COMPUTER TAMPERING THIRD, SECOND, FIRST DEGREE (Monetary Amount of Damage)



Similar documents
count is Criminal Possession of Stolen Property in the Fourth Degree.

HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES

count is Theft of Services.

THEFT OF SERVICES (A Misdemeanor) (Sale of Decoder or Descrambler) PENAL LAW (4)(b) (Committed on or after Nov. 1, 1987)

GRAND LARCENY FOURTH DEGREE (Theft of specific property) (E Felony) PENAL LAW

POSSESSION OF A GAMBLING DEVICE (A Misdemeanor) (Coin Operated Gambling Device) PENAL LAW (a)(3) count is Possession of a Gambling Device.

NEW JERSEY TRADEMARK COUNTERFEITING ACT (N.J.S.A. 2C:21-32c) of the indictment charges the defendant with violating the New Jersey

COERCION IN THE FIRST DEGREE (Class D felony) PENAL LAW (2) (Committed on or after September 1, 1967) The count is Coercion in the First Degree.

BURGLARY SECOND DEGREE (C Felony) (Dwelling) PENAL LAW (2) (Committed on or after Sept. 1, 1981) (Revised January 2013 and June 2015) 1

An issue arises: is it a mistake? Is it an act not reaching the level of a crime? Or is it a crime?

NC General Statutes - Chapter 14 Article 60 1

USD #102 Employee Technology Use Handbook

CHAPTER 4-2 BURGLARY

[CHARGE IF A VIOLATION OF N.J.S.A. 2C:21-17a(1) IS ALLEGED]

Computer Crimes Act An Act to provide for offences relating to the misuse of computers.

CRIMINAL POSSESSION OF A CONTROLLED SUBSTANCE SEVENTH DEGREE (A Misdemeanor) PENAL LAW (Committed on or after September 18, 2011) 1

UINTA COUNTY, WYOMING DATASHEET NSF/ACCOUNT CLOSED CHECK REPORTING PACKET

189A.010 Operating motor vehicle with alcohol concentration of or above 0.08, or of or above 0.02 for persons under age twenty-one, or while under

Public Act No

Criminal Possession of a Controlled Substance

The count is Driving While Ability Impaired by Drugs.

ASSAULT BY AUTO OR VESSEL (BODILY INJURY, WITH DRUNK DRIVING OR REFUSAL 1 ) (N.J.S.A. 2C:12-1c)

NAVAJO COUNTY ATTORNEY S OFFICE

Comment [1]: BDERIV. Comment [2]: EDERIV

If You Have Been Charged With a Crime that Requires the Prosecution to Prove Possession Based on a Constructive Possession Argument It Is Crucial for

[First Reprint] SENATE COMMITTEE SUBSTITUTE FOR. SENATE, No STATE OF NEW JERSEY. 211th LEGISLATURE ADOPTED MARCH 8, 2004

AGGRAVATED SEXUAL ASSAULT - PHYSICAL FORCE OR COERCION WITH SEVERE PERSONAL INJURY (N.J.S.A. 2C:14-2a(6))

OPERATING UNDER THE INFLUENCE CAUSING SERIOUS INJURY. The defendant is charged with causing serious bodily injury by

Please see Section IX. for Additional Information:

Definitions In this chapter, unless the context otherwise requires: 1. "Cancelled or revoked credit card" means a credit card that is no

Computer Fraud & Abuse Act

Defenses to Driving Without Insurance. 1. What are the penalties for driving without insurance?

