Wikia

The IT Law Wiki

Access

Talk0
27,550pages on
this wiki

Redirected from Accessible

NOTE: The organization named Access is discussed at Access (organization).

Definitions Edit

Computer system Edit

(Noun) Access is the

entry granted to a software path that establishes the right to use a system and its resources: to read, write, modify, or delete data and/or to use software processes with various capabilities.[1]
[a]bility and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.
[t]he ability and the means necessary to approach, store, or retrieve data, or communicate with or make use of any resource of a computer information system.[2]

(Verb) To achieve the status of having access.

Criminal law Edit

Computer Fraud and Abuse Act Edit

For purposes of the CFAA, when someone sends an e-mail message from his or her own computer, and the message then is transmitted through a number of other computers until it reaches its destination, the sender is making use of all of those computers, and is therefore 'accessing' them.[3]

State computer crime laws Edit

In the area of computer crime, the term "access" is often used as an element of a criminal act. For example, under the California computer crime statute, the term access is defined as

to gain entry to, instruct, or communicate with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network.[4]

In the Washington state computer crime law, access is defined as:

to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, directly or by electronic means.[5]

In the West Virginia state computer crime law, 'access is similarly defined as:

to instruct, communicate with, store data in, retrieve data from, intercept data from or otherwise make use of any computer, computer network, computer program, computer software, computer data or other computer resources.[6]

Cybersecurity Edit

Access is the

[a]bility and means to communicate with (i.e., provide input to or receive output from), or otherwise make use of any information, resource, or component in a classified automated information system.[7]

Data security Edit

Access is

the ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource.[8]

Foreign computer/cybercrime laws Edit

In the Philippines, access is defined as:

the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.[9]

General Edit

Access is the right to enter or make use of.

Government surveillance Edit

In connection with surveillance by law enforcement, the term access has been defined as:

[t]he technical capability to interface with a communications facility, such as a communications line or switch, so that law enforcement can monitor and receive call setup information and call content.[10]

Information security Edit

Access is the "[a]bility to make use of any information system (IS) resource."[11]

Access is

[t]he knowledge, use, or possession of classified or unclassified controlled information required by an individual to perform official duties that is provided to the individual on a need-to-know basis.[12]

Intelligence Edit

Access is

a. a way or means of approach to identify a target; or
b. exploitable proximity to or ability to approach an individual, facility, or information that enables target to carry out the intended mission.[13]

Internet Edit

“Individuals have a wide variety of avenues to access cyberspace in general, and the Internet in particular. In terms of physical access, there are two common methods to establish an actual link to the Internet. First, one can use a computer or computer terminal that is directly (and usually permanently) connected to a computer network that is itself directly or indirectly connected to the Internet. Second, one can use a ‘personal computer’ with a ‘modem’ to connect over a telephone line to a larger computer or computer network that is itself directly or indirectly connected to the Internet.”[14]

Military Edit

Access is "[t]he ability and opportunity to obtain knowledge of classified information.[15]

Privacy Edit

Access is

an individual’s ability to view, modify, and contest the accuracy and completeness of personally identifiable information collected about him or her. Access is an element of the Organization for Economic Cooperation and Development's (OECD) Fair Information Principles (FIPs).[16]

Telecommunications Edit

Access is

[t]he technical capability to interface with a communications facility, such as a communications line or switch, so that law enforcement can monitor and receive call setup information and call content.[17]

U.S. copyright law Edit

Access means the "opportunity to review the copyrighted work."[18] In traditional copyright infringement analysis, if the plaintiff cannot establish that the defendant copied a work by direct evidence, it can satisfy its burden of proof by showing that the defendant had access to the copyrighted work, and that the two works are substantially similar.

Types of access Edit

There are two basic types of access: "view" and "edit."

  • "View" access means that a user is able to view or obtain a copy of the information only.
  • "Edit" access means that a user is able to correct, amend or delete information.

References Edit

  1. CNSSI 4009, at 1.
  2. Auditing and Financial Management: Glossary of EDP Terminology, at 1.
  3. America Online, Inc. v. National Health Care Discount, Inc., 121 F.Supp.2d 1255, 1273 (N.D. Iowa 2000) (full-text).
  4. Cal. Penal Code §502.
  5. Wash. Rev. Code 9A.52.010(6).
  6. West Virginia Computer Crime and Abuse Act, W. Va. Stat. §61-3C-3.
  7. DOE Manual 470.4-7, at 2.
  8. 45 C.F.R. § 164.304.
  9. Cybercrime Prevention Act of 2012 (Philippines) §3(a).
  10. Office of Technology Assessment, Electronic Surveillance in a Digital Age, Glossary (July 1995).
  11. NIST Special Publication 800-32.
  12. DOE Manual 470.4-7, at 2.
  13. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
  14. American Civil Liberties Union v. Reno, 929 F. Supp. 824, 832 (E.D. Pa. 1996) (full-text), aff’d, Reno v. American Civil Liberties Union, 521 U.S. 844 (1997) (full-text).
  15. Department of the Army Information Security Program, at 227.
  16. U.S. Department of Justice, Privacy Technology Focus Group Final Report, App. B, at 49.
  17. Electronic Surveillance in a Digital Age, at 71.
  18. E.F. Johnson Co. v. Uniden Corp. of America, 623 F. Supp. 1485, 1492 n.5 (D. Minn. 1985) (full-text).

See also Edit

Around Wikia's network

Random Wiki