SlideShare a Scribd company logo
california legislature—2015–16 regular session
ASSEMBLY BILL No. 195
Introduced by Assembly Member Chau
January 28, 2015
An act to amend Sections 502 and 653f of the Penal Code, relating
to computer crimes.
legislative counsel’s digest
AB 195, as introduced, Chau. Unauthorized access to computer
systems.
(1) Existing law establishes various crimes related to computer
services and systems. Existing law makes it a crime to knowingly, and
without permission, access, cause to be accessed, or provide or assist
in providing a means of accessing, a computer, computer system,
computer network, or computer data in violation of prescribed
provisions, and defines related terms.
This bill would specify that “computer network” for these purposes
includes smartphones, as defined, and would make a conforming change.
(2) Existing law makes it a crime for a person, with the intent that
the crime be committed, to solicit another to commit or join in the
commission of prescribed crimes.
This bill would expand these provisions to make it a crime for a
person, with the intent that the crime be committed, to solicit another
to commit or join in the commission of the access crimes related to
computer services and systems. The bill would make it a crime to offer
to obtain or procure assistance for another to obtain unauthorized access,
or to assist others in locating hacking services, as defined. The bill
would make a violation of this provision punishable by imprisonment
99
in a county jail for a term not to exceed 6 months, or imprisonment for
a term not to exceed one year for subsequent violations.
(3) By expanding the definitions of existing crimes, this bill would
impose a state-mandated local program.
The California Constitution requires the state to reimburse local
agencies and school districts for certain costs mandated by the state.
Statutory provisions establish procedures for making that reimbursement.
This bill would provide that no reimbursement is required by this act
for a specified reason.
Vote: majority. Appropriation: no. Fiscal committee: yes.
State-mandated local program: yes.
The people of the State of California do enact as follows:
line 1 SECTION 1. Section 502 of the Penal Code is amended to
line 2 read:
line 3 502. (a)  It is the intent of the Legislature in enacting this
line 4 section to expand the degree of protection afforded to individuals,
line5 businesses, and governmental agencies from tampering,
line 6 interference, damage, and unauthorized access to lawfully created
line 7 computer data and computer systems. The Legislature finds and
line 8 declares that the proliferation of computer technology has resulted
line 9 in a concomitant proliferation of computer crime and other forms
line 10 of unauthorized access to computers, computer systems, and
line 11 computer data.
line 12 The Legislature further finds and declares that protection of the
line 13 integrity of all types and forms of lawfully created computers,
line 14 computer systems, and computer data is vital to the protection of
line 15 the privacy of individuals as well as to the well-being of financial
line 16 institutions, business concerns, governmental agencies, and others
line 17 within this state that lawfully utilize those computers, computer
line 18 systems, and data.
line 19 (b)  For the purposes of this section, the following terms have
line 20 the following meanings:
line 21 (1)  “Access” means to gain entry to, instruct, cause input to,
line 22 cause output from, cause data processing with, or communicate
line 23 with, the logical, arithmetical, or memory function resources of a
line 24 computer, computer system, or computer network.
line 25 (2)  “Computer network” means any system that provides
line 26 communications between one or more computer systems and
99
— 2 —AB 195
line 1 input/output devices including, but not limited to, display terminals,
line 2 remote systems, mobile devices, smartphones, and printers
line 3 connected by telecommunication facilities.
line 4 (3)  “Computer program or software” means a set of instructions
line 5 or statements, and related data, that when executed in actual or
line 6 modified form, cause a computer, computer system, or computer
line 7 network to perform specified functions.
line 8 (4)  “Computer services” includes, but is not limited to, computer
line 9 time, data processing, or storage functions, Internet services,
line 10 electronic mail services, electronic message services, or other uses
line 11 of a computer, computer system, or computer network.
line 12 (5)  “Computer system” means a device or collection of devices,
line 13 including support devices and excluding calculators that are not
line 14 programmable and capable of being used in conjunction with
line 15 external files, one or more of which contain computer programs,
line 16 electronic instructions, input data, and output data, that performs
line 17 functions including, but not limited to, logic, arithmetic, data
line 18 storage and retrieval, communication, and control.
line 19 (6)  “Government computer system” means any computer system,
line 20 or part thereof, that is owned, operated, or used by any federal,
line 21 state, or local governmental entity.
line 22 (7)  “Public safety infrastructure computer system” means any
line 23 computer system, or part thereof, that is necessary for the health
line 24 and safety of the public including computer systems owned,
line 25 operated, or used by drinking water and wastewater treatment
line26 facilities, hospitals, emergency service providers,
line 27 telecommunication companies, and gas and electric utility
line 28 companies.
line 29 (8)  “Data” means a representation of information, knowledge,
line 30 facts, concepts, computer software, computer programs or
line 31 instructions, or smartphone applications. Data may be in any form,
line 32 in storage media, or as stored in the memory of the computer or
line 33 in transit or presented on a display device.
line 34 (9)  “Supporting documentation” includes, but is not limited to,
line 35 all information, in any form, pertaining to the design, construction,
line 36 classification, implementation, use, or modification of a computer,
line 37 computer system, computer network, computer program, or
line 38 computer software, which information is not generally available
line 39 to the public and is necessary for the operation of a computer,
99
AB 195— 3 —
line 1 computer system, computer network, computer program, or
line 2 computer software.
line 3 (10)  “Injury” means any alteration, deletion, damage, or
line 4 destruction of a computer system, computer network, computer
line 5 program, or data caused by the access, or the denial of access to
line 6 legitimate users of a computer system, network, or program.
line 7 (11)  “Victim expenditure” means any expenditure reasonably
line 8 and necessarily incurred by the owner or lessee to verify that a
line 9 computer system, computer network, computer program, or data
line 10 was or was not altered, deleted, damaged, or destroyed by the
line 11 access.
line 12 (12)  “Computer contaminant” means any set of computer
line 13 instructions that are designed to modify, damage, destroy, record,
line 14 or transmit information within a computer, computer system, or
line 15 computer network without the intent or permission of the owner
line 16 of the information. They include, but are not limited to, a group
line 17 of computer instructions commonly called viruses or worms, that
line 18 are self-replicating or self-propagating and are designed to
line 19 contaminate other computer programs or computer data, consume
line 20 computer resources, modify, destroy, record, or transmit data, or
line 21 in some other fashion usurp the normal operation of the computer,
line 22 computer system, or computer network.
line 23 (13)  “Internet domain name” means a globally unique,
line 24 hierarchical reference to an Internet host or service, assigned
line 25 through centralized Internet naming authorities, comprising a series
line 26 of character strings separated by periods, with the rightmost
line 27 character string specifying the top of the hierarchy.
line 28 (14)  “Electronic mail” means an electronic message or computer
line 29 file that is transmitted between two or more telecommunications
line 30 devices; computers; computer networks, regardless of whether the
line 31 network is a local, regional, or global network; or electronic devices
line 32 capable or receiving electronic messages, regardless of whether
line 33 the message is converted to hard copy format after receipt, viewed
line 34 upon transmission, or stored for later retrieval.
line 35 (15)  “Profile” means either of the following:
line 36 (A)  A configuration of user data required by a computer so that
line 37 the user may access programs or services and have the desired
line 38 functionality on that computer.
line 39 (B)  An Internet Web site user’s personal page or section of a
line 40 page that is made up of data, in text of graphical form, that displays
99
— 4 —AB 195
line 1 significant, unique, or identifying information, including, but not
line 2 limited to, listing acquaintances, interests, associations, activities,
line 3 or personal statements.
