VA Electronic Crime Statutes

(http://leg1.state.va.us/000/src.htm)

§ 8.01-40.1. Action for injury resulting from violation of Computer Crimes Act; limitations.

Any person whose property or person is injured by reason of a violation of the provisions of the Virginia Computer Crimes Act (§ 18.2-152.1 et seq.) may sue and recover damages as provided in § 18.2-152.12. An action shall be commenced before the earlier of (i) five years after the last act in the course of conduct constituting a violation of the Computer Crimes Act or (ii) two years after the plaintiff discovers or reasonably should have discovered the last act in the course of conduct constituting a violation of the Computer Crimes Act.

(1985, c. 92.)

§ 8.01-328.1. When personal jurisdiction over person may be exercised.

A. A court may exercise personal jurisdiction over a person, who acts directly or by an agent, as to a cause of action arising from the person's:

  1. Transacting any business in this Commonwealth;
  2. Contracting to supply services or things in this Commonwealth;
  3. Causing tortious injury by an act or omission in this Commonwealth;
  4. Causing tortious injury in this Commonwealth by an act or omission outside this Commonwealth if he regularly does or solicits business, or engages in any other persistent course of conduct, or derives substantial revenue from goods used or consumed or services rendered, in this Commonwealth;
  5. Causing injury in this Commonwealth to any person by breach of warranty expressly or impliedly made in the sale of goods outside this Commonwealth when he might reasonably have expected such person to use, consume, or be affected by the goods in this Commonwealth, provided that he also regularly does or solicits business, or engages in any other persistent course of conduct, or derives substantial revenue from goods used or consumed or services rendered in this Commonwealth;
  6. Having an interest in, using, or possessing real property in this Commonwealth;
  7. Contracting to insure any person, property, or risk located within this Commonwealth at the time of contracting;
  8. Having (i) executed an agreement in this Commonwealth which obligates the person to pay spousal support or child support to a domiciliary of this Commonwealth, or to a

Distributed in Forward Edge II person who has satisfied the residency requirements in suits for annulments or divorce for members of the armed forces pursuant to § 20-97 provided proof of service of process on a nonresident party is made by a law-enforcement officer or other person authorized to serve process in the jurisdiction where the nonresident party is located, (ii) been ordered to pay spousal support or child support pursuant to an order entered by any court of competent jurisdiction in this Commonwealth having in personam jurisdiction over such person, or (iii) shown by personal conduct in this Commonwealth, as alleged by affidavit, that the person conceived or fathered a child in this Commonwealth;

  1. Having maintained within this Commonwealth a matrimonial domicile at the time of separation of the parties upon which grounds for divorce or separate maintenance is based, or at the time a cause of action arose for divorce or separate maintenance or at the time of commencement of such suit, if the other party to the matrimonial relationship resides herein; or
  2. Having incurred a tangible personal property tax liability to any political subdivision of the Commonwealth.

Jurisdiction in subdivision 9 is valid only upon proof of service of process pursuant to § 8.01-296 on the nonresident party by a person authorized under the provisions of § 8.01

320. Jurisdiction under subdivision 8 (iii) of this subsection is valid only upon proof of personal service on a nonresident pursuant to § 8.01-320.

B. Using a computer or computer network located in the Commonwealth shall constitute an act in the Commonwealth. For purposes of this subsection, "use" and "computer network" shall have the same meanings as those contained in § 18.2-152.2.

C. When jurisdiction over a person is based solely upon this section, only a cause of action arising from acts enumerated in this section may be asserted against him; however, nothing contained in this chapter shall limit, restrict or otherwise affect the jurisdiction of any court of this Commonwealth over foreign corporations which are subject to service of process pursuant to the provisions of any other statute.

(Code 1950, § 8-81.2; 1964, c. 331; 1977, c. 617; 1978, c. 132; 1981, c. 6; 1982, c. 313; 1983, c. 428; 1984, c. 609; 1986, c. 275; 1987, c. 594; 1988, cc. 866, 878; 1992, c. 571; 1999, cc. 886, 904, 905; 2001, c. 221.)

§ 18.2-152.1. Short title.

This article shall be known and may be cited as the "Virginia Computer Crimes Act."

(1984, c. 751.)

§ 18.2-152.2. Definitions.

For purposes of this article: "Computer" means an electronic, magnetic, optical, hydraulic or organic device or group of devices which, pursuant to a computer program, to human instruction, or to permanent instructions contained in the device or group of devices, can automatically perform computer operations with or on computer data and can communicate the results to another computer or to a person. The term "computer" includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve or communicate computer programs, computer data or the results of computer operations to or from a person, another computer or another device.

"Computer data" means any representation of information, knowledge, facts, concepts, or instructions which is being prepared or has been prepared and is intended to be processed, is being processed, or has been processed in a computer or computer network. "Computer data" may be in any form, whether readable only by a computer or only by a human or by either, including, but not limited to, computer printouts, magnetic storage media, punched cards, or stored internally in the memory of the computer.

"Computer network" means two or more computers connected by a network.

"Computer operation" means arithmetic, logical, monitoring, storage or retrieval functions and any combination thereof, and includes, but is not limited to, communication with, storage of data to, or retrieval of data from any device or human hand manipulation of electronic or magnetic impulses. A "computer operation" for a particular computer may also be any function for which that computer was generally designed.

"Computer program" means an ordered set of data representing coded instructions or statements that, when executed by a computer, causes the computer to perform one or more computer operations.

"Computer services" means computer time or services, including data processing services, Internet services, electronic mail services, electronic message services, or information or data stored in connection therewith.

"Computer software" means a set of computer programs, procedures and associated documentation concerned with computer data or with the operation of a computer, computer program, or computer network.

"Electronic mail service provider" (EMSP) means any person who (i) is an intermediary in sending or receiving electronic mail and (ii) provides to end-users of electronic mail services the ability to send or receive electronic mail.

"Financial instrument" includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security, or any computerized representation thereof.

"Network" means any combination of digital transmission facilities and packet switches, routers, and similar equipment interconnected to enable the exchange of computer data.

"Owner" means an owner or lessee of a computer or a computer network or an owner, lessee, or licensee of computer data, computer programs, or computer software.

"Person" shall include any individual, partnership, association, corporation or joint venture.

"Property" shall include:

  1. Real property;
  2. Computers and computer networks;
  3. Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are:
a.
Tangible or intangible;
b.
In a format readable by humans or by a computer;
c.
In transit between computers or within a computer network or between any devices which comprise a computer; or
d.
Located on any paper or in any device on which it is stored by a computer or by a human; and

4. Computer services. A person "uses" a computer or computer network when he attempts to cause or causes:

  1. A computer or computer network to perform or to stop performing computer operations;
  2. The withholding or denial of the use of a computer, computer network, computer program, computer data or computer software to another user; or
  3. A person to put false information into a computer.

A person is "without authority" when he has no right or permission of the owner to use a computer or computer network or he uses a computer or computer network in a manner exceeding such right or permission.

(1984, c. 751; 1999, cc. 886, 904, 905; 2000, c. 627; 2003, cc. 987, 1016.)

§ 18.2-152.3. Computer fraud.

Any person who uses a computer or computer network without authority and with the intent to:

  1. Obtain property or services by false pretenses;
  2. Embezzle or commit larceny; or
  3. Convert the property of another

is guilty of the crime of computer fraud.

If the value of the property or services obtained is $200 or more, the crime of computer fraud shall be punishable as a Class 5 felony. Where the value of the property or services obtained is less than $200, the crime of computer fraud shall be punishable as a Class 1 misdemeanor.

(1984, c. 751; 1985, c. 322; 2003, cc. 987, 1016.)

§ 18.2-152.3:1. Transmission of unsolicited bulk electronic mail (spam); penalty.

A. Any person who:

  1. Uses a computer or computer network with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers; or
  2. Knowingly sells, gives, or otherwise distributes or possesses with the intent to sell, give, or distribute software that (i) is primarily designed or produced for the purpose of facilitating or enabling the falsification of electronic mail transmission information or other routing information; (ii) has only limited commercially significant purpose or use other than to facilitate or enable the falsification of electronic mail transmission information or other routing information; or (iii) is marketed by that person acting alone or with another for use in facilitating or enabling the falsification of electronic mail transmission information or other routing information is guilty of a Class 1 misdemeanor.

