81 lines
3.6 KiB
Plaintext
81 lines
3.6 KiB
Plaintext
/* R FRINGE COMMENTARY: Here's the Colorado Computer Crimes Law,
|
|
Colorado Revised Statutes, Criminal Code, Section 18-5.5-101*.
|
|
|
|
|
|
SECTION 18-5.5-101. Definitions
|
|
|
|
As used in this article, unless the context otherwise
|
|
requires:
|
|
|
|
(1) "Authorization" means the express consent of a person
|
|
which may include an employee's job description to use said
|
|
person's computer, computer network, computer program, computer
|
|
software, computer system, property, or services as those terms
|
|
are defined in this section.
|
|
|
|
(2) "Computer" means an electronic device which performs
|
|
logical, arithmetic, or memory functions by the manipulations of
|
|
electronic or magnetic impulses, and includes all input, output,
|
|
processing, storage, software, or communication facilities which
|
|
are connected or related to such a device in a system or network.
|
|
|
|
(3) "Computer network" means the interconnection of
|
|
communications lines (including microwave or other means of
|
|
electronic communication) with a computer through remote
|
|
terminals, or a complex consisting of two or more interconnected
|
|
computers.
|
|
|
|
(4) "Computer program" means an series of instructions or
|
|
statements, in a form acceptable to a computer, which permits the
|
|
functioning of a computer system in a manner designed to provide
|
|
appropriate products from such computer system.
|
|
|
|
(5) "Computer software" a set of computer programs,
|
|
procedures and associated documentation concerned with the
|
|
operation of a computer system.
|
|
|
|
(6) "Computer system" means a set of related, connected or
|
|
unconnected computer equipment, devices and software.
|
|
|
|
(7) "Financial instrument" means any check, draft, money
|
|
order, certificate of deposit, letter of credit, bill of
|
|
exchange, credit card, debit card, or marketable security.
|
|
|
|
(8) "Property" includes but is not limited to, financial
|
|
instruments, information, including electronically produced data,
|
|
and computer software and programs, in either machine human
|
|
readable form, and any other tangible or intangible item of
|
|
value.
|
|
|
|
(9) "Services" includes, but is not limited to, computer
|
|
time, data processing and storage functions.
|
|
|
|
(10) To "use" means to instruct, communicated with, store
|
|
data in, retrieve data from, or otherwise make use of any of the
|
|
resources of a computer, computer system, or computer network.
|
|
|
|
SECTION 18-5.5-102. Computer crime
|
|
|
|
(1) Any person who knowingly uses any computer, computer
|
|
system, computer network, or any part thereof for the purpose of
|
|
devising or executing any scheme or artifice to defraud;
|
|
obtaining property or services, by means of false or
|
|
fraudulent pretenses, representations or promises; using the
|
|
property or services of another without authorization; or
|
|
committing theft commits computer crime.
|
|
|
|
(2) Any person who knowingly and without authorization, uses
|
|
alters, damages, destroys any computer, computer system, computer
|
|
network, described in section 18-5.5-101, or any computer
|
|
software, program or data contained in such computer, computer
|
|
system or computer network commits computer crime.
|
|
|
|
(3) If the loss, damage, or thing of value taken in
|
|
violation of this section is less than fifty dollars, computer
|
|
crime is a class 3 misdemeanor; if fifty dollars or more but less
|
|
than three hundred dollars, computer crime is a class 2
|
|
misdemeanor; if three hundred dollars or more but less than ten
|
|
thousand dollars, computer crime is a class 4 felony; if ten
|
|
thousand dollars or more, computer crime is a class 3 felony.
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|