2013 -- H 5570 | |
======= | |
LC00965 | |
======= | |
STATE OF RHODE ISLAND | |
| |
IN GENERAL ASSEMBLY | |
| |
JANUARY SESSION, A.D. 2013 | |
| |
____________ | |
| |
A N A C T | |
RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME | |
|
      |
|
      |
     Introduced By: Representatives Martin, Abney, O`Neill, Craven, and Mattiello | |
     Date Introduced: February 14, 2013 | |
     Referred To: House Judiciary | |
It is enacted by the General Assembly as follows: | |
1-1 |
     SECTION 1. Section 11-52-4.2 of the General Laws in Chapter 11-52 entitled "Computer |
1-2 |
Crime" is hereby repealed. |
1-3 |
      |
1-4 |
|
1-5 |
|
1-6 |
|
1-7 |
|
1-8 |
|
1-9 |
|
1-10 |
|
1-11 |
|
1-12 |
|
1-13 |
|
1-14 |
      |
1-15 |
|
1-16 |
|
1-17 |
     SECTION 2. Section 11-37.1-2 of the General Laws in Chapter 11-37.1 entitled "Sexual |
1-18 |
Offender Registration and Community Notification" is hereby amended to read as follows: |
1-19 |
     11-37.1-2. Definitions. -- (a) "Aggravated offense" means and includes offenses |
1-20 |
involving sexual penetration of victims of any age through the use of force or the threat of use of |
2-1 |
force or offenses involving sexual penetration of victims who are fourteen (14) years of age or |
2-2 |
under. |
2-3 |
      (b) "Board", "board of review", or "sex offender board of review" means the sex |
2-4 |
offender board of review appointed by governor pursuant to section 11-37.1-6. |
2-5 |
      (c) (1) "Conviction" or "convicted" means and includes any instance where: |
2-6 |
      (i) A judgment of conviction has been entered against any person for any offense |
2-7 |
specified in subsection (e) or (k) of this section, regardless of whether an appeal is pending; or |
2-8 |
      (ii) There has been a finding of guilty for any offense specified in subsection (e) or (k) of |
2-9 |
this section, regardless of whether an appeal is pending; or |
2-10 |
      (iii) There has been a plea of guilty or nolo contendere for any offense specified in |
2-11 |
subsection (e) or (k) of this section, regardless of whether an appeal is pending; or |
2-12 |
      (iv) There has been an admission of sufficient facts or a finding of delinquency for any |
2-13 |
offense specified in subsection (e) or (k) of this section, regardless of whether or not an appeal is |
2-14 |
pending. |
2-15 |
      (2) Provided, in the event that a conviction, as defined in this subsection, has been |
2-16 |
overturned, reversed, or otherwise vacated, the person who was the subject of the conviction shall |
2-17 |
no longer be required to register as required by this chapter and any records of a registration shall |
2-18 |
be destroyed. Provided, further that nothing in this section shall be construed to eliminate a |
2-19 |
registration requirement of a person who is again convicted of an offense for which registration is |
2-20 |
required by this chapter. |
2-21 |
      (d) [Deleted by P.L. 2003, ch. 162, section 1 and by P.L. 2003, ch. 170, section 1]. |
2-22 |
      (e) "Criminal offense against a victim who is a minor" means and includes any of the |
2-23 |
following offenses or any offense in another jurisdiction which is substantially the equivalent of |
2-24 |
the following or for which the person is or would be required to register under 42 U.S.C. section |
2-25 |
14071 or 18 U.S.C. section 4042(c): |
2-26 |
      (1) Kidnapping or false imprisonment of a minor, in violation of section 11-26-1.4, 11- |
2-27 |
26-1 or 11-26-2, where the victim of the offense is sixteen (16) years of age or older and under |
2-28 |
the age of eighteen (18) years; |
2-29 |
      (2) Enticement of a child in violation of section 11-26-1.5 with the intent to violate |
2-30 |
sections 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3; |
2-31 |
      (3) Any violation of section 11-37-6, 11-37-8, 11-37-8.1, or 11-37-8.3; |
2-32 |
      (4) Any violation of section 11-1-10, where the underlying offense is a violation of |
2-33 |
chapter 34 of this title and the victim or person solicited to commit the offense is under the age of |
2-34 |
eighteen (18) years; |
3-1 |
      (5) Any violation of section 11-9-1(b) or (c); or |
3-2 |
      (6) Any violation of section 11-9-1.3; |
3-3 |
