{"id":1045,"date":"2021-10-25T04:03:32","date_gmt":"2021-10-25T04:03:32","guid":{"rendered":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/?page_id=1045"},"modified":"2022-05-03T21:55:03","modified_gmt":"2022-05-03T21:55:03","slug":"caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502","status":"publish","type":"page","link":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/","title":{"rendered":"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502)"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ku80gwzp-d40ef635064a532d55f2b8ef70b8231c\">\n#top .av-special-heading.av-ku80gwzp-d40ef635064a532d55f2b8ef70b8231c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-ku80gwzp-d40ef635064a532d55f2b8ef70b8231c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-ku80gwzp-d40ef635064a532d55f2b8ef70b8231c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-ku80gwzp-d40ef635064a532d55f2b8ef70b8231c av-special-heading-h1 blockquote modern-quote  avia-builder-el-0  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502)<\/h1><div class='av-subheading av-subheading_below'><p>California Civil Jury Instructions CACI<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<div  class='hr av-av_hr-91d7ccd583a503147498e120fee2ff9b hr-default  avia-builder-el-1  el_after_av_heading  el_before_avia_sc_search '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7\">\n#top .avia_search_element.av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7 .av_searchform_wrapper{\nborder-radius:0px 0px 0px 0px;\nborder-color:#edae44;\nbackground-color:#edae44;\n}\n#top .avia_search_element.av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7 #s.av-input-field{\nborder-radius:0px 0px 0px 0px;\n}\n#top .avia_search_element.av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7 #searchsubmit{\nborder-radius:0px 0px 0px 0px;\n}\n#top .avia_search_element.av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7 .av_searchsubmit_wrapper{\nborder-radius:0px 0px 0px 0px;\n}\n.ajax_search_response.av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7{\npadding:0px 0px 0px 0px;\nmargin:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='avia_search_element av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7  avia-builder-el-2  el_after_av_hr  el_before_av_textblock '><search><form action='https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/' id='searchform_element' method='get' class='' data-element_id='av-avia_sc_search-f7f83518637509acfac1c9900b84c1e7' ><div class='av_searchform_wrapper'><input type='search' value='' id='s' name='s' placeholder='Search CACI' aria-label='Search CACI' class='av-input-field ' required \/><div class='av_searchsubmit_wrapper '><input type='submit' value='Find' id='searchsubmit' class='button ' title='View results on search page' aria-label='View results on search page' \/><\/div><input type='hidden' name='numberposts' value='8' \/><input type='hidden' name='post_type' value='page' \/><input type='hidden' name='results_hide_fields' value='post_titles,meta,image' \/><\/div><\/form><\/search><\/div>\n<section  class='av_textblock_section av-av_textblock-e878f05c31dff72941bf1e49a00d9ff5 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li><a href=\"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/\">CACI Jury Instructions Index<\/a><\/li>\n<li><a href=\"https:\/\/caci-fillable-forms.crowdsourcelawyers.com\/\">App: CACI Jury Instructions Fillable Forms Word Format<\/a><\/li>\n<\/ul>\n<\/div><\/section>\n<div  class='hr av-av_hr-91d7ccd583a503147498e120fee2ff9b hr-default  avia-builder-el-4  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ku80iglp-ed7512ffc9e6cad77629b280fa7c4849\">\n#top .av_textblock_section.av-ku80iglp-ed7512ffc9e6cad77629b280fa7c4849 .avia_textblock{\nfont-size:20px;\n}\n<\/style>\n<section  class='av_textblock_section av-ku80iglp-ed7512ffc9e6cad77629b280fa7c4849 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 class=\"SS_Banner\">1812\u00a0Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502)<\/h2>\n<hr \/>\n<p><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">[<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] claims that [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of defendant<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] has violated the Comprehensive Computer Data and Access Fraud Act. To establish this claim, [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] must prove all of the following:<\/span><\/p>\n<p><span class=\"SS_ListLabel\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">1.