West Virginia Computer Crime and Abuse Act (WV Code § 61-3C-1 - § 61-3C-21)

West Virginia Computer Crime and Abuse Act

WV Code § 61-3C-1 - § 61-3C-21

 

West Virginia Code

Chapter 61. Crimes and Their Punishment.

Article 3C. West Virginia Computer Crime and Abuse Act.

§61-3C-1. Short title.

§61-3C-2. Legislative findings.

§61-3C-3. Definitions.

§61-3C-4. Computer fraud; access to Legislature computer; criminal penalties.

§61-3C-5. Unauthorized access to computer services.

§61-3C-6. Unauthorized possession of computer data or programs.

§61-3C-7. Alteration, destruction, etc., of computer equipment.

§61-3C-8. Disruption of computer services.

§61-3C-9. Unauthorized possession of computer information, etc.

§61-3C-10. Disclosure of computer security information.

§61-3C-11. Obtaining confidential public information.

§61-3C-12. Computer invasion of privacy.

§61-3C-13. Fraud and related activity in connection with access devices.

§61-3C-14. Endangering public safety.

§61-3C-14a. Obscene, anonymous, harassing and threatening communications by computer, cell phones and electronic communication devices; penalty.

§61-3C-14b. Soliciting, etc. a minor via computer; soliciting a minor and traveling to engage the minor in prohibited sexual activity; penalties.

§61-3C-14c. Cyberbullying or specific acts of electronic harassment of minors; definitions; penalties; exceptions.

§61-3C-15. Computer as instrument of forgery.

§61-3C-16. Civil relief; damages.

§61-3C-17. Defenses to criminal prosecution.

§61-3C-18. Venue.

§61-3C-19. Prosecution under other criminal statutes not prohibited.

§61-3C-20. Personal jurisdiction.

§61-3C-21. Severability.

 

§61-3C-1. Short title.

This act shall be known and may be cited as the “West Virginia Computer Crime and Abuse Act.”

 

§61-3C-2. Legislative findings.

The Legislature finds that:

(a) The computer and related industries play an essential role in the commerce and welfare of this state.

(b) Computer-related crime is a growing problem in business and government.

(c) Computer-related crime has a direct effect on state commerce and can result in serious economic and, in some cases, physical harm to the public.

(d) Because of the pervasiveness of computers in today's society, opportunities are great for computer related crimes through the introduction of false records into a computer or computer system, the unauthorized use of computers and computer facilities, the alteration and destruction of computers, computer programs and computer data, and the theft of computer resources, computer software and computer data.

(e) Because computers have now become an integral part of society, the Legislature recognizes the need to protect the rights of owners and legitimate users of computers and computer systems, as well as the privacy interest of the general public, from those who abuse computers and computer systems.

(f) While various forms of computer crime or abuse might possibly be the subject of criminal charges or civil suit based on other provisions of law, it is appropriate and desirable that a supplemental and additional statute be provided which specifically proscribes various forms of computer crime and abuse and provides criminal penalties and civil remedies therefor.

 

§61-3C-3. Definitions.

As used in this article, unless the context clearly indicates otherwise:

(1) “Access” means to instruct, communicate with, store data in, retrieve data from, intercept data from, or otherwise make use of any computer, computer network, computer program, computer software, computer data, or other computer resources.

(2) “Authorization” means the express or implied consent given by a person to another to access or use said person’s computer, computer network, computer program, computer software, computer system, password, identifying code, or personal identification number.

(3) “Computer” means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions and includes any data storage facility or communication facility directly related to, or operating in conjunction with, such device. The term “computer” includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve, or communicate computer programs, computer data, or the results of computer operations to or from a person, another computer, or another device, file servers, mainframe systems, desktop personal computers, laptop personal computers, tablet personal computers, cellular telephones, game consoles, and any other electronic data storage device or equipment, but such term does not include an automated typewriter or typesetter, a portable hand-held calculator, or other similar device.

