Rhode Island Computer Crime
R.I. Gen. Laws § 11-52-1, et seq.
Rhode Island General Laws
Title 11 - Criminal Offenses
Chapter 52 Computer Crime
§ 11-52-1. Definitions.
§ 11-52-2. Access to computer for fraudulent purposes.
§ 11-52-3. Intentional access, alteration, damage, or destruction.
§ 11-52-4. Computer theft.
§ 11-52-4.1. Computer trespass.
§ 11-52-4.2. Cyberstalking and cyberharassment prohibited.
§ 11-52-4.3. Violation of restraining order.
§ 11-52-5. Penalties.
§ 11-52-6. Civil action.
§ 11-52-7. Use of false information.
§ 11-52-7.1. Online impersonation.
§ 11-52-8. Tampering with computer source documents.
§ 11-52-1. Definitions.
As used in this chapter:
(1) "Access" means to approach, instruct, communicate with, store data in, enter data in, retrieve data from, or otherwise make use of any resources of, a computer, computer system, or computer network.
(2) "Computer" means an electronic, magnetic, optical, hydraulic or organic device or group of devices which, pursuant to a computer program, to human instruction, or to permanent instructions contained in the device or group of devices, can automatically perform computer operations with or on computer data and can communicate the results to another computer or to a person. The term "computer" includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve or communicate computer programs, computer data or the results of computer operations to or from a person, another computer or another device.
(3) "Computer data" means any representation of information, knowledge, facts, concepts, or instructions which is being prepared or has been prepared and is intended to be processed, is being processed, or has been processed in a computer or computer network. "Computer data" may be in any form, whether readable only by a computer or only by a human or by either, including, but not limited to, computer printouts, magnetic storage media, punched cards, or data stored internally in the memory of the computer.
(4) "Computer network" means a set of related, remotely connected devices and any communications facilities including more than one computer with the capability to transmit data among them through the communications facilities.
(5) "Computer operation" means arithmetic, logical, monitoring, storage or retrieval functions and any combination of them, and includes, but is not limited to, communication with, storage of data to, or retrieval of data from any device or human hand manipulation of electronic or magnetic impulses. A "computer operation" for a particular computer may also be any function for which that computer was generally designed.
(6) "Computer program" means a series of instructions or statements or related data that, in actual or modified form, is capable of causing a computer or a computer system to perform specified functions in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from the computer systems.
(7) "Computer services" includes computer time or services, data processing services, Internet service providers' networks and facilities located in the state or information or data stored in connection with them.
(8) "Computer software" means a set of computer programs, procedures, and associated documentation concerned with the operation of a computer, computer program or computer network.
(9) "Computer system" means a set of related, connected or unconnected, computer equipment, devices, and software.
(10) "Data" means any representation of information, knowledge, facts, concepts, or instructions which are being prepared or have been prepared and are intended to be entered, processed, or stored, are being entered, processed, or stored or have been entered, processed, or stored in a computer, computer system, or computer network.
(11) "Electronic mail service provider" means any business or organization qualified to do business in the state of Rhode Island that provides registered users the ability to send or receive electronic mail through equipment located in this state and that is an intermediary in sending or receiving electronic mail.
(12) "Financial instrument" includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card transaction authorization mechanism, marketable security, or any computerized representation of any of these.
(13) "Owner" means an owner or lessee of a computer or a computer network or an owner, lessee, or licensee of computer data, computer programs, or computer software.
(14) "Person" shall include any individual, partnership, association, corporation or joint venture.
(15) "Property" includes, but is not limited to:
(i) Real property;
(ii) Computers and computer networks;
(iii) Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are:
(A) Tangible or intangible;
(B) In a format readable by humans or by a computer;
(C) In transit between computers or within a computer network or between any devices which comprise a computer; or
(D) Located on any paper or in any device on which it is stored by a computer or by a human; and
(E) Computer services.
(iv) A person "uses" a computer or computer network when he or she:
(A) Attempts to cause or causes a computer or computer network to perform or to stop performing computer operations;
(B) Attempts to cause or causes the withholding or denial of the use of a computer, computer network, computer program, computer data or computer software to another user; or
(C) Attempts to cause or causes another person to put false information into a computer.
