Syfert Injury Law Firm

Your Trusted Partner in Personal Injury & Workers' Compensation

Call Now: 904-383-7448

2018 Georgia Code 16-9-93 | Car Wreck Lawyer

TITLE 16 CRIMES AND OFFENSES

Section 9. Forgery and Fraudulent Practices, 16-9-1 through 16-9-157.

ARTICLE 6 COMPUTER SYSTEMS PROTECTION

16-9-93. Computer crimes defined; exclusivity of article; civil remedies; criminal penalties.

  1. Computer theft. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
    1. Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession;
    2. Obtaining property by any deceitful means or artful practice; or
    3. Converting property to such person's use in violation of an agreement or other known legal obligation to make a specified application or disposition of such property

      shall be guilty of the crime of computer theft.

  2. Computer Trespass. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
    1. Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
    2. Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or
    3. Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists

      shall be guilty of the crime of computer trespass.

  3. Computer Invasion of Privacy. Any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy.
  4. Computer Forgery. Any person who creates, alters, or deletes any data contained in any computer or computer network, who, if such person had created, altered, or deleted a tangible document or instrument would have committed forgery under Article 1 of this chapter, shall be guilty of the crime of computer forgery.The absence of a tangible writing directly created or altered by the offender shall not be a defense to the crime of computer forgery if a creation, alteration, or deletion of data was involved in lieu of a tangible document or instrument.
  5. Computer Password Disclosure. Any person who discloses a number, code, password, or other means of access to a computer or computer network knowing that such disclosure is without authority and which results in damages (including the fair market value of any services used and victim expenditure) to the owner of the computer or computer network in excess of $500.00 shall be guilty of the crime of computer password disclosure.
  6. Article not Exclusive. The provisions of this article shall not be construed to preclude the applicability of any other law which presently applies or may in the future apply to any transaction or course of conduct which violates this article.
  7. Civil Relief; Damages.
    1. Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor and recover for any damages sustained and the costs of suit. Without limiting the generality of the term, "damages" shall include loss of profits and victim expenditure.
    2. At the request of any party to an action brought pursuant to this Code section, the court shall by reasonable means conduct all legal proceedings in such a way as to protect the secrecy and security of any computer, computer network, data, or computer program involved in order to prevent possible recurrence of the same or a similar act by another person and to protect any trade secrets of any party.
    3. The provisions of this article shall not be construed to limit any person's right to pursue any additional civil remedy otherwise allowed by law.
    4. A civil action under this Code section must be brought within four years after the violation is discovered or by exercise of reasonable diligence should have been discovered.For purposes of this article, a continuing violation of any one subsection of this Code section by any person constitutes a single violation by such person.
  8. Criminal Penalties.
    1. Any person convicted of the crime of computer theft, computer trespass, computer invasion of privacy, or computer forgery shall be fined not more than $50,000.00 or imprisoned not more than 15 years, or both.
    2. Any person convicted of computer password disclosure shall be fined not more than $5,000.00 or incarcerated for a period not to exceed one year, or both.

(Code 1981, §16-9-93, enacted by Ga. L. 1991, p. 1045, § 1.)

Law reviews.

- For article, "Legal Remedies for Computer Abuse," see 21 Ga. St. B.J. 100 (1985). For annual survey of law on labor and employment law, see 62 Mercer L. Rev. 181 (2010). For annual survey on torts, see 64 Mercer L. Rev. 287 (2012).

JUDICIAL DECISIONS

Evidence sufficient to convict.

- Where an employee had the knowledge of the computer system and the access code for the payroll system that gave the employee the opportunity for committing the crime, and the checks were not received by the payees and reflected on their faces that they were cashed, the jury's conclusion that defendant had accessed the system was supportable as a matter of law. Gordon v. State, 206 Ga. App. 450, 425 S.E.2d 906 (1992).

Testimony showing that defendant used a computer owned by the company with the intention of deleting or removing data from that computer was sufficient evidence to allow a reasonable trier of fact to find that a computer trespass had occurred. Fugarino v. State, 243 Ga. App. 268, 531 S.E.2d 187 (2000).

Defendant was properly convicted of computer theft under O.C.G.A. § 16-9-93 because the defendant copied homeowner association data from the computer of the defendant's employer without authority under O.C.G.A. § 16-9-92(18), and the defendant had the intent of appropriating that information for the defendant's own use in the defendant's new business. DuCom v. State, 288 Ga. App. 555, 654 S.E.2d 670 (2007), cert. denied, No. S08C0598, 2008 Ga. LEXIS 383 (Ga. 2008).

