TITLE 16
CRIMES AND OFFENSES
ARTICLE 6
COMPUTER SYSTEMS PROTECTION
16-9-92. Definitions.
As used in this article, the term:
-
"Computer" means an electronic, magnetic, optical, hydraulic, electrochemical, or organic device or group of devices which, pursuant to a computer program, to human instruction, or to permanent instructions contained in the device or group of devices, can automatically perform computer operations with or on computer data and can communicate the results to another computer or to a person. The term includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve, or communicate computer programs, computer data, or the results of computer operations to or from a person, another computer, or another device. This term specifically includes, but is not limited to, mail servers and e-mail networks. This term does not include a device that is not used to communicate with or to manipulate any other computer.
-
"Computer network" means a set of related, remotely connected computers and any communications facilities with the function and purpose of transmitting data among them through the communications facilities.
-
"Computer operation" means computing, classifying, transmitting, receiving, retrieving, originating, switching, storing, displaying, manifesting, measuring, detecting, recording, reproducing, handling, or utilizing any form of data for business, scientific, control, or other purposes.
-
"Computer program" means one or more statements or instructions composed and structured in a form acceptable to a computer that, when executed by a computer in actual or modified form, cause the computer to perform one or more computer operations. The term "computer program" shall include all associated procedures and documentation, whether or not such procedures and documentation are in human readable form.
-
"Data" includes any representation of information, intelligence, or data in any fixed medium, including documentation, computer printouts, magnetic storage media, punched cards, storage in a computer, or transmission by a computer network.
-
"Electronic communication" means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic, or photo-optical system that affects interstate or foreign commerce, but does not include:
-
Any wire or oral communication;
-
Any communication made through a tone-only paging device;
-
Any communication from a tracking device; or
-
Electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds.
-
"Electronic communication service" means any service which provides to its users the ability to send or receive wire or electronic communications.
-
"Electronic communications system" means any wire, radio, electromagnetic, photoelectronic, photo-optical, or facilities for the transmission of wire or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications.
-
"Electronic means" is any device or apparatus which can be used to intercept a wire, oral, or electronic communication other than:
-
Any telephone or telegraph instrument, equipment, or facility, or any component thereof,
-
Furnished to the subscriber or user by a provider of electronic communication service in the ordinary course of its business and used by the subscriber or user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business; or
-
Used by a provider of electronic communication service in the ordinary course of its business or by an investigative or law enforcement officer in the ordinary course of his or her duties; or
-
A hearing aid or similar device being used to correct subnormal hearing to better than normal.
-
"Electronic storage" means:
-
Any temporary, intermediate storage of wire or electronic communication incidental to its electronic transmission; and
-
Any storage of such communication by an electronic communication service for purposes of backup protection of such communication.
-
"Financial instruments" includes any check, draft, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction-authorizing mechanism, or marketable security, or any computer representation thereof.
-
"Law enforcement unit" means any law enforcement officer charged with the duty of enforcing the criminal laws and ordinances of the state or of the counties or municipalities of the state who is employed by and compensated by the state or any county or municipality of the state or who is elected and compensated on a fee basis. The term shall include, but not be limited to, members of the Department of Public Safety, municipal police, county police, sheriffs, deputy sheriffs, and agents and investigators of the Georgia Bureau of Investigation.
-
"Property" includes computers, computer networks, computer programs, data, financial instruments, and services.
-
"Remote computing service" means the provision to the public of computer storage or processing services by means of an electronic communications system.
-
"Services" includes computer time or services or data processing services.
-
"Use" includes causing or attempting to cause:
-
A computer or computer network to perform or to stop performing computer operations;
-
The obstruction, interruption, malfunction, or denial of the use of a computer, computer network, computer program, or data; or
-
A person to put false information into a computer.
-
"Victim expenditure" means any expenditure reasonably and necessarily incurred by the owner to verify that a computer, computer network, computer program, or data was or was not altered, deleted, damaged, or destroyed by unauthorized use.
