Thread:Taesty/@comment-28750798-20160903201440/@comment-30992676-20160903233420

Don’t even fucking start.

You decide to state you can “hack” Leah’s computer using scripts?

I hope your brain that’s smaller than your respect for others can understand the fact that you are clearly violating the Terms Of Service, and if you do proceed with that act, you are committing Cyber Crime:

Someone who hacks into another person's computer could be punished by a number of different crimes, depending on the circumstances. The law punishes hacking under the computer crime statutes. These crimes carry penalties ranging from a class B misdemeanor (punishable by up to six months in prison, a fine of up to $1,000, or both) to a class B felony (punishable by up to 20 years in prison, a fine of up to $15,000, or both). The law also punishes unauthorized access to a computer or computer network, with penalties ranging from a class B misdemeanor to a class D felony (punishable by up to five years in prison, a fine of up to $5,000, or both).

A number of generally applicable crimes could also apply. For example, hacking could be done to commit identity theft or larceny and it could be punished under those generally applicable crimes.

In addition to criminal penalties, the law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.

And this is what you’re doing that can be registered as cyber crime:

accesses a computer system without authorization;

2. accesses or uses a computer system to obtain unauthorized computer services (including computer access, data processing, and data storage);

3. intentionally or recklessly disrupts, degrades, or causes disruption or degradation of computer services or denies or causes denial of computer services to an authorized user; or

4. intentionally or recklessly tampers with, takes, transfers, conceals, alters, or damages any equipment used in a computer system.

It is also a computer crime to misuse computer system data. A person commits this crime by:

1. accessing a computer system to use, disclose, or copy data residing in, communicated by, or produced by a computer system;

2. intentionally or recklessly and without authorization (.a.) tampering with, damaging, or taking data intended for use by a computer system or (.b.) intercepting or adding to data residing within a computer system;

3. knowingly receiving or retaining data obtained through misuse of computer system information; or

4. using or disclosing data he or she knows or believes was obtained through misuse of computer system information (CGS § 53a-251).