76 lines
3.3 KiB
Plaintext
76 lines
3.3 KiB
Plaintext
/* R FRINGE COMMENTARY- The Idaho Computer Crimes Law
|
|
follows, Idaho Code, 18-2201, adopted 1982 */
|
|
|
|
SECTION 18-2201 Definitions.-- As used in this chapter:
|
|
|
|
|
|
(1) To "access" means to instruct, communicate with, store
|
|
data in, retrieve data from, or otherwise make use of any of the
|
|
resources of a computer, computer system or computer network.
|
|
|
|
(2) "Computer" means, but is not limited to, an electronic
|
|
device which performs logical, arithmetic, or memory functions by
|
|
the manipulations of electronic or magnetic impulses, and
|
|
includes all output, processing, storage, software or
|
|
communication facilities which are connected to or related to
|
|
such a device in a system or network.
|
|
|
|
(3) "Computer network" means, but is not limited to, the
|
|
interconnection of communications lines (including microwave or
|
|
other means of electronic communication) with a computer through
|
|
remote terminals, or a complex consisting of two (2) or more
|
|
interconnected computers.
|
|
|
|
(4) "Computer program" means, but is not limited to, a series
|
|
of of instructions or statements, in a form acceptable to a
|
|
computer, which permits the functioning of a computer system in a
|
|
manner designed to provide appropriate products from such computer
|
|
system.
|
|
|
|
(5) "Computer software", means but is not limited to,
|
|
computer programs, procedures and associated documentation
|
|
concerned with the operation of a computer system.
|
|
|
|
(6) "Computer system", a set of related, connected or
|
|
unconnected, computer equipment, devices, and software.
|
|
|
|
(7) "Property" includes, but is not limited to, financial
|
|
instruments, information, including electronically produced data,
|
|
and computer software and programs in either machine or human
|
|
readable form, and any other tangible or intangible item of
|
|
value.
|
|
|
|
(8) "Services" include, but are not limited to, computer
|
|
time, data processing and storage functions.
|
|
|
|
SECTION 18:2202. Computer crime.--
|
|
|
|
(1) Any person who knowingly accesses, attempts to access or
|
|
uses, or attempts to use any computer, computer system, computer
|
|
network, or nay part thereof for the purpose of: devising or
|
|
executing and scheme or artifice to defraud; obtaining money,
|
|
property, or services by means of false or fraudulent pretenses,
|
|
representations, or promises; or committing theft, commits
|
|
computer crime.
|
|
|
|
(2) Any person who knowingly and without authorization
|
|
alters, damages, or destroys any computer, computer system, or
|
|
computer network, described in section 18-2201, Idaho Code, or
|
|
any computer software, program, documentation, or data contained
|
|
in which computer, computer system or computer network commits
|
|
computer crime.
|
|
|
|
(3) Any person who knowingly and without authorization uses,
|
|
accesses or attempts to access any computer, computer system, or
|
|
computer network described in section 18-2201, Idaho Code, or any
|
|
computer software, program, documentation or data contained in
|
|
such computer, computer system, or computer network, commits
|
|
computer crime.
|
|
|
|
(4) A violation of the provisions of subsections (1) or (2)
|
|
of this section shall be a felony. A violation of the provisions
|
|
of subsection (3) of this section shall be a misdemeanor.
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|