Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project
Illinois Dont be a FOOL; The Law is Not DIY
Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

Cybercrime

Illinois Compiled Statutes 720 ILCS 5/16D-3 Computer Tampering

(a) A person commits the offense of computer tampering when he knowingly and without the authorization of a computer's owner, as defined in Section 15-2 of this Code, or in excess of the authority granted to him:

(1) Accesses or causes to be accessed a computer or any part thereof, a computer network, or a program or data;

(2) Accesses or causes to be accessed a computer or any part thereof, a computer network, or a program or data, and obtains data or services;

(3) Accesses or causes to be accessed a computer or any part thereof, a computer network, or a program or data, and damages or destroys the computer or alters, deletes or removes a computer program or data;

(4) Inserts or attempts to insert a "program" into a computer or computer program knowing or having reason to believe that such "program" contains information or commands that will or may damage or destroy that computer, or any other computer subsequently accessing or being accessed by that computer, or that will or may alter, delete or remove a computer program or data from that computer, or any other computer program or data in a computer subsequently accessing or being accessed by that computer, or that will or may cause loss to the users of that computer or the users of a computer which accesses or which is accessed by such "program";

(5) Falsifies or forges electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers;

. . . . .

(a-10) For purposes of subsection (a), accessing a computer network is deemed to be with the authorization of a computer's owner if:

(1) the owner authorizes patrons, customers, or guests to access the computer network and the person accessing the computer network is an authorized patron, customer, or guest and complies with all terms or conditions for use of the computer network that are imposed by the owner; or

(2) the owner authorizes the public to access the computer network and the person accessing the computer network complies with all terms or conditions for use of the computer network that are imposed by the owner.  

Broadband

ilil

Municipal Broadband

VoIP

  • Free ride over for VoIP?, CNET (Aug. 25, 2003)  ("If it's a company operating as a phone company, then there are requirements they must follow," said Beth Bosch, a spokeswoman for the Illinois Commerce Commission, which, along with other states, has raised concerns over VoIP emergency 911 services.)
  • Verizon reportedly filed a tariff for a VoIP service offering. Regulatory Considerations for Regulatory Considerations for Cable Provided IP Telephony, Mintz Levin March 3, 2003
  • Wifi Security

    A guy piggy backed onto the network of a non-profit in the middle of the night and was charged under an Illinois statute. Sentence: One year court supervision and a $250 fine.

  • Mark Gibbs, Open WiFi Stupidity, Network World (March 29, 2006)
  • Illinois WiFi Freeloader Fined $250 , ARS Technica (March 23, 2006)
  • Dale Dietrich, Illinois WiFi Freeloader Fined US$250, iMedia Law Blog (March 23, 2006)