(v) A person is "without authority" when: (A) he or she has no right or permission of the owner to use a computer, or, he or she uses a computer in a manner exceeding his or her right or permission or (B) he or she uses an Internet service e-mail system offered by a Rhode Island based Internet service provider in contravention of the authority granted by or in violation of the policies set by the Internet service provider.
(vi) Transmission of electronic mail from an organization to its members shall not be deemed to be unsolicited bulk electronic mail.
(16) "Services" includes, but is not limited to, computer time, data processing, and storage functions.
(17) "Source document" means an original document or record which forms the basis of every electronic entry put into a computer, computer system, or computer network.
History of Section.
P.L. 1979, ch. 217, § 1; P.L. 1989, ch. 136 § 1; P.L. 1999, ch. 421, § 1.
§ 11-52-2. Access to computer for fraudulent purposes.
Whoever directly or indirectly accesses or causes to be accessed any computer, computer system, or computer network for the purpose of: (1) devising or executing any scheme or artifice to defraud; (2) obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises; or (3) damaging, destroying, altering, deleting, or removing any program or data contained in it in connection with any scheme or artifice to defraud, shall be guilty of a felony and shall be subject to the penalties set forth in § 11-52-5.
History of Section.
P.L. 1979, ch. 217, § 1; P.L. 1983, ch. 246, § 1; P.L. 1989, ch. 136, § 1.
§ 11-52-3. Intentional access, alteration, damage, or destruction.
Whoever, intentionally, without authorization, and for fraudulent or other illegal purposes, directly or indirectly, accesses, alters, damages, or destroys any computer, computer system, computer network, computer software, computer program, or data contained in a computer, computer system, computer program, or computer network shall be guilty of a felony and shall be subject to the penalties set forth in § 11-52-5.
History of Section.
P.L. 1979, ch. 217, § 1; P.L. 1983, ch. 246, § 1; P.L. 1989, ch. 136, § 1; P.L. 2007, ch. 347, § 1; P.L. 2007, ch. 483, § 1.
§ 11-52-4. Computer theft.
Whoever, intentionally and without claim of right, takes, transfers, conceals or retains possession of any computer, computer system, computer network, computer software, computer program, or data contained in a computer, computer system, computer program, or computer network with a value in excess of five hundred dollars ($500) shall be guilty of a felony and shall be subject to the penalties set forth in § 11-52-5. If the value is five hundred dollars ($500) or less, then the person shall be guilty of a misdemeanor and may be punishable by imprisonment for a term not exceeding one year or by a fine of not more than one thousand dollars ($1,000), or both.
History of Section.
P.L. 1983, ch. 246, § 2; P.L. 1989, ch. 71, § 1; P.L. 1989, ch. 136, § 1; P.L. 2006, ch. 373, § 1; P.L. 2006, ch. 461, § 1.
§ 11-52-4.1. Computer trespass.
(a) It shall be unlawful for any person to use a computer or computer network without authority and with the intent to:
(1) Temporarily or permanently remove, halt, or otherwise disable any computer data, computer programs, or computer software from a computer or computer network;
(2) Cause a computer to malfunction regardless of how long the malfunction persists;
(3) Alter or erase any computer data, computer programs, or computer software;
(4) Effect the creation or alteration of a financial instrument or of an electronic transfer of funds;
(5) Cause physical injury to the property of another;
(6) Make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs, or computer software residing in, communicated by, or produced by a computer or computer network;
(7) Forge e-mail header information or other Internet routine information for the purpose of sending unsolicited bulk electronic mail through or into the facilities of an electronic mail service provider or its subscribers; or
(8) To sell, give or otherwise distribute or possess with the intent to sell, give or distribute software which is designed to facilitate or enable the forgery of electronic mail header information or other Internet routing information for the purpose of sending unsolicited bulk electronic mail through or into the facilities of an electronic mail service provider or its subscribers.
(b) Nothing in this section shall be construed to interfere with or prohibit terms or conditions in a contract or license related to computers, computer data, computer networks, computer operations, computer programs, computer services, or computer software or to create any liability by reason of terms or conditions adopted by, or technical measures implemented by, a Rhode Island-based electronic mail service provider to prevent the transmission of unsolicited bulk electronic mail in violation of this chapter. Whoever violates this section shall be guilty of a felony and shall be subject to the penalties set forth in § 11-52-2. If the value is five hundred dollars ($500) or less, then the person shall be guilty of a misdemeanor and may be punishable by imprisonment for a term not exceeding one year or by a fine of not more than one thousand dollars ($1,000) or both.
