💾 Archived View for spam.works › mirrors › textfiles › law › co_lawsta.law captured on 2023-06-16 at 18:54:56.

View Raw

More Information

-=-=-=-=-=-=-

/* R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law, 
Colorado Revised Statutes, Criminal Code, Section 18-5.5-101*.


SECTION 18-5.5-101. Definitions

     As used in this article, unless the context otherwise 
requires:

     (1) "Authorization" means the express consent of a person 
which may include an employee's job description to use said 
person's computer, computer network, computer program, computer 
software, computer system, property, or services as those terms 
are defined in this section.

     (2) "Computer" means an electronic device which performs 
logical, arithmetic, or memory functions by the manipulations of 
electronic or magnetic impulses, and includes all input, output, 
processing, storage, software, or communication facilities which 
are connected or related to such a device in a system or network.

     (3) "Computer network" means the interconnection of 
communications lines (including microwave or other means of 
electronic communication) with a computer through remote 
terminals, or a complex consisting of two or more interconnected 
computers. 

   (4) "Computer program" means an series of instructions or 
statements, in a form acceptable to a computer, which permits the 
functioning of a computer system in a manner designed to provide 
appropriate products from such computer system. 

     (5) "Computer software" a set of computer programs, 
procedures and associated documentation concerned with the 
operation of a computer system.

     (6) "Computer system" means a set of related, connected or 
unconnected computer equipment, devices and software. 

     (7) "Financial instrument" means any check, draft, money 
order, certificate of deposit, letter of credit, bill of 
exchange, credit card, debit card, or marketable security.

   (8) "Property" includes but is not limited to, financial 
instruments, information, including electronically produced data, 
and computer software and programs, in either machine human 
readable form, and any other tangible or intangible item of 
value.

     (9) "Services" includes, but is not limited to, computer 
time, data processing and storage functions.

     (10) To "use" means to instruct, communicated with, store 
data in, retrieve data from, or otherwise make use of any of the 
resources of a computer, computer system, or computer network.

SECTION 18-5.5-102. Computer crime 

     (1) Any person who knowingly uses any computer, computer 
system, computer network, or any part thereof for the purpose of 
devising or executing any scheme or artifice to defraud; 
obtaining property or services, by means of false or 
fraudulent pretenses, representations or promises; using the 
property or services of another without authorization; or 
committing theft commits computer crime.

     (2) Any person who knowingly and without authorization, uses  
alters, damages, destroys any computer, computer system, computer 
network, described in section 18-5.5-101, or any computer 
software, program or data contained in such computer, computer 
system or computer network commits computer crime.

     (3) If the loss, damage, or thing of value taken in 
violation of this section is less than fifty dollars, computer 
crime is a class 3 misdemeanor; if fifty dollars or more but less 
than three hundred dollars, computer crime is a class 2 
misdemeanor; if three hundred dollars or more but less than ten 
thousand dollars, computer crime is a class 4 felony; if ten 
thousand dollars or more, computer crime is a class 3 felony.
Downloaded From P-80 International Information Systems 304-744-2253