Bill Text: NY S07382 | 2015-2016 | General Assembly | Introduced


Bill Title: Relates to computer-related crimes.

Spectrum: Partisan Bill (Democrat 1-0)

Status: (Introduced - Dead) 2016-04-25 - REFERRED TO CODES [S07382 Detail]

Download: New_York-2015-S07382-Introduced.html


                STATE OF NEW YORK
        ________________________________________________________________________
                                          7382
                    IN SENATE
                                     April 25, 2016
                                       ___________
        Introduced  by  Sen. SANDERS -- read twice and ordered printed, and when
          printed to be committed to the Committee on Codes
        AN ACT to amend the penal law and the  education  law,  in  relation  to
          computer-related crimes
          The  People of the State of New York, represented in Senate and Assem-
        bly, do enact as follows:
     1    Section 1. Section 156.00 of the penal law, as amended by chapter  558
     2  of the laws of 2006, is amended to read as follows:
     3  § 156.00 Offenses involving computers; definition of terms.
     4    The  following definitions are applicable to this chapter except where
     5  different meanings are expressly specified:
     6    1. "Computer" means a device or group of  devices  which,  by  manipu-
     7  lation  of  electronic,  magnetic,  optical or electrochemical impulses,
     8  pursuant to a computer program, can  automatically  perform  arithmetic,
     9  logical,  storage  or retrieval operations with or on computer data, and
    10  includes any connected or directly related device, equipment or facility
    11  which enables such computer to store, retrieve or communicate to or from
    12  a person, another computer or another device  the  results  of  computer
    13  operations, computer programs or computer data.
    14    2.  "Computer  program"  is  property and means an ordered set of data
    15  representing coded instructions or statements  that,  when  executed  by
    16  computer,  cause  the  computer,  computer system or computer network to
    17  process data or direct the computer, computer system or computer network
    18  to perform one or more computer operations or both and  may  be  in  any
    19  form,  including magnetic storage media, punched cards, or stored inter-
    20  nally in the memory of the computer.
    21    3. "Computer data" is property and means a representation of  informa-
    22  tion,  knowledge,  facts, concepts or instructions which are being proc-
    23  essed, or have been processed in a computer and  may  be  in  any  form,
    24  including magnetic storage media, punched cards, or stored internally in
    25  the memory of the computer.
    26    4.  "Computer  service"  means  any  and  all  services provided by or
    27  through the facilities of any computer communication system allowing the
    28  input, output, examination, or transfer, of computer  data  or  computer
         EXPLANATION--Matter in italics (underscored) is new; matter in brackets
                              [ ] is old law to be omitted.
                                                                   LBD13707-01-6

        S. 7382                             2
     1  programs  from  one computer to another , including, but not limited to,
     2  computer time, data processing, storage  functions,  internet  services,
     3  electronic mail services, electronic message services, or other use of a
     4  computer, computer system or computer network.
     5    5.  "Computer  material"  is  property  and means any computer data or
     6  computer program which:
     7    (a) contains records of the medical history or medical treatment of an
     8  identified or readily identifiable individual or individuals. This  term
     9  shall  not  apply  to the gaining access to or duplication solely of the
    10  medical history or medical treatment records of a person by that  person
    11  or  by  another  specifically authorized by the person whose records are
    12  gained access to or duplicated; or
    13    (b) contains records maintained by the state or any political subdivi-
    14  sion thereof or any governmental instrumentality within the state  which
    15  contains  any information concerning a person, as defined in subdivision
    16  seven of section 10.00 of this chapter, which because of  name,  number,
    17  symbol, mark or other identifier, can be used to identify the person and
    18  which  is  otherwise  prohibited  by law from being disclosed. This term
    19  shall not apply to the  gaining  access  to  or  duplication  solely  of
    20  records of a person by that person or by another specifically authorized
    21  by the person whose records are gained access to or duplicated; or
    22    (c)  is  not  and is not intended to be available to anyone other than
    23  the person or persons  rightfully  in  possession  thereof  or  selected
    24  persons  having  access thereto with his, her or their consent and which
    25  accords or may accord such rightful possessors an advantage over compet-
    26  itors or other persons who do not have knowledge or the benefit thereof.
    27    6. "Computer network" means the interconnection of hardwire  or  wire-
    28  less  communication lines with a computer through remote terminals, or a
    29  complex consisting of two or more interconnected  computers,  including,
    30  but  not  limited to, display terminals, remote systems, mobile devices,
    31  and printers connected by computer facilities.
    32    7. "Access" means to gain entry to, instruct, cause  input  to,  cause
    33  output  from,  cause  data processing with, communicate with, store data
    34  in, retrieve from, or otherwise make use of any resources of a computer,
    35  computer system or computer network, physically, directly  or  by  elec-
    36  tronic means.
    37    8.  "Without  authorization"  means  to  use  or to access a computer,
    38  computer service or computer network without the permission of the owner
    39  or lessor or someone licensed or privileged by the owner or lessor where
    40  such person knew that his or her use or access was without permission or
    41  after actual notice to such person that such use or access  was  without
    42  permission.  It  shall  also  mean the access of a computer service by a
    43  person without permission where such person knew that  such  access  was
    44  without  permission  or  after  actual  notice to such person, that such
    45  access was without permission.
    46    Proof that such person used or accessed a computer,  computer  service
    47  or  computer  network  through the knowing use of a set of instructions,
    48  code or computer program that bypasses, defrauds  or  otherwise  circum-
    49  vents a security measure installed or used with the user's authorization
    50  on  the computer, computer service or computer network shall be presump-
    51  tive evidence that such person used or accessed such computer,  computer
    52  service or computer network without authorization.
    53    9.  "Felony"  as  used in this article means any felony defined in the
    54  laws of this state or any offense defined  in  the  laws  of  any  other
    55  jurisdiction for which a sentence to a term of imprisonment in excess of
    56  one year is authorized in this state.

