Title 17-A: MAINE CRIMINAL CODE

Similar documents
Maine Revised Statutes. Title 4: JUDICIARY. Chapter 5: DISTRICT COURT

Title 15: COURT PROCEDURE -- CRIMINAL

Title 10: COMMERCE AND TRADE

Title 10: COMMERCE AND TRADE

Title 13-B: MAINE NONPROFIT CORPORATION ACT

Georgia Computer System Protection Act

Title 17-A: MAINE CRIMINAL CODE

Title 20-A: EDUCATION

Title 17-A: MAINE CRIMINAL CODE

Title 14: COURT PROCEDURE -- CIVIL

Title 17-A: MAINE CRIMINAL CODE

Title 15: COURT PROCEDURE -- CRIMINAL

Title 4: JUDICIARY. Chapter 19: NOTARIES PUBLIC. Table of Contents

Title 17-A: MAINE CRIMINAL CODE

Title 7: AGRICULTURE AND ANIMALS

Title 15: COURT PROCEDURE -- CRIMINAL

CHAPTER 354. (Senate Bill 60)

TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES CHAPTER 47. FRAUD AND FALSE STATEMENTS 18 USCS 1030

Title 15: COURT PROCEDURE -- CRIMINAL

Title 21-A: ELECTIONS

Title 34-A: CORRECTIONS

Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES

Title 15: COURT PROCEDURE -- CRIMINAL

Title 28-A: LIQUORS. Chapter 19: AGENCY LIQUOR STORES. Table of Contents Part 2. AGENCY LIQUOR STORES...

JW PLASTIC SURGERY. Terms of Service

Title 32: PROFESSIONS AND OCCUPATIONS

Title 32: PROFESSIONS AND OCCUPATIONS

Title 30-A: MUNICIPALITIES AND COUNTIES

Title 10: COMMERCE AND TRADE

Title 4: JUDICIARY. Chapter 7: PROBATE COURT. Table of Contents

Title 11: UNIFORM COMMERCIAL CODE

TERMS OF USE AND LICENSE AGREEMENT BUCKEYE CABLEVISION, INC. Buckeye Remote Record. (Effective as of November 15, 2013) PLEASE READ CAREFULLY

Title 6: AERONAUTICS

Title 15: COURT PROCEDURE -- CRIMINAL

YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT CLICK ON THE BUY NOW->>

Title 7: AGRICULTURE AND ANIMALS

Main Street Train Station Paper Model License Agreement

Title 20-A: EDUCATION

Cell Site Simulator Privacy Model Bill

HOUSE BILL 1246 A BILL ENTITLED. Protection of Children from Online Predators Act of 2009

Ameri- can Thoracic Society, 1. Key definitions Authorized Users Outsource Provider Effective Date Fee Licensed Material Licensee

Title 17-A: MAINE CRIMINAL CODE

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as "the Contracting Parties";

Title 25: INTERNAL SECURITY AND PUBLIC SAFETY

Title 23: TRANSPORTATION

HOUSE BILL 1113 CHAPTER

Title 10: COMMERCE AND TRADE

This Article may be cited as the DNA Database and Databank Act of 1993.

CRIMES CODE (18 PA.C.S.) AND JUDICIAL CODE (42 PA.C.S.) - OMNIBUS AMENDMENTS Act of Nov. 29, 2006, P.L. 1567, No. 178 Cl. 18

offers the following substitute to HB 673: A BILL TO BE ENTITLED AN ACT

FREEDOM OF INFORMATION ACT PROCEDURES AND GUIDELINES

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

Title 13-B: MAINE NONPROFIT CORPORATION ACT

Title 22: HEALTH AND WELFARE

Strategic Partner Agreement Terms

Title 10: COMMERCE AND TRADE

Title 10: COMMERCE AND TRADE

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

Terms of Use. Last modified: January Acceptance of these Terms of Use

Title 22: HEALTH AND WELFARE

1. THE SYSTEM AND INFORMATION ACCESS

PRIVACY STATEMENT - TERMS & CONDITIONS. For users of Princh printing, copying and scanning services PRIVACY STATEMENT

TERMS OF USE. We may provide, through the Site, Services that include without limitation the:

UNIFORM RULES RELATING TO DISCOVERY OF ELECTRONICALLY STORED INFORMATION

This Agreement was last updated on June 14th, It is effective between You and Axosoft as of the date of You accepting this Agreement.

