Here is computer crimes adopted in

Found at: 0x1bi.net:70/textfiles/file?law/pa_lawsta.law


Here is Pennsylvania's computer crimes law, adopted in 1983 with 
changes in 1986, Pennsylvania consolidated statutes title 

SECTION 3933 Unlawful use of a computer

     (a)  Offense defined.-- A person commits an offense if he:

             (1) accesses, alters, damages or destroys any 
          computer, computer system, computer network, computer 
          software, computer program or data base or any part 
          thereof, with the intent to interrupt the normal 
          functioning of an organization 

          /*does a person commit a crime by breaking into a 
          system and cleaning it up if the normal function of the 
          organization is chaos and devolution?*/

          or to devise or execute any scheme or artifice to 
          defraud or deceive or control property or services by 
          means of false or fraudulent pretenses, 
          rep[resentations, or promises;

             (2) intentionally and without authorization accesses, 
          alters, interferes with the operation of, damages or 
          destroys any computer, computer system, computer 
          network, computer software, computer program, or 
          computer data base or any part thereof; or

             (3) intentionally or knowingly and without 
          authorization gives or publishes a password, 
          identifying code, personal identification number or other 
          confidential information about a computer, computer 
          system, computer network or data base.

/*This statute has an extremely elastic definition of the the 
term confidential information and gives a very broad tool to the 
computer industry.  >Consequently label material sold in this 
nformation protected by 18PaC.S Section 3933*/

     (b) Grading.--An offense under subsection (a)(1) is a felony 
of the third degree.  An offense under subsection (a)(2) or (3) 
s a a misdemeanor of the first degree.

     (c) Definitions.--As used in this section, the following 

     "Access". To intercept, instruct, communicate with, store 

     "Computer." An electronic, magnetic, optical, hydraulic

/* Will all of those with hydraulic computers PLEASE leave a 
message to me explaining what the hell a hydraulic computer 
s----- Thanks---- Sysop (Herb Kraft.) */

organic or other high speed data processing device or system 
nput, output, processing, storage, software or communication
facilities which are connected or related to the device in a 

     "Computer network" the interconnection of two o more 
computers through the usage of satellite, microwave, line or 
other communication medium.

     "Computer program" an ordered  set of instructions or 
actual or modified form in a computer system, causes it to 

     "Computer software" a set of computer programs, procedures, 
and associated documentation concerned with the operation of a 
computer system.]

     "Computer system" a set of related, connected or unconnected 
computer equipment, devices and software.

     "Data base" a representation of information, knowledge, 
facts, concepts or instructions which are being prepared or 
manner and are intended for use in a computer, computer system or 
computer network including, but not limited to, computer 
nternally in the memory of the computer.

     "Financial instrument" includes, but is not limited to, any 
check, draft, warrant, money order, note, certificate of deposit, 
letter of credit, bill of exchange, credit or debit card, 
transaction authorization mechanism, marketable security or any 
computer system representation thereof.

     "Property" includes but is not limited to financial 
nstruments, computer software and programs either in machine or

     "Services" includes but is not limited to, computer time, 

Downloaded From P-80 International Information Systems 304-744-2253