South Carolina General Assembly
114th Session, 2001-2002

Scroll to History Page
Scroll to Previous Versions Links List
Scroll to Full Text
Download This Bill in Microsoft Word format

Bill 3539


                    Current Status

Bill Number:                      3539
Ratification Number:              170
Act Number:                       169
Type of Legislation:              General Bill GB
Introducing Body:                 House
Introduced Date:                  20010213
Primary Sponsor:                  J.E. Smith
All Sponsors:                     J.E. Smith and Lourie
Drafted Document Number:          l:\council\bills\skb\18170som01.doc
Date Bill Passed both Bodies:     20020124
Date of Last Amendment:           20020117
Governor's Action:                S
Date of Governor's Action:        20020208
Subject:                          Computer Abuse Act of 2001, Crimes and 
                                  Offenses, Telecommunications, Torts, Civil 
                                  actions, Computers


                        History

Body    Date      Action Description                     Com     Leg Involved
______  ________  ______________________________________ _______ ____________
------  20020222  Act No. A169
------  20020208  Signed by Governor
------  20020205  Ratified R170
House   20020124  Concurred in Senate amendment, 
                  enrolled for ratification
Senate  20020122  Read third time, returned to House
                  with amendment
------  20020118  Scrivener's error corrected
------  20020117  Scrivener's error corrected
Senate  20020117  Amended, read second time
Senate  20020116  Committee report: Favorable with       11 SJ
                  amendment
Senate  20010412  Introduced, read first time,           11 SJ
                  referred to Committee
House   20010411  Read third time, sent to Senate
House   20010410  Read second time
House   20010404  Committee report: Favorable            25 HJ
House   20010213  Introduced, read first time,           25 HJ
                  referred to Committee


              Versions of This Bill
Revised on April 4, 2001 - Word format
Revised on January 16, 2002 - Word format
Revised on January 17, 2002 - Word format
Revised on January 17, 2002-A - Word format
Revised on January 17, 2002-B - Word format
Revised on January 18, 2002 - Word format

View additional legislative information at the LPITS web site.


(Text matches printed bills. Document has been reformatted to meet World Wide Web specifications.)

(A169, R170, H3539)

AN ACT TO AMEND CHAPTER 16, TITLE 16, CODE OF LAWS OF SOUTH CAROLINA, 1976, RELATING TO COMPUTER CRIME, SO AS TO ENACT THE "COMPUTER ABUSE ACT OF 2002", BY AMENDING SECTION 16-16-10, RELATING TO DEFINITIONS CONTAINED IN THE COMPUTER CRIME ACT, SO AS TO REVISE THE DEFINITIONS OF "COMPUTER", "COMPUTER SYSTEM", "PROPERTY", "SERVICES", "ACCESS", AND "COMPUTER HACKING", AND TO DEFINE "COMPUTER CONTAMINANT"; TO AMEND SECTION 16-16-20, AS AMENDED, RELATING TO COMPUTER CRIMES AND PENALTIES, SO AS TO CREATE THE OFFENSE OF INTRODUCING A COMPUTER CONTAMINANT INTO A COMPUTER, COMPUTER SYSTEM, COMPUTER PROGRAM, OR COMPUTER NETWORK; BY ADDING SECTION 16-16-25, SO AS TO PROVIDE A CIVIL REMEDY OF COMPENSATORY DAMAGES AND RESTITUTION FOR THE OWNER OR LESSEE OF A COMPUTER, COMPUTER SYSTEM, COMPUTER PROGRAM, OR COMPUTER NETWORK INJURED BY A PERSON CONVICTED PURSUANT TO THE COMPUTER CRIME ACT; AND TO AMEND SECTION 16-16-30, RELATING TO THE VENUE FOR ACTIONS BROUGHT PURSUANT TO THE COMPUTER CRIME ACT, SO AS TO MAKE TECHNICAL CHANGES.

Be it enacted by the General Assembly of the State of South Carolina:

Computer Abuse Act of 2002

SECTION 1. This act may be known as the "Computer Abuse Act of 2002".

Definitions

SECTION 2. Section 16-16-10 of the 1976 Code is amended to read:

"Section 16-16-10. For purposes of this chapter:

(a) 'Computer' means a device that performs logical, arithmetic, and memory functions by manipulating impulses, and includes all input, output, processing, storage, computer software, and communication facilities that are connected or related to a computer in a computer system or computer network, but does not include a computer or other device which is not used to access, to communicate with, or to manipulate any other computer.

(b) 'Computer network' means the interconnection of communications lines, or any other communications facilities, with a computer through remote terminals, or a system consisting of two or more interconnected computers.

(c) 'Computer program' means a series of instructions or statements executable on a computer, which directs the computer system in a manner to process data or perform other specified functions.

(d) 'Computer software' means a set of computer programs, data, procedures, or associated documentation concerned with the operation of a computer system.

(e) 'Computer system' means a set of related, connected or unconnected, computer equipment, devices, or software.

(f) 'Property' includes, but is not limited to, financial instruments, data, documents associated with computer systems, and computer software, or copies thereof, whether tangible or intangible, including both human and computer system readable data, and data while in transit.

(g) 'Services' includes, but is not limited to, the use of the computer system, computer network, computer programs, or data prepared for computer use, or data obtained within a computer system, or data contained within a computer network.

(h) 'Data' means a representation of information, knowledge, facts, concepts, or instructions that has been prepared or is being prepared in a formalized manner and has been processed, is being processed, or is intended to be processed in a computer, computer system, or computer network. Data may be in any form including, but not limited to, computer printouts, magnetic storage media, punched cards, or as stored in the memory of the computer or in transit or displayed on a video device.

