California Penal Code. California. Читать онлайн. Newlib. NEWLIB.NET

Автор: California
Издательство: Проспект
Серия:
Жанр произведения: Юриспруденция, право
Год издания: 0
isbn: 9785392105397
Скачать книгу
October 1, 2011, by Sec. 636 of Ch. 15, as amended by Stats. 2011, Ch. 39, Sec. 68.)

      501.

      Upon a trial for larceny or embezzlement of money, bank notes, certificates of stock, or valuable securities, the allegation of the indictment or information, so far as regards the description of the property, is sustained, if the offender be proved to have embezzled or stolen any money, bank notes, certificates of stock, or valuable security, although the particular species of coin or other money, or the number, denomination, or kind of bank notes, certificates of stock, or valuable security, is not proved; and upon a trial for embezzlement, if the offender is proved to have embezzled any piece of coin or other money, any bank note, certificate of stock, or valuable security, although the piece of coin or other money, or bank note, certificate of stock, or valuable security, may have been delivered to him or her in order that some part of the value thereof should be returned to the party delivering the same, and such part shall have been returned accordingly.

      (Added by Stats. 1989, Ch. 897, Sec. 21.)

      502.

      (a) It is the intent of the Legislature in enacting this section to expand the degree of protection afforded to individuals, businesses, and governmental agencies from tampering, interference, damage, and unauthorized access to lawfully created computer data and computer systems. The Legislature finds and declares that the proliferation of computer technology has resulted in a concomitant proliferation of computer crime and other forms of unauthorized access to computers, computer systems, and computer data.

      The Legislature further finds and declares that protection of the integrity of all types and forms of lawfully created computers, computer systems, and computer data is vital to the protection of the privacy of individuals as well as to the well-being of financial institutions, business concerns, governmental agencies, and others within this state that lawfully utilize those computers, computer systems, and data.

      (b) For the purposes of this section, the following terms have the following meanings:

      (1) “Access” means to gain entry to, instruct, cause input to, cause output from, cause data processing with, or communicate with, the logical, arithmetical, or memory function resources of a computer, computer system, or computer network.

      (2) “Computer network” means any system that provides communications between one or more computer systems and input/output devices including, but not limited to, display terminals, remote systems, mobile devices, and printers connected by telecommunication facilities.

      (3) “Computer program or software” means a set of instructions or statements, and related data, that when executed in actual or modified form, cause a computer, computer system, or computer network to perform specified functions.

      (4) “Computer services” includes, but is not limited to, computer time, data processing, or storage functions, Internet services, electronic mail services, electronic message services, or other uses of a computer, computer system, or computer network.

      (5) “Computer system” means a device or collection of devices, including support devices and excluding calculators that are not programmable and capable of being used in conjunction with external files, one or more of which contain computer programs, electronic instructions, input data, and output data, that performs functions including, but not limited to, logic, arithmetic, data storage and retrieval, communication, and control.

      (6) “Government computer system” means any computer system, or part thereof, that is owned, operated, or used by any federal, state, or local governmental entity.

      (7) “Public safety infrastructure computer system” means any computer system, or part thereof, that is necessary for the health and safety of the public including computer systems owned, operated, or used by drinking water and wastewater treatment facilities, hospitals, emergency service providers, telecommunication companies, and gas and electric utility companies.

      (8) “Data” means a representation of information, knowledge, facts, concepts, computer software, computer programs or instructions. Data may be in any form, in storage media, or as stored in the memory of the computer or in transit or presented on a display device.

      (9) “Supporting documentation” includes, but is not limited to, all information, in any form, pertaining to the design, construction, classification, implementation, use, or modification of a computer, computer system, computer network, computer program, or computer software, which information is not generally available to the public and is necessary for the operation of a computer, computer system, computer network, computer program, or computer software.

      (10) “Injury” means any alteration, deletion, damage, or destruction of a computer system, computer network, computer program, or data caused by the access, or the denial of access to legitimate users of a computer system, network, or program.

      (11) “Victim expenditure” means any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program, or data was or was not altered, deleted, damaged, or destroyed by the access.

      (12) “Computer contaminant” means any set of computer instructions that are designed to modify, damage, destroy, record, or transmit information within a computer, computer system, or computer network without the intent or permission of the owner of the information. They include, but are not limited to, a group of computer instructions commonly called viruses or worms, that are self-replicating or self-propagating and are designed to contaminate other computer programs or computer data, consume computer resources, modify, destroy, record, or transmit data, or in some other fashion usurp the normal operation of the computer, computer system, or computer network.

      (13) “Internet domain name” means a globally unique, hierarchical reference to an Internet host or service, assigned through centralized Internet naming authorities, comprising a series of character strings separated by periods, with the rightmost character string specifying the top of the hierarchy.

      (14) “Electronic mail” means an electronic message or computer file that is transmitted between two or more telecommunications devices; computers; computer networks, regardless of whether the network is a local, regional, or global network; or electronic devices capable or receiving electronic messages, regardless of whether the message is converted to hard copy format after receipt, viewed upon transmission, or stored for later retrieval.

      (15) “Profile” means either of the following:

      (A) A configuration of user data required by a computer so that the user may access programs or services and have the desired functionality on that computer.

      (B) An Internet Web site user’s personal page or section of a page that is made up of data, in text of graphical form, that displays significant, unique, or identifying information, including, but not limited to, listing acquaintances, interests, associations, activities, or personal statements.

      (c) Except as provided in subdivision (h), any person who commits any of the following acts is guilty of a public offense:

      (1) Knowingly accesses and without permission alters, damages, deletes, destroys, or otherwise uses any data, computer, computer system, or computer network in order to either (A) devise or execute any scheme or artifice to defraud, deceive, or extort, or (B) wrongfully control or obtain money, property, or data.

      (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network.

      (3) Knowingly and without permission uses or causes to be used computer services.

      (4) Knowingly accesses and without permission adds, alters, damages, deletes, or destroys any data, computer software, or computer programs which reside or exist internal or external to a computer, computer system, or computer network.

      (5) Knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the