💾 Archived View for gemini.spam.works › mirrors › textfiles › law › tn_lawsta.law captured on 2022-04-28 at 22:26:25.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

/* R FRINGE COMMENTARY- Here with go with the Tennessee Computer 
Crimes Act, Tenn. Code 39-3-1401, adopted 1983. */

SECTION 39-3-1401.Short title.-- This part shall be known, and 
may be cited as the Computer Crimes Act.

SECTION 39-3-1402. Legislative findings. The general assembly 
finds and declares that:

    (1) Computer-related crime is a potential problem in business 
and government;

    (2) Computer-related crime occurs at great cost to the public 
since losses for each incident of computer crime tend to be far 
greater than the losses associated with each incident of other 
white collar crime;

    (3) The opportunities for computer-related crime in business 
and government through the introduction of fraudulent records into 
a computer system, the unauthorized use of computers,the 
alteration or destruction of computerized information or files, 
and the stealing of financial instruments, data, and other assets 
are great;

    (4) Computer-related crime has a direct affect on state 
commerce;    

    (5) While various forms of computer crime might possibly be 
the subject of criminal charges based on other provisions of 
law, it is appropriate and desirable that a statute be enacted 
which deals directly with computer crime.

SECTION 39-3-1403 Definitions-- For the purposes of this part, 
the following words (including any form of the word) and terms 
shall have the following meanings:
   
   (1) "Access" means to approach, instruct, communicate with, 
store data in, retrieve or intercept data from, or otherwise make 
use of any resources of, a computer, computer system, or computer 
network;

  (2) "Computer" means a device that can perform substantial 
computation, including numerous arithmetic or logical operations, 
without intervention by a human operator during the processing of 
a job;

     (3) "Computer network" means a set of two (2) or more 
computer systems that transmit data over communication circuits 
connecting them;

     (4) "Computer Program" means an ordered set of data that are 
coded instructions or statements that when executed by a computer 
cause the computer to process data;

     (5) "Computer software" means a set of computer programs, 
procedures, and associated documentation concerned with the 
operation of a computer, computer system or computer network; 

     (6) "Computer system" means a set of connected devices 
including a computer and other devices including, but not limited 
to, one or  more of the following: data input, output, or storage 
devices, data communication circuits, and operating system 
computer programs that make the system capable of performing data 
processing tasks;

     (7) "Data" is a representation of information, knowledge, 
facts, concepts, or instructions which are being prepared or have 
been prepared in a formalized manner, and is intended to be 
stored or processed, or is being stored or processed, in a 
computer, computer system or computer network;

     (8) "Financial instruments" includes, but is not limited to, 
any check, cashier's check, draft, warrant, money order, 
certificate of deposit, negotiable instrument, letter of credit, 
bill of exchange, credit card, debit card, or marketable 
security, or any computer system representation thereof;

     (9) "Intellectual property" includes data, which may be in 
any form including but not limited to, computer printouts, 
magnetic storage media, punched cards, or may be stored 
internally in the computer;

     (10) "To process" is to use a computer to put data through a 
systematic sequence of operations for the purpose of producing  
specified result;

     (11) "Property" includes, but is not limited to, 
intellectual property, financial instruments, data, computer 
programs, documentation associated with computer programs, all in 
machine-readable or human-readable form, and any tangible or 
intangible item of value; and

     (12) "Services" includes, but is not limited to, the use of 
a computer, a computer system, a computer network, computer 
software, computer program, or data to perform tasks.

SECTION 39-3-1404 Violations-- Penalties-- (a) Whoever knowingly 
and willfully, directly or indirectly, accesses, causes to be 
accessed, or attempts to access any computer software, computer 
program, data, computer, computer system, computer network, or 
any part thereof, for the purpose of:

     (1) Devising or executing any scheme or artifice to defraud;

     (2) Obtaining money, property, or services for themselves or 
another by means of false or fraudulent pretenses, 
representations, or promises shall, upon convicting thereof,be 
fined a sum of not more than fifty thousand dollars ($50,000) or 
imprisoned not less than three (3) years nor more than ten (10) 
years, or both.

     (b) Whoever intentionally and without authorization, 
directly or indirectly accesses, alters, damages, destroys or 
attempt to damage or destroy any computer, computer system, or 
computer network, or any computer software, program or data, 
shall, upon conviction thereof, be fined not more than fifty 
thousand dollars ($ 50,000) or imprisoned not less than three (3) 
nor more than ten (10) years, or both.

     (c) Whoever receives, conceals or uses, or aid another in 
receiving, concealing or using, any proceeds resulting from a 
violation of either subsection (a) or (b) of this section, knowing 
same to be proceeds of such violation, or whoever receives, 
conceals, or uses, or aids another in receiving, concealing or 
using, any books, records, documents, property, financial 
instrument, computer software, computer program, or other 
material, property or objects, knowing same to have been used in 
violating either subsection (a) or (b) of this section shall, 
upon conviction thereof, be fined not more than twenty-five 
thousand dollars ($25,000) or imprisoned not less than three (3) 
nor more than ten (10) years, or both.

SECTION 39-3-1495 Venue-- FOr the purpose of venue under the 
provisions of this part, any violation of this part shall be 
considered to have been committed:

     (1) In any county in which any act was performed in 
furtherance of any transaction violating this part;

     (2) In any county in which any violator had control or 
possession of any proceeds of such violation or of any books, 
records, documents, property, financial instrument, computer 
software, computer program or other material, objects or items 
which were used in furtherance of said violation; and

     (3) In any county from which, to which or through which any 
access to a computer, computer system, or computer network was 
made whether by wire, electromagnetic waves or any other means of 
communication.

SECTION 39-3-1406 Construction with other statutes-- The criminal 
offenses created by this part shall not be deemed to supersede, 
or repeal, any criminal offense. 

              
Downloaded From P-80 International Information Systems 304-744-2253