2019 -- H 5987

========

LC002403

========

     STATE OF RHODE ISLAND

IN GENERAL ASSEMBLY

JANUARY SESSION, A.D. 2019

____________

A N   A C T

RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME

     

     Introduced By: Representatives Jackson, McNamara, Corvese, Noret, and Ackerman

     Date Introduced: April 11, 2019

     Referred To: House Judiciary

     It is enacted by the General Assembly as follows:

1

     SECTION 1. Sections 11-52-1 and 11-52-7.1 of the General Laws in Chapter 11-52

2

entitled "Computer Crime" are hereby amended to read as follows:

3

     11-52-1. Definitions.

4

     As used in this chapter:

5

     (1) "Access" means to approach, instruct, communicate with, store data in, enter data in,

6

retrieve data from, or otherwise make use of any resources of, a computer, computer system, or

7

computer network.

8

     (2) "Computer" means an electronic, magnetic, optical, hydraulic or organic device or

9

group of devices which, pursuant to a computer program, to human instruction, or to permanent

10

instructions contained in the device or group of devices, can automatically perform computer

11

operations with or on computer data and can communicate the results to another computer or to a

12

person. The term "computer" includes any connected or directly related device, equipment, or

13

facility which enables the computer to store, retrieve or communicate computer programs,

14

computer data or the results of computer operations to or from a person, another computer or

15

another device.

16

     (3) "Computer data" means any representation of information, knowledge, facts,

17

concepts, or instructions which is being prepared or has been prepared and is intended to be

18

processed, is being processed, or has been processed in a computer or computer network.

19

"Computer data" may be in any form, whether readable only by a computer or only by a human

 

1

or by either, including, but not limited to, computer printouts, magnetic storage media, punched

2

cards, or data stored internally in the memory of the computer.

3

     (4) "Computer network" means a set of related, remotely connected devices and any

4

communications facilities including more than one computer with the capability to transmit data

5

among them through the communications facilities.

6

     (5) "Computer operation" means arithmetic, logical, monitoring, storage or retrieval

7

functions and any combination of them, and includes, but is not limited to, communication with,

8

storage of data to, or retrieval of data from any device or human hand manipulation of electronic

9

or magnetic impulses. A "computer operation" for a particular computer may also be any function

10

for which that computer was generally designed.

11

     (6) "Computer program" means a series of instructions or statements or related data that,

12

in actual or modified form, is capable of causing a computer or a computer system to perform

13

specified functions in a form acceptable to a computer, which permits the functioning of a

14

computer system in a manner designed to provide appropriate products from the computer

15

systems.

16

     (7) "Computer services" includes computer time or services, data processing services,

17

Internet service providers' networks and facilities located in the state or information or data stored

18

in connection with them.

19

     (8) "Computer software" means a set of computer programs, procedures, and associated

20

documentation concerned with the operation of a computer, computer program or computer

21

network.

22

     (9) "Computer system" means a set of related, connected or unconnected, computer

23

equipment, devices, and software.

24

     (10) "Data" means any representation of information, knowledge, facts, concepts, or

25

instructions which are being prepared or have been prepared and are intended to be entered,

26

processed, or stored, are being entered, processed, or stored or have been entered, processed, or

27

stored in a computer, computer system, or computer network.

28

     (11) "Electronic mail service provider" means any business or organization qualified to

29

do business in the state of Rhode Island that provides registered users the ability to send or

30

receive electronic mail through equipment located in this state and that is an intermediary in

31

sending or receiving electronic mail.

32

     (12) "Financial instrument" includes, but is not limited to, any check, draft, warrant,

33

money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card

34

transaction authorization mechanism, marketable security, or any computerized representation of

 

LC002403 - Page 2 of 6

1

any of these.

2

     (13) "Owner" means an owner or lessee of a computer or a computer network or an

3

owner, lessee, or licensee of computer data, computer programs, or computer software.

4

     (14) "Person" shall include any individual, partnership, association, corporation or joint

5

venture.

6

     (15) "Property" includes, but is not limited to:

7

     (i) Real property;

8

     (ii) Computers and computer networks;

9

     (iii) Financial instruments, computer data, computer programs, computer software and all

10

other personal property regardless of whether they are:

11

     (A) Tangible or intangible;

12

     (B) In a format readable by humans or by a computer;

13

     (C) In transit between computers or within a computer network or between any devices

14

which comprise a computer; or

15

     (D) Located on any paper or in any device on which it is stored by a computer or by a

16

human; and

17

     (E) Computer services.