line 4 (16)  “Smartphone” means a cellular radio telephone or other
line 5 mobile communications device that performs many of the functions
line 6 of a computer, typically having a touchscreen interface, Internet
line 7 access, and an operating system capable of running downloaded
line 8 applications.
line 9 (c)  Except as provided in subdivision (h), any person who
line 10 commits any of the following acts is guilty of a public offense:
line 11 (1)  Knowingly accesses and without permission alters, damages,
line 12 deletes, destroys, or otherwise uses any data, computer, computer
line 13 system, or computer network in order to either (A) devise or
line 14 execute any scheme or artifice to defraud, deceive, or extort, or
line 15 (B) wrongfully control or obtain money, property, or data.
line 16 (2)  Knowingly accesses and without permission takes, copies,
line 17 or makes use of any data from a computer, computer system, or
line18 computer network, or takes or copies any supporting
line 19 documentation, whether existing or residing internal or external
line 20 to a computer, computer system, or computer network.
line 21 (3)  Knowingly and without permission uses or causes to be used
line 22 computer services.
line 23 (4)  Knowingly accesses and without permission adds, alters,
line 24 damages, deletes, or destroys any data, computer software, or
line 25 computer programs which reside or exist internal or external to a
line 26 computer, computer system, or computer network.
line 27 (5)  Knowingly and without permission disrupts or causes the
line 28 disruption of computer services or denies or causes the denial of
line 29 computer services to an authorized user of a computer, computer
line 30 system, or computer network.
line 31 (6)  Knowingly and without permission provides or assists in
line 32 providing a means of accessing a computer, computer system, or
line 33 computer network in violation of this section.
line 34 (7)  Knowingly and without permission accesses or causes to be
line 35 accessed any computer, computer system, or computer network.
line 36 (8)  Knowingly introduces any computer contaminant into any
line 37 computer, computer system, or computer network.
line 38 (9)  Knowingly and without permission uses the Internet domain
line 39 name or profile of another individual, corporation, or entity in
line 40 connection with the sending of one or more electronic mail
99
AB 195— 5 —
line 1 messages or posts and thereby damages or causes damage to a
line 2 computer, computer data, computer system, or computer network.
line 3 (10)  Knowingly and without permission disrupts or causes the
line 4 disruption of government computer services or denies or causes
line 5 the denial of government computer services to an authorized user
line 6 of a government computer, computer system, or computer network.
line 7 (11)  Knowingly accesses and without permission adds, alters,
line 8 damages, deletes, or destroys any data, computer software, or
line 9 computer programs which reside or exist internal or external to a
line 10 public safety infrastructure computer system computer, computer
line 11 system, or computer network.
line 12 (12)  Knowingly and without permission disrupts or causes the
line 13 disruption of public safety infrastructure computer system computer
line 14 services or denies or causes the denial of computer services to an
line 15 authorized user of a public safety infrastructure computer system
line 16 computer, computer system, or computer network.
line 17 (13)  Knowingly and without permission provides or assists in
line 18 providing a means of accessing a computer, computer system, or
line 19 public safety infrastructure computer system computer, computer
line 20 system, or computer network in violation of this section.
line 21 (14)  Knowingly introduces any computer contaminant into any
line 22 public safety infrastructure computer system computer, computer
line 23 system, or computer network.
line 24 (d)  (1)  Any person who violates any of the provisions of
line 25 paragraph (1), (2), (4), (5), (10), (11), or (12) of subdivision (c) is
line 26 punishable by a fine not exceeding ten thousand dollars ($10,000),
line 27 or by imprisonment pursuant to subdivision (h) of Section 1170
line 28 for 16 months, or two or three years, or by both that fine and
line 29 imprisonment, or by a fine not exceeding five thousand dollars
line 30 ($5,000), or by imprisonment in a county jail not exceeding one
line 31 year, or by both that fine and imprisonment.
line 32 (2)  Any person who violates paragraph (3) of subdivision (c)
line 33 is punishable as follows:
line 34 (A)  For the first violation that does not result in injury, and
line 35 where the value of the computer services used does not exceed
line 36 nine hundred fifty dollars ($950), by a fine not exceeding five
line 37 thousand dollars ($5,000), or by imprisonment in a county jail not
line 38 exceeding one year, or by both that fine and imprisonment.
line 39 (B)  For any violation that results in a victim expenditure in an
line 40 amount greater than five thousand dollars ($5,000) or in an injury,
99
— 6 —AB 195
line 1 or if the value of the computer services used exceeds nine hundred
line 2 fifty dollars ($950), or for any second or subsequent violation, by
line 3 a fine not exceeding ten thousand dollars ($10,000), or by
line 4 imprisonment pursuant to subdivision (h) of Section 1170 for 16
line 5 months, or two or three years, or by both that fine and
line 6 imprisonment, or by a fine not exceeding five thousand dollars
line 7 ($5,000), or by imprisonment in a county jail not exceeding one
line 8 year, or by both that fine and imprisonment.
line 9 (3)  Any person who violates paragraph (6), (7), or (13) of
line 10 subdivision (c) is punishable as follows:
line 11 (A)  For a first violation that does not result in injury, an
line 12 infraction punishable by a fine not exceeding one thousand dollars
line 13 ($1,000).
line 14 (B)  For any violation that results in a victim expenditure in an
line 15 amount not greater than five thousand dollars ($5,000), or for a
line 16 second or subsequent violation, by a fine not exceeding five
line 17 thousand dollars ($5,000), or by imprisonment in a county jail not
line 18 exceeding one year, or by both that fine and imprisonment.
line 19 (C)  For any violation that results in a victim expenditure in an
line 20 amount greater than five thousand dollars ($5,000), by a fine not
line 21 exceeding ten thousand dollars ($10,000), or by imprisonment
line 22 pursuant to subdivision (h) of Section 1170 for 16 months, or two
line 23 or three years, or by both that fine and imprisonment, or by a fine
line 24 not exceeding five thousand dollars ($5,000), or by imprisonment
line 25 in a county jail not exceeding one year, or by both that fine and
line 26 imprisonment.
line 27 (4)  Any person who violates paragraph (8) or (14) of subdivision
line 28 (c) is punishable as follows:
line 29 (A)  For a first violation that does not result in injury, a
line 30 misdemeanor punishable by a fine not exceeding five thousand
line 31 dollars ($5,000), or by imprisonment in a county jail not exceeding
line 32 one year, or by both that fine and imprisonment.
line 33 (B)  For any violation that results in injury, or for a second or
line 34 subsequent violation, by a fine not exceeding ten thousand dollars
line 35 ($10,000), or by imprisonment in a county jail not exceeding one
line 36 year, or by imprisonment pursuant to subdivision (h) of Section
line 37 1170, or by both that fine and imprisonment.
line 38 (5)  Any person who violates paragraph (9) of subdivision (c)
line 39 is punishable as follows:
99
AB 195— 7 —
line 1 (A)  For a first violation that does not result in injury, an
line 2 infraction punishable by a fine not exceeding one thousand dollars
line 3 ($1,000).
line 4 (B)  For any violation that results in injury, or for a second or
line 5 subsequent violation, by a fine not exceeding five thousand dollars
line 6 ($5,000), or by imprisonment in a county jail not exceeding one
line 7 year, or by both that fine and imprisonment.
line 8 (e)  (1)  In addition to any other civil remedy available, the owner
line 9 or lessee of the computer, computer system, computer network,
line 10 computer program, or data who suffers damage or loss by reason
line 11 of a violation of any of the provisions of subdivision (c) may bring
line 12 a civil action against the violator for compensatory damages and
line 13 injunctive relief or other equitable relief. Compensatory damages
line 14 shall include any expenditure reasonably and necessarily incurred
line 15 by the owner or lessee to verify that a computer system, computer
line 16 network, computer program, or data was or was not altered,
line 17 damaged, or deleted by the access. For the purposes of actions
line 18 authorized by this subdivision, the conduct of an unemancipated
line 19 minor shall be imputed to the parent or legal guardian having
line 20 control or custody of the minor, pursuant to the provisions of
line 21 Section 1714.1 of the Civil Code.
line 22 (2)  In any action brought pursuant to this subdivision the court
line 23 may award reasonable attorney’s fees.
line 24 (3)  A community college, state university, or academic
