Wyoming Computer Crimes
WY Stat § 6-3-501, et seq.
Wyoming Statutes
Title 6 - Crimes and Offenses
Chapter 3 - Offenses Against Property
Article 5 - Computer Crimes
Section 6-3-501 - Definitions.
Section 6-3-502 - Crimes Against Intellectual Property; Penalties.
Section 6-3-503 - Crimes Against Computer Equipment or Supplies; Interruption or Impairment of Governmental Operations or Public Services; Penalties.
Section 6-3-504 - Crimes Against Computer Users; Penalties.
Section 6-3-505 - This Article Not Exclusive.
Section 6-3-506 - Computer Trespass; Penalties.
Section 6-3-507 - Computer Extortion; Penalties.
6-3-501. Definitions.
(a) As used in this article:
(i) "Access" means to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system or computer network;
(ii) "Computer" means an internally programmed, automatic device which performs data processing;
(iii) "Computer network" means a set of related, remotely connected devices and communication facilities including more than one (1) computer system with capability to transmit data among them through communication facilities;
(iv) "Computer program" means an ordered set of data representing coded instructions or statements which when executed by a computer cause the computer to process data;
(v) "Computer software" means a set of computer programs, procedures and associated documentation concerned with the operation of a computer system;
(vi) "Computer system" means a set of related, connected or unconnected, computer equipment, devices or computer software;
(vii) "Computer system services" means providing a computer system or computer network to perform useful work;
(viii) "Financial instrument" means a check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card or marketable security;
(ix) "Intellectual property" means data, including programs;
(x) "Property" includes financial instruments, information, electronically produced data, computer software and programs in machine-readable or human-readable form;
(xi) "Trade secret" means the whole or a portion or phase of a formula, pattern, device, combination of devices or compilation of information which is for use, or is used in the operation of a business and which provides the business an advantage or an opportunity to obtain an advantage over those who do not know or use it. "Trade secret" includes any scientific, technical or commercial information including any design, process, procedure, list of suppliers, list of customers, business code or improvement thereof. Irrespective of novelty, invention, patentability, the state of the prior art and the level of skill in the business, art or field to which the subject matter pertains, when the owner of a trade secret takes measures to prevent it from becoming available to persons other than those selected by the owner to have access to it for limited purposes, the trade secret is considered to be:
(A) Secret;
(B) Of value;
(C) For use or in use by the business; and
(D) Providing an advantage or an opportunity to obtain an advantage to the business over those who do not know or use it.
6-3-502. Crimes against intellectual property; penalties.
(a) A person commits a crime against intellectual property if he knowingly and without authorization:
(i) Modifies data, programs or supporting documentation residing or existing internal or external to a computer, computer system or computer network;
(ii) Destroys data, programs or supporting documentation residing or existing internal or external to a computer, computer system or computer network;
(iii) Discloses or takes data, programs, or supporting documentation having a value of more than seven hundred fifty dollars ($750.00) and which is a trade secret or is confidential, as provided by law, residing or existing internal or external to a computer, computer system or computer network.
(b) A crime against intellectual property is:
(i) A felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars ($3,000.00), or both, except as provided in paragraph (ii) of this subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of devising or executing a scheme or artifice to defraud or to obtain property.
6-3-503. Crimes against computer equipment or supplies; interruption or impairment of governmental operations or public services; penalties.
(a) A person commits a crime against computer equipment or supplies if he knowingly and without authorization, modifies equipment or supplies used or intended to be used in a computer, computer system or computer network. A crime against computer equipment or supplies is:
(i) A misdemeanor punishable by imprisonment for not more than six (6) months, a fine of not more than seven hundred fifty dollars ($750.00), or both, except as provided in paragraph (ii) of this subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of devising or executing a scheme or artifice to defraud or to obtain property.
(b) A person who knowingly and without authorization destroys, injures or damages a computer, computer system or computer network and thereby interrupts or impairs governmental operations or public communication, transportation or supplies of water, gas or other public service, is guilty of a felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars ($3,000.00), or both.
6-3-504. Crimes against computer users; penalties.
(a) A person commits a crime against computer users if he knowingly and without authorization:
(i) Accesses a computer, computer system or computer network;
(ii) Denies computer system services to an authorized user of the computer system services which, in whole or part, are owned by, under contract to, or operated for, on behalf of, or in conjunction with another.
(b) A crime against computer users is:
(i) A felony punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand dollars ($3,000.00), or both except as provided in paragraph (ii) of this subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of devising or executing a scheme or artifice to defraud or to obtain property.
6-3-505. This article not exclusive.
This article shall not preclude the application of any other provision of the criminal law of this state which applies, or may apply, to any violation of this article, unless the provision is inconsistent with this article.
6-3-506. Computer trespass; penalties.
(a) A person commits a computer trespass if he knowingly, with intent to damage or cause the malfunction of the operation of a computer, computer system or computer network and without authorization transfers or sends electronically into a computer, computer system or computer network or causes to be transferred or sent electronically into a computer, computer system or computer network any malware, or other data, program or other information which alters, damages or causes the malfunction of the operation of the computer, computer system or computer network or which causes the computer, computer system or computer network to disseminate sensitive information.
(b) A computer trespass is:
(i) A misdemeanor punishable by imprisonment for not more than six (6) months, a fine of not more than seven hundred fifty dollars ($750.00), or both, if the resulting damages are less than ten thousand dollars ($10,000.00);
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars ($10,000.00), or both, if the resulting damages are ten thousand dollars ($10,000.00) or more.
(c) Common carriers, internet service providers or other persons who supply the internet services over which the content is delivered shall not be prosecuted for violations under this section resulting from the acts of another.
(d) For purposes of this section, "malware" means, but is not limited to, viruses, worms, trojan horses, rootkits, keyloggers, backdoors, dialers, ransomware, spyware, adware, malicious browser helper objects, rogue security software and other malicious programs used or designed to disrupt a computer operation, gather sensitive information, steal sensitive information or otherwise gain unauthorized access to a computer, computer system or computer network.
6-3-507. Computer extortion; penalties.
(a) A person is guilty of computer extortion if he knowingly and without authorization introduces, attempts to introduce or directs or induces another to introduce, any ransomware into a computer, computer system or computer network which requires the payment of money or other consideration to remove the ransomware or repair the damage caused to the computer, computer system or computer network by the ransomware.
(b) Computer extortion is a felony punishable by imprisonment for not more than ten (10) years, a fine of not more than ten thousand dollars ($10,000.00), or both.
(c) For purposes of this section:
(i) "Computer or data contaminant" means any virus, worm or other similar computer program designed to encrypt, modify, damage, destroy, record or transmit information within a computer, computer system or computer network;
(ii) "Ransomware" means a computer or data contaminant, encryption or lock that restricts an owner's access to a computer, computer data, computer system or computer network in any way. "Ransomware" does not include authentication required to upgrade or access purchased content.
For more information, see here: https://wyoleg.gov/NXT/gateway.dll?f=templates&fn=default.htm
These materials were obtained directly from the State Legislative websites and are posted here for your review and reference only. No Claim to Original State Government Works. This may not be the most recent version. The State may have more current information. We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to. Please check the linked sources directly.