In message <[log in to unmask]>, at 15:21:15 on Thu, 5
Apr 2007, Nigel Roberts <[log in to unmask]> writes
>But is it 'unauthorised access to a computer', perhaps?
In what sense does it ignore the implied authorisation given by the
Bluetooth software running on your 'computer' when it co-operates in
being the client end of such a data transfer?
(I'm assuming that if you set your Bluetooth up to refuse connections
like these, that they will indeed be successfully refused).
It might be analogous with SMTP servers being set up to promiscuously
receive emails, but with the operator somehow wanting to deny permission
for the receipt of Spam emails. I understand there's a precedent now for
malicious mailbombing of an SMTP server being by implication
unauthorised (and therefore an offence); but every time I raise the
issue of similar considerations being applied to one-off but clearly
unsolicited spam emails, people from the CPS look at me as if I'm mad.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|