2012 -- H 7042 | |
======= | |
LC00125 | |
======= | |
STATE OF RHODE ISLAND | |
| |
IN GENERAL ASSEMBLY | |
| |
JANUARY SESSION, A.D. 2012 | |
| |
____________ | |
| |
A N A C T | |
RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME | |
|
      |
|
      |
     Introduced By: Representatives Martin, and DaSilva | |
     Date Introduced: January 05, 2012 | |
     Referred To: House Judiciary | |
It is enacted by the General Assembly as follows: | |
1-1 |
     SECTION 1. Section 11-52-4.2 of the General Laws in Chapter 11-52 entitled |
1-2 |
"Computer Crime" is hereby repealed. |
1-3 |
      |
1-4 |
      |
1-5 |
|
1-6 |
|
1-7 |
|
1-8 |
|
1-9 |
|
1-10 |
|
1-11 |
|
1-12 |
|
1-13 |
|
1-14 |
      |
1-15 |
|
1-16 |
|
1-17 |
     SECTION 2. Chapter 11-9 of the General Laws entitled "Children" is hereby amended |
1-18 |
by adding thereto the following section: |
2-19 |
     11-9-1.5. Electronically Disseminating Indecent Material to Minors Prohibited. - (a) |
2-20 |
Definitions. As used in this section: |
2-21 |
     (1) “Minor” means any person not having reached eighteen (18) years of age. |
2-22 |
     (2) “Computer” has the meaning given to that term in section 11-52-1. |
2-23 |
     (3) “Telecommunication device” means an analog or digital electronic device that |
2-24 |
processes data, telephony, video, or sound transmission as part of any system involved in the |
2-25 |
sending and/or receiving at a distance of voice, sound, data, and/or video transmissions. |
2-26 |
     (4) “Indecent visual depiction” means any digital image or digital video depicting one or |
2-27 |
more persons engaging in sexually explicit conduct, and includes; (i) Data stored on any |
2-28 |
computer, telecommunication device, or other electronic storage media that is capable of |
2-29 |
conversion into a visual image; or (ii) Digital video depicting sexually explicit conduct |
2-30 |
transmitted live over a computer online service, Internet service, or local electronic bulletin board |
2-31 |
service. |
2-32 |
     (5) “Sexually explicit conduct” means actual: |
2-33 |
     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or |
2-34 |
oral-anal, or lascivious sexual intercourse where the genitals or pubic area of any person is |
2-35 |
exhibited; |
2-36 |
     (ii) Bestiality; |
2-37 |
     (iii) Masturbation; |
2-38 |
     (iv) Sadistic or masochistic abuse; or |
2-39 |
     (v) Graphic or lascivious exhibition of the genitals or pubic area of any person. |
2-40 |
     (b) No person shall knowingly and intentionally use a computer or telecommunication |
2-41 |
device to transmit an indecent visual depiction to a person he or she knows is, or believes to be, a |
2-42 |
minor. |
2-43 |
     (c) No minor shall be charged under this section if his or her conduct falls within the |
2-44 |
provisions of section 11-9-1.4, “Minor Electronically Disseminating Indecent Material to Another |
2-45 |
Person – “Sexting” Prohibited.” |
2-46 |
     (d) The fact that an undercover operative or law enforcement officer was involved in the |
2-47 |
detection and investigation of an offense under this section shall not constitute a defense to a |
2-48 |
prosecution under this section. |
2-49 |
     (e) Whoever violates the provisions of this section shall be subject to the sex offender |
2-50 |
registration requirements set forth in section 11-37.1-1 et seq., entitled “Sexual Offender |
2-51 |
Registration and Community Notification Act.”. |
2-52 |
     (f) Whoever violates the provisions of this section shall be guilty of a felony and may be |
2-53 |
imprisoned for not more than five (5) years or fined not more than five thousand dollars ($5,000), |
3-1 |
or both. |
3-2 |
     SECTION 3. Chapter 11-52 of the General Laws entitled “Computer Crime” is hereby |
3-3 |
amended by adding thereto the following sections: |
3-4 |
     11-52-3.1. Unauthorized access to confidential information. – (a) Whoever |
3-5 |
intentionally, without authorization or in excess of one’s authorization, directly or indirectly |
3-6 |
accesses a protected computer, computer program, computer system, or computer network, with |
3-7 |
the intent to either view, obtain, copy, or download any confidential information contained in or |
3-8 |
