Unauthorized Access To Computer Systems
🖥️ Unauthorized Access to Computer Systems
Unauthorized access generally refers to intentionally accessing a computer, network, or digital system without permission. It is recognized as a criminal offense in most jurisdictions under cybercrime statutes.
Different jurisdictions have different names for the offense:
United States: Computer Fraud and Abuse Act (CFAA)
United Kingdom: Computer Misuse Act, 1990 (CMA)
India: Information Technology Act, 2000 (especially Section 43 & 66)
European Union: Directive on Attacks Against Information Systems
Key Elements of Unauthorized Access
Absence of authorization
The offender must not have legitimate permission to access the system.
Intentional act
It must be deliberate—not accidental or due to negligence.
Access to any part of the system
Even minimal access or testing passwords can be considered unauthorized.
Use of technological means
Examples: hacking tools, stolen credentials, exploiting vulnerabilities.
Possible consequences
Criminal charges
Civil liability
Financial penalties
Imprisonment
📚 Detailed Case Law Explanations (More Than Five)
Below are seven important cases from various jurisdictions, each explained clearly.
1. United States v. Morris (1991) — “The Morris Worm Case”
Jurisdiction: USA
Law applied: CFAA
Facts:
Robert Tappan Morris, a graduate student, released the first widely known computer worm (“Morris Worm”). Although he claimed the worm was not intended to damage systems, it exploited vulnerabilities and spread uncontrollably, causing thousands of computers to crash.
Held:
The court held that even accessing systems for “experimentation” without authorization violates the CFAA. Intent to cause harm is not required—intent to access without permission is enough.
Significance:
First conviction under the CFAA
Established that unauthorized access includes “unauthorized testing”
Highlighted the risks of self-replicating malware
2. R v. Gold & Schifreen (1988)
Jurisdiction: United Kingdom
Law applied: Pre-CMA principles (Led to enactment of Computer Misuse Act, 1990)
Facts:
Gold and Schifreen accessed British Telecom’s Prestel system using a stolen administrator password. They did not cause serious damage but demonstrated security weaknesses.
Held:
The defendants were acquitted due to legal loopholes—the law at the time did not clearly criminalize unauthorized computer access.
Significance:
Directly led to the Computer Misuse Act 1990
Established the need for clear legislation
Demonstrated that intent to defraud is not necessary for such offenses
3. R v. Bow Street Magistrates, ex parte Allison (2000)
Jurisdiction: United Kingdom
Law applied: Computer Misuse Act, 1990
Facts:
Allison was accused of hacking into systems belonging to the US Air Force. The US sought his extradition for prosecution.
Held:
The UK court agreed that unauthorized access was an extraditable offense under the CMA.
Significance:
Reinforced that hacking is recognized internationally as a serious cybercrime
Strengthened cross-border cooperation in cybercrime cases
4. United States v. Nosal (2012–2016)
Jurisdiction: USA
Law applied: CFAA
Facts:
Nosal, a former employee of an executive search firm, convinced colleagues to use their authorized credentials to download confidential information and give it to him.
Held:
The court held that using legitimate credentials for an unauthorized purpose can violate the CFAA, but there was debate. Ultimately, the Ninth Circuit limited the CFAA to “access-based violations,” not misuse of permitted access.
Significance:
Clarified the boundary between “unauthorized access” and “misuse”
One of the most influential cases in narrowing overbroad interpretations of the CFAA
5. State of Maharashtra v. Sujata Ravindra Tambe (India)
Jurisdiction: India
Law applied: IT Act, 2000 (Section 43 & 66)
Facts:
Sujata Tambe, an employee of a bank, accessed another employee’s password, entered the bank’s system, and altered records.
Held:
The court held that using someone else’s password constitutes unauthorized access, and manipulating data amounts to a criminal offense under Section 66.
Significance:
Reinforced employer–employee cybercrime liability
Showed that unauthorized access need not involve sophisticated hacking
Clarified evidentiary standards for digital logs
6. Aaron’s Law Case (United States v. Aaron Swartz, 2011–2013)
Jurisdiction: USA
Law applied: CFAA
Facts:
Aaron Swartz downloaded a large number of academic articles from JSTOR using MIT’s network. Though JSTOR subscription was allowed, mass downloading violated JSTOR’s terms and MIT’s policies.
Held:
Swartz was prosecuted under the CFAA for unauthorized access, though he had physical access to the network.
Significance:
Sparked national debate on the overreach of the CFAA
Led to proposed reforms known as “Aaron’s Law”
Highlighted conflict between open-access activism and computer crime laws
7. R v. Cuthbert (2005)
Jurisdiction: United Kingdom
Law applied: Computer Misuse Act, 1990
Facts:
After the 2004 Indian Ocean tsunami, Cuthbert tried to test UK’s Disaster Emergency Committee donation website for security vulnerabilities to ensure it wasn’t a phishing site. He typed “../” into the URL and triggered a security system.
Held:
He was convicted even though his intentions were good. The court held that any access beyond what is granted—even for “testing”—is unauthorized.
Significance:
Shows that good intentions do not excuse unauthorized access
Reinforces strict liability nature of CMA
Important for discussions on ethical hacking
âś… Summary Table
| Case | Country | Key Principle |
|---|---|---|
| Morris (1991) | USA | Unauthorized access includes unintended damage |
| Gold & Schifreen (1988) | UK | Led to CMA 1990 |
| Ex parte Allison (2000) | UK | Hacking is an extraditable offense |
| Nosal (2012–2016) | USA | Limits CFAA; access vs. misuse |
| Sujata Tambe | India | Use of stolen passwords = unauthorized access |
| Aaron Swartz | USA | Overbroad CFAA enforcement debate |
| Cuthbert (2005) | UK | Intent is irrelevant; unauthorized is unauthorized |

comments