|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
PARRIS N. GLENDENING, Governor
|
|
|
|
|
Ch. 7
|
|
|
|
|
|
|
|
|
|
|
[(5)] (8) "Computer program" means an ordered set of instructions or
statements that may interact with related data that, when executed in a computer
system, causes the computer to perform specified functions.
[(6)] (9) "Computer services" includes, but is not limited to, computer
time, data processing, and storage functions.
[(7)](10) "Computer software" means computer programs, instructions,
procedures, or associated documentation that is concerned with the operation of a
computer system.
[(8)] (11) "Computer system" means 1 or more connected or unconnected
computers, peripheral devices, software, data, or programs.
[(9) "Access" means to instruct, communicate with, store data in, retrieve
data from, or otherwise make use of equipment including, but not limited to,
computers and other data processing equipment or resources connected therewith]
(12) "PROPERTY" MEANS INTELLECTUAL PROPERTY, COMPUTER DATA,
INSTRUCTIONS OR PROGRAMS IN EITHER MACHINE OR HUMAN READABLE FORM,
FINANCIAL INSTRUMENTS OR INFORMATION, MEDICAL INFORMATION, RESTRICTED
PERSONAL INFORMATION, OR ANY OTHER TANGIBLE OR INTANGIBLE ITEM OF
VALUE.
(13) "SERVICES" INCLUDES COMPUTER TIME, DATA PROCESSING,
STORAGE FUNCTIONS, COMPUTER MEMORY, OR THE UNAUTHORIZED USE OF A
COMPUTER PROGRAM, COMPUTER, COMPUTER SYSTEM, OR COMPUTER NETWORK,
OR COMMUNICATIONS FACILITIES CONNECTED OR RELATED TO A COMPUTER,
COMPUTER SYSTEM, OR COMPUTER NETWORK.
(b) This section does not preclude the applicability of any other provision of
this Code.
(c) (1) A person may not intentionally, willfully, and without authorization
access, attempt to access, cause access, or exceed the person's authorized access, to a
computer, computer network, computer software, computer control language,
computer system, computer services, computer data base, or any part of these
systems or services.
(2) A person may not intentionally, willfully, and without authorization
access, attempt to access, cause access, or exceed the person's authorized access, to a
computer, computer network, computer software, computer control language,
computer system, computer services, computer data base, or any part of these
systems or services to:
(i) Cause the malfunction or interrupt the operation of a computer,
computer network, computer software, computer control language, computer system,
computer services, computer data base, or any part of these systems or services; or
(ii) Alter, damage, or destroy data or a computer program stored,
maintained, or produced by a computer, computer network, computer system,
computer services, computer data base, or any part of these systems or services.
|
|
|
|
|
|
|
|
- 41 -
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|