2
3
4
5
6
7 LONG TITLE
8 General Description:
9 This bill amends criminal provisions relating to cybercrime and making a false report.
10 Highlighted Provisions:
11 This bill:
12 ▸ defines terms;
13 ▸ modifies the elements, penalties, and defenses for computer crime;
14 ▸ makes it a crime to interrupt or interfere with critical infrastructure;
15 ▸ amends and enacts reporting requirements relating to computer crime or the
16 interruption of, or interference with, critical infrastructure;
17 ▸ amends provisions relating to raising a false alarm or filing a false report;
18 ▸ amends the elements of electronic communication harrassment; and
19 ▸ makes technical and conforming changes.
20 Money Appropriated in this Bill:
21 None
22 Other Special Clauses:
23 None
24 Utah Code Sections Affected:
25 AMENDS:
26 76-6-702, as last amended by Laws of Utah 2005, Chapter 72
27 76-6-703, as last amended by Laws of Utah 2010, Chapter 193
28 76-6-705, as last amended by Laws of Utah 1993, Chapter 38
29 76-9-105, as last amended by Laws of Utah 2002, Chapter 166
30 76-9-201, as last amended by Laws of Utah 2009, Chapter 326
31 76-9-202, as last amended by Laws of Utah 2002, Chapter 166
32
33 Be it enacted by the Legislature of the state of Utah:
34 Section 1. Section 76-6-702 is amended to read:
35 76-6-702. Definitions.
36 As used in this part:
37 (1) "Access" means to directly or indirectly use, attempt to use, instruct, communicate
38 with, cause input to, cause output from, or otherwise make use of any resources of a computer,
39 computer system, computer network, or any means of communication with any of them.
40 (2) "Authorization" means having the express or implied consent or permission of the
41 owner, or of the person authorized by the owner to give consent or permission to access a
42 computer, computer system, or computer network in a manner not exceeding the consent or
43 permission.
44 (3) "Computer" means any electronic device or communication facility that stores,
45 [
46 (4) "Computer system" means a set of related, connected or unconnected, devices,
47 software, or other related computer equipment.
48 (5) "Computer network" means:
49 (a) the interconnection of communication or telecommunication lines between:
50 (i) computers; or
51 (ii) computers and remote terminals; or
52 (b) the interconnection by wireless technology between:
53 (i) computers; or
54 (ii) computers and remote terminals.
55 (6) "Computer property" includes electronic impulses, electronically produced data,
56 information, financial instruments, software, or programs, in either machine or human readable
57 form, any other tangible or intangible item relating to a computer, computer system, computer
58 network, and copies of any of them.
59 (7) "Computer technology" includes:
60 (a) a computer;
61 (b) a computer network;
62 (c) computer hardware;
63 (d) a computer system;
64 (e) a computer program;
65 (f) computer services;
66 (g) computer software; or
67 (h) computer data.
68 [
69 security system that clearly evidences that the owner or custodian intends that it not be
70 available to others without the owner's or custodian's permission.
71 (9) "Critical infrastructure" includes:
72 (a) a communication or data system;
73 (b) a financial or banking system;
74 (c) any railroad, airline, airport, airway, highway, bridge, waterway, fixed guideway, or
75 other transportation system intended for the transportation of persons or property;
76 (d) any public utility service, including a power, energy, gas, or water supply system;
77 (e) a sewage or water treatment system;
78 (f) a health care facility, as that term is defined in Section 26-21-2;
79 (g) an emergency fire, medical, or law enforcement response system;
80 (h) a public health facility or system;
81 (i) a food distribution system;
82 (j) a government computer system or network;
83 (k) a school; or
84 (l) other government facilities, operations, or services.
85 (10) "Denial of service attack" means an attack or intrusion that is intended to disrupt
86 legitimate access to, or use of, a network resource, a machine, or computer technology.
87 [
88 deposit, letter of credit, bill of exchange, electronic fund transfer, automated clearing house
89 transaction, credit card, or marketable security.
90 [
91 (a) through use of:
92 (i) an electronic product identification or tracking system; or
93 (ii) other technology used by a retailer to identify, track, or price goods; and
94 (b) by a retailer through the use of equipment designed to read the electronic product
95 identification or tracking system data located within the retailer's location.