      (7) Any violation of section 11-9-1.5; |
3-4 |
      |
3-5 |
      |
3-6 |
      |
3-7 |
(18) years; or |
3-8 |
      |
3-9 |
perpetration of, or attempted perpetration of, kidnapping and where the victim of the offense is |
3-10 |
under eighteen (18) years of age. |
3-11 |
      (f) "Designated state law enforcement agency" means the attorney general or his or her |
3-12 |
designee. |
3-13 |
      (g) "Employed, carries on a vocation" means and includes the definition of "employed, |
3-14 |
carries on a vocation" under 42 U.S.C. section 14071. |
3-15 |
      (h) "Institutions of higher education" means any university, two (2) or four (4) year |
3-16 |
college or community college. |
3-17 |
      (i) "Mental abnormality" means a congenital or acquired condition of a person that |
3-18 |
affects the emotional or volitional capacity of the person in a manner that predisposes that person |
3-19 |
to the commission of criminal sexual acts to a degree that makes the person a menace to the |
3-20 |
health and safety of other persons. |
3-21 |
      (j) "Predator" means a person whose act(s) is (are) or was (were) directed at a stranger, |
3-22 |
or at a person with whom a relationship has been established or promoted for the primary purpose |
3-23 |
of victimization. |
3-24 |
      (k) "Sexually violent offense" means and includes any violation of section 11-37-2, 11- |
3-25 |
37-4, 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3, or 11-5-1 where the specified felony is sexual |
3-26 |
assault, or section 11-23-1 where the murder was committed in the perpetration of, or attempted |
3-27 |
perpetration of, rape or any degree of sexual assault or child molestation, or any offense in |
3-28 |
another jurisdiction which is substantially the equivalent of any offense listed in this subsection or |
3-29 |
for which the person is or would be required to register under 42 U.S.C. section 14071 or 18 |
3-30 |
U.S.C. section 4042(c). |
3-31 |
      (l) "Sexually violent predator" means a person who has been convicted of a sexually |
3-32 |
violent offense and who has a mental abnormality or personality disorder that makes the person |
3-33 |
likely to engage in predatory sexually violent offenses. |
4-34 |
      (m) "Student" means and includes the definition of "student" under 42 U.S.C. section |
4-35 |
14071. |
4-36 |
      (n) "Parole board" means the parole board or its designee. |
4-37 |
     SECTION 3. Section 11-52-1 of the General Laws in Chapter 11-52 entitled "Computer |
4-38 |
Crime" is hereby amended to read as follows: |
4-39 |
     11-52-1. Definitions. -- As used in this chapter: |
4-40 |
      (1) "Access" means to approach, instruct, communicate with, store data in, enter data in, |
4-41 |
retrieve data from, or otherwise make use of any resources of, a computer, computer system, or |
4-42 |
computer network. |
4-43 |
      (2) "Computer" means an electronic, magnetic, optical, hydraulic or organic device or |
4-44 |
group of devices which, pursuant to a computer program, to human instruction, or to permanent |
4-45 |
instructions contained in the device or group of devices, can automatically perform computer |
4-46 |
operations with or on computer data and can communicate the results to another computer or to a |
4-47 |
person. The term "computer" includes any connected or directly related device, equipment, or |
4-48 |
facility which enables the computer to store, retrieve or communicate computer programs, |
4-49 |
computer data or the results of computer operations to or from a person, another computer or |
4-50 |
another device. |
4-51 |
      (3) "Computer data" means any representation of information, knowledge, facts, |
4-52 |
concepts, or instructions which is being prepared or has been prepared and is intended to be |
4-53 |
processed, is being processed, or has been processed in a computer or computer network. |
4-54 |
"Computer data" may be in any form, whether readable only by a computer or only by a human |
4-55 |
or by either, including, but not limited to, computer printouts, magnetic storage media, punched |
4-56 |
cards, or data stored internally in the memory of the computer. |
4-57 |
      (4) "Computer network" means a set of related, remotely connected devices and any |
