Chap 708 Part IX Computer Crime Flashcards

1
Q

708-891

Computer Fraud 1st

A

K

  • accesses a computer/system/network with the intent to commit the offense of THEFT 1ST.

A felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

708-891.5

Computer Fraud 2nd

A

K

  • accesses a computer/system/network with the intent to commit the offense of THEFT 2ND.

B felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

708-891.6

Computer Fraud 3rd

A

K

  • accesses a computer/system/network with the intent to commit the offense of THEFT 3RD OR 4TH.

C felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

708-892

Computer Damage 1st

A

I

  • causes/attempts to cause DAMAGE to a computer/ system/network that manages or controls any CRITICAL INFRASTRUCTURE and the damage results in/would have resulted in, the SUBSTANTIAL IMPAIRMENT of:
    (a) The operation of the computer/system/network; or
    (b) The critical infrastructure managed or controlled by the computer/system/network.

A felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

708-892.5

Computer Damage 2nd

A

K

(a) causes the TRANSMISSION OF A PROGRAM, program, information, code, or command, and thereby knowingly causes unauthorized damage to a computer/system/network; or
(b) I, accesses a computer/system/network without authorization and thereby KNOWINGLY CAUSES DAMAGE.

“damage” means:

 (a) A loss aggregating at least $5,000;
 (b) The modification/impairment of the medical examination, diagnosis, treatment, or care of one or more individuals; or
 (c) Impairment/disruption of government operations.

B felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

708-892.6

Computer Damage 3rd

A

K

accesses a computer/system/network without authorization and thereby RECKLESSLY CAUSES DAMAGE.

C felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

708-893

Use of a Computer in the Commission of a Separate Crime

A

I, uses a computer to obtain control over the property of the victim to commit theft in the 1st or 2nd degree; or

K, uses a computer to identify, select, solicit, persuade, coerce, entice, induce, procure, pursue, surveil, contact, harass, annoy, or alarm the victim or intended victim of the following offenses:

     (i) custodial interference in the 1st, 2nd;
    (iii) sexual assault in the 2nd, 3rd, 4th;
    (vi) promoting child abuse 2nd;
   (vii) harassment;
  (viii) harassment by stalking; or
    (ix) promoting pornography for minors.

one class greater than the offense facilitated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

708-895.5

Unauthorized Computer Access 1st

A

K

accesses a computer/system/network without authorization and thereby obtains information, and:

 (a) for the purpose of commercial or private FINANCIAL GAIN;
 (b) FURTHERANCE of any other crime;
 (c) information obtained EXCEEDS $20,000; or
 (d) COURT protected information

A felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

708-895.6

Unauthorized Computer Access 2nd

A

K

accesses a computer/system/network without authorization and thereby OBTAINS INFORMATION.

B felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

708-895.7

Unauthorized Computer Access 3rd

A

K

accesses a computer/system/network WITHOUT AUTHORIZATION.

C felony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly