(http://statutes.unicam.state.ne.us/)
Sections 28-1341 to 28-1348 shall be known and may be cited as the Computer Crimes Act.
Laws 1991, LB 135, § 2.
The Legislature finds and declares that our society is increasingly dependent on computers, that important personal, financial, medical, and historical data is stored in computers, and that valuable data stored can be lost due to criminal action.
The Legislature further finds that specific criminal statutes are necessary to cover the actions of persons who intentionally destroy data or commit fraud using computers.
Laws 1991, LB 135, § 3.
For purposes of the Computer Crimes Act:
computer time, data processing, and storage functions.
Laws 1985, LB 371, § 2; Laws 1991, LB 135, § 4.
Laws 1991, LB 135, § 5.
28-1344 Unlawful acts; depriving or obtaining property or services; penalties.
Any person who intentionally accesses or causes to be accessed, directly or indirectly, any computer, computer system, computer software, or computer network without authorization or who, having accessed any computer, computer
system, computer software, or computer network with authorization, knowingly and intentionally exceeds the limits of such authorization shall be guilty of a Class IV felony if he or she intentionally: (1) Deprives another of property or services; or (2) obtains property or services of another, except that any person who obtains property or services or deprives another of property or services with a value of one thousand dollars or more by such conduct shall be guilty of a Class III felony.
Laws 1985, LB 371, § 3; Laws 1991, LB 135, § 6.
Any person who accesses or causes to be accessed any computer, computer system, computer
software, | or | ||
---|---|---|---|
computer | network | without | authorization or who, having |
accessed |
any computer, computer system, computer software, or computer network with authorization, knowingly and intentionally exceeds the limits of such authorization shall be guilty of a Class IV felony if he or she intentionally: (1) Alters, damages, deletes, or destroys any computer, computer system, computer software, computer network, computer program, data, or other property; (2) disrupts the operation of any computer, computer system, computer software, or computer network; or (3) distributes a destructive computer program with intent to damage or destroy any computer,
computer system, computer network, or computer software, except that any person who causes loss with a value of one thousand dollars or more by such conduct shall be guilty of a Class III felony.
Laws 1985, LB 371, § 4; Laws 1991, LB 135, § 7.
28-1346 Unlawful acts; obtaining confidential public information; penalties.
Any person who intentionally accesses or causes to be accessed any computer, computer system, computer software, or computer network without authorization, or who, having accessed a computer, computer system, computer software, or computer network with authorization, knowingly and intentionally exceeds the limits of such authorization, and thereby obtains information filed by the public with the state or any political subdivision which is by statute required to be kept confidential shall be guilty of a Class II misdemeanor. For any second or subsequent offense under this section, such person shall be guilty of a Class I misdemeanor.
Laws 1985, LB 371, § 5; Laws 1991, LB 135, § 8.
28-1347 Unlawful acts; access without authorization; exceeding authorization; penalties.
Any person who intentionally accesses any computer, computer system, computer software, computer network, computer program, or data without authorization and with knowledge that such access was not authorized or who, having accessed any computer, computer system, computer software, computer network, computer program, or data with authorization, knowingly and intentionally exceeds the limits of such authorization shall be guilty of a Class V misdemeanor. For any second or subsequent offense under this section, such person shall be guilty of a Class II misdemeanor.
Laws 1985, LB 371, § 6; Laws 1991, LB 135, § 9.
The Computer Crimes Act shall not be construed to preclude the applicability of any other provision of the Nebraska Criminal Code which may apply to any transaction described in the Computer Crimes Act.
Source:
Laws 1985, LB 371, § 7; Laws 1991, LB 135, § 10.