Deliberate
Act of Trespass
The
typical requirements of this crime of computer intrusion:
unreasonable access (the defendant was not authorized at the time of
execution of the facts, which is recognized by the appeal itself);
violation of computer security measures; and access to company
employees' emails, corporate emails, and data and computer programs
of the company.
The
good that is protected is computer freedom understood as the right of
the citizen to control personal and family information that is
collected in data files, which constitutes a positive dimension of
privacy that constitutes the protected legal right.
In
addition, given the reserved nature of the data, the files or records
must be of limited access and use to specific individuals and for
specific purposes, regardless of their nature: personal, academic or
work, medical, economic, etc ... It deals, in reality, with personal
information related more to privacy than to privacy. They do not have
to be computerized because they also accept any other type of file or
public or private registry.
- unauthorized access to info. that an organization is trying to protect
- low-tech: shoulder surfing
- high-tech: hacking
No hay comentarios.:
Publicar un comentario