96 [
97 (a) licenses, certificates, and permits granted by governments;
98 (b) degrees, diplomas, and grades awarded by educational institutions;
99 (c) military ranks, grades, decorations, and awards;
100 (d) membership and standing in organizations and religious institutions;
101 (e) certification as a peace officer;
102 (f) credit reports; and
103 (g) another record or datum upon which a person may be reasonably expected to rely in
104 making decisions that will have a direct benefit or detriment to another.
105 [
106 computer property that has some form of access control technology implemented, such as
107 encryption, password protection, other forced authentication, or access control designed to keep
108 out unauthorized persons.
109 [
110 [
111 form acceptable to a computer, relating to the operations of the computer, or permitting the
112 functioning of a computer system in a manner designed to provide results including system
113 control programs, application programs, or copies of any of them.
114 Section 2. Section 76-6-703 is amended to read:
115 76-6-703. Computer crimes and penalties -- Interfering with critical
116 infrastructure.
117 [
118
119
120
121
122 (1) It is unlawful for a person to:
123 (a) without authorization, or in excess of the person's authorization, access or attempt
124 to access computer technology if the access or attempt to access results in:
125 (i) the alteration, damage, destruction, copying, transmission, discovery, or disclosure
126 of computer technology;
127 (ii) interference with or interruption of:
128 (A) the lawful use of computer technology; or
129 (B) the transmission of data;
130 (iii) physical damage to or loss of real, personal, or commercial property;
131 (iv) audio, video, or other surveillance of another person; or
132 (v) economic loss to any person or entity;
133 (b) after accessing computer technology that the person is authorized to access,
134 knowingly take or attempt to take unauthorized or unlawful action that results in:
135 (i) the alteration, damage, destruction, copying, transmission, discovery, or disclosure
136 of computer technology;
137 (ii) interference with or interruption of:
138 (A) the lawful use of computer technology; or
139 (B) the transmission of data;
140 (iii) physical damage to or loss of real, personal, or commercial property;
141 (iv) audio, video, or other surveillance of another person; or
142 (v) economic loss to any person or entity; or
143 (c) knowingly engage in a denial of service attack.
144 (2) A person who violates Subsection (1) is guilty of:
145 (a) a class B misdemeanor when:
146 (i) the economic loss or other loss or damage caused or the value of the money,
147 property, or benefit obtained or sought to be obtained is less than $500; or
148 (ii) the information obtained is not confidential;
149 (b) a class A misdemeanor when the economic loss or other loss or damage caused or
150 the value of the money, property, or benefit obtained or sought to be obtained is or exceeds
151 $500 but is less than $1,500;
152 (c) a third degree felony when the economic loss or other loss or damage caused or the
153 value of the money, property, or benefit obtained or sought to be obtained is or exceeds $1,500
154 but is less than $5,000;
155 (d) a second degree felony when the economic loss or other loss or damage caused or
156 the value of the money, property, or benefit obtained or sought to be obtained is or exceeds
157 $5,000; or
158 (e) a third degree felony when:
159 (i) the property or benefit obtained or sought to be obtained is a license or entitlement;
160 (ii) the damage is to the license or entitlement of another person; [
161 (iii) the information obtained is confidential; or
162 (iv) in gaining access the person breaches or breaks through a security system.
163 [
164 knowingly and without authorization gains or attempts to gain access to a computer, computer
165 network, computer property, or computer system under circumstances not otherwise
166 constituting an offense under this section is guilty of a class B misdemeanor.
167 (b) Notwithstanding Subsection [
168 identification or tracking system, or other technology, to identify, track, or price goods is not
169 guilty of a violation of Subsection [
170 product identification or tracking system data and used by the retailer to identify, track, or price
171 goods is located within the retailer's location.
172 [
173 computer network, computer property, or computer system, program, or software to devise or
174 execute any artifice or scheme to defraud or to obtain money, property, services, or other things
175 of value by false pretenses, promises, or representations, is guilty of an offense based on the
176 value of the money, property, services, or things of value, in the degree set forth in Subsection
177 76-10-1801(1).