line 25 institution accredited in this state is required to include
line 26 computer-related crimes as a specific violation of college or
line 27 university student conduct policies and regulations that may subject
line 28 a student to disciplinary sanctions up to and including dismissal
line 29 from the academic institution. This paragraph shall not apply to
line 30 the University of California unless the Board of Regents adopts a
line 31 resolution to that effect.
line 32 (4)  In any action brought pursuant to this subdivision for a
line 33 willful violation of the provisions of subdivision (c), where it is
line 34 proved by clear and convincing evidence that a defendant has been
line 35 guilty of oppression, fraud, or malice as defined in subdivision (c)
line 36 of Section 3294 of the Civil Code, the court may additionally award
line 37 punitive or exemplary damages.
line 38 (5)  No action may be brought pursuant to this subdivision unless
line 39 it is initiated within three years of the date of the act complained
line 40 of, or the date of the discovery of the damage, whichever is later.
99
— 8 —AB 195
line 1 (f)  This section shall not be construed to preclude the
line 2 applicability of any other provision of the criminal law of this state
line 3 which applies or may apply to any transaction, nor shall it make
line 4 illegal any employee labor relations activities that are within the
line 5 scope and protection of state or federal labor laws.
line 6 (g)  Any computer, computer system, computer network, or any
line 7 software or data, owned by the defendant, that is used during the
line 8 commission of any public offense described in subdivision (c) or
line 9 any computer, owned by the defendant, which is used as a
line 10 repository for the storage of software or data illegally obtained in
line 11 violation of subdivision (c) shall be subject to forfeiture, as
line 12 specified in Section 502.01.
line 13 (h)  (1)  Subdivision (c) does not apply to punish any acts which
line 14 are committed by a person within the scope of his or her lawful
line 15 employment. For purposes of this section, a person acts within the
line 16 scope of his or her employment when he or she performs acts
line 17 which are reasonably necessary to the performance of his or her
line 18 work assignment.
line 19 (2)  Paragraph (3) of subdivision (c) does not apply to penalize
line 20 any acts committed by a person acting outside of his or her lawful
line 21 employment, provided that the employee’s activities do not cause
line 22 an injury, to the employer or another, or provided that the value
line 23 of supplies or computer services which are used does not exceed
line 24 an accumulated total of two hundred fifty dollars ($250).
line 25 (i)  No activity exempted from prosecution under paragraph (2)
line 26 of subdivision (h) which incidentally violates paragraph (2), (4),
line 27 or (7) of subdivision (c) shall be prosecuted under those paragraphs.
line 28 (j)  For purposes of bringing a civil or a criminal action under
line 29 this section, a person who causes, by any means, the access of a
line 30 computer, computer system, or computer network in one
line 31 jurisdiction from another jurisdiction is deemed to have personally
line 32 accessed the computer, computer system, or computer network in
line 33 each jurisdiction.
line 34 (k)  In determining the terms and conditions applicable to a
line 35 person convicted of a violation of this section the court shall
line 36 consider the following:
line 37 (1)  The court shall consider prohibitions on access to and use
line 38 of computers.
line 39 (2)  Except as otherwise required by law, the court shall consider
line 40 alternate sentencing, including community service, if the defendant
99
AB 195— 9 —
line 1 shows remorse and recognition of the wrongdoing, and an
line 2 inclination not to repeat the offense.
line 3 SEC. 2. Section 653f of the Penal Code is amended to read:
line 4 653f. (a)  Every person who, with the intent that the crime be
line 5 committed, solicits another to offer, accept, or join in the offer or
line 6 acceptance of a bribe, or to commit or join in the commission of
line 7 carjacking, robbery, burglary, grand theft, receiving stolen property,
line 8 extortion, perjury, subornation of perjury, forgery, kidnapping,
line 9 arson or assault with a deadly weapon or instrument or by means
line 10 of force likely to produce great bodily injury, or, by the use of
line 11 force or a threat of force, to prevent or dissuade any person who
line 12 is or may become a witness from attending upon, or testifying at,
line 13 any trial, proceeding, or inquiry authorized by law, shall be
line 14 punished by imprisonment in a county jail for not more than one
line 15 year or pursuant to subdivision (h) of Section 1170, or by a fine
line 16 of not more than ten thousand dollars ($10,000), or the amount
line 17 which could have been assessed for commission of the offense
line 18 itself, whichever is greater, or by both the fine and imprisonment.
line 19 (b)  Every person who, with the intent that the crime be
line 20 committed, solicits another to commit or join in the commission
line 21 of murder shall be punished by imprisonment in the state prison
line 22 for three, six, or nine years.
line 23 (c)  Every person who, with the intent that the crime be
line 24 committed, solicits another to commit rape by force or violence,
line 25 sodomy by force or violence, oral copulation by force or violence,
line 26 or any violation of Section 264.1, 288, or 289, shall be punished
line 27 by imprisonment in the state prison for two, three, or four years.
line 28 (d)  (1)  Every person who, with the intent that the crime be
line 29 committed, solicits another to commit an offense specified in
line 30 Section 11352, 11379, 11379.5, 11379.6, or 11391 of the Health
line 31 and Safety Code shall be punished by imprisonment in a county
line 32 jail not exceeding six months. Every person, who, having been
line 33 convicted of soliciting another to commit an offense specified in
line 34 this subdivision, is subsequently convicted of the proscribed
line 35 solicitation, shall be punished by imprisonment in a county jail
line 36 not exceeding one year, or pursuant to subdivision (h) of Section
line 37 1170.
line 38 (2)  This subdivision does not apply where the term of
line 39 imprisonment imposed under other provisions of law would result
line 40 in a longer term of imprisonment.
99
— 10 —AB 195
line 1 (e)  Every person who, with the intent that the crime be
line 2 committed, solicits another to commit an offense specified in
line 3 Section 14014 of the Welfare and Institutions Code shall be
line 4 punished by imprisonment in a county jail for not exceeding six
line 5 months. Every person who, having been convicted of soliciting
line 6 another to commit an offense specified in this subdivision, is
line 7 subsequently convicted of the proscribed solicitation, shall be
line 8 punished by imprisonment in a county jail not exceeding one year,
line 9 or pursuant to subdivision (h) of Section 1170.
line 10 (f)  (1)  Every person who, with the intent that the crime be
line 11 committed, solicits another to commit an offense set forth in Section
line 12 502 shall be punished as set forth in paragraph (3).
line 13 (2)  Every person who, with the intent that the crime be
line 14 committed, offers to solicit assistance for another to conduct
line 15 activities in violation of Section 502 shall be punished as set forth
line 16 in paragraph (3). This includes persons operating Internet Web
line 17 sites that offer to assist others in locating hacking services. For
line 18 the purposes of this section “hacking services” means assistance
line 19 in the unauthorized access to computers, computer systems, or
line 20 computer data in violation of Section 502.
line 21 (3)  Every person who violates this subdivision shall be punished
line 22 by imprisonment in a county jail for a period not to exceed six
line 23 months. Every subsequent violation of this subdivision by that
line 24 same person shall be punished by imprisonment in a county jail
line 25 not exceeding one year, or pursuant to subdivision (h) of Section
line 26 1170.
line 27 (f)
line 28 (g)  An offense charged in violation of subdivision (a), (b), or
line 29 (c) shall be proven by the testimony of two witnesses, or of one
line 30 witness and corroborating circumstances. An offense charged in
line 31 violation of subdivision (d) or (e) (d), (e), or (f) shall be proven
line 32 by the testimony of one witness and corroborating circumstances.
line 33 SEC. 3. No reimbursement is required by this act pursuant to
line 34 Section 6 of Article XIIIB of the California Constitution because
line 35 the only costs that may be incurred by a local agency or school
line 36 district will be incurred because this act creates a new crime or
line 37 infraction, eliminates a crime or infraction, or changes the penalty
line 38 for a crime or infraction, within the meaning of Section 17556 of
line 39 the Government Code, or changes the definition of a crime within
99
AB 195— 11 —
line 1 the meaning of Section 6 of Article XIII B of the California
line 2 Constitution.
O
99
— 12 —AB 195

