{"component": "definition", "props": {"groups": [{"samples": [{"hash": "4wKQ0H6kDNn", "uri": "https://lawfilestestext.leg.wa.gov/lawtest/RCWPDF/RCW%20%20%209A%20TITLE/RCW%20%20%209A.%2090%20%20CHAPTER/RCW%20%20%209A.%2090%20.030.pdf", "label": "lawfilestestext.leg.wa.gov", "score": 17.8470573425, "published": false}, {"hash": "gbF4vev9dsB", "uri": "https://app.leg.wa.gov/rcw/default.aspx?Cite=9A.90&full=true&pdf=true", "label": "app.leg.wa.gov", "score": 11.918548584, "published": false}, {"hash": "bxbBQE1gi5J", "uri": "https://app.leg.wa.gov/RCW/default.aspx?cite=9A.90&full=true&pdf=true", "label": "app.leg.wa.gov", "score": 11.3436002731, "published": false}], "snippet": "means to knowingly circumvent technological access barriers to a data system in order to obtain information without the express or implied permission of the owner, where such technological access measures are specifically designed to exclude or prevent unauthorized individuals from obtaining such information, but does not include white hat security research or circumventing a technological measure that does not effectively control access to a computer. The term \"without the express or implied permission\" does not include access in violation of a duty, agreement, or contractual obligation, such as an acceptable use policy or terms of service agreement, with an internet service provider, internet website, or employer. The term \"circumvent technological access barriers\" may include unauthorized elevation of privileges, such as allowing a normal user to execute code as administrator, or allowing a remote person without any privileges to run code. [2022 c 231 \u00a7 2; 2016 c 164 \u00a7 3.]", "snippet_links": [{"key": "data-system", "type": "definition", "offset": [65, 76]}, {"key": "in-order-to", "type": "clause", "offset": [77, 88]}, {"key": "information-without", "type": "clause", "offset": [96, 115]}, {"key": "of-the-owner", "type": "clause", "offset": [150, 162]}, {"key": "access-measures", "type": "clause", "offset": [189, 204]}, {"key": "such-information", "type": "definition", "offset": [293, 309]}, {"key": "white-hat-security-research", "type": "definition", "offset": [332, 359]}, {"key": "access-to", "type": "definition", "offset": [435, 444]}, {"key": "the-term", "type": "definition", "offset": [457, 465]}, {"key": "in-violation", "type": "definition", "offset": [534, 546]}, {"key": "contractual-obligation", "type": "clause", "offset": [572, 594]}, {"key": "acceptable-use-policy", "type": "definition", "offset": [607, 628]}, {"key": "terms-of-service-agreement", "type": "clause", "offset": [632, 658]}, {"key": "internet-service-provider", "type": "definition", "offset": [668, 693]}, {"key": "internet-website", "type": "definition", "offset": [695, 711]}, {"key": "normal-user", "type": "definition", "offset": [847, 858]}], "size": 9, "hash": "2522ccff29901948ced10111cab1fa41", "id": 1}, {"samples": [{"hash": "aaY7HHqTktC", "uri": "https://legislation.nysenate.gov/pdf/bills/2017/A3005", "label": "legislation.nysenate.gov", "score": 19.298412323, "published": false}, {"hash": "9ERiX2B8WAM", "uri": "https://legislation.nysenate.gov/pdf/bills/2017/s2005a", "label": "legislation.nysenate.gov", "score": 11.3846683502, "published": false}, {"hash": "1CRAOmdpr46", "uri": "https://www2.assembly.state.ny.us/2017budget/20170117executive/A3005A_PPGG.pdf", "label": "www2.assembly.state.ny.us", "score": 11.3737163544, "published": false}], "snippet": "means to use or to access a computer,", "snippet_links": [], "size": 6, "hash": "a3b3e3c603bde942b7fd50f43c451344", "id": 2}, {"samples": [{"hash": "7sADysEPQM6", "uri": "https://www.ncsl.org/Portals/1/Documents/Taskforces/WashingtonCybercrimebill.pdf", "label": "www.ncsl.org", "score": 8.1416835785, "published": false}, {"hash": "b2uab60t3dK", "uri": "https://lawfilesext.leg.wa.gov/biennium/2015-16/Pdf/Bills/House%20Bills/2375-S2.E.pdf", "label": "lawfilesext.leg.wa.gov", "score": 8.062286377, "published": false}, {"hash": "fVbYBSPV2lg", "uri": "https://lawfilesext.leg.wa.gov/Biennium/2015-16/Pdf/Bills/House%20Bills/2375-S.pdf", "label": "lawfilesext.leg.wa.gov", "score": 8.0431213379, "published": false}], "snippet": "means to knowingly circumvent", "snippet_links": [], "size": 5, "hash": "65694458914f1798221ec05c68c4ad8d", "id": 3}, {"samples": [{"hash": "3cR1YBA94Y1", "uri": "https://www.nrc.gov/docs/ML0823/ML082330303.pdf", "label": "www.nrc.gov", "score": 3.0373151302, "published": false}, {"hash": "gkPZBgDc3dw", "uri": "https://www.nrc.gov/reading-rm/doc-collections/commission/secys/2008/secy2008-0083/2008-0083scy.pdf", "label": "www.nrc.gov", "score": 