Talk:Legality of piggybacking

Host vulnerable
Has any host ever been held civilly liable, criminally culpable, or otherwise legally responsible for the actions of a piggybacker? Jim.henderson (talk) 03:42, 23 February 2008 (UTC)

ipod
"Somes portable devices, such as the Apple iPod touch, allow on-street-hopping on open Wifi networks as a basic feature, and even use it for user geolocation.[specify]"

What does this mean, and why is it in the United States section? — Omegatron 06:20, 8 March 2008 (UTC)

Laws in each state
I obtained the information in the chart shown here mostly from one of the references provided Hellno2 (talk) 23:04, 10 March 2008 (UTC)


 * Then reference it — Omegatron 22:56, 12 March 2008 (UTC)


 * Please explain how you created this table. Provide a reference for the information in the table, meaning a reference that says "piggybacking is legal in Alabama, illegal in Alaska", etc.  I don't see this information in either reference 1 or 16, which are the only ones near the table. — Omegatron 23:34, 13 March 2008 (UTC)


 * I've removed the table again. Please provide a real source before replacing it. — Omegatron 14:30, 15 March 2008 (UTC)

New York Law
Though a lot of the sources suggest that New York law only criminalizes access in defiance of a security scheme (like breaking encryption or sniffing a key), I don't see language in the laws to back it up. I think it has been amended. 156.00 and 156.05 suggest that piggybacking is illegal in New York State. Am I wrong? Krapitino (talk) 15:27, 11 August 2008 (UTC)


 * I checked this out with an NYS Assembly member, and they confirmed that the law had been changed, but could not give me a date. I would consider the date to be 2005 at the earliest.  This is based on the publication dates of the articles in used as sources (the 2006 OSU law review article, cited resource 1, quotes a 1999 copy of New York Penal Code and the other source was 2004), and that an NYS Office of the Attorney General legislative recommendation from 2005 describes desired changes to Penal Code section 156.  Some of these changes were adopted and some were not, and some changes not mentioned were made.


 * If someone better at Wiki than I wants to update sources or rewrite the section, feel free, but a reversion would be incorrect.


 * § 156.05 Unauthorized use of a computer.
 * "A person is  guilty of unauthorized use of a computer when he or she knowingly uses, causes to be used, or accesses  a  computer,  computer service, or computer network without authorization."
 * Unauthorized use of a computer is a class A misdemeanor.


 * 156.00(8), defining "unauthorized," reads:


 * "8. 'Without authorization' means to use or  to  access  a  computer, computer service or computer network without the permission of the owner or lessor or someone licensed or privileged by the owner or lessor where such person knew that his or her use or access was without permission or after  actual  notice to such person that such use or access was without permission.  It  shall  also  mean the access of a computer service by a person without permission where such person knew that such access was without  permission  or  after  actual  notice to such person, that such access was without permission."
 * Proof that such person used or accessed a computer, computer  service or  computer network  through the knowing use of a set of instructions, code  or  computer program  that  bypasses, defrauds or otherwise circumvents a security measure  installed  or  used  with  the user's authorization on the computer, computer service or computer network shall be presumptive  evidence that such person used or accessed such computer, computer service or computer network without authorization.


 * Krapitino (talk) 16:45, 12 August 2008 (UTC)

Belgium
I would update the article to state that piggybacking is illegal in Belgium, but I don't have a good enough source. I'm putting a weak source here, in case someone wants to follow this case and make a proper update later: http://www.anti-malware.info/weblog/2008/10/piggybacking-is-not-allowed-in-belgium.html —Preceding unsigned comment added by 216.93.191.240 (talk) 20:49, 7 November 2008 (UTC)

What the hell? The link is perfect! Piggyback = theft. —Preceding unsigned comment added by 187.34.75.142 (talk) 17:55, 11 January 2011 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified one external link on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20080307063609/http://www.canlii.org/ca/sta/c-46/sec342.1.html to http://www.canlii.org/ca/sta/c-46/sec342.1.html

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 03:36, 21 May 2017 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 7 external links on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20070926221850/http://www.todayonline.com/articles/166274.asp to http://www.todayonline.com/articles/166274.asp
 * Added archive https://web.archive.org/web/20070929120544/http://www.todayonline.com/articles/170699.asp to http://www.todayonline.com/articles/170699.asp
 * Added archive http://webarchive.loc.gov/all/20090429232149/http://www.ncsl.org/programs/lis/cip/hacklaw.htm to http://www.ncsl.org/programs/lis/cip/hacklaw.htm
 * Added archive https://web.archive.org/web/20070525103850/http://www.techweb.com/wire/183702832 to http://www.techweb.com/wire/183702832
 * Added archive https://web.archive.org/web/20070930210610/http://www.libraryjournal.com/article/CA6423269.html to http://www.libraryjournal.com/article/CA6423269.html
 * Corrected formatting/usage for http://www.westchestergov.com/idtheft/wifilaw.htm
 * Added archive https://web.archive.org/web/20071112055717/http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/ to http://www.wirelesscommunity.info/2006/04/24/westchester-county-law-requiring-secured-wi-fi-networks-again/

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 03:01, 20 December 2017 (UTC)