- NOTE: The organization named Access is discussed at Access (organization).
Definitions[]
Computer system[]
(Noun) Access is the
“ | entry granted to a software path that establishes the right to use a system and its resources: to read, write, modify, or delete data and/or to use software processes with various capabilities.[1] | ” |
“ | [a]bility and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. | ” |
“ | [a]bility and the means necessary to approach, store, or retrieve data, or communicate with or make use of any resource of a computer information system.[2] | ” |
“ | [a]bility to physically or logically enter or make use of an IT system or area (secured or unsecured). The process of interacting with a system.[3] | ” |
(Verb) To achieve the status of having access.
Criminal law[]
Computer Fraud and Abuse Act[]
“ | For purposes of the CFAA, when someone sends an e-mail message from his or her own computer, and the message then is transmitted through a number of other computers until it reaches its destination, the sender is making use of all of those computers, and is therefore 'accessing' them.[4] | ” |
State computer crime laws[]
In the area of computer crime, the term "access" is often used as an element of a criminal act. For example, under the California computer crime statute, the term access is defined as
“ | to gain entry to, instruct, or communicate with the logical, arithmetical, or memory function resources of a computer, computer system, or computer network.[5] | ” |
In the Washington state computer crime law, access is defined as:
“ | to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, directly or by electronic means.[6] | ” |
In the West Virginia state computer crime law, 'access is similarly defined as:
“ | to instruct, communicate with, store data in, retrieve data from, intercept data from or otherwise make use of any computer, computer network, computer program, computer software, computer data or other computer resources.[7] | ” |
Cybersecurity[]
Access is the
“ | [a]bility and means to communicate with (i.e., provide input to or receive output from), or otherwise make use of any information, resource, or component in a classified automated information system.[8] | ” |
Data security[]
Access is
“ | the ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource.[9] | ” |
Foreign computer/cybercrime laws[]
In the Philippines, access is defined as:
“ | the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.[10] | ” |
General[]
Access is the right to enter or make use of.
Government surveillance[]
In connection with surveillance by law enforcement, the term access has been defined as:
“ | [t]he technical capability to interface with a communications facility, such as a communications line or switch, so that law enforcement can monitor and receive call setup information and call content.[11] | ” |
Information security[]
Access is the "[a]bility to make use of any information system (IS) resource."[12]
Access is
“ | [t]he knowledge, use, or possession of classified or unclassified controlled information required by an individual to perform official duties that is provided to the individual on a need-to-know basis.[13] | ” |
Intelligence[]
Access is
“ |
|
” |
“ | the ability and opportunity to obtain knowledge of classified sensitive information or to be in a place where one could expect to gain such knowledge.[15] | ” |
Internet[]
“ | “Individuals have a wide variety of avenues to access cyberspace in general, and the Internet in particular. In terms of physical access, there are two common methods to establish an actual link to the Internet. First, one can use a computer or computer terminal that is directly (and usually permanently) connected to a computer network that is itself directly or indirectly connected to the Internet. Second, one can use a ‘personal computer’ with a ‘modem’ to connect over a telephone line to a larger computer or computer network that is itself directly or indirectly connected to the Internet.”[16] | ” |
Military[]
Access is "[t]he ability and opportunity to obtain knowledge of classified information.[17]
Privacy[]
Access is
“ | an individual’s ability to view, modify, and contest the accuracy and completeness of personally identifiable information collected about him or her. Access is an element of the Organization for Economic Cooperation and Development's (OECD) Fair Information Principles (FIPs).[18] | ” |
Telecommunications[]
Access is
“ | [t]he technical capability to interface with a communications facility, such as a communications line or switch, so that law enforcement can monitor and receive call setup information and call content.[19] | ” |
U.S. copyright law[]
Access means the "opportunity to review the copyrighted work."[20] In traditional copyright infringement analysis, if the plaintiff cannot establish that the defendant copied a work by direct evidence, it can satisfy its burden of proof by showing that the defendant had access to the copyrighted work, and that the two works are substantially similar.
Types of access[]
There are two basic types of access: "view" and "edit."
- "View" access means that a user is able to view or obtain a copy of the information only.
- "Edit" access means that a user is able to correct, amend or delete information.
References[]
- ↑ CNSSI 4009, at 1.
- ↑ Auditing and Financial Management: Glossary of EDP Terminology, at 1.
- ↑ FFIEC, IT Examination Handbook Infobase, Glossary (full-text).
- ↑ America Online, Inc. v. National Health Care Discount, Inc., 121 F.Supp.2d 1255, 1273 (N.D. Iowa 2000) (full-text).
- ↑ Cal. Penal Code §502.
- ↑ Wash. Rev. Code 9A.52.010(6).
- ↑ West Virginia Computer Crime and Abuse Act, W. Va. Stat. §61-3C-3.
- ↑ DOE Manual 470.4-7, at 2.
- ↑ 45 C.F.R. § 164.304.
- ↑ Cybercrime Prevention Act of 2012 (Philippines) §3(a).
- ↑ Office of Technology Assessment, Electronic Surveillance in a Digital Age, Glossary (July 1995) (full-text).
- ↑ NIST Special Publication 800-32.
- ↑ DOE Manual 470.4-7, at 2.
- ↑ Department of Defense Dictionary of Military and Associated Terms.
- ↑ Terms & Definitions of Interest for Counterintelligence Professionals (July 9, 2014) (full-text).
- ↑ American Civil Liberties Union v. Reno, 929 F. Supp. 824, 832 (E.D. Pa. 1996) (full-text), aff’d, Reno v. American Civil Liberties Union, 521 U.S. 844 (1997) (full-text).
- ↑ Department of the Army Information Security Program, at 227.
- ↑ U.S. Department of Justice, Privacy Technology Focus Group Final Report, App. B, at 49.
- ↑ Electronic Surveillance in a Digital Age, at 71.
- ↑ E.F. Johnson Co. v. Uniden Corp. of America, 623 F. Supp. 1485, 1492 n.5 (D. Minn. 1985) (full-text).
See also[]
- Access attempt
- Access authority
- Access card
- Access charge
- Access code
- Access contract
- Access control
- Access control center
- Access control list
- Access control policy
- Access control procedures
- Access control technologies
- Access device
- Access in excess of authorization
- Access list
- Access level
- Access mechanism
- Access method
- Access minutes
- Access period
- Access point
- Access privileges
- Access profile
- Access provider
- Access rights
- Access service
- Access software
- Access software provider
- Access to classified information
- Access type
- Accessibility
- Administrative access
- Authorized access
- Cloud access
- Conditional access
- Controlled access
- Data access
- Electronic access
- Equal access
- Information access
- Internet access
- Internet access service
- Logical access
- Open access
- Public access
- Public access laws
- Remote access
- Switched access
- Temporary access eligibility
- Unauthorized access
- Universal access
- Write access