Amended in Assembly April 1, 2014

California Legislature—2013–14 Regular Session

Assembly BillNo. 1649


Introduced by Assembly Member Waldron

February 11, 2014


An act to amend Section 502 of the Penal Code, relating to computer crimes.

LEGISLATIVE COUNSEL’S DIGEST

AB 1649, as amended, Waldron. Computer crimes.

(1) Existing law makes it a crime to knowingly and without permission disrupt or cause the disruption of computer services or deny or cause the denial of computer services to an authorized user of a computer, computer system, or computer network. Existing law makes a violation of this provision punishable by a fine not exceeding $10,000, or by imprisonment in a county jail for 16 months, or 2 or 3 years, or by both that fine and imprisonment, or by a fine not exceeding $5,000, or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment.

This bill wouldbegin delete increase the fine to $20,000 for a felony violation, and to $10,000 for a misdemeanor violation,end deletebegin insert make it a crimeend insert for a personbegin delete whoend deletebegin insert toend insert knowingly and without permissionbegin delete disruptsend deletebegin insert disruptend insert orbegin delete causesend deletebegin insert causeend insert the disruption of government computer services or public safety infrastructure computer system computer services, as defined, orbegin delete denies or causesend deletebegin insert deny or causeend insert the denial of government computer services or public safety infrastructure computer system computer services to an authorized user.begin insert The bill would make a violation of these provisions punishable in the same manner as the above provisions of existing law.end insert

(2) Existing law makes it a crime to knowingly access and without permission add, alter, damage, delete, or destroy any data, computer software, or computer program which resides or exists internal or external to a computer, computer system, or computer network. Existing law makes a violation of this provision punishable by a fine not exceeding $10,000, or by imprisonment in a county jail for 16 months, or 2 or 3 years, or by both that fine and imprisonment, or by a fine not exceeding $5,000, or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment.

This bill wouldbegin delete increase the fine to $20,000 for a felony violation, and to $10,000 for a misdemeanor violation,end deletebegin insert make it a crimeend insert for a personbegin delete whoend deletebegin insert toend insert knowinglybegin delete accessesend deletebegin insert accessend insert and without permissionbegin delete adds, alters, damages, deletes, or destroysend deletebegin insert add, alter, delete, or destroyend insert any data, computer software, or computer programs which reside or exist internal or external to a public safety infrastructure computer system computer, computer system, or computer network.begin insert The bill would make a violation of these provisions punishable in the same manner as the above provisions of existing law.end insert

(3) Existing law makes it a crime to knowingly and without permission provide or assist in providing a means of accessing a computer, computer system, or computer network in violation of law. Existing law makes a violation this provision punishable by a fine not exceeding $1,000 for a first violation that does not result in injury, by a fine not exceeding $5,000, or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment for a violation that results in a victim expenditure in an amount not greater than $5,000, or for a 2nd or subsequent violation, and by a fine not exceeding $10,000, or by imprisonment in a county jail for 16 months, or 2 or 3 years, or by both that fine and imprisonment, or by a fine not exceeding $5,000, or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment, for a violation that results in a victim expenditure in an amount greater than $5,000.

The bill wouldbegin delete increase the fine to $2,000 for a first violation that does not result in injury, to $10,000 for a violation that results in a victim expenditure in an amount not greater than $5,000, or for a 2nd or subsequent violation, and to $20,000 for a felony violation and to $10,000 for a misdemeanor violation, for a violation that results in victim expenditure in an amount greater than $5,000end deletebegin insert make it a crimeend insert for any personbegin delete whoend deletebegin insert toend insert knowingly and without permissionbegin delete provides or assistsend deletebegin insert provide or assistend insert in providing a means of accessing a public safety infrastructure computer system computer, computer system, or computer network.begin insert The bill would make a violation of these provisions punishable in the same manner as the above provisions of existing law.end insert