Title 17-A: MAINE CRIMINAL CODE

STORAGE TANK SYSTEM MANAGEMENT REGULATION

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code

NC General Statutes - Chapter 14 Article 60 1

Regulation of Interception of Act 18 Communications Act 2010

Terms of Use Terminated-Vested Cashout Website

RateForce, LLC Terms of Use Agreement

TERMS OF AND CONDITIONS OF THE APPLICATION

SaaS Software Escrow Agreement [Agreement Number EL ]

District of Columbia False Claims Act

Title 19-A: DOMESTIC RELATIONS

LME App Terms of Use [Google/ Android specific]

Title 10: COMMERCE AND TRADE

Title 26: LABOR AND INDUSTRY

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016

Remote Deposit Capture Application End User License Agreement

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

IT ACT Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT

Title 28-A: LIQUORS. Chapter 100: MAINE LIQUOR LIABILITY ACT. Table of Contents Part 8. LIQUOR LIABILITY...

Application Terms of Use

Title 17: CRIMES. Chapter 47: DISCRIMINATION. Table of Contents

B I L L. No. 30 An Act to amend The Freedom of Information and Protection of Privacy Act

Condominium Management Regulatory Authority of Ontario Access and Privacy Policy

CHAPTER 308B ELECTRONIC TRANSACTIONS

H 7688 S T A T E O F R H O D E I S L A N D

Terms and Conditions Database License Agreement ( Agreement )

THE COMPUTER MISUSE ACT, Arrangement of Sections PART I PRELIMINARY PART II OFFENCES

TERMS OF SERVICE AND END USER LICENSE AGREEMENT

Commission of an Offence relating to Computer Act, B.E (2007)

CRIMINAL JUSTICE, THE COURTS AND CORRECTIONS / PUBLIC SAFETY AND JUSTICE

NC General Statutes - Chapter 36F 1

Information Technology (Amendment) Act, 2008

REVISOR XX/BR

H 7304 SUBSTITUTE A AS AMENDED ======== LC004027/SUB A ======== S T A T E O F R H O D E I S L A N D

Transcription:

Title 17-A: MAINE CRIMINAL CODE Chapter 18: COMPUTER CRIMES Table of Contents Part 2. SUBSTANTIVE OFFENSES... Section 431. DEFINITIONS... 3 Section 432. CRIMINAL INVASION OF COMPUTER PRIVACY... 4 Section 433. AGGRAVATED CRIMINAL INVASION OF COMPUTER PRIVACY... 4 Section 434. PROSECUTION OF INVASION OF COMPUTER PRIVACY... 5 Section 435. ADDED JURISDICTION TO PROSECUTE... 5 Section 436. PERMANENT DESTRUCTION OF COMPUTER DATA ON A COMPUTER USED IN THE COMMISSION OF A CRIME... 6 Section 437. PERMISSIBLE DESTRUCTION OR TRANSFER OF OWNERSHIP TO THE STATE OF A COMPUTER USED IN THE COMMISSION OF A CRIME... 7 i