History of Section.
P.L. 1999, ch. 421, § 2; P.L. 2006, ch. 373, § 1; P.L. 2006, ch. 461, § 1.
§ 11-52-4.2. Cyberstalking and cyberharassment prohibited.
(a) Whoever transmits any communication by computer or other electronic device to any person or causes any person to be contacted for the sole purpose of harassing that person or his or her family is guilty of a misdemeanor, and shall be punished by a fine of not more than five hundred dollars ($500), by imprisonment for not more than one year, or both. For the purpose of this section, "harassing" means any knowing and willful course of conduct directed at a specific person which seriously alarms, annoys, or bothers the person, and which serves no legitimate purpose. The course of conduct must be of a kind that would cause a reasonable person to suffer substantial emotional distress, or be in fear of bodily injury. "Course of conduct" means a pattern of conduct composed of a series of acts over a period of time, evidencing a continuity of purpose. Constitutionally protected activity is not included within the meaning of "course of conduct."
(b) A second or subsequent conviction under subsection (a) of this section shall be deemed a felony punishable by imprisonment for not more than two (2) years, by a fine of not more than six thousand dollars ($6,000), or both.
History of Section.
P.L. 2001, ch. 215, § 1; P.L. 2001, ch. 272, § 1; P.L. 2008, ch. 120, § 1.
§ 11-52-4.3. Violation of restraining order.
(a) Whenever there is a restraining order or injunction issued by a court of competent jurisdiction enjoining one person from harassing another person, and the person so enjoined is convicted of the crime as set forth in section 11-52-4.2 for actions against the person protected by the court order or injunction, he or she shall be guilty of a felony which shall be punishable by imprisonment for not more than two (2) years, or by a fine of not more than six thousand dollars ($6,000), or both.
(b) A second or subsequent conviction under subsection (a) of this section shall be punishable by imprisonment for not more than five (5) years, by a fine of not more than ten thousand dollars ($10,000), or both.
History of Section.
P.L. 2001, ch. 215, § 1; P.L. 2001, ch. 272, § 1.
§ 11-52-5. Penalties.
(a) Any person who is convicted of an offense which is classified as a felony under this chapter shall be fined not more than five thousand dollars ($5,000), or imprisoned for not more than five (5) years, or both.
(b) Any person who is convicted of an offense which is classified as a misdemeanor under this chapter shall be fined not more than five hundred dollars ($500), or imprisoned for not more than one year, or both.
History of Section.
P.L. 1979, ch. 217, § 1; G.L. 1956, § 11-52-4; P.L. 1983, ch. 246, § 3; P.L. 1989, ch. 71, § 1; P.L. 1989, ch. 136, § 1.
§ 11-52-6. Civil action.
(a) Any person injured as a result of a violation of this chapter may bring a civil action against the violator for compensatory damages, punitive damages, court costs, and any other relief that the court deems appropriate, including reasonable attorneys' fees.
(b) If the injury arises from the transmission of unsolicited bulk electronic mail, the injured person, other than an electronic mail service provider, may also recover attorney's fees and costs and may elect, in lieu of actual damages, to recover the lesser of five hundred dollars ($500) for each and every unsolicited bulk electronic mail message transmitted in violation of this chapter up to a maximum of twenty-five thousand dollars ($25,000) per day. The injured person shall not have a cause of action against the electronic mail service provider which merely transmits the unsolicited bulk electronic mail over its computer network.
(c) If the injury arises from the transmission of unsolicited bulk electronic mail, an injured electronic mail service provider may also recover attorneys fees and costs, and may elect, in lieu of actual damages, to recover the greater of five hundred dollars ($500) for each and every unsolicited bulk electronic mail message transmitted in violation of this chapter up to a maximum of twenty-five thousand dollars ($25,000) per day.
(d) At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a way as to protect the secrecy and security of the computer, computer network, computer data, computer program and computer software involved in order to prevent possible recurrence of the same or a similar act by another person and to protect any trade secrets of any party.
(e) The provisions of this section shall not be construed to limit any person's right to pursue any additional civil remedy otherwise allowed by law.
History of Section.
P.L. 1989, ch. 115 § 1; P.L. 1999, ch. 421, § 1.
§ 11-52-7. Use of false information.
