This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||
|
This subarticle is kept separate from the main article, Piggybacking (internet access), due to size or style considerations. |
|
Here are some tasks awaiting attention:
|
Has any host ever been held civilly liable, criminally culpable, or otherwise legally responsible for the actions of a piggybacker? Jim.henderson ( talk) 03:42, 23 February 2008 (UTC)
"Somes portable devices, such as the Apple iPod touch, allow on-street-hopping on open Wifi networks as a basic feature, and even use it for user geolocation.[specify]"
What does this mean, and why is it in the United States section? — Omegatron 06:20, 8 March 2008 (UTC)
I obtained the information in the chart shown here mostly from one of the references provided Hellno2 ( talk) 23:04, 10 March 2008 (UTC)
Though a lot of the sources suggest that New York law only criminalizes access in defiance of a security scheme (like breaking encryption or sniffing a key), I don't see language in the laws to back it up. I think it has been amended. 156.00 and 156.05 suggest that piggybacking is illegal in New York State. Am I wrong? Krapitino ( talk) 15:27, 11 August 2008 (UTC)
A person is guilty of unauthorized use of a computer when he or she knowingly uses, causes to be used, or accesses a computer, computer service, or computer network without authorization.
Unauthorized use of a computer is a class A misdemeanor.
8. "Without authorization" means to use or to access a computer, computer service or computer network without the permission of the owner or lessor or someone licensed or privileged by the owner or lessor where such person knew that his or her use or access was without permission or after actual notice to such person that such use or access was without permission. It shall also mean the access of a computer service by a person without permission where such person knew that such access was without permission or after actual notice to such person, that such access was without permission.
Proof that such person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that bypasses, defrauds or otherwise circumvents a security measure installed or used with the user's authorization on the computer, computer service or computer network shall be presumptive evidence that such person used or accessed such computer, computer service or computer network without authorization.
I would update the article to state that piggybacking is illegal in Belgium, but I don't have a good enough source. I'm putting a weak source here, in case someone wants to follow this case and make a proper update later: http://www.anti-malware.info/weblog/2008/10/piggybacking-is-not-allowed-in-belgium.html —Preceding unsigned comment added by 216.93.191.240 ( talk) 20:49, 7 November 2008 (UTC)
What the hell? The link is perfect! Piggyback = theft. —Preceding unsigned comment added by 187.34.75.142 ( talk) 17:55, 11 January 2011 (UTC)
Hello fellow Wikipedians,
I have just modified one external link on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018.
After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than
regular verification using the archive tool instructions below. Editors
have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
RfC before doing mass systematic removals. This message is updated dynamically through the template {{
source check}}
(last update: 5 June 2024).
Cheers.— InternetArchiveBot ( Report bug) 03:36, 21 May 2017 (UTC)
Hello fellow Wikipedians,
I have just modified 7 external links on Legality of piggybacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018.
After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than
regular verification using the archive tool instructions below. Editors
have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
RfC before doing mass systematic removals. This message is updated dynamically through the template {{
source check}}
(last update: 5 June 2024).
Cheers.— InternetArchiveBot ( Report bug) 03:01, 20 December 2017 (UTC)