Friday, June 14, 2024

Sense of responsibility

 We are getting serious now.  It's been barely a month since diving head first into this passion for digging into cyber environments, ethical hacking, coding, and various gadgets.  In the short time span I've come across a lot of technology which is left up to the user to determine and define it's good versus evil intent.  While most people chasing any level of clout are sure to post or explain some type of personal disclaimer about sharing the knowledge in an attempt to transfer responsibility out of their hands to the viewer, I feel like as someone learning it's my personal responsibility to be informed of what the law actually is.  I think this is a step in my learning journey that makes a difference in becoming a responsible ethical hacker rather than just someone fumbling around.

I live in Idaho.  Here is the law where I live.  I encourage you to also know the law where you live if you are exploring any of these concepts yourself.  This law was established in 1984.

Title 18 - Crimes and Punishments

Chapter 22 - Computer Crime

18-2022 Computer Crime 

            (1) Any person who knowingly accesses, attempts to access or uses, or attempts to use any computer, computer system, computer network, or any part thereof for the purpose of: devising or executing any scheme or artifice to defraud; obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises; or committing theft; commits computer crime.

(2)  Any person who knowingly and without authorization alters, damages, or destroys any computer, computer system, or computer network described in section 18-2201, Idaho Code, or any computer software, program, documentation, or data contained in such computer, computer system, or computer network commits computer crime.

(3)  Any person who knowingly and without authorization uses, accesses, or attempts to access any computer, computer system, or computer network described in section 18-2201, Idaho Code, or any computer software, program, documentation or data contained in such computer, computer system, or computer network, commits computer crime.

(4)  A violation of the provisions of subsections (1) or (2) of this section shall be a felony. A violation of the provisions of subsection (3) of this section shall be a misdemeanor.



No comments:

Post a Comment