More Related Content

What's hot

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
KOMALMALLIK
 
The information technology act
The information technology actThe information technology act
The information technology act
Dhii Raymond
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
ShashankBajpai24
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
Dr. Prashant Vats
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
It act 2000
It act 2000It act 2000
It act 2000
Vidhu Arora
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
Vaishnavi Meghe
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
Vibhor Agarwal
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
anthony4web
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
RAJ ANAND
 
Cyber Law
Cyber LawCyber Law
Cyber Law
Sushma Habib
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
Apurva Kavishwar
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
Tyler Cragg
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 

What's hot (19)

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
The information technology act
The information technology actThe information technology act
The information technology act
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
I.T ACT 2000
I.T ACT 2000 I.T ACT 2000
I.T ACT 2000
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 

Viewers also liked

BrainShare 2014 - NetIQ Partner Information
BrainShare 2014 - NetIQ Partner InformationBrainShare 2014 - NetIQ Partner Information
BrainShare 2014 - NetIQ Partner Information
Michele Hudnall
 
Презентация НОВИНОК Каталога 16 ORIFLAME
Презентация НОВИНОК Каталога 16 ORIFLAMEПрезентация НОВИНОК Каталога 16 ORIFLAME
Презентация НОВИНОК Каталога 16 ORIFLAMEngespss02
 
Draft of the Third Interim Report
Draft of the Third Interim Report Draft of the Third Interim Report
Draft of the Third Interim Report
MEYS, MŠMT in Czech
 
Рекламно-информационный журнал SCONTO DOM №7
Рекламно-информационный журнал SCONTO DOM №7Рекламно-информационный журнал SCONTO DOM №7
Рекламно-информационный журнал SCONTO DOM №7scontodzr
 
Kertas kerja muhibbah walk
Kertas kerja muhibbah walkKertas kerja muhibbah walk
Kertas kerja muhibbah walkmelcassie
 
Journal 1 2013_en
Journal 1 2013_enJournal 1 2013_en
03 navigator
03 navigator03 navigator
03 navigator
rukford
 
Segunemine Ja Segu
Segunemine Ja SeguSegunemine Ja Segu
Segunemine Ja Segumairimairi
 
P072 page-397-paper223
P072 page-397-paper223P072 page-397-paper223
P072 page-397-paper223
Pete Go
 
Исследование «Города возможностей» 2014
Исследование «Города возможностей» 2014Исследование «Города возможностей» 2014
Исследование «Города возможностей» 2014
PwC Russia
 
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vgRIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
Yachting.vg
 
Samsung ue40 f6800
Samsung ue40 f6800Samsung ue40 f6800
Samsung ue40 f6800
denisparkhoc
 
Dvorzov togda-1-1
Dvorzov togda-1-1Dvorzov togda-1-1
Dvorzov togda-1-1eid1
 
Action universitaire - octobre 2007
Action universitaire - octobre 2007Action universitaire - octobre 2007
Action universitaire - octobre 2007
UNI
 
Мамы. Гаджеты. Технологии
Мамы. Гаджеты. ТехнологииМамы. Гаджеты. Технологии
Мамы. Гаджеты. Технологии
Anna Yovka
 
Information age 2010.oracle e business s
Information age 2010.oracle e business sInformation age 2010.oracle e business s
Information age 2010.oracle e business sOracle Hrvatska
 
2010 Drugs in sport handbook
2010 Drugs in sport handbook2010 Drugs in sport handbook
2010 Drugs in sport handbook
Marcel Deacon
 
