💾 Archived View for spam.works › mirrors › textfiles › law › ar_lawsta.law captured on 2023-06-16 at 18:54:11.
-=-=-=-=-=-=-
Arkansas has one of the most comprehensive set of regulations on computer use.... The computer crimes law was adopted in 1987. Arkansas Code of 1987, Section 5- 41-101*/ SECTION 5-41-101. Purpose It is found and determined that computer-related crime poses a major problem for business and government; that losses for each incident of computer-related crime are potentially astronomical; that the opportunities for computer-related crime in business and government through the introduction of fraudulent records into a computer system, the unauthorized use of computers, the alteration or destruction of computer information or files, and the stealing of financial instruments, data, and other assets are great; that computer-related crime has a direct affect on state commerce; and that, while various forms of computer crime might possibly be the subject of criminal charges based on other provisions of law, it is appropriate and desirable that a statute be enacted which deals directly with computer crime. SECTION 5-41-102. Definitions. As used in this chapter, unless the context otherwise required: (1) "Access" means to instruct, communicate with, store data in, or retrieve data from a computer, computer system, or computer network; (2) "Computer" means an electronic device that performs, logic, arithmetic, and memory functions by manipulating electronic or magnetic impulses and includes all input, output, processing, storage, computer software, and communication facilities that are connected or related to that device in a system or a network; (3) "Computer network" means the interconnection of communications lines with a computer through remote terminals or a complex consisting of two or more interconnection computers; /* A BBS is a "computer network under this statute and is thus protected by the statute. */ (4) "Computer program" means a set of instructions, or statements and related data that, is capable of causing a computer or computer system to perform specified functions; (5) "Computer software" means one (1) or computer programs, existing in any form, or any associated operational procedures, manuals or other documentation; (6) "Computer system" means a set of related, connected or unconnected computers other devices and software; (7) "Data" means any representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared and are intended to be processed or stored, are being processed or stored, or have been processed or stored in a computer, computer network or computer system; (8) "Financial instrument" includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security or any computer system representation thereof; (9) "Property" includes, but is not limited to, financial instruments, computer programs, documents associated with computer programs; or copies thereof, whether tangible or intangible, including both human and computer readable data, and data while in transit; (10) "Services" includes, but is not limited to, the use of a computer, a computer network, computer software, a computer program, or data. SECTION 5-41-103 Computer fraud. (a) Any person commits computer fraud who intentionally accesses or causes to be accessed any computer, computer system, computer network, or any part thereof for the purpose of: (1) Devising or executing any scheme or artifice to defraud or to extort; or (2) Obtaining money, property, or services with false or fraudulent intent, representation, or promises. (3) Computer fraud is a Class D felony. SECTION 5-41-104 Computer trespass (a) Any person commits computer trespass who intentionally and without authorization accesses, alters, deletes, damages, destroys, or disrupts any computer, computer system, computer network, computer program or data. /* This protects the BBS against invasion, virusing, and arguably from use not in accordance with the rules of the system. */ (b) Computer trespass is a Class C misdemeanor if it is a first violation which does not cause any loss or damage; (c) Computer trespass is a Class B misdemeanor if: (1) It is a second or subsequent violation which does not cause any loss or damage; or (2) It is a violation which causes loss or damages of less than five hundred dollars ($500). (d) Computer trespass is a Class A misdemeanor if it is a violation which causes loss or damage of five hundred dollars ($ 500) or more, but less than twenty-five hundred dollars ($ 2,500.) (e) Computer trespass is a Class D felony if it is a violation which causes loss or damages of two thousand five hundred dollars ($ 2,500) or more. SECTION 5-41-105 Venue of violations For the purposes of venue under this chapter, any violation of this chapter shall be considered to have been committed in any county: (1) In which any act was performed in furtherance of any course of conduct which violated this chapter; (2) In which any violator had control of or possession of any proceeds of any course of conduct which violated this chapter. Downloaded From P-80 International Information Systems 304-744-2253