Claim did not state a violation.

- Customer was granted a summary judgment as to a copyright owner's claims of violations of the Georgia Computer Systems Protection Act, O.C.G.A. § 16-9-90 et seq., because the Act was not broad enough to cover the actions alleged in that there was no allegation that an appropriation of the owner's intellectual property was achieved by unauthorized use of a computer under O.C.G.A. § 16-9-93(a) and the owner did not allege that the customer used the owner's name on the Internet for the purpose of falsely identifying itself to make O.C.G.A. § 16-9-93.1 applicable. SCQuARE Int'l, Ltd. v. BBDO Atlanta, Inc., 455 F. Supp. 2d 1347 (N.D. Ga. 2006).

Because the former employer did not allege that the former employees changed the location of the files or otherwise disposed of the files, and the plain language of O.C.G.A. § 16-9-93(b) contemplated a temporary or permanent elimination of files or a temporary or permanent change of the file locations, the employer did not assert a claim for computer trespass under O.C.G.A. § 16-9-93(b). Vurv Tech. LLC v. Kenexa Corp., F. Supp. 2d (N.D. Ga. July 20, 2009).

Trial court did not err in denying a former employee's claims under the Georgia Computer Systems Protection Act, O.C.G.A. § 16-9-93, because the actions of a former employer's president in perusing the employee's email on the computer that the employee used in conducting business for the employer were not taken without authority; the president had authority to inspect the employee's computer pursuant to the computer usage policy contained in the employee manual, which the employee had agreed to abide by when the employee started work with the employer, and the president acted in order to obtain evidence in connection with an investigation of improper employee behavior. Sitton v. Print Direction, Inc., 312 Ga. App. 365, 718 S.E.2d 532 (2011).

Former employee was not guilty of computer theft when the employee accessed clients' tax returns through a client portal, not though the network, using passwords obtained from the clients. Drawdy CPA Servs., P.C. v. N. GA CPA Servs., P.C., 320 Ga. App. 759, 740 S.E.2d 712 (2013).

Opinion testimony related to computer trespass claims was speculative, irrelevant, and unhelpful because the expert's statements indicated only that damage was possible, rather than probable; moreover, claims of computer trespass and computer invasion of privacy failed because the alleged conduct occurred outside Georgia. Krise v. Sei/Aaron's, Inc., F. Supp. 2d (N.D. Ga. Aug. 18, 2017).

Damages for computer trespass.

- Because the collection agency received the applications to run the agency's business from the independent contractor and the independent contractor provided technical support and maintenance services to the collection agency, the collection agency received value in exchange for the money the agency paid to the independent contractor, and the agency's cost of compensating the independent contractor during that time period was not an element of damages that resulted from the independent contractor's computer trespass for which the agency could receive reimbursement. Ware v. Am. Recovery Solution Servs., 324 Ga. App. 187, 749 S.E.2d 775 (2013).

Punitive damages not authorized.

- Georgia Computer Systems Protection Act, O.C.G.A. § 16-9-90 et seq., did not authorize an award of punitive damages as the statement in O.C.G.A. § 16-9-93(g)(1) indicating that a plaintiff may recover "any damages sustained," without more, would not appear to indicate a legislative intent to allow for punitive damages to be recoverable under the statute given that punitive damages are not sustained by a plaintiff but intended to punish, penalize, or deter a defendant. Lyman v. Cellchem International, Inc., 300 Ga. 475, 796 S.E.2d 255 (2017).

Computer trespass.

- Independent contractor committed computer trespass because the independent contractor did not have authorization to use the login and password of the chief financial officer of the collection agency to access the server and to disable an administrative login or alter a program, and the independent contractor's actions first completely shut down the collection agency and then hampered the agency's ability to operate for a significant length of time. Ware v. Am. Recovery Solution Servs., 324 Ga. App. 187, 749 S.E.2d 775 (2013).

Computer invasion of privacy.

- Defendant's motion for new trial was improperly denied as to the computer invasion of privacy charge because counsel was ineffective for failing to object to the first victim's hearsay testimony as the victim's statement about what the victim learned from an online backup system was introduced to prove that the defendant used the victim's computer to access the victim's financial information and constituted hearsay; counsel provided no reason for not objecting to that testimony; the defendant was prejudiced by counsel's deficiency as that testimony was the only evidence offered to prove the charge; and, but for counsel's deficient performance, a more than reasonable probability existed that the trial's outcome would have been different. Entwisle v. State, 340 Ga. App. 122, 796 S.E.2d 743 (2017).

