Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter July 12, 2014

Cybertrespass – A Solution in Search of a Problem?

  • Steve Hedley EMAIL logo

Abstract

The law has been adapted in many ways to make full provision for networked computing and its various social effects. One such adaptation employed by courts in the US has been to develop a tort of cybertrespass, which catches unauthorised electronic intrusions on one computer by another. This article traces the rise and fall of the tort of cybertrespass in the US cases over two decades, and then discusses whether it is a tort that can successfully be transplanted to other common law systems. The conclusion is that cybertrespass is a rather blunt tool, that has some use in cases of gross and deliberate damage, but is not up to the task of determining rights and wrongs in more subtle cases of intrusion.

Published Online: 2014-7-12
Published in Print: 2014-7-1

© 2014 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 31.3.2023 from https://www.degruyter.com/document/doi/10.1515/jetl-2014-0010/html
Scroll to top button