HomeAboutContact | ...loading...
iconWebsite
TBD Marketplace™

Buy™ | Sell™ | Shop™

Earn 1,000 Book Points for every sample document (and/or template) that you sell!

Help Others

Buy™ | Sell™ | Shop™

TBD Marketplace™
iconWebsite
Buy™Sell™Shop™
iconWebsite
TBD Marketplace™

Buy™ | Sell™ | Shop™

Sell™
iconWebsite
TBD Marketplace™

Buy™ | Sell™ | Shop™

Earn 1,000 Book Points for every sample document (and/or template) that you sell! Help thousands of other litigants who [will] find themselves in your shoes!
Sell™ Now
iconWebsite
TBD Marketplace™

Buy™ | Sell™ | Shop™

Buy™

buy real-live sample court documents/templates

– for free! (ie, with Book Points™)

Sell™

sell your court documents/templates

(earn 1,000 Book Points™ per file)

Shop™ Now

enter the TBD Marketplace™

to help your fellow man/woman

get the justice that he/she deserves!

Chapter 815 Florida Statutes
Computer-Related Crimes

Pertinent Parts Only!!!
Not The Entire Chapter!

§815.06 FS | OFFENSES AGAINST USERS OF COMPUTERS, COMPUTER SYSTEMS, COMPUTER NETWORKS, AND ELECTRONIC DEVICES

(1) As used in this section, the term “user” means a person with the authority to operate or maintain a computer, computer system, computer network, or electronic device.

(2) A person commits an offense against users of computers, computer systems, computer networks, or electronic devices if he or she willfully, knowingly, and without authorization or exceeding authorization:
(a) Accesses or causes to be accessed any computer, computer system, computer network, or electronic device with knowledge that such access is unauthorized or the manner of use exceeds authorization;

(b) Disrupts or denies or causes the denial of the ability to transmit data to or from an authorized user of a computer, computer system, computer network, or electronic device, which, in whole or in part, is owned by, under contract to, or operated for, on behalf of, or in conjunction with another;

(c) Destroys, takes, injures, or damages equipment or supplies used or intended to be used in a computer, computer system, computer network, or electronic device;

(d) Destroys, injures, or damages any computer, computer system, computer network, or electronic device;

(e) Introduces any computer contaminant into any computer, computer system, computer network, or electronic device; or

(f) Engages in audio or video surveillance of an individual by accessing any inherent feature or component of a computer, computer system, computer network, or electronic device, including accessing the data or information of a computer, computer system, computer network, or electronic device that is stored by a third party.
(3)
(a) Except as provided in paragraphs (b) and (c), a person who violates subsection (2) commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.

(b) A person commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084, if he or she violates subsection (2) and:
1. Damages a computer, computer equipment or supplies, a computer system, or a computer network and the damage or loss is at least $5,000;

2. Commits the offense for the purpose of devising or executing any scheme or artifice to defraud or obtain property;

3. Interrupts or impairs a governmental operation or public communication, transportation, or supply of water, gas, or other public service; or

4. Intentionally interrupts the transmittal of data to or from, or gains unauthorized access to, a computer, computer system, computer network, or electronic device belonging to any mode of public or private transit, as defined in s. 341.031.
(c) A person who violates subsection (2) commits a felony of the first degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084, if the violation:
1. Endangers human life; or

2. Disrupts a computer, computer system, computer network, or electronic device that affects medical equipment used in the direct administration of medical care or treatment to a person.
(4) A person who willfully, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer, computer system, computer network, or electronic device commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.

(5)
(a) In addition to any other civil remedy available, the owner or lessee of the computer, computer system, computer network, computer program, computer equipment or supplies, electronic device, or computer data may bring a civil action against a person convicted under this section for compensatory damages.

(b) In an action brought under this subsection, the court may award reasonable attorney fees to the prevailing party.
(6) A computer, computer system, computer network, computer software, computer data, or electronic device owned by a defendant that is used during the commission of a violation of this section or a computer or electronic device owned by the defendant that is used as a repository for the storage of software or data obtained in violation of this section is subject to forfeiture as provided under ss. 932.701-932.704.

(7) This section does not apply to a person who:
(a) Acts pursuant to a search warrant or to an exception to a search warrant authorized by law;

(b) Acts within the scope of his or her lawful employment; or

(c) Performs authorized security operations of a government or business.
(8) For purposes of bringing a civil or criminal action under this section, a person who causes, by any means, the access to a computer, computer system, computer network, or electronic device in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system, computer network, or electronic device in both jurisdictions.

(9) This chapter does not impose liability on a provider of an interactive computer service as defined in 47 U.S.C. s. 230(f), information service as defined in 47 U.S.C. s. 153, or communications service as defined in s. 202.11 that provides the transmission, storage, or caching of electronic communications or messages of others; other related telecommunications or commercial mobile radio service; or content provided by another person.
Congratulations! You're now booked up on the pertinent parts of Chapter 815 Florida Statutes!

Please get the justice you deserve.

Sincerely,



www.TextBookDiscrimination.com
logoAdobe Download
iconXML Citations
YouTubeVideo A Judge's Perjury
logoCases A Judge's Perjury
logoHandbook Handbook: Complaint
iconWebsite How-To: Cover Sheet (FL)
logoHTML How-To: Default (Clerk)
logoHTML How-To: eFiling
iconWebsite How-To: File Suit (State)
iconWebsite How-To: Summons
logoHTML How-To: Settlement
logoInfo Info: Motion vs Pleading
logoRules Rules of Court
logoSamples Sample Court Documents
logoSurvey Survey
logoTable Tables: Courthouses (US)
logoTemplates Templates
Pages That You
Might Also Like
All-in-One
Pertinent Federal Laws (US)
Civil Rights Attorneys - FL
Constitutions
Fla. R. App. P. Fla. R. Civ. P. Fla. R. Crim. P. Fla. R. Gen. Prac. & Jud. Admin.
Local Rules of Court
Administrative Orders
Reports: Regulation
add a comment
IconQuiz IconLike
iconFullScreenBgnIticonFullScreenEndIt
Icon-Email-WBIcon-Email-WG Icon-Youtube-WBIcon-Youtube-WG Icon-Share-WBIcon-Share-WG