Whoever intentionally or knowingly makes a transmission of false data for the purpose of submitting a claim for payment, or makes, presents, or uses or causes to be made, presented, or used any data for the purpose of submitting a claim for payment with knowledge of its falsity and with knowledge that it will be used for any claim for payment, shall be guilty of a felony and shall be subject to the penalties set forth in § 11-52-5.
History of Section.
P.L. 1989, ch. 136 § 2; P.L. 2012, ch. 314, § 1; P.L. 2012, ch. 349, § 1.
§ 11-52-7.1. Online impersonation.
(a) Definitions, as used in this section:
(1) "Commercial social networking site" means a business, organization, or other similar entity that operates a website and permits persons to become registered users for the purpose of establishing personal relationships with other users through direct or real-time communication with other users or the creation of web pages or profiles available to the public or to other users.
(2) "Electronic mail" means an electronic mail message sent through the use of an electronic mail program or a message board program.
(3) "Identifying information" means information that alone, or in conjunction with other information, identifies a person, including a person's:
(i) Name, social security number, date of birth, or government-issued identification number;
(ii) Unique biometric data, including the person's fingerprint, voice print, or retina or iris image;
(iii) Unique electronic identification number, electronic mail address, routing code, or financial institution account number; and
(iv) Telecommunication identifying information or access device.
(4) "Public official" means a person elected by the public, or elected or appointed by a governmental body, or an appointed official in the executive, legislative, or judicial branch of the state or any political subdivision thereof.
(b) A person commits the crime of online impersonation if the person:
(1) Uses the name or persona of another person to create a web page on or to post one or more messages on a commercial social networking site or sends an electronic mail, instant message, text message, or similar communication without obtaining the other person's consent and with the intent to harm, defraud, intimidate, or threaten any person;
(2) Sends an electronic mail, instant message, text message, or similar communication that references a name, domain address, telephone number, or other item of identifying information belonging to any person without obtaining the other person's consent with the intent to cause a recipient of the communication to reasonably believe that the other person authorized or transmitted the communication and with the intent to harm or defraud any person; or
(3) Uses the name or persona of a public official to create a web page on, or to post one or more messages on, a commercial social networking site or sends an electronic mail, instant message, text message, or similar communication without obtaining the public official's consent and with the intent to induce another to submit to such pretended official authority, to solicit funds, or otherwise to act in reliance upon that pretense to the other person's detriment.
(c) Every person convicted of an offense under this section shall be guilty of a misdemeanor for the first offense and shall be subject to imprisonment not exceeding one year, a fine of one thousand dollars ($1,000), or both, and an order of restitution as provided herein. Every person convicted of a second or subsequent offense under this section shall be guilty of a felony and shall be subject to imprisonment not exceeding three (3) years, a fine of three thousand dollars ($3,000), or both, and an order of restitution as provided herein.
(d) Every person convicted of an offense under this section shall be subject to an order for restitution, if appropriate, which shall be in addition to any other applicable penalty.
History of Section.
P.L. 2014, ch. 202, § 1; P.L. 2014, ch. 215, § 1.
§ 11-52-8. Tampering with computer source documents.
(a) Whoever intentionally or knowingly conceals, destroys, or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source document used for a computer, computer program, computer system, or computer network, when the computer source document is required to be kept by law, shall be guilty of a misdemeanor and shall be subject to the provisions of § 11-52-5.
(b) Whoever intentionally or knowingly conceals, destroys, or alters or intentionally, knowingly conceals, destroys, or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source document used for a computer, computer program, computer system, or computer network, when the computer source document is required to be kept by law, with the intent to obstruct an official investigation by any state agency authorized by law to conduct any civil or criminal investigation, shall be guilty of a felony and shall be subject to the provisions of § 11-52-5.
History of Section.
P.L. 1989, ch. 136 § 2.
Computer Crime (Rhode Island General Laws Sec. 11-52-1, 11-52-4.1, 11-52-5, and 11-52-6, as amended. Subsequently amended by Laws of 2006, Chapter 461, became law without Governor's signature, effective July 7, 2006.)
For more information, see here: http://webserver.rilegislature.gov//Statutes/TITLE11/11-52/INDEX.htm
These materials were obtained directly from the State Legislative websites and are posted here for your review and reference only. No Claim to Original State Government Works. This may not be the most recent version. The State may have more current information. We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to. Please check the linked sources directly.