textfiles/law/va_lawsta.law

234 lines
11 KiB
Plaintext

Article 7.1.
Computer Crimes.
Sections 18.2-152.1. Short title. - This article shall be known
and may be cited as the "Virginia Computer Crimes Act." (1984, c.
751.)
Sections 18.2-152.2. Definitions. - For purposes of this article:
"Computer" means an electronic, magnetic, optical, hydraulic or
organic device which, pursuant to a computer program, to human
instruction, or to permanent instructions contained in the device
or group of devices, can automatically perform computer
operations with or on computer data and can communicate the
results to another computer or to a person. The term 'computer'
includes any connected or directly related device, equipment, or
facility which enables the computer to store, retrieve or
communicate computer programs, computer data or the results of
computer operations to or from a person, another computer or
another device.
"Computer data" means any representation of information,
knowledge, facts, concepts, or instructions which is being
prepared or has been prepared and is intended to be processed,
is being processed, or has been processed in a computer or
computer network. "Computer data" may be in any form, whether
readable only by a computer or only by a human or by either,
including, but not limited tom computer printouts, magnetic
storage media, punched cards, or stored internally in the memory
of the computer.
"Computer network" means a set of related, remotely connected
devices and any communications facilities including more than one
computer with the capability to transmit data among them through
the communications facilities.
"Computer operation" means arithmetic, logical, monitoring,
storage or retrieval functions and any combination thereof, and
includes, but is not limited to, communication with, storage of
data to, or retrieval of data from any device or human hand
manipulation of electronic or magnetic impulses. A "computer
operation" for a particular computer may also be any function for
which that computer was generally designed.
"Computer program" means an ordered set of data representing
coded instructions or statements that, when executed by a
computer, causes the computer to perform one or more computer
operations.
"Computer services" includes computer time or services or data
processing services or information or data stored in connection
therewith.
"Computer software" means a set of computer programs, procedures
and associated documentation concerned with computer data or with
the operation of a computer, computer program, or computer
network.
"Financial instrument" includes, but is not limited to, any
check, draft, warrant, money order, note, certificate of deposit,
letter of credit, bill of exchange, credit or debit card,
transaction authorization mechanism, marketable security, or any
computerized representation thereof
"Owner" means an owner or lessee of a computer or a computer
network or an owner, lessee, or licensee of computer data,
computer programs, or computer software.
"Person" shall include any individual, partnership, association,
corporation or joint venture.
"Property" shall include:
1. Real property;
2. Computers and computer networks;
3. Financial instruments, computer data, computer programs,
computer software and all other personal property regardless of
whether they are:
a. Tangible or intangible;
b. In a format readable by humans or by a computer;
c. In transit between computers or within a computer network or
between any devices which comprise a computer; or
d. Located on any paper or in any device on which it is stored by
a computer or by a human; and
4. Computer services.
A person "uses" a computer or computer network when he:
1. Attempts to cause or causes a computer or computer network to
perform or to stop performing computer operations;
2. Attempts to cause or causes the withholding or denial of the
use of a computer, computer network, computer program, computer
data or computer software to another user; or
3. Attempts to cause or causes another person to put false
information into a computer.
A person is "without authority" when he has no right or
permission of the owner to use a computer, or he uses a computer
in a manner exceeding such right or permission. (1984, c. 751.)
Sections 18.2-152.3. Computer fraud. - Any person who uses
computer or computer network without authority and with the
intent to:
1. Obtain property or services by false pretenses;
2. Embezzle or commit larceny; or
3. Convert the property of another shall be guilty of the crime
of computer fraud. If the value of the property of services
obtained is $200 or more, the crime of computer fraud shall be
punishable as a Class 5 felony. Where the value of the property
or services obtained is less than $200.00 or more, the crime of
computer fraud shall be punishable as a Class 5 felony. Where
the value of the property or services obtained is less than
$200.00, the crime of computer fraud shall be punishable as a
Class 1 misdemeanor. (1984, c. 751; 1985, c.322)
Sections 18.2-152.4. Computer trespass. - Any person who uses a
computer or computer network without authority and with the
intent to :
1. Temporarily or permanently remove computer data, computer
programs or computer software from a computer or computer
network;
2. Cause a computer data, computer programs or computer
software;
3. Alter or erase any computer data, computer programs or
computer persists;
4. Effect the creation or alteration of a financial instrument
or of an electronic transfer of funds;
5. Cause physical injury to the property of another; or
6. Make or cause to be made an unauthorized copy, in any form,
including, but not limited to, any printed or electronic form or
computer data, computer programs or computer software residing
in, communicated by or produced by a computer or computer network
shall be guilty of the crime of computer trespass, which shall be
punishable as a Class 1 misdemeanor.
