WYOMING
TITLE 6. CRIMES AND OFFENSES
CHAPTER 3. OFFENSES AGAINST PROPERTY
ARTICLE 5. COMPUTER CRIMES
6-3-501. Definitions
(a) As used in this article:
(i) "Access" means to approach, instruct, communicate with, store data in, retrieve data
from, or otherwise make use of any resources of a computer, computer system or computer network;
(ii) "Computer" means an internally programmed, automatic device which performs data
processing;
(iii) "Computer network" means a set of related, remotely connected devices and
communication facilities including more than one (1) computer system with capability to transmit data
among them through communication facilities;
(iv) "Computer program" means an ordered set of data representing coded instructions or
statements which when executed by a computer cause the computer to process data;
(v) "Computer software" means a set of computer programs, procedures and associated
documentation concerned with the operation of a computer system;
(vi) "Computer system" means a set of related, connected or unconnected, computer
equipment, devices or computer software;
(vii) "Computer system services" means providing a computer system or computer network
to perform useful work;
(viii) "Financial instrument" means a check, draft, money order, certificate of deposit, letter
of credit, bill of exchange, credit card or marketable security;
(ix) "Intellectual property" means data, including programs;
(x) "Property" includes financial instruments, information, electronically produced data,
computer software and programs in machine-readable or human-readable form;
(xi) "Trade secret" means the whole or a portion or phase of a formula, pattern, device,
combination of devices or compilation of information which is for use, or is used in the operation of a
business and which provides the business an advantage or an opportunity to obtain an advantage over
those who do not know or use it. "Trade secret" includes any scientific, technical or commercial information
including any design, process, procedure, list of suppliers, list of customers, business code or improvement
thereof. Irrespective of novelty, invention, patentability, the state of the prior art and the level of skill in
the business, art or field to which the subject matter pertains, when the owner of a trade secret takes
measures to prevent it from becoming available to persons other than those selected by the owner to have
access to it for limited purposes, the trade secret is considered to be:
(A) Secret;
(B) Of value;
(C) For use or in use by the business; and
(D) Providing an advantage or an opportunity to obtain an advantage to the
business over those who do not know or use it.
6-3-502. Crimes against intellectual property; penalties
(a) A person commits a crime against intellectual property if he knowingly and without
authorization:
(i) Modifies data, programs or supporting documentation residing or existing internal or
external to a computer, computer system or computer network;
(ii) Destroys data, programs or supporting documentation residing or existing internal or
external to a computer, computer system or computer network;
(iii) Discloses or takes data, programs, or supporting documentation having a value of more
than seven hundred fifty dollars ($750.00) and which is a trade secret or is confidential, as provided by law,
residing or existing internal or external to a computer, computer system or computer network.
(b) A crime against intellectual property is:
(i) A felony punishable by imprisonment for not more than three (3) years, a fine of not
more than three thousand dollars ($3,000.00), or both, except as provided in paragraph (ii) of this
subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not
more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of
devising or executing a scheme or artifice to defraud or to obtain property.
6-3-503. Crimes against computer equipment or supplies; interruption or impairment of governmental
operations or public services; penalties
(a) A person commits a crime against computer equipment or supplies if he knowingly and without
authorization, modifies equipment or supplies used or intended to be used in a computer, computer system
or computer network. A crime against computer equipment or supplies is:
(i) A misdemeanor punishable by imprisonment for not more than six (6) months, a fine
of not more than seven hundred fifty dollars ($750.00), or both, except as provided in paragraph (ii) of this
subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not
more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of
devising or executing a scheme or artifice to defraud or to obtain property.
(b) A person who knowingly and without authorization destroys, injures or damages a computer,
computer system or computer network and thereby interrupts or impairs governmental operations or
public communication, transportation or supplies of water, gas or other public service, is guilty of a felony
punishable by imprisonment for not more than three (3) years, a fine of not more than three thousand
dollars ($3,000.00), or both.
6-3-504. Crimes against computer users; penalties
(a) A person commits a crime against computer users if he knowingly and without authorization:
(i) Accesses a computer, computer system or computer network;
(ii) Denies computer system services to an authorized user of the computer system services
which, in whole or part, are owned by, under contract to, or operated for, on behalf of, or in conjunction
with another.
(b) A crime against computer users is:
(i) A felony punishable by imprisonment for not more than three (3) years, a fine of not
more than three thousand dollars ($3,000.00), or both except as provided in paragraph (ii) of this
subsection;
(ii) A felony punishable by imprisonment for not more than ten (10) years, a fine of not
more than ten thousand dollars ($10,000.00), or both, if the crime is committed with the intention of
devising or executing a scheme or artifice to defraud or to obtain property.
6-3-505. This article not exclusive
This article shall not preclude the application of any other provision of the criminal law of this state
which applies, or may apply, to any violation of this article, unless the provision is inconsistent with this
article.