you did NOT give him permission to change your password or accounts.
look at it this way - if I work at a bank, I am given permission to use the computer. My job does NOT give me permission to lrecord account information, change passwords, etc.
You have been TOTALLY violated and trespassed against, yo.
s 18.2-152.3. COMPUTER fraud.
Any person who uses a COMPUTER or COMPUTER network without authority and with the intent to:
Obtain property or services by false pretenses;
Embezzle or commit larceny; or
Convert the property of another shall be guilty of the CRIME of COMPUTER fraud. If the value of the property or services obtained is $200 or more, the CRIME of COMPUTER fraud shall be punishable as a Class 5 felony. Where the
value of the property or services obtained is less than $200, the CRIME of
COMPUTER fraud shall be punishable as a Class 1 misdemeanor.
s 18.2-152.4. COMPUTER trespass.
Any person who uses a COMPUTER or COMPUTER network without authority and with the intent to:
Temporarily or permanently remove COMPUTER data, COMPUTER programs, or COMPUTER software from a COMPUTER or COMPUTER network;
Cause a COMPUTER to malfunction regardless of how long the malfunction persists;
Alter or erase any COMPUTER data, COMPUTER programs, or COMPUTER software;
Effect the creation or alteration of a financial instrument or of an electronic transfer of funds;
Cause physical injury to the property of another; or
Make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of COMPUTER data, COMPUTER programs, or COMPUTER software residing in, communicated by, or produced by a COMPUTER or COMPUTER network shall be guilty of the CRIME of COMPUTER trespass, which shall be punishable as a Class 1 misdemeanor. If such act is done maliciously and the value of the property damaged is $2,500 or more, the offense shall be punishable as a Class 6 felony.
s 18.2-152.5. COMPUTER invasion of privacy.
A person is guilty of the CRIME of COMPUTER invasion of privacy when he uses a COMPUTER or COMPUTER network and intentionally examines without authority any employment, salary, credit or any other financial or personal information relating to any other person. "Examination" under this section requires the offender to review the information relating to any other person after the time at which the offender knows or should know that he is without authority to view the information displayed.
The CRIME of COMPUTER invasion of privacy shall be punishable as a Class 3 misdemeanor.
s 18.2-152.6. Theft of COMPUTER services.
Any person who willfully uses a COMPUTER or COMPUTER network, with intent to obtain COMPUTER services without authority, shall be guilty of the CRIME of theft of COMPUTER services, which shall be punishable as a Class 1 misdemeanor.
s 18.2-152.12. Civil relief; damages.
Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor and recover for any damages sustained, and the costs of suit. Without limiting the generality of the term, "damages" shall include loss of profits.
At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a way as to protect the secrecy and security of the COMPUTER, COMPUTER network, COMPUTER data, COMPUTER program and COMPUTER software involved in order to prevent possible recurrence of the same or a similar act by another person and to protect any trade secrets of any party.
s 18.2-152.14. COMPUTER as instrument of forgery.
The creation, alteration, or deletion of any COMPUTER data contained in any COMPUTER or COMPUTER network, which if done on a tangible document or instrument would constitute forgery under Article 1 (s 18.2-168 et seq.) of Chapter 6 of this Title, will also be deemed to be forgery. The absence of a tangible writing directly created or altered by the offender shall not be a defense to any CRIME set forth in Article 1 (s 18.2-168 et seq.) of Chapter 6 of this Title if a creation, alteration, or deletion of COMPUTER data was involved in lieu of a tangible document or instrument.
http://courses.cs.vt.edu/cs3604/lib/Crime/virginia.law.full
however, it's more a civil case than anything else. Yr gonna have to prove damages, that sorta thing. DEFINITELY make a police report, but mor importantly, talk to yr attorney as soon as possible