Prohibited acts.

Checkout our iOS App for a better way to browser and research.



  • (1) An unauthorized user of a protected computer may not, knowingly and with intent to cause harm or damage:
    • (a) obtain information from the protected computer and, as a result, cause harm or damage;
    • (b) cause the transmission of a program, code, or command to the protected computer, and, as a result of the transmission, cause harm or loss; or
    • (c) traffic in any technological access barrier that an unauthorized user could use to access the protected computer.
  • (2) An individual who violates Subsection (1) is liable to a protected computer's owner in a civil action for the remedies described in Section 63D-3-105.




Download our app to see the most-to-date content.