US Lawyer Database

§434. Prosecution of invasion of computer privacy

1.  The crime of criminal invasion of computer privacy as defined in section 432 may be prosecuted and punished in:  

A. The county in which the defendant was located when the defendant accessed the computer resource; or   [PL 2011, c. 133, §1 (NEW).]

B. A county in which the computer resource was located.   [PL 2011, c. 133, §1 (NEW).] [PL 2011, c. 133, §1 (NEW).]

2.  The crime of aggravated criminal invasion of computer privacy as defined in section 433 may be prosecuted and punished in:  

A. The county in which the defendant was located when the defendant copied the computer program, computer software or computer information;   [PL 2011, c. 133, §1 (NEW).]

B. The county in which the defendant was located when the defendant damaged the computer resource;   [PL 2011, c. 133, §1 (NEW).]

C. The county in which the defendant was located when the defendant introduced or allowed the introduction of a computer virus into the computer resource; or   [PL 2011, c. 133, §1 (NEW).]

D. A county in which the computer resource was located.   [PL 2011, c. 133, §1 (NEW).] [PL 2011, c. 133, §1 (NEW).]

SECTION HISTORY

PL 2011, c. 133, §1 (NEW).