💾 Archived View for gemini.spam.works › mirrors › textfiles › law › il_lawsta.law captured on 2022-04-28 at 22:19:22.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

The Illinois Computer Crime
Prevention law, adopted in 1981, and amended in 1987. This is 
article 16D of the "Criminal Code of 1961." */

16D-1. Short title

Section 16D-1. Short title. This Article shall be known and may 
be cited as the "Computer Crime Prevention Law."

16D-2. Definitions

Section 16D-2. Definitions. As used in this Article, unless the 
context otherwise indicates:

(a) "Computer" means a device that accepts, processes, stores, 
retrieves or outputs data, and includes but is not limited to 
auxiliary storage and telecommunications devices connected to 
computers.

(b) "Computer program" or "program" means a series of coded 
instructions or statements in a form acceptable to a computer 
which causes the computer to process data and supply th results 
of the data processing.

(c) "Data" means a representation of information, knowledge, 
facts, concepts or instructions, including program documentation, 
which is prepared in a formalized manner and is stored or 
processed in or transmitted by a computer. Data shall be 
considered property and may be in any form including but not 
limited to printouts, magnetic or optical storage media, punch 
cards or data stored internally in the memory of the computer.

(d) In addition to its meaning as defined in Section 15-1 of this 
Code, "property" means: (1) electronic impulses; (2) 
electronically produced data; (3) confidential, copyrighted or 
proprietary information; (4) private identification codes or 
numbers which permit access to a computer by authorized computer 
users or generate billings to consumers for purchase of goods and 
services, including but not limited to credit card transaction 
and telecommunications services or permit electronic fund 
transactions; (5) software or program in either machine or human 
readable form; or (6) any other tangible or intangible item 
relating to a computer or any part thereof.

(e) "Access" means to use, instruct, communicate with, store data 
in, retrieve o intercept data from, or otherwise utilize any 
services of a computer.

(f) "Services" includes but is not limited to computer time, data 
manipulation or storage functions.

(g) "Vital services or operations" means those services or 
operation required ot provide, operate, maintain, and repair 
network cabling, transmission, distribution, or computer 
facilities necessary to ensure or protect the public health, 
safety, or welfare. Public health, safety, or welfare include, 
but are not limited to, services provided by medical personnel or 
institutions, fire departments, emergency services agencies, 
national defense contractors, armed forces or militia personnel, 
p[rivate and public utility companies or law enforcement 
agencies.

16D-3. Computer tampering

Section 16D-3. Computer Tampering. (a) A person commits the 
offense of computer tampering when he knowingly and without the 
authorization of a computer's owner, as defined in Section 15-2 
of this Code, or in excess of the authority granted to him:

(1) Access or cause to be accessed a computer or any part 
thereof, or a program or data;

(2) Accesses or causes to be accessed a computer or any part 
thereof, or a program or data, and obtains data or services;

(3) Accesses or causes to be accessed a computer or any part 
thereof, or a program or data, and damages or destroys the 
computer or alters, deletes or removes a computer program or data;

(4) Inserts or attempt to insert a "program" into a computer or 
computer program knowing or having reason to believe that such 
"program" contains information or commands that will or may 
damage or destroy that computer, or any other computer 
subsequently accessing or being accessed by that computer, or 
that will or may alter, delete or remove a computer program or 
data from that computer, or any other computer program or data in 
a computer subsequently accessing or being accessed by that 
computer, or that will or may cause loss to the users of that 
computer or the users of a computer which accesses or which is 
accessed by such "program."

(b) Sentence.

(1) A person who commits the offense of computer tampering as set 
forth in subsection (a)(1) of this Section shall be guilty of a 
Class B misdemeanor.

(2) A person who commits the offense of computer tampering as set 
forth in subsection (a)(2) of this Section shall be guilty of a 
Class A misdemeanor and a Class 4 felony for the second or 
subsequent offense.

(3) A person who commits the offense of computer tampering as set 
forth in subsection (a)(3) or subsection (a)(4) of this Section 
shall be guilty of a Class 4 felony and a Class 3 felony for the 
second or subsequent offense.

(c) Whoever suffers loss by reason of a violation of subsection 
(a)(4) of this Section may, in a civil action against the 
violator, obtain appropriate relief. In a civil action under this 
Section, the Court ma award to the prevailing party reasonable 
attorney's fees and other litigation expenses.

