111 56 F 3d 1416 (DC Cir. 1995). Also see State v. Schwartz, 173 Ore App 301 at 317 (Or. Ct App. 2001) where it was held that password files could be the subject of theft under the Oregon statute. 112 Also see US v. Kernell, 742 P Supp 2d 904 (ED Tenn. 2010) in which the defendant was prosecuted, inter alia, for wire fraud in relation to unauthorised access to Governor Sarah Palin’s email account. The court rejected a motion to dismiss which argued that ‘information data and pictures’ cannot constitute ‘property’ for the purposes of 18 USC § 1343. 113 R v. McLaughlin [1980] 2 SCR 331. 114 See, e.g., US v. Schreier, 908 F 2d 645 (10th Cir. 1990). 115 R v. Whitely (1991) 93 Cr App R 25; Cox v. Riley (1986) 83 Cr App R 54; Re Turner (1984) 13 CCC (3d) 430. 116 Law Commission (UK), Computer misuse, Final Report No. 186 (1989), [2.31]. 117 [1988] AC 1063. 118 Ibid., at 1071. 119 D. B. Parker, Fighting computer crime (New York: Scribner, 1983), p. 240; J. McConvill, ‘Contemporary comment: Computer trespass in Victoria’ (2001) 25 Criminal Law Journal 220, 224. 120 Lund v. Commonwealth, 217 Va 688 (SC Va. 1977). 121 State v. McGraw, 480 NE 2d 552 (SC Ind. 1985). See also S. W. Brenner, ‘Bits, bytes, and bicycles: Theft and cyber theft’ (2012) 47 New England Law Review 817. 122 R v. Maurer, 2014 SKPC 118.