💾 Archived View for gemini.spam.works › mirrors › textfiles › law › wi_lawsta.law captured on 2022-04-28 at 22:27:24.
⬅️ Previous capture (2020-10-31)
-=-=-=-=-=-=-
The Wisconsin Computer crimes law, Wisconsin statutes section 943.70. */. SECTION 943.70. Computer crimes (1) Definitions. In this section: (a) "Computer" means an electronic device that performs logical, arithmetic and memory functions by manipulating electronic or magnetic impulses, and includes all input, output, processing, storage, computer software and communication facilities that are connected or related to such a device in a system or network. (b) "Computer network" means the interconnection of communications lines with a computer through remote terminals or a complex consisting of two or more interconnected computers. (c) "Computer program" means an ordered set of instructions or statements, when executed by a computer, causes the computer to process data. (d) "Computer software" means a set of computer programs, procedures or associated documentation used in the operation of a computer system. (dm) "Computer supplies" means punch cards, paper tape, magnetic tape, disk packs, diskettes and computer output, including paper and microform. (e) "Computer system" means a set of related computer equipment, hardware or software. (f) "Data" means a representation of information, knowledge, facts, concepts or instructions that has been prepared or is being prepared or is being prepared in a formalized manner an has been process, is being processes or is intended to be processed in a computer system or computer network. Data may be in any form including computer printouts, magnetic storage media, punched card and as stored in the memory of the computer. Data are property. (g) "Financial instrument" includes any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or credit card, transaction authorization mechanism, marketable security and any computer representation of them. (h) "Property" anything of value, including but not limited to financial instruments, information, electronically produced data, computer software and computer programs. (i) "Supporting documentation" means all documentation used in the computer system in the construction, clarification, implementation, use or modification of the software or data. (j) "Services" includes, but is not limited to, computer time, data processing and storage functions. (2) Offenses against computer data and programs. (a) Whoever willfully, knowingly and without authorization does any of the following may be penalized as provided in paragraph (b): 1. Modifies data, computer programs or supporting documentation. 2. Destroys data, computer programs or supporting documentation. 3. Accesses data, computer programs or supporting documentation. 4. Takes possession of data, computer programs or supporting documentation. 5. Copies data, computer programs or supporting documentation. 6. Discloses restricted access code or other restricted access information to unauthorized persons. (b) WHoever violates this subsection is guilty of: 1. A Class A misdemeanor unless subd. 2, 3 or 4 applies. 2. A Class E felony if the offense is committed to defraud or obtain property. 3. A Class D felony if the damage is greater than $ 2,500 or if it causes an interruption or impairment of government operations or public communication, of transportation or of a supply of water, gas or other public service. 4. A Class C felony if the offense creates a substantial and unreasonable risk or great bodily harm to another. (3) Offenses against computers, computer equipment or supplies. (a) Whoever willfully, knowingly and without authorization does any of the following may be penalized as provided in par. (b): 1. Modifies computer equipment or supplies that are use or intended to be used in a computer, computer system or computer network. 2. Destroys, uses, takes or damages a computer, computer system or computer network or equipment or supplies used or intended to be used in a computer, computer system or computer network. (b) Whoever violates this subsection is guilty of: 1. A Class A misdemeanor unless subd. 2, 3 or 4 applies. 2. A Class E felony if the offense is committed to defraud or obtain property. 3. A Class D felony if the damage is greater than $ 2,500 or if it causes an interruption or impairment of government operations or public communication, of transportation or of a supply of water, gas or other public service. 4. A Class C felony if the offense creates a substantial and unreasonable risk or great bodily harm to another. (4) Computer use restriction. In addition to the other penalties provided for violation of this section, a judge may place restrictions on the offender's use of computers. The duration of any such restrictions may not exceed the maximum period for which the offender could have been imprisoned; except if the offense is punishable by forfeiture, the duration of the restrictions may not exceed 90 days. (5) Injunctive relief. Any aggrieved party may use for injunctive relief under ch. 813 to compel compliance with this section. In addition, owners, lessors, users or manufacturers of computers, or association or organizations representing any of those persons, may sue for injunctive relief to prevent or stop the disclosure of information which may enable another person to gain unauthorized access to data, computer programs or supporting documentation. Downloaded From P-80 International Information Systems 304-744-2253