Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cyber Law :: colorado.txt

Colorado Computer Crime Law





                           COLORADO REVISED STATUTES


                            TITLE 18.  CRIMINAL CODE

                          ARTICLE 5.5.  COMPUTER CRIME

                           C.R.S.  18-5.5-101  (1990)

 18-5.5-101.   Definitions

   As used in this article, unless the context otherwise requires:

   (1) "Authorization" means the express consent of a person which
may include an employee's job description to use said person's
computer, computer network, computer program, computer software,
computer system, property, or services as those terms are defined
in this section.

   (2) "Computer" means an electronic device which performs
logical, arithmetic, or memory functions by the manipulations of
electronic or magnetic impulses, and includes all input, output,
processing, storage, software, or communication facilities which
are connected or related to such a device in a system or network.

   (3) "Computer network" means the interconnection of
communication lines (including microwave or other means of
electronic communication) with a computer through remote terminals,
or a complex consisting of two or more interconnected computers.

   (4) "Computer program" means a series of instructions or
statements, in a form acceptable to a computer, which permits the
functioning of a computer system in a manner designed to provide
appropriate products from such computer system.

   (5) "Computer software" means computer programs, procedures, and
associated documentation concerned with the operation of a computer
system.
   (6) "Computer system" means a set of related, connected or
unconnected, computer equipment, devices, and software.

   (7) "Financial instrument" means any check, draft, money order,
certificate of deposit, letter of credit, bill of exchange, credit
card, debit card, or marketable security.

   (8) "Property" includes, but is not limited to, financial
instruments, information, including electronically produced data,
and computer software and programs in either machine or human
readable form, and any other tangible or intangible item of value.

   (9) "Services" includes, but is not limited to, computer time,
data processing, and storage functions.

   (10) To "use" means to instruct, communicate with, store data
in, retrieve data from, or otherwise make use of any resources of
a computer, computer system, or computer network.

                           COLORADO REVISED STATUTES

                            TITLE 18.  CRIMINAL CODE

                          ARTICLE 5.5.  COMPUTER CRIME

                            C.R.S. 18-5.5-102 (1990)

18-5.5-102.  Computer crime

   (1) Any person who knowingly uses any computer, computer system,
computer network, or any part thereof for the purpose of devising
or executing any scheme or artifice to defraud; obtaining money,
property, or services by means of false or fraudulent pretenses,
representations, or promises; using the property or services of
another without authorization; or committing theft commits computer
crime.

   (2) Any person who knowingly and without authorization uses,
alters, damages, or destroys any computer, computer system, or
computer network described in section 18-5.5-101 or any computer
software, program, documentation, or data contained in such
computer, computer system, or computer network commits computer
crime.

   (3) If the loss, damage, or thing of value taken in violation of
this section is less than fifty dollars, computer crime is a class
3 misdemeanor; if fifty dollars or more but less than three hundred
dollars, computer crime is a class 2 misdemeanor; if three hundred
dollars or more but less than ten thousand dollars, computer crime
is a class 5 felony; if ten thousand dollars or more, computer
crime is a class 3 felony.



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH