Illinois General Assembly - Full Text of HB1281
Illinois General Assembly

Previous General Assemblies

Full Text of HB1281  98th General Assembly

HB1281eng 98TH GENERAL ASSEMBLY

  
  
  

 


 
HB1281 EngrossedLRB098 06903 RLC 36960 b

1    AN ACT concerning criminal law.
 
2    Be it enacted by the People of the State of Illinois,
3represented in the General Assembly:
 
4    Section 5. The Criminal Code of 2012 is amended by changing
5Sections 17-51, 17-55, 26.5-3 and 26.5-5 as follows:
 
6    (720 ILCS 5/17-51)  (was 720 ILCS 5/16D-3)
7    Sec. 17-51. Computer tampering.
8    (a) A person commits computer tampering when he or she
9knowingly and without the authorization of a computer's owner
10or in excess of the authority granted to him or her:
11        (1) Accesses or causes to be accessed a computer or any
12    part thereof, a computer network, or a program or data;
13        (2) Accesses or causes to be accessed a computer or any
14    part thereof, a computer network, or a program or data, and
15    obtains data or services;
16        (3) Accesses or causes to be accessed a computer or any
17    part thereof, a computer network, or a program or data, and
18    damages or destroys the computer or alters, deletes, or
19    removes a computer program or data;
20        (4) Inserts or attempts to insert a program into a
21    computer or computer program knowing or having reason to
22    know that such program contains information or commands
23    that will or may:

 

 

HB1281 Engrossed- 2 -LRB098 06903 RLC 36960 b

1            (A) damage or destroy that computer, or any other
2        computer subsequently accessing or being accessed by
3        that computer;
4            (B) alter, delete, or remove a computer program or
5        data from that computer, or any other computer program
6        or data in a computer subsequently accessing or being
7        accessed by that computer; or
8            (C) cause loss to the users of that computer or the
9        users of a computer which accesses or which is accessed
10        by such program; or
11        (5) Falsifies or forges electronic mail transmission
12    information or other routing information in any manner in
13    connection with the transmission of unsolicited bulk
14    electronic mail through or into the computer network of an
15    electronic mail service provider or its subscribers.
16    (a-1) A person commits computer tampering when he or she
17knowingly and without the authorization of an account holder or
18in excess of the authority granted to him or to her:
19        (1) accesses or causes to be accessed by any means an
20    electronic mail (e-mail), instant messaging, or social
21    networking website account;
22        (2) accesses or causes to be accessed by any means an
23    electronic mail (e-mail), instant messaging, or social
24    networking website account, and views the content of an
25    electronic communication; or
26        (3) accesses or causes to be accessed by any means a

 

 

HB1281 Engrossed- 3 -LRB098 06903 RLC 36960 b

1    computer or any part thereof, a computer network,
2    electronic mail (e-mail), instant messaging, or social
3    networking website account, and:
4            (A) deletes an electronic communication;
5            (B) transmits an electronic communication
6        purporting to be the account holder; or
7            (C) changes the password for the account;
8        (4) accesses or causes to be accessed by any means a
9    social networking website account, and:
10            (A) alters the privacy settings for the account
11        holder's account; or
12            (B) gives himself, herself, or another access to
13        view private content on the account holder's social
14        networking website account; or
15        (5) accesses or causes to be accessed by any means a
16    computer or any part thereof, a computer network,
17    electronic mail (e-mail) account, instant messaging
18    account, social networking website account and adds,
19    deletes, or alters content.
20    (a-5) Distributing software to falsify routing
21information. It is unlawful for any person knowingly to sell,
22give, or otherwise distribute or possess with the intent to
23sell, give, or distribute software which:
24        (1) is primarily designed or produced for the purpose
25    of facilitating or enabling the falsification of
26    electronic mail transmission information or other routing

 

 

HB1281 Engrossed- 4 -LRB098 06903 RLC 36960 b

1    information;
2        (2) has only a limited commercially significant
3    purpose or use other than to facilitate or enable the
4    falsification of electronic mail transmission information
5    or other routing information; or
6        (3) is marketed by that person or another acting in
7    concert with that person with that person's knowledge for
8    use in facilitating or enabling the falsification of
9    electronic mail transmission information or other routing
10    information.
11    (a-10) For purposes of subsection (a), accessing a computer
12network is deemed to be with the authorization of a computer's
13owner if:
14        (1) the owner authorizes patrons, customers, or guests
15    to access the computer network and the person accessing the
16    computer network is an authorized patron, customer, or
17    guest and complies with all terms or conditions for use of
18    the computer network that are imposed by the owner; or
19        (2) the owner authorizes the public to access the
20    computer network and the person accessing the computer
21    network complies with all terms or conditions for use of
22    the computer network that are imposed by the owner.
23    (b) Sentence.
24        (1) A person who commits computer tampering as set
25    forth in subdivision (a)(1) or (a)(5) or subsection (a-5)
26    of this Section is guilty of a Class B misdemeanor.

