It is a defense to an action brought pursuant to Subchapter B (relating to hacking and similar offenses) that the actor:
(1) was entitled by law or contract to engage in the conduct constituting the offense; or
(2) reasonably believed that he had the authorization or permission of the owner, lessee, licensee, authorized holder, authorized possessor or agent of the computer, computer network, computer software, computer system, database or telecommunication device or that the owner or authorized holder would have authorized or provided permission to engage in the conduct constituting the offense. As used in this section, the term "authorization" includes express or implied consent, including by trade usage, course of dealing, course of performance or commercial programming practices.
Structure Pennsylvania Consolidated & Unconsolidated Statutes
Pennsylvania Consolidated & Unconsolidated Statutes
Title 18 - CRIMES AND OFFENSES
Chapter 76 - Computer Offenses
Section 7604 - Concurrent jurisdiction
Section 7611 - Unlawful use of computer and other computer crimes
Section 7612 - Disruption of service
Section 7614 - Unlawful duplication
Section 7615 - Computer trespass
Section 7616 - Distribution of computer virus
Section 7622 - Duty of Internet service provider
Section 7623 - Protection of privacy
Section 7625 - Jurisdiction for prosecution
Section 7626 - Application for order to remove or disable items
Section 7627 - Order to remove or disable certain items from Internet service provider's service
Section 7628 - Notification procedure
Section 7629 - Designated agent
Section 7630 - Report to General Assembly
Section 7641 - Computer-assisted remote harvesting of animals