The IT Law Wiki
Edit Page
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
:::NOTE: The organization named '''Access''' is discussed at [[Access (organization)]].
 
 
 
== Definitions ==
 
== Definitions ==
  +
 
=== General ===
  +
  +
'''Access''' is used in the [[information technology]] and [[information technology law]] contexts in a number of different ways. The following sections discuss some of the contexts in which the term "access" is used.
   
 
=== Computer system ===
 
=== Computer system ===
   
'''(Noun)''' '''Access''' is the
+
'''(Noun)''' In general, '''access''' is the right to enter or make use of.
   
{{Quote|entry granted to a [[software]] path that establishes the right to use a [[system]] and its resources: to [[read]], [[write]], [[modify]], or [[delete]] [[data]] and/or to use [[software process]]es with various capabilities.<ref>[[CNSSI 4009]], at 1.</ref>}}
+
In the computer context, '''access''' refers to entry granted to a [[software]] path that establishes the right to use a [[system]] and its resources; to [[read]], [[write]], modify, or delete [[data]]; and/or to use [[software process]]es with various capabilities.<ref>[[CNSSI 4009]], at 1.</ref>
  +
 
'''Access''' is the
   
 
{{Quote|[a]bility and means to [[communicate]] with or otherwise [[interact]] with a [[system]], to use [[system resources]] to handle [[information]], to gain [[knowledge]] of the [[information]] the [[system]] contains, or to control [[system]] [[component]]s and [[function]]s.}}
 
{{Quote|[a]bility and means to [[communicate]] with or otherwise [[interact]] with a [[system]], to use [[system resources]] to handle [[information]], to gain [[knowledge]] of the [[information]] the [[system]] contains, or to control [[system]] [[component]]s and [[function]]s.}}
   
 
'''(Verb)''' To achieve the status of having '''access.'''
{{Quote|[a]bility and the means necessary to approach, [[store]], or [[data retrieval|retrieve data]], or [[communicate]] with or make use of any resource of a [[computer]] [[information system]].<ref>[[Auditing and Financial Management: Glossary of EDP Terminology]], at 1.</ref>}}
 
   
 
=== Copyright law ===
{{Quote|[a]bility to physically or [[logical]]ly enter or make use of an [[IT system]] or area ([[secured]] or [[unsecured]]). The [[process]] of [[interact]]ing with a [[system]].<ref>[[FFIEC]], IT Examination Handbook Infobase, Glossary ([https://ithandbook.ffiec.gov/glossary.aspx full-text]).</ref>}}
 
   
 
Under U.S. [[copyright law]], the term '''access''' means the “opportunity to review the [[copyrighted work]].<ref>[[E.F. Johnson v. Uniden|E.F. Johnson Co. v. Uniden Corp. of America]], 623 F. Supp. 1485, 1492 n.5 (D. Minn. 1985)([http://scholar.google.com/scholar_case?case=7748119006515759202&q=623+F.+Supp.+1485&hl=en&as_sdt=2002 full-text]).</ref> In traditional [[copyright infringement]] analysis, if the plaintiff cannot establish that the defendant [[copied]] a [[work]] by [[direct evidence]], it can satisfy its [[burden of proof]] by showing that the defendant had access to the [[copyrighted work]], and that the two [[work]]s are [[substantially similar]].
'''(Verb)''' To achieve the status of having '''access.'''
 
   
 
=== Criminal law ===
 
=== Criminal law ===
Line 21: Line 25:
 
==== Computer Fraud and Abuse Act ====
 
==== Computer Fraud and Abuse Act ====
   
{{Quote|For purposes of the [[CFAA]], when someone sends an [[e-mail message]] from his or her own [[computer]], and the [[message]] then is [[transmit]]ted through a number of other [[computer]]s until it reaches its destination, the [[sender]] is making use of all of those [[computer]]s, and is therefore ''''accessing'''' them.<ref>[[AOL v. National Health Care|America Online, Inc. v. National Health Care Discount, Inc.]], 121 F.Supp.2d 1255, 1273 (N.D. Iowa 2000) ([http://scholar.google.com/scholar_case?case=10361243305925433691&q=121+F.+Supp.+2d+1255&hl=en&as_sdt=2002 full-text]).</ref>}}
+
{{Quote|For purposes of the [[CFAA]], when someone sends an [[e-mail message]] from his or her own [[computer]], and the [[message]] then is [[transmit]]ted through a number of other [[computer]]s until it reaches its destination, the [[sender]] is making use of all of those [[computer]]s, and is therefore ‘accessing’ them.<ref>[[AOL v. National Health Care|America Online, Inc. v. National Health Care Discount, Inc.]], 121 F. Supp. 2d 1255, 1273 (N.D. Iowa 2000)([http://scholar.google.com/scholar_case?case=10361243305925433691&q=121+F.+Supp.+2d+1255&hl=en&as_sdt=2002 full-text]).</ref>}}
   