4-58 |
communications facilities including more than one computer with the capability to transmit data |
4-59 |
among them through the communications facilities. |
4-60 |
      (5) "Computer operation" means arithmetic, logical, monitoring, storage or retrieval |
4-61 |
functions and any combination of them, and includes, but is not limited to, communication with, |
4-62 |
storage of data to, or retrieval of data from any device or human hand manipulation of electronic |
4-63 |
or magnetic impulses. A "computer operation" for a particular computer may also be any function |
4-64 |
for which that computer was generally designed. |
4-65 |
      (6) "Computer program" means a series of instructions or statements or related data that, |
4-66 |
in actual or modified form, is capable of causing a computer or a computer system to perform |
4-67 |
specified functions in a form acceptable to a computer, which permits the functioning of a |
4-68 |
computer system in a manner designed to provide appropriate products from the computer |
5-1 |
systems. |
5-2 |
      (7) "Computer services" includes computer time or services, data processing services, |
5-3 |
Internet service providers' networks and facilities located in the state or information or data stored |
5-4 |
in connection with them. |
5-5 |
      (8) "Computer software" means a set of computer programs, procedures, and associated |
5-6 |
documentation concerned with the operation of a computer, computer program or computer |
5-7 |
network. |
5-8 |
      (9) "Computer system" means a set of related, connected or unconnected, computer |
5-9 |
equipment, devices, and software. |
5-10 |
     (10) "Confidential information" means data that is protected from disclosure on the |
5-11 |
protected computer, computer program, computer system or computer network and that the |
5-12 |
computer, computer program, computer system or computer network does not transmit or |
5-13 |
disclose unless initiated by the owner of such protected computer, computer program, computer |
5-14 |
system or computer network. |
5-15 |
      |
5-16 |
instructions which are being prepared or have been prepared and are intended to be entered, |
5-17 |
processed, or stored, are being entered, processed, or stored or have been entered, processed, or |
5-18 |
stored in a computer, computer system, or computer network. |
5-19 |
      |
5-20 |
to do business in the state of Rhode Island that provides registered users the ability to send or |
5-21 |
receive electronic mail through equipment located in this state and that is an intermediary in |
5-22 |
sending or receiving electronic mail. |
5-23 |
      |
5-24 |
money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card |
5-25 |
transaction authorization mechanism, marketable security, or any computerized representation of |
5-26 |
any of these. |
5-27 |
      |
5-28 |
owner, lessee, or licensee of computer data, computer programs, or computer software. |
5-29 |
      |
5-30 |
joint venture. |
5-31 |
      |
5-32 |
      (i) Real property; |
5-33 |
      (ii) Computers and computer networks; |
6-34 |
      (iii) Financial instruments, computer data, computer programs, computer software and |
6-35 |
all other personal property regardless of whether they are: |
6-36 |
      (A) Tangible or intangible; |
6-37 |
      (B) In a format readable by humans or by a computer; |
6-38 |
      (C) In transit between computers or within a computer network or between any devices |
6-39 |
which comprise a computer; or |
6-40 |
      (D) Located on any paper or in any device on which it is stored by a computer or by a |
6-41 |
human; and |
6-42 |
      (E) Computer services. |
6-43 |
      (iv) A person "uses" a computer or computer network when he or she: |
6-44 |
      (A) Attempts to cause or causes a computer or computer network to perform or to stop |
6-45 |
performing computer operations; |
6-46 |
      (B) Attempts to cause or causes the withholding or denial of the use of a computer, |
6-47 |
computer network, computer program, computer data or computer software to another user; or |
6-48 |
      (C) Attempts to cause or causes another person to put false information into a computer. |
6-49 |