Insufficient evidence in defamation case from social media.

- Judgment notwithstanding the verdict and directed verdicts in a defamation case were affirmed because the plaintiff was properly found to be a public figure in the spheres of running and Christian evangelism and there was no evidence of actual malice as to the social media postings, which alleged that the plaintiff was having multiple affairs with married women and had not completed all of the long distance runs, were true; there was no evidence of violations of O.C.G.A. § 16-9-93 or O.C.G.A. § 16-9-93.1. Bickerstaff v. SunTrust Bank, 299 Ga. 459, 788 S.E.2d 787 (2016), cert. denied, 137 S. Ct. 571, 196 L. Ed. 2d 447 (U.S. 2016).

Cited in Stargate Software Int'l, Inc. v. Rumph, 224 Ga. App. 873, 482 S.E.2d 498 (1997).

OPINIONS OF THE ATTORNEY GENERAL

For an update of crimes and offenses for which the Georgia Crime Information Center is authorized to collect and file identifying data, see 1991 Op. Att'y Gen. No. 91-35.

RESEARCH REFERENCES

Am. Jur. 2d.

- 37 Am. Jur. 2d, Fraud and Deceit, § 1.

C.J.S.

- 37 C.J.S., Fraud, §§ 1, 2.

ALR.

- Computer fraud, 70 A.L.R.5th 647.

Invasion of privacy by using or obtaining e-mail or computer files, 68 A.L.R.6th 331.

Validity, construction, and application of state computer crime and fraud laws, 87 A.L.R.6th 1.

Cases Citing O.C.G.A. § 16-9-93

Total Results: 6  |  Sort by: Relevance  |  Newest First

Copy

Cottrell v. Smith, 299 Ga. 517 (Ga. 2016).

Cited 53 times | Published | Supreme Court of Georgia | Jul 8, 2016 | 788 S.E.2d 772

...the “any evidence” test and construes the evidence in the light most favorable to the losing party. Hood v. Smoak, 271 Ga. 86, 86-87 (516 SE2d 301) (1999). A.) GCSPA Claims. Cottrell alleged that Defendants’ conduct constituted a violation or violations of Section 16-9-93.12 of the GCSPA, thereby giving 2 OCGA§ 16-9-93.1 provides: (a) It shall be unlawful for any person, any organization, or any representative of any organization knowingly to transmit any data through a computer network or over the transmission facilities or through th...
...onstrued to limit an aggrieved party's right to pursue a civil action for equitable or monetary relief, or both, for actions which violate this Code section. 4 him a cause of action under Section 16-9-93 (g) (1).3 3 OCGA § 16-9-93 provides: (a) Computer theft....
...of a violation of any 5 Cottrell contends that the superior court erred in directing a verdict in favor of Defendants on such claims because there was evidence that Defendants’ conduct violated § 16-9-93.1 and § 16-9-93, and because the court mistakenly relied upon ACLU v. Miller, 977 F.Supp. 1228 (N.D. Ga.,1997) to find that OCGA § 16-9-93.1 is unconstitutional. In ACLU v. Miller, the plaintiff internet users brought an action for declaratory and injunctive relief challenging the constitutionality of OCGA § 16-9-93.1, and the District Court granted plaintiffs’ motion for a preliminary injunction after concluding, inter alia, that the statute is unconstitutionally provision of this article may sue therefor and recover for any damages sustained and the costs of suit....
...its favorable view of the analysis and holding in ACLU v. Miller.4 However, the superior court need not have considered any such constitutional challenge because a directed verdict was mandated in light of the statutory requirements of both OCGA § 16-9-93 and OCGA § 16-9-93.1....
...for appeal,5 the direction of a verdict on the GSPCA claims was demanded based upon the evidence, or rather the lack thereof, in regard to the alleged statutory violations. Cottrell variously argues that there was evidence of computer theft (OCGA §16-9-93 (a)), computer trespass (OCGA §16-9-93 (b)), computer invasion of privacy (OCGA §16-9-93 (c)) and computer forgery (OCGA § 16-9-93 (d)), and recites a litany of online actions by Defendants in support thereof; however, none of the cited conduct demonstrates, inter alia, the express specific criminal intent required in subsections (a), (b), ( c ), and (d).6 There wa...
...sent: (1) The conduct must be intentional or reckless; (2) The conduct 5 While the superior court initially declined to let counsel for Cottrell give argument regarding its apparent ruling about the constitutionality of OCGA§ 16-9-93.1, it later permitted counsel to argue about Cottrell’s claims in regard to that statute as well as OCGA§ 16-9-93; however, counsel principally argued the evidence in light of the provisions of OCGA§ 16-9-93, and in fact, expressly stated that he was not asking the superior court to “revisit” the constitutional ruling. 6 The intent in subsection (d) is stated in terms of a person’s creation, alteration, or deletion of dat...
Copy

