Prosecution of invasion of computer privacy

Checkout our iOS App for a better way to browser and research.

§434. Prosecution of invasion of computer privacy

1.  The crime of criminal invasion of computer privacy as defined in section 432 may be prosecuted and punished in:  

A. The county in which the defendant was located when the defendant accessed the computer resource; or   [PL 2011, c. 133, §1 (NEW).]

B. A county in which the computer resource was located.   [PL 2011, c. 133, §1 (NEW).]

[PL 2011, c. 133, §1 (NEW).]

2.  The crime of aggravated criminal invasion of computer privacy as defined in section 433 may be prosecuted and punished in:  

A. The county in which the defendant was located when the defendant copied the computer program, computer software or computer information;   [PL 2011, c. 133, §1 (NEW).]

B. The county in which the defendant was located when the defendant damaged the computer resource;   [PL 2011, c. 133, §1 (NEW).]

C. The county in which the defendant was located when the defendant introduced or allowed the introduction of a computer virus into the computer resource; or   [PL 2011, c. 133, §1 (NEW).]

D. A county in which the computer resource was located.   [PL 2011, c. 133, §1 (NEW).]

[PL 2011, c. 133, §1 (NEW).]

SECTION HISTORY

PL 2011, c. 133, §1 (NEW).


Download our app to see the most-to-date content.