Internet Rights
Privacy & Unauthorized Access Boundaries
18 U.S.C. § 1030 • 18 U.S.C. § 2701
Core idea
- Unauthorized access and stored communications are regulated by federal law.
- Don’t “test” systems you don’t own or have explicit permission to test.
- For defensive documentation, keep it lawful: logs, headers, screenshots, receipts.
What to document (lawful)
- Server access logs you control, timestamps, IPs, error codes.
- Account alerts and provider messages.
- Checksum manifests of your own files/configs.