Bill Text: NY S07382 | 2015-2016 | General Assembly | Introduced
Bill Title: Relates to computer-related crimes.
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Introduced - Dead) 2016-04-25 - REFERRED TO CODES [S07382 Detail]
Download: New_York-2015-S07382-Introduced.html
STATE OF NEW YORK ________________________________________________________________________ 7382 IN SENATE April 25, 2016 ___________ Introduced by Sen. SANDERS -- read twice and ordered printed, and when printed to be committed to the Committee on Codes AN ACT to amend the penal law and the education law, in relation to computer-related crimes The People of the State of New York, represented in Senate and Assem- bly, do enact as follows: 1 Section 1. Section 156.00 of the penal law, as amended by chapter 558 2 of the laws of 2006, is amended to read as follows: 3 § 156.00 Offenses involving computers; definition of terms. 4 The following definitions are applicable to this chapter except where 5 different meanings are expressly specified: 6 1. "Computer" means a device or group of devices which, by manipu- 7 lation of electronic, magnetic, optical or electrochemical impulses, 8 pursuant to a computer program, can automatically perform arithmetic, 9 logical, storage or retrieval operations with or on computer data, and 10 includes any connected or directly related device, equipment or facility 11 which enables such computer to store, retrieve or communicate to or from 12 a person, another computer or another device the results of computer 13 operations, computer programs or computer data. 14 2. "Computer program" is property and means an ordered set of data 15 representing coded instructions or statements that, when executed by 16 computer, cause the computer, computer system or computer network to 17 process data or direct the computer, computer system or computer network 18 to perform one or more computer operations or both and may be in any 19 form, including magnetic storage media, punched cards, or stored inter- 20 nally in the memory of the computer. 21 3. "Computer data" is property and means a representation of informa- 22 tion, knowledge, facts, concepts or instructions which are being proc- 23 essed, or have been processed in a computer and may be in any form, 24 including magnetic storage media, punched cards, or stored internally in 25 the memory of the computer. 26 4. "Computer service" means any and all services provided by or 27 through the facilities of any computer communication system allowing the 28 input, output, examination, or transfer, of computer data or computer EXPLANATION--Matter in italics (underscored) is new; matter in brackets [] is old law to be omitted. LBD13707-01-6S. 7382 2 1 programs from one computer to another , including, but not limited to, 2 computer time, data processing, storage functions, internet services, 3 electronic mail services, electronic message services, or other use of a 4 computer, computer system or computer network. 5 5. "Computer material" is property and means any computer data or 6 computer program which: 7 (a) contains records of the medical history or medical treatment of an 8 identified or readily identifiable individual or individuals. This term 9 shall not apply to the gaining access to or duplication solely of the 10 medical history or medical treatment records of a person by that person 11 or by another specifically authorized by the person whose records are 12 gained access to or duplicated; or 13 (b) contains records maintained by the state or any political subdivi- 14 sion thereof or any governmental instrumentality within the state which 15 contains any information concerning a person, as defined in subdivision 16 seven of section 10.00 of this chapter, which because of name, number, 17 symbol, mark or other identifier, can be used to identify the person and 18 which is otherwise prohibited by law from being disclosed. This term 19 shall not apply to the gaining access to or duplication solely of 20 records of a person by that person or by another specifically authorized 21 by the person whose records are gained access to or duplicated; or 22 (c) is not and is not intended to be available to anyone other than 23 the person or persons rightfully in possession thereof or selected 24 persons having access thereto with his, her or their consent and which 25 accords or may accord such rightful possessors an advantage over compet- 26 itors or other persons who do not have knowledge or the benefit thereof. 27 6. "Computer network" means the interconnection of hardwire or wire- 28 less communication lines with a computer through remote terminals, or a 29 complex consisting of two or more interconnected computers, including, 30 but not limited to, display terminals, remote systems, mobile devices, 31 and printers connected by computer facilities. 32 7. "Access" means to gain entry to, instruct, cause input to, cause 33 output from, cause data processing with, communicate with, store data 34 in, retrieve from, or otherwise make use of any resources of a computer, 35 computer system or computer network, physically, directly or by elec- 36 tronic means. 