OREGON
TITLE 16.
CRIMES AND PUNISHMENTS
CHAPTER 164. OFFENSES AGAINST PROPERTY
CRIMINAL MISCHIEF AND RELATED OFFENSES
164.377. Computer crime.
(1) As used in this section:
(a) To "access" means to instruct, communicate with, store data in, retrieve data from or
otherwise make use of any resources of a computer, computer system or computer network.
(b) "Computer" means, but is not limited to, an electronic device which performs logical,
arithmetic or memory functions by the manipulations of electronic, magnetic or optical signals or impulses,
and includes all input, output, processing, storage, software or communication facilities which are connected
or related to such a device in a system or network.
(c) "Computer network" means, but is not limited to, the interconnection of communication
lines, including microwave or other means of electronic communication, with a computer through remote
terminals or a complex consisting of two or more interconnected computers.
(d) "Computer program" means, but is not limited to, a series of instructions or statements,
in a form acceptable to a computer, which permits the functioning of a computer system in a manner
designed to provide appropriate products from or usage of such computer system.
(e) "Computer software" means, but is not limited to, computer programs, procedures and
associated documentation concerned with the operation of a computer system.
(f) "Computer system" means, but is not limited to, a set of related, connected or
unconnected, computer equipment, devices and software. "Computer system" also includes any computer,
device or software owned or operated by the Oregon State Lottery or rented, owned or operated by
another person or entity under contract to or at the direction of the Oregon State Lottery.
(g) "Data" means a representation of information, knowledge, facts, concepts, computer
software, computer programs or instructions. "Data" may be in any form, in storage media, or as stored
in the memory of the computer, or in transit, or presented on a display device. "Data" includes, but is not
limited to, computer or human readable forms of numbers, text, stored voice, graphics and images.
(h) "Property" includes, but is not limited to, financial instruments, information, including
electronically produced data, and computer software and programs in either computer or human readable
form, intellectual property and any other tangible or intangible item of value.
(i) "Proprietary information" includes any scientific, technical or commercial information
including any design, process, procedure, list of customers, list of suppliers, customers' records or business
code or improvement thereof that is known only to limited individuals within an organization and is used
in a business that the organization conducts. The information must have actual or potential commercial
value and give the user of the information an opportunity to obtain a business advantage over competitors
who do not know or use the information.
(j) "Services" include, but are not limited to, computer time, data processing and storage
functions.
(2) Any person commits computer crime who knowingly accesses, attempts to access or uses, or
attempts to use, any computer,computer system, computer network or any part thereof for the purpose
of:
(a) Devising or executing any scheme or artifice to defraud;
(b) Obtaining money, property or services by means of false or fraudulent pretenses,
representations or promises; or
(c) Committing theft, including, but not limited to, theft of proprietary information.
(3) Any person who knowingly and without authorization alters, damages or destroys any
computer, computer system, computer network, or any computer software, program, documentation or
data contained in such computer, computer system or computer network, commits computer crime.
(4) Any person who knowingly and without authorization uses, accesses or attempts to access any
computer, computer system, computer network, or any computer software, program, documentation or
data contained in such computer, computer system or computer network, commits computer crime.
(5) (a) A violation of the provisions of subsection (2) or (3) of this section shall be a Class C
felony. Except as provided in paragraph (b) of this subsection, a violation of the provisions of subsection
(4) of this section shall be a Class A misdemeanor.
(b) Any violation of this section relating to a computer, computer network, computer
program, computer software, computer system or data owned or operated by the Oregon State Lottery
or rented, owned or operated by another person or entity under contract to or at the direction of the
Oregon State Lottery Commission shall be a Class C felony.
164.125. Theft of services.
(1) A person commits the crime of theft of services if:
(a) With intent to avoid payment therefor, the person obtains services that are available
only for compensation, by force, threat, deception or other means to avoid payment for the services; or
(b) Having control over the disposition of labor or of business, commercial or industrial
equipment or facilities of another, the person uses or diverts to the use of the person or a third person
such labor, equipment or facilities with intent to derive for the person or the third person a commercial
benefit to which the person or the third person is not entitled.
(2) As used in this section, "services" includes, but is not limited to, labor, professional services, toll
facilities, transportation, communications service, entertainment, thesupplying of food, lodging or other
accommodations in hotels, restaurants or elsewhere, the supplying of equipment for use, and the supplying
of commodities of a public utility nature such as gas, electricity, steam and water. "Communication service"
includes, but is not limited to, use of telephone, computer and cable television systems.
(3) Absconding without payment or offer to pay for hotel, restaurant or other services for which
compensation is customarily paid immediately upon the receiving of them is prima facie evidence that the
services were obtained with intent to avoid payment therefor. Obtaining the use of any communication
system the use of which is available only for compensation, including but not limited to telephone,
computer and cable television systems, or obtaining the use of any services of a public utility nature,
without payment or offer to pay for such use is prima facie evidence that the obtaining of the use of such
system or the use of such services was gained with intent to avoid payment therefor.
(4) The value of single theft transactions may be added together if the thefts were committed:
(a) Against multiple victims by a similar means within a 30-day period; or
(b) Against the same victim, or two or more persons who are joint owners, within a 180-day
period.
(5) Theft of services is:
(a) A Class C misdemeanor if the aggregate total value of services that are the subject of
the theft is under $ 50;
(b) A Class A misdemeanor if the aggregate total value of services that are the subject of
the theft is $ 50 or more but is under $ 750;
(c) A Class C felony if the aggregate total value of services that are the subject of the theft
is $ 750 or more; and
(d) A Class B felony if the aggregate total value of services that are the subject of the theft
is $ 10,000 or more.