B. A person is guilty of a Class 6 felony if he commits a violation of subsection A and:

  1. The volume of UBE transmitted exceeded 10,000 attempted recipients in any 24-hour period, 100,000 attempted recipients in any 30-day time period, or one million attempted recipients in any one-year time period; or
  2. The revenue generated from a specific UBE transmission exceeded $1,000 or the total revenue generated from all UBE transmitted to any EMSP exceeded $50,000.

C. A person is guilty of a Class 6 felony if he knowingly hires, employs, uses, or permits any minor to assist in the transmission of UBE in violation of subdivision B 1 or subdivision B 2.

(2003, cc. 987, 1016.)

§ 18.2-152.4. Computer trespass; penalty.

A. It shall be unlawful for any person to use a computer or computer network without authority and with the intent to:

  1. Temporarily or permanently remove, halt, or otherwise disable any computer data, computer programs, or computer software from a computer or computer network;
  2. Cause a computer to malfunction, regardless of how long the malfunction persists;
  3. Alter or erase any computer data, computer programs, or computer software;
  4. Effect the creation or alteration of a financial instrument or of an electronic transfer of funds;
  5. Cause physical injury to the property of another; or
  6. Make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs, or computer software residing in, communicated by, or produced by a computer or computer network.
  7. ]Repealed_.

B. Any person who violates this section shall be guilty of computer trespass, which offense shall be punishable as a Class 1 misdemeanor. If there is damage to the property of another valued at $2,500 or more caused by such person's malicious act in violation of this section, the offense shall be punishable as a Class 6 felony.

C. Nothing in this section shall be construed to interfere with or prohibit terms or conditions in a contract or license related to computers, computer data, computer networks, computer operations, computer programs, computer services, or computer software or to create any liability by reason of terms or conditions adopted by, or technical measures implemented by, a Virginia-based electronic mail service provider to prevent the transmission of unsolicited electronic mail in violation of this article. Nothing in this section shall be construed to prohibit the monitoring of computer usage of, the otherwise lawful copying of data of, or the denial of computer or Internet access to a minor by a parent or legal guardian of the minor.

(1984, c. 751; 1985, c. 322; 1990, c. 663; 1998, c. 892; 1999, cc. 886, 904, 905; 2002, c. 195; 2003, cc. 987, 1016.)

§ 18.2-152.5. Computer invasion of privacy.

A. A person is guilty of the crime of computer invasion of privacy when he uses a computer or computer network and intentionally examines without authority any employment, salary, credit or any other financial or personal information relating to any other person. "Examination" under this section requires the offender to review the information relating to any other person after the time at which the offender knows or should know that he is without authority to view the information displayed.

B. The crime of computer invasion of privacy shall be punishable as a Class 1 misdemeanor.

(1984, c. 751; 1985, c. 398; 2001, c. 358.)

§ 18.2-152.6. Theft of computer services.

Any person who willfully uses a computer or computer network, with intent to obtain computer services without authority, shall be guilty of the crime of theft of computer services, which shall be punishable as a Class 1 misdemeanor. If the theft of computer services is valued at $2,500 or more, he is guilty of a Class 6 felony.

(1984, c. 751; 1985, c. 322; 2003, cc. 987, 1016.)

§ 18.2-152.7. Personal trespass by computer.

A. A person is guilty of the crime of personal trespass by computer when he uses a computer or computer network without authority and with the intent to cause physical injury to an individual.

B. If committed maliciously, the crime of personal trespass by computer shall be punishable as a Class 3 felony. If such act is done unlawfully but not maliciously, the crime of personal trespass by computer shall be punishable as a Class 6 felony.

(1984, c. 751; 1985, c. 322; 2003, cc. 987, 1016.)

§ 18.2-152.7:1. Harassment by computer; penalty.

If any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act, he shall be guilty of a Class 1 misdemeanor.