(4) Existing law makes it a crime to knowingly introduce a computer contaminant into any computer, computer system, or computer network. Existing law makes a violation of this provision punishable by a fine not exceeding $5,000, or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment, for a first violation that does not result in injury, and by a fine not exceeding $10,000, or by imprisonment in a county jail not exceeding one year, or by imprisonment in a county jail for 16 months, 2 or 3 years, or by both that fine and imprisonment for a violation that results in injury, or for a 2nd or subsequent violation.

begin insert

This bill would make it a crime for any person to knowingly introduce any computer contaminant into any public safety infrastructure computer system computer, computer system, or computer network. The bill would make a violation of these provisions punishable in the same manner as the above provisions of existing law.

end insert
begin delete

This bill would increase the fine to $10,000 for a first violation that does not result in injury, and to $20,000 for a violation that results in injury, or for a 2nd or subsequent violation.

end delete

(5) Existing law makes it a crime to knowingly and without permission use the Internet domain name of another individual, corporation, or entity in connection with the sending of one or more electronic mail messages, and to thereby damage a computer, computer system, or computer network. Existing law makes a violation of these provisions punishable by a fine of $1,000 for a first violation that does not cause injury, and by imprisonment in a county jail not exceeding one year, or by a fine not exceeding $5,000, or by both that fine and imprisonment, for a violation that results in injury or for a 2nd or subsequent offense.

This bill would revise this crime to apply to any person who knowingly and without permission uses the Internet domain name or profile, as defined, of another individual, corporation, or entity in connection with the sending of one or more electronic mail messages or posts and thereby causes damage. The bill would define electronic mail for these purposes. By expanding the definition of a crime, this bill would impose a state-mandated local program.

The bill would also revise the definitions of “access,” “computer network,” and “computer services” for purposes of these provisions.

(6) The California Constitution requires the state to reimburse local agencies and school districts for certain costs mandated by the state. Statutory provisions establish procedures for making that reimbursement.

This bill would provide that no reimbursement is required by this act for a specified reason.

Vote: majority. Appropriation: no. Fiscal committee: yes. State-mandated local program: yes.

The people of the State of California do enact as follows:

P4    1

SECTION 1.  

Section 502 of the Penal Code is amended to
2read:

3

502.  

(a) It is the intent of the Legislature in enacting this
4section to expand the degree of protection afforded to individuals,
5businesses, and governmental agencies from tampering,
6interference, damage, and unauthorized access to lawfully created
7computer data and computer systems. The Legislature finds and
8declares that the proliferation of computer technology has resulted
9in a concomitant proliferation of computer crime and other forms
10of unauthorized access to computers, computer systems, and
11computer data.

12The Legislature further finds and declares that protection of the
13integrity of all types and forms of lawfully created computers,
14computer systems, and computer data is vital to the protection of
15the privacy of individuals as well as to the well-being of financial
16institutions, business concerns, governmental agencies, and others
17within this state that lawfully utilize those computers, computer
18systems, and data.

19(b) For the purposes of this section, the following terms have
20the following meanings:

21(1) “Access” means to gain entry to, instruct, cause input to,
22cause output from, cause data processing with, or communicate
23with, the logical, arithmetical, or memory function resources of a
24computer, computer system, or computer network.

25(2) “Computer network” means any system that provides
26communications between one or more computer systems and
27input/output devices including, but not limited to, display terminals,
28remote systems, mobile devices, and printers connected by
29telecommunication facilities.

P5    1(3) “Computer program or software” means a set of instructions
2or statements, and related data, that when executed in actual or
3modified form, cause a computer, computer system, or computer
4network to perform specified functions.

5(4) “Computer services” includes, but is not limited to, computer
6time, data processing, or storage functions, Internet services,
7electronic mail services, electronic message services, or other uses
8of a computer, computer system, or computer network.

9(5) “Computer system” means a device or collection of devices,
10including support devices and excluding calculators that are not
11programmable and capable of being used in conjunction with
12external files, one or more of which contain computer programs,
13electronic instructions, input data, and output data, that performs
14functions including, but not limited to, logic, arithmetic, data
15storage and retrieval, communication, and control.