 
==== State computer crime laws ====
 
==== State computer crime laws ====
   
In the area of [[computer crime]], the term "access" is often used as an element of a criminal act. For example, under the California computer crime statute, the term '''access''' is defined as
+
In the area of [[computer crime]], the term "access" is often used as an element of a criminal act. For example, under the California computer crime statute, the term "access" is defined as
   
{{Quote|to gain entry to, instruct, or [[communicate]] with the logical, arithmetical, or [[memory]] function resources of a [[computer]], [[computer system]], or [[computer network]].<ref>Cal. Penal Code §502.</ref>}}
+
{{Quote|to gain entry to, instruct, or communicate with the logical, arithmetical, or memory function resources of a [[computer]], [[computer system]], or [[computer network]].<ref>Cal. Penal Code §502.</ref>}}
   
In the Washington state computer crime law, '''access''' is defined as:
+
In the Washington state computer crime law, "access" is defined as:
   
{{Quote|to approach, instruct, [[communicate]] with, [[store]] [[data]] in, [[data retrieval|retrieve data]] from, or otherwise make use of any resources of a [[computer]], directly or by [[electronic]] means.<ref>Wash. Rev. Code 9A.52.010(6).</ref>}}
+
{{Quote|to approach, instruct, communicate with, [[store]] [[data]] in, retrieve [[data]] from, or otherwise make use of any resources of a [[computer]], directly or by electronic means.<ref>Wash. Rev. Code 9A.52.010(6).</ref>}}
 
In the West Virginia state computer crime law, '''access'' is similarly defined as:
 
 
{{Quote|to instruct, [[communicate]] with, [[store]] [[data]] in, [[data retrieval|retrieve data]] from, [[intercept]] [[data]] from or otherwise make use of any [[computer]], [[computer network]], [[computer program]], [[computer software]], [[computer data]] or other [[computer resources]].<ref>West Virginia Computer Crime and Abuse Act, W. Va. Stat. §61-3C-3.</ref>}}
 
 
=== Cybersecurity ===
 
 
'''Access''' is the
 
 
{{Quote|[a]bility and means to [[communicate]] with (i.e., provide [[input]] to or receive [[output]] from), or otherwise make use of any [[information]], [[resource]], or [[component]] in a [[classified]] [[automated information system]].<ref>[[DOE Manual 470.4-7]], at 2.</ref>}}
 
 
=== Data security ===
 
 
'''Access''' is
 
 
{{Quote|the ability or the means necessary to [[read]], [[write]], [[modify]], or [[communicate]] [[data]]/[[information]] or otherwise use any [[system resource]].<ref>45 C.F.R. § 164.304.</ref>}}
 
 
=== Foreign computer/cybercrime laws ===
 
 
In the Philippines, '''access''' is defined as:
 
 
{{Quote|the instruction, [[communication]] with, [[storing]] [[data]] in, [[data retrieval|retrieving data]] from, or otherwise making use of any resources of a [[computer system]] or [[communication network]].<ref>[[Cybercrime Prevention Act of 2012]] (Philippines) §3(a).</ref>}}
 
 
=== General ===
 
 
'''Access''' is the right to enter or make use of.
 
   
 
=== Government surveillance ===
 
=== Government surveillance ===
Line 63: Line 41:
 
In connection with [[surveillance]] by law enforcement, the term '''access''' has been defined as:
 
In connection with [[surveillance]] by law enforcement, the term '''access''' has been defined as:
   
{{Quote|[t]he technical capability to [[interface]] with a [[communications facility]], such as a communications line or [[switch]], so that law enforcement can monitor and receive [[call setup information]] and [[call content]].<ref>[[Office of Technology Assessment]], [[Electronic Surveillance in a Digital Age]], Glossary (July 1995) ([http://www.princeton.edu/~ota/disk1/1995/9513/9513.PDF full-text]).</ref>}}
+
{{Quote|The technical capability to [[interface]] with a [[communications facility]], such as a communications line or [[switch]], so that law enforcement can monitor and receive [[call setup information]] and [[call content]].<ref>Office of Technology Assessment, Electronic Surveillance in a Digital Age, Glossary (July 1995).</ref>}}
   