Lyman v. Cellchem Int'l, Inc., 300 Ga. 475 (Ga. 2017).

Cited 22 times | Published | Supreme Court of Georgia | Jan 23, 2017 | 796 S.E.2d 255

...After Dale Lyman and his wife, Helen, left Cellchem International, Inc. (“Cellchem”) to work for a competitor, Cellchem sued the Lymans and two companies with which they had affiliated (collectively the “Lymans”), asserting claims for computer theft (see OCGA § 16-9-93 (a)) and computer trespass (see OCGA § 16-9-93 (b)) under the Georgia Computer Systems Protection Act (“GCSPA”) (see OCGA § 16-9-90 et seq.), breach of fiduciary duty, and tortious interference with business relations....
...ans had been found liable at trial. Id. at 276-277 (4). This Court granted the Lymans’ petition for a writ of certiorari to determine whether the Court of Appeals erred in holding that the GCSPA can authorize an award of punitive damages. See OCGA § 16-9-93 (g)....
...court clarify that any remand to the trial court for a new trial on the issue of punitive damages cannot involve any purported award for such damages based on alleged violations of the GCSPA. Our analysis turns on the proper interpretation of OCGA § 16-9-93 (g) (1), which authorizes a civil remedy for violations of the GCSPA, and states: Any person whose property or person is injured by reason of a violation of any provision of [the GCSPA] may sue therefor and recover for any damages sustained and the costs of suit....
...In this regard, “in construing language in any one part of a statute, a court should consider the entire scheme of the statute and attempt to gather the legislative intent from the statute as a whole.” Sikes v. State, 268 Ga. 19, 21 (2) (485 SE2d 206) (1997). Bearing these principles in mind, while OCGA § 16-9-93 (g) (1) states that a plaintiff may recover “any damages sustained” for injuries resulting from violations of the statute, the statute goes on to list “loss of profits and victim expenditure” as examples of the types of sustained damages that are recoverable....
...Thus, the question here becomes whether the legislature intended for punitive damages to be recoverable in addition to the types of compensatory damages specifically listed in the statute despite failing to specifically state that punitive damages are recoverable under OCGA § 16-9-93 (g) (1). For reasons described more fully below, we conclude that the legislature did not intend for “punitive damages” to be among the types of damages that may be recovered under OCGA § 16-9-93 (g) (1). As an initial matter, it is axiomatic that punitive damages are not the same as compensatory damages, as punitive damages are awarded “not as compensation to a plaintiff but solely to punish, penalize, or deter a defendant.” OCGA § 51-12-5.1 (c). Indeed, in this sense, punitive damages generally are not “sustained” by a plaintiff, but are imposed upon a defendant based on that defendant’s wrongful conduct. Thus, the statement in OCGA § 16-9-93 (g) (1) indicating that a plaintiff may recover “any damages sustained,” without more, would not appear to indicate a legislative intent to allow for punitive damages to be recoverable under the statute....
...lt of criminal gang activities “shall have a cause of action for three times the actual damages sustained and, where appropriate, punitive damages.”). Again, here, there is no express language authorizing the recovery of punitive damages in OCGA § 16-9-93 (g) (1), and, if the legislature had intended for such damages to be recoverable under the statute, it could have expressly stated so....
...832, 833 (452 SE2d 103) (1995) (“[I]f some things (of many) are expressly mentioned [in a statute], the inference is stronger that those omitted are intended to be excluded than if none at all had been mentioned”) (citations and punctuation omitted). Furthermore, looking to the entire legislative scheme of OCGA § 16-9-93, as we must (see Sikes, supra), we find further support for the conclusion that the legislature did not intend for OCGA § 16-9-93 (g) (1) to authorize an award of punitive damages. Specifically, OCGA § 16-9-93 (h) (1) allows a criminal sanction of “not more than $50,000.00” if certain violations of the GCSPA are proven beyond a reasonable doubt....
...(“Any person convicted of the crime of computer theft, computer trespass, computer invasion of privacy, or computer forgery shall be fined not more than $50,000.00 or imprisoned not more than 15 years, or both”) (emphasis supplied). See also OCGA § 16-9-93 (h) (2) (allowing for $5,000 fine and one year of incarceration for criminal computer password disclosure)....
...nt to leave penal sanctions to the government and a desire to cap private penalties, as opposed to an allowance for punitive damages which could far exceed the statutory cap of $50,000. To authorize a civil award of punitive damages pursuant to OCGA § 16-9-93 (g) (1) under a clear and convincing evidence standard (see OCGA § 51-12-5.1 (b)), and which could go well beyond the $50,000 penalty cap of OCGA § 16-9-93 (h) (1) for violations of the GCSPA proven beyond a reasonable doubt, would be incongruent. See Slakman, supra, 277 Ga. at 191; Johnson v. State, 267 Ga. 77, 78 (475 SE2d 595) (1996). We therefore conclude the Court of Appeals erred in its determination that an award of punitive damages is authorized under OCGA § 16-9-93 (g) (1), and we remand this case with the direction *479that the Court of Appeals enter a new opinion that is consistent with our holding here....
Copy

State v. Mayze, 622 S.E.2d 836 (Ga. 2005).

Cited 21 times | Published | Supreme Court of Georgia | Nov 21, 2005 | 280 Ga. 5, 2005 Fulton County D. Rep. 3521

...Muench, 153 F.3d 1298 (11th Cir.1998) (violation of federal Child Support Recovery Act by failure to pay child support may be tried in county and state where child resides, as that is the place where the act is completed). [4] Under this provision, venue for a computer crime under OCGA § 16-9-93 lies in "any county from which, to which, or through which any use of a computer or computer network was made, whether by wires, electromagnetic waves, microwaves, or any other means of communication." [5] In its compiled quotation from tw...
Copy

Williams Gen. Corp. v. Stone, 632 S.E.2d 376 (Ga. 2006).

Cited 12 times | Published | Supreme Court of Georgia | Jun 12, 2006 | 280 Ga. 631, 2006 Fulton County D. Rep. 1837

...NOTES [1] See, e.g., OCGA § 7-3-29 (providing a private cause of action for violations of the Georgia Industrial Loan Act), OCGA § 16-8-86 (providing a private cause of action for violations of the Georgia Motor Vehicle Chop Shops and Stolen and Altered Property Act), OCGA § 16-9-93(g) (providing a private cause of action for violations of the Georgia Computer Systems Protection Act), and OCGA § 10-5B-6 (b) (providing a private cause of action for violations of the Georgia Telemarketing Act).
Copy

Kinslow v. State, 860 S.E.2d 444 (Ga. 2021).

Cited 9 times | Published | Supreme Court of Georgia | Jun 21, 2021 | 311 Ga. 768

Copy

Edible Ip, LLC v. Google, LLC, 869 S.E.2d 481 (Ga. 2022).

Cited 2 times | Published | Supreme Court of Georgia | Feb 15, 2022 | 313 Ga. 305

...PruittHealth, Inc., 300 Ga. 140, 144-46 (2) (794 SE2d 150) (2016). Edible IP does not allege that Google has diluted the Edible Arrangements trade name by using it in Google’s keyword advertising program. 7 We note that the General Assembly enacted OCGA § 16-9-93.1 in 1996, which, in pertinent part, makes it a crime for any person ....
...trade name, registered trademark, logo, legal or official seal, or copyrighted symbol . . . which would falsely state or imply that such person . . . has permission or is legally authorized to use [it] for such purpose when such permission or authorization has not been obtained. . . . OCGA § 16-9-93.1 (a)....
...ted activity within its proscription; and is void for vagueness). Relying on Miller, Google argues that Edible IP’s proposed construction of OCGA §§ 51-10-6 and 16-8-2 would render the civil theft statute unconstitutional in the same way as OCGA § 16-9-93.1 and that, under the canon of constitutional doubt, the civil theft 13 Here, Edible IP has not alleged that Google’s use of the “Edible Arrangements” trade name in its keyword advertisi...