💾 Archived View for gemini.spam.works › mirrors › textfiles › law › ut_lawsta.law captured on 2022-04-28 at 22:27:05.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

/*R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act 
adopted in 1979, with a major revision in 1986*/

SECTION 76-6-701.  Computer crimes act--short title

     This part is known as the "Utah Computer Crimes Act."  

SECTION 76-6-602. Computer Crimes Act-- Definitions

    (1) "Access" means to directly or indirectly use, attempt to     
    use, instruct, communicate with, cause input to, cause output     
    from, or otherwise make use of any resources of a computer, 
    computer system or computer network.

    (2) "Computer" means any electronic device or communication 
    facility with data processing ability.

    (3) "Computer system" means a set of related, connected or 
    unconnected, devices, software or other related computer 
    equipment.
     
    (4) "Computer network" means the interconnection of 
    communication or telecommunication lines between computers or 
    computers and remote terminals.

    (5) "Computer property" includes, but is not limited to, 
    electronic impulses, electronically produced data, 
    information, financial instruments, software or programs, in 
    either machine or human readable form, any other tangible or 
    intangible item relating to a computer, computer system, 
    computer network, and any copies of them.

    (6) "Services" include, but are not limited to, computer 
    time, data manipulation and storage facilities. 

    (7) "Financial instrument" includes, but is not limited to 
    any check, draft, money order, certificate of deposit, letter 
    of credit, bill of exchange, credit card, or marketable 
    security.

     (8) "Software" or "program" means a series of instructions 
    or statements in a form acceptable to a computer, relating to 
    the operations of the computer, or permitting the functioning 
    of a computer system in a manner designed to provide results 
    including, but not limited to, system control programs, 
    application programs or copies of them.

SECTION 76-6-703. Computer crimes and penalties.

     (1) A person who gains or attempts to gain access to and 
without authorization intentionally and to the damage of another, 
alters, damages, destroys, discloses, or modifies any computer, 
computer network, computer property, computer system, program, or 
software is guilty of a felony of the third degree.

     (2) A person who intentionally and without authorization 
uses a computer, computer network, computer property, or computer 
system  to gain or attempt to gain access to any other computer, 
computer network, computer property or computer system, program, 
or software, to the damage of another, and alters, damages, 
destroys, discloses, or modifies any of these, is guilty of a 
felony of the third degree.

    (3) A person who use or knowingly allows another person to 
use any computer, computer network, computer property, computer 
system, program or software to devise or execute any artifice or 
scheme to defraud or to obtain money, property or services or 
other things of value by false pretenses, promises, or 
representations, is guilty of a felony of the second degree.

    (4) A person who intentionally, and without authorization, 
interferes with or interrupts computer services to another, 
authorized to receive the services is guilty of a Class A 
misdemeanor.

     (5) A person who intentionally and without authorization 
damages or destroys, in whole or in part, any computer, computer 
network, computer property or computer system is guilty of a 
Class A misdemeanor unless the amount of damage exceeds $ 1,000, 
in which case the person is guilty of a felony of the third 
degree.

SECTION 76-6-704. Computer crimes Act -- Attorney general or 
county attorney to prosecute -- Conduct violating other statutes.

    (1) The attorney general or the county attorney shall 
prosecute suspected criminal violations of this part.

    (2) Prosecution under this part does not prevent any 
prosecutions under any other law.

SECTION 76-6-705. Reporting violations.

     Every person, except those to whom a statutory or common law 
privilege applies, who has reason to believe that the provisions 
of Section 76-6-703  are being or have been violated shall report 
the suspected violation to the attorney general or to the county 
attorney of the county in which part or all of the violations 
occurred. 

/* Be warned that unlike Georgia's "Snitch" statute, this one 
does not have immunity for a good faith report. Snitch at your 
own risk of being sued for malicious prosecution. */  

 


    (1) An offense against computer users is the intentional:

         (a) denial to an authorized user, without consent, of          
         the full and effective use of or access to a computer, a 
         computer system, a computer network or computer 
         services; or

         (b) use or disclosure to another, without consent, of 
         the numbers, codes, passwords or other means of access 
         to a computer, a computer system, a computer network, or 
         computer services. 

    (2) Whoever commits an offense against computer users shall 
be punished, upon conviction, by a fine of not more than One 
Thousand Dollars ($ 1,000), or by imprisonment for not more than 
six months, or by both such fine and imprisonment. However, when 
the damage or loss amounts to a value of One Hundred Dollars or 
more, the offender may be punished, upon convictions, by a fine 
of not more than Ten Thousand Dollars, or imprisonment for not 
more than 5 years, or by both such fine and imprisonment.

SECTION 97-45-7. Offense against computer equipment, penalties.

    (1) An offense against intellectual property is the 
intentional:

         (a) Destruction, insertion or modification, without 
         consent, of intellectual property; or

         (b) Disclosure, use, copying, taking or accessing, 
         without consent, of intellectual property.

    (2) Whoever commits an offense against intellectual property 
shall be punished, upon conviction, by a fine of not more than 
One Thousand Dollars ($ 1,000), or by imprisonment for not more 
than six months, or by both such fine and imprisonment. However, 
when the damage or loss amounts to a value of One Hundred Dollars 
or more, the offender may be punished, upon convictions, by a 
fine of not more than Ten Thousand Dollars, or imprisonment for 
not more than 5 years, or by both such fine and imprisonment. 

    (3) The provisions of this section shall not apply to the 
disclosure, use, copying, taking, or accessing by proper means as 
defined in this chapter.
Downloaded From P-80 International Information Systems 304-744-2253