178 [
179
180
181 (5) A person is guilty of a third degree felony if the person intentionally or knowingly,
182 and without lawful authorization, interferes with or interrupts critical infrastructure.
183 [
184 that a person obtained access or attempted to obtain access:
185 (a) in response to, and for the purpose of protecting against or investigating, a prior
186 attempted or successful breach of security of [
187
188 entitled to protect, and the access attempted or obtained was no greater than reasonably
189 necessary for that purpose[
190 (b) pursuant to a search warrant or a lawful exception to the requirement to obtain a
191 search warrant.
192 Section 3. Section 76-6-705 is amended to read:
193 76-6-705. Reporting violations.
194 [
195 (1) Each person who has reason to believe that the provisions of Section 76-6-703 are
196 being or have been violated shall report the suspected violation to:
197 (a) the attorney general, or county attorney, or, if within a prosecution district, the
198 district attorney of the county or prosecution district in which part or all of the violations
199 occurred[
200 (b) a state or local law enforcement agency.
201 (2) Subsection (1) does not apply to the extent that the person is prohibited from
202 reporting by a statutory or common law privilege.
203 Section 4. Section 76-9-105 is amended to read:
204 76-9-105. Making a false alarm -- Penalties.
205 (1) A person is guilty of making a false alarm if he initiates or circulates a report or
206 warning of any fire, impending bombing, or other crime or catastrophe, knowing that the report
207 or warning is false or baseless and is likely to cause evacuation of any building, place of
208 assembly, or facility of public transport, to cause public inconvenience or alarm or action of
209 any sort by any official or volunteer agency organized to deal with emergencies.
210 (2) (a) [
211 false alarm relating to a weapon of mass destruction as defined in Section 76-10-401 [
212
213 (b) A person is guilty of a third degree felony if:
214 (i) the person makes a false alarm alleging on ongoing act or event, or an imminent
215 threat; and
216 (ii) the false alarm causes or threatens to cause bodily harm, serious bodily injury, or
217 death to another person.
218 [
219 misdemeanor.
220 (3) In addition to any other penalty authorized by law, a court shall order any person
221 convicted of a felony violation of this section to reimburse any federal, state, or local unit of
222 government, or any private business, organization, individual, or entity for all expenses and
223 losses incurred in responding to the violation, unless the court states on the record the reasons
224 why the court finds the reimbursement would be inappropriate.
225 Section 5. Section 76-9-201 is amended to read:
226 76-9-201. Electronic communication harassment -- Definitions -- Penalties.
227 (1) As used in this section:
228 (a) "Adult" means a person 18 years of age or older.
229 (b) "Electronic communication" means any communication by electronic,
230 electro-mechanical, or electro-optical communication device for the transmission and reception
231 of audio, image, or text but does not include broadcast transmissions or similar
232 communications that are not targeted at any specific individual.
233 (c) "Electronic communication device" includes a telephone, a facsimile machine,
234 electronic mail, [
235 communicate electronically.
236 (d) "Minor" means a person who is younger than 18 years of age.
237 (e) "Personal identifying information" means the same as that term is defined in
238 Section 76-6-1102.
239 (2) A person is guilty of electronic communication harassment and subject to
240 prosecution in the jurisdiction where the communication originated or was received if with
241 intent to [
242 electronic communications of another, the person:
243 (a) (i) makes repeated contact by means of electronic communications, regardless of
244 whether [
245 (ii) after the recipient has requested or informed the person not to contact the recipient,
246 and the person repeatedly or continuously:
247 (A) contacts the electronic communication device of the recipient; or
248 (B) causes an electronic communication device of the recipient to ring or to receive
249 other notification of attempted contact by means of electronic communication;
250 (b) makes contact by means of electronic communication and insults, taunts, or
251 challenges the recipient of the communication or any person at the receiving location in a
252 manner likely to provoke a violent or disorderly response;
253 (c) makes contact by means of electronic communication and threatens to inflict injury,
254 physical harm, or damage to any person or the property of any person; [
255 (d) causes disruption, jamming, or overload of an electronic communication system
256 through excessive message traffic or other means utilizing an electronic communication
257 device[
258 (e) electronically publishes, posts, or otherwise discloses personal identifying
259 information of another person, in a public online site or forum, without that person's
260 permission.
261 (3) (a) (i) Electronic communication harassment committed against an adult is a class
262 B misdemeanor, except under Subsection (3)(a)(ii).
263 (ii) A second or subsequent offense under Subsection (3)(a)(i) is a:
264 (A) class A misdemeanor if all prior violations of this section were committed against
265 adults; and
266 (B) a third degree felony if any prior violation of this section was committed against a
267 minor.
268 (b) (i) Electronic communication harassment committed against a minor is a class A
269 misdemeanor, except under Subsection (3)(b)(ii).
270 (ii) A second or subsequent offense under Subsection (3)(b)(i) is a third degree felony,
271 regardless of whether any prior violation of this section was committed against a minor or an
272 adult.
273 (4) (a) Except under Subsection (4)(b), criminal prosecution under this section does not
274 affect an individual's right to bring a civil action for damages suffered as a result of the
275 commission of any of the offenses under this section.
276 (b) This section does not create any civil cause of action based on electronic
277 communications made for legitimate business purposes.
278 Section 6. Section 76-9-202 is amended to read:
279 76-9-202. Emergency reporting -- Interference -- False report.
280 (1) As used in this section:
281 (a) "Emergency" means a situation in which property or human life is in jeopardy and
282 the prompt summoning of aid is essential to the preservation of human life or property.
283 (b) "Party line" means a subscriber's line or telephone circuit [
284 (i) that consists of two or more connected main telephone stations [
285
286 (ii) where each telephone station has a distinctive ring or telephone number.
287 (2) A person is guilty of emergency reporting abuse if [
288 (a) intentionally refuses to yield or surrender the use of a party line or a public pay
289 telephone to another person upon being informed that the telephone is needed to report a fire or
290 summon police, medical, or other aid in case of emergency, unless the telephone is likewise
291 being used for an emergency call;
292 (b) asks for or requests the use of a party line or a public pay telephone on the pretext
293 that an emergency exists, knowing that no emergency exists; [
294 (c) reports an emergency or causes an emergency to be reported to any public, private,
295 or volunteer entity whose purpose is to respond to fire, police, or medical emergencies, when
296 the [
297 (d) makes a false report, or intentionally aids, abets, or causes a third party to make a
298 false report, to an emergency response service, including a law enforcement dispatcher or a 911
299 emergency response service, if the false report claims that:
300 (i) an ongoing emergency exists;
301 (ii) the emergency described in Subsection (2)(d)(i) currently involves, or involves an
302 imminent threat of, serious bodily injury, serious physical injury, or death; and
303 (iii) the emergency described in Subsection (2)(d)(i) is occurring at a specified
304 location.
305 (3) (a) A violation of Subsection (2)(a) or (b) is a class C misdemeanor.
306 (b) A violation of Subsection (2)(c) is a class B misdemeanor, except as provided
307 under Subsection (3)(c).
308 (c) A violation of Subsection (2)(c) is a second degree felony if the report is regarding a
309 weapon of mass destruction, as defined in Section 76-10-401.
310 (d) A violation of Subsection (2)(d):
311 (i) except as provided in Subsection (3)(d)(ii), is a third degree felony; or
312 (ii) is a second degree felony if, while acting in response to the report, the emergency
313 responders cause physical injury to a person at the location described in Subsection (2)(d)(iii).
314 (4) (a) In addition to any other penalty authorized by law, a court shall order any person
315 convicted of a violation of this section to reimburse:
316 (i) any federal, state, or local unit of government, or any private business, organization,
317 individual, or entity for all expenses and losses incurred in responding to the violation[
318
319 (ii) any person described in Subsection (3)(d)(ii) for the costs for the treatment of the
320 physical injury and any psychological injury caused by the offense.
321 (b) The court may order that the defendant pay less than the full amount of the costs
322 described in Subsection (4)(a) only if the court states on the record the reasons why the
323 reimbursement would be inappropriate.
Legislative Review Note
Office of Legislative Research and General Counsel