| ||||||||||||||||||||||||
| ||||||||||||||||||||||||
| ||||||||||||||||||||||||
| ||||||||||||||||||||||||
| ||||||||||||||||||||||||
1 | AN ACT concerning criminal law.
| |||||||||||||||||||||||
2 | Be it enacted by the People of the State of Illinois,
| |||||||||||||||||||||||
3 | represented in the General Assembly:
| |||||||||||||||||||||||
4 | Section 5. The Criminal Code of 2012 is amended by | |||||||||||||||||||||||
5 | changing Sections 17-51 and 17-54 by adding Section 17-53 as | |||||||||||||||||||||||
6 | follows:
| |||||||||||||||||||||||
7 | (720 ILCS 5/17-51) (was 720 ILCS 5/16D-3)
| |||||||||||||||||||||||
8 | Sec. 17-51. Computer tampering.
| |||||||||||||||||||||||
9 | (a) A person commits
computer tampering when he or she | |||||||||||||||||||||||
10 | knowingly and without the authorization of a
computer's owner | |||||||||||||||||||||||
11 | or in excess of
the authority granted to him or her:
| |||||||||||||||||||||||
12 | (1) Accesses or causes to be accessed a computer or | |||||||||||||||||||||||
13 | any part thereof, a computer network, or
a program or | |||||||||||||||||||||||
14 | data;
| |||||||||||||||||||||||
15 | (2) Accesses or causes to be accessed a computer or | |||||||||||||||||||||||
16 | any part thereof, a computer network, or
a program or | |||||||||||||||||||||||
17 | data, and obtains data or services;
| |||||||||||||||||||||||
18 | (3) Accesses or causes to be accessed a computer or | |||||||||||||||||||||||
19 | any
part thereof, a computer network, or a program or | |||||||||||||||||||||||
20 | data, and damages or destroys the computer or
alters, | |||||||||||||||||||||||
21 | deletes, or removes a computer program or data;
| |||||||||||||||||||||||
22 | (4) Inserts or attempts to insert a program into a | |||||||||||||||||||||||
23 | computer or
computer program knowing or having reason to |
| |||||||
| |||||||
1 | know that such program contains
information or commands | ||||||
2 | that will or may: | ||||||
3 | (A) damage or destroy that computer,
or any other | ||||||
4 | computer subsequently accessing or being accessed by | ||||||
5 | that
computer; | ||||||
6 | (B) alter, delete, or remove a computer program or
| ||||||
7 | data from that computer, or any other computer program | ||||||
8 | or data in a
computer subsequently accessing or being | ||||||
9 | accessed by that computer; or | ||||||
10 | (C) cause loss to the users of that computer or the | ||||||
11 | users of a
computer which accesses or which is | ||||||
12 | accessed by such program; or
| ||||||
13 | (5) Falsifies or forges electronic mail transmission | ||||||
14 | information or
other
routing information in any manner in | ||||||
15 | connection with delivery of code, software, or hyperlinks | ||||||
16 | to deliver software or code designed to manipulate a | ||||||
17 | computer to allow for remote manipulation without the | ||||||
18 | computer owner's permission the transmission of
| ||||||
19 | unsolicited bulk electronic mail through or into the | ||||||
20 | computer network of an
electronic mail service provider or | ||||||
21 | its subscribers .
| ||||||
22 | (a-5) Distributing software to falsify routing | ||||||
23 | information. It is unlawful for any person knowingly to sell, | ||||||
24 | give, or
otherwise
distribute or possess with the intent to | ||||||
25 | sell, give, or distribute software
which:
| ||||||
26 | (1) is primarily designed or produced for the purpose |
| |||||||
| |||||||
1 | of facilitating or
enabling the falsification of | ||||||
2 | electronic mail transmission information or
other routing | ||||||
3 | information; | ||||||
4 | (2) has only a limited commercially significant
| ||||||
5 | purpose or use other than to facilitate or enable the | ||||||
6 | falsification of
electronic
mail transmission information | ||||||
7 | or other routing information; or | ||||||
8 | (3) is
marketed by that person or another acting in | ||||||
9 | concert with that person with
that person's knowledge for | ||||||
10 | use in facilitating or enabling the falsification
of
| ||||||
11 | electronic mail transmission information or other routing | ||||||
12 | information.
| ||||||
13 | (a-10) For purposes of subsection (a), accessing a | ||||||
14 | computer network is deemed to be with the authorization of a
| ||||||
15 | computer's owner if: | ||||||
16 | (1) the owner authorizes patrons, customers, or guests | ||||||
17 | to access the computer network and the person accessing | ||||||
18 | the computer network is an authorized patron, customer, or | ||||||
19 | guest and complies with all terms or conditions for use of | ||||||
20 | the computer network that are imposed by the owner; | ||||||
21 | (2) the owner authorizes the public to access the | ||||||
22 | computer network and the person accessing the computer | ||||||
23 | network complies with all terms or conditions for use of | ||||||
24 | the computer network that are imposed by the owner; or | ||||||
25 | (3) the person accesses the computer network in | ||||||
26 | compliance with the Revised Uniform Fiduciary Access to |
| |||||||
| |||||||
1 | Digital Assets Act (2015).
| ||||||
2 | (b) Sentence.
| ||||||
3 | (1) A person who commits computer
tampering as set | ||||||
4 | forth in subdivision (a)(1) or (a)(5) or subsection (a-5) | ||||||
5 | of this
Section is guilty
of a Class A B misdemeanor.
| ||||||
6 | (2) A person who commits computer tampering as set | ||||||
7 | forth
in subdivision (a)(2) of this Section is guilty of a | ||||||
8 | Class A misdemeanor
and a Class 4 felony for the second or | ||||||
9 | subsequent offense.
| ||||||
10 | (3) A person who commits computer tampering as set | ||||||
11 | forth
in subdivision (a)(3) or (a)(4) of this Section is | ||||||
12 | guilty of a Class 4 felony
and a Class 3 felony for the | ||||||
13 | second or subsequent offense.
| ||||||
14 | (4) If an injury arises from the transmission of | ||||||
15 | unsolicited bulk
electronic
mail, the injured person, | ||||||
16 | other than an electronic mail service
provider, may also | ||||||
17 | recover attorney's fees and costs, and may elect, in lieu | ||||||
18 | of
actual damages, to recover the lesser of $10 for each | ||||||
19 | unsolicited
bulk electronic mail message transmitted in | ||||||
20 | violation of this Section, or
$25,000 per day. The injured | ||||||
21 | person shall not have a cause of action
against the | ||||||
22 | electronic mail service provider that merely transmits the
| ||||||
23 | unsolicited bulk electronic mail over its computer | ||||||
24 | network.
| ||||||
25 | (5) If an injury arises from the transmission of | ||||||
26 | unsolicited bulk
electronic
mail,
an injured electronic |
| |||||||
| |||||||
1 | mail service provider may also recover
attorney's fees and | ||||||
2 | costs, and may elect, in lieu of actual damages, to | ||||||
3 | recover
the greater of $10 for each unsolicited electronic | ||||||
4 | mail
advertisement transmitted in violation of this | ||||||
5 | Section, or $25,000 per day.
| ||||||
6 | (6) The provisions of this Section shall not be | ||||||
7 | construed to limit any
person's
right to pursue any | ||||||
8 | additional civil remedy otherwise allowed by law.
| ||||||
9 | (c) Whoever suffers loss by reason of a violation of | ||||||
10 | subdivision (a)(4)
of this Section may, in a civil action | ||||||
11 | against the violator, obtain
appropriate relief. In
a civil | ||||||
12 | action under this Section, the court may award to the | ||||||
13 | prevailing
party reasonable attorney's fees and other | ||||||
14 | litigation expenses.
| ||||||
15 | (Source: P.A. 99-775, eff. 8-12-16.)
| ||||||
16 | (720 ILCS 5/17-53 new) | ||||||
17 | Sec. 17-53. Purchasing hacking software. | ||||||
18 | (a) In this section, "hacking software" means a computer | ||||||
19 | or data contaminant, encryption, or lock that when placed or | ||||||
20 | introduced without authorization into a computer, computer | ||||||
21 | system, or computer network allows the individual who | ||||||
22 | introduced the software to access the computer, computer | ||||||
23 | system, or computer network without the knowledge of the | ||||||
24 | owner. | ||||||
25 | (b) A person commits purchasing hacking software when he |
| |||||||
| |||||||
1 | or she knowingly purchases hacking software with the intent to | ||||||
2 | use or employ that software for the purpose of introduction | ||||||
3 | into a computer, computer system, or computer network, without | ||||||
4 | the authorization of the computer owner. | ||||||
5 | (c) Sentence. Purchasing hacking software is a Class B | ||||||
6 | misdemeanor.
| ||||||
7 | (720 ILCS 5/17-54) (was 720 ILCS 5/16D-7)
| ||||||
8 | Sec. 17-54. Evidence of lack of authority. For the | ||||||
9 | purposes of Sections 17-50 through 17-53 17-52 , the trier of | ||||||
10 | fact may infer that a person accessed a computer without the | ||||||
11 | authorization of its owner or in excess of the authority | ||||||
12 | granted if the person accesses or causes to be accessed a | ||||||
13 | computer, which access
requires a confidential or proprietary | ||||||
14 | code which has not been issued to or
authorized for use by that | ||||||
15 | person. This Section does not apply to a person who acquires | ||||||
16 | access in compliance with the Revised Uniform Fiduciary Access | ||||||
17 | to Digital Assets Act (2015).
| ||||||
18 | (Source: P.A. 99-775, eff. 8-12-16.)
|