Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project
Utah Dont be a FOOL; The Law is Not DIY
Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

Cybercrime

76-6-703 . Computer crimes and penalties.

(2) (a) Except as provided in Subsection (2)(b), a person who intentionally or knowingly and without authorization gains or attempts to gain access to a computer, computer network, computer property, or computer system under circumstances not otherwise constituting an offense under this section is guilty of a class B misdemeanor.

76-6-702 . Definitions.
     As used in this part:
     (1) "Access" means to directly or indirectly use, attempt to use, instruct, communicate with, cause input to, cause output from, or otherwise make use of any resources of a computer, computer system, computer network, or any means of communication with any of them.
     (2) "Authorization" means having the express or implied consent or permission of the owner, or of the person authorized by the owner to give consent or permission to access a computer, computer system, or computer network in a manner not exceeding the consent or permission.

76-10-1204, -1206 (posting material online that is harmful to children where host is located in Utah)

76-10-1231 . Data service providers -- Internet content harmful to minors.

(1) (a) Upon request by a consumer, a service provider shall filter content to prevent the transmission of material harmful to minors to the consumer.
     (b) A service provider complies with Subsection (1)(a) if it uses a generally accepted and commercially reasonable method of filtering.
     (2) At the time of a consumer's subscription to a service provider's service, or at the time this section takes effect if the consumer subscribes to the service provider's service at the time this section takes effect, the service provider shall notify the consumer in a conspicuous manner that the consumer may request to have material harmful to minors blocked under Subsection (1).
     (3) (a) A service provider may comply with Subsection (1) by:
     (i) providing in-network filtering to prevent receipt of material harmful to minors, provided that the filtering does not affect or interfere with access to Internet content for consumers who do not request filtering under Subsection (1); or
     (ii) providing software, engaging a third party to provide software, or referring users to a third party that provides filtering software, by providing a clear and conspicuous hyperlink or written statement, for installation on the consumer's computer that blocks, in an easy-to-enable and commercially reasonable manner, receipt of material harmful to minors.
     (b) A service provider may charge a consumer for providing filtering under Subsection (3)(a).

. . . . .

76-10-1230 . Definitions.

(4) (a) "Internet service provider" means a person engaged in the business of providing a computer communications facility in Utah, with the intent of making a profit, through which a consumer may obtain access to the Internet. [Editor's note: that would appear to exclude coffee houses offering free WiFi]
     (b) "Internet service provider" does not include a common carrier if it provides only telecommunications service.

. . . . .

     (7) (a) Except as provided in Subsection (7)(b), "service provider" means an Internet service provider.
     (b) "Service provider" does not include a person who does not terminate a service in this state, but merely transmits data through:
     (i) a wire;
     (ii) a cable; or
     (iii) an antenna.
     (c) "Service provider," notwithstanding Subsection (7)(b), includes a person who meets the requirements of Subsection (7)(a) and leases or rents a wire or cable for the transmission of data.

ECPA :: Cell Phone Location Information

Municipal Broadband

VoIP

  • THE STATE OF THE TELECOMMUNICATIONS INDUSTRY IN UTAH, p. 32-33 Utah PSC Oct 2003
  • Voice Over Internet Protocol (VOIP) is poised to revolutionize the scope of traditional voice communications. VOIP is simply the transport of voice traffic using the Internet Protocol (IP), which also enables file sharing, shared printers, e-mail, the world wide web, streaming audio and video, instant messaging, and numerous other applications. IP is a packet-based protocol which means that the traffic is broken into small packets that are sent individually to their destination, rather than utilizing circuit switched telephony to process voice calls, as we know it today. ILECs, CLECs, and Internet Providers are readily adopting VOIP because their companies will realize tremendous cost savings in the administration of their networks.
        Although providing VOIP is desirable to telephone companies and Internet providers, it may not be classified as a telecommunications service by the FCC and therefore may not be subject to common carrier regulation. Both ILECs and long distance providers are petitioning the FCC to classify IP technology as telecommunications, seeking authority to collect access charges from IP providers. However, there is still widespread regulatory forbearance in relation to
    Internet and broadband services.
  • Wifi Security

    Papers

    utut

    News

    © Cybertelecom ::