(4) “Computer contaminant” means any set of computer instructions that are designed to damage or destroy information within a computer, computer system, or computer network without the consent or permission of the owner of the information. They include, but are not limited to, a group of computer instructions commonly called viruses or worms that are self-replicating or self-propagating and are designed to contaminate other computer programs or computer data, consume computer resources, or damage or destroy the normal operation of the computer.

(5) “Computer data” means any representation of knowledge, facts, concepts, instruction, or other information computed, classified, processed, transmitted, received, retrieved, originated, stored, manifested, measured, detected, recorded, reproduced, handled, or utilized by a computer, computer network, computer program, or computer software, and may be in any medium, including, but not limited to, computer printouts, microfilm, microfiche, magnetic storage media, optical storage media, punch paper tape, or punch cards, or it may be stored internally in read-only memory or random access memory of a computer or any other peripheral device.

(6) “Computer network” means a set of connected devices and communication facilities, including more than one computer, with the capability to transmit computer data among them through such communication facilities.

(7) “Computer operations” means arithmetic, logical, storage, display, monitoring, or retrieval functions or any combination thereof and includes, but is not limited to, communication with, storage of data in or to, or retrieval of data from any device, and the human manual manipulation of electronic magnetic impulses. A “computer operation” for a particular computer shall also mean any function for which that computer was designed.

(8) “Computer program” means an ordered set of computer data representing instructions or statements, in a form readable by a computer, which controls, directs, or otherwise influences the functioning of a computer or computer network.

(9) “Computer software” means a set of computer programs, procedures, and associated documentation concerned with computer data or with the operation of a computer, computer program, or computer network.

(10) “Computer services” means computer access time, computer data processing, or computer data storage, and the computer data processed or stored in connection therewith.

(11) “Computer supplies” means punch cards, paper tape, magnetic tape, magnetic disks or diskettes, optical disks or diskettes, disk or diskette packs, paper, microfilm, and any other tangible input, output, or storage medium used in connection with a computer, computer network, computer data, computer software, or computer program.

(12) “Computer resources” includes, but is not limited to, information retrieval; computer data processing, transmission, and storage; and any other functions performed, in whole or in part, by the use of a computer, computer network, computer software, or computer program.

(13) “Financial instrument” includes, but is not limited to, a check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security, or any computerized representation thereof.

(14) “Owner” means any person who owns or leases or is a licensee of a computer, computer network, computer data, computer program, computer software, computer resources, or computer supplies.

(15) “Person” means any natural person, general partnership, limited partnership, trust, association, corporation, joint venture, or any state, county, or municipal government and any subdivision, branch, department, or agency thereof.

(16) “Property” includes:

(A) Real property;

(B) Computers and computer networks;

(C) Financial instruments, computer data, computer programs, computer software, and all other personal property regardless of whether they are:

(i) Tangible or intangible;

(ii) In a format readable by humans or by a computer;

(iii) In transit between computers or within a computer network or between any devices which comprise a computer; or

(iv) Located on any paper or in any device on which it is stored by a computer or by a human; and

(D) Computer services.

(17) “Ransomware” means a computer contaminant, or lock placed or introduced without authorization into a computer, computer system, or computer network that restricts access by an authorized user to the computer, computer system, computer network, or any data therein under circumstances in which the person responsible for the placement or introduction of the ransomware demands payment of money or other consideration to remove the computer contaminant, restore access to the computer, computer system, computer network, or data, or otherwise remediate the impact of the computer contaminant or lock.

(18) “Value” means having any potential to provide any direct or indirect gain or advantage to any person.

(19) “Value of property or computer services” shall be: (A) The market value of the property or computer services at the time of a violation of this article; or (B) if the property or computer services are unrecoverable, damaged, or destroyed as a result of a violation of §61-3C-6 or §61-3C-7 of this code, the cost of reproducing or replacing the property or computer services at the time of the violation.

 

§61-3C-4. Computer fraud; access to Legislature computer; criminal penalties.

(a) Any person who, knowingly and willfully, directly or indirectly, accesses or causes to be accessed any computer, computer services, or computer network for the purpose of: (1) Executing any scheme or artifice to defraud; or (2) obtaining money, property, or services by means of fraudulent pretenses, representations, or promises is guilty of a felony and, upon conviction thereof, shall be fined not more than $10,000 or imprisoned in a state correctional facility for a determinate sentence of not more than 10 years, or both fined and imprisoned.