3.0, "published": false}, {"hash": "hxowOwBKvg5", "uri": "https://www.nrc.gov/docs/ML0816/ML081690797.pdf", "label": "www.nrc.gov", "score": 3.0, "published": false}], "snippet": "means not authorized as part of one\u2019s official duties to carry weapons or explosives;", "snippet_links": [{"key": "official-duties", "type": "definition", "offset": [38, 53]}], "size": 3, "hash": "a529fe144331f35d7ee87ef03a440fc2", "id": 4}, {"samples": [{"hash": "eCtpUulMm3Q", "uri": "https://lawfilesext.leg.wa.gov/biennium/2017-18/Pdf/Bills/House%20Bills/2678.pdf", "label": "lawfilesext.leg.wa.gov", "score": 9.0150585175, "published": false}, {"hash": "ePErALWJZ3s", "uri": "https://lawfilesext.leg.wa.gov/biennium/2021-22/Pdf/Bills/Senate%20Bills/5628.pdf", "label": "lawfilesext.leg.wa.gov", "score": 9.0136890411, "published": false}], "snippet": "means to knowingly", "snippet_links": [], "size": 2, "hash": "fc7cb96fa87be83f107d5a58d5482baf", "id": 5}, {"samples": [{"hash": "l7CjiFsJiL2", "uri": "https://www.govinfo.gov/content/pkg/USCOURTS-cand-4_16-cv-02458/pdf/USCOURTS-cand-4_16-cv-02458-30.pdf", "label": "www.govinfo.gov", "score": 9.4613275528, "published": false}], "snippet": "means access to a protected computer by a person who:", "snippet_links": [{"key": "access-to", "type": "definition", "offset": [6, 15]}, {"key": "protected-computer", "type": "definition", "offset": [18, 36]}, {"key": "a-person", "type": "clause", "offset": [40, 48]}], "size": 1, "hash": "dbd4aec67a9a2277eea9df12c0a2f7d3", "id": 6}, {"samples": [{"hash": "42tajsp94Lw", "uri": "https://arkansasadvocate.com/wp-content/uploads/2023/12/Arkansas-Law-for-School-Libraries-revised-2.pdf", "label": "arkansasadvocate.com", "score": 7.9828882217, "published": false}], "snippet": "means contrary to rules which set forth policies governing access to library materials and include eligibility for library patronage and lending procedures.", "snippet_links": [{"key": "contrary-to", "type": "definition", "offset": [6, 17]}, {"key": "access-to", "type": "definition", "offset": [59, 68]}, {"key": "library-materials", "type": "definition", "offset": [69, 86]}, {"key": "eligibility-for", "type": "clause", "offset": [99, 114]}, {"key": "lending-procedures", "type": "clause", "offset": [137, 155]}], "size": 1, "hash": "211e9e773699ad05e3a42038ee4e5f6b", "id": 7}, {"samples": [{"hash": "f3XnvIUNCbn", "uri": "https://www.city.kodiak.ak.us/sites/default/files/fileattachments/City%20Council/meeting/packets/3481/20140327regularmeetingpacket.pdf", "label": "www.city.kodiak.ak.us", "score": 5.1067762375, "published": false}], "snippet": "means contrary to rules which set forth policies governing access to library materials including, but not limited to, eligibility for library patronage and lending procedures.", "snippet_links": [{"key": "contrary-to", "type": "definition", "offset": [6, 17]}, {"key": "access-to", "type": "definition", "offset": [59, 68]}, {"key": "library-materials", "type": "definition", "offset": [69, 86]}, {"key": "not-limited", "type": "clause", "offset": [102, 113]}, {"key": "eligibility-for", "type": "clause", "offset": [118, 133]}, {"key": "lending-procedures", "type": "clause", "offset": [156, 174]}], "size": 1, "hash": "8da50a3dd0c2168d9d3a258c04b4587f", "id": 8}, {"samples": [{"hash": "7Jbssnd8WaS", "uri": "https://www.capitol.hawaii.gov/hrscurrent/Vol14_Ch0701-0853/HRS0708/HRS_0708-0890.htm", "label": "www.capitol.hawaii.gov", "score": 7.1704311371, "published": false}], "snippet": "means without the permission of or in excess of the permission of an owner, lessor, or rightful user or someone licensed or privileged by an owner, lessor, or rightful user to grant the permission. [L 1992, c 225, pt of \u00a72; am L 2001, c 33, \u00a74; am L 2003, c 3, \u00a717; am L 2014, c 213, \u00a72]", "snippet_links": [{"key": "an-owner", "type": "clause", "offset": [66, 74]}], "size": 1, "hash": "fd465eedc2fbcf3181a70522ceab8946", "id": 9}, {"samples": [{"hash": "e9uLDgjTzyy", "uri": "https://www.capitol.hawaii.gov/sessions/session2018/testimony/HB2257_HD2_TESTIMONY_CPH_04-03-18_.PDF", "label": "www.capitol.hawaii.gov", "score": 9.1245718002, "published": false}], "snippet": "means without the permission of or in excess of the permission of an owner, lessor, or", "snippet_links": [{"key": "an-owner", "type": "clause", "offset": [66, 74]}], "size": 1, "hash": "02b2c45309dda475ef7818332c705a61", "id": 