Text current through November 1, 2017, see disclaimer at end of document. ii

Maine Revised Statutes Title 17-A: MAINE CRIMINAL CODE Chapter 18: COMPUTER CRIMES 431. DEFINITIONS As used in this chapter, unless the context otherwise indicates, the following terms have the following meanings. [1989, c. 620, (NEW).] 1. "Access" means to gain logical entry into, instruct, communicate with, store data in or retrieve data from any computer resource. 2. "Computer" means an electronic, magnetic, optical, electrochemical or other high-speed data processing device performing logical, arithmetic or storage functions and includes any data storage device or communications facility directly related to or operating in conjunction with the device. [ 2013, c. 297, 1 (AMD).] 3. "Computer information" means a representation of information, knowledge, facts, concepts or instructions that are confidential or proprietary, are being prepared or have been prepared from an organized set of data and are located in computer memory or on magnetic, optical or mechanical media transferable directly to or useable directly by a computer as a source of data or instructions. 4. "Computer network" means a combination of one or more computers and communication facilities with the capability to transmit information among the devices or computers. 5. "Computer program" means an ordered set of data representing coded instructions or statements that, when executed by a computer, cause the computer to process data. 6. "Computer software" means a set of computer programs, procedures and associated documentation used in the operation of a computer system. 7. "Computer system" means any combination of a computer or computers with the documentation, computer software or physical facilities supporting the computer. 8. "Computer resource" means a computer program, computer software, computer system, computer network, computer information or any combination thereof. 11.3.2017 431. Definitions 3

9. "Computer virus" means any computer instruction, information, data or program that degrades the performance of a computer resource; disables, damages or destroys a computer resource; or attaches itself to another computer resource and executes when the host computer program, data or instruction is executed or when some other event takes place in the host computer resource, data or instruction. 9-A. "Criminal justice agency" means a governmental agency of the State or any subunit of a governmental agency of the State at any governmental level that performs the administration of criminal justice pursuant to statute. "Criminal justice agency" includes the Department of the Attorney General and district attorneys' offices. As used in this subsection, "administration of criminal justice" means activities relating to the investigation of all or specific crimes and the prosecution of offenders. [ 2013, c. 519, 7 (NEW).] 10. "Damage" means to destroy, alter, disrupt, delete, add, modify, or rearrange any computer resource by any means. 10-A. "Data storage device" means any computer or accessory device, designed for or capable of storing digital media or data, including, but not limited to, installed or transportable hard drives, memory cards and servers. [ 2013, c. 297, 2 (NEW).] 11. "Not authorized" and "unauthorized" mean not having consent or permission of the owner, or person licensed or authorized by the owner to grant consent or permission, to access or use any computer resource, or accessing or using any computer resource in a manner exceeding the consent or permission. 1989, c. 620, (NEW). 2013, c. 297, 1, 2 (AMD). 2013, c. 519, 7 (AMD). 432. CRIMINAL INVASION OF COMPUTER PRIVACY 1. A person is guilty of criminal invasion of computer privacy if the person intentionally accesses any computer resource knowing that the person is not authorized to do so. 2. Criminal invasion of computer privacy is a Class D crime. 1989, c. 620, (NEW). 433. AGGRAVATED CRIMINAL INVASION OF COMPUTER PRIVACY 1. A person is guilty of aggravated criminal invasion of computer privacy if the person: 4 432. Criminal invasion of computer privacy 11.3.2017

A. Intentionally makes an unauthorized copy of any computer program, computer software or computer information, knowing that the person is not authorized to do so; [1989, c. 620, (NEW).] B. Intentionally or knowingly damages any computer resource of another person, having no reasonable ground to believe that the person has the right to do so; or [1989, c. 620, (NEW).] C. Intentionally or knowingly introduces or allows the introduction of a computer virus into any computer resource, having no reasonable ground to believe that the person has the right to do so. [1989, c. 620, (NEW).] 2. Aggravated criminal invasion of computer privacy is a Class C crime. 1989, c. 620, (NEW). 434. PROSECUTION OF INVASION OF COMPUTER PRIVACY 1. The crime of criminal invasion of computer privacy as defined in section 432 may be prosecuted and punished in: A. The county in which the defendant was located when the defendant accessed the computer resource; or [2011, c. 133, 1 (NEW).] B. A county in which the computer resource was located. [2011, c. 133, 1 (NEW).] [ 2011, c. 133, 1 (NEW).] 2. The crime of aggravated criminal invasion of computer privacy as defined in section 433 may be prosecuted and punished in: A. The county in which the defendant was located when the defendant copied the computer program, computer software or computer information; [2011, c. 133, 1 (NEW).] B. The county in which the defendant was located when the defendant damaged the computer resource; [2011, c. 133, 1 (NEW).] C. The county in which the defendant was located when the defendant introduced or allowed the introduction of a computer virus into the computer resource; or [2011, c. 133, 1 (NEW).] D. A county in which the computer resource was located. [2011, c. 133, 1 (NEW).] [ 2011, c. 133, 1 (NEW).] 2011, c. 133, 1 (NEW). 435. ADDED JURISDICTION TO PROSECUTE 1. In addition to the State's having jurisdiction pursuant to section 7 to convict a person under section 432 or 433, the State has jurisdiction to convict a person under this chapter when that person is physically located outside of this State and the prohibited conduct: A. Occurs outside of this State and the victim of the crime is a resident of this State at the time of the crime; and [2011, c. 377, 1 (NEW).] 11.3.2017 434. Prosecution of invasion of computer privacy 5

