109 lines
4.6 KiB
Plaintext
109 lines
4.6 KiB
Plaintext
/* R FRINGE COMMENTARY:
|
|
|
|
Here is Pennsylvania's computer crimes law, adopted in 1983 with
|
|
changes in 1986, Pennsylvania consolidated statutes title
|
|
18 section 3933.*/
|
|
|
|
SECTION 3933 Unlawful use of a computer
|
|
|
|
(a) Offense defined.-- A person commits an offense if he:
|
|
|
|
(1) accesses, alters, damages or destroys any
|
|
computer, computer system, computer network, computer
|
|
software, computer program or data base or any part
|
|
thereof, with the intent to interrupt the normal
|
|
functioning of an organization
|
|
|
|
/*does a person commit a crime by breaking into a
|
|
system and cleaning it up if the normal function of the
|
|
organization is chaos and devolution?*/
|
|
|
|
or to devise or execute any scheme or artifice to
|
|
defraud or deceive or control property or services by
|
|
means of false or fraudulent pretenses,
|
|
rep[resentations, or promises;
|
|
|
|
(2) intentionally and without authorization accesses,
|
|
alters, interferes with the operation of, damages or
|
|
destroys any computer, computer system, computer
|
|
network, computer software, computer program, or
|
|
computer data base or any part thereof; or
|
|
|
|
(3) intentionally or knowingly and without
|
|
authorization gives or publishes a password,
|
|
identifying code, personal identification number or other
|
|
confidential information about a computer, computer
|
|
system, computer network or data base.
|
|
|
|
/*This statute has an extremely elastic definition of the the
|
|
term confidential information and gives a very broad tool to the
|
|
computer industry. >Consequently label material sold in this
|
|
state which is legitimately confidential "confidential
|
|
information protected by 18PaC.S Section 3933*/
|
|
|
|
(b) Grading.--An offense under subsection (a)(1) is a felony
|
|
of the third degree. An offense under subsection (a)(2) or (3)
|
|
is a a misdemeanor of the first degree.
|
|
|
|
(c) Definitions.--As used in this section, the following
|
|
words and phrases shall have the meanings given to them in this
|
|
subsection:
|
|
|
|
"Access". To intercept, instruct, communicate with, store
|
|
data in, retrieve data from or otherwise make use of any
|
|
resources of a computer, computer system, computer network or
|
|
data base.
|
|
|
|
"Computer." An electronic, magnetic, optical, hydraulic
|
|
|
|
/* Will all of those with hydraulic computers PLEASE leave a
|
|
message to me explaining what the hell a hydraulic computer
|
|
is----- Thanks---- Sysop (Herb Kraft.) */
|
|
|
|
organic or other high speed data processing device or system
|
|
which performs, logic, arithmetic functions and includes all
|
|
input, output, processing, storage, software or communication
|
|
facilities which are connected or related to the device in a
|
|
system or network.
|
|
|
|
"Computer network" the interconnection of two o more
|
|
computers through the usage of satellite, microwave, line or
|
|
other communication medium.
|
|
|
|
"Computer program" an ordered set of instructions or
|
|
statements and related data that, when automatically execute in
|
|
actual or modified form in a computer system, causes it to
|
|
perform specified functions.
|
|
|
|
"Computer software" a set of computer programs, procedures,
|
|
and associated documentation concerned with the operation of a
|
|
computer system.]
|
|
|
|
"Computer system" a set of related, connected or unconnected
|
|
computer equipment, devices and software.
|
|
|
|
"Data base" a representation of information, knowledge,
|
|
facts, concepts or instructions which are being prepared or
|
|
processed or have been prepared or processed in a formalized
|
|
manner and are intended for use in a computer, computer system or
|
|
computer network including, but not limited to, computer
|
|
printouts, magnetic storage media, punched cards or data stored
|
|
internally in the memory of the computer.
|
|
|
|
"Financial instrument" includes, but is not limited to, any
|
|
check, draft, warrant, money order, note, certificate of deposit,
|
|
letter of credit, bill of exchange, credit or debit card,
|
|
transaction authorization mechanism, marketable security or any
|
|
computer system representation thereof.
|
|
|
|
"Property" includes but is not limited to financial
|
|
instruments, computer software and programs either in machine or
|
|
human readable form, and anything of value, tangible or
|
|
intangible.
|
|
|
|
"Services" includes but is not limited to, computer time,
|
|
data processing and storage functions.
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|