stored on such computer, computer program, computer system, or computer network, shall be |
3-9 |
guilty of a felony and shall be subject to the penalties set forth in section 11-52-5. |
3-10 |
     (b) Nothing in this section shall apply to any monitoring of, or interaction with, a |
3-11 |
subscriber’s Internet or other network connection or service, or a protected computer, by a |
3-12 |
telecommunications carrier, cable operator, computer hardware or software provider, or provider |
3-13 |
of information service or interactive computer service for network or computer security purposes, |
3-14 |
diagnostics, technical support, repair, advertising, authorized updates of software or system |
3-15 |
firmware, authorized remove system management, providing, operating, or improving a service |
3-16 |
used, requested, or authorized by an individual, or detection or prevention of the unauthorized use |
3-17 |
of or fraudulent or other illegal activities in connection with a network, service, or computer |
3-18 |
software. |
3-19 |
     11-52-4.4. Cyberstalking and cyberharassment prohibited. – (a) Definitions. As used |
3-20 |
in this section: |
3-21 |
     (1) “Conduct” means either: (i) A single act which causes a person to be repeatedly |
3-22 |
contacted by others in a manner which seriously alarms, annoys, or bothers the person; or (ii) |
3-23 |
Two (2) or more acts over a period of time, evidencing a continuity of purpose, which seriously |
3-24 |
alarms, annoys, or bothers the person. |
3-25 |
     (2) “Immediate family” means a spouse, parent, child, or sibling. The term also includes |
3-26 |
any other individual who regularly resides in the household or who within the prior six (6) |
3-27 |
months regularly resided in the household. |
3-28 |
     (3) “Harass” means to engage in intentional conduct that serves no legitimate purpose |
3-29 |
that would cause a reasonable person to suffer substantial emotional distress, or be in fear of |
3-30 |
bodily injury. The term does not include constitutionally protected activity. |
3-31 |
     (4) “Computer” has the meaning given to that term in section 11-52-1. |
3-32 |
     (5) “Telecommunication device” means an analog or digital electronic device that |
3-33 |
processes data, telephony, video, or sound transmission as part of any system involved in the |
3-34 |
sending and/or receiving at a distance of voice, sound, data, and/or video transmissions. |
4-1 |
     (b) Whoever, by computer or telecommunication device, harasses another person or |
4-2 |
causes any person to be contacted for the purpose of harassing that person or his or her immediate |
4-3 |
family is guilty of a misdemeanor, and may be subject to imprisonment for not more than one |
4-4 |
year or fined not more than five hundred dollars ($500), or both. |
4-5 |
     (c) A second or subsequent conviction under subsection (b) of this section shall be |
4-6 |
deemed a felony, subject to imprisonment for not more than two (2) years or a fine of not more |
4-7 |
than six thousand dollars ($6,000), or both. |
4-8 |
     (d) If a person accused under this section claims to have been engaged in constitutionally |
4-9 |
protected activity, the court shall determine the validity of the claim as a matter of law and, if |
4-10 |
found valid, shall exclude evidence of the activity. |
4-11 |
     11-52-7.1 Offense of Online Impersonation. – (a) Definitions. As used in this section: |
4-12 |
     (1) “Commercial social networking site” means a business, organization or other similar |
4-13 |
entity that operates a website and permits persons to become registered users for the purpose of |
4-14 |
establishing personal relationships with other users through direct or real-time communication |
4-15 |
with other users or the creation of web pages or profiles available to the public or to other users. |
4-16 |
     (2) “Electronic mail” means an electronic mail message sent through the use of an |
4-17 |
electronic mail program or a message board program. |
4-18 |
     (3) “Identifying information” means information that alone or in conjunction with other |
4-19 |
information identifies a person, including a person's: |
4-20 |
     (i) Name, social security number, date of birth, or government-issued identification |
4-21 |
number; |
4-22 |