 

 

HB1281 Engrossed- 5 -LRB098 06903 RLC 36960 b

1        (2) A person who commits computer tampering as set
2    forth in subdivision (a)(2) of this Section is guilty of a
3    Class A misdemeanor and a Class 4 felony for the second or
4    subsequent offense.
5        (3) A person who commits computer tampering as set
6    forth in subdivision (a)(3) or (a)(4) of this Section is
7    guilty of a Class 4 felony and a Class 3 felony for the
8    second or subsequent offense.
9        (3.1) A person who commits computer tampering as set
10    forth in subdivision (a-1)(1) of this Section is guilty of
11    a Class B misdemeanor for which the court shall impose a
12    minimum fine of $500 or, if public or community service is
13    established in the county in which the offender was
14    convicted, 30 hours of public or community service.
15        (3.2) A person who commits computer tampering as set
16    forth in subdivision (a-1)(2) or (a-1)(4) of this Section
17    is guilty of a Class A misdemeanor for a first violation
18    for which the court shall impose a minimum fine of $1,000
19    or, if public or community service is established in the
20    county in which the offender was convicted, 80 hours of
21    public or community service and a Class 4 felony for a
22    second or subsequent violation.
23        (3.3) A person who commits computer tampering as set
24    forth in subdivision (a-1)(3) or (a-1)(5) of this Section
25    is guilty of a Class 4 felony.
26        (4) If an injury arises from the transmission of

 

 

HB1281 Engrossed- 6 -LRB098 06903 RLC 36960 b

1    unsolicited bulk electronic mail, the injured person,
2    other than an electronic mail service provider, may also
3    recover attorney's fees and costs, and may elect, in lieu
4    of actual damages, to recover the lesser of $10 for each
5    unsolicited bulk electronic mail message transmitted in
6    violation of this Section, or $25,000 per day. The injured
7    person shall not have a cause of action against the
8    electronic mail service provider that merely transmits the
9    unsolicited bulk electronic mail over its computer
10    network.
11        (5) If an injury arises from the transmission of
12    unsolicited bulk electronic mail, an injured electronic
13    mail service provider may also recover attorney's fees and
14    costs, and may elect, in lieu of actual damages, to recover
15    the greater of $10 for each unsolicited electronic mail
16    advertisement transmitted in violation of this Section, or
17    $25,000 per day.
18        (6) The provisions of this Section shall not be
19    construed to limit any person's right to pursue any
20    additional civil remedy otherwise allowed by law.
21    (c) Whoever suffers loss by reason of a violation of
22subdivision (a)(4) of this Section may, in a civil action
23against the violator, obtain appropriate relief. In a civil
24action under this Section, the court may award to the
25prevailing party reasonable attorney's fees and other
26litigation expenses.

 

 

HB1281 Engrossed- 7 -LRB098 06903 RLC 36960 b

1(Source: P.A. 95-326, eff. 1-1-08; 96-1000, eff. 7-2-10;
296-1551, eff. 7-1-11.)
 
3    (720 ILCS 5/17-55)
4    Sec. 17-55. Definitions. For the purposes of Sections 17-50
5through 17-53:
6    In addition to its meaning as defined in Section 15-1 of
7this Code, "property" means: (1) electronic impulses; (2)
8electronically produced data; (3) confidential, copyrighted,
9or proprietary information; (4) private identification codes
10or numbers which permit access to a computer by authorized
11computer users or generate billings to consumers for purchase
12of goods and services, including but not limited to credit card
13transactions and telecommunications services or permit
14electronic fund transfers; (5) software or programs in either
15machine or human readable form; or (6) any other tangible or
16intangible item relating to a computer or any part thereof.
17    "Access" means to use, instruct, communicate with, store
18data in, retrieve or intercept data from, or otherwise utilize
19any services of, a computer, a network, or data.
20    "Account holder" means the person or entity to whom or to
21which an electronic mail or instant message service account,
22social networking website profile, or other virtual identity is
23registered.
24    "Services" includes but is not limited to computer time,
25data manipulation, or storage functions.

 

 

HB1281 Engrossed- 8 -LRB098 06903 RLC 36960 b

1    "Vital services or operations" means those services or
2operations required to provide, operate, maintain, and repair
3network cabling, transmission, distribution, or computer
4facilities necessary to ensure or protect the public health,
5safety, or welfare. Those services or operations include, but
6are not limited to, services provided by medical personnel or
7institutions, fire departments, emergency services agencies,
8national defense contractors, armed forces or militia
9personnel, private and public utility companies, or law
10enforcement agencies.
11(Source: P.A. 96-1551, eff. 7-1-11.)
 