37 8. "Without authorization" means to use or to access a computer, 38 computer service or computer network without the permission of the owner 39 or lessor or someone licensed or privileged by the owner or lessor where 40 such person knew that his or her use or access was without permission or 41 after actual notice to such person that such use or access was without 42 permission. It shall also mean the access of a computer service by a 43 person without permission where such person knew that such access was 44 without permission or after actual notice to such person, that such 45 access was without permission. 46 Proof that such person used or accessed a computer, computer service 47 or computer network through the knowing use of a set of instructions, 48 code or computer program that bypasses, defrauds or otherwise circum- 49 vents a security measure installed or used with the user's authorization 50 on the computer, computer service or computer network shall be presump- 51 tive evidence that such person used or accessed such computer, computer 52 service or computer network without authorization. 53 9. "Felony" as used in this article means any felony defined in the 54 laws of this state or any offense defined in the laws of any other 55 jurisdiction for which a sentence to a term of imprisonment in excess of 56 one year is authorized in this state.S. 7382 3 1 10. "Computer system" means a device or collection of devices, includ- 2 ing support devices and excluding calculators that are not programmable 3 and capable of being used in conjunction with external files, one or 4 more of which contain computer programs, electronic instructions, input 5 data, and output data, that performs functions, including, but not 6 limited to, logic, arithmetic, data storage and retrieval, communi- 7 cation, and control. 8 11. "Government computer system" means any computer system, or part 9 thereof, that is owned, operated, or used by any federal, state, or 10 local governmental entity. 11 12. "Public safety infrastructure computer system" means any computer 12 system, or part thereof, that is necessary for the health and safety of 13 the public including computer systems owned, operated, or used by drink- 14 ing water and wastewater treatment facilities, hospitals, emergency 15 service providers, telecommunication companies, and gas and electric 16 utility companies. 17 13. "Supporting documentation" includes, but is not limited to, all 18 information, in any form, pertaining to the design, construction, clas- 19 sification, implementation, use, or modification of a computer, computer 20 system, computer network, computer program, or computer software, which 21 information is not generally available to the public and is necessary 22 for the operation of a computer, computer system, computer network, 23 computer program, or computer software. 24 14. "Injury" means any alteration, deletion, damage, or destruction of 25 a computer system, computer network, computer program, or data caused by 26 the access, or the denial of access to legitimate users of a computer 27 system, network, or program. 28 15. "Victim expenditure" means any expenditure reasonably and neces- 29 sarily incurred by the owner or lessee to verify that a computer system, 30 computer network, computer program, or data was or was not altered, 31 deleted, damaged, or destroyed by the access. 32 16. "Computer contaminant" means any set of computer instructions that 33 are designed to modify, damage, destroy, record, or transmit information 34 within a computer, computer system, or computer network without the 35 intent or permission of the owner of the information. They include, but 36 are not limited to, a group of computer instructions commonly called 37 viruses or worms, that are self-replicating or self-propagating and are 38 designed to contaminate other computer programs or computer data, 39 consume computer resources, modify, destroy, record, or transmit data, 40 or in some other fashion usurp the normal operation of the computer, 41 computer system, or computer network. 42 17. "Internet domain name" means a globally unique, hierarchical 43 reference to an internet host or service, assigned through centralized 44 internet naming authorities, comprising a series of character strings 45 separated by periods, with the rightmost character string specifying the 46 top of the hierarchy. 47 18. "Electronic mail" means an electronic message or computer file 48 that is transmitted between two or more telecommunications devices; 49 computers; computer networks, regardless of whether the network is a 50 local, regional, or global network; or electronic devices capable of 51 receiving electronic messages, regardless of whether the message is 52 converted to hard copy format after receipt, viewed upon transmission, 53 or stored for later retrieval. 