     (ii) Unique biometric data, including the person's fingerprint, voice print or retina or iris |
4-23 |
image; |
4-24 |
     (iii) Unique electronic identification number, electronic mail address, routing code or |
4-25 |
financial institution account number; and |
4-26 |
     (iv) Telecommunication identifying information or access device. |
4-27 |
     (4) “Public official” means a person elected by the public or elected or appointed by a |
4-28 |
governmental body or an appointed official in the executive, legislative, or judicial branch of the |
4-29 |
state or any political subdivision thereof. |
4-30 |
     (b) A person commits the crime of online impersonation if the person: |
4-31 |
     (1) Uses the name or persona of another person to create a web page on or to post one or |
4-32 |
more messages on a commercial social networking site or sends an electronic mail, instant |
4-33 |
message, text message or similar communication without obtaining the other person's consent and |
4-34 |
with the intent to harm, defraud, intimidate or threaten any person; |
5-1 |
     (2) Sends an electronic mail, instant message, text message or similar communication that |
5-2 |
references a name, domain address, telephone number or other item of identifying information |
5-3 |
belonging to any person without obtaining the other person's consent, with the intent to cause a |
5-4 |
recipient of the communication to reasonably believe that the other person authorized or |
5-5 |
transmitted the communication and with the intent to harm or defraud any person; or |
5-6 |
     (3) Uses the name or persona of a public official to create a web page on or to post one or |
5-7 |
more messages on a commercial social networking site or sends an electronic mail, instant |
5-8 |
message, text message or similar communication without obtaining the public official's consent |
5-9 |
and with the intent to induce another to submit to such pretended official authority, to solicit |
5-10 |
funds or otherwise to act in reliance upon that pretense to the other person's detriment. |
5-11 |
     (c) Whoever violates this section shall be guilty of a felony and subject to imprisonment |
5-12 |
for not more than three (3) years, or fined not more than two thousand dollars ($2,000), or both. |
5-13 |
     SECTION 4. Section 11-52-1 of the General Laws in Chapter 11-52 entitled “Computer |
5-14 |
Crime” is hereby amended to read as follows: |
5-15 |
     11-52-1. Definitions. - As used in this chapter: |
5-16 |
     (1) "Access" means to approach, instruct, communicate with, store data in, enter data in, |
5-17 |
retrieve data from, or otherwise make use of any resources of, a computer, computer system, or |
5-18 |
computer network. |
5-19 |
     (2) "Computer" means an electronic, magnetic, optical, hydraulic or organic device or |
5-20 |
group of devices which, pursuant to a computer program, to human instruction, or to permanent |
5-21 |
instructions contained in the device or group of devices, can automatically perform computer |
5-22 |
operations with or on computer data and can communicate the results to another computer or to a |
5-23 |
person. The term "computer" includes any connected or directly related device, equipment, or |
5-24 |
facility which enables the computer to store, retrieve or communicate computer programs, |
5-25 |
computer data or the results of computer operations to or from a person, another computer or |
5-26 |
another device. |
5-27 |
     (3) "Computer data" means any representation of information, knowledge, facts, |
5-28 |
concepts, or instructions which is being prepared or has been prepared and is intended to be |
5-29 |
processed, is being processed, or has been processed in a computer or computer network. |
5-30 |
"Computer data" may be in any form, whether readable only by a computer or only by a human |
5-31 |
or by either, including, but not limited to, computer printouts, magnetic storage media, punched |
5-32 |
cards, or data stored internally in the memory of the computer. |
5-33 |
     (4) "Computer network" means a set of related, remotely connected devices, and any |
5-34 |
communications facilities including more than one computer with the capability to transmit data |
6-1 |
among them through the communications facilities. |