(2000, c. 849.) § 18.2-152.8. Property capable of embezzlement. For purposes of § 18.2-111, personal property subject to embezzlement shall include:

  1. Computers and computer networks;
  2. Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are:
a.
Tangible or intangible;
b.
In a format readable by humans or by a computer;
c.
In transit between computers or within a computer network or between any devices which comprise a computer; or
d.
Located on any paper or in any device on which it is stored by a computer or by a human; and

3. Computer services.

(1984, c. 751.)

§ 18.2-152.9. Limitation of prosecution.

Notwithstanding the provisions of § 19.2-8, prosecution of a crime which is punishable as a misdemeanor pursuant to this article must be commenced before the earlier of (i) five years after the commission of the last act in the course of conduct constituting a violation of this article or (ii) one year after the existence of the illegal act and the identity of the offender are discovered by the Commonwealth, by the owner, or by anyone else who is damaged by such violation.

(1984, c. 751.)

§ 18.2-152.10. Venue for prosecution.

For the purpose of venue under this article, any violation of this article shall be considered to have been committed in any county or city:

  1. In which any act was performed in furtherance of any course of conduct which violated this article;
  2. In which the owner has his principal place of business in the Commonwealth;
  3. In which any offender had control or possession of any proceeds of the violation or of any books, records, documents, property, financial instrument, computer software, computer program, computer data, or other material or objects which were used in furtherance of the violation;
  4. From which, to which, or through which any access to a computer or computer network was made whether by wires, electromagnetic waves, microwaves, or any other means of communication;
  5. In which the offender resides; or
  6. In which any computer which is an object or an instrument of the violation is located at the time of the alleged offense.

(1984, c. 751; 1985, c. 322.)

§ 18.2-152.11. Article not exclusive.

The provisions of this article shall not be construed to preclude the applicability of any other provision of the criminal law of this Commonwealth which presently applies or may in the future apply to any transaction or course of conduct which violates this article, unless such provision is clearly inconsistent with the terms of this article.

(1984, c. 751.)

§ 18.2-152.12. Civil relief; damages.

A. Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor and recover for any damages sustained and the costs of suit. Without limiting the generality of the term, "damages" shall include loss of profits.

B. If the injury under this article arises from the transmission of unsolicited bulk electronic mail in contravention of the authority granted by or in violation of the policies set by the electronic mail service provider where the defendant has knowledge of the authority or policies of the EMSP or where the authority or policies of the EMSP are available on the electronic mail service provider's website, the injured person, other than an electronic mail service provider, may also recover attorneys' fees and costs, and may elect, in lieu of actual damages, to recover the lesser of $10 for each and every unsolicited bulk electronic mail message transmitted in violation of this article, or $25,000 per day. The injured person shall not have a cause of action against the electronic mail service provider that merely transmits the unsolicited bulk electronic mail over its computer network. Transmission of electronic mail from an organization to its members shall not be deemed to be unsolicited bulk electronic mail.

C. If the injury under this article arises from the transmission of unsolicited bulk electronic mail in contravention of the authority granted by or in violation of the policies set by the electronic mail service provider where the defendant has knowledge of the authority or policies of the EMSP or where the authority or policies of the EMSP are available on the electronic mail service provider's website, an injured electronic mail service provider may also recover attorneys' fees and costs, and may elect, in lieu of actual damages, to recover $1 for each and every intended recipient of an unsolicited bulk electronic mail message where the intended recipient is an end user of the EMSP or $25,000 for each day an attempt is made to transmit an unsolicited bulk electronic mail message to an end user of the EMSP. In calculating the statutory damages under this provision, the court may adjust the amount awarded as necessary, but in doing so shall take into account the number of complaints to the EMSP generated by the defendant's messages, the defendant's degree of culpability, the defendant's prior history of such conduct, and the extent of economic gain resulting from the conduct. Transmission of electronic mail from an organization to its members shall not be deemed to be unsolicited bulk electronic mail.

D. At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a way as to protect the secrecy and security of the computer, computer network, computer data, computer program and computer software involved in order to prevent possible recurrence of the same or a similar act by another person and to protect any trade secrets of any party and in such a way as to protect the privacy of nonparties who complain about violations of this section.

E. The provisions of this article shall not be construed to limit any person's right to pursue any additional civil remedy otherwise allowed by law.

F. A civil action under this section must be commenced before expiration of the time period prescribed in § 8.01-40.1. In actions alleging injury arising from the transmission of unsolicited bulk electronic mail, personal jurisdiction may be exercised pursuant to § 8.01-328.1.

(1984, c. 751; 1985, c. 92; 1999, cc. 886, 904, 905; 2003, cc. 987, 1016.)

§ 18.2-152.13. Severability.

If any provision or clause of this article or application thereof to any person or circumstances is held to be invalid, such invalidity shall not affect other provisions or applications of this article which can be given effect without the invalid provision or application, and to this end the provisions of this article are declared to be severable.

(1984, c. 751.)

§ 18.2-152.14. Computer as instrument of forgery.

The creation, alteration, or deletion of any computer data contained in any computer or computer network, which if done on a tangible document or instrument would constitute forgery under Article 1 (§ 18.2-168 et seq.) of Chapter 6 of this Title, will also be deemed to be forgery. The absence of a tangible writing directly created or altered by the offender shall not be a defense to any crime set forth in Article 1 (§ 18.2-168 et seq.) of Chapter 6 of this Title if a creation, alteration, or deletion of computer data was involved in lieu of a tangible document or instrument.

(1984, c. 751; 1985, c. 322.)

§ 18.2-152.15. Encryption used in criminal activity.

Any person who willfully uses encryption to further any criminal activity shall be guilty of an offense which is separate and distinct from the predicate criminal activity and punishable as a Class 1 misdemeanor.

"Encryption" means the enciphering of intelligible data into unintelligible form or the deciphering of unintelligible data into intelligible form.

(1999, c. 455.)

§ 18.2-374.1:1. Possession of child pornography; penalty.

A. Any person who knowingly possesses any sexually explicit visual material utilizing or having as a subject a person less than 18 years of age shall be guilty of a Class 6 felony. However, no prosecution for possession of material prohibited by this section shall lie where the prohibited material comes into the possession of the person charged from a law-enforcement officer or law-enforcement agency.

B. The provisions of this section shall not apply to any such material which is possessed for a bona fide artistic, medical, scientific, educational, religious, governmental, judicial or other proper purpose by a physician, psychologist, sociologist, scientist, teacher, person pursuing bona fide studies or research, librarian, clergyman, attorney, judge, or other person having a proper interest in the material.

C. All sexually explicit visual material which utilizes or has as a subject a person less than 18 years of age shall be subject to lawful seizure and forfeiture pursuant to § 19.2

386.31.

D. Any person convicted of a second or subsequent offense under this section shall be guilty of a Class 5 felony.

(1992, c. 745; 1993, c. 853; 1994, c. 511; 1999, c. 659; 2003, cc. 935, 938; 2004, c. 995.)

18.2-374.2

§ 18.2-374.3. Use of communications systems to facilitate certain offenses involving children.

A. It shall be unlawful for any person to use a communications system, including but not limited to computers or computer networks or bulletin boards, or any other electronic means for the purposes of procuring or promoting the use of a minor for any activity in violation of § 18.2-370 or § 18.2-374.1. A violation of this subsection is a Class 6 felony.

B. It shall be unlawful for any person 18 years of age or older to use a communications system, including but not limited to computers or computer networks or bulletin boards, or any other electronic means, for the purposes of soliciting any person he knows or has reason to believe is a child less than 18 years of age for (i) any activity in violation of § 18.2-355 or § 18.2-361, (ii) any activity in violation of § 18.2-374.1, (iii) a violation of § 18.2-374.1:1, or (iv) any activity in violation of subsection A of § 18.2-370. As used in this subsection, "use a communications system" means making personal contact or direct contact through any agent or agency, any print medium, the United States mail, any common carrier or communication common carrier, any electronic communications system, or any telecommunications, wire, computer, or radio communications system. A violation of this subsection is a Class 5 felony.

(1992, c. 699; 1999, c. 659; 2003, cc. 935, 938; 2004, cc. 414, 444, 459, 864.)

?19.2-298.1?