home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
LEGAL
/
UT_LAW.STA
< prev
next >
Wrap
Text File
|
1994-07-17
|
7KB
|
153 lines
/*R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act
adopted in 1979, with a major revision in 1986*/
SECTION 76-6-701. Computer crimes act--short title
This part is known as the "Utah Computer Crimes Act."
SECTION 76-6-602. Computer Crimes Act-- Definitions
(1) "Access" means to directly or indirectly use, attempt to
use, instruct, communicate with, cause input to, cause output
from, or otherwise make use of any resources of a computer,
computer system or computer network.
(2) "Computer" means any electronic device or communication
facility with data processing ability.
(3) "Computer system" means a set of related, connected or
unconnected, devices, software or other related computer
equipment.
(4) "Computer network" means the interconnection of
communication or telecommunication lines between computers or
computers and remote terminals.
(5) "Computer property" includes, but is not limited to,
electronic impulses, electronically produced data,
information, financial instruments, software or programs, in
either machine or human readable form, any other tangible or
intangible item relating to a computer, computer system,
computer network, and any copies of them.
(6) "Services" include, but are not limited to, computer
time, data manipulation and storage facilities.
(7) "Financial instrument" includes, but is not limited to
any check, draft, money order, certificate of deposit, letter
of credit, bill of exchange, credit card, or marketable
security.
(8) "Software" or "program" means a series of instructions
or statements in a form acceptable to a computer, relating to
the operations of the computer, or permitting the functioning
of a computer system in a manner designed to provide results
including, but not limited to, system control programs,
application programs or copies of them.
SECTION 76-6-703. Computer crimes and penalties.
(1) A person who gains or attempts to gain access to and
without authorization intentionally and to the damage of another,
alters, damages, destroys, discloses, or modifies any computer,
computer network, computer property, computer system, program, or
software is guilty of a felony of the third degree.
(2) A person who intentionally and without authorization
uses a computer, computer network, computer property, or computer
system to gain or attempt to gain access to any other computer,
computer network, computer property or computer system, program,
or software, to the damage of another, and alters, damages,
destroys, discloses, or modifies any of these, is guilty of a
felony of the third degree.
(3) A person who use or knowingly allows another person to
use any computer, computer network, computer property, computer
system, program or software to devise or execute any artifice or
scheme to defraud or to obtain money, property or services or
other things of value by false pretenses, promises, or
representations, is guilty of a felony of the second degree.
(4) A person who intentionally, and without authorization,
interferes with or interrupts computer services to another,
authorized to receive the services is guilty of a Class A
misdemeanor.
(5) A person who intentionally and without authorization
damages or destroys, in whole or in part, any computer, computer
network, computer property or computer system is guilty of a
Class A misdemeanor unless the amount of damage exceeds $ 1,000,
in which case the person is guilty of a felony of the third
degree.
SECTION 76-6-704. Computer crimes Act -- Attorney general or
county attorney to prosecute -- Conduct violating other statutes.
(1) The attorney general or the county attorney shall
prosecute suspected criminal violations of this part.
(2) Prosecution under this part does not prevent any
prosecutions under any other law.
SECTION 76-6-705. Reporting violations.
Every person, except those to whom a statutory or common law
privilege applies, who has reason to believe that the provisions
of Section 76-6-703 are being or have been violated shall report
the suspected violation to the attorney general or to the county
attorney of the county in which part or all of the violations
occurred.
/* Be warned that unlike Georgia's "Snitch" statute, this one
does not have immunity for a good faith report. Snitch at your
own risk of being sued for malicious prosecution. */
(1) An offense against computer users is the intentional:
(a) denial to an authorized user, without consent, of
the full and effective use of or access to a computer, a
computer system, a computer network or computer
services; or
(b) use or disclosure to another, without consent, of
the numbers, codes, passwords or other means of access
to a computer, a computer system, a computer network, or
computer services.
(2) Whoever commits an offense against computer users shall
be punished, upon conviction, by a fine of not more than One
Thousand Dollars ($ 1,000), or by imprisonment for not more than
six months, or by both such fine and imprisonment. However, when
the damage or loss amounts to a value of One Hundred Dollars or
more, the offender may be punished, upon convictions, by a fine
of not more than Ten Thousand Dollars, or imprisonment for not
more than 5 years, or by both such fine and imprisonment.
SECTION 97-45-7. Offense against computer equipment, penalties.
(1) An offense against intellectual property is the
intentional:
(a) Destruction, insertion or modification, without
consent, of intellectual property; or
(b) Disclosure, use, copying, taking or accessing,
without consent, of intellectual property.
(2) Whoever commits an offense against intellectual property
shall be punished, upon conviction, by a fine of not more than
One Thousand Dollars ($ 1,000), or by imprisonment for not more
than six months, or by both such fine and imprisonment. However,
when the damage or loss amounts to a value of One Hundred Dollars
or more, the offender may be punished, upon convictions, by a
fine of not more than Ten Thousand Dollars, or imprisonment for
not more than 5 years, or by both such fine and imprisonment.
(3) The provisions of this section shall not apply to the
disclosure, use, copying, taking, or accessing by proper means as
defined in this chapter.
Downloaded From P-80 International Information Systems 304-744-2253