Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project
Deleware Dont be a FOOL; The Law is Not DIY
Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

dede

Cybercrime

Del. Code § 932. Unauthorized access.

A person is guilty of the computer crime of unauthorized access to a computer system when, knowing that the person is not authorized to do so, the person accesses or causes to be accessed any computer system without authorization.

§ 933. Theft of computer services.

A person is guilty of the computer crime of theft of computer services when the person accesses or causes to be accessed or otherwise uses or causes to be used a computer system with the intent to obtain unauthorized computer services, computer software or data. (64 Del. Laws, c. 438, § 1; 70 Del. Laws, c. 186, § 1.)

§ 934. Interruption of computer services.

A person is guilty of the computer crime of interruption of computer services when that person, without authorization, intentionally or recklessly disrupts or degrades or causes the disruption or degradation of computer services or denies or causes the denial of computer services to an authorized user of a computer system. (64 Del. Laws, c. 438, § 1.)

§ 935. Misuse of computer system information.

A person is guilty of the computer crime of misuse of computer system information when:

(1) As a result of accessing or causing to be accessed a computer system, the person intentionally makes or causes to be made an unauthorized display, use, disclosure or copy, in any form, of data residing in, communicated by or produced by a computer system;

(2) That person intentionally or recklessly and without authorization:

a. Alters, deletes, tampers with, damages, destroys or takes data intended for use by a computer system, whether residing within or external to a computer system; or

b. Interrupts or adds data to data residing within a computer system;

(3) That person knowingly receives or retains data obtained in violation of paragraph (1) or (2) of this section; or

(4) That person uses or discloses any data which that person knows or believes was obtained in violation of paragraph (1) or (2) of this section. (64 Del. Laws, c. 438, § 1; 70 Del. Laws, c. 186, § 1.)

§ 936. Destruction of computer equipment.

A person is guilty of the computer crime of destruction of computer equipment when that person, without authorization, intentionally or recklessly tampers with, takes, transfers, conceals, alters, damages or destroys any equipment used in a computer system or intentionally or recklessly causes any of the foregoing to occur. (64 Del. Laws, c. 438, § 1.)

§ 937. Unrequested or unauthorized electronic mail or use of network or software to cause same.

A person is guilty of the computer crime of unrequested or unauthorized electronic mail:

(1) When that person, without authorization, intentionally or recklessly distributes any unsolicited bulk commercial electronic mail (commercial E-mail) to any receiving address or account under the control of any authorized user of a computer system. This section shall not apply to electronic mail that is sent between human beings, or when the individual has requested said information. This section shall not apply to the transmission of electronic mail from an organization to its members or where there is a preexisting business relationship. No Internet/interactive service provider shall be liable for merely transmitting an unsolicited, bulk commercial electronic mail message in its network. No Internet/interactive service provider shall be held liable for any action voluntarily taken in good faith to block the receipt or transmission through its service of any unsolicited, bulk electronic mail which it believes is, or will be, sent in violation to disconnect or terminate the service of any person that is in violation of this article; or

(2) When a person uses a computer or computer network without authority with the intent to: Falsify or forge electronic mail transmission information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers; or

(3) When a person sells, gives or otherwise distributes or possesses with the intent to sell, give or distribute software which:

a. Is primarily designed or produced for the purpose of facilitating or enabling the falsification of electronic mail transmission information or other routing information;

b. Has only limited commercially significant purpose or use other than to facilitate or enable the falsification of electronic mail transmission information or other routing information; or

c. Is marketed by that person or another acting in concert with that person's knowledge for use in facilitating or enabling the falsification of electronic mail transmission information or other routing information.

(4) For the purposes of this section, conduct occurring outside of the State shall be sufficient to constitute this offense if such conduct is within the terms of § 204 of this title, or if the receiving address or account was under the control of any authorized user of a computer system who was located in Delaware at the time the authorized user received the electronic mail or communication and the defendant was aware of circumstances which rendered the presence of such authorized user in Delaware a reasonable possibility. (72 Del. Laws, c. 135, § 1; 70 Del. Laws, c. 186, § 1.)

§ 938. Failure to promptly cease electronic communication upon request.

(a) A person is guilty of the computer crime of failure to promptly cease electronic communication upon request when that person intentionally, recklessly or negligently, fails to stop sending commercial electronic mail to any receiving address or account under the control of any authorized user of a computer system after being requested to do so. All commercial electronic mail sent to any receiving address within the State shall have information to the recipient on how to unsubscribe or stop further receipt of commercial electronic mail from the sender.

(b) For the purposes of this section, conduct occurring outside of the State shall be sufficient to constitute this offense if such conduct is within the terms of § 204 of this title, or if the receiving address or account was under the control of any authorized user of a computer system who was located in Delaware at the time the authorized user received the electronic mail or communication and the defendant was aware of circumstances which rendered the presence of such authorized user in Delaware a reasonable possibility. (72 Del. Laws, c. 135, § 1; 70 Del. Laws, c. 186, § 1.)

§ 939. Penalties.

(a) A person committing any of the crimes described in §§ 932-938 of this title is guilty in the first degree when the damage to or the value of the property or computer services affected exceeds $10,000.

Computer crime in the first degree is a class D felony.

(b) A person committing any of the crimes described in §§ 932-938 of this title is guilty in the second degree when the damage to or the value of the property or computer services affected exceeds $5,000.

Computer crime in the second degree is a class E felony.

(c) A person committing any of the crimes described in §§ 932-938 of this title is guilty in the third degree when:

(1) The damage to or the value of the property or computer services affected exceeds $1,000; or

(2) That person engages in conduct which creates a risk of serious physical injury to another person.

Computer crime in the third degree is a class F felony.

(d) A person committing any of the crimes described in §§ 932-938 of this title is guilty in the fourth degree when the damage to or the value of the property or computer services affected exceeds $500.

Computer crime in the fourth degree is a class G felony.

(e) A person committing any of the crimes described in §§ 932-938 of this title is guilty in the fifth degree when the damage to or the value of the property or computer services, if any, is $500 or less.

Computer crime in the fifth degree is a class A misdemeanor.

(f) Any person gaining money, property services or other consideration through the commission of any offense under this subpart, upon conviction, in lieu of having a fine imposed, may be sentenced by the court to pay an amount, fixed by the court, not to exceed double the amount of the defendant's gain from the commission of such offense. In such case, the court shall make a finding as to the amount of the defendant's gain from the offense and, if the record does not contain sufficient evidence to support such a finding, the court may conduct a hearing upon the issue. For the purpose of this section, "gain" means the amount of money or the value of property or computer services or other consideration derived.

(g) Amounts included in violations of this subpart committed pursuant to 1 scheme or course of conduct, whether from the same person or several persons, may be aggregated in determining the degree of the crime.

(h) For the purposes of this subpart, the value of property or computer services shall be:

(1) The market value of the property or computer services at the time of the violation; or

(2) If the property or computer services are unrecoverable, damaged or destroyed as a result of a violation of this subpart, the cost of reproducing or replacing the property or computer services at the time of the violation.

When the value of the property or computer services or damage thereto cannot be satisfactorily ascertained, the value shall be deemed to be $250.

(i) Notwithstanding this section, the value of private personal data shall be deemed to be $500. (64 Del. Laws, c. 438, § 1; 67 Del. Laws, c. 130, § 8; 72 Del. Laws, c. 135, §§ 1, 2.)

© Cybertelecom ::