(b) Any person who, with intent to extort money or other consideration from another, introduces ransomware into any computer, computer system, or computer network is guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 or imprisoned in a state correctional facility for a determinate sentence of not more than 10 years, or both fined and imprisoned.

(c) A person is criminally responsible for placing or introducing ransomware into a computer, computer system, or computer network if the person directly places or introduces the ransomware or directs or induces another person to do so, with the intent of demanding payment or other consideration for removing, restoring access, or other remediation of the impact of the ransomware.

(d) (1) Any person who, knowingly and willfully, directly or indirectly, accesses, attempts to access, or causes to be accessed any data stored in a computer owned by the Legislature without authorization is guilty of a felony and, upon conviction thereof, shall be fined not more than $5,000 or imprisoned in a state correctional facility for a determinate sentence of not more than five years, or both fined and imprisoned.

(2) Notwithstanding the provisions of §61-3C-17 of this code to the contrary, in any criminal prosecution under this subsection against an employee or member of the Legislature, it shall not be a defense: (A) That the defendant had reasonable grounds to believe that he or she had authorization to access the data merely because of his or her employment or membership; or (B) that the defendant could not have reasonably known he or she did not have authorization to access the data: Provided, That the Joint Committee on Government and Finance shall promulgate rules for the respective houses of the Legislature regarding appropriate access of members and staff and others to the legislative computer system.

 

§61-3C-5. Unauthorized access to computer services.

Any person who knowingly, willfully and without authorization, directly or indirectly, accesses or causes to be accessed a computer or computer network with the intent to obtain computer services shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not less than $200 nor more than $1,000 or confined in the county jail not more than one year, or both.

 

§61-3C-6. Unauthorized possession of computer data or programs.

(a) Any person who knowingly, willfully and without authorization possesses any computer data or computer program belonging to another and having a value of $5,000 or more shall be guilty of a felony, and, upon conviction thereof, shall be fined not more than $10,000 or imprisoned in the penitentiary for not more than ten years, or both.

(b) Any person who knowingly, willfully and without authorization possesses any computer data or computer program belonging to another and having a value of less than $5,000 shall be guilty of a misdemeanor, and, upon conviction thereof shall be fined not more than $1,000 or confined in the county jail for not more than one year, or both.

 

§61-3C-7. Alteration, destruction, etc., of computer equipment.

(a) Misdemeanor offenses. -- Any person who knowingly, willfully and without authorization, directly or indirectly, tampers with, deletes, alters, damages or destroys or attempts to tamper with, delete, alter, damage or destroy any computer, computer network, computer software, computer resources, computer program or computer data or who knowingly introduces, directly or indirectly, a computer contaminant into any computer, computer program or computer network which results in a loss of value of property or computer services up to $1,000, is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $1,000 or confined in the county or regional jail not more than six months, or both.

(b) Felony offenses. -- Any person who knowingly, willfully and without authorization, directly or indirectly, damages or destroys or attempts to damage or destroy any computer, computer network, computer software, computer resources, computer program or computer data by knowingly introducing, directly or indirectly, a computer contaminant into any computer, computer program or computer network which results in a loss of value of property or computer services more than $1,000 is guilty of a felony and, upon conviction thereof, shall be fined not less than $200 and not more than $10,000 or confined in a state correctional facility not more than ten years, or both, or, in the discretion of the court, be fined not less than $200 nor more than $1,000 and confined in the county or regional jail not more than one year.

 

§61-3C-8. Disruption of computer services.

Any person who knowingly, willfully and without authorization, directly or indirectly, disrupts or degrades or causes the disruption or degradation of computer services or denies or causes the denial of computer services to an authorized recipient or user of such computer services, shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not less than $200 nor more than $1,000 or confined in the county jail not more than one year, or both.

 

§61-3C-9. Unauthorized possession of computer information, etc.

