See other bills
under the
same topic
                                 HOUSE AMENDED
        PRIOR PRINTER'S NOS. 1309, 1481, 1553,        PRINTER'S NO. 1743
        1657

THE GENERAL ASSEMBLY OF PENNSYLVANIA


SENATE BILL

No. 1077 Session of 1999


        INTRODUCED BY EARLL, O'PAKE, WHITE, HART, LEMMOND, TILGHMAN,
           ROBBINS, WAUGH, KASUNIC, WOZNIAK, SCHWARTZ, RHOADES, THOMPSON
           AND BOSCOLA, SEPTEMBER 7, 1999

        AS AMENDED ON THIRD CONSIDERATION, HOUSE OF REPRESENTATIVES,
           MARCH 14, 2000

                                     AN ACT

     1  Amending Title 18 (Crimes and Offenses) of the Pennsylvania
     2     Consolidated Statutes, further providing for unlawful use of
     3     a computer; AND PROHIBITING CERTAIN PRACTICES BY               <--
     4     TELEMARKETERS.

     5     The General Assembly of the Commonwealth of Pennsylvania
     6  hereby enacts as follows:
     7     Section 1.  Section 3933 of Title 18 of the Pennsylvania
     8  Consolidated Statutes is amended to read:
     9  § 3933.  Unlawful use of computer.
    10     (a)  Offense defined.--A person commits [an] the offense [if
    11  he] of unlawful use of a computer if he, whether in person,
    12  electronically or through the intentional distribution of a
    13  computer virus:
    14         (1)  accesses, exceeds authorization to access, alters,
    15     damages or destroys any computer, computer system, computer
    16     network, computer software, computer program or data base or
    17     any part thereof, with the intent:

     1             (i)  to interrupt the normal functioning of an
     2         organization [or]; or
     3             (ii)  to devise or execute any scheme or artifice to
     4         defraud [or], deceive or control property or services by
     5         means of false or fraudulent pretenses, representations
     6         or promises;
     7         (2)  intentionally and without authorization accesses,
     8     alters, interferes with the operation of, damages or destroys
     9     any computer, computer system, computer network, computer
    10     software, computer program or computer data base or any part
    11     thereof; [or]                                                  <--
    12         (3)  intentionally or knowingly and without authorization
    13     gives or publishes a password, identifying code, personal
    14     identification number or other confidential information about
    15     a computer, computer system, computer network or data
    16     base[.]; OR                                                    <--
    17         (4)  INTENTIONALLY OR KNOWINGLY ENGAGES IN A SCHEME OR
    18     ARTIFICE, INCLUDING, BUT NOT LIMITED TO, A DENIAL OF SERVICE
    19     ATTACK, UPON ANY COMPUTER, COMPUTER SYSTEM, COMPUTER NETWORK,
    20     COMPUTER SOFTWARE, COMPUTER PROGRAM, COMPUTER SERVER OR DATA
    21     BASE OR ANY PART THEREOF THAT IS DESIGNED TO BLOCK, IMPEDE OR
    22     DENY THE ACCESS OF INFORMATION OR INITIATION OR COMPLETION OF
    23     ANY SALE OR TRANSACTION BY USERS OF THAT COMPUTER, COMPUTER
    24     SYSTEM, COMPUTER NETWORK, COMPUTER SOFTWARE, COMPUTER
    25     PROGRAM, COMPUTER SERVER OR DATA BASE OR ANY PART THEREOF.
    26     (b)  Grading.--An offense under subsection (a)(1) is a felony
    27  of the third degree. An offense under subsection (a)(2) [or       <--
    28  (3)], (3) OR (4) is a misdemeanor of the first degree.            <--
    29     (c)  Definitions.--As used in this section the following
    30  words and phrases shall have the meanings given to them in this
    19990S1077B1743                  - 2 -

