UTAH
TITLE 76. CRIMINAL CODE
CHAPTER 6. OFFENSES AGAINST PROPERTY
PART 7. COMPUTER CRIMES
76-6-701. Computer Crimes Act -- Short title
This part is known as the "Utah Computer Crimes Act."
76-6-702. Computer Crimes Act -- Definitions
As used in this part:
(1) "Access" means to directly or indirectly use, attempt to use, instruct, communicate with,
cause input to, cause output from, or otherwise make use of any resources of a computer, computer
system, computer network, or any means of communication with any of them.
(2) "Computer" means any electronic device or communication facility with data processing
ability.
(3) "Computer system" means a set of related, connected or unconnected, devices, software,
or other related computer equipment.
(4) "Computer network" means the interconnection of communication or telecommunication
lines between computers or computers and remote terminals.
(5) "Computer property" includes, but is not limited to, electronic impulses, electronically
produced data, information, financial instruments, software, or programs, in either machine or human
readable form, any other tangible or intangible item relating to a computer, computer system, computer
network, and copies of any of them.
(6) "Services" include, but are not limited to, computer time, data manipulation, and storage
functions.
(7) "Financial instrument" includes, but is not limited to, any check, draft, money order,
certificate of deposit, letter of credit, bill of exchange, credit card, or marketable security.
(8) "Software" or "program" means a series of instructions or statements in a form
acceptable to a computer, relating to the operations of the computer, or permitting the functioning of a
computer system in a manner designed to provide results including, but not limited to, system control
programs, application programs, or copies of any of them.
76-6-703. Computer crimes and penalties
(1) A person who gains or attempts to gain access to and without authorization intentionally, and
to the damage of another, alters, damages, destroys, discloses, or modifies any computer, computer
network, computer property, computer system, program, or software is guilty of a felony of the third
degree.
(2) A person who intentionally and without authorization uses a computer, computer network,
computer property, or computer system to gain or attempt to gain access to any other computer, computer
network, computer property, or computer system, program, or software, to the damage of another, and
alters, damages, destroys, discloses, or modifies any of these, is guilty of a felony of the third degree.
(3) A person who uses or knowingly allows another person to use any computer, computer
network, computer property, or computer system, program, or software to devise or execute any artifice
or scheme to defraud or to obtain money, property, services, or other things of value by false pretenses,
promises, or representations, is guilty of a felony of the second degree.
(4) A person who intentionally, and without authorization, interferes with or interrupts computer
services to another authorized to receive the services is guilty of a class A misdemeanor.
(5) A person who intentionally and without authorization damages or destroys, in whole or in part,
any computer, computer network, computer property, or computer system is guilty of a class A
misdemeanor unless the amount of damage exceeds $1,000, in which case the person is guilty of a felony
of the third degree.
76-6-704. Computer Crimes Act -- Attorney general, county attorney, or district attorney to prosecute --
Conduct violating other statutes
(1) The attorney general, district attorney, or the county attorney shall prosecute suspected
criminal violations of this part.
(2) Prosecution under this part does not prevent any prosecutions under any other law.
76-6-705. Reporting violations
Every person, except those to whom a statutory or common law privilege applies, who has reason
to believe that the provisions of Section 76-6-703 are being or have been violated shall report the suspected
violation to the attorney general, or county attorney, or, if within a prosecution district, the district
attorney of the county or prosecution district in which part or all of the violations occurred.