The choices in existing law (pp.14-29) for new offenses.
If the offending act is misuse of a computer to gain unauthorized access to data, or to change or delete data, or deny access…
• Why is the existing law of each of (a) trespass, (b) burglary, and (c) theft (at least at first glance) an appealing source of criminal law as applied to these new offenses in cyberspace (distinguish each).
• But what are the limitations of each of those three laws when it comes to cyberspace?