6-2 |
     (5) "Computer operation" means arithmetic, logical, monitoring, storage or retrieval |
6-3 |
functions and any combination of them, and includes, but is not limited to, communication with, |
6-4 |
storage of data to, or retrieval of data from any device or human hand manipulation of electronic |
6-5 |
or magnetic impulses. A "computer operation" for a particular computer may also be any function |
6-6 |
for which that computer was generally designed. |
6-7 |
     (6) "Computer program" means a series of instructions or statements or related data that, |
6-8 |
in actual or modified form, is capable of causing a computer or a computer system to perform |
6-9 |
specified functions in a form acceptable to a computer, which permits the functioning of a |
6-10 |
computer system in a manner designed to provide appropriate products from the computer |
6-11 |
systems. |
6-12 |
     (7) "Computer services" includes computer time or services, data processing services, |
6-13 |
Internet service providers' networks and facilities located in the state or information or data stored |
6-14 |
in connection with them. |
6-15 |
     (8) "Computer software" means a set of computer programs, procedures, and associated |
6-16 |
documentation concerned with the operation of a computer, computer program or computer |
6-17 |
network. |
6-18 |
     (9) "Computer system" means a set of related, connected or unconnected, computer |
6-19 |
equipment, devices, and software. |
6-20 |
     (10) “Confidential Information” means data that is protected from disclosure on the |
6-21 |
protected computer, computer program, computer system or computer network and that the |
6-22 |
computer, computer program, computer system or computer network does not transmit or |
6-23 |
disclose unless initiated by the owner of such protected computer, computer program, computer |
6-24 |
system or computer network. |
6-25 |
      |
6-26 |
instructions which are being prepared or have been prepared and are intended to be entered, |
6-27 |
processed, or stored, are being entered, processed, or stored or have been entered, processed, or |
6-28 |
stored in a computer, computer system, or computer network. |
6-29 |
      |
6-30 |
to do business in the state of Rhode Island that provides registered users the ability to send or |
6-31 |
receive electronic mail through equipment located in this state and that is an intermediary in |
6-32 |
sending or receiving electronic mail. |
6-33 |
      |
6-34 |
money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card |
7-1 |
transaction authorization mechanism, marketable security, or any computerized representation of |
7-2 |
any of these. |
7-3 |
      |
7-4 |
owner, lessee, or licensee of computer data, computer programs, or computer software. |
7-5 |
      |
7-6 |
joint venture. |
7-7 |
      |
7-8 |
     (i) Real property; |
7-9 |
     (ii) Computers and computer networks; |
7-10 |
     (iii) Financial instruments, computer data, computer programs, computer software and all |
7-11 |
other personal property regardless of whether they are: |
7-12 |
     (A) Tangible or intangible; |
7-13 |
     (B) In a format readable by humans or by a computer; |
7-14 |
     (C) In transit between computers or within a computer network or between any devices |
7-15 |
which comprise a computer; or |
7-16 |
     (D) Located on any paper or in any device on which it is stored by a computer or by a |
7-17 |
human; and |
7-18 |
     (E) Computer services. |
7-19 |
     (iv) A person "uses" a computer or computer network when he or she: |
7-20 |
     (A) Attempts to cause or causes a computer or computer network to perform or to stop |
7-21 |
performing computer operations; |
7-22 |
     (B) Attempts to cause or causes the withholding or denial of the use of a computer, |
7-23 |
computer network, computer program, computer data or computer software to another user; or |
7-24 |
     (C) Attempts to cause or causes another person to put false information into a computer. |
7-25 |
     (v) A person is "without authority" when: (A) he or she has no right or permission of the |
7-26 |
owner to use a computer, or, he or she uses a computer in a manner exceeding his or her right or |
7-27 |