 
=== Information security ===
 
=== Information security ===
   
 
'''Access''' is the "[a]bility to make use of any [[information system]] (IS) resource."<ref>[[NIST Special Publication 800-32]].</ref>
 
'''Access''' is the "[a]bility to make use of any [[information system]] (IS) resource."<ref>[[NIST Special Publication 800-32]].</ref>
 
'''Access''' is
 
 
{{Quote|[t]he [[knowledge]], use, or possession of [[Classified information|classified]] or [[unclassified controlled information]] required by an individual to perform official duties that is provided to the individual on a [[need-to-know]] basis.<ref>[[DOE Manual 470.4-7]], at 2.</ref>}}
 
   
 
=== Intelligence ===
 
=== Intelligence ===
Line 79: Line 53:
 
{{Quote|
 
{{Quote|
 
:a. a way or means of approach to [[identify]] a [[target]]; or
 
:a. a way or means of approach to [[identify]] a [[target]]; or
:b. exploitable proximity to or ability to approach an individual, facility, or [[information]] that enables [[target]] to carry out the intended mission.<ref>[[Department of Defense Dictionary of Military and Associated Terms]].</ref>}}
+
:b. exploitable proximity to or ability to approach an individual, facility, or [[information]] that enables [[target]] to carry out the intended mission.<ref>U.S. [[Department of Defense]], Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) ([http://www.fas.org/irp/doddir/dod/jp1_02.pdf full-text]).</ref>}}
 
{{Quote|the ability and opportunity to obtain [[knowledge]] of [[classified]] [[sensitive information]] or to be in a place where one could expect to gain such [[knowledge]].<ref>Terms & Definitions of Interest for Counterintelligence Professionals (July 9, 2014) ([https://fas.org/irp/eprint/ci-glossary.pdf full-text]).</ref>}}
 
   
 
=== Internet ===
 
=== Internet ===
   
{{Quote|“Individuals have a wide variety of avenues to '''access''' [[cyberspace]] in general, and the [[Internet]] in particular. In terms of physical access, there are two common methods to establish an actual [[link]] to the [[Internet]]. First, one can use a [[computer]] or [[computer terminal]] that is directly (and usually permanently) connected to a [[computer network]] that is itself directly or indirectly connected to the [[Internet]]. Second, one can use a ‘[[personal computer]]’ with a ‘[[modem]]’ to connect over a telephone line to a larger [[computer]] or [[computer network]] that is itself directly or indirectly connected to the [[Internet]].”<ref>American Civil Liberties Union v. Reno, 929 F. Supp. 824, 832 (E.D. Pa. 1996) ([http://scholar.google.com/scholar_case?case=7999801392201013395&q=929+F.+Supp.+824&hl=en&as_sdt=2002 full-text]), ''aff’d,'' [[Reno v. ACLU|Reno v. American Civil Liberties Union,]] 521 U.S. 844 (1997) ([http://scholar.google.com/scholar_case?case=1557224836887427725&q=521+U.S.+844&hl=en&as_sdt=2002 full-text]).</ref>}}
+
{{Quote|“Individuals have a wide variety of avenues to '''access''' [[cyberspace]] in general, and the [[Internet]] in particular. In terms of physical access, there are two common methods to establish an actual [[link]] to the [[Internet]]. First, one can use a [[computer]] or [[computer terminal]] that is directly (and usually permanently) connected to a [[computer network]] that is itself directly or indirectly connected to the [[Internet]]. Second, one can use a ‘[[personal computer]]’ with a ‘[[modem]]’ to connect over a telephone line to a larger [[computer]] or [[computer network]] that is itself directly or indirectly connected to the [[Internet]].”<ref>American Civil Liberties Union v. Reno, 929 F. Supp. 824, 832 (E.D. Pa. 1996)([http://scholar.google.com/scholar_case?case=7999801392201013395&q=929+F.+Supp.+824&hl=en&as_sdt=2002 full-text]), ''aff’d,'' [[Reno v. ACLU|Reno v. American Civil Liberties Union,]] 521 U.S. 844 (1997)([http://scholar.google.com/scholar_case?case=1557224836887427725&q=521+U.S.+844&hl=en&as_sdt=2002 full-text]).</ref>}}
 
=== Military ===
 
 
'''Access''' is "[t]he ability and opportunity to obtain [[knowledge]] of [[classified information]].<ref>[[Department of the Army Information Security Program]], at 227.</ref>
 
   
 
=== Privacy ===
 
=== Privacy ===
Line 96: Line 64:
   
