Checkout our iOS App for a better way to browser and research.
(1) An unauthorized user of a protected computer may not, knowingly and with intent to cause harm or damage:
(a) obtain information from the protected computer and, as a result, cause harm or damage;
(b) cause the transmission of a program, code, or command to the protected computer, and, as a result of the transmission, cause harm or loss; or
(c) traffic in any technological access barrier that an unauthorized user could use to access the protected computer.
(2) An individual who violates Subsection (1) is liable to a protected computer's owner in a civil action for the remedies described in Section 63D-3-105.