      (v) A person is "without authority" when: (A) he or she has no right or permission of the |
6-50 |
owner to use a computer, or, he or she uses a computer in a manner exceeding his or her right or |
6-51 |
permission or (B) he or she uses an Internet service e-mail system offered by a Rhode Island |
6-52 |
based Internet service provider in contravention of the authority granted by or in violation of the |
6-53 |
policies set by the Internet service provider. |
6-54 |
      (vi) Transmission of electronic mail from an organization to its members shall not be |
6-55 |
deemed to be unsolicited bulk electronic mail. |
6-56 |
      |
6-57 |
storage functions. |
6-58 |
     (18) "Social network site" means: (i) A service accessible on a world wide web domain |
6-59 |
whose primary purpose is to facilitate online social interaction among groups of members for |
6-60 |
primarily social purposes, and which integrates the following features within the unique profile |
6-61 |
web pages of its registered members: |
6-62 |
     (A) The ability of members, including minors, to post a name or nickname in |
6-63 |
combination with, photographs, multimedia and other personal information about the member on |
6-64 |
the profile web page; |
6-65 |
     (B) The ability for members, including minors, to establish interactive links from their |
6-66 |
profile web pages to one or more profile web pages of other members of the same social |
6-67 |
networking service; |
7-68 |
     (C) The ability for members of, or visitors to, the social networking service to leave |
7-69 |
messages or comments on a member's profile web page that are visible to all or some visitors to |
7-70 |
that page; |
7-71 |
     (D) The ability of members of, or visitors to, the social networking service to search for |
7-72 |
members according to their age, gender, location, or interests in combination with age; and |
7-73 |
     (E) The ability of members to communicate through an embedded electronic mail feature. |
7-74 |
     (b) A social networking site does not include: |
7-75 |
     (i) Discrete email, instant message, chat room, message board or other communication |
7-76 |
functionalities; or |
7-77 |
     (ii) A service whose primary purpose is the facilitation of commercial transactions |
7-78 |
between its members or visitors. |
7-79 |
      |
7-80 |
basis of every electronic entry put into a computer, computer system, or computer network. |
7-81 |
     SECTION 4. Section 11-64-1 of the General Laws in Chapter 11-64 entitled "Electronic |
7-82 |
Imaging Devices" is hereby amended to read as follows: |
7-83 |
     11-64-1. Definitions. -- (1) For the purposes of this section the following definitions |
7-84 |
apply: |
7-85 |
      (a) "Disseminate" means to make available by any means to any person. |
7-86 |
      (b) "Imaging Device" means any electronic instrument capable of capturing, recording, |
7-87 |
storing or transmitting visual images. |
7-88 |
      (c) "Intimate areas" means the naked or undergarment clad genitals, pubic area, buttocks, |
7-89 |
or any portion of the female breast below the top of the areola of a person which the person |
7-90 |
intended to be protected from public view. |
7-91 |
      (d) "Legal entity" means any partnership, firm, association, corporation or any agent or |
7-92 |
servant thereof. |
7-93 |
      (e) "Publish" means to: |
7-94 |
      (i) Disseminate with the intent that such image or images be made available by any |
7-95 |
means to any person or other legal entity; |
7-96 |
      (ii) Disseminate with the intent such images be sold by another person or legal entity; |
7-97 |
      (iii) Post, present, display, exhibit, circulate, advertise or allow access by any means, so |
7-98 |
as to make an image or images available to the public; or |
7-99 |
      (iv) Disseminate with the intent that an image or images be posted, presented, displayed, |
7-100 |
exhibited, circulated, advertised or made accessible by any means, and to make such images |
7-101 |
available to the public. |
8-102 |
      (f) "Sell" means to disseminate to another person, or to publish, in exchange for |
8-103 |
something of value. |
8-104 |
     (g) "Sexually explicit conduct" means actual: |
8-105 |