Any person who knowingly, willfully and without authorization, possesses any computer data, computer software, computer supplies or a computer program which he knows or reasonably should know was obtained in violation of any section of this article shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not less than $200 nor more than $1,000 or confined in the county jail for not more than one year, or both.

 

§61-3C-10. Disclosure of computer security information.

Any person who knowingly, willfully and without authorization discloses a password, identifying code, personal identification number or other confidential information about a computer security system to another person shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not more than $500 or confined in the county jail for not more than six months, or both.

 

§61-3C-11. Obtaining confidential public information.

Any person who knowingly, willfully and without authorization accesses or causes to be accessed any computer or computer network and thereby obtains information filed by any person with the state or any county or municipality which is required by law to be kept confidential shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not more than $500 or confined in the county jail not more than six months, or both.

 

§61-3C-12. Computer invasion of privacy.

Any person who knowingly, willfully and without authorization accesses a computer or computer network and examines any employment, salary, credit or any other financial or personal information relating to any other person, after the time at which the offender knows or reasonably should know that he is without authorization to view the information displayed, shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not more than $500 or confined in the county jail for not more than six months, or both.

 

§61-3C-13. Fraud and related activity in connection with access devices.

(a) As used in this section, the following terms shall have the following meanings:

(1) “Access device” means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument);

(2) “Counterfeit access device” means any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device or a counterfeit access device;

(3) “Unauthorized access device” means any access device that is lost, stolen, expired, revoked, canceled, or obtained without authority;

(4) “Produce” includes design, alter, authenticate, duplicate, or assemble;

(5) “Traffic” means transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of.

(b) Any person who knowingly and willfully possesses any counterfeit or unauthorized access device shall be guilty of a misdemeanor, and, upon conviction thereof, shall be fined not more than $1,000 or confined in the county jail for not more than six months, or both.

(c) Any person who knowingly, willfully and with intent to defraud possesses a counterfeit or unauthorized access device or who knowingly, willfully and with intent to defraud, uses, produces or traffics in any counterfeit or unauthorized access device shall be guilty of a felony, and, upon conviction thereof, shall be fined not more than $10,000 or imprisoned in the penitentiary not more than ten years, or both.

(d) This section shall not prohibit any lawfully authorized investigative or protective activity of any state, county or municipal law-enforcement agency.

 

§61-3C-14. Endangering public safety.

Any person who accesses a computer or computer network and knowingly, willfully and without authorization (a) interrupts or impairs the providing of services by any private or public utility; (b) interrupts or impairs the providing of any medical services; (c) interrupts or impairs the providing of services by any state, county or local government agency, public carrier or public communication service; or otherwise endangers public safety shall be guilty of a felony, and, upon conviction thereof, shall be fined not more than $50,000 or imprisoned not more than twenty years, or both.

 

§61-3C-14a. Obscene, anonymous, harassing and threatening communications by computer, cell phones and electronic communication devices; penalty.

(a) It is unlawful for any person, with the intent to harass or abuse another person, to use a computer, mobile phone, personal digital assistant or other electronic communication device to:

(1) Make contact with another person without disclosing his or her identity with the intent to harass or abuse;

(2) Make contact with a person after being requested by the person to desist from contacting them: Provided, That a communication made by a lender or debt collector to a consumer, regarding an overdue debt of the consumer that does not violate chapter forty-six-a  of this code, does not violate this subsection;

(3) Threaten to commit a crime against any person or property; or

(4) Cause obscene material to be delivered or transmitted to a specific person after being requested to desist from sending such material.

(b) For purposes of this section:

(1) "Electronic communication device" means and includes a telephone, wireless phone, computer, pager or any other electronic or wireless device which is capable of transmitting a document, image, voice, e-mail or text message using such device in an electronic, digital or analog form from one person or location so it may be viewed or received by another person or persons at other locations.

(2) "Use of a computer, mobile phone, personal digital assistant or other electronic communication device" includes, but is not limited to, the transmission of text messages, electronic mail, photographs, videos, images or other nonvoice data by means of an electronic communication system, and includes the transmission of such data, documents, messages and images to another's computer, e-mail account, mobile phone, personal digital assistant or other electronic communication device.