(i) 'Access' means to gain entry to, instruct, communicate with, attempt to communicate with, store data in, retrieve data from, or otherwise make use of or attempt to make use of, the logical, arithmetic, or memory function resources of a computer, computer system, or computer network.

(j) 'Computer hacking' means accessing all or part of a computer, computer system, or a computer network for the purpose of establishing contact with the intent to defraud or with malicious intent to commit another crime after such contact is established. Computer hacking does not include the introduction of a computer contaminant into a computer, computer system, computer program, or computer network.

(k) 'Computer contaminant' means a computer program designed to modify, damage, destroy, disable, functionally impair, record, or transmit information within a computer, computer system, or computer network without the consent or implied consent of the owner. Computer contaminant includes, but is not limited to, a group of computer programs commonly known as 'viruses' and 'worms' that are self-replicating or self-propagating, and that are designed to contaminate other computer programs, consume computer resources, modify, destroy, record, or transmit data, or in some fashion usurp the normal operation of the computer, computer system, or computer network."

Computer crimes

SECTION 3. Section 16-16-20 of the 1976 Code is amended to read:

"Section 16-16-20. (1) It is unlawful for a person to wilfully, knowingly, maliciously, and without authorization or for an unauthorized purpose to:

(a) directly or indirectly access or cause to be accessed a computer, computer system, or computer network for the purpose of:

(i) devising or executing a scheme or artifice to defraud;

(ii) obtaining money, property, or services by means of false or fraudulent pretenses, representations, promises; or

(iii) committing any other crime.

(b) alter, damage, destroy, or modify a computer, computer system, computer network, computer software, computer program, or data contained in that computer, computer system, computer program, or computer network or introduce a computer contaminant into that computer, computer system, computer program, or computer network.

(2) A person is guilty of computer crime in the first degree if the amount of gain directly or indirectly derived from the offense made unlawful by subsection (1) or the loss directly or indirectly suffered by the victim exceeds five thousand dollars. Computer crime in the first degree is a felony and, upon conviction, a person must be fined not more than one hundred twenty-five thousand dollars or imprisoned not more than ten years, or both.

(3)(a) A person is guilty of computer crime in the second degree if the amount of gain directly or indirectly derived from the offense made unlawful by subsection (1) or the loss directly or indirectly suffered by the victim is greater than one thousand dollars but not more than five thousand dollars.

(b) A person is also guilty of computer crime in the second degree where:

(i) he interferes with, causes to be interfered with, denies or causes to be denied any computer service to an authorized user of the computer service for the purpose of devising or executing any scheme or artifice to defraud, or obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises, or committing any other felony;

(ii) he deprives the owner of possession of, or takes, transfers, conceals, or retains possession of any computer, data, computer property, or computer-related property, including all parts of a computer, computer system, computer network, computer software, computer services, or information associated with a computer, whether in a tangible or intangible form; or

(iii) the gain derived from the offense made unlawful by subsection (1) or loss suffered by the victim cannot reasonably be ascertained.

(c) Computer crime in the second degree is a misdemeanor and, upon conviction for a first offense, a person must be fined not more than fifty thousand dollars or imprisoned not more than three years, or both. Upon conviction for a second or subsequent offense, a person is guilty of a felony and must be fined not more than fifty thousand dollars or imprisoned not more than five years, or both.

(4) A person is guilty of computer crime in the third degree if the amount of gain directly or indirectly derived from the offense made unlawful by subsection (1) or the loss directly or indirectly suffered by the victim is not more than one thousand dollars. A person is also guilty of computer crime in the third degree if he wilfully, knowingly, and without authorization or for an unauthorized purpose engages in computer hacking. Computer crime in the third degree is a misdemeanor and, upon conviction for a first offense, a person must be fined not more than two hundred dollars or imprisoned not more than thirty days. Upon conviction for a second or subsequent offense, a person must be fined not more than two thousand dollars or imprisoned not more than two years, or both."

Compensatory damages and restitution

SECTION 4. Chapter 16, Title 16 of the 1976 Code is amended by adding:

"Section 16-16-25. In addition to other civil remedies available, the owner or lessee of a computer, computer system, computer network, computer program, or data may bring a civil action against a person convicted under this chapter for compensatory damages and restitution. Compensatory damages and restitution may include:

(1) expenditures reasonably and necessarily incurred by the owner or lessee to verify whether a computer system, computer network, computer program, or data was altered, damaged, or deleted by the access;

(2) costs of repairing or, if necessary, replacing the affected computer, computer system, computer network, computer software, computer program, or database;

(3) lost profits for the period that the computer, computer system, computer network, computer software, computer program, or database was unusable; and

(4) costs of replacing or restoring the data lost or damaged as a result of a violation of this chapter."

Technical changes

SECTION 5. Section 16-16-30 of the 1976 Code is amended to read:

"Section 16-16-30. For the purpose of venue under this chapter, a violation of this chapter is considered to have been committed in the county in which the violation took place; however, upon proper motion and the proper showing before a judge, venue may be transferred if justice would be better served by the transfer, to one of the following:

(1) a county in which an act was performed in furtherance of a transaction which violated this chapter;

(2) the county of the principal place of business in this State of the owner or lessee of a computer, computer system, computer network, or any part of it, which has been subject to the violation; or

(3) a county in which a violator had control or possession of proceeds of the violation or of books, records, documents, property, financial instrument, computer software, computer program, or other material or objects which were used in the furtherance of the violation."

Time effective

SECTION 6. This act takes effect upon approval by the Governor.

Ratified the 5th day of February, 2002.

Approved the 8th day of February, 2002.

__________


This web page was last updated on Tuesday, December 8, 2009 at 11:21 A.M.