<\/span><\/span><span class=\"SS_ListItemContent\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">That [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] is the [owner\/lessee] of the [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">specify computer, computer system, computer network, computer program, and\/or data<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">];<\/span><\/span><\/p>\n<p><span class=\"SS_ListLabel\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">2.<\/span><\/span><span class=\"SS_ListItemContent\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">That [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of defendant<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] knowingly [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">specify one or more prohibited acts from\u00a0Pen. Code, \u00a7\u2009502(c), e.g., accessed [name of plaintiff]\u2019s data on a computer, computer system, or computer network<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">];<\/span><\/span><\/p>\n<p><span class=\"SS_ListLabel\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">[3.<\/span><\/span><span class=\"SS_ListItemContent\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">That [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of defendant<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">]\u2019s [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">specify conduct from\u00a0Pen. Code, \u00a7\u2009502(c), e.g., use of the computer services<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] was without [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">]\u2019s permission;]<\/span><\/span><\/p>\n<p><span class=\"SS_ListLabel\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">[4.]<\/span><\/span><span class=\"SS_ListItemContent\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">That [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">] was harmed; and<\/span><\/span><\/p>\n<p><span class=\"SS_ListLabel\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">[5.]<\/span><\/span><span class=\"SS_ListItemContent\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">That [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of defendant<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">]\u2019s conduct was a substantial factor in causing [<\/span><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">name of plaintiff<\/span><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\">]\u2019s harm. <br class=\"avia-permanent-lb\" \/><br class=\"avia-permanent-lb\" \/><\/span><\/span><\/p>\n<hr \/>\n<div class=\"SS_Note\">\n<h2 class=\"SS_HideShowSection SS_Expandable\"><\/h2>\n<div id=\"TRNotes_n_1\">\n<p><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">New May 2020 <br class=\"avia-permanent-lb\" \/><br class=\"avia-permanent-lb\" \/><\/span><\/p>\n<hr \/>\n<p><a href=\"https:\/\/crowdsourcelawyers.com\/\">Crowdsource Lawyers<\/a><\/p>\n<p><a href=\"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\">https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci<\/a><span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\"><br class=\"avia-permanent-lb\" \/><\/span><\/p>\n<hr \/>\n<\/div>\n<\/div>\n<div class=\"SS_Note\">\n<h2 class=\"SS_HideShowSection SS_Expandable\">Directions for Use<\/h2>\n<div id=\"TRNotes_n_2\">\n<p>Give this instruction for a claim under the Comprehensive Computer Data Access and Fraud Act (CDAFA). CDAFA makes civil remedies available to any person who suffers damage or loss by reason of the commission of certain computer-related offenses. (Pen. Code, \u00a7\u2009502(c),\u00a0(e)(1).)<\/p>\n<p>For element 1, the court may need to define the technology (e.g., \u201ccomputer network,\u201d \u201ccomputer program or software,\u201d \u201ccomputer system,\u201d or \u201cdata\u201d) or other statutory term depending on the facts and circumstances of the particular case. (See\u00a0Pen. Code, \u00a7\u2009502(b)\u00a0[defining various terms].) For a definition of \u201caccess,\u201d see\u00a0CACI No. 1813,\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Definition of \u201cAccess.\u201d<\/span><\/p>\n<p>Some of the prohibited acts for element 2 may also require that the defendant do something specific with the access or that the defendant have a specific purpose. For example, if the defendant allegedly deleted or used plaintiff\u2019s computer data, it must have been done without permission and either to (a) devise or execute any scheme or artifice to defraud, deceive, or extort, or (b) wrongfully control or obtain money, property, or data. (See\u00a0Pen. Code, \u00a7\u2009502(c)(1).) Modify the instruction to include these elements where required.<\/p>\n<p>Include element 3 regarding lack of permission depending on the violation(s) alleged. Lack of permission is a required element for violations of subdivisions (c)(1)\u2013(7) and (c)(9)\u2013(13), but not for violations of subdivisions (c)(8) and (c)(14). Modify element 3 accordingly. Delete element 3 for violations of the latter subdivisions.