        S. 7382                             3
     1    10. "Computer system" means a device or collection of devices, includ-
     2  ing  support devices and excluding calculators that are not programmable
     3  and capable of being used in conjunction with  external  files,  one  or
     4  more  of which contain computer programs, electronic instructions, input
     5  data,  and  output  data,  that  performs  functions, including, but not
     6  limited to, logic, arithmetic,  data  storage  and  retrieval,  communi-
     7  cation, and control.
     8    11.  "Government  computer  system" means any computer system, or part
     9  thereof, that is owned, operated, or used  by  any  federal,  state,  or
    10  local governmental entity.
    11    12.  "Public safety infrastructure computer system" means any computer
    12  system, or part thereof, that is necessary for the health and safety  of
    13  the public including computer systems owned, operated, or used by drink-
    14  ing  water  and  wastewater  treatment  facilities, hospitals, emergency
    15  service providers, telecommunication companies,  and  gas  and  electric
    16  utility companies.
    17    13.  "Supporting  documentation"  includes, but is not limited to, all
    18  information, in any form, pertaining to the design, construction,  clas-
    19  sification, implementation, use, or modification of a computer, computer
    20  system,  computer network, computer program, or computer software, which
    21  information is not generally available to the public  and  is  necessary
    22  for  the  operation  of  a  computer, computer system, computer network,
    23  computer program, or computer software.
    24    14. "Injury" means any alteration, deletion, damage, or destruction of
    25  a computer system, computer network, computer program, or data caused by
    26  the access, or the denial of access to legitimate users  of  a  computer
    27  system, network, or program.
    28    15.  "Victim  expenditure" means any expenditure reasonably and neces-
    29  sarily incurred by the owner or lessee to verify that a computer system,
    30  computer network, computer program, or data  was  or  was  not  altered,
    31  deleted, damaged, or destroyed by the access.
    32    16. "Computer contaminant" means any set of computer instructions that
    33  are designed to modify, damage, destroy, record, or transmit information
    34  within  a  computer,  computer  system,  or computer network without the
    35  intent or permission of the owner of the information. They include,  but
    36  are  not  limited  to,  a group of computer instructions commonly called
    37  viruses or worms, that are self-replicating or self-propagating and  are
    38  designed  to  contaminate  other  computer  programs  or  computer data,
    39  consume computer resources, modify, destroy, record, or  transmit  data,
    40  or  in  some  other  fashion usurp the normal operation of the computer,
    41  computer system, or computer network.
    42    17. "Internet domain  name"  means  a  globally  unique,  hierarchical
    43  reference  to  an internet host or service, assigned through centralized
    44  internet naming authorities, comprising a series  of  character  strings
    45  separated by periods, with the rightmost character string specifying the
    46  top of the hierarchy.
    47    18.  "Electronic  mail"  means  an electronic message or computer file
    48  that is transmitted between  two  or  more  telecommunications  devices;
    49  computers;  computer  networks,  regardless  of whether the network is a
    50  local, regional, or global network; or  electronic  devices  capable  of
    51  receiving  electronic  messages,  regardless  of  whether the message is
    52  converted to hard copy format after receipt, viewed  upon  transmission,
    53  or stored for later retrieval.
    54    19. "Profile" means either of the following:

        S. 7382                             4
     1    (a)  a  configuration  of user data required by a computer so that the
     2  user may access programs or services and have the desired  functionality
     3  on that computer; or
     4    (b)  an  internet  web  site user's personal page or section of a page
     5  that is made up of data,  in  text  or  graphical  form,  that  displays
     6  significant,  unique,  or  identifying  information,  including, but not
     7  limited to, listing acquaintances, interests, associations,  activities,
     8  or personal statements.
     9    §  2.  Section 156.29 of the penal law, as added by chapter 590 of the
    10  laws of 2008, is amended to read as follows:
    11  § 156.29 Unlawful duplication of computer related material in the second
    12             degree.
    13    A person is guilty of unlawful duplication of computer related materi-
    14  al in the second degree when having no right to do so, he or she copies,
    15  reproduces or duplicates or makes use of  in  any  manner  any  data  or
    16  computer  material  [that  contains  records  of  the medical history or
    17  medical treatment of an identified or readily identifiable individual or
    18  individuals with an intent to commit or further the  commission  of  any
    19  crime  under this chapter] from a computer, computer system, or computer
    20  network or takes or copies any supporting documentation, whether  exist-
    21  ing  or residing internal or external to a computer, computer system, or
    22  computer network.
    23    Unlawful duplication of computer related material in the second degree
    24  is a class B misdemeanor.
    25    § 3. Section 156.25 of the penal law, as amended by chapter 89 of  the
    26  laws  of  1993,  subdivision  2 as amended by chapter 376 of the laws of
    27  1997, is amended to read as follows:
    28  § 156.25 Computer tampering in the third degree.
    29    A person is guilty of computer tampering in the third degree  when  he
    30  or she commits the crime of computer tampering in the fourth degree and:
    31    1.  he  or  she  does  so  with an intent: (a) to commit or attempt to
    32  commit or further the commission of any felony, (b) to devise or execute
    33  any scheme or artifice to defraud, deceive, or extort, or (c) to  wrong-
    34  fully control or obtain money, property or data; or
    35    2.  he  or  she  has been previously convicted of any crime under this
    36  article or subdivision eleven of section 165.15 of this chapter; or
    37    3. he or she intentionally alters in any manner or  destroys  computer
    38  material; or
    39    4.  he  or she intentionally alters in any manner or destroys computer
    40  data or a computer program so as to cause damages in an aggregate amount
    41  exceeding one thousand dollars; or
    42    5. he or she alters in any manner or destroys any data, computer soft-
    43  ware, or computer programs which reside or exist internal or external to
    44  a public safety infrastructure computer system computer, computer system
    45  or computer network.
    46    Computer tampering in the third degree is a class E felony.
    47    § 4. The penal law is amended by adding a new section 156.45  to  read
    48  as follows:
    49  § 156.45 Unlawful disruption of computer services in the second degree.
    50    A  person is guilty of unlawful disruption of computer services in the
    51  second degree when he or she knowingly and without  permission  disrupts
    52  or  causes  the  disruption of computer services or denies or causes the
    53  denial of computer services to an authorized user of a computer, comput-
    54  er system, or computer network.
    55    Unlawful disruption of computer services in the  second  degree  is  a
    56  class A misdemeanor.

        S. 7382                             5
     1    §  5.  The penal law is amended by adding a new section 156.46 to read
     2  as follows:
     3  § 156.46 Unlawful disruption of computer services in the first degree.
     4    A  person is guilty of unlawful disruption of computer services in the
     5  first degree when he or she commits the crime of unlawful disruption  of
     6  computer services in the second degree and:
     7    1. he or she disrupts government computer services or denies or causes
     8  the  denial  of  government computer services to an authorized user of a
     9  government computer, computer system, or computer network; or
    10    2. he or she disrupts public  safety  infrastructure  computer  system
    11  computer services or denies or causes the denial of computer services to
    12  an  authorized  user  of  a public safety infrastructure computer system
    13  computer, computer system, or computer network.
    14    Unlawful disruption of computer services in the  second  degree  is  a
    15  class E felony.
    16    §  6.  The penal law is amended by adding a new section 156.15 to read
    17  as follows:
    18  § 156.15 Unlawful computer access assistance in the second degree.
    19    A person is guilty of  unlawful  computer  access  assistance  in  the
    20  second  degree  when he or she knowingly and without permission provides
    21  or assists in providing  a  means  of  accessing  a  computer,  computer
    22  system, or computer network in violation of this article.
    23    Unlawful  computer access assistance in the second degree is a class A
    24  misdemeanor.
    25    § 7. The penal law is amended by adding a new section 156.16  to  read
    26  as follows:
    27  § 156.16 Unlawful computer access assistance in the first degree.
    28    A person is guilty of unlawful computer access assistance in the first
    29  degree  when  he  or  she  commits the crime of unlawful computer access
    30  assistance in the second degree and provides or assists in  providing  a
    31  means  of  accessing  a  public  safety  infrastructure  computer system
    32  computer, computer system or computer network in violation of this arti-
    33  cle.
    34    Unlawful computer access assistance in the first degree is a  class  E
    35  felony.
    36    §  8.  The penal law is amended by adding a new section 156.12 to read
    37  as follows:
    38  § 156.12 Unauthorized use of internet domain name or profile.
    39    A person is guilty of unauthorized use  of  internet  domain  name  or
    40  profile  when he or she knowingly and without permission uses the inter-
    41  net domain name or profile of another individual, corporation, or entity
    42  in connection with the sending of one or more electronic  mail  messages
    43  or  posts  and  thereby damages or causes damage to a computer, computer
    44  data, computer system or computer network.
    45    Unauthorized use of internet domain name  or  profile  is  a  class  A
    46  misdemeanor.
    47    §  9.  The penal law is amended by adding a new section 156.37 to read
    48  as follows:
    49  § 156.37 Unlawful introduction of a computer contaminant.
    50    A person is guilty of unlawful introduction of a computer  contaminant
    51  when  he  or  she  knowingly  introduces a computer contaminant into any
    52  computer, computer system, or computer network.
    53    Unlawful introduction of a computer contaminant is a class A misdemea-
    54  nor.
    55    § 10. The penal law is amended by adding a new section 156.55 to  read
    56  as follows:

        S. 7382                             6
     1  § 156.55 Civil actions.
     2    1.  In  addition  to  any  other  civil remedy available, the owner or
     3  lessee of the computer,  computer  system,  computer  network,  computer
     4  program,  or data who suffers damage or loss by reason of a violation of
     5  any section of this article may bring a civil action against the  viola-
     6  tor  for  compensatory  damages and injunctive relief or other equitable
     7  relief.  Compensatory damages shall include any  expenditure  reasonably
     8  and necessarily incurred by the owner or lessee to verify that a comput-
     9  er  system,  computer  network, computer program, or data was or was not
    10  altered, damaged, or deleted by the access. In any action brought pursu-
    11  ant to this section, the court may award reasonable attorney's fees. For
    12  the purposes of actions authorized by this section, the  conduct  of  an
    13  unemancipated  minor  shall  be  imputed to the parent or legal guardian
    14  having control or custody of the minor.
    15    2. No action may be brought pursuant to this  section  for  a  willful
    16  violation  of  this article unless it is initiated within three years of
    17  the date of the act complained of, or the date of the discovery  of  the
    18  damage, whichever is later.
    19    §  11. The penal law is amended by adding a new section 156.60 to read
    20  as follows:
    21  § 156.60 Offenses involving computers; forfeiture.
    22    Any computer, computer system, computer network, or  any  software  or
    23  data,  owned by the defendant, that is used during the commission of any
    24  offense described in this article or any computer, owned by the  defend-
    25  ant,  which  is used as a repository for the storage of software or data
    26  illegally obtained in violation of this  article  shall  be  subject  to
    27  forfeiture.
    28    §  12.  Subdivision 1 of section 6430 of the education law, as amended
    29  by chapter 75 of the laws of 2004, is amended to read as follows:
    30    1. The trustees or other governing board of every college chartered by
    31  the regents or incorporated by special act of the legislature and  which
    32  maintains a campus, unless otherwise provided, shall adopt written rules
    33  for  implementing all policies required pursuant to this article and for
    34  the maintenance of public order on college campuses  and  other  college
    35  property  used  for  educational  purposes and provide a program for the
    36  enforcement thereof. Such rules shall prohibit, among other things,  any
    37  action  or  situation which recklessly or intentionally endangers mental
    38  or physical health or involves the forced consumption of liquor or drugs
    39  for the purpose of initiation into or affiliation with any organization.
    40  Such rules shall govern the conduct of students, faculty and other staff
    41  as well as visitors and other licensees and invitees  on  such  campuses
    42  and  property  and  shall  include computer-related crimes as a specific
    43  violation of such rules.   The penalties for violations  of  such  rules
    44  shall  be clearly set forth therein and shall include provisions for the
    45  ejection of a violator from such campus and property, in the case  of  a
    46  student  or  faculty violator his or her suspension, expulsion, or other
    47  appropriate disciplinary action, and in  the  case  of  an  organization
    48  which authorizes such conduct, recision of permission for that organiza-
    49  tion  to operate on campus property and shall also include penalties for
    50  computer-related crimes that may subject a student to disciplinary sanc-
    51  tions up to and including dismissal from the institution.   Such  penal-
    52  ties  shall  be  in addition to any penalty pursuant to the penal law or
    53  any other law to which a violator or organization may be subject.
    54    § 13. This act shall take effect on  the  one  hundred  eightieth  day
    55  after it shall have become a law.
feedback