§ 39-14-602. Violations — Penalties
Whoever knowingly, directly or indirectly, accesses, causes to be accessed, or attempts to access any telephone system, telecommunications facility, computer software, computer program, data, computer, computer system, computer network, or any part thereof, for the purpose of: Obtaining money, property, or services for oneself or another by means of false or fraudulent pretenses, representations, or […]
§ 39-14-603. Unsolicited Bulk Electronic Mail
It is an offense for a person without authority to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers. Transmission of electronic mail from an […]
§ 39-14-604. Civil Action — Damages, Attorney Fees, and Costs
Any person whose property or person is injured by reason of a violation of any provision of this part may file a civil action and recover for any damages sustained and the costs of the civil action. Without limiting the generality of the term, “damages” shall include loss of profits. If the injury arises from […]
§ 39-14-605. Venue
For the purposes of venue under this part, any violation of this part shall be considered to have been committed: In any county in which any act was performed in furtherance of any transaction violating this part; In any county in which any violator had control or possession of any proceeds of the violation or […]
§ 39-14-606. Transmission of Electronic Signals by a Local Exchange Company
The transmission of electronic signals by a local exchange company to the extent that the local exchange company merely carries that transmission over its network shall not be deemed to be the transmission of unsolicited bulk electronic mail as prohibited by this part.
§ 39-14-601. Part Definitions
As used in this part, unless the context otherwise requires: “Access” means to approach, instruct, communicate, or connect with, store data in, retrieve or intercept data from, or otherwise make use of any resources of a computer, computer system, or computer network, or information exchanged from any communication between computers or authorized computer users and […]