permission or (B) he or she uses an Internet service e-mail system offered by a Rhode Island |
7-28 |
based Internet service provider in contravention of the authority granted by or in violation of the |
7-29 |
policies set by the Internet service provider. |
7-30 |
     (vi) Transmission of electronic mail from an organization to its members shall not be |
7-31 |
deemed to be unsolicited bulk electronic mail. |
7-32 |
      |
7-33 |
storage functions. |
8-34 |
     (18) “Social Network Site” means (i) A service accessible on a world wide web domain |
8-35 |
whose primary purpose is to facilitate online social interaction among groups of members for |
8-36 |
primarily social purposes, and which integrates the following features within the unique profile |
8-37 |
web pages of is registered members: |
8-38 |
     (A) The ability of members, including minors, to post a name or nickname in |
8-39 |
combination with, photographs, multimedia and other personal information about the member on |
8-40 |
the profile web page; |
8-41 |
     (B) The ability for members, including minors, to establish interactive links from their |
8-42 |
profile web pages to one or more profile web pages of other members of the same social |
8-43 |
networking service; |
8-44 |
     (C) The ability for members of, or visitors to, the social networking service to leave |
8-45 |
messages or comments on a member’s profile web page that are visible to all or some visitors to |
8-46 |
that page; |
8-47 |
     (D) The ability of members of, or visitors to, the social networking service to search for |
8-48 |
members according to their age, gender, location, or interests in combination with age; and |
8-49 |
     (E) The ability of members to communicate through an embedded electronic mail feature. |
8-50 |
     (ii) A social networking site does not include: |
8-51 |
     (A) Discrete email, instant message, chat room, message board or other communication |
8-52 |
functionalities; or |
8-53 |
     (B) A service whose primary purpose is the facilitation of commercial transactions |
8-54 |
between its members or visitors. |
8-55 |
      |
8-56 |
of every electronic entry put into a computer, computer system, or computer network. |
8-57 |
     SECTION 5. Section 11-64-1 of the General Laws in Chapter 11-64 entitled "Electronic |
8-58 |
Imaging Devices" is hereby amended to read as follows: |
8-59 |
     11-64-1. Definitions. - |
8-60 |
      (1) For the purposes of this section the following definitions apply: |
8-61 |
     (a) "Disseminate" means to make available by any means to any person. |
8-62 |
     (b) "Imaging Device" means any electronic instrument capable of capturing, recording, |
8-63 |
storing or transmitting visual images. |
8-64 |
     (c) "Intimate areas" means the naked or undergarment clad genitals, pubic area, buttocks, |
8-65 |
or any portion of the female breast below the top of the areola of a person which the person |
8-66 |
intended to be protected from public view. |
8-67 |
     (d) "Legal entity" means any partnership, firm, association, corporation or any agent or |
8-68 |
servant thereof. |
9-1 |
     (e) "Publish" means to: |
9-2 |
     (i) Disseminate with the intent that such image or images be made available by any |
9-3 |
means to any person or other legal entity; |
9-4 |
     (ii) Disseminate with the intent such images be sold by another person or legal entity; |
9-5 |
     (iii) Post, present, display, exhibit, circulate, advertise or allow access by any means, so |
9-6 |
as to make an image or images available to the public; or |
9-7 |
     (iv) Disseminate with the intent that an image or images be posted, presented, displayed, |
9-8 |
exhibited, circulated, advertised or made accessible by any means, and to make such images |
9-9 |
available to the public. |
9-10 |
     (f) "Sell" means to disseminate to another person, or to publish, in exchange for |
9-11 |
something of value. |
9-12 |
     (g) “Sexually explicit conduct” means actual: |
9-13 |
     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or |
9-14 |
oral-anal, or lascivious sexual intercourse where the genitals, or pubic area of any person is |
9-15 |
exhibited; |
9-16 |
     (ii) Bestiality; |
9-17 |
     (iii) Masturbation; or |
9-18 |
     (iv) Sadistic or masochistic abuse. |
9-19 |
     SECTION 6. Chapter 11-64 of the General Laws entitled “Electronic Imaging Devices” |
9-20 |
is hereby amended by adding thereto the following section: |
9-21 |
     11-64-3. Unauthorized Dissemination of Indecent Material. – (a) A person is guilty of |
9-22 |
unauthorized dissemination of indecent material when such person uses an imaging device to |
9-23 |
capture, record, or store visual images of another person eighteen (18) years of age or older |
9-24 |
engaged in sexually explicit conduct or of the intimate areas of another person, with or without |
9-25 |
that other person's knowledge and consent, under circumstances in which that other person would |
9-26 |
have a reasonable expectation of privacy, and, thereafter, without the consent of the person or all |
9-27 |
persons depicted in the visual image, intentionally disseminates, publishes, or sells such visual |
9-28 |
image or images. |
9-29 |
     (b) Constitutionally protected activity is not subject to the provisions of this section. |
9-30 |
     (c) Whoever violates this section shall not be subject to sex offender registration |
9-31 |
requirements set forth in section 11-37.1-1 et seq., entitled “Sexual Offender Registration and |
9-32 |
Community Notification Act.” |
9-33 |
     (d) Whoever violates this section shall be subject to imprisonment for not more than three |
9-34 |
(3) years or fined not more than five thousand dollars ($5000), or both. |
10-1 |
     SECTION 7. Section 11-37.1-2 of the General Laws in Chapter 11-37.1 entitled “Sexual |
10-2 |
Offender Registration and Community Notification” is hereby amended to read as follows: |
10-3 |
     11-37.1-2. Definitions. -- (a) "Aggravated offense" means and includes offenses |
10-4 |
involving sexual penetration of victims of any age through the use of force or the threat of use of |
10-5 |
force or offenses involving sexual penetration of victims who are fourteen (14) years of age or |
10-6 |
under. |
10-7 |
      (b) "Board", "board of review", or "sex offender board of review" means the sex |
10-8 |
offender board of review appointed by governor pursuant to section 11-37.1-6. |
10-9 |
      (c) (1) "Conviction" or "convicted" means and includes any instance where: |
10-10 |
      (i) A judgment of conviction has been entered against any person for any offense |
10-11 |
specified in subsection (e) or (k) of this section, regardless of whether an appeal is pending; or |
10-12 |
      (ii) There has been a finding of guilty for any offense specified in subsection (e) or (k) of |
10-13 |
this section, regardless of whether an appeal is pending; or |
10-14 |
      (iii) There has been a plea of guilty or nolo contendere for any offense specified in |
10-15 |
subsection (e) or (k) of this section, regardless of whether an appeal is pending; or |
10-16 |
      (iv) There has been an admission of sufficient facts or a finding of delinquency for any |
10-17 |
offense specified in subsection (e) or (k) of this section, regardless of whether or not an appeal is |
10-18 |
pending. |
10-19 |
      (2) Provided, in the event that a conviction, as defined in this subsection, has been |
10-20 |
overturned, reversed, or otherwise vacated, the person who was the subject of the conviction shall |
10-21 |
no longer be required to register as required by this chapter and any records of a registration shall |
10-22 |
be destroyed. Provided, further that nothing in this section shall be construed to eliminate a |
10-23 |
registration requirement of a person who is again convicted of an offense for which registration is |
10-24 |
required by this chapter. |
10-25 |
      (d) [Deleted by P.L. 2003, ch. 162, section 1 and by P.L. 2003, ch. 170, section]. |
10-26 |
      (e) "Criminal offense against a victim who is a minor" means and includes any of the |
10-27 |
following offenses or any offense in another jurisdiction which is substantially the equivalent of |
10-28 |
the following or for which the person is or would be required to register under 42 U.S.C. section |
10-29 |
14071 or 18 U.S.C. section 4042(c): |
10-30 |
      (1) Kidnapping or false imprisonment of a minor, in violation of section 11-26-1.4, 11- |
10-31 |
26-1 or 11-26-2, where the victim of the offense is sixteen (16) years of age or older and under |