16D-4. Aggravate computer tampering

Section 16 D-4. Aggravated Computer Tampering. (A) A person 
commits aggravated computer tampering when he commits the offense 
of computer tampering as set forth in subsection (a)(3) of 
Section 16D-3 and he knowingly:

(1) causes disruption of or interference with vital services or 
operations of State or local government or a public utility; or

(2) creates a strong probability of death or great bodily harm to 
one or more individuals.

(b) Sentence. (1) A person who commits the offense of aggravated 
computer tampering as set forth in subsection (a)(1) of this 
Section shall be guilty of a Class 3 felony.

(2) A person who commits the offense of aggravated computer 
tampering as set forth in subsection(a)(2) of this Section shall 
be guilty of Class 2 felony.

16D-5. Computer fraud

Section 16D-5. Computer Fraud. (a) A person commits the offense 
of computer fraud when he knowingly:

(1) Accesses or causes to be accessed a computer or any part 
thereof, or alters, deletes, or removes any program or data 
contained therein, in connection with any scheme , artifice to 
defraud, or as part of a deception;

(2) Obtains use of, damages, or destroys a computer or any part 
thereof, or alters, deletes, or removes any program or data 
contained therein, in connection with any scheme, artifice to 
defraud, or as part of a deception; or

(3) Accesses or caused to be accessed a computer or any part 
thereof, or a program or data, and obtains money or control over 
any such money, property, or services of another in connection 
with any scheme, artifice to defraud, or as part of a deception.

(b) Sentence. (1) A person who commits the offense of computer 
fraud as set forth in subsection (a)(1) of this Section shall be 
guilty of a Class 4 felony.

(2) A person who commits the offenses of computer fraud as set 
forth in subsection (a)(2) of this Section shall be guilty of a 
Class 3 felony.

(3) A person who commits the offenses of computer fraud as set 
forth in subsection (a)(3) of this Section shall:

(i) be guilty of a Class 4 felony felony if the value of the 
money, property or services is $ 1,000 or less; or

(ii) be guilty of a Class 3 felony if the value of the money, 
property or services is more than $ 1,000 but less than $ 50,000; 
or

(iii) be guilty of a Class 2 felony if the value of the money, 
property or services is $ 50,000 or more.

16D-6.  Forfeiture

Section 16D-6. Forfeiture. 1. Any person who commits the offense 
of computer fraud as set forth in Section 16D-5 shall forfeit, 
according to the provisions of this Section, any monies, profits 
or proceeds, and any interest or property which the sentencing 
court determines he has acquired or maintained, directly or 
indirectly, in whole or in part, as a result of such offense. Such 
person shall also forfeit any interest in, security, claim 
against, or contractual right of any kind which affords him a 
source of influence over any enterprise which he has established, 
operated, controlled, conducted or participated in conducting, 
where his relationship to or connection with any such thing or 
activity directly or indirectly, in whole or in part, is 
traceable to any item or benefit which he has obtained or 
acquire through computer fraud.

Proceedings instituted pursuant to this Section shall be subject 
to and conducted in accordance with the following procedures:

(a) The sentencing court shall, upon petition by the prosecuting 
agency, whether it is the Attorney General or a State's Attorney, 
at any time following sentencing, conduct a hearing to determine 
whether any property or property interest is subject to forfeiture 
under this Section. At the forfeiture hearing the People of the 
State of Illinois shall heave the burden establishing, by a 
preponderance of the evidence, that th eproperty or property 
interests are subject to such forfeiture.

(b) In any action brought by the People of the State of Illinois 
under this Section, the circuit courts of Illinois shall 
jurisdiction to enter such restraining orders, injunctions or 
prohibitions, or take such other action in connection with real, 
personal, or mixed property or other interest subject ot 
forfeiture, as they shall consider proper.

(c) In any action brought by the People of the State of Illinois 
under this Section, wherein any restraining order, injunction or 
prohibition or any other action in connection with any property 
or interest subject to forfeiture under this Section is sought, 
the circuit court presiding over there trial of the person or 
persons charge with computer fraud shall first determine whether 
there is probable cause to believe that the person or persons so 
charged have committed the offesne of computer fraud and whether 
the property or interest is subject to forefeiture pursaunt to 
this Section. In order to make this determination, prior to 
entering any such order, the court shall conducta hearing without 
a jury, where the People shall establish: (1) probable cause that 
the person or person so charged have committed the offense of 
computer fraud, and (2) probable cause that nay property or 
interest may be subject to forefeiture pursuant to this Section. 
Such hearing

Downloaded From P-80 International Information Systems 304-744-2253