B. Is sufficient under this section to constitute a crime in this State. [2011, c. 377, 1 (NEW).] [ 2011, c. 377, 1 (NEW).] 2. As used in this section, "resident" means a person who lives in this State either permanently or for an extended period. "Extended period" includes, but is not limited to, the period of time a student attends a school or college and the period of time a person serving in the Armed Forces of the United States is stationed in this State. [ 2011, c. 377, 1 (NEW).] 2011, c. 377, 1 (NEW). 436. PERMANENT DESTRUCTION OF COMPUTER DATA ON A COMPUTER USED IN THE COMMISSION OF A CRIME 1. If a person is convicted upon a finding of guilt or upon the acceptance of a plea of guilty or nolo contendere or found not criminally responsible of a violation of this Title, the State, after all appeal periods have run and those proceedings have concluded, may permanently destroy the computer data on any computer that was used to commit or facilitate the commission of that violation or cause the computer data to be permanently destroyed through the removal and destruction of any part of the computer in the possession of the State on which the computer data are stored. 2. Notwithstanding subsection 1, a criminal justice agency, prior to the destruction of computer data, may extract and provide computer data to a person if: A. Prior to the conclusion of criminal prosecution in the matter involving the computer data, the person provides written notification to the criminal justice agency having custody of the computer on which the computer data are stored that the person is interested in obtaining that computer data; [2013, c. 297, 3 (NEW).] B. The person either has an ownership interest in the computer data or wants the computer data only for the sentimental value of the data. When computer data are requested only for the sentimental value of the data, the person must state such in a written affidavit; [2013, c. 297, 3 (NEW).] C. The computer data that are the subject of the person's request may be lawfully disseminated; [2013, c. 297, 3 (NEW).] D. The computer data that are the subject of the person's request are not confidential by law; [2013, c. 297, 3 (NEW).] E. The computer data that are the subject of the request are specifically identified by the person making the request. For the purposes of this paragraph, "specifically identified" means identified with reasonable precision and not merely categorically; [2013, c. 297, 3 (NEW).] F. The criminal justice agency, in the judgment of the chief officer of the agency, determines the agency has the technological expertise, resources and personnel available to accommodate the request or to cause the request to be accommodated. The chief officer of the agency may consider whether there is a 3rd-party vendor that can accommodate the request if the chief officer determines the agency cannot accommodate the request for reasons provided in this paragraph. The chief officer of the agency subject to the request shall refer the request to an appropriate 3rd-party vendor for processing upon receipt by the chief officer of the agency of full payment from the requestor for the amount charged by the vendor to accommodate the request for information; and [2013, c. 297, 3 (NEW).] 6 436. Permanent destruction of computer data on a computer used in the commission of a crime 11.3.2017