54 19. "Profile" means either of the following:S. 7382 4 1 (a) a configuration of user data required by a computer so that the 2 user may access programs or services and have the desired functionality 3 on that computer; or 4 (b) an internet web site user's personal page or section of a page 5 that is made up of data, in text or graphical form, that displays 6 significant, unique, or identifying information, including, but not 7 limited to, listing acquaintances, interests, associations, activities, 8 or personal statements. 9 § 2. Section 156.29 of the penal law, as added by chapter 590 of the 10 laws of 2008, is amended to read as follows: 11 § 156.29 Unlawful duplication of computer related material in the second 12 degree. 13 A person is guilty of unlawful duplication of computer related materi- 14 al in the second degree when having no right to do so, he or she copies, 15 reproduces or duplicates or makes use of in any manner any data or 16 computer material [that contains records of the medical history or17medical treatment of an identified or readily identifiable individual or18individuals with an intent to commit or further the commission of any19crime under this chapter] from a computer, computer system, or computer 20 network or takes or copies any supporting documentation, whether exist- 21 ing or residing internal or external to a computer, computer system, or 22 computer network. 23 Unlawful duplication of computer related material in the second degree 24 is a class B misdemeanor. 25 § 3. Section 156.25 of the penal law, as amended by chapter 89 of the 26 laws of 1993, subdivision 2 as amended by chapter 376 of the laws of 27 1997, is amended to read as follows: 28 § 156.25 Computer tampering in the third degree. 29 A person is guilty of computer tampering in the third degree when he 30 or she commits the crime of computer tampering in the fourth degree and: 31 1. he or she does so with an intent: (a) to commit or attempt to 32 commit or further the commission of any felony, (b) to devise or execute 33 any scheme or artifice to defraud, deceive, or extort, or (c) to wrong- 34 fully control or obtain money, property or data; or 35 2. he or she has been previously convicted of any crime under this 36 article or subdivision eleven of section 165.15 of this chapter; or 37 3. he or she intentionally alters in any manner or destroys computer 38 material; or 39 4. he or she intentionally alters in any manner or destroys computer 40 data or a computer program so as to cause damages in an aggregate amount 41 exceeding one thousand dollars; or 42 5. he or she alters in any manner or destroys any data, computer soft- 43 ware, or computer programs which reside or exist internal or external to 44 a public safety infrastructure computer system computer, computer system 45 or computer network. 46 Computer tampering in the third degree is a class E felony. 47 § 4. The penal law is amended by adding a new section 156.45 to read 48 as follows: 49 § 156.45 Unlawful disruption of computer services in the second degree. 50 A person is guilty of unlawful disruption of computer services in the 51 second degree when he or she knowingly and without permission disrupts 52 or causes the disruption of computer services or denies or causes the 53 denial of computer services to an authorized user of a computer, comput- 54 er system, or computer network. 55 Unlawful disruption of computer services in the second degree is a 56 class A misdemeanor.S. 7382 5 1 § 5. The penal law is amended by adding a new section 156.46 to read 2 as follows: 3 § 156.46 Unlawful disruption of computer services in the first degree. 4 A person is guilty of unlawful disruption of computer services in the 5 first degree when he or she commits the crime of unlawful disruption of 6 computer services in the second degree and: 7 1. he or she disrupts government computer services or denies or causes 8 the denial of government computer services to an authorized user of a 9 government computer, computer system, or computer network; or 10 2. he or she disrupts public safety infrastructure computer system 11 computer services or denies or causes the denial of computer services to 12 an authorized user of a public safety infrastructure computer system 13 computer, computer system, or computer network. 14 Unlawful disruption of computer services in the second degree is a 15 class E felony. 16 § 6. The penal law is amended by adding a new section 156.15 to read 17 as follows: 18 § 156.15 Unlawful computer access assistance in the second degree. 19 A person is guilty of unlawful computer access assistance in the 20 second degree when he or she knowingly and without permission provides 21 or assists in providing a means of accessing a computer, computer 22 system, or computer network in violation of this article. 23 Unlawful computer access assistance in the second degree is a class A 24 misdemeanor. 25 § 7. The penal law is amended by adding a new section 156.16 to read 26 as follows: 27 § 156.16 Unlawful computer access assistance in the first degree. 28 A person is guilty of unlawful computer access assistance in the first 29 degree when he or she commits the crime of unlawful computer access 30 assistance in the second degree and provides or assists in providing a 31 means of accessing a public safety infrastructure computer system 32 computer, computer system or computer network in violation of this arti- 33 cle. 34 Unlawful computer access assistance in the first degree is a class E 35 felony. 