<\/p>\n<p>If plaintiff\u2019s claim involves a \u201cgovernment computer system\u201d or a \u201cpublic safety infrastructure computer system\u201d and there is a factual dispute about the type of computer system involved, this instruction should be modified to add that issue as an element. (See\u00a0Pen. Code, \u00a7\u2009502(c)(10),\u00a0(11),\u00a0(12),\u00a0(13), and\u00a0(14).) <br class=\"avia-permanent-lb\" \/><br class=\"avia-permanent-lb\" \/><\/p>\n<hr \/>\n<\/div>\n<\/div>\n<div class=\"SS_Note\">\n<h2 class=\"SS_HideShowSection SS_Expandable\">Sources and Authority<\/h2>\n<div id=\"TRNotes_n_3\">\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">Comprehensive Computer Data Access and Fraud Act.\u00a0Penal Code section 502.<\/span><\/p>\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">\u201cPenal Code section 502, subdivision (e)(1)\u00a0permits a civil action to recover expenses related to investigating the unauthorized computer access.\u201d (<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Verio Healthcare, Inc. v. Superior Court<\/span>\u00a0(2016) 3 Cal.App.5th 1315, 1321 fn. 3 [208 Cal.Rptr.3d 436].)<\/span><\/p>\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">\u201cFour of the section 502, subdivision (c) offenses include access as an element. The provision under which [defendant] was charged does not. When different words are used in adjoining subdivisions of a statute that were enacted at the same time, that fact raises a compelling inference that a different meaning was intended. The Legislature\u2019s requirement of unpermitted access in some section 502 offenses and its failure to require that element in other parts of the same statute raise a strong inference that the subdivisions that do not require unpermitted access were intended to apply to persons who gain lawful access to a computer but then abuse that access.\u201d (<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">People v. Childs<\/span>\u00a0(2013) 220 Cal.App.4th 1079, 1102 [164 Cal.Rptr.3d 287], internal citations omitted.)<\/span><\/p>\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">\u201c[The CDAFA] does not require\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">unauthorized<\/span>\u00a0access. It merely requires\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">knowing<\/span>\u00a0access. What makes that access unlawful is that the person \u2018without permission takes, copies, or makes use of\u2019 data on the computer. A plain reading of the statute demonstrates that its focus is on unauthorized taking or use of information.\u201d (<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">United States v. Christensen<\/span>\u00a0(9th Cir. 2015) 828 F.3d 763, 789, original italics, internal citations omitted.)<\/span><\/p>\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">\u201cBecause [defendant] had implied authorization to access [plaintiff]\u2019s computers, it did not, at first, violate the [CDAFA]. But when [plaintiff] sent the cease and desist letter, [defendant], as it conceded, knew that it no longer had permission to access [plaintiff]\u2019s computers at all. [Defendant], therefore, knowingly accessed and without permission took, copied, and made use of [plaintiff]\u2019s data.\u201d (<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Facebook, Inc. v. Power Ventures, Inc.<\/span>\u00a0(9th Cir. 2016) 844 F.3d 1058, 1069.)<\/span><\/p>\n<p><span class=\"SS_ListLabel\">\u2022<\/span><span class=\"SS_ListItemContent\">\u201c[T]aking data using a\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">method<\/span>\u00a0prohibited by the applicable terms of use, when the taking itself generally is permitted, does not violate the CDAFA.\u201d (<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Oracle USA, Inc. v. Rimini Street, Inc.<\/span>\u00a0(9th Cir. 2018) 879 F.3d 948, 962, reversed in part on other grounds by\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Rimini Street, Inc. v. Oracle USA, Inc.<\/span>\u00a0(2019) \u2014 U.S. \u2014 [139 S.Ct. 873, 881, 203 L.Ed.2d 180], original italics.) <br class=\"avia-permanent-lb\" \/><br class=\"avia-permanent-lb\" \/><\/span><\/p>\n<hr \/>\n<\/div>\n<\/div>\n<h2 class=\"SS_Heading\"><span class=\"SS_bf\" data-housestyle=\"EMPHASIS_bf\"><span class=\"SS_ib\" data-housestyle=\"EMPHASIS_ib\">Secondary Sources<\/span><\/span><\/h2>\n<div>5 Witkin, California Criminal Law (4th ed. 2012) Crimes Against Property, \u00a7\u2009229 et seq.