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

OKLAHOMA. 21 Okl. St Sexual Assault Examination Fund--Establishment

FEDERAL & NEW YORK STATUTES RELATING TO FILING FALSE CLAIMS. 1) Federal False Claims Act (31 USC )

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

Arkansas Sentencing Commission

Metropolitan Jewish Health System and its Participating Agencies and Programs [MJHS]

ABC Law 65-c prohibits a person under the age of 21 from possessing an alcoholic beverage with intent to consume it. This section provides:

The Iraqi Dinars - Punitive and Criminal Penalties

UNAUTHORIZED PRACTICE OF LAW (FOURTH & THIRD DEGREE) (N.J.S.A. 2C:21-22)

PLEA AGREEMENT. My full true name is Amy 1. Curl, and I request that all proceedings against me be had in

DWI / DUI Defense Lawyer / Attorney for Tyler and East Texas

How To Write A Law In Oklahoma

H. VIOLATION OF COURT ORDER

NOT TO BE PUBLISHED IN OFFICIAL REPORTS IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA FOURTH APPELLATE DISTRICT DIVISION TWO

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

Policy for the Acceptable Use of Information Technology Resources

IN THE COURT OF APPEALS OF THE STATE OF IDAHO. Docket No ) ) ) ) ) ) ) ) ) )

Driving under the influence driving while impaired driving with excessive alcoholic content definitions penalties.

CHAPTER TEN DRIVING UNDER THE INFLUENCE

The count is Driving While Intoxicated. Under our law, no person shall operate a motor vehicle while in an intoxicated condition.

Title 17-A: MAINE CRIMINAL CODE

IN THE COMMONWEALTH COURT OF PENNSYLVANIA

SENATE FILE NO. SF0083. Senator(s) Peterson and Representative(s) Harvey A BILL. for. AN ACT relating to Medicaid; creating the Wyoming Medicaid

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec Fraud and related activity in connection with computers

Chapter 15 Criminal Law and Procedures

28.1 DRIVING WHILE UNDER THE INFLUENCE , Fla.Stat.

CHAPTER 5 OFFENSES INVOLVING FRAUD

Public Integrity Criminal Law for the Municipal Attorney By Julia Davis

DUI ORDERS. There are five (5) DUI Conviction Orders in addition to a DUI Nonadjudication Order. 1. DUI 1st - NOT Zero Tolerance

S 0550 S T A T E O F R H O D E I S L A N D

17.00 CANNABIS AND CONTROLLED SUBSTANCES DISPOSITION TABLE

Rhode Island. Overall Ranking: Bottom Tier. Rhode Island Research Facility Protection Law. Rhode Island Animal Cruelty Law

North Shore LIJ Health System, Inc.

CHAPTER 46 FORGERY, FRAUDULENT PRACTICES & TELEPHONE RECORDS

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

Bangladesh National Parliament

The count is Obstructing Governmental Administration in the Second Degree.

Federal Law No. (1) of 2006 On Electronic Commerce and Transactions

14B NCAC 07A.0116 ROTATION WRECKER SERVICE REGULATIONS (a) The Troop Commander shall include on the rotation wrecker list only those wrecker services

LAKE COUNTY BOARD OF DD/DEEPWOOD BOARD POLICY I. SUBJECT: FALSE CLAIMS PREVENTION AND WHISTLEBLOWER PROTECTION

A petty offense is either a violation or a traffic infraction. Such offenses are not crimes.

IN THE DISTRICT COURT IN AND FOR TULSA COUNTY STATE OF OKLAHOMA DEFENDANT RICCARDO FERRANTE S MOTION TO QUASH FOR INSUFFICIENT EVIDENCE

False or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice?

Texas Civil Commitment-Outpatient Sexually Violent Predator Treatment Program (OSVPTP) Health & Safety Code, Chapter 841

LARCENY BY STEALING. The defendant is charged with larceny. Section 30 of chapter 266 of

FEDERAL & NEW YORK STATUTES RELATING TO FILING FALSE CLAIMS

SECTION I: GENERAL INFORMATION {Indicate if analysis is on an original bill, amendment, substitute or a correction of a previous bill}

Acts 1973, 63rd Leg., p. 883, ch. 399, Sec. 1, eff. Jan. 1, Amended by Acts 1993, 73rd Leg., ch. 900, Sec. 1.01, eff. Sept. 1, 1994.

