/* R FRINGE COMMENTARY: Here is Pennsylvania's computer crimes law, adopted in 1983 with changes in 1986, Pennsylvania consolidated statutes title 18 section 3933.*/ SECTION 3933 Unlawful use of a computer (a) Offense defined.-- A person commits an offense if he: (1) accesses, alters, damages or destroys any computer, computer system, computer network, computer software, computer program or data base or any part thereof, with the intent to interrupt the normal functioning of an organization /*does a person commit a crime by breaking into a system and cleaning it up if the normal function of the organization is chaos and devolution?*/ or to devise or execute any scheme or artifice to defraud or deceive or control property or services by means of false or fraudulent pretenses, rep[resentations, or promises; (2) intentionally and without authorization accesses, alters, interferes with the operation of, damages or destroys any computer, computer system, computer network, computer software, computer program, or computer data base or any part thereof; or (3) intentionally or knowingly and without authorization gives or publishes a password, identifying code, personal identification number or other confidential information about a computer, computer system, computer network or data base. /*This statute has an extremely elastic definition of the the term confidential information and gives a very broad tool to the computer industry. >Consequently label material sold in this state which is legitimately confidential "confidential information protected by 18PaC.S Section 3933*/ (b) Grading.--An offense under subsection (a)(1) is a felony of the third degree. An offense under subsection (a)(2) or (3) is a a misdemeanor of the first degree. (c) Definitions.--As used in this section, the following words and phrases shall have the meanings given to them in this subsection: "Access". To intercept, instruct, communicate with, store data in, retrieve data from or otherwise make use of any resources of a computer, computer system, computer network or data base. "Computer." An electronic, magnetic, optical, hydraulic /* Will all of those with hydraulic computers PLEASE leave a message to me explaining what the hell a hydraulic computer is----- Thanks---- Sysop (Herb Kraft.) */ organic or other high speed data processing device or system which performs, logic, arithmetic functions and includes all input, output, processing, storage, software or communication facilities which are connected or related to the device in a system or network. "Computer network" the interconnection of two o more computers through the usage of satellite, microwave, line or other communication medium. "Computer program" an ordered set of instructions or statements and related data that, when automatically execute in actual or modified form in a computer system, causes it to perform specified functions. "Computer software" a set of computer programs, procedures, and associated documentation concerned with the operation of a computer system.] "Computer system" a set of related, connected or unconnected computer equipment, devices and software. "Data base" a representation of information, knowledge, facts, concepts or instructions which are being prepared or processed or have been prepared or processed in a formalized manner and are intended for use in a computer, computer system or computer network including, but not limited to, computer printouts, magnetic storage media, punched cards or data stored internally in the memory of the computer. "Financial instrument" includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security or any computer system representation thereof. "Property" includes but is not limited to financial instruments, computer software and programs either in machine or human readable form, and anything of value, tangible or intangible. "Services" includes but is not limited to, computer time, data processing and storage functions. Downloaded From P-80 International Information Systems 304-744-2253