<Li> United States v Sergey Aleynikov, 2011 . Aleynikov was a programmer at Goldman Sachs accused of copying code, like high - frequency trading code, allegedly in violation of 1030 (a) (2) (c) and 1030 (c) (2) (B) i - iii and 2 . This charge was later dropped, and he was instead charged with theft of trade secrets and transporting stolen property . </Li> <Li> United States v Nada Nadim Prouty, circa 2010 . Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency . She claims she was persecuted by a U.S. attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship . </Li> <Li> United States v. Neil Scott Kramer, 2011 . Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult . Central to the case was whether a cellphone constituted a computer device . Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if "the phone perform (s) arithmetic, logical, and storage functions", paving the way for harsher consequences for criminals engaging with minors over cellphones . </Li> <Li> United States v. Kane, 2011 . Exploiting a software bug in a poker machine does not constitute hacking because the poker machine in question was not a "protected computer" under the statute (not being connected to the Internet it was judged not to qualify as "protected computer" affecting interstate commerce) and because the sequence of button presses that triggered the bug were considered "not exceed their authorized access ." As of November 2013 the defendant still faces a regular wire fraud charge . </Li>

What are the laws that govern computer access and trespass