Городская культура и качество американского образа жизни.
Городская культура и качество американского образа жизни.Городская культура и качество американского образа жизни.
Городская культура и качество американского образа жизни.sofiageryavenko
 
ITIL Module - OverView
ITIL Module - OverViewITIL Module - OverView
ITIL Module - OverView
Jairo Willian Pereira
 
Mini mba new
Mini mba newMini mba new
Mini mba new
uprav
 

Viewers also liked (20)

BrainShare 2014 - NetIQ Partner Information
BrainShare 2014 - NetIQ Partner InformationBrainShare 2014 - NetIQ Partner Information
BrainShare 2014 - NetIQ Partner Information
 
Презентация НОВИНОК Каталога 16 ORIFLAME
Презентация НОВИНОК Каталога 16 ORIFLAMEПрезентация НОВИНОК Каталога 16 ORIFLAME
Презентация НОВИНОК Каталога 16 ORIFLAME
 
Draft of the Third Interim Report
Draft of the Third Interim Report Draft of the Third Interim Report
Draft of the Third Interim Report
 
Рекламно-информационный журнал SCONTO DOM №7
Рекламно-информационный журнал SCONTO DOM №7Рекламно-информационный журнал SCONTO DOM №7
Рекламно-информационный журнал SCONTO DOM №7
 
Kertas kerja muhibbah walk
Kertas kerja muhibbah walkKertas kerja muhibbah walk
Kertas kerja muhibbah walk
 
Journal 1 2013_en
Journal 1 2013_enJournal 1 2013_en
Journal 1 2013_en
 
03 navigator
03 navigator03 navigator
03 navigator
 
Segunemine Ja Segu
Segunemine Ja SeguSegunemine Ja Segu
Segunemine Ja Segu
 
P072 page-397-paper223
P072 page-397-paper223P072 page-397-paper223
P072 page-397-paper223
 
Исследование «Города возможностей» 2014
Исследование «Города возможностей» 2014Исследование «Города возможностей» 2014
Исследование «Города возможностей» 2014
 
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vgRIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
RIO RIO 750 SOL, 2004, 28.500 € For Sale Brochure. Presented By yachting.vg
 
Samsung ue40 f6800
Samsung ue40 f6800Samsung ue40 f6800
Samsung ue40 f6800
 
Dvorzov togda-1-1
Dvorzov togda-1-1Dvorzov togda-1-1
Dvorzov togda-1-1
 
Action universitaire - octobre 2007
Action universitaire - octobre 2007Action universitaire - octobre 2007
Action universitaire - octobre 2007
 
Мамы. Гаджеты. Технологии
Мамы. Гаджеты. ТехнологииМамы. Гаджеты. Технологии
Мамы. Гаджеты. Технологии
 
Information age 2010.oracle e business s
Information age 2010.oracle e business sInformation age 2010.oracle e business s
Information age 2010.oracle e business s
 
2010 Drugs in sport handbook
2010 Drugs in sport handbook2010 Drugs in sport handbook
2010 Drugs in sport handbook
 
Городская культура и качество американского образа жизни.
Городская культура и качество американского образа жизни.Городская культура и качество американского образа жизни.
Городская культура и качество американского образа жизни.
 
ITIL Module - OverView
ITIL Module - OverViewITIL Module - OverView
ITIL Module - OverView
 
Mini mba new
Mini mba newMini mba new
Mini mba new
 

Similar to AB 195 introduced to crack-down on hackers

Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
Sonnie Santos
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
Jim Ayson
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
Maruthi N.E
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
MarkFredderickAbejo
 
Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02
mark a villarin
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
Povo News
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01
Baldwin Cruz
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
John Macasio
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
Kavya2Kavyaa
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
Ranjita Naik
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
videoaakash15
 
Cybercrime
CybercrimeCybercrime
Cybercrime
nayakslideshare
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
cparimala
 
Digital-Security-Act-2020.pdf
Digital-Security-Act-2020.pdfDigital-Security-Act-2020.pdf
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
Nadeem Kazi
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
Vishni Ganepola
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
Chinatu Uzuegbu
 

Similar to AB 195 introduced to crack-down on hackers (20)

Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
It act,2000 note
It act,2000 noteIt act,2000 note
It act,2000 note
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Digital-Security-Act-2020.pdf
Digital-Security-Act-2020.pdfDigital-Security-Act-2020.pdf
Digital-Security-Act-2020.pdf
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 

Recently uploaded (20)

PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 

AB 195 introduced to crack-down on hackers

  • 1. california legislature—2015–16 regular session ASSEMBLY BILL No. 195 Introduced by Assembly Member Chau January 28, 2015 An act to amend Sections 502 and 653f of the Penal Code, relating to computer crimes. legislative counsel’s digest AB 195, as introduced, Chau. Unauthorized access to computer systems. (1) Existing law establishes various crimes related to computer services and systems. Existing law makes it a crime to knowingly, and without permission, access, cause to be accessed, or provide or assist in providing a means of accessing, a computer, computer system, computer network, or computer data in violation of prescribed provisions, and defines related terms. This bill would specify that “computer network” for these purposes includes smartphones, as defined, and would make a conforming change. (2) Existing law makes it a crime for a person, with the intent that the crime be committed, to solicit another to commit or join in the commission of prescribed crimes. This bill would expand these provisions to make it a crime for a person, with the intent that the crime be committed, to solicit another to commit or join in the commission of the access crimes related to computer services and systems. The bill would make it a crime to offer to obtain or procure assistance for another to obtain unauthorized access, or to assist others in locating hacking services, as defined. The bill would make a violation of this provision punishable by imprisonment 99
  • 2. in a county jail for a term not to exceed 6 months, or imprisonment for a term not to exceed one year for subsequent violations. (3) By expanding the definitions of existing crimes, this bill would impose a state-mandated local program. The California Constitution requires the state to reimburse local agencies and school districts for certain costs mandated by the state. Statutory provisions establish procedures for making that reimbursement. This bill would provide that no reimbursement is required by this act for a specified reason. Vote: majority. Appropriation: no. Fiscal committee: yes. State-mandated local program: yes. The people of the State of California do enact as follows: line 1 SECTION 1. Section 502 of the Penal Code is amended to line 2 read: line 3 502. (a)  It is the intent of the Legislature in enacting this line 4 section to expand the degree of protection afforded to individuals, line5 businesses, and governmental agencies from tampering, line 6 interference, damage, and unauthorized access to lawfully created line 7 computer data and computer systems. The Legislature finds and line 8 declares that the proliferation of computer technology has resulted line 9 in a concomitant proliferation of computer crime and other forms line 10 of unauthorized access to computers, computer systems, and line 11 computer data. line 12 The Legislature further finds and declares that protection of the line 13 integrity of all types and forms of lawfully created computers, line 14 computer systems, and computer data is vital to the protection of line 15 the privacy of individuals as well as to the well-being of financial line 16 institutions, business concerns, governmental agencies, and others line 17 within this state that lawfully utilize those computers, computer line 18 systems, and data. line 19 (b)  For the purposes of this section, the following terms have line 20 the following meanings: line 21 (1)  “Access” means to gain entry to, instruct, cause input to, line 22 cause output from, cause data processing with, or communicate line 23 with, the logical, arithmetical, or memory function resources of a line 24 computer, computer system, or computer network. line 25 (2)  “Computer network” means any system that provides line 26 communications between one or more computer systems and 99 — 2 —AB 195
  • 3. line 1 input/output devices including, but not limited to, display terminals, line 2 remote systems, mobile devices, smartphones, and printers line 3 connected by telecommunication facilities. line 4 (3)  “Computer program or software” means a set of instructions line 5 or statements, and related data, that when executed in actual or line 6 modified form, cause a computer, computer system, or computer line 7 network to perform specified functions. line 8 (4)  “Computer services” includes, but is not limited to, computer line 9 time, data processing, or storage functions, Internet services, line 10 electronic mail services, electronic message services, or other uses line 11 of a computer, computer system, or computer network. line 12 (5)  “Computer system” means a device or collection of devices, line 13 including support devices and excluding calculators that are not line 14 programmable and capable of being used in conjunction with line 15 external files, one or more of which contain computer programs, line 16 electronic instructions, input data, and output data, that performs line 17 functions including, but not limited to, logic, arithmetic, data line 18 storage and retrieval, communication, and control. line 19 (6)  “Government computer system” means any computer system, line 20 or part thereof, that is owned, operated, or used by any federal, line 21 state, or local governmental entity. line 22 (7)  “Public safety infrastructure computer system” means any line 23 computer system, or part thereof, that is necessary for the health line 24 and safety of the public including computer systems owned, line 25 operated, or used by drinking water and wastewater treatment line26 facilities, hospitals, emergency service providers, line 27 telecommunication companies, and gas and electric utility line 28 companies. line 29 (8)  “Data” means a representation of information, knowledge, line 30 facts, concepts, computer software, computer programs or line 31 instructions, or smartphone applications. Data may be in any form, line 32 in storage media, or as stored in the memory of the computer or line 33 in transit or presented on a display device. line 34 (9)  “Supporting documentation” includes, but is not limited to, line 35 all information, in any form, pertaining to the design, construction, line 36 classification, implementation, use, or modification of a computer, line 37 computer system, computer network, computer program, or line 38 computer software, which information is not generally available line 39 to the public and is necessary for the operation of a computer, 99 AB 195— 3 —
  • 4. line 1 computer system, computer network, computer program, or line 2 computer software. line 3 (10)  “Injury” means any alteration, deletion, damage, or line 4 destruction of a computer system, computer network, computer line 5 program, or data caused by the access, or the denial of access to line 6 legitimate users of a computer system, network, or program. line 7 (11)  “Victim expenditure” means any expenditure reasonably line 8 and necessarily incurred by the owner or lessee to verify that a line 9 computer system, computer network, computer program, or data line 10 was or was not altered, deleted, damaged, or destroyed by the line 11 access. line 12 (12)  “Computer contaminant” means any set of computer line 13 instructions that are designed to modify, damage, destroy, record, line 14 or transmit information within a computer, computer system, or line 15 computer network without the intent or permission of the owner line 16 of the information. They include, but are not limited to, a group line 17 of computer instructions commonly called viruses or worms, that line 18 are self-replicating or self-propagating and are designed to line 19 contaminate other computer programs or computer data, consume line 20 computer resources, modify, destroy, record, or transmit data, or line 21 in some other fashion usurp the normal operation of the computer, line 22 computer system, or computer network. line 23 (13)  “Internet domain name” means a globally unique, line 24 hierarchical reference to an Internet host or service, assigned line 25 through centralized Internet naming authorities, comprising a series line 26 of character strings separated by periods, with the rightmost line 27 character string specifying the top of the hierarchy. line 28 (14)  “Electronic mail” means an electronic message or computer line 29 file that is transmitted between two or more telecommunications line 30 devices; computers; computer networks, regardless of whether the line 31 network is a local, regional, or global network; or electronic devices line 32 capable or receiving electronic messages, regardless of whether line 33 the message is converted to hard copy format after receipt, viewed line 34 upon transmission, or stored for later retrieval. line 35 (15)  “Profile” means either of the following: line 36 (A)  A configuration of user data required by a computer so that line 37 the user may access programs or services and have the desired line 38 functionality on that computer. line 39 (B)  An Internet Web site user’s personal page or section of a line 40 page that is made up of data, in text of graphical form, that displays 99 — 4 —AB 195
