Mother, May I?, 2008-01-23
Story continued from Page 2
Forgive Me My Trespasses
One of the most ancient common law actions was that of "trespass" which in its oldest form related to any unlawful interference with ones person, property or rights. Thus, unauthorized use of a website is sued as "trespass to chattels." However, in its most common modern form, "trespass" generally refers to "trespass to land" -- the "unauthorized" entry onto, or remaining on the land of another. You dont have to physically enter the property to be guilty of trespass -- throwing a rock onto someone elses property is trespass, as is undermining it by blasting.
At common law, all "unauthorized" entries to someone elses property would be a "trespass" even if no harm is done to the property, although it may be difficult to prove "damages." As one commentator noted:
... a mail carrier has a privilege to walk up the sidewalk at a private home but is not entitled to go through the front door. A person who enters property with permission but stays after he has been told to leave also commits a trespass. Moreover, an intruder cannot defend himself in a trespass action by showing that the plaintiff did not have a completely valid legal right to the property. The reason for all of these rules is that the action of trespass exists to prevent breaches of the peace by protecting the quiet possession of real property.
In a trespass action, the plaintiff does not have to show that the defendant intended to trespass but only that she intended to do whatever caused the trespass. It is no excuse that the trespasser mistakenly believed that she was not doing wrong or that she did not understand the wrong.
In the early 1980s, as legislatures first began to pass computer crime laws, they attempted to correct a perceived "loophole" in the law of trespass. If I broke into your house and looked at your files, I committed the crimes of "trespass" and possibly theft of property and burglary. If, on the other hand I did the same thing with your computer, I committed no offense at all, except possibly wire fraud. Merely "breaking in" to your computer was not necessarily an offense. Thus, most modern "computer crime" statutes contain at least a misdemeanor "computer trespass" provision, which prohibit "access" that is "unauthorized."
What is "authorized?"
The problem with these computer trespass provisions is the fact that they are vague. Like North Dakotas, they prohibit computer "access" that is "without authorization" or "in excess of authorization" of the "owner" of the computer. The problem comes when computer users enable a function or feature of a computer which permits access to the computer or network. Is this "authorizing" people to use or even exploit that feature?
At this point, one is tempted to start using "real world" analogies -- you know, if a window is open, are you "authorized" to climb in? If the door is unlocked, are you "permitted" to go in? If the keys are left in the car, are you allowed to drive off with it?
And thats the problem. The law deals with new situations by analogy, and all analogies are imperfect. If a Wifi connection is left unencrypted with no password, are you "authorized" to access it? Alternatively, if your neighbor is having a party to which you are invited, and the front door is unlocked, are you "permitted" to just come on in?
