Federal law regarding unauthorized use of a computing device primarily falls under the Computer Fraud and Abuse Act (CFAA), which is a United States cybersecurity law. Under the CFAA, there are several requirements that must generally be met to sue someone for unauthorized use of a computing device:
1. Access without authorization: The defendant must have accessed a computer system or network without authorization or exceeded authorized access. This means they accessed a computer or network they weren't supposed to access or they exceeded the access they were granted.
2. Intent: The defendant must have acted intentionally or knowingly. This means they knowingly accessed the computer system without authorization or exceeded their authorized access.
3. Damage or loss: The unauthorized access must have caused damage or loss. This could be damage to the computer system itself, loss of data, financial loss, or other tangible harm.
4. Interstate or foreign communication: The CFAA applies to conduct involving interstate or foreign communication or commerce. This means the unauthorized access must have involved interstate or foreign communication or commerce, such as accessing a computer system connected to the internet.
5. Exceeding authorized access: Alternatively, if the defendant had authorized access to the computer system but exceeded that authorized access, they may still be liable under the CFAA. This can include situations where an employee misuses their access rights to a company's computer system.
Of course this came from my favorite lawyer, ChatGPT so cave lector.
Neutrinos have bad breadth.