Assembly Bill No. 5 CHAPTER 5

IN THE SUPREME COURT OF THE STATE OF IDAHO. Docket No ) ) ) ) ) ) ) ) ) )

DISARMING A LAW ENFORCEMENT OFFICER N.J.S.A. 2C:12-11(a) & (b)

Texas City Attorneys Association Riley Fletcher Basic Municipal Law Seminar (February 21-22, 2013)

NC General Statutes - Chapter 14 Article 19B 1

CHAPTER 37 BURGLARY AND HOME INVASION ARTICLE 1 BURGLARY

CRIMINAL LAW AND VICTIMS RIGHTS

Criminal Lawyer - Dealing Stolen Property

SOUTH NASSAU COMMUNITIES HOSPITAL One Healthy Way, Oceanside, NY 11572

DEPARTMENT OF REGULATORY AGENCIES DIVISION OF REAL ESTATE COMMUNITY ASSOCIATION MANAGERS 4 CCR EMERGENCY RULE

ELECTRONIC MEETING COMMENCED MONDAY, JAN. 27, 2014 AT 12:12PM.

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

How To Get A Construction Contract In The United States

OPERATING UNDER THE INFLUENCE OF INTOXICATING LIQUOR. The defendant is charged with operating a motor vehicle while under

United States Attorney Southern District of New York

Alabama Rules of Criminal Procedure. Rule 26. Judgment; presentence report; sentence hearing; sentence.

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

I N T H E COURT OF APPEALS OF INDIANA

SECTION I: GENERAL INFORMATION {Indicate if analysis is on an original bill, amendment, substitute or a correction of a previous bill}

Title 17-A: MAINE CRIMINAL CODE

Transcription:

COMPUTER TAMPERING THIRD, SECOND, FIRST DEGREE (Monetary Amount of Damage) COMPUTER TAMPERING THIRD DEGREE (E Felony) ($1000) PENAL LAW 156.25(4) (Committed on or after Nov. 1, 2006) COMPUTER TAMPERING SECOND DEGREE (D Felony) ($3000) PENAL LAW 156.26(1) 1 (Committed on or after Nov. 1, 2006) COMPUTER TAMPERING FIRST DEGREE ( C Felony) ($50,000) PENAL LAW 156.27 (Committed on or after Nov. 1, 2006) The count is Computer Tampering in the Degree. Under our law, a person is guilty of computer tampering in 2 the degree when that person uses, causes to be used, or accesses a computer, computer service, or computer network without authorization and he or she intentionally alters in any 1 This offense was formerly PL 156.26. It was renumbered PL 156.26(1) by L. 2008, ch 590, eff. Nov. 1, 2008. 2 At this point the statute reads he commits the crime of computer tampering in the fourth degree so as to cause damages in an aggregate amount exceeding the respective threshold amounts. See Penal Law 156.25(4), 156.26(1), 156.27. The charge substitutes the appropriate language from computer tampering in the fourth degree. See Penal Law 156.20.

manner or destroys computer data or a computer program of another person so as to cause damages in an aggregate amount exceeding Select appropriate alternative: one thousand dollars. three thousand dollars. fifty thousand dollars. [Add if applicable: It is a defense that the defendant had reasonable grounds to believe that he or she had the right to alter in any manner or destroy the computer data or the computer program.] 3 Some of the terms used in this definition have their own special meaning in our law. I will now give you the meaning of the following terms: computer, computer service, computer network, computer data, computer program, access, without authorization and intentionally. COMPUTER means a device or group of devices which, by manipulation of electronic, magnetic, optical or electrochemical impulses, pursuant to a computer program, can automatically perform arithmetic, logical, storage or retrieval operations with or on computer data, and includes any connected or directly related device, equipment or facility which enables such computer to store, retrieve or communicate to or from a person, another computer or another device the results of computer operations, computer programs or computer data. 4 COMPUTER SERVICE means any and all services 3 4 Penal Law 156.50(2). Penal Law 156.00(1). 2

