/*R FRINGE COMMENTARY: Here's the Utah Computer Crimes Act adopted in 1979, with a major revision in 1986*/ SECTION 76-6-701. Computer crimes act--short title This part is known as the "Utah Computer Crimes Act." SECTION 76-6-602. Computer Crimes Act-- Definitions (1) "Access" means to directly or indirectly use, attempt to use, instruct, communicate with, cause input to, cause output from, or otherwise make use of any resources of a computer, computer system or computer network. (2) "Computer" means any electronic device or communication facility with data processing ability. (3) "Computer system" means a set of related, connected or unconnected, devices, software or other related computer equipment. (4) "Computer network" means the interconnection of communication or telecommunication lines between computers or computers and remote terminals. (5) "Computer property" includes, but is not limited to, electronic impulses, electronically produced data, information, financial instruments, software or programs, in either machine or human readable form, any other tangible or intangible item relating to a computer, computer system, computer network, and any copies of them. (6) "Services" include, but are not limited to, computer time, data manipulation and storage facilities. (7) "Financial instrument" includes, but is not limited to any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, or marketable security. (8) "Software" or "program" means a series of instructions or statements in a form acceptable to a computer, relating to the operations of the computer, or permitting the functioning of a computer system in a manner designed to provide results including, but not limited to, system control programs, application programs or copies of them. SECTION 76-6-703. Computer crimes and penalties. (1) A person who gains or attempts to gain access to and without authorization intentionally and to the damage of another, alters, damages, destroys, discloses, or modifies any computer, computer network, computer property, computer system, program, or software is guilty of a felony of the third degree. (2) A person who intentionally and without authorization uses a computer, computer network, computer property, or computer system to gain or attempt to gain access to any other computer, computer network, computer property or computer system, program, or software, to the damage of another, and alters, damages, destroys, discloses, or modifies any of these, is guilty of a felony of the third degree. (3) A person who use or knowingly allows another person to use any computer, computer network, computer property, computer system, program or software to devise or execute any artifice or scheme to defraud or to obtain money, property or services or other things of value by false pretenses, promises, or representations, is guilty of a felony of the second degree. (4) A person who intentionally, and without authorization, interferes with or interrupts computer services to another, authorized to receive the services is guilty of a Class A misdemeanor. (5) A person who intentionally and without authorization damages or destroys, in whole or in part, any computer, computer network, computer property or computer system is guilty of a Class A misdemeanor unless the amount of damage exceeds $ 1,000, in which case the person is guilty of a felony of the third degree. SECTION 76-6-704. Computer crimes Act -- Attorney general or county attorney to prosecute -- Conduct violating other statutes. (1) The attorney general or the county attorney shall prosecute suspected criminal violations of this part. (2) Prosecution under this part does not prevent any prosecutions under any other law. SECTION 76-6-705. Reporting violations. Every person, except those to whom a statutory or common law privilege applies, who has reason to believe that the provisions of Section 76-6-703 are being or have been violated shall report the suspected violation to the attorney general or to the county attorney of the county in which part or all of the violations occurred. /* Be warned that unlike Georgia's "Snitch" statute, this one does not have immunity for a good faith report. Snitch at your own risk of being sued for malicious prosecution. */ (1) An offense against computer users is the intentional: (a) denial to an authorized user, without consent, of the full and effective use of or access to a computer, a computer system, a computer network or computer services; or (b) use or disclosure to another, without consent, of the numbers, codes, passwords or other means of access to a computer, a computer system, a computer network, or computer services. (2) Whoever commits an offense against computer users shall be punished, upon conviction, by a fine of not more than One Thousand Dollars ($ 1,000), or by imprisonment for not more than six months, or by both such fine and imprisonment. However, when the damage or loss amounts to a value of One Hundred Dollars or more, the offender may be punished, upon convictions, by a fine of not more than Ten Thousand Dollars, or imprisonment for not more than 5 years, or by both such fine and imprisonment. SECTION 97-45-7. Offense against computer equipment, penalties. (1) An offense against intellectual property is the intentional: (a) Destruction, insertion or modification, without consent, of intellectual property; or (b) Disclosure, use, copying, taking or accessing, without consent, of intellectual property. (2) Whoever commits an offense against intellectual property shall be punished, upon conviction, by a fine of not more than One Thousand Dollars ($ 1,000), or by imprisonment for not more than six months, or by both such fine and imprisonment. However, when the damage or loss amounts to a value of One Hundred Dollars or more, the offender may be punished, upon convictions, by a fine of not more than Ten Thousand Dollars, or imprisonment for not more than 5 years, or by both such fine and imprisonment. (3) The provisions of this section shall not apply to the disclosure, use, copying, taking, or accessing by proper means as defined in this chapter. Downloaded From P-80 International Information Systems 304-744-2253