2. The choices in existing law (pp.14-29) for offenses against cybersecurity.
If the offending act is misuse of a computer to (1) gain unauthorized access to data (an offense against confidentiality), or (2) change or delete data (an offense against integrity), or (3) deny access (an offense against availability)…
· Why is the existing law of each of (a) trespass, (b) burglary, and (c) theft (at least at first glance) an appealing source of criminal law as applied to these new offenses in cyberspace (distinguish each)?
· But what are the limitations of each of those three laws when it comes to cybersecurity?