2012 -- S 2647

=======

LC00306

=======

STATE OF RHODE ISLAND

IN GENERAL ASSEMBLY

JANUARY SESSION, A.D. 2012

____________

A N A C T

RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME

     

     

     Introduced By: Senators Lanzi, Ciccone, DiPalma, and Tassoni

     Date Introduced: March 01, 2012

     Referred To: Senate Judiciary

It is enacted by the General Assembly as follows:

1-1

     SECTION 1. Section 11-52-4.2 of the General Laws in Chapter 11-52 entitled

1-2

"Computer Crime" is hereby repealed.

1-3

     11-52-4.2. Cyberstalking and cyberharassment prohibited.

1-4

     (a) Whoever transmits any communication by computer or other electronic device to any

1-5

person or causes any person to be contacted for the sole purpose of harassing that person or his or

1-6

her family is guilty of a misdemeanor, and shall be punished by a fine of not more than five

1-7

hundred dollars ($500), by imprisonment for not more than one year, or both. For the purpose of

1-8

this section, "harassing" means any knowing and willful course of conduct directed at a specific

1-9

person which seriously alarms, annoys, or bothers the person, and which serves no legitimate

1-10

purpose. The course of conduct must be of a kind that would cause a reasonable person to suffer

1-11

substantial emotional distress, or be in fear of bodily injury. "Course of conduct" means a pattern

1-12

of conduct composed of a series of acts over a period of time, evidencing a continuity of purpose.

1-13

Constitutionally protected activity is not included within the meaning of "course of conduct."

1-14

     (b) A second or subsequent conviction under subsection (a) of this section shall be

1-15

deemed a felony punishable by imprisonment for not more than two (2) years, by a fine of not

1-16

more than six thousand dollars ($6,000), or both.

1-17

     SECTION 2. Chapter 11-9 of the General Laws entitled "Children" is hereby amended

1-18

by adding thereto the following section:

2-19

     11-9-1.5. Electronically Disseminating Indecent Material to Minors Prohibited. - (a)

2-20

Definitions. As used in this section:

2-21

     (1) “Minor” means any person not having reached eighteen (18) years of age.

2-22

     (2) “Computer” has the meaning given to that term in section 11-52-1.

2-23

     (3) “Telecommunication device” means an analog or digital electronic device that

2-24

processes data, telephony, video, or sound transmission as part of any system involved in the

2-25

sending and/or receiving at a distance of voice, sound, data, and/or video transmissions.

2-26

     (4) “Indecent visual depiction” means any digital image or digital video depicting one or

2-27

more persons engaging in sexually explicit conduct, and includes; (i) Data stored on any

2-28

computer, telecommunication device, or other electronic storage media that is capable of

2-29

conversion into a visual image; or (ii) Digital video depicting sexually explicit conduct

2-30

transmitted live over a computer online service, Internet service, or local electronic bulletin board

2-31

service.

2-32

     (5) “Sexually explicit conduct” means actual:

2-33

     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or

2-34

oral-anal, or lascivious sexual intercourse where the genitals or pubic area of any person is

2-35

exhibited;

2-36

     (ii) Bestiality;

2-37

     (iii) Masturbation;

2-38

     (iv) Sadistic or masochistic abuse; or

2-39

     (v) Graphic or lascivious exhibition of the genitals or pubic area of any person.

2-40

     (b) No person shall knowingly and intentionally use a computer or telecommunication

2-41

device to transmit an indecent visual depiction to a person he or she knows is, or believes to be, a

2-42

minor.

2-43

     (c) No minor shall be charged under this section if his or her conduct falls within the

2-44

provisions of section 11-9-1.4, “Minor Electronically Disseminating Indecent Material to Another

2-45

Person – “Sexting” Prohibited.”

2-46

     (d) The fact that an undercover operative or law enforcement officer was involved in the

2-47

detection and investigation of an offense under this section shall not constitute a defense to a

2-48

prosecution under this section.

2-49

     (e) Whoever violates the provisions of this section shall be subject to the sex offender

2-50

registration requirements set forth in section 11-37.1-1 et seq., entitled “Sexual Offender

2-51

Registration and Community Notification Act.”.

2-52

     (f) Whoever violates the provisions of this section shall be guilty of a felony and may be

2-53

imprisoned for not more than five (5) years or fined not more than five thousand dollars ($5,000),

3-1

or both.

3-2

     SECTION 3. Chapter 11-52 of the General Laws entitled “Computer Crime” is hereby

3-3

amended by adding thereto the following sections:

3-4

     11-52-3.1. Unauthorized access to confidential information. – (a) Whoever

3-5

intentionally, without authorization or in excess of one’s authorization, directly or indirectly

3-6

accesses a protected computer, computer program, computer system, or computer network, with

3-7

the intent to either view, obtain, copy, or download any confidential information contained in or

3-8

stored on such computer, computer program, computer system, or computer network, shall be

3-9

guilty of a felony and shall be subject to the penalties set forth in section 11-52-5.

3-10

     (b) Nothing in this section shall apply to any monitoring of, or interaction with, a

3-11

subscriber’s Internet or other network connection or service, or a protected computer, by a

3-12

telecommunications carrier, cable operator, computer hardware or software provider, or provider

3-13

of information service or interactive computer service for network or computer security purposes,

3-14

diagnostics, technical support, repair, advertising, authorized updates of software or system

3-15

firmware, authorized remove system management, providing, operating, or improving a service

3-16

used, requested, or authorized by an individual, or detection or prevention of the unauthorized use

3-17

of or fraudulent or other illegal activities in connection with a network, service, or computer

3-18

software.

3-19

     11-52-4.4. Cyberstalking and cyberharassment prohibited. – (a) Definitions. As used

3-20

in this section:

3-21

     (1) “Conduct” means either: (i) A single act which causes a person to be repeatedly

3-22

contacted by others in a manner which seriously alarms, annoys, or bothers the person; or (ii)

3-23

Two (2) or more acts over a period of time, evidencing a continuity of purpose, which seriously

3-24

alarms, annoys, or bothers the person.

3-25

     (2) “Immediate family” means a spouse, parent, child, or sibling. The term also includes

3-26

any other individual who regularly resides in the household or who within the prior six (6)

3-27

months regularly resided in the household.

3-28

     (3) “Harass” means to engage in intentional conduct that serves no legitimate purpose

3-29

that would cause a reasonable person to suffer substantial emotional distress, or be in fear of

3-30

bodily injury. The term does not include constitutionally protected activity.

3-31

     (4) “Computer” has the meaning given to that term in section 11-52-1.

3-32

     (5) “Telecommunication device” means an analog or digital electronic device that

3-33

processes data, telephony, video, or sound transmission as part of any system involved in the

3-34

sending and/or receiving at a distance of voice, sound, data, and/or video transmissions.

4-1

     (b) Whoever, by computer or telecommunication device, harasses another person or

4-2

causes any person to be contacted for the purpose of harassing that person or his or her immediate

4-3

family is guilty of a misdemeanor, and may be