This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 11 lines
!!! Overview
[{$pagename}] an [entity] that accesses a system [resource] for which the [entity] has not received an [authorization].
!! [Legal Consideration]
As one prominent commentator has put it, "''an [authentication] requirement, such as a [password gate|Access Control Service], is needed to create the necessary barrier that divides open spaces from closed spaces on the [Web].''" Orin S. Kerr, Norms of Computer Trespass, 116 Colum. L. Rev. 1143, 1161 (2016).!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [NORMS OF COMPUTER TRESPASS|https://columbialawreview.org/content/norms-of-computer-trespass/|target='_blank'] - based on information obtained 2019-09-10
* [#2] - [HIQ LABS V. LINKEDIN|http://cdn.ca9.uscourts.gov/datastore/opinions/2019/09/09/17-16783.pdf|target='_blank'] - based on information obtained 2019-09-10