home *** CD-ROM | disk | FTP | other *** search
- /* R FRINGE COMMENTARY:
-
- Here is Pennsylvania's computer crimes law, adopted in 1983 with
- changes in 1986, Pennsylvania consolidated statutes title
- 18 section 3933.*/
-
- SECTION 3933 Unlawful use of a computer
-
- (a) Offense defined.-- A person commits an offense if he:
-
- (1) accesses, alters, damages or destroys any
- computer, computer system, computer network, computer
- software, computer program or data base or any part
- thereof, with the intent to interrupt the normal
- functioning of an organization
-
- /*does a person commit a crime by breaking into a
- system and cleaning it up if the normal function of the
- organization is chaos and devolution?*/
-
- or to devise or execute any scheme or artifice to
- defraud or deceive or control property or services by
- means of false or fraudulent pretenses,
- rep[resentations, or promises;
-
- (2) intentionally and without authorization accesses,
- alters, interferes with the operation of, damages or
- destroys any computer, computer system, computer
- network, computer software, computer program, or
- computer data base or any part thereof; or
-
- (3) intentionally or knowingly and without
- authorization gives or publishes a password,
- identifying code, personal identification number or other
- confidential information about a computer, computer
- system, computer network or data base.
-
- /*This statute has an extremely elastic definition of the the
- term confidential information and gives a very broad tool to the
- computer industry. >Consequently label material sold in this
- state which is legitimately confidential "confidential
- information protected by 18PaC.S Section 3933*/
-
- (b) Grading.--An offense under subsection (a)(1) is a felony
- of the third degree. An offense under subsection (a)(2) or (3)
- is a a misdemeanor of the first degree.
-
- (c) Definitions.--As used in this section, the following
- words and phrases shall have the meanings given to them in this
- subsection:
-
- "Access". To intercept, instruct, communicate with, store
- data in, retrieve data from or otherwise make use of any
- resources of a computer, computer system, computer network or
- data base.
-
- "Computer." An electronic, magnetic, optical, hydraulic
-
- /* Will all of those with hydraulic computers PLEASE leave a
- message to me explaining what the hell a hydraulic computer
- is----- Thanks---- Sysop (Herb Kraft.) */
-
- organic or other high speed data processing device or system
- which performs, logic, arithmetic functions and includes all
- input, output, processing, storage, software or communication
- facilities which are connected or related to the device in a
- system or network.
-
- "Computer network" the interconnection of two o more
- computers through the usage of satellite, microwave, line or
- other communication medium.
-
- "Computer program" an ordered set of instructions or
- statements and related data that, when automatically execute in
- actual or modified form in a computer system, causes it to
- perform specified functions.
-
- "Computer software" a set of computer programs, procedures,
- and associated documentation concerned with the operation of a
- computer system.]
-
- "Computer system" a set of related, connected or unconnected
- computer equipment, devices and software.
-
- "Data base" a representation of information, knowledge,
- facts, concepts or instructions which are being prepared or
- processed or have been prepared or processed in a formalized
- manner and are intended for use in a computer, computer system or
- computer network including, but not limited to, computer
- printouts, magnetic storage media, punched cards or data stored
- internally in the memory of the computer.
-
- "Financial instrument" includes, but is not limited to, any
- check, draft, warrant, money order, note, certificate of deposit,
- letter of credit, bill of exchange, credit or debit card,
- transaction authorization mechanism, marketable security or any
- computer system representation thereof.
-
- "Property" includes but is not limited to financial
- instruments, computer software and programs either in machine or
- human readable form, and anything of value, tangible or
- intangible.
-
- "Services" includes but is not limited to, computer time,
- data processing and storage functions.
-
-