10}], "next_curs": "CmISXGoVc35sYXdpbnNpZGVyY29udHJhY3Rzcj4LEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIed2l0aG91dC1hdXRob3JpemF0aW9uIzAwMDAwMDBhDKIBAmVuGAAgAA==", "definition": {"snippet": "means to knowingly circumvent technological access barriers to a data system in order to obtain information without the express or implied permission of the owner, where such technological access measures are specifically designed to exclude or prevent unauthorized individuals from obtaining such information, but does not include white hat security research or circumventing a technological measure that does not effectively control access to a computer. The term \"without the express or implied permission\" does not include access in violation of a duty, agreement, or contractual obligation, such as an acceptable use policy or terms of service agreement, with an internet service provider, internet website, or employer. The term \"circumvent technological access barriers\" may include unauthorized elevation of privileges, such as allowing a normal user to execute code as administrator, or allowing a remote person without any privileges to run code. [2022 c 231 \u00a7 2; 2016 c 164 \u00a7 3.]", "size": 35, "title": "Without authorization", "id": "without-authorization", "examples": ["<strong>Without authorization</strong> from the U.S. Government, You may not export or re-export the Software (i) to any prohibited country, person, entity, or end-user as specified by U.S. export controls or (ii) for use in the design, development or production of nuclear, chemical, or biological weapons, or missile technology, or any other prohibited use.", "<strong>Without authorization</strong> from the U.S. Government, you may not export or re-export the Software (i) to any prohibited country, person, entity, or end-user as specified by U.S. export controls or (ii) for use in the design, development or production of nuclear, chemical, or biological weapons, or missile technology, or any other prohibited use.", "<strong>Without authorization</strong>, Party A shall not apply the service provided by Party B for other usage.", "<strong>Without authorization</strong> by the Board of Directors of the Company, Employee will not, at any time, publish or disclose any confidential information or trade secrets relating to the business of the Company known by Employee on the date hereof or as a consequence of or through his employment under this Agreement.", "<strong>Without authorization</strong> from the Company, employees may not have access to the Employer&#x27;s premises or facilities for any reason other than Employer-sponsored training or Employer-sponsored events.", "<strong>Without authorization</strong>, Party B shall not occupy the shared areas, facilities and equipment in the Property or change the use thereof, and shall not occupy or excavate roads and sites in the Property.", "<strong>Without authorization</strong> or consent, Party B shall not use personal computer devices or personal mailbox to handle the Company\u2019s business, and shall not copy, take screenshots of, take photos of, or send out the Company\u2019s information or data.", "<strong>Without authorization</strong> from the U.S. Government, You may not export or re-export the Software (i) to any prohibited country, person, entity, or end- user as specified by U.S. export controls or (ii) for use in the design, development or production of nuclear, chemical, or biological weapons, or missile technology, or any other prohibited use.", "<strong>Without authorization</strong> and permission by Party A in writing, Party B shall not have any ownership, rights to use exclusively or monopolistically, rights to re-permission of the rights or other rights on the Confidential Business Information herein in any countries or districts, nor apply for patent, ownership of non-patent technology or copyright in respect of the Confidential Business Information herein in any countries or districts.", "<strong>Without authorization</strong> of the Superintendent, vacation days shall not be taken when school is in session or on in-service days."], "related": [["sell-authorization", "Sell Authorization", "Sell Authorization"], ["product-authorizations", "Product Authorizations", "Product Authorizations"], ["environmental-authorization", "Environmental Authorization", "Environmental Authorization"], ["environmental-authorizations", "Environmental Authorizations", "Environmental Authorizations"], ["governmental-authorization", "Governmental Authorization", "Governmental Authorization"]], "related_snippets": [], "updated": "2025-07-10T04:27:38+00:00"}, "json": true, "cursor": ""}}