     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or |
8-106 |
oral-anal, or lascivious sexual intercourse where the genitals, or pubic area of any person is |
8-107 |
exhibited; |
8-108 |
     (ii) Bestiality; |
8-109 |
     (iii) Masturbation; or |
8-110 |
     (iv) Sadistic or masochistic abuse. |
8-111 |
     SECTION 5. Chapter 11-9 of the General Laws entitled "Children" is hereby amended |
8-112 |
by adding thereto the following section: |
8-113 |
     11-9-1.5. Electronically disseminating indecent material to minors prohibited. – (a) |
8-114 |
Definitions as used in this section: |
8-115 |
     (1) "Minor" means any person not having reached eighteen (18) years of age. |
8-116 |
     (2) "Computer" has the meaning given to that term in section 11-52-1. |
8-117 |
     (3) "Telecommunication device" means an analog or digital electronic device that |
8-118 |
processes data, telephony, video, or sound transmission as part of any system involved in the |
8-119 |
sending and/or receiving at a distance of voice, sound, data, and/or video transmissions. |
8-120 |
     (4) "Indecent visual depiction" means any digital image or digital video depicting one or |
8-121 |
more persons engaging in sexually explicit conduct, and includes: (i) Data stored on any |
8-122 |
computer, telecommunication device, or other electronic storage media that is capable of |
8-123 |
conversion into a visual image; or (ii) Digital video depicting sexually explicit conduct |
8-124 |
transmitted live over a computer online service, internet service, or local electronic bulletin board |
8-125 |
service. |
8-126 |
     (5) "Sexually explicit conduct" means actual: |
8-127 |
     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or |
8-128 |
oral-anal, or lascivious sexual intercourse where the genitals or pubic area of any person is |
8-129 |
exhibited; |
8-130 |
     (ii) Bestiality; |
8-131 |
     (iii) Masturbation; |
8-132 |
     (iv) Sadistic or masochistic abuse; or |
8-133 |
     (v) Graphic or lascivious exhibition of the genitals or pubic area of any person. |
8-134 |
     (b) No person shall knowingly and intentionally use a computer or telecommunication |
8-135 |
device to transmit an indecent visual depiction to a person he or she knows is, or believes to be, a |
8-136 |
minor. |
9-1 |
     (c) No minor shall be charged under this section if his or her conduct falls within section |
9-2 |
11-9-1.4, "Minor electronically disseminating indecent material to another person – "Sexting |
9-3 |
prohibited." |
9-4 |
     (d) The fact that an undercover operative or law enforcement officer was involved in the |
9-5 |
detection and investigation of an offense under this section shall not constitute a defense to a |
9-6 |
prosecution under this section. |
9-7 |
     (e) Whoever violates this section shall be subject to sex offender registration |
9-8 |
requirements set forth in section 11-37.1-1 et seq., entitled "Sexual offender registration and |
9-9 |
community notification act." |
9-10 |
     (f) Whoever violates this section shall be guilty of a felony and may be imprisoned for |
9-11 |
not more than five (5) years or fined not more than five thousand dollars ($5,000), or both. |
9-12 |
     SECTION 6. Chapter 11-52 of the General Laws entitled "Computer Crime" is hereby |
9-13 |
amended by adding thereto the following sections: |
9-14 |
     11-52-3.1. Unauthorized access to confidential information. -- (a) Whoever |
9-15 |
intentionally, without authorization or in excess of one's authorization, directly or indirectly |
9-16 |
accesses a protected computer, computer program, computer system, or computer network with |
9-17 |
the intent to either view, obtain, copy, or download any confidential information contained in or |
9-18 |
stored on such computer, computer program, computer system, or computer network, shall be |
9-19 |
guilty of a felony and shall be subject to the penalties set forth in section 11-52-5. |
9-20 |
     (b) Nothing in this section shall apply to any monitoring of, or interaction with, a |
9-21 |
subscriber's internet or other network connection or service, or a protected computer, by a |
9-22 |
telecommunications carrier, cable operator, computer hardware or software provider, or provider |