(3) "Obscene material" means material that:

(A) An average person, applying contemporary adult community standards, would find, taken as a whole, appeals to the prurient interest, is intended to appeal to the prurient interest, or is pandered to a prurient interest;

(B) An average person, applying contemporary adult community standards, would find, depicts or describes, in a patently offensive way, sexually explicit conduct consisting of an ultimate sexual act, normal or perverted, actual or simulated, an excretory function, masturbation, lewd exhibition of the genitals, or sadomasochistic sexual abuse; and

(C) A reasonable person would find, taken as a whole, lacks literary, artistic, political or scientific value.

(c) It is unlawful for any person to knowingly permit a computer, mobile phone or personal digital assistant or other electronic communication device under his or her control to be used for any purpose prohibited by this section.

(d) Any offense committed under this section may be determined to have occurred at the place at which the contact originated or the place at which the contact was received or intended to be received.

(e) Any person who violates a provision of this section is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $500 or confined in jail not more than six months, or both fined and confined. For a second or subsequent offense, the person is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $1,000 or confined in jail for not more than one year, or both fined and confined.

 

§61-3C-14b.  Soliciting, etc. a minor via computer; soliciting a minor and traveling to engage the minor in prohibited sexual activity; penalties.

(a) Any person over the age of eighteen, who knowingly uses a computer to solicit, entice, seduce or lure, or attempt to solicit, entice, seduce or lure, a minor known or believed to be at least four years younger than the person using the computer or a person he or she believes to be such a minor, in order to engage in any illegal act proscribed by the provisions of article eight, eight-b, eight-c or eight-d of this chapter, or any felony offense under section four hundred one, article four, chapter sixty-a of this code, is guilty of a felony and, upon conviction thereof, shall be fined not more than $5,000 or imprisoned in a state correctional facility not less than two nor more than ten years, or both.

(b) Any person over the age of eighteen who uses a computer in the manner proscribed by the provisions of subsection (a) of this section and who additionally engages in any overt act designed to bring himself or herself into the minor’s, or the person believed to be a minor’s, physical presence with the intent to engage in any sexual activity or conduct with such a minor that is prohibited by law, is guilty of a felony and shall be fined not more than $25,000 or imprisoned in a state correctional facility for a determinate sentence of not less than five nor more than thirty years, or both: Provided, That subsection (a) shall be deemed a lesser included offense to that created by this subsection.

 

§61-3C-14c. Cyberbullying or specific acts of electronic harassment of minors; definitions; penalties; exceptions.

(a) It is unlawful for a person to knowingly and intentionally use a computer or computer network, as defined in §61-3C-3, to engage in conduct with the intent to harass, intimidate, or bully a minor, including, but not limited to:

(1) Posting, disseminating or encouraging others to post or disseminate private, personal, or sexual information pertaining to a minor on the Internet; or

(2) Posting obscene material, as defined in §61-3C-14a of this code, in a real or doctored image of a minor on the Internet;

(b) For the purposes of this section:

(1) “Harass, intimidate or bully” means any intentional gesture, or any intentional electronic, written, verbal, or physical act, communication, transmission or threat that:

(A) A reasonable person under the circumstances should know the act will have the effect of any one or more of the following:

(i) Physically harming a minor;

(ii) Damaging a minor’s property;

(iii) Placing a minor in reasonable fear of harm to his or her person; or

(iv) Placing a minor in reasonable fear of damage to his or her property; or

(B) Is sufficiently severe, persistent, or pervasive that it creates an intimidating, threatening, or emotionally abusive environment for a minor.

(2) “Minor” means an individual under the age of 18 years old.

(c) This section does not apply to a peaceful activity intended to:

(i) Express a political view; or

(ii) Provide information to others with no intent to harass, intimidate, or bully.

(d) Any person who violates this section is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $500 or confined in jail for a period not to exceed one year, or both confined and fined.

 

§61-3C-15. Computer as instrument of forgery.