10-32 |
the age of eighteen (18) years; |
10-33 |
      (2) Enticement of a child in violation of section 11-26-1.5 with the intent to violate |
10-34 |
sections 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3; |
11-1 |
      (3) Any violation of section 11-37-6, 11-37-8, 11-37-8.1, or 11-37-8.3; |
11-2 |
      (4) Any violation of section 11-1-10, where the underlying offense is a violation of |
11-3 |
chapter 34 of this title and the victim or person solicited to commit the offense is under the age of |
11-4 |
eighteen (18) years; |
11-5 |
      (5) Any violation of section 11-9-1(b) or (c); or |
11-6 |
      (6) Any violation of section 11-9-1.3 and/or section 11-9-1.5; |
11-7 |
      (7) Any violation of section 11-37.1-10; |
11-8 |
      (8) Any violation of section 11-37-8.8; |
11-9 |
      (9) Any violation of section 11-64-2 where the victim is under the age of eighteen (18) |
11-10 |
years; or |
11-11 |
      (10) Murder in violation of section 11-23-1 where the murder was committed in the |
11-12 |
perpetration of, or attempted perpetration of, kidnapping and where the victim of the offense is |
11-13 |
under eighteen (18) years of age. |
11-14 |
      (f) "Designated state law enforcement agency" means the attorney general or his or her |
11-15 |
designee. |
11-16 |
      (g) "Employed, carries on a vocation" means and includes the definition of "employed, |
11-17 |
carries on a vocation" under 42 U.S.C. section 14071. |
11-18 |
      (h) "Institutions of higher education" means any university, two (2) or four (4) year |
11-19 |
college or community college. |
11-20 |
      (i) "Mental abnormality" means a congenital or acquired condition of a person that |
11-21 |
affects the emotional or volitional capacity of the person in a manner that predisposes that person |
11-22 |
to the commission of criminal sexual acts to a degree that makes the person a menace to the |
11-23 |
health and safety of other persons. |
11-24 |
      (j) "Predator" means a person whose act(s) is (are) or was (were) directed at a stranger, |
11-25 |
or at a person with whom a relationship has been established or promoted for the primary purpose |
11-26 |
of victimization. |
11-27 |
      (k) "Sexually violent offense" means and includes any violation of section 11-37-2, 11- |
11-28 |
37-4, 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3, or 11-5-1 where the specified felony is sexual |
11-29 |
assault, or section 11-23-1 where the murder was committed in the perpetration of, or attempted |
11-30 |
perpetration of, rape or any degree of sexual assault or child molestation, or any offense in |
11-31 |
another jurisdiction which is substantially the equivalent of any offense listed in this subsection or |
11-32 |
for which the person is or would be required to register under 42 U.S.C. section 14071 or 18 |
11-33 |
U.S.C. section 4042(c). |
12-34 |
      (l) "Sexually violent predator" means a person who has been convicted of a sexually |
12-35 |
violent offense and who has a mental abnormality or personality disorder that makes the person |
12-36 |
likely to engage in predatory sexually violent offenses. |
12-37 |
      (m) "Student" means and includes the definition of "student" under 42 U.S.C. section |
12-38 |
14071. |
12-39 |
      (n) "Parole board" means the parole board or its designee. |
12-40 |
     SECTION 8. Nothing in this act may be construed to provide a basis for a private right |
12-41 |
of action against an interactive computer service, as defined in 47 U.S.C. § 230, or a |
12-42 |
telecommunications carrier as used by another person to violate this act, for content provided by |
12-43 |
such person or by another information content provider. |
12-44 |
     SECTION 9. This act shall take effect upon passage. |
      | |
      | |
======= | |
LC00125 | |
======= | |
EXPLANATION | |
BY THE LEGISLATIVE COUNCIL | |
OF | |
A N A C T | |
RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME | |
*** | |
13-1 |
     This act would amend various chapters and provisions of the general laws to create to |
13-2 |
additional offenses relating to Internet activity. |
13-3 |
     This act would take effect upon passage. |
      | |
======= | |
LC00125 | |
======= |