home *** CD-ROM | disk | FTP | other *** search
- /* R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law,
- Colorado Revised Statutes, Criminal Code, Section 18-5.5-101*.
-
-
- SECTION 18-5.5-101. Definitions
-
- As used in this article, unless the context otherwise
- requires:
-
- (1) "Authorization" means the express consent of a person
- which may include an employee's job description to use said
- person's computer, computer network, computer program, computer
- software, computer system, property, or services as those terms
- are defined in this section.
-
- (2) "Computer" means an electronic device which performs
- logical, arithmetic, or memory functions by the manipulations of
- electronic or magnetic impulses, and includes all input, output,
- processing, storage, software, or communication facilities which
- are connected or related to such a device in a system or network.
-
- (3) "Computer network" means the interconnection of
- communications lines (including microwave or other means of
- electronic communication) with a computer through remote
- terminals, or a complex consisting of two or more interconnected
- computers.
-
- (4) "Computer program" means an series of instructions or
- statements, in a form acceptable to a computer, which permits the
- functioning of a computer system in a manner designed to provide
- appropriate products from such computer system.
-
- (5) "Computer software" a set of computer programs,
- procedures and associated documentation concerned with the
- operation of a computer system.
-
- (6) "Computer system" means a set of related, connected or
- unconnected computer equipment, devices and software.
-
- (7) "Financial instrument" means any check, draft, money
- order, certificate of deposit, letter of credit, bill of
- exchange, credit card, debit card, or marketable security.
-
- (8) "Property" includes but is not limited to, financial
- instruments, information, including electronically produced data,
- and computer software and programs, in either machine human
- readable form, and any other tangible or intangible item of
- value.
-
- (9) "Services" includes, but is not limited to, computer
- time, data processing and storage functions.
-
- (10) To "use" means to instruct, communicated with, store
- data in, retrieve data from, or otherwise make use of any of the
- resources of a computer, computer system, or computer network.
-
- SECTION 18-5.5-102. Computer crime
-
- (1) Any person who knowingly uses any computer, computer
- system, computer network, or any part thereof for the purpose of
- devising or executing any scheme or artifice to defraud;
- obtaining property or services, by means of false or
- fraudulent pretenses, representations or promises; using the
- property or services of another without authorization; or
- committing theft commits computer crime.
-
- (2) Any person who knowingly and without authorization, uses
- alters, damages, destroys any computer, computer system, computer
- network, described in section 18-5.5-101, or any computer
- software, program or data contained in such computer, computer
- system or computer network commits computer crime.
-
- (3) If the loss, damage, or thing of value taken in
- violation of this section is less than fifty dollars, computer
- crime is a class 3 misdemeanor; if fifty dollars or more but less
- than three hundred dollars, computer crime is a class 2
- misdemeanor; if three hundred dollars or more but less than ten
- thousand dollars, computer crime is a class 4 felony; if ten
- thousand dollars or more, computer crime is a class 3 felony.