provided by or through the facilities of any computer communication system allowing the input, output, examination, or transfer, of computer data or computer programs from one computer to another. 5 COMPUTER NETWORK means the interconnection of hardwire or wireless communication lines with a computer through remote terminals, or a complex consisting of two or more interconnected computers. 6 COMPUTER DATA is property and means a representation of information, knowledge, facts, concepts or instructions which are being processed, or have been processed in a computer and may be in any form, including magnetic storage media, punched cards, or stored internally in the memory of the computer. 7 A COMPUTER PROGRAM is property and means an ordered set of data representing coded instructions or statements that, when executed by computer, cause the computer to process data or direct the computer to perform one or more computer operations or both and may be in any form, including magnetic storage media, punched cards, or stored internally in the memory of the computer. 8 ACCESS means to instruct, communicate with, store data in, retrieve from, or otherwise make use of any resources of a computer, physically, directly or by electronic means. 9 5 6 Penal Law 156.00(4). Penal Law 156.00(6). 7 8 Penal Law 156.00(3). Penal Law 156.00(2). 9 Penal Law 156.00(7). 3

WITHOUT AUTHORIZATION means to use or to access a computer, computer service or computer network without the permission of the owner or lessor or someone licensed or 10 privileged by the owner or lessor where the actor knew that his or her use or access was without permission or after actual notice to such person that such use or access was without permission. It shall also mean the access of a computer service by a person without permission where such person knew that such access was without permission or after actual notice to such person, that such access was without permission. 11 [Add if applicable: Under our law, proof that a person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that bypasses, defrauds or otherwise circumvents a security measure installed or used with the user s authorization on the computer, computer service or computer network shall be presumptive evidence that such person used or accessed such computer, computer service or computer network without authorization. 12 What this means is that if the People have proven beyond a reasonable doubt that the person used or accessed a computer, computer service or computer network through the knowing use of a set of instructions, code or computer program that 10 The words the actor have been substituted for the statutory language such person for clarity. 11 12 Penal Law 156.00(8). Penal Law 156.00(8). 4

bypasses, defrauds or otherwise circumvents a security measure installed or used with the user s authorization on the computer, computer service or computer network, then you may, but you are not required to, infer from those facts that such person used or accessed such computer, computer service or computer network without authorization.] INTENT means conscious objective or purpose. Thus, a person INTENTIONALLY alters in any manner or destroys computer data or a computer program of another person so as to cause damages in an aggregate amount exceeding Select appropriate alternative: one thousand dollars three thousand dollars fifty thousand dollars when that person s conscious objective or purpose is to do so. 13 In order for you to find the defendant guilty of this crime, the People are required to prove, from all the evidence in the case, beyond a reasonable doubt, [both/each] of the following [two/three] elements: 1. That on or about (date), in the county of (county), the defendant, (defendant's name), used, caused to be used, or accessed a computer, computer service, or computer network without authorization and he/she altered in any manner or destroyed computer data or a computer program of another person so as to cause damages in an aggregate amount exceeding 13 See Penal Law 15.05(1). 5

Select appropriate alternative: one thousand dollars three thousand dollars fifty thousand dollars; [and] 2. That the defendant did so intentionally; [and] [ADD IF APPLICABLE: 3. That the defendant did not have reasonable grounds to believe that he/she had the right to alter in any manner or destroy the computer data or the computer program]. Therefore, if you find that the People have proven beyond a reasonable doubt [both/each] of those elements, you must find the defendant guilty of the crime of Computer Tampering in the Degree as charged in the count. On the other hand, if you find that the People have not proven beyond a reasonable doubt [either/any] one or [both/more] of those elements, you must find the defendant not guilty of the crime of Computer Tampering in the Degree as charged in the count. 6