     1  subsection:
     2     "Access."  To intercept, instruct, communicate with, store
     3  data in, retrieve data from or otherwise make use of any
     4  resources of a computer, computer system, computer network or
     5  data base.
     6     "Computer."  An electronic, magnetic, optical, hydraulic,
     7  organic or other high speed data processing device or system
     8  which performs logic, arithmetic or memory functions and
     9  includes all input, output, processing, storage, software or
    10  communication facilities which are connected or related to the
    11  device in a system or network.
    12     "Computer network."  The interconnection of two or more
    13  computers through the usage of satellite, microwave, line or
    14  other communication medium.
    15     "Computer program."  An ordered set of instructions or
    16  statements and related data that, when automatically executed in
    17  actual or modified form in a computer system, causes it to
    18  perform specified functions.
    19     "Computer software."  A set of computer programs, procedures
    20  and associated documentation concerned with the operation of a
    21  computer system.
    22     "Computer system."  A set of related, connected or
    23  unconnected computer equipment, devices and software.
    24     "Computer virus."  A computer program copied to or installed
    25  on a computer, COMPUTER NETWORK, COMPUTER PROGRAM, COMPUTER       <--
    26  SOFTWARE OR COMPUTER SYSTEM without the informed consent of the
    27  owner of the computer, COMPUTER NETWORK, COMPUTER PROGRAM,        <--
    28  COMPUTER SOFTWARE OR COMPUTER SYSTEM that may replicate itself
    29  and that causes unauthorized activities within or by the
    30  computer, COMPUTER NETWORK, COMPUTER PROGRAM, COMPUTER SOFTWARE   <--
    19990S1077B1743                  - 3 -

     1  OR COMPUTER SYSTEM.
     2     "Data base."  A representation of information, knowledge,
     3  facts, concepts or instructions which are being prepared or
     4  processed or have been prepared or processed in a formalized
     5  manner and are intended for use in a computer, computer system
     6  or computer network, including, but not limited to, computer
     7  printouts, magnetic storage media, punched cards or data stored
     8  internally in the memory of the computer.
     9     "Financial instrument."  Includes, but is not limited to, any
    10  check, draft, warrant, money order, note, certificate of
    11  deposit, letter of credit, bill of exchange, credit or debit
    12  card, transaction authorization mechanism, marketable security
    13  or any computer system representation thereof.
    14     "Property."  Includes, but is not limited to, financial
    15  instruments, computer software and programs in either machine or
    16  human readable form, and anything of value, tangible or
    17  intangible.
    18     "Services."  Includes, but is not limited to, computer time,
    19  data processing and storage functions.
    20     (d)  Restitution.--Upon conviction under this section for the
    21  intentional distribution of a computer virus, the sentence shall
    22  include an order for the defendant to reimburse the victim for:
    23         (1)  the cost of repairing or, if necessary, replacing
    24     the affected computer, computer system, computer network,
    25     computer software, computer program or data base; or           <--
    26         (2)  lost profit for the period that the computer,
    27     computer system, computer network, computer software,
    28     computer program or data base is not usable; OR                <--
    29         (3)  THE COST OF REPLACING OR RESTORING THE DATA LOST OR
    30     DAMAGED AS A RESULT OF A VIOLATION OF THIS SECTION.
    19990S1077B1743                  - 4 -

     1     SECTION 2.  TITLE 18 IS AMENDED BY ADDING A SECTION TO READ:   <--
     2  § 7330.  PROHIBITION OF CERTAIN PRACTICES BY TELEMARKETERS.
     3     (A)  OFFENSE DEFINED.--NO TELEMARKETER, AS DEFINED IN SECTION
     4  2 OF THE ACT OF DECEMBER 4, 1996 (P.L.911, NO.147), KNOWN AS THE
     5  TELEMARKETER REGISTRATION ACT, SHALL REFUSE OR OTHERWISE FAIL TO
     6  DISCLOSE THE NAME, CITY, STATE AND TELEPHONE NUMBER OF THE
     7  TELEMARKETER AFTER A RECIPIENT OF A TELEPHONE SOLICITATION BY
     8  THE TELEMARKETER REQUESTS SUCH INFORMATION.
     9     (B)  PENALTY.--A PERSON WHO VIOLATES SUBSECTION (A) COMMITS A
    10  SUMMARY OFFENSE AND SHALL, UPON CONVICTION, BE SENTENCED TO PAY
    11  A FINE OF $250.
    12     Section 2 3.  This act shall take effect in 60 days.           <--












    H3L18JLW/19990S1077B1743         - 5 -