  • 5. line 1 significant, unique, or identifying information, including, but not line 2 limited to, listing acquaintances, interests, associations, activities, line 3 or personal statements. line 4 (16)  “Smartphone” means a cellular radio telephone or other line 5 mobile communications device that performs many of the functions line 6 of a computer, typically having a touchscreen interface, Internet line 7 access, and an operating system capable of running downloaded line 8 applications. line 9 (c)  Except as provided in subdivision (h), any person who line 10 commits any of the following acts is guilty of a public offense: line 11 (1)  Knowingly accesses and without permission alters, damages, line 12 deletes, destroys, or otherwise uses any data, computer, computer line 13 system, or computer network in order to either (A) devise or line 14 execute any scheme or artifice to defraud, deceive, or extort, or line 15 (B) wrongfully control or obtain money, property, or data. line 16 (2)  Knowingly accesses and without permission takes, copies, line 17 or makes use of any data from a computer, computer system, or line18 computer network, or takes or copies any supporting line 19 documentation, whether existing or residing internal or external line 20 to a computer, computer system, or computer network. line 21 (3)  Knowingly and without permission uses or causes to be used line 22 computer services. line 23 (4)  Knowingly accesses and without permission adds, alters, line 24 damages, deletes, or destroys any data, computer software, or line 25 computer programs which reside or exist internal or external to a line 26 computer, computer system, or computer network. line 27 (5)  Knowingly and without permission disrupts or causes the line 28 disruption of computer services or denies or causes the denial of line 29 computer services to an authorized user of a computer, computer line 30 system, or computer network. line 31 (6)  Knowingly and without permission provides or assists in line 32 providing a means of accessing a computer, computer system, or line 33 computer network in violation of this section. line 34 (7)  Knowingly and without permission accesses or causes to be line 35 accessed any computer, computer system, or computer network. line 36 (8)  Knowingly introduces any computer contaminant into any line 37 computer, computer system, or computer network. line 38 (9)  Knowingly and without permission uses the Internet domain line 39 name or profile of another individual, corporation, or entity in line 40 connection with the sending of one or more electronic mail 99 AB 195— 5 —
  • 6. line 1 messages or posts and thereby damages or causes damage to a line 2 computer, computer data, computer system, or computer network. line 3 (10)  Knowingly and without permission disrupts or causes the line 4 disruption of government computer services or denies or causes line 5 the denial of government computer services to an authorized user line 6 of a government computer, computer system, or computer network. line 7 (11)  Knowingly accesses and without permission adds, alters, line 8 damages, deletes, or destroys any data, computer software, or line 9 computer programs which reside or exist internal or external to a line 10 public safety infrastructure computer system computer, computer line 11 system, or computer network. line 12 (12)  Knowingly and without permission disrupts or causes the line 13 disruption of public safety infrastructure computer system computer line 14 services or denies or causes the denial of computer services to an line 15 authorized user of a public safety infrastructure computer system line 16 computer, computer system, or computer network. line 17 (13)  Knowingly and without permission provides or assists in line 18 providing a means of accessing a computer, computer system, or line 19 public safety infrastructure computer system computer, computer line 20 system, or computer network in violation of this section. line 21 (14)  Knowingly introduces any computer contaminant into any line 22 public safety infrastructure computer system computer, computer line 23 system, or computer network. line 24 (d)  (1)  Any person who violates any of the provisions of line 25 paragraph (1), (2), (4), (5), (10), (11), or (12) of subdivision (c) is line 26 punishable by a fine not exceeding ten thousand dollars ($10,000), line 27 or by imprisonment pursuant to subdivision (h) of Section 1170 line 28 for 16 months, or two or three years, or by both that fine and line 29 imprisonment, or by a fine not exceeding five thousand dollars line 30 ($5,000), or by imprisonment in a county jail not exceeding one line 31 year, or by both that fine and imprisonment. line 32 (2)  Any person who violates paragraph (3) of subdivision (c) line 33 is punishable as follows: line 34 (A)  For the first violation that does not result in injury, and line 35 where the value of the computer services used does not exceed line 36 nine hundred fifty dollars ($950), by a fine not exceeding five line 37 thousand dollars ($5,000), or by imprisonment in a county jail not line 38 exceeding one year, or by both that fine and imprisonment. line 39 (B)  For any violation that results in a victim expenditure in an line 40 amount greater than five thousand dollars ($5,000) or in an injury, 99 — 6 —AB 195
  • 7. line 1 or if the value of the computer services used exceeds nine hundred line 2 fifty dollars ($950), or for any second or subsequent violation, by line 3 a fine not exceeding ten thousand dollars ($10,000), or by line 4 imprisonment pursuant to subdivision (h) of Section 1170 for 16 line 5 months, or two or three years, or by both that fine and line 6 imprisonment, or by a fine not exceeding five thousand dollars line 7 ($5,000), or by imprisonment in a county jail not exceeding one line 8 year, or by both that fine and imprisonment. line 9 (3)  Any person who violates paragraph (6), (7), or (13) of line 10 subdivision (c) is punishable as follows: line 11 (A)  For a first violation that does not result in injury, an line 12 infraction punishable by a fine not exceeding one thousand dollars line 13 ($1,000). line 14 (B)  For any violation that results in a victim expenditure in an line 15 amount not greater than five thousand dollars ($5,000), or for a line 16 second or subsequent violation, by a fine not exceeding five line 17 thousand dollars ($5,000), or by imprisonment in a county jail not line 18 exceeding one year, or by both that fine and imprisonment. line 19 (C)  For any violation that results in a victim expenditure in an line 20 amount greater than five thousand dollars ($5,000), by a fine not line 21 exceeding ten thousand dollars ($10,000), or by imprisonment line 22 pursuant to subdivision (h) of Section 1170 for 16 months, or two line 23 or three years, or by both that fine and imprisonment, or by a fine line 24 not exceeding five thousand dollars ($5,000), or by imprisonment line 25 in a county jail not exceeding one year, or by both that fine and line 26 imprisonment. line 27 (4)  Any person who violates paragraph (8) or (14) of subdivision line 28 (c) is punishable as follows: line 29 (A)  For a first violation that does not result in injury, a line 30 misdemeanor punishable by a fine not exceeding five thousand line 31 dollars ($5,000), or by imprisonment in a county jail not exceeding line 32 one year, or by both that fine and imprisonment. line 33 (B)  For any violation that results in injury, or for a second or line 34 subsequent violation, by a fine not exceeding ten thousand dollars line 35 ($10,000), or by imprisonment in a county jail not exceeding one line 36 year, or by imprisonment pursuant to subdivision (h) of Section line 37 1170, or by both that fine and imprisonment. line 38 (5)  Any person who violates paragraph (9) of subdivision (c) line 39 is punishable as follows: 99 AB 195— 7 —
  • 8. line 1 (A)  For a first violation that does not result in injury, an line 2 infraction punishable by a fine not exceeding one thousand dollars line 3 ($1,000). line 4 (B)  For any violation that results in injury, or for a second or line 5 subsequent violation, by a fine not exceeding five thousand dollars line 6 ($5,000), or by imprisonment in a county jail not exceeding one line 7 year, or by both that fine and imprisonment. line 8 (e)  (1)  In addition to any other civil remedy available, the owner line 9 or lessee of the computer, computer system, computer network, line 10 computer program, or data who suffers damage or loss by reason line 11 of a violation of any of the provisions of subdivision (c) may bring line 12 a civil action against the violator for compensatory damages and line 13 injunctive relief or other equitable relief. Compensatory damages line 14 shall include any expenditure reasonably and necessarily incurred line 15 by the owner or lessee to verify that a computer system, computer line 16 network, computer program, or data was or was not altered, line 17 damaged, or deleted by the access. For the purposes of actions line 18 authorized by this subdivision, the conduct of an unemancipated line 19 minor shall be imputed to the parent or legal guardian having line 20 control or custody of the minor, pursuant to the provisions of line 21 Section 1714.1 of the Civil Code. line 22 (2)  In any action brought pursuant to this subdivision the court line 23 may award reasonable attorney’s fees. line 24 (3)  A community college, state university, or academic line 25 institution accredited in this state is required to include line 26 computer-related crimes as a specific violation of college or line 27 university student conduct policies and regulations that may subject line 28 a student to disciplinary sanctions up to and including dismissal line 29 from the academic institution. This paragraph shall not apply to line 30 the University of California unless the Board of Regents adopts a line 31 resolution to that effect. line 32 (4)  In any action brought pursuant to this subdivision for a line 33 willful violation of the provisions of subdivision (c), where it is line 34 proved by clear and convincing evidence that a defendant has been line 35 guilty of oppression, fraud, or malice as defined in subdivision (c) line 36 of Section 3294 of the Civil Code, the court may additionally award line 37 punitive or exemplary damages. line 38 (5)  No action may be brought pursuant to this subdivision unless line 39 it is initiated within three years of the date of the act complained line 40 of, or the date of the discovery of the damage, whichever is later. 99 — 8 —AB 195
