home *** CD-ROM | disk | FTP | other *** search
- /*R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act
- adopted in 1979, with a major revision in 1986*/
-
- SECTION 76-6-701. Computer crimes act--short title
-
- This part is known as the "Utah Computer Crimes Act."
-
- SECTION 76-6-602. Computer Crimes Act-- Definitions
-
- (1) "Access" means to directly or indirectly use, attempt to
- use, instruct, communicate with, cause input to, cause output
- from, or otherwise make use of any resources of a computer,
- computer system or computer network.
-
- (2) "Computer" means any electronic device or communication
- facility with data processing ability.
-
- (3) "Computer system" means a set of related, connected or
- unconnected, devices, software or other related computer
- equipment.
-
- (4) "Computer network" means the interconnection of
- communication or telecommunication lines between computers or
- computers and remote terminals.
-
- (5) "Computer property" includes, but is not limited to,
- electronic impulses, electronically produced data,
- information, financial instruments, software or programs, in
- either machine or human readable form, any other tangible or
- intangible item relating to a computer, computer system,
- computer network, and any copies of them.
-
- (6) "Services" include, but are not limited to, computer
- time, data manipulation and storage facilities.
-
- (7) "Financial instrument" includes, but is not limited to
- any check, draft, money order, certificate of deposit, letter
- of credit, bill of exchange, credit card, or marketable
- security.
-
- (8) "Software" or "program" means a series of instructions
- or statements in a form acceptable to a computer, relating to
- the operations of the computer, or permitting the functioning
- of a computer system in a manner designed to provide results
- including, but not limited to, system control programs,
- application programs or copies of them.
-
- SECTION 76-6-703. Computer crimes and penalties.
-
- (1) A person who gains or attempts to gain access to and
- without authorization intentionally and to the damage of another,
- alters, damages, destroys, discloses, or modifies any computer,
- computer network, computer property, computer system, program, or
- software is guilty of a felony of the third degree.
-
- (2) A person who intentionally and without authorization
- uses a computer, computer network, computer property, or computer
- system to gain or attempt to gain access to any other computer,
- computer network, computer property or computer system, program,
- or software, to the damage of another, and alters, damages,
- destroys, discloses, or modifies any of these, is guilty of a
- felony of the third degree.
-
- (3) A person who use or knowingly allows another person to
- use any computer, computer network, computer property, computer
- system, program or software to devise or execute any artifice or
- scheme to defraud or to obtain money, property or services or
- other things of value by false pretenses, promises, or
- representations, is guilty of a felony of the second degree.
-
- (4) A person who intentionally, and without authorization,
- interferes with or interrupts computer services to another,
- authorized to receive the services is guilty of a Class A
- misdemeanor.
-
- (5) A person who intentionally and without authorization
- damages or destroys, in whole or in part, any computer, computer
- network, computer property or computer system is guilty of a
- Class A misdemeanor unless the amount of damage exceeds $ 1,000,
- in which case the person is guilty of a felony of the third
- degree.
-
- SECTION 76-6-704. Computer crimes Act -- Attorney general or
- county attorney to prosecute -- Conduct violating other statutes.
-
- (1) The attorney general or the county attorney shall
- prosecute suspected criminal violations of this part.
-
- (2) Prosecution under this part does not prevent any
- prosecutions under any other law.
-
- SECTION 76-6-705. Reporting violations.
-
- Every person, except those to whom a statutory or common law
- privilege applies, who has reason to believe that the provisions
- of Section 76-6-703 are being or have been violated shall report
- the suspected violation to the attorney general or to the county
- attorney of the county in which part or all of the violations
- occurred.
-
- /* Be warned that unlike Georgia's "Snitch" statute, this one
- does not have immunity for a good faith report. Snitch at your
- own risk of being sued for malicious prosecution. */
-
-
-
-
- (1) An offense against computer users is the intentional:
-
- (a) denial to an authorized user, without consent, of
- the full and effective use of or access to a computer, a
- computer system, a computer network or computer
- services; or
-
- (b) use or disclosure to another, without consent, of
- the numbers, codes, passwords or other means of access
- to a computer, a computer system, a computer network, or
- computer services.
-
- (2) Whoever commits an offense against computer users shall
- be punished, upon conviction, by a fine of not more than One
- Thousand Dollars ($ 1,000), or by imprisonment for not more than
- six months, or by both such fine and imprisonment. However, when
- the damage or loss amounts to a value of One Hundred Dollars or
- more, the offender may be punished, upon convictions, by a fine
- of not more than Ten Thousand Dollars, or imprisonment for not
- more than 5 years, or by both such fine and imprisonment.
-
- SECTION 97-45-7. Offense against computer equipment, penalties.
-
- (1) An offense against intellectual property is the
- intentional:
-
- (a) Destruction, insertion or modification, without
- consent, of intellectual property; or
-
- (b) Disclosure, use, copying, taking or accessing,
- without consent, of intellectual property.
-
- (2) Whoever commits an offense against intellectual property
- shall be punished, upon conviction, by a fine of not more than
- One Thousand Dollars ($ 1,000), or by imprisonment for not more
- than six months, or by both such fine and imprisonment. However,
- when the damage or loss amounts to a value of One Hundred Dollars
- or more, the offender may be punished, upon convictions, by a
- fine of not more than Ten Thousand Dollars, or imprisonment for
- not more than 5 years, or by both such fine and imprisonment.
-
- (3) The provisions of this section shall not apply to the
- disclosure, use, copying, taking, or accessing by proper means as
- defined in this chapter.