OR Electronic Crime Statutes

(http://www.leg.state.or.us/ors/)

164.125 Theft of services. (1) A person commits the crime of theft of services if:

(a)
With intent to avoid payment therefor, the person obtains services that are available only for compensation, by force, threat, deception or other means to avoid payment for the services; or
(b)
Having control over the disposition of labor or of business, commercial or industrial equipment or facilities of another, the person uses or diverts to the use of the person or a third person such labor, equipment or facilities with intent to derive for the person or the third person a commercial benefit to which the person or the third person is not entitled.
(2)
As used in this section, “services” includes, but is not limited to, labor, professional services, toll facilities, transportation, communications service, entertainment, the supplying of food, lodging or other accommodations in hotels, restaurants or elsewhere, the supplying of equipment for use, and the supplying of commodities of a public utility nature such as gas, electricity, steam and water. “Communication service” includes, but is not limited to, use of telephone, computer and cable television systems.
(3)
Absconding without payment or offer to pay for hotel, restaurant or other services for which compensation is customarily paid immediately upon the receiving of them is prima facie evidence that the services were obtained with intent to avoid payment therefor. Obtaining the use of any communication system the use of which is available only for compensation, including but not limited to telephone, computer and cable television systems, or obtaining the use of any services of a public utility nature, without payment or offer to pay for such use is prima facie evidence that the obtaining of the use of such system or the use of such services was gained with intent to avoid payment therefor.
(4)
The value of single theft transactions may be added together if the thefts were committed:
(a) Against multiple victims by a similar means within a 30-day period; or
(b)
Against the same victim, or two or more persons who are joint owners, within a 180-day period.
(5) Theft of services is:
(a)
A Class C misdemeanor if the aggregate total value of services that are the subject of the theft is under $50;
(b)
A Class A misdemeanor if the aggregate total value of services that are the subject of the theft is $50 or more but is under $750;
(c)
A Class C felony if the aggregate total value of services that are the subject of the theft is $750 or more; and
(d)
A Class B felony if the aggregate total value of services that are the subject of the theft is $10,000 or more. [1971 c.743 §133; 1973 c.133 §1; 1985 c.537 §1; 1987 c.907 §8; 1993 c.680 §21]

164.305 Definitions for ORS 164.305 to 164.377. As used in ORS 164.305 to 164.377, except as the context requires otherwise:

(1) “Protected property” means any structure, place or thing customarily occupied by people, including “public buildings” as defined by ORS 479.010 and “forestland,” as

Distributed in Forward Edge II

defined by ORS 477.001.

(2) “Property of another” means property in which anyone other than the actor has a legal or equitable interest that the actor has no right to defeat or impair, even though the actor may also have such an interest in the property. [1971 c.743 §141; 1977 c.640 §1; 1989 c.584 §1; 2003 c.543 §1]

164.377 Computer crime. (1) As used in this section:

(a)
To “access” means to instruct, communicate with, store data in, retrieve data from or otherwise make use of any resources of a computer, computer system or computer network.
(b)
“Computer” means, but is not limited to, an electronic, magnetic, optical electrochemical or other high-speed data processing device that performs logical, arithmetic or memory functions by the manipulations of electronic, magnetic or optical signals or impulses, and includes the components of a computer and all input, output, processing, storage, software or communication facilities that are connected or related to such a device in a system or network.
(c)
“Computer network” means, but is not limited to, the interconnection of communication lines, including microwave or other means of electronic communication, with a computer through remote terminals or a complex consisting of two or more interconnected computers.
(d)
“Computer program” means, but is not limited to, a series of instructions or statements, in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from or usage of such computer system.
(e)
“Computer software” means, but is not limited to, computer programs, procedures and associated documentation concerned with the operation of a computer system.
(f)
“Computer system” means, but is not limited to, a set of related, connected or unconnected, computer equipment, devices and software. “Computer system” also includes any computer, device or software owned or operated by the Oregon State Lottery or rented, owned or operated by another person or entity under contract to or at the direction of the Oregon State Lottery.
(g)
“Data” means a representation of information, knowledge, facts, concepts, computer software, computer programs or instructions. “Data” may be in any form, in storage media, or as stored in the memory of the computer, or in transit, or presented on a display device. “Data” includes, but is not limited to, computer or human readable forms of numbers, text, stored voice, graphics and images.
(h)
“Property” includes, but is not limited to, financial instruments, information, including electronically produced data, and computer software and programs in either computer or human readable form, intellectual property and any other tangible or intangible item of value.
(i)
“Proprietary information” includes any scientific, technical or commercial information including any design, process, procedure, list of customers, list of suppliers, customers’ records or business code or improvement thereof that is known only to limited individuals within an organization and is used in a business that the organization conducts. The information must have actual or potential commercial value and give the user of the information an opportunity to obtain a business advantage over competitors who do not know or use the information.
Distributed in Forward Edge II
(j)
“Services” include, but are not limited to, computer time, data processing and storage functions.
(2)
Any person commits computer crime who knowingly accesses, attempts to access or uses, or attempts to use, any computer, computer system, computer network or any part thereof for the purpose of:
(a) Devising or executing any scheme or artifice to defraud;
(b)
Obtaining money, property or services by means of false or fraudulent pretenses, representations or promises; or
(c) Committing theft, including, but not limited to, theft of proprietary information.
(3)
Any person who knowingly and without authorization alters, damages or destroys any computer, computer system, computer network, or any computer software, program, documentation or data contained in such computer, computer system or computer network, commits computer crime.
(4)
Any person who knowingly and without authorization uses, accesses or attempts to access any computer, computer system, computer network, or any computer software, program, documentation or data contained in such computer, computer system or computer network, commits computer crime.
(5)(a) A violation of the provisions of subsection (2) or (3) of this section shall be a Class C felony. Except as provided in paragraph (b) of this subsection, a violation of the provisions of subsection (4) of this section shall be a Class A misdemeanor.
(b)
Any violation of this section relating to a computer, computer network, computer program, computer software, computer system or data owned or operated by the Oregon State Lottery or rented, owned or operated by another person or entity under contract to or at the direction of the Oregon State Lottery Commission shall be a Class C felony. [1985 c.537 §8; 1989 c.737 §1; 1991 c.962 §17; 2001 c.870 §18]

Distributed in Forward Edge II