 
{{Quote|an individual’s ability to view, [[modify]], and contest the [[accuracy]] and [[completeness]] of [[personally identifiable information]] [[data collection|collected]] about him or her. Access is an element of the [[Organization for Economic Cooperation and Development]]'s ([[OECD]]) [[Fair Information Principles]] ([[FIP]]s).<ref>[[U.S. Department of Justice]], [[Privacy Technology Focus Group Final Report]], App. B, at 49.</ref>}}
 
{{Quote|an individual’s ability to view, [[modify]], and contest the [[accuracy]] and [[completeness]] of [[personally identifiable information]] [[data collection|collected]] about him or her. Access is an element of the [[Organization for Economic Cooperation and Development]]'s ([[OECD]]) [[Fair Information Principles]] ([[FIP]]s).<ref>[[U.S. Department of Justice]], [[Privacy Technology Focus Group Final Report]], App. B, at 49.</ref>}}
 
=== Telecommunications ===
 
 
'''Access''' is
 
 
{{Quote|[t]he technical capability to [[interface]] with a [[communications facility]], such as a [[communications line]] or [[switch]], so that law enforcement can [[monitor]] and receive [[call setup information]] and [[call content]].<ref>[[Electronic Surveillance in a Digital Age]], at 71.</ref>}}
 
 
=== U.S. copyright law ===
 
 
'''Access''' means the "opportunity to review the [[copyrighted work]]."<ref>[[E.F. Johnson v. Uniden|E.F. Johnson Co. v. Uniden Corp. of America]], 623 F. Supp. 1485, 1492 n.5 (D. Minn. 1985) ([http://scholar.google.com/scholar_case?case=7748119006515759202&q=623+F.+Supp.+1485&hl=en&as_sdt=2002 full-text]).</ref> In traditional [[copyright infringement]] analysis, if the plaintiff cannot establish that the defendant [[copied]] a [[work]] by [[direct evidence]], it can satisfy its [[burden of proof]] by showing that the defendant had access to the [[copyrighted work]], and that the two [[work]]s are [[substantially similar]].
 
   
 
== Types of access ==
 
== Types of access ==
Line 119: Line 77:
 
== See also ==
 
== See also ==
   
<div style="{{column-count|4}}">
+
<div style="column-count:3;-moz-column-count:3;">
   
 
* [[Access attempt]]
 
* [[Access attempt]]
 
* [[Access authority]]
 
* [[Access authority]]
* [[Access card]]
 
* [[Access charge]]
 
 
* [[Access code]]
 
* [[Access code]]
* [[Access contract]]
 
 
* [[Access control]]
 
* [[Access control]]
 
* [[Access control center]]
 
* [[Access control center]]
Line 132: Line 87:
 
* [[Access control policy]]
 
* [[Access control policy]]
 
* [[Access control procedures]]
 
* [[Access control procedures]]
* [[Access control technologies]]
 
 
* [[Access device]]
 
* [[Access device]]
* [[Access in excess of authorization]]
 
* [[Access list]]
 
 
* [[Access level]]
 
* [[Access level]]
* [[Access mechanism]]
 
* [[Access method]]
 
* [[Access minutes]]
 
* [[Access period]]
 
* [[Access point]]
 
 
* [[Access privileges]]
 
* [[Access privileges]]
* [[Access profile]]
 
 
* [[Access provider]]
 
* [[Access provider]]
 
* [[Access rights]]
 
* [[Access rights]]
* [[Access service]]
 
* [[Access software]]
 
* [[Access software provider]]
 
 
* [[Access to classified information]]
 
* [[Access to classified information]]
* [[Access type]]
 
 
* [[Accessibility]]
 
* [[Accessibility]]
* [[Administrative access]]
 
* [[Authorized access]]
 
* [[Cloud access]]
 
* [[Conditional access]]
 
* [[Controlled access]]
 
* [[Data access]]
 
* [[Electronic access]]
 
* [[Equal access]]
 
* [[Information access]]
 
* [[Internet access]]
 
* [[Internet access service]]
 
 
* [[Logical access]]
 
* [[Logical access]]
* [[Open access]]
+
* [[Physical access]]
 
* [[Public access]]
 
* [[Public access]]
 
* [[Public access laws]]
 
* [[Public access laws]]
* [[Remote access]]
 
* [[Switched access]]
 
* [[Temporary access eligibility]]
 
* [[Unauthorized access]]
 
* [[Universal access]]
 
* [[Write access]]
 
 
[[Category:Copyright]]
 
[[Category:Copyright]]
 
[[Category:Internet]]
 
[[Category:Internet]]
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel Editing help (opens in new window)