-
"Without authority" includes the use of a computer or computer network in a manner that exceeds any right or permission granted by the owner of the computer or computer network.
(Code 1981, §16-9-92, enacted by Ga. L. 1991, p. 1045, § 1; Ga. L. 1992, p. 6, § 16; Ga. L. 2005, p. 199, § 3/SB 62.)
Editor's notes.
- Ga. L. 2005 p. 199,
§
1/SB 62, not codified by the General Assembly, provides that: "This Act shall be known and may be cited as the 'Georgia Slam Spam E-mail Act.'"
Ga. L. 2005 p. 199,
§
2/SB 62, not codified by the General Assembly, provides that: "The General Assembly finds and declares that electronic mail has become an important and popular means of communication, relied on by millions of Georgians on a daily basis for personal and commercial purposes. The low cost and global reach of electronic mail make it convenient and efficient. Electronic mail serves as a catalyst for economic development and frictionless commerce. The General Assembly further finds that the convenience and efficiency of electronic mail is threatened by an ever-increasing glut of deceptive commercial electronic mail. The senders of these electronic messages engage in a variety of fraudulent and deceptive practices to hide their identities, to disguise the true source of their electronic mail, and to evade the criminal and civil consequences of their actions. Deceptive commercial electronic mail imposes costs upon its ultimate recipients who are forced to receive, review, and delete unwanted messages and upon the electronic mail service providers forced to carry the messages. The General Assembly further finds that our state has a paramount interest in protecting its businesses and citizens from the deleterious effects of deceptive commercial electronic mail, including the impermissible shifting of cost and economic burden that results from the false and fraudulent nature of deceptive commercial electronic mail. Georgia's enforcement of this interest imposes no additional burden upon the senders of such electronic mails in relation to the laws of any other state, in that such enforcement requires nothing more than the senders' forbearance from active deception."
Law reviews.
-
For article on 2005 amendment of this Code section, see 22 Ga. St. U.L. Rev. 39 (2005).
JUDICIAL DECISIONS
Without authority.
- Defendant was properly convicted of computer theft under O.C.G.A.
§
16-9-93 because the defendant copied homeowner association data from the computer of the defendant's employer without authority under O.C.G.A.
§
16-9-92(18), and the defendant had the intent of appropriating that information for the defendant's own use in the defendant's new business. DuCom v. State, 288 Ga. App. 555, 654 S.E.2d 670 (2007), cert. denied, No. S08C0598, 2008 Ga. LEXIS 383 (Ga. 2008).
Trial court did not err in denying a former employee's claims under the Georgia Computer Systems Protection Act, O.C.G.A.
§
16-9-93, because the actions of a former employer's president in perusing the employee's email on the computer that the employee used in conducting business for the employer were not taken without authority; the president had authority to inspect the employee's computer pursuant to the computer usage policy contained in the employee manual, which the employee had agreed to abide by when the employee started work with the employer, and the president acted in order to obtain evidence in connection with an investigation of improper employee behavior. Sitton v. Print Direction, Inc., 312 Ga. App. 365, 718 S.E.2d 532 (2011).
Damages for computer trespass.
- Because the collection agency received the applications to run the agency's business from the independent contractor and the independent contractor provided technical support and maintenance services to the collection agency, the collection agency received value in exchange for the money the agency paid to the independent contractor, and the agency's cost of compensating the independent contractor during that time period was not an element of damages that resulted from the independent contractor's computer trespass for which the agency could receive reimbursement. Ware v. Am. Recovery Solution Servs., 324 Ga. App. 187, 749 S.E.2d 775 (2013).
Independent contractor committed computer trespass because the independent contractor did not have authorization to use the login and password of the chief financial officer of the collection agency to access the server and to disable an administrative login or alter a program, and the independent contractor's actions first completely shut down the collection agency and then hampered the agency's ability to operate for a significant length of time. Ware v. Am. Recovery Solution Servs., 324 Ga. App. 187, 749 S.E.2d 775 (2013).
Cited in
Fugarino v. State, 243 Ga. App. 268, 531 S.E.2d 187 (2000).