G. Notwithstanding any provision of law to the contrary, the person requesting the computer data makes advance payment for the time and costs that the criminal justice agency estimates will be needed for the requested computer data to be extracted and provided by the agency or caused by the agency to be extracted and provided to the person. [2013, c. 297, 3 (NEW).] If the conditions identified in paragraphs A to G of this subsection are not met, the computer data that are the subject of the request may be permanently destroyed in accordance with subsection 1. The chief officer of the criminal justice agency that is subject to a request under this subsection shall respond to the requestor within 60 days from the date the request was received by the chief officer. The chief officer's response must include but is not limited to what actions if any the agency will take regarding the computer data identified in the request. 2013, c. 297, 3 (NEW). 437. PERMISSIBLE DESTRUCTION OR TRANSFER OF OWNERSHIP TO THE STATE OF A COMPUTER USED IN THE COMMISSION OF A CRIME 1. Notwithstanding any provision of law to the contrary and except as provided in subsection 3, the State may either permanently destroy or assume ownership of a computer that was used in the commission of a crime or that facilitated the commission of a crime if: A. A person is convicted upon a finding of guilt or upon the acceptance of a plea of guilty or nolo contendere or is found not criminally responsible of a crime committed using, or that was facilitated through the use of, the computer and all appeal periods have run and those proceedings have concluded; [2013, c. 297, 3 (NEW).] B. The opportunity for the computer to be forfeited to the State through proceedings at the presentencing stage has passed; and [2013, c. 297, 3 (NEW).] C. A person having a lawful property interest in the computer has not notified the State in writing within 6 months following a conviction upon a finding of guilt or upon the acceptance of a plea of guilty or nolo contendere or a finding of not criminally responsible that the person wants to take possession of the computer. The written notification must be made to the criminal justice agency having custody of the computer. [2013, c. 297, 3 (NEW).] If the State assumes ownership of a computer pursuant to this subsection, all computer data stored on the computer must be permanently destroyed by the State, or caused by the State to be permanently destroyed, in accordance with section 436. 2. A person who has a lawful property interest in a computer that was used to commit a crime or that facilitated the commission of a crime may take possession of the computer if: A. The person notifies the State in writing within 6 months following a conviction upon a finding of guilt or upon the acceptance of a plea of guilty or nolo contendere or a finding of not criminally responsible that a person committed a crime using, or that was facilitated by the use of, the computer and all appeal periods have run and those proceedings have concluded, that the person wants to take possession of that computer. The written notification must be made to the criminal justice agency having custody of the computer; [2013, c. 297, 3 (NEW).] B. The crime that was committed using, or that was facilitated through the use of, the computer is not a crime identified in chapter 12; and [2013, c. 297, 3 (NEW).] 11.3.2017 437. Permissible destruction or transfer of ownership to the State of a computer used in the commission of a crime 7

C. All computer data stored on the computer have been permanently destroyed pursuant to section 436. [2013, c. 297, 3 (NEW).] 3. Notwithstanding subsection 2, a person having a lawful property interest in a computer may not take possession of that computer if the crime that was committed using, or that was facilitated through the use of, the computer is a crime identified in chapter 12. Notwithstanding subsection 1, the computer may be permanently destroyed by the State, or caused by the State to be permanently destroyed, in accordance with section 436 if the crime that was committed using, or that was facilitated through the use of, the computer is a crime identified in chapter 12. When the State receives a notification from a person who wishes to take possession of a computer pursuant to subsection 2, the State must respond to that notification within 60 days from the date the notification was received by the State. The State's response must include but is not limited to what actions, if any, the State will take regarding the computer identified in the notification. 2013, c. 297, 3 (NEW). The State of Maine claims a copyright in its codified statutes. If you intend to republish this material, we require that you include the following disclaimer in your publication: All copyrights and other rights to statutory text are reserved by the State of Maine. The text included in this publication reflects changes made through the First Special Session of the 128th Maine Legislature and is current through November 1, 2017. The text is subject to change without notice. It is a version that has not been officially certified by the Secretary of State. Refer to the Maine Revised Statutes Annotated and supplements for certified text. The Office of the Revisor of Statutes also requests that you send us one copy of any statutory publication you may produce. Our goal is not to restrict publishing activity, but to keep track of who is publishing what, to identify any needless duplication and to preserve the State's copyright rights. PLEASE NOTE: The Revisor's Office cannot perform research for or provide legal advice or interpretation of Maine law to the public. If you need legal assistance, please contact a qualified attorney. 8 437. Permissible destruction or transfer of ownership to the State of a computer used in the commission of a crime 11.3.2017