12    (720 ILCS 5/26.5-3)
13    Sec. 26.5-3. Harassment through electronic communications.
14    (a) A person commits harassment through electronic
15communications when he or she uses electronic communication for
16any of the following purposes:
17        (1) Transmitting Making any comment, request,
18    suggestion or proposal which is obscene with an intent to
19    offend;
20        (2) Interrupting, with the intent to harass, the
21    telephone service or the electronic communication service
22    of any person;
23        (3) Transmitting to any person, with the intent to
24    harass and regardless of whether the communication is read
25    in its entirety or at all, any file, document, or other

 

 

HB1281 Engrossed- 9 -LRB098 06903 RLC 36960 b

1    communication which prevents that person from using his or
2    her telephone service or electronic communications device;
3        (4) Transmitting an electronic communication or
4    knowingly inducing a person to transmit an electronic
5    communication for the purpose of harassing another person
6    who is under 13 years of age, regardless of whether the
7    person under 13 years of age consents to the harassment, if
8    the defendant is at least 16 years of age at the time of
9    the commission of the offense;
10        (4.1) Knowingly and by any means making repeated,
11    unwanted, and harassing communication to another person
12    within one week by transmitting any comment, request,
13    suggestion, or proposal which is obscene with an intent to
14    offend;
15        (5) Threatening injury to the person or to the property
16    of the person to whom an electronic communication is
17    directed or to any of his or her family or household
18    members; or
19        (6) Knowingly permitting any electronic communications
20    device to be used for any of the purposes mentioned in this
21    subsection (a).
22    (b) Telecommunications carriers, commercial mobile service
23providers, and providers of information services, including,
24but not limited to, Internet service providers and hosting
25service providers, are not liable under this Section, except
26for willful and wanton misconduct, by virtue of the

 

 

HB1281 Engrossed- 10 -LRB098 06903 RLC 36960 b

1transmission, storage, or caching of electronic communications
2or messages of others or by virtue of the provision of other
3related telecommunications, commercial mobile services, or
4information services used by others in violation of this
5Section.
6(Source: P.A. 97-1108, eff. 1-1-13.)
 
7    (720 ILCS 5/26.5-5)
8    Sec. 26.5-5. Sentence.
9    (a) Except as provided in subsection (b), a person who
10violates any of the provisions of Section 26.5-1, 26.5-2, or
1126.5-3, other than paragraph (4.1) of subsection (a) of Section
1226.5-3, of this Article is guilty of a Class B misdemeanor.
13Except as provided in subsection (b), a violation of paragraph
14(4.1) of subsection (a) of Section 26.5-3 is a Class A
15misdemeanor. Except as provided in subsection (b), a second or
16subsequent violation of Section 26.5-1, 26.5-2, or 26.5-3 of
17this Article is a Class A misdemeanor, for which the court
18shall impose a minimum of 14 days in jail or, if public or
19community service is established in the county in which the
20offender was convicted, 240 hours of public or community
21service.
22    (b) In any of the following circumstances, a person who
23violates Section 26.5-1, 26.5-2, or 26.5-3 of this Article
24shall be guilty of a Class 4 felony:
25        (1) The person has 3 or more prior violations in the

 

 

HB1281 Engrossed- 11 -LRB098 06903 RLC 36960 b

1    last 10 years of harassment by telephone, harassment
2    through electronic communications, or any similar offense
3    of any other state;
4        (2) The person has previously violated the harassment
5    by telephone provisions, or the harassment through
6    electronic communications provisions, or committed any
7    similar offense in any other state with the same victim or
8    a member of the victim's family or household;
9        (3) At the time of the offense, the offender was under
10    conditions of bail, probation, conditional discharge,
11    mandatory supervised release or was the subject of an order
12    of protection, in this or any other state, prohibiting
13    contact with the victim or any member of the victim's
14    family or household;
15        (4) In the course of the offense, the offender
16    threatened to kill the victim or any member of the victim's
17    family or household;
18        (5) The person has been convicted in the last 10 years
19    of a forcible felony as defined in Section 2-8 of the
20    Criminal Code of 1961 or the Criminal Code of 2012;
21        (6) The person violates paragraph (5) of Section 26.5-2
22    or paragraph (4) of Section 26.5-3; or
23        (7) The person was at least 18 years of age at the time
24    of the commission of the offense and the victim was under
25    18 years of age at the time of the commission of the
26    offense.

 

 

HB1281 Engrossed- 12 -LRB098 06903 RLC 36960 b

1    (c) The court may order any person convicted under this
2Article to submit to a psychiatric examination.
3(Source: P.A. 97-1108, eff. 1-1-13.)