💾 Archived View for spam.works › mirrors › textfiles › law › co_lawsta.law captured on 2023-06-16 at 18:54:56.
-=-=-=-=-=-=-
/* R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law, Colorado Revised Statutes, Criminal Code, Section 18-5.5-101*. SECTION 18-5.5-101. Definitions As used in this article, unless the context otherwise requires: (1) "Authorization" means the express consent of a person which may include an employee's job description to use said person's computer, computer network, computer program, computer software, computer system, property, or services as those terms are defined in this section. (2) "Computer" means an electronic device which performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses, and includes all input, output, processing, storage, software, or communication facilities which are connected or related to such a device in a system or network. (3) "Computer network" means the interconnection of communications lines (including microwave or other means of electronic communication) with a computer through remote terminals, or a complex consisting of two or more interconnected computers. (4) "Computer program" means an series of instructions or statements, in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from such computer system. (5) "Computer software" a set of computer programs, procedures and associated documentation concerned with the operation of a computer system. (6) "Computer system" means a set of related, connected or unconnected computer equipment, devices and software. (7) "Financial instrument" means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, debit card, or marketable security. (8) "Property" includes but is not limited to, financial instruments, information, including electronically produced data, and computer software and programs, in either machine human readable form, and any other tangible or intangible item of value. (9) "Services" includes, but is not limited to, computer time, data processing and storage functions. (10) To "use" means to instruct, communicated with, store data in, retrieve data from, or otherwise make use of any of the resources of a computer, computer system, or computer network. SECTION 18-5.5-102. Computer crime (1) Any person who knowingly uses any computer, computer system, computer network, or any part thereof for the purpose of devising or executing any scheme or artifice to defraud; obtaining property or services, by means of false or fraudulent pretenses, representations or promises; using the property or services of another without authorization; or committing theft commits computer crime. (2) Any person who knowingly and without authorization, uses alters, damages, destroys any computer, computer system, computer network, described in section 18-5.5-101, or any computer software, program or data contained in such computer, computer system or computer network commits computer crime. (3) If the loss, damage, or thing of value taken in violation of this section is less than fifty dollars, computer crime is a class 3 misdemeanor; if fifty dollars or more but less than three hundred dollars, computer crime is a class 2 misdemeanor; if three hundred dollars or more but less than ten thousand dollars, computer crime is a class 4 felony; if ten thousand dollars or more, computer crime is a class 3 felony. Downloaded From P-80 International Information Systems 304-744-2253