These laws are enormously complex and there will always be loopholes.
You can prosecute someone for maliciously exploiting your computing system, even though technically "they're just using the rules you wrote", because there will never not be such rules that allow for exploitation.
You can prosecute someone for maliciously exploiting your computing system, even though technically "they're just using the rules you wrote", because there will never not be such rules that allow for exploitation.