💾 Archived View for spam.works › mirrors › textfiles › law › nh_lawsta.law captured on 2023-06-16 at 19:00:43.

View Raw

More Information

-=-=-=-=-=-=-

/* R FRINGE COMMENTARY: Here's the New Hampshire Computer Crimes 
Law, adopted in January, 1986, New Hampshire Revised Statutes 
[1955] section 638:16.*/

SECTION 638:16 Computer Crime; Definitions

     For the purpose of this subdivision:

     I. "Access" means to instruct, communicate with, store data 
in, retrieve data from a computer, computer system or computer 
network.

     II. "Computer" means a programmable, electronic device 
capable of accepting and processing data.

     III. "Computer network" means (a) a set of related devices 
connected to a computer by communication facilities, or (b) a 
complex of two or more computers, including related devices, 
connected by communications facilities. 

     IV. "Computer program" means a  set of instructions, or 
statements or related data that, in actual or modified form, is 
capable of causing a computer to perform specified functions.
     
     V. "Computer services" includes, but is not limited to, 
computer access, data processing and data storage.

    VI.  "Computer software" one or more computer programs, 
existing in any form, or associated operational procedures, 
manuals, or other documentation.

    VII. "Computer system" means a computer, its software, 
related equipment, communications facilities, if any, and 
includes computer networks.

    VIII. "Data" means information of any kind in any 
form, including computer software. 

     IX. "Person" means a natural person, corporation, trust, 
partnership, incorporated or unincorporated association, and any 
other legal or governmental entity, including any state or 
municipal entity or public official.

/* This means that the state, despite the current status of the 
law (states aren't liable for copyright infringement) is included 
in the computer crimes field. */

     X. "Property" means anything of value, including data.


SECTION 638:17 Computer Related Offenses. 

     I. A person is guilty of the computer crime of unauthorized 
access to a computer system when, knowing that he is not 
authorized to do so, he knowingly access or causes to be 
accessed any computer system without authorization. It shall be 
an affirmative defense to prosecution for unauthorized access to 
a computer system that:

     (a) The person reasonably believed that the owner of the 
computer system, or a person empowered to license access thereto, 
had authorized him to access; or

     (b) The person reasonably believes that the owner of the 
computer system, or a person empowered to license access thereto, 
would have authorized him to access without payment of any 
consideration;

/* If you are running a BBS and you want to limit access to only 
those who give their real names, and the system is a no-charge 
BBS, then you would have to make that clear on sign on. Please 
see the source code library for ASCII code for such a sign on. */

     (c) The person reasonably could not have known that his 
access was unauthorized.

     II. A person is guilty of the computer crime of theft of 
computer services when he knowingly accesses or causes to be used 
a computer system with the purpose of obtaining unauthorized 
computer services.

    III. A person is guilty of the computer crime of interruption 
of computer services when he, without authorization, knowingly or 
recklessly disrupts or degrades or causes the disruption or 
degradation of computer services or denies or causes the denial 
of computer services to an authorized user of a computer system.

    IV. A person is guilty 
of the computer crime of misuse of computer system information 
when: 

     (a) As a result of his accessing or causing to be accessed 
a computer system, he intentionally makes or causes to be made an 
unauthorized display, use, disclosure or copy, in any form, of 
data residing in, communicated by or produced by a computer 
system; or 

     (b) he knowingly or recklessly and without authorization:

       (1) Alters, deletes, tampers with, damages, destroys or 
       takes data intended for use by a computer system, whether 
       residing within or external to a computer system; or 

       (2) Intercepts or adds data to data residing within a computer 
       system; or 

     (c) he knowingly receives or retains data obtained in 
     violation of subparagraph (a) or (b) of this paragraph; or 
     
     (d) He knowingly uses or discloses any data he knows or 
     believes was obtained in violation of subparagraph (a) or 
     (b) of this subsection.

     V. A person is guilty of the computer crime of destruction 
of computer equipment when he, without authorization, knowingly 
or recklessly tampers with, takes, transfers, conceals, alters, 
damages or destroys any equipment used in a computer system or 
knowingly or recklessly causes any of the foregoing to occur.

SECTION 638:18 Computer Crime Penalties.

    I. Computer crime constitutes a class A felony if the damage 
to the damage to or the value of the property or computer 
services exceeds $ 1,000.

    II. Computer crime constitutes a Class B felony if:

    (a) The damage to or the value of the property or computer services 
exceeds $ 500; or
     
    (b)  The person recklessly engages in conduct which creates a 
risk of serious physical injury to another person.
     
     III. Computer crime is a misdemeanor if the damage to or the 
value of the property or computer services, if any, is $ 500 or 
less. 


    IV. If a person has gained money, property or services or 
other consideration through the commission of any offense under 
RS 638:17, upon conviction thereof, the court, in addition to any 
sentence of imprisonment or other form of sentence authorized by 
RSA 651, may in lieu of imposing a fine, may sentence the 
defendant to pay an amount, fixed by the court, not to exceed 
double the amount of the defendant's gain from the commission of 
such offense. In such case the court shall make a finding as to 
the amount of the defendant's gain from the offense, and if the 
record does not contain sufficient evidence to support such a 
finding, the court may conduct a hearing upon the issue. For the 
purpose of this section, "gain" means the amount of money or the 
value of property or computer services or other consideration 
derived.

     V. For the purposes of this section:

     (a) The value of property or computer services shall be:

     (1) The market value of the property or computer services at 
the time of the violation; or 

     (2) if the property or computer services are unrecoverable, 
damaged or destroyed as a result of a violation of RSA 638:17 the 
cost of reproducing or replacing the property or computer 
services at the time of the violation.

     (b) Amounts included in violations of RSA 638:17 committed 
pursuant to one scheme or course of conduct, whether from the 
same person or several persons, may be aggregated in determining 
the grade of the offense.

     (c) When the value of the property or computer services or 
damage thereto cannot be satisfactorily ascertained, the value 
shall be deemed to be two hundred fifty dollars.

SECTION 638:19 Venue

     I. In any prosecution for a violation of RSA 638:17 
the offense shall be deemed to have been committed in the town in 
which the act occurred or in which the computer system or part 
thereof involved in the violation was located.

/*"Venue" is the law of where a case will be heard. Venue is easy 
in an armed robbery of a liquor store, since you know where the 
crime took place, and ordinarily, crimes are tried in the area 
where they took place. But in computer crime, it is very hard to 
figure out where the crime took place. The venue provision of New 
Hampshire basically says that it can be tried wherever you can 
catch the baddie. */

     II. In any prosecution for a violation of RSA 638:17 based 
upon more than one act in violation thereof, the offense shall be 
deemed to have been committed in any of the towns in which any of 
the acts occurred or in which a computer system or part thereof 
involved in a violation was located.

     III. If any act performed in furtherance of the offenses 
prohibited by RSA 638:17 occurs in this state or if any computer 
system or part thereof accessed in violation of RSA 638:17 is 
located in this state, the offense shall be deemed to have 
occurred in this state.
Downloaded From P-80 International Information Systems 304-744-2253