/* R FRINGE COMMENTARY: Here's the Wyoming Computer Crimes Law, Wyoming Criminal Code, Section 6-3-501, adopted in 1982/1983 */ SECTION 6-3-501 Definitions As used in this article: (i) "Access" means to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any of the resources of a computer, computer system, or computer network; (ii) "Computer" means an internally programmed, automatic device which performs data processing; (iii) "Computer network" means a set of related, remotely connected devices and communications facilities including more than one (1) a computer system with capability to transmit data among them through communication facilities; (iv) "Computer program" means an ordered set of data representing coded instructions or statements which when executed by a computer cause the computer to process data; (v) "Computer software" means a set of computer programs, procedures and associated documentation concerned with the operation of a computer system; (vi) "Computer system" means a set of related, connected or unconnected, computer equipment, devices and computer software; (vii) "Computer system services" means providing a computer system or computer network to perform useful work; (viii) "Financial instrument" means a check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, or marketable security; (ix) "Intellectual property" means data, including programs; (x) "Property" includes financial instruments, information, electronically produced data, computer software and programs in machine-readable and human-readable form; (xi) "Trade secret" means the whole or a portion or phase of a formula, pattern, device, combination of devices or compilation of information which is for use, or is used in the operation of a business and which provides the business an advantage or opportunity to obtain an advantage or opportunity to obtain an advantage over those who do not know or use it. "Trade secret" includes any scientific, technical or commercial information including any design, process, procedure, list of suppliers, list of customers, business code or improvement thereof. Irrespective of novelty, invention, patentability, the state of the prior art and the level of skill in the business, art or field to which the subject matter pertains, when the owner of a trade secret takes measures to prevent it from becoming available to persons other than those selected by the owner to have access to it for limited purposes, the trade secret is considered to be: (A) Secret; (B) Of value; (C) For use or in use by the business; and (D) Providing an advantage or an opportunity to obtain an advantage to the business owner over those who do not know or use it. SECTION 6-3-502 Crimes against intellectual property; penalties (a) A person commits a crime against intellectual property if he knowingly and without authorization: (i) Modifies data, programs or supporting documentation residing or existing internal or external to a computer, computer system or computer network; (ii) Destroys data, programs or supporting documentation residing or existing internal or external to a computer, computer system or computer network; (iii) Discloses or takes data, programs, or supporting documentation having a value of more than seven hundred fifty dollars ($750) and which is a trade secret and is confidential, as provided by law, residing or existing internal or external to a computer, computer system or computer network. (b) A crime against intellectual property is: (i) A felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars ($3,000.00), or both, except as is provided in paragraph (ii) of this subsection; (ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than $ 10,000, or both, of the crime is committed with the intention of devising or executing a scheme or artifice to defraud or to obtain property. SECTION 6-3-503 Crimes against computer equipment or supplies; interruption or impairment of governmental operations or public services; penalties (a) A person commits a crime against computer equipment or supplies if he knowingly and without authorization, modifies equipment or supplies used or intended to be used in a computer, computer system or computer network. A crime against computer equipment or supplies is: (i) A misdemeanor punishable by imprisonment for not more than six (6) months, a fine of not more than seven hundred fifty dollars ($750.00) or both, except as provided in paragraph ii of this subsection; (ii) A felony punishable imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars $ 10,000.00), or both, if the crime is committed with the intention of devising or executing a scheme or artifice to defraud to to obtain property. (b) A person who knowingly and without authorization destroys, injures or damages a computer, computer system or computer network and thereby interrupts or impairs governmental operations or public communication, transportation or supplies of water, gas or other public service, is guilty of a felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars ($3,000.00), or both. SECTION 6-3-504 Crimes against computer users; penalties (a) A person commits a crime against computer users if he knowingly and without authorization: (i) Accesses a computer, computer system or computer network; (ii) Denies computer system services to an authorized user of the computer system services which, in whole or part, are owned by, under contract to, or operated for, on behalf of, or in conjunction with another. (b) A crime against computer users is: (i) A felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars $ 3,000.00), or both. (i) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars $ 3,000.00), or both; if the crime is committed with the intention of devising or executing a scheme or artifice to defraud or to obtain property. SECTION 6-3-505 This article not exclusive This article shall not preclude the application of any other provision of the criminal law of this state which applies or may apply to any violation of this article, unless the provision is inconsistent with this article. Downloaded From P-80 International Information Systems 304-744-2253