💾 Archived View for gemini.spam.works › mirrors › textfiles › law › md_lawsta.law captured on 2020-10-31 at 17:19:46.

View Raw

More Information

-=-=-=-=-=-=-

/* R FRINGE COMMENTARY- Here's the Maryland Computer Crimes Law, 
with comments; Article 27, Section 146, Code of Maryland, "Crimes 
and Punishments */

    (a) Definitions- In this section the following words have the 
meanings indicated.

    (1)(i) "Computer" means an electronic, magnetic, optical, 
organic, or other data processing device or system that performs 
logical, arithmetic, memory or storage functions.

/* The reference to organic is very interesting. I guess when 
someone clones a brain (hopefully one much better than mine) then 
it is protected as well. */
 
     (ii) "Computer" includes any property, data storage 
facility, or communications facility that is directly related to 
or operated in conjunction with that device or system.

    (iii) "Computer" does not include an automated typewriter or 
typesetter, a portable calculator, or any computer that:

  1. Is designed, manufactured, and used exclusively for routine 
personal, family or household purposes; and

  2. Is not used to access, communicated with, or manipulate any 
other computer.

/* Curious. Why shouldn't your video game system have just as 
much protection as a mainframe used for credit card transaction 
processing? In any event, all of you with modems are within the 
protection provided by this law. */

    (2) "Computer control language" means any ordered statements 
that direct a computer to perform specific functions.

/* Yikes. Since my programming is so good, and I never know what 
my code will cause the computer to do, so I guess my code isn't a 
computer control language since it causes the computer to lock up 
or to perform random functions. */ 

/* The preceding comment was a joke. */

/*Just wanted to be sure that you knew that it was a joke. */

    (3) "Computer data base" means a representation of 
information, knowledge,, facts, concepts or instructions that:

    (i) Are being prepared or have been prepared in a 
formalized manner, and

    (ii) Are intended for use in a computer, computer system, or 
computer network.

    (4) "Computer network" means the interconnection of 1 or more 
computers through:

    (i) the use of satellite, microwave, line or other 
communication media; and

    (ii) Terminals or a complex consisting of 2 or more 
interconnected computers.

    (5) "Computer program" means an ordered set of instructions 
or statement that may interact with related data that, when 
executed in a computer system, causes the computer to perform 
specified functions.

    (6) "Computer services" includes, but is not limited to, 
computer time, data processing, and storage functions.

    (7) "Computer software" means computer programs, 
instructions, procedures or associated documentation that is 
concerned with the operation of a computer system.

    (8) "Computer system" means 1 or more connected or 
unconnected computers, peripheral devices, software, data, or 
programs.

    (9) "Access" means to instruct, communicated with, store data 
in, retrieve data from, or otherwise make use of equipment 
including, but not limited to, computers and other data 
processing equipment or resources connected therewith.      

    (b) Other applicable Code provisions.-- This section does not 
preclude the applicability of any other provision of this Code.

    (c) Illegal access.-- No person shall intentionally, 
willfully, and without authorization access, attempt to access, 
or cause access to a computer, computer network, computer control 
language, computer system,computer services, computer data base, 
or any part of these systems or services.

    (d) Penalty. -- Any person who violates any provision of 
subsection (c) of this section is guilty of a misdemeanor and on 
conviction is subject to a fine not exceeding $ 1,000 or 
imprisonment not exceeding three years or both.

    (e) Scope of offenses; jurisdiction. -- (1) When illegal 
access to a computer, computer network, computer control 
language, computer system, computer services, computer data base, 
or any part of these systems or services is committed in 
violation of this section pursuant to 1 scheme or continuing 
course of conduct, the conduct may be considered as 1 offense.

    (2) A court of competent jurisdiction in this State may try a 
person who allegedly violates any provision of subsection (c) of 
this section in any county in this State where:

    (i) The person performs the act; or

    (ii) THe accessed computer is located. 
Downloaded From P-80 International Information Systems 304-744-2253