists;


3. Alter, disable, or erase any computer data, computer programs or computer software;


4. Effect the creation or alteration of a financial instrument or of an electronic transfer of funds;


5. Use a computer or computer network to cause physical injury to the property of another;


6. Use a computer or computer network to make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs or computer software residing in, communicated by, or produced by a computer or computer network;


7. [Repealed.]


8. Install or cause to be installed, or collect information through, computer software that records all or a majority of the keystrokes made on the computer of another without the computer owner's authorization; or


9. Install or cause to be installed on the computer of another, computer software for the purpose of (i) taking control of that computer so that it can cause damage to another computer or (ii) disabling or disrupting the ability of the computer to share or transmit instructions or data to other computers or to any related computer equipment or devices, including but not limited to printers, scanners, or fax machines.


JD 1992 :

The 1-9 parts.

JD 1992 :

If they do any of those then they have committed the crime.

JD 1992 :

The website is showing you are offline so I will exit so I can assist other customers. Please feel free to ask any follow up questions that you have in this thread. However, please do not issue a rating until our interaction is complete and all of your questions have been answered.