Sections 18.2-152.5. Computer invasion of privacy. - A. A person
is guilty of the crime of computer invasion of privacy when he
uses a computer or computer network and intentionally examines
without authority any employment, salary, credit or any other
financial or personal information relating to any other person.
"Examination" under this section requires the offender to review
the information relating to any other person after the time at
which the offender knows or should know that he is without
authority to view the information displayed.
B. The crime of computer invasion of privacy shall be punishable
as a Class 3 misdemeanor. (1984, c. 751; 1985, c. 398.)
Sections 18.2-152.6. Theft of computer services. - Any person who
willfully uses a computer or computer network, with intent to
obtain computer services without authority, shall be guilty of
the crime of theft of computer services, which shall be
punishable as a Class 1 misdemeanor.
Sections 18.2-152.7. Personal trespass by computer. - A. A person
is guilty of the crime of personal trespass by computer when he
uses a computer or computer network without authority and with
the intent to cause physical injury to an individual.
B. If committed maliciously, the crime of personal trespass by
computer shall be punishable as a Class 3 felony. If such act be
done unlawfully but not maliciously, the crime of personal
trespass by computer shall be punishable as a Class 1
misdemeanor.
Sections 18.2-152.8. Property capable of embezzlement. - For
purposes of Section 18.2-111, personal property subject to
embezzlement shall include:
1. Computers and computer networks;
2. Financial instruments, computer data, computer programs,
computer software and all other personal property regardless of
whether they are:
a. Tangible or intangible;
b. In a format readable by humans or by a computer;
c. In transit between computers or within a computer network or
between any devices which comprise a computer; or
d. Located on any paper or in any device on which it is stored by
a computer or by a human; and
3. Computer services.
Sections 18.2-152.9. Limitation of prosecution. -
Notwithstanding the provisions of Section 19.2-8, prosecution of
a crime which is punishable as a misdemeanor pursuant to this
article must be commenced before the earlier of (i) five years
after the commission of the last act in the course of conduct
constituting a violation of this article or (ii) one year after
the existence of the illegal act and the identity of the offender
are discovered by the Commonwealth, by the owner, or by anyone
else who is damaged by such violation.
Section 18.2-152.10. Venue for prosecution. - For the purpose of
venue under this article, any violation of this article shall be
considered to have been committed in any county or city:
1. In which any act was performed in furtherance of any course
of conduct which violated this article;
2. In which the owner has his principal place of business in the
Commonwealth;
3. In which any offender had control or possession of any
proceeds of the violation or of any books, records, documents,
property, financial instrument, computer software, computer
program, computer data, or other material or objects which were
used in furtherance of the violation;
4. From which, to which, or through which any access to a
computer or computer network was made whether by wires,
electromagnetic waves, microwaves, or any other means of
communication;
5. In which the offender resides; or
6. In which any computer which is an object or an instrument of
the violation is located at the time of the alleged offense.
Section 18.2-152.11. Article not exclusive. - The provisions of
this article shall not be construed to preclude the applicability
of any other provision of the criminal law of this Commonwealth
which presently applies or may in the future apply to any
transaction or course of conduct which violates this article,
unless such provision is clearly inconsistent with the terms of
this article.
Section 18.2-152.12. Civil relief; damages. - A. Any person
whose property or person is injured by reason of a violation of
any provision of this article may sue therefor and recover for
any damages sustained, and the costs of suit. Without limiting
the generality of the term, "damages" shall include loss of
profits.
B. At the request of any party to an action brought pursuant to
this section, the court may, in its discretion, conduct all legal
proceedings in such a way as to protect the secrecy and security
of the computer, computer network, computer data, computer
program and computer software involved in order to prevent
possible recurrence of the same or similar act by another person
and to protect any trade secrets of any party.
C. The provisions of this article shall not be construed to limit
any person's right to pursue any additional civil remedy
otherwise allowed by law.
D. A civil action under this section must be commenced before
expiration of the time period prescribed in Section 8.01-40.1.
Downloaded From P-80 International Information Systems 304-744-2253