9-23 |
of information service or interactive computer service for network or computer security purposes, |
9-24 |
diagnostics, technical support, repair, advertising, authorized updates of software or system |
9-25 |
firmware, authorized remove system management, providing, operating, or improving a service |
9-26 |
used, requested, or authorized by an individual, or detection or prevention of the unauthorized use |
9-27 |
of or fraudulent or other illegal activities in connection with a network, service, or computer |
9-28 |
software. |
9-29 |
     11-52-4.4. Cyberstalking and cyberharassment prohibited. – (a) Definitions. As used |
9-30 |
in this section: |
9-31 |
     (1) "Conduct" means either: (i) A single act which causes a person to be repeatedly |
9-32 |
contacted by others in a manner which seriously alarms, annoys, or bothers the person, or (ii) two |
9-33 |
(2) or more acts over a period of time, evidencing a continuity of purpose, which seriously |
9-34 |
alarms, annoys, or bothers the person. |
10-1 |
     (2) "Immediate family" means a spouse, parent, child, or sibling. The term also includes |
10-2 |
any other individual who regularly resides in the household or who within the prior six (6) |
10-3 |
months regularly resided in the household. |
10-4 |
     (3) "Harass" means to engage in intentional conduct that serves no legitimate purpose |
10-5 |
that would cause a reasonable person to suffer substantial emotional distress, or be in fear of |
10-6 |
bodily injury. The term does not include constitutionally protected activity. |
10-7 |
     (4) "Computer" has the meaning given to that term in section 11-52-1. |
10-8 |
     (5) "Telecommunication device" means an analog or digital electronic device that |
10-9 |
processes data, telephony, video, or sound transmission as part of any system involved in the |
10-10 |
sending and/or receiving at a distance of voice, sound, data, and/or video transmissions. |
10-11 |
     (b) Whoever, by computer or telecommunication device, harasses another person or |
10-12 |
causes any person to be contacted for the purpose of harassing that person or his or her immediate |
10-13 |
family is guilty of a misdemeanor and may be subject to imprisonment for not more than one year |
10-14 |
or fined not more than five hundred dollars ($500), or both. |
10-15 |
     (c) A second or subsequent conviction under subsection (b) of this section shall be |
10-16 |
deemed a felony subject to imprisonment for not more than two (2) years or a fine or not more |
10-17 |
than six thousand dollars ($6,000), or both. |
10-18 |
     (d) If a person accused under this section claims to have been engaged in constitutionally |
10-19 |
protected activity, the court shall determine the validity of the claim as a matter of law and, if |
10-20 |
found valid, shall exclude evidence of the activity. |
10-21 |
     11-52-7.1. Offense of online impersonation. -- (a) Definitions, as used in this section: |
10-22 |
     (1) "Commercial social networking site" means a business, organization or other similar |
10-23 |
entity that operates a website and permits persons to become registered users for the purpose of |
10-24 |
establishing personal relationships with other users through direct or real-time communication |
10-25 |
with other users or the creation of web pages or profiles available to the public or to other users. |
10-26 |
     (2) "Electronic mail" means an electronic mail message sent through the use of an |
10-27 |
electronic mail program or a message board program. |
10-28 |
     (3) "Identifying information" means information that alone or in conjunction with other |
10-29 |
information identifies a person, including a person's: |
10-30 |
     (i) Name, social security number, date of birth, or government-issued identification |
10-31 |
number; |
10-32 |
     (ii) Unique biometric data, including the person's fingerprint, voice print or retina or iris |
10-33 |
image; |
11-34 |
     (iii) Unique electronic identification number, electronic mail address, routing code or |
11-35 |
financial institution account number; and |
11-36 |
     (iv) Telecommunication identifying information or access device. |
11-37 |