The creation, alteration or deletion of any computer data contained in any computer or computer network, which if done on a tangible document or instrument would constitute forgery under section five, article four, chapter sixty-one of this code will also be deemed to be forgery. The absence of a tangible writing directly created or altered by the offender shall not be a defense to any crime set forth in section five, article four, chapter sixty-one if a creation, alteration or deletion of computer data was involved in lieu of a tangible document or instrument.

 

§61-3C-16. Civil relief; damages.

(a) Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor in circuit court and may be entitled to recover for each violation:

(1) Compensatory damages;

(2) Punitive damages; and

(3) Such other relief, including injunctive relief, as the court may deem appropriate.

Without limiting the generality of the term, “damages” shall include loss of profits.

(b) At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a manner as to protect the secrecy and security of the computer network, computer data, computer program or computer software involved in order to prevent any possible recurrence of the same or a similar act by another person or to protect any trade secret or confidential information of any person. For the purposes of this section “trade secret” means the whole or any portion or phase of any scientific or technological information, design, process, procedure or formula or improvement which is secret and of value. A trade secret shall be presumed to be secret when the owner thereof takes measures to prevent it from becoming available to persons other than those authorized by the owner to have access thereto for a limited purpose.

(c) The provisions of this section shall not be construed to limit any person's right to pursue any additional civil remedy otherwise allowed by law.

(d) A civil action under this section must be commenced before the earlier of: (1) Five years after the last act in the course of conduct constituting a violation of this article; or (2) two years after the plaintiff discovers or reasonably should have discovered the last act in the course of conduct constituting a violation of this article.

 

§61-3C-17. Defenses to criminal prosecution.

(a) In any criminal prosecution under this article, it shall be a defense that:

(1) The defendant had reasonable grounds to believe that he had authority to access or could not have reasonably known he did not have authority to access the computer, computer network, computer data, computer program or computer software in question; or,

(2) The defendant had reasonable grounds to believe that he had the right to alter or destroy the computer data, computer software or computer program in question; or,

(3) The defendant had reasonable grounds to believe that he had the right to copy, reproduce, duplicate or disclose the computer data, computer program, computer security system information or computer software in question.

(b) Nothing in this section shall be construed to limit any defense available to a person charged with a violation of this article.

 

§61-3C-18. Venue.

For the purpose of criminal and civil venue under this article, any violation of this article shall be considered to have been committed:

(1) In any county in which any act was performed in furtherance of any course of conduct which violates this article;

(2) In the county of the principal place of business in this state of the aggrieved owner of the computer, computer data, computer program, computer software or computer network, or any part thereof;

(3) In any county in which any violator had control or possession of any proceeds of the violation or any books, records, documentation, property, financial instrument, computer data, computer software, computer program, or other material or objects which were used in furtherance of or obtained as a result of the violation;

(4) In any county from which, to which, or through which any access to a computer or computer network was made, whether by wires, electromagnetic waves, microwaves or any other means of communication; and

(5) In the county in which the aggrieved owner or the defendant resides or either of them maintains a place of business.

 

§61-3C-19. Prosecution under other criminal statutes not prohibited.

Criminal prosecution pursuant to this article shall not prevent prosecution pursuant to any other provision of law.

 

§61-3C-20. Personal jurisdiction.

Any person who violates any provision of this article and, in doing so, accesses, permits access to, causes access to or attempts to access a computer, computer network, computer data, computer resources, computer software or computer program which is located, in whole or in part, within this state, or passes through this state in transit, shall be subject to criminal prosecution and punishment in this state and to the civil jurisdiction of the courts of this state.

 

§61-3C-21. Severability.

If any provision of this article or the application thereof to any person or circumstance is held invalid, such invalidity shall not affect any other provisions or applications of this article which can be given effect without the invalid provision or application, and to that end the provisions of this article are declared to be severable.

 

For more information, see here:  https://code.wvlegislature.gov/61-3C/

 

These materials were obtained directly from the State Legislative websites and are posted here for your review and reference only.  No Claim to Original State Government Works.  This may not be the most recent version.  The State may have more current information.  We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to.  Please check the linked sources directly.