  • 9. line 1 (f)  This section shall not be construed to preclude the line 2 applicability of any other provision of the criminal law of this state line 3 which applies or may apply to any transaction, nor shall it make line 4 illegal any employee labor relations activities that are within the line 5 scope and protection of state or federal labor laws. line 6 (g)  Any computer, computer system, computer network, or any line 7 software or data, owned by the defendant, that is used during the line 8 commission of any public offense described in subdivision (c) or line 9 any computer, owned by the defendant, which is used as a line 10 repository for the storage of software or data illegally obtained in line 11 violation of subdivision (c) shall be subject to forfeiture, as line 12 specified in Section 502.01. line 13 (h)  (1)  Subdivision (c) does not apply to punish any acts which line 14 are committed by a person within the scope of his or her lawful line 15 employment. For purposes of this section, a person acts within the line 16 scope of his or her employment when he or she performs acts line 17 which are reasonably necessary to the performance of his or her line 18 work assignment. line 19 (2)  Paragraph (3) of subdivision (c) does not apply to penalize line 20 any acts committed by a person acting outside of his or her lawful line 21 employment, provided that the employee’s activities do not cause line 22 an injury, to the employer or another, or provided that the value line 23 of supplies or computer services which are used does not exceed line 24 an accumulated total of two hundred fifty dollars ($250). line 25 (i)  No activity exempted from prosecution under paragraph (2) line 26 of subdivision (h) which incidentally violates paragraph (2), (4), line 27 or (7) of subdivision (c) shall be prosecuted under those paragraphs. line 28 (j)  For purposes of bringing a civil or a criminal action under line 29 this section, a person who causes, by any means, the access of a line 30 computer, computer system, or computer network in one line 31 jurisdiction from another jurisdiction is deemed to have personally line 32 accessed the computer, computer system, or computer network in line 33 each jurisdiction. line 34 (k)  In determining the terms and conditions applicable to a line 35 person convicted of a violation of this section the court shall line 36 consider the following: line 37 (1)  The court shall consider prohibitions on access to and use line 38 of computers. line 39 (2)  Except as otherwise required by law, the court shall consider line 40 alternate sentencing, including community service, if the defendant 99 AB 195— 9 —
  • 10. line 1 shows remorse and recognition of the wrongdoing, and an line 2 inclination not to repeat the offense. line 3 SEC. 2. Section 653f of the Penal Code is amended to read: line 4 653f. (a)  Every person who, with the intent that the crime be line 5 committed, solicits another to offer, accept, or join in the offer or line 6 acceptance of a bribe, or to commit or join in the commission of line 7 carjacking, robbery, burglary, grand theft, receiving stolen property, line 8 extortion, perjury, subornation of perjury, forgery, kidnapping, line 9 arson or assault with a deadly weapon or instrument or by means line 10 of force likely to produce great bodily injury, or, by the use of line 11 force or a threat of force, to prevent or dissuade any person who line 12 is or may become a witness from attending upon, or testifying at, line 13 any trial, proceeding, or inquiry authorized by law, shall be line 14 punished by imprisonment in a county jail for not more than one line 15 year or pursuant to subdivision (h) of Section 1170, or by a fine line 16 of not more than ten thousand dollars ($10,000), or the amount line 17 which could have been assessed for commission of the offense line 18 itself, whichever is greater, or by both the fine and imprisonment. line 19 (b)  Every person who, with the intent that the crime be line 20 committed, solicits another to commit or join in the commission line 21 of murder shall be punished by imprisonment in the state prison line 22 for three, six, or nine years. line 23 (c)  Every person who, with the intent that the crime be line 24 committed, solicits another to commit rape by force or violence, line 25 sodomy by force or violence, oral copulation by force or violence, line 26 or any violation of Section 264.1, 288, or 289, shall be punished line 27 by imprisonment in the state prison for two, three, or four years. line 28 (d)  (1)  Every person who, with the intent that the crime be line 29 committed, solicits another to commit an offense specified in line 30 Section 11352, 11379, 11379.5, 11379.6, or 11391 of the Health line 31 and Safety Code shall be punished by imprisonment in a county line 32 jail not exceeding six months. Every person, who, having been line 33 convicted of soliciting another to commit an offense specified in line 34 this subdivision, is subsequently convicted of the proscribed line 35 solicitation, shall be punished by imprisonment in a county jail line 36 not exceeding one year, or pursuant to subdivision (h) of Section line 37 1170. line 38 (2)  This subdivision does not apply where the term of line 39 imprisonment imposed under other provisions of law would result line 40 in a longer term of imprisonment. 99 — 10 —AB 195
  • 11. line 1 (e)  Every person who, with the intent that the crime be line 2 committed, solicits another to commit an offense specified in line 3 Section 14014 of the Welfare and Institutions Code shall be line 4 punished by imprisonment in a county jail for not exceeding six line 5 months. Every person who, having been convicted of soliciting line 6 another to commit an offense specified in this subdivision, is line 7 subsequently convicted of the proscribed solicitation, shall be line 8 punished by imprisonment in a county jail not exceeding one year, line 9 or pursuant to subdivision (h) of Section 1170. line 10 (f)  (1)  Every person who, with the intent that the crime be line 11 committed, solicits another to commit an offense set forth in Section line 12 502 shall be punished as set forth in paragraph (3). line 13 (2)  Every person who, with the intent that the crime be line 14 committed, offers to solicit assistance for another to conduct line 15 activities in violation of Section 502 shall be punished as set forth line 16 in paragraph (3). This includes persons operating Internet Web line 17 sites that offer to assist others in locating hacking services. For line 18 the purposes of this section “hacking services” means assistance line 19 in the unauthorized access to computers, computer systems, or line 20 computer data in violation of Section 502. line 21 (3)  Every person who violates this subdivision shall be punished line 22 by imprisonment in a county jail for a period not to exceed six line 23 months. Every subsequent violation of this subdivision by that line 24 same person shall be punished by imprisonment in a county jail line 25 not exceeding one year, or pursuant to subdivision (h) of Section line 26 1170. line 27 (f) line 28 (g)  An offense charged in violation of subdivision (a), (b), or line 29 (c) shall be proven by the testimony of two witnesses, or of one line 30 witness and corroborating circumstances. An offense charged in line 31 violation of subdivision (d) or (e) (d), (e), or (f) shall be proven line 32 by the testimony of one witness and corroborating circumstances. line 33 SEC. 3. No reimbursement is required by this act pursuant to line 34 Section 6 of Article XIIIB of the California Constitution because line 35 the only costs that may be incurred by a local agency or school line 36 district will be incurred because this act creates a new crime or line 37 infraction, eliminates a crime or infraction, or changes the penalty line 38 for a crime or infraction, within the meaning of Section 17556 of line 39 the Government Code, or changes the definition of a crime within 99 AB 195— 11 —
  • 12. line 1 the meaning of Section 6 of Article XIII B of the California line 2 Constitution. O 99 — 12 —AB 195