💾 Archived View for gemini.spam.works › mirrors › textfiles › law › pa_lawsta.law captured on 2020-10-31 at 17:17:56.

View Raw

More Information

-=-=-=-=-=-=-

/* R FRINGE COMMENTARY:

Here is Pennsylvania's computer crimes law, adopted in 1983 with 
changes in 1986, Pennsylvania consolidated statutes title 
18 section 3933.*/

SECTION 3933 Unlawful use of a computer

     (a)  Offense defined.-- A person commits an offense if he:

             (1) accesses, alters, damages or destroys any 
          computer, computer system, computer network, computer 
          software, computer program or data base or any part 
          thereof, with the intent to interrupt the normal 
          functioning of an organization 

          /*does a person commit a crime by breaking into a 
          system and cleaning it up if the normal function of the 
          organization is chaos and devolution?*/

          or to devise or execute any scheme or artifice to 
          defraud or deceive or control property or services by 
          means of false or fraudulent pretenses, 
          rep[resentations, or promises;

             (2) intentionally and without authorization accesses, 
          alters, interferes with the operation of, damages or 
          destroys any computer, computer system, computer 
          network, computer software, computer program, or 
          computer data base or any part thereof; or

             (3) intentionally or knowingly and without 
          authorization gives or publishes a password, 
          identifying code, personal identification number or other 
          confidential information about a computer, computer 
          system, computer network or data base.

/*This statute has an extremely elastic definition of the the 
term confidential information and gives a very broad tool to the 
computer industry.  >Consequently label material sold in this 
state which is legitimately confidential "confidential 
information protected by 18PaC.S Section 3933*/

     (b) Grading.--An offense under subsection (a)(1) is a felony 
of the third degree.  An offense under subsection (a)(2) or (3) 
is a a misdemeanor of the first degree.

     (c) Definitions.--As used in this section, the following 
words and phrases shall have the meanings given to them in this 
subsection:

     "Access". To intercept, instruct, communicate with, store 
data in, retrieve data from or otherwise make use of any 
resources of a computer, computer system, computer network or 
data base.

     "Computer." An electronic, magnetic, optical, hydraulic

/* Will all of those with hydraulic computers PLEASE leave a 
message to me explaining what the hell a hydraulic computer 
is----- Thanks---- Sysop (Herb Kraft.) */

organic or other high speed data processing device or system 
which  performs, logic, arithmetic functions and includes all 
input, output, processing, storage, software or communication 
facilities which are connected or related to the device in a 
system or network.

     "Computer network" the interconnection of two o more 
computers through the usage of satellite, microwave, line or 
other communication medium.

     "Computer program" an ordered  set of instructions or 
statements and related data that, when automatically execute in 
actual or modified form in a computer system, causes it to 
perform specified functions.

     "Computer software" a set of computer programs, procedures, 
and associated documentation concerned with the operation of a 
computer system.]

     "Computer system" a set of related, connected or unconnected 
computer equipment, devices and software.

     "Data base" a representation of information, knowledge, 
facts, concepts or instructions which are being prepared or 
processed or have been prepared or processed in a formalized 
manner and are intended for use in a computer, computer system or 
computer network including, but not limited to, computer 
printouts, magnetic storage media, punched cards or data stored 
internally in the memory of the computer.

     "Financial instrument" includes, but is not limited to, any 
check, draft, warrant, money order, note, certificate of deposit, 
letter of credit, bill of exchange, credit or debit card, 
transaction authorization mechanism, marketable security or any 
computer system representation thereof.

     "Property" includes but is not limited to financial 
instruments, computer software and programs either in machine or 
human readable form, and anything of value, tangible or 
intangible.

     "Services" includes but is not limited to, computer time, 
data processing and storage functions.       
 

Downloaded From P-80 International Information Systems 304-744-2253