home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
LEGAL
/
VA_LAW.STA
< prev
next >
Wrap
Text File
|
1994-07-17
|
11KB
|
234 lines
Article 7.1.
Computer Crimes.
Sections 18.2-152.1. Short title. - This article shall be known
and may be cited as the "Virginia Computer Crimes Act." (1984, c.
751.)
Sections 18.2-152.2. Definitions. - For purposes of this article:
"Computer" means an electronic, magnetic, optical, hydraulic or
organic device which, pursuant to a computer program, to human
instruction, or to permanent instructions contained in the device
or group of devices, can automatically perform computer
operations with or on computer data and can communicate the
results to another computer or to a person. The term 'computer'
includes any connected or directly related device, equipment, or
facility which enables the computer to store, retrieve or
communicate computer programs, computer data or the results of
computer operations to or from a person, another computer or
another device.
"Computer data" means any representation of information,
knowledge, facts, concepts, or instructions which is being
prepared or has been prepared and is intended to be processed,
is being processed, or has been processed in a computer or
computer network. "Computer data" may be in any form, whether
readable only by a computer or only by a human or by either,
including, but not limited tom computer printouts, magnetic
storage media, punched cards, or stored internally in the memory
of the computer.
"Computer network" means a set of related, remotely connected
devices and any communications facilities including more than one
computer with the capability to transmit data among them through
the communications facilities.
"Computer operation" means arithmetic, logical, monitoring,
storage or retrieval functions and any combination thereof, and
includes, but is not limited to, communication with, storage of
data to, or retrieval of data from any device or human hand
manipulation of electronic or magnetic impulses. A "computer
operation" for a particular computer may also be any function for
which that computer was generally designed.
"Computer program" means an ordered set of data representing
coded instructions or statements that, when executed by a
computer, causes the computer to perform one or more computer
operations.
"Computer services" includes computer time or services or data
processing services or information or data stored in connection
therewith.
"Computer software" means a set of computer programs, procedures
and associated documentation concerned with computer data or with
the operation of a computer, computer program, or computer
network.
"Financial instrument" includes, but is not limited to, any
check, draft, warrant, money order, note, certificate of deposit,
letter of credit, bill of exchange, credit or debit card,
transaction authorization mechanism, marketable security, or any
computerized representation thereof
"Owner" means an owner or lessee of a computer or a computer
network or an owner, lessee, or licensee of computer data,
computer programs, or computer software.
"Person" shall include any individual, partnership, association,
corporation or joint venture.
"Property" shall include:
1. Real property;
2. Computers and computer networks;
3. Financial instruments, computer data, computer programs,
computer software and all other personal property regardless of
whether they are:
a. Tangible or intangible;
b. In a format readable by humans or by a computer;
c. In transit between computers or within a computer network or
between any devices which comprise a computer; or
d. Located on any paper or in any device on which it is stored by
a computer or by a human; and
4. Computer services.
A person "uses" a computer or computer network when he:
1. Attempts to cause or causes a computer or computer network to
perform or to stop performing computer operations;
2. Attempts to cause or causes the withholding or denial of the
use of a computer, computer network, computer program, computer
data or computer software to another user; or
3. Attempts to cause or causes another person to put false
information into a computer.
A person is "without authority" when he has no right or
permission of the owner to use a computer, or he uses a computer
in a manner exceeding such right or permission. (1984, c. 751.)
Sections 18.2-152.3. Computer fraud. - Any person who uses
computer or computer network without authority and with the
intent to:
1. Obtain property or services by false pretenses;
2. Embezzle or commit larceny; or
3. Convert the property of another shall be guilty of the crime
of computer fraud. If the value of the property of services
obtained is $200 or more, the crime of computer fraud shall be
punishable as a Class 5 felony. Where the value of the property
or services obtained is less than $200.00 or more, the crime of
computer fraud shall be punishable as a Class 5 felony. Where
the value of the property or services obtained is less than
$200.00, the crime of computer fraud shall be punishable as a
Class 1 misdemeanor. (1984, c. 751; 1985, c.322)
Sections 18.2-152.4. Computer trespass. - Any person who uses a
computer or computer network without authority and with the
intent to :
1. Temporarily or permanently remove computer data, computer
programs or computer software from a computer or computer
network;
2. Cause a computer data, computer programs or computer
software;
3. Alter or erase any computer data, computer programs or
computer persists;
4. Effect the creation or alteration of a financial instrument
or of an electronic transfer of funds;
5. Cause physical injury to the property of another; or
6. Make or cause to be made an unauthorized copy, in any form,
including, but not limited to, any printed or electronic form or
computer data, computer programs or computer software residing
in, communicated by or produced by a computer or computer network
shall be guilty of the crime of computer trespass, which shall be
punishable as a Class 1 misdemeanor.
Sections 18.2-152.5. Computer invasion of privacy. - A. A person
is guilty of the crime of computer invasion of privacy when he
uses a computer or computer network and intentionally examines
without authority any employment, salary, credit or any other
financial or personal information relating to any other person.
"Examination" under this section requires the offender to review
the information relating to any other person after the time at
which the offender knows or should know that he is without
authority to view the information displayed.
B. The crime of computer invasion of privacy shall be punishable
as a Class 3 misdemeanor. (1984, c. 751; 1985, c. 398.)
Sections 18.2-152.6. Theft of computer services. - Any person who
willfully uses a computer or computer network, with intent to
obtain computer services without authority, shall be guilty of
the crime of theft of computer services, which shall be
punishable as a Class 1 misdemeanor.
Sections 18.2-152.7. Personal trespass by computer. - A. A person
is guilty of the crime of personal trespass by computer when he
uses a computer or computer network without authority and with
the intent to cause physical injury to an individual.
B. If committed maliciously, the crime of personal trespass by
computer shall be punishable as a Class 3 felony. If such act be
done unlawfully but not maliciously, the crime of personal
trespass by computer shall be punishable as a Class 1
misdemeanor.
Sections 18.2-152.8. Property capable of embezzlement. - For
purposes of Section 18.2-111, personal property subject to
embezzlement shall include:
1. Computers and computer networks;
2. Financial instruments, computer data, computer programs,
computer software and all other personal property regardless of
whether they are:
a. Tangible or intangible;
b. In a format readable by humans or by a computer;
c. In transit between computers or within a computer network or
between any devices whi