18

     (iv) A person "uses" a computer or computer network when he or she:

19

     (A) Attempts to cause or causes a computer or computer network to perform or to stop

20

performing computer operations;

21

     (B) Attempts to cause or causes the withholding or denial of the use of a computer,

22

computer network, computer program, computer data or computer software to another user; or

23

     (C) Attempts to cause or causes another person to put false information into a computer.

24

     (v) A person is "without authority" when: (A) he or she has no right or permission of the

25

owner to use a computer, or, he or she uses a computer in a manner exceeding his or her right or

26

permission or (B) he or she uses an Internet service e-mail system offered by a Rhode Island

27

based Internet service provider in contravention of the authority granted by or in violation of the

28

policies set by the Internet service provider.

29

     (vi) Transmission of electronic mail from an organization to its members shall not be

30

deemed to be unsolicited bulk electronic mail.

31

     (16) "Services" includes, but is not limited to, computer time, data processing, and

32

storage functions.

33

     (17) "Source document" means an original document or record which forms the basis of

34

every electronic entry put into a computer, computer system, or computer network.

 

LC002403 - Page 3 of 6

1

     (18) "User account" means and includes any established relationship between a user and a

2

computer, network, website, or other information service.

3

     11-52-7.1. Online impersonation.

4

     (a) Definitions, as used in this section:

5

     (1) "Commercial social networking site" means a business, organization, or other similar

6

entity that operates a website and permits persons to become registered users for the purpose of

7

establishing personal relationships with other users through direct or real-time communication

8

with other users or the creation of web pages or profiles available to the public or to other users.

9

     (2) "Electronic mail" means an electronic mail message sent through the use of an

10

electronic mail program or a message board program.

11

     (3) "Identifying information" means information that alone, or in conjunction with other

12

information, identifies a person, including a person's:

13

     (i) Name, social security number, date of birth, or government-issued identification

14

number;

15

     (ii) Unique biometric data, including the person's fingerprint, voice print, or retina or iris

16

image;

17

     (iii) Unique electronic identification number, electronic mail address, routing code, or

18

financial institution account number; and

19

     (iv) Telecommunication identifying information or access device.

20

     (4) "Public official" means a person elected by the public, or elected or appointed by a

21

governmental body, or an appointed official in the executive, legislative, or judicial branch of the

22

state or any political subdivision thereof.

23

     (b) A person commits the crime of online impersonation if the person:

24

     (1) Uses the name or persona of another person to create a web page on or to post one or

25

more messages on a commercial social networking site or sends an electronic mail, instant

26

message, text message, or similar communication without obtaining the other person's consent

27

and with the intent to harm, defraud, intimidate, or threaten any person;

28

     (2) Sends an electronic mail, instant message, text message, or similar communication

29

that references a name, domain address, telephone number, or other item of identifying

30

information belonging to any person without obtaining the other person's consent with the intent

31

to cause a recipient of the communication to reasonably believe that the other person authorized

32

or transmitted the communication and with the intent to harm or defraud any person; or

33

     (3) Uses the name or persona of a public official to create a web page on, or to post one

34

or more messages on, a commercial social networking site or sends an electronic mail, instant

 

LC002403 - Page 4 of 6

1

message, text message, or similar communication without obtaining the public official's consent

2

and with the intent to induce another to submit to such pretended official authority, to solicit

3

funds, or otherwise to act in reliance upon that pretense to the other person's detriment.; or

4

     (4) Accesses the user account of another person, through the use of a password or other

5

unique identifier, without obtaining the other person's consent and with the intent of viewing or

6

using information maintained on any electronic database, website or account. For the purposes of

7

this section, each instance of accessing information in violation of this section shall constitute a

8

separate offense.

9

     (c) Every person convicted of an offense under this section shall be guilty of a

10

misdemeanor for the first offense and shall be subject to imprisonment not exceeding one year, a

11

fine of one thousand dollars ($1,000), or both, and an order of restitution as provided herein.

12

Every person convicted of a second or subsequent offense under this section shall be guilty of a

13

felony and shall be subject to imprisonment not exceeding three (3) years, a fine of three

14

thousand dollars ($3,000), or both, and an order of restitution as provided herein.

15

     (d) Every person convicted of an offense under this section shall be subject to an order

16

for restitution, if appropriate, which shall be in addition to any other applicable penalty.

17

     SECTION 2. This act shall take effect upon passage.

========

LC002403

========

 

LC002403 - Page 5 of 6

EXPLANATION

BY THE LEGISLATIVE COUNCIL

OF

A N   A C T

RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME

***

1

     This act would criminalize accessing the user account of another person without consent

2

for the purpose of viewing or using information maintained on any electronic database, website or

3

account with each instance constituting a separate offense.

4

     This act would take effect upon passage.

========

LC002403

========

 

LC002403 - Page 6 of 6