71 lines
3.0 KiB
Plaintext
71 lines
3.0 KiB
Plaintext
/* Here's the Arizona Computer Crimes Law, effective in 1978, see
|
|
section 13-2301, Arizona Revised Statutes.*/
|
|
|
|
SECTION 13-2301 Definitions
|
|
|
|
/* We are omitting sections A through D of this section as they
|
|
do not relate to computers.*/
|
|
|
|
E. For the purposes of Section 13-2316:
|
|
|
|
1. "Access" means to approach, instruct, communicate with,
|
|
store data in, retrieve data from, or otherwise make use the
|
|
resources of, a computer, computer system, or computer network.
|
|
|
|
2. "Computer" means an electronic device which performs
|
|
logic, arithmetic or memory functions by the manipulations of
|
|
electronic or magnetic impulses, and includes input, output,
|
|
processing, storage, software, or communication facilities which
|
|
are connected or related to a device in a system or network.
|
|
|
|
3. "Computer network" means the interconnection of
|
|
communications lines with a computer through remote terminals, or
|
|
a complex consisting of 2 or more interconnected computers.
|
|
|
|
4. "Computer program" means a series of instructions or
|
|
statements, in a form acceptable to a computer, which permits the
|
|
functioning of a computer system in a manner designed to provide
|
|
appropriate products from such computer system.
|
|
|
|
5. "Computer software" means a set of computer programs,
|
|
procedures, and associated documentation concerned with the
|
|
operation of a computer system.
|
|
|
|
6. "Computer system" means a set of related, connected or
|
|
unconnected equipment, devices and software.
|
|
|
|
7. "Financial instrument" means any check, draft, money
|
|
order, certificate of deposit, letter of credit, bill of
|
|
exchange, credit card or marketable security or any other written
|
|
instrument, as defined by Section 13-2001, paragraph 7, which is
|
|
transferable for value.
|
|
|
|
8. "Property" means financial instruments, information,
|
|
including electronically produced data, computer software and
|
|
programs in either machine or human readable form, and anything
|
|
of value, tangible or intangible.
|
|
|
|
9. "Services" includes computer time, data processing, and
|
|
storage functions.
|
|
|
|
SECTION 13-2316 Computer fraud; classification
|
|
|
|
A. A person commits computer fraud in the first degree by
|
|
accessing, altering, damaging or destroying without authorization
|
|
any computer, computer system, computer network, or any part of
|
|
such computer, system or network, with the intent to devise or
|
|
execute any scheme or artifice to defraud or deceive, or control
|
|
property or services, by means of a false or fraudulent
|
|
pretenses, representations, or promises.
|
|
|
|
B. A person commits computer fraud in the second degree by
|
|
intentionally and without authorization, accessing, altering,
|
|
damaging or destroying any computer, computer system, or computer
|
|
network, or or data contained in a computer, computer system, or
|
|
computer network.
|
|
|
|
C. Computer fraud in the first degree is class 3 felony.
|
|
Computer fraud in the second degree is a class 6 felony.
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|