     (4) "Public official" means a person elected by the public or elected or appointed by a |
11-38 |
governmental body or an appointed official in the executive, legislative, or judicial branch of the |
11-39 |
state or any political subdivision thereof. |
11-40 |
     (b) A person commits the crime of online impersonation if the person: |
11-41 |
     (1) Uses the name or persona of another person to create a web page on or to post one or |
11-42 |
more messages on a commercial social networking site or sends an electronic mail, instant |
11-43 |
message, text message or similar communication without obtaining the other person's consent and |
11-44 |
with the intent to harm, defraud, intimidate or threaten any person; |
11-45 |
     (2) Sends an electronic mail, instant message, text message or similar communication that |
11-46 |
references a name, domain address, telephone number or other item of identifying information |
11-47 |
belonging to any person without obtaining the other person's consent, with the intent to cause a |
11-48 |
recipient of the communication to reasonably believe that the other person authorized or |
11-49 |
transmitted the communication with the intent to harm or defraud any person; or |
11-50 |
     (3) Uses the name or persona of a public official to create a web page on or to post one or |
11-51 |
more messages on a commercial social networking site or sends an electronic mail, instant |
11-52 |
message, text message or similar communication without obtaining the public official's consent |
11-53 |
and with the intent to induce another to submit to such pretended official authority, to solicit |
11-54 |
funds or otherwise to act in reliance upon that pretense to the other person's detriment. |
11-55 |
     (c) Whoever violates this section shall be guilty of a felony and subject to imprisonment |
11-56 |
for not more than three (3) years or fined not more than two thousand dollars ($2,000), or both. |
11-57 |
     SECTION 7. Chapter 11-64 of the General Laws entitled "Electronic Imaging Devices" |
11-58 |
is hereby amended by adding thereto the following section: |
11-59 |
     11-64-3. Unauthorized dissemination of indecent material. -- (a) A person is guilty of |
11-60 |
unauthorized dissemination of indecent material when such person uses an imaging device to |
11-61 |
capture, record, or store visual images of another person eighteen (18) years of age or older |
11-62 |
engaged in sexually explicit conduct or of the intimate areas of another person, with or without |
11-63 |
that other person's knowledge and consent under circumstances in which that other person would |
11-64 |
have a reasonable expectation of privacy and, thereafter, without the consent of the person or all |
11-65 |
persons depicted in the visual image, intentionally disseminates, publishes, or sells such visual |
11-66 |
image or images. |
11-67 |
     (b) Constitutionally protected activity is not subject to the provisions of this section. |
12-68 |
     (c) Whoever violates this section shall not be subject to sex offender registration |
12-69 |
requirements set forth in section 11-37.1-1 et seq., entitled "Sexual offender registration and |
12-70 |
community notification act." |
12-71 |
     (d) Whoever violates this section shall be subject to imprisonment for not more than three |
12-72 |
(3) years or fined not more than five thousand dollars ($5,000), or both. |
12-73 |
     SECTION 8. Nothing in this act may be construed to provide a basis for a private right of |
12-74 |
action against an interactive computer service, as defined in 47 U.S.C. section 230, or a |
12-75 |
telecommunications carrier as used by another person to violate this act, for content provided by |
12-76 |
such person or by another information content provider. |
12-77 |
     SECTION 9. This act shall take effect upon passage. |
      | |
======= | |
LC00965 | |
======= | |
EXPLANATION | |
BY THE LEGISLATIVE COUNCIL | |
OF | |
A N A C T | |
RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME | |
*** | |
13-1 |
     This act would amend various chapters of the general laws to create additional offenses |
13-2 |
relating to internet activity. |
13-3 |
     This act would take effect upon passage. |
      | |
======= | |
LC00965 | |
======= |