Chapter 33 Computer Crimes Section 33.01 Definitions - Texas Penal Code

§ 33.01. Definitions

In this chapter:

(1) "Access" means to approach, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a computer, computer network, computer program, or computer system.

(2) "Aggregate amount" means the amount of:

(A) any direct or indirect loss incurred by a victim, including the value of money, property, or service stolen or rendered unrecoverable by the offense; or

(B) any expenditure required by the victim to verify that a computer, computer network, computer program, or computer system was not altered, acquired, damaged, deleted, or disrupted by the offense.

(3) "Communications common carrier" means a person who owns or operates a telephone system in this state that includes equipment or facilities for the conveyance, transmission, or reception of communications and who receives compensation from persons who use that system.

(4) "Computer" means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device that performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses and includes all input, output, processing, storage, or communication facilities that are connected or related to the device.

(5) "Computer network" means the interconnection of two or more computers or computer systems by satellite, microwave, line, or other communication medium with the capability to transmit information among the computers.

(6) "Computer program" means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data or perform specific functions.

(7) "Computer services" means the product of the use of a computer, the information stored in the computer, or the personnel supporting the computer, including computer time, data processing, and storage functions.

(8) "Computer system" means any combination of a computer or computer network with the documentation, computer software, or physical facilities supporting the computer or computer network.

(9) "Computer software" means a set of computer programs, procedures, and associated documentation related to the operation of a computer, computer system, or computer network.

(10) "Computer virus" means an unwanted computer program or other set of instructions inserted into a computer's memory, operating system, or program that is specifically constructed with the ability to replicate itself or to affect the other programs or files in the computer by attaching a copy of the unwanted program or other set of instructions to one or more computer programs or files.

(11) "Data" means a representation of information, knowledge, facts, concepts, or instructions that is being prepared or has been prepared in a formalized manner and is intended to be stored or processed, is being stored or processed, or has been stored or processed in a computer. Data may be embodied in any form, including but not limited to computer printouts, magnetic storage media, laser storage media, and punchcards, or may be stored internally in the memory of the computer.

(12) "Effective consent" includes consent by a person legally authorized to act for the owner. Consent is not effective if:

(A) induced by deception, as defined by Section 31.01, or induced by coercion;

(B) given by a person the actor knows is not legally authorized to act for the owner;

(C) given by a person who by reason of youth, mental disease or defect, or intoxication is known by the actor to be unable to make reasonable property dispositions;

(D) given solely to detect the commission of an offense; or

(E) used for a purpose other than that for which the consent was given.

(13) "Electric utility" has the meaning assigned by Section 31.002, Utilities Code.

(14) "Harm" includes partial or total alteration, damage, or erasure of stored data, interruption of computer services, introduction of a computer virus, or any other loss, disadvantage, or injury that might reasonably be suffered as a result of the actor's conduct.

(15) "Owner" means a person who:

(A) has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor;

(B) has the right to restrict access to the property; or

(C) is the licensee of data or computer software.

(16) "Property" means:

(A) tangible or intangible personal property including a computer, computer system, computer network, computer software, or data; or

(B) the use of a computer, computer system, computer network, computer software, or data.

Trackbacks (0) Links to blogs that reference this article Trackback URL
http://blog.austindefense.com/admin/trackback/15898
Comments (2) Read through and enter the discussion with the form at the end
bryan glazer - January 10, 2008 12:21 AM

Seeking attorney to initiate civil action against global media corporation and its employee for computer tampering, intentional infliction of emotional distress, damage to property and slander among other torts and offenses.

Case involves my former employee who went on to work for a competitor. Former employeE tampered with my home and office computers. He was arrested by NYPD for aggravated harassment. The case was wrongfully dismissed. His employer told polce that the defendent, its employee, was the victim of harassment. The defendant submitted tampered physical evidence to corroborate dishonest allegations.

NY County DA's Office has reopened investigation. Forensic evidence proves defendant initiated computer tampering, internet intrusuons, wire fraud, electronic eavesdropping from current employer's IP address.

Defendant's current employer had been advised of criminal acts on several ocassions, but took no action to curtail illegal activities.

Victim has substained measurable damages to business. Victim has spent upward of $100,000.00 on forensics , legal and private investigation fees.

Victim's business has substainted significant damages.

Seeking PI attorney based on contingency fee.

Defendant's employer has deep pockets.

video game rentals netflix - March 2, 2012 9:53 PM

I am not very great with English but I get hold this rattling easygoing to interpret .

Post A Comment / Question Use this form to add a comment to this entry.







Remember personal info?