36 § 8. The penal law is amended by adding a new section 156.12 to read 37 as follows: 38 § 156.12 Unauthorized use of internet domain name or profile. 39 A person is guilty of unauthorized use of internet domain name or 40 profile when he or she knowingly and without permission uses the inter- 41 net domain name or profile of another individual, corporation, or entity 42 in connection with the sending of one or more electronic mail messages 43 or posts and thereby damages or causes damage to a computer, computer 44 data, computer system or computer network. 45 Unauthorized use of internet domain name or profile is a class A 46 misdemeanor. 47 § 9. The penal law is amended by adding a new section 156.37 to read 48 as follows: 49 § 156.37 Unlawful introduction of a computer contaminant. 50 A person is guilty of unlawful introduction of a computer contaminant 51 when he or she knowingly introduces a computer contaminant into any 52 computer, computer system, or computer network. 53 Unlawful introduction of a computer contaminant is a class A misdemea- 54 nor. 55 § 10. The penal law is amended by adding a new section 156.55 to read 56 as follows:S. 7382 6 1 § 156.55 Civil actions. 2 1. In addition to any other civil remedy available, the owner or 3 lessee of the computer, computer system, computer network, computer 4 program, or data who suffers damage or loss by reason of a violation of 5 any section of this article may bring a civil action against the viola- 6 tor for compensatory damages and injunctive relief or other equitable 7 relief. Compensatory damages shall include any expenditure reasonably 8 and necessarily incurred by the owner or lessee to verify that a comput- 9 er system, computer network, computer program, or data was or was not 10 altered, damaged, or deleted by the access. In any action brought pursu- 11 ant to this section, the court may award reasonable attorney's fees. For 12 the purposes of actions authorized by this section, the conduct of an 13 unemancipated minor shall be imputed to the parent or legal guardian 14 having control or custody of the minor. 15 2. No action may be brought pursuant to this section for a willful 16 violation of this article unless it is initiated within three years of 17 the date of the act complained of, or the date of the discovery of the 18 damage, whichever is later. 19 § 11. The penal law is amended by adding a new section 156.60 to read 20 as follows: 21 § 156.60 Offenses involving computers; forfeiture. 22 Any computer, computer system, computer network, or any software or 23 data, owned by the defendant, that is used during the commission of any 24 offense described in this article or any computer, owned by the defend- 25 ant, which is used as a repository for the storage of software or data 26 illegally obtained in violation of this article shall be subject to 27 forfeiture. 28 § 12. Subdivision 1 of section 6430 of the education law, as amended 29 by chapter 75 of the laws of 2004, is amended to read as follows: 30 1. The trustees or other governing board of every college chartered by 31 the regents or incorporated by special act of the legislature and which 32 maintains a campus, unless otherwise provided, shall adopt written rules 33 for implementing all policies required pursuant to this article and for 34 the maintenance of public order on college campuses and other college 35 property used for educational purposes and provide a program for the 36 enforcement thereof. Such rules shall prohibit, among other things, any 37 action or situation which recklessly or intentionally endangers mental 38 or physical health or involves the forced consumption of liquor or drugs 39 for the purpose of initiation into or affiliation with any organization. 40 Such rules shall govern the conduct of students, faculty and other staff 41 as well as visitors and other licensees and invitees on such campuses 42 and property and shall include computer-related crimes as a specific 43 violation of such rules. The penalties for violations of such rules 44 shall be clearly set forth therein and shall include provisions for the 45 ejection of a violator from such campus and property, in the case of a 46 student or faculty violator his or her suspension, expulsion, or other 47 appropriate disciplinary action, and in the case of an organization 48 which authorizes such conduct, recision of permission for that organiza- 49 tion to operate on campus property and shall also include penalties for 50 computer-related crimes that may subject a student to disciplinary sanc- 51 tions up to and including dismissal from the institution. Such penal- 52 ties shall be in addition to any penalty pursuant to the penal law or 53 any other law to which a violator or organization may be subject. 54 § 13. This act shall take effect on the one hundred eightieth day 55 after it shall have become a law.