<\/div>\n<div>31\u00a0California Forms of Pleading and Practice, Ch. 349,\u00a0<span class=\"SS_it\" data-housestyle=\"EMPHASIS_it\">Literary Property and Copyright<\/span>, \u00a7\u2009349.41[5]\u00a0(Matthew Bender)<\/div>\n<div class=\"SS_Note\">\n<div id=\"TRNotes_n_3\"><\/div>\n<\/div>\n<\/div><\/section>\n<div  class='hr av-77c0hh-b4fa5e5d4e472532cd2378ece5a37ff8 hr-default  avia-builder-el-6  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5eq9mt-279bc11938d0632f0eb45619e9105b08\">\n#top .av_textblock_section.av-5eq9mt-279bc11938d0632f0eb45619e9105b08 .avia_textblock{\nfont-size:22px;\n}\n<\/style>\n<section  class='av_textblock_section av-5eq9mt-279bc11938d0632f0eb45619e9105b08 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/crowdsourcelawyers.com\/\">CrowdSourceLawyers.com<\/a><\/p>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1045","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-\u00a7-502\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI\" \/>\n<meta property=\"og:url\" content=\"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-\u00a7-502\/\" \/>\n<meta property=\"og:site_name\" content=\"Judicial Council California Civil Jury Instructions CACI\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-03T21:55:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\\\/\",\"url\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\\\/\",\"name\":\"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#website\"},\"datePublished\":\"2021-10-25T04:03:32+00:00\",\"dateModified\":\"2022-05-03T21:55:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#website\",\"url\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/\",\"name\":\"Judicial Council California Civil Jury Instructions CACI\",\"description\":\"California Civil Jury Instructions CACI site\",\"publisher\":{\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#organization\",\"name\":\"CrowdSource Lawyers\",\"url\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/09\\\/CrowdSource-Logo.png\",\"contentUrl\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/09\\\/CrowdSource-Logo.png\",\"width\":453,\"height\":208,\"caption\":\"CrowdSource Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/crowdsourcelawyers.com\\\/judicial-council-california-civil-jury-instructions-caci\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-\u00a7-502\/","og_locale":"en_US","og_type":"article","og_title":"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI","og_url":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-\u00a7-502\/","og_site_name":"Judicial Council California Civil Jury Instructions CACI","article_modified_time":"2022-05-03T21:55:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/","url":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/","name":"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502) - Judicial Council California Civil Jury Instructions CACI","isPartOf":{"@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#website"},"datePublished":"2021-10-25T04:03:32+00:00","dateModified":"2022-05-03T21:55:03+00:00","breadcrumb":{"@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/caci-1812-comprehensive-computer-data-and-access-fraud-act-essential-factual-elements-pen-code-%c2%a7-502\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/home\/"},{"@type":"ListItem","position":2,"name":"CACI 1812 Comprehensive Computer Data and Access Fraud Act\u2014Essential Factual Elements (Pen. Code, \u00a7\u2009502)"}]},{"@type":"WebSite","@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#website","url":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/","name":"Judicial Council California Civil Jury Instructions CACI","description":"California Civil Jury Instructions CACI site","publisher":{"@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#organization","name":"CrowdSource Lawyers","url":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#\/schema\/logo\/image\/","url":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-content\/uploads\/sites\/2\/2021\/09\/CrowdSource-Logo.png","contentUrl":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-content\/uploads\/sites\/2\/2021\/09\/CrowdSource-Logo.png","width":453,"height":208,"caption":"CrowdSource Lawyers"},"image":{"@id":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/pages\/1045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/comments?post=1045"}],"version-history":[{"count":1,"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/pages\/1045\/revisions"}],"predecessor-version":[{"id":3539,"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/pages\/1045\/revisions\/3539"}],"wp:attachment":[{"href":"https:\/\/crowdsourcelawyers.com\/judicial-council-california-civil-jury-instructions-caci\/wp-json\/wp\/v2\/media?parent=1045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}