16(6) “Government computer system” means any computer system,
17or part thereof, that is owned, operated, or used by any federal,
18state, or local governmental entity.

19(7) “Public safety infrastructure computer system” means any
20computer system, or part thereof, that is necessary for the health
21and safety of the public including computer systems owned,
22operated, or used by drinking water and wastewater treatment
23facilities, hospitals, emergency service providers,
24telecommunication companies, and gas and electric utility
25companies.

26(8) “Data” means a representation of information, knowledge,
27facts, concepts, computer software, computer programs or
28instructions. Data may be in any form, in storage media, or as
29stored in the memory of the computer or in transit or presented on
30a display device.

31(9) “Supporting documentation” includes, but is not limited to,
32all information, in any form, pertaining to the design, construction,
33classification, implementation, use, or modification of a computer,
34computer system, computer network, computer program, or
35computer software, which information is not generally available
36to the public and is necessary for the operation of a computer,
37computer system, computer network, computer program, or
38computer software.

39(10) “Injury” means any alteration, deletion, damage, or
40destruction of a computer system, computer network, computer
P6    1program, or data caused by the access, or the denial of access to
2legitimate users of a computer system, network, or program.

3(11) “Victim expenditure” means any expenditure reasonably
4and necessarily incurred by the owner or lessee to verify that a
5computer system, computer network, computer program, or data
6was or was not altered, deleted, damaged, or destroyed by the
7access.

8(12) “Computer contaminant” means any set of computer
9instructions that are designed to modify, damage, destroy, record,
10or transmit information within a computer, computer system, or
11computer network without the intent or permission of the owner
12of the information. They include, but are not limited to, a group
13of computer instructions commonly called viruses or worms, that
14are self-replicating or self-propagating and are designed to
15contaminate other computer programs or computer data, consume
16computer resources, modify, destroy, record, or transmit data, or
17in some other fashion usurp the normal operation of the computer,
18computer system, or computer network.

19(13) “Internet domain name” means a globally unique,
20hierarchical reference to an Internet host or service, assigned
21through centralized Internet naming authorities, comprising a series
22of character strings separated by periods, with the rightmost
23character string specifying the top of the hierarchy.

24(14) “Electronic mail” means an electronic message or computer
25file that is transmitted between two or more telecommunications
26devices; computers; computer networks, regardless of whether the
27network is a local, regional, or global network; or electronic devices
28capable or receiving electronic messages, regardless of whether
29the message is converted to hard copy format after receipt, viewed
30upon transmission, or stored for later retrieval.

31(15) “Profile” means either of the following:

32(A) A configuration of user data required by a computer so that
33the user may access programs or services and have the desired
34functionality on that computer.

35(B) An Internet Web site user’s personal page or section of a
36page that is made up of data, in text of graphical form, that displays
37significant, unique, or identifying information, including, but not
38limited to, listing acquaintances, interests, associations, activities,
39or personal statements.

P7    1(c) Except as provided in subdivision (h), any person who
2commits any of the following acts is guilty of a public offense:

3(1) Knowingly accesses and without permission alters, damages,
4deletes, destroys, or otherwise uses any data, computer, computer
5system, or computer network in order to either (A) devise or
6execute any scheme or artifice to defraud, deceive, or extort, or
7(B) wrongfully control or obtain money, property, or data.

8(2) Knowingly accesses and without permission takes, copies,
9or makes use of any data from a computer, computer system, or
10computer network, or takes or copies any supporting
11documentation, whether existing or residing internal or external
12to a computer, computer system, or computer network.

13(3) Knowingly and without permission uses or causes to be used
14computer services.

15(4) Knowingly accesses and without permission adds, alters,
16damages, deletes, or destroys any data, computer software, or
17computer programs which reside or exist internal or external to a
18computer, computer system, or computer network.

19(5) Knowingly and without permission disrupts or causes the
20disruption of computer services or denies or causes the denial of
21computer services to an authorized user of a computer, computer
22system, or computer network.

23(6) Knowingly and without permission provides or assists in
24providing a means of accessing a computer, computer system, or
25computer network in violation of this section.

26(7) Knowingly and without permission accesses or causes to be
27accessed any computer, computer system, or computer network.

28(8) Knowingly introduces any computer contaminant into any
29computer, computer system, or computer network.

30(9) Knowingly and without permission uses the Internet domain
31name or profile of another individual, corporation, or entity in
32connection with the sending of one or more electronic mail
33messages or posts and thereby damages or causes damage to a
34computer, computer data, computer system, or computer network.

35(10) Knowingly and without permission disrupts or causes the
36disruption of government computer services or denies or causes
37the denial of government computer services to an authorized user
38of a government computer, computer system, or computer network.

39(11) Knowingly accesses and without permission adds, alters,
40damages, deletes, or destroys any data, computer software, or
P8    1computer programs which reside or exist internal or external to a
2public safety infrastructure computer system computer, computer
3system, or computer network.

4(12) Knowingly and without permission disrupts or causes the
5disruption of public safety infrastructure computer system computer
6services or denies or causes the denial of computer services to an
7authorized user of a public safety infrastructure computer system
8computer, computer system, or computer network.

9(13) Knowingly and without permission provides or assists in
10providing a means of accessing a computer, computer system, or
11public safety infrastructure computer system computer, computer
12system, or computer network in violation of this section.

13(14) Knowingly introduces any computer contaminant into any
14public safety infrastructure computer system computer, computer
15system, or computer network.

16(d) (1) Any person who violates any of the provisions of
17paragraph (1), (2), (4),begin delete orend delete (5)begin insert, (10), (11), or (12)end insert of subdivision (c)
18is punishable by a fine not exceeding ten thousand dollars
19($10,000), or by imprisonment pursuant to subdivision (h) of
20Section 1170 for 16 months, or two or three years, or by both that
21fine and imprisonment, or by a fine not exceeding five thousand
22dollars ($5,000), or by imprisonment in a county jail not exceeding
23one year, or by both that fine and imprisonment.

24(2) Any person who violates paragraph (3) of subdivision (c)
25is punishable as follows:

26(A) For the first violation that does not result in injury, and
27where the value of the computer services used does not exceed
28nine hundred fifty dollars ($950), by a fine not exceeding five
29thousand dollars ($5,000), or by imprisonment in a county jail not
30exceeding one year, or by both that fine and imprisonment.

31(B) For any violation that results in a victim expenditure in an
32amount greater than five thousand dollars ($5,000) or in an injury,
33or if the value of the computer services used exceeds nine hundred
34fifty dollars ($950), or for any second or subsequent violation, by
35a fine not exceeding ten thousand dollars ($10,000), or by
36imprisonment pursuant to subdivision (h) of Section 1170 for 16
37months, or two or three years, or by both that fine and
38imprisonment, or by a fine not exceeding five thousand dollars
39($5,000), or by imprisonment in a county jail not exceeding one
40year, or by both that fine and imprisonment.

P9    1(3) Any person who violates paragraph (6)begin delete orend deletebegin insert,end insert (7)begin insert, or (13)end insert of
2subdivision (c) is punishable as follows:

3(A) For a first violation that does not result in injury, an
4infraction punishable by a fine not exceeding one thousand dollars
5($1,000).

6(B) For any violation that results in a victim expenditure in an
7amount not greater than five thousand dollars ($5,000), or for a
8second or subsequent violation, by a fine not exceeding five
9thousand dollars ($5,000), or by imprisonment in a county jail not
10exceeding one year, or by both that fine and imprisonment.

11(C) For any violation that results in a victim expenditure in an
12amount greater than five thousand dollars ($5,000), by a fine not
13exceeding ten thousand dollars ($10,000), or by imprisonment
14pursuant to subdivision (h) of Section 1170 for 16 months, or two
15or three years, or by both that fine and imprisonment, or by a fine
16not exceeding five thousand dollars ($5,000), or by imprisonment
17in a county jail not exceeding one year, or by both that fine and
18imprisonment.

19(4) Any person who violates paragraph (8)begin insert or (14)end insert of subdivision
20(c) is punishable as follows:

21(A) For a first violation that does not result in injury, a
22misdemeanor punishable by a fine not exceeding five thousand
23dollars ($5,000), or by imprisonment in a county jail not exceeding
24one year, or by both that fine and imprisonment.

25(B) For any violation that results in injury, or for a second or
26subsequent violation, by a fine not exceeding ten thousand dollars
27($10,000), or by imprisonment in a county jail not exceeding one
28year, or by imprisonment pursuant to subdivision (h) of Section
291170, or by both that fine and imprisonment.

30(5) Any person who violates paragraph (9) of subdivision (c)
31is punishable as follows:

32(A) For a first violation that does not result in injury, an
33infraction punishable by a fine notbegin insert exceedingend insert one thousand dollars
34begin insert ($1,000)end insert.

35(B) For any violation that results in injury, or for a second or
36subsequent violation, by a fine not exceeding five thousand dollars
37($5,000), or by imprisonment in a county jail not exceeding one
38year, or by both that fine and imprisonment.

begin delete

39(6) Any person who violates paragraph (10) of subdivision (c)
40is punishable by a fine not exceeding twenty thousand dollars
P10   1($20,000), or by imprisonment pursuant to subdivision (h) of
2Section 1170 for 16 months, or two or three years, or by both that
3fine and imprisonment, or by a fine not exceeding ten thousand
4dollars ($10,000), or by imprisonment in a county jail not
5exceeding one year, or by both that fine and imprisonment.

6(7) Any person who violates any of the provisions of paragraph
7(11) or (12) of subdivision (c) is punishable by a fine not exceeding
8twenty thousand dollars ($20,000), or by imprisonment pursuant
9to subdivision (h) of Section 1170 for 16 months, or two or three
10years, or by both that fine and imprisonment, or by a fine not
11exceeding ten thousand dollars ($10,000), or by imprisonment in
12a county jail not exceeding one year, or by both that fine and
13imprisonment.

14(8) Any person who violates paragraph (13) of subdivision (c)
15is punishable as follows:

16(A) For a first violation that does not result in injury, an
17infraction punishable by a fine not exceeding two thousand dollars
18($2,000).

19(B) For a violation that results in a victim expenditure in an
20amount not greater than five thousand dollars ($5,000), or for a
21second or subsequent violation, by a fine not exceeding ten
22thousand dollars ($10,000), or by imprisonment in a county jail
23not exceeding one year, or by both that fine and imprisonment.

24(C) For any violation that results in a victim expenditure in an
25amount greater than five thousand dollars ($5,000), by a fine not
26exceeding twenty thousand dollars ($20,000), or by imprisonment
27pursuant to subdivision (h) of Section 1170 for 16 months, or two
28or three years, or by both that fine and imprisonment, or by a fine
29not exceeding ten thousand dollars ($10,000), or by imprisonment
30in a county jail not exceeding one year, or by both that fine and
31imprisonment.

32(9) Any person who violates paragraph (14) of subdivision (c)
33is punishable as follows:

34(A) For a first violation that does not result in injury, a
35misdemeanor punishable by a fine not exceeding ten thousand
36dollars ($10,000), or by imprisonment in a county jail not
37exceeding one year, or by both that fine and imprisonment.

38(B) For any violation that results in injury, or for a second or
39subsequent violation, by a fine not exceeding twenty thousand
40dollars ($20,000), or by imprisonment in a county jail not
P11   1exceeding one year, or by imprisonment pursuant to subdivision
2(h) of Section 1170, or by both that fine and imprisonment.

end delete

3(e) (1) In addition to any other civil remedy available, the owner
4or lessee of the computer, computer system, computer network,
5computer program, or data who suffers damage or loss by reason
6of a violation of any of the provisions of subdivision (c) may bring
7a civil action against the violator for compensatory damages and
8injunctive relief or other equitable relief. Compensatory damages
9shall include any expenditure reasonably and necessarily incurred
10by the owner or lessee to verify that a computer system, computer
11network, computer program, or data was or was not altered,
12damaged, or deleted by the access. For the purposes of actions
13authorized by this subdivision, the conduct of an unemancipated
14minor shall be imputed to the parent or legal guardian having
15control or custody of the minor, pursuant to the provisions of
16Section 1714.1 of the Civil Code.

17(2) In any action brought pursuant to this subdivision the court
18may award reasonable attorney’s fees.

19(3) A community college, state university, or academic
20institution accredited in this state is required to include
21computer-related crimes as a specific violation of college or
22university student conduct policies and regulations that may subject
23a student to disciplinary sanctions up to and including dismissal
24from the academic institution. This paragraph shall not apply to
25the University of California unless the Board of Regents adopts a
26resolution to that effect.

27(4) In any action brought pursuant to this subdivision for a
28willful violation of the provisions of subdivision (c), where it is
29proved by clear and convincing evidence that a defendant has been
30guilty of oppression, fraud, or malice as defined in subdivision (c)
31of Section 3294 of the Civil Code, the court may additionally award
32punitive or exemplary damages.

33(5) No action may be brought pursuant to this subdivision unless
34it is initiated within three years of the date of the act complained
35of, or the date of the discovery of the damage, whichever is later.

36(f) This section shall not be construed to preclude the
37applicability of any other provision of the criminal law of this state
38which applies or may apply to any transaction, nor shall it make
39illegal any employee labor relations activities that are within the
40scope and protection of state or federal labor laws.

P12   1(g) Any computer, computer system, computer network, or any
2software or data, owned by the defendant, that is used during the
3commission of any public offense described in subdivision (c) or
4any computer, owned by the defendant, which is used as a
5repository for the storage of software or data illegally obtained in
6violation of subdivision (c) shall be subject to forfeiture, as
7specified in Section 502.01.

8(h) (1) Subdivision (c) does not apply to punish any acts which
9are committed by a person within the scope of his or her lawful
10employment. For purposes of this section, a person acts within the
11scope of his or her employment when he or she performs acts
12which are reasonably necessary to the performance of his or her
13work assignment.

14(2) Paragraph (3) of subdivision (c) does not apply to penalize
15any acts committed by a person acting outside of his or her lawful
16employment, provided that the employee’s activities do not cause
17an injury,begin delete as defined in paragraph (8) of subdivision (b),end delete to the
18employer or another, or provided that the value of supplies or
19computer servicesbegin delete, as defined in paragraph (4) of subdivision (b),end delete
20 which are used does not exceed an accumulated total of two
21hundred fifty dollars ($250).

22(i) No activity exempted from prosecution under paragraph (2)
23of subdivision (h) which incidentally violates paragraph (2), (4),
24or (7) of subdivision (c) shall be prosecuted under those paragraphs.

25(j) For purposes of bringing a civil or a criminal action under
26this section, a person who causes, by any means, the access of a
27computer, computer system, or computer network in one
28jurisdiction from another jurisdiction is deemed to have personally
29accessed the computer, computer system, or computer network in
30each jurisdiction.

31(k) In determining the terms and conditions applicable to a
32person convicted of a violation of this section the court shall
33consider the following:

34(1) The court shall consider prohibitions on access to and use
35of computers.

36(2) Except as otherwise required by law, the court shall consider
37alternate sentencing, including community service, if the defendant
38shows remorse and recognition of the wrongdoing, and an
39inclination not to repeat the offense.

P13   1

SEC. 2.  

No reimbursement is required by this act pursuant to
2Section 6 of Article XIII B of the California Constitution because
3the only costs that may be incurred by a local agency or school
4district will be incurred because this act creates a new crime or
5infraction, eliminates a crime or infraction, or changes the penalty
6for a crime or infraction, within the meaning of Section 17556 of
7the Government Code, or changes the definition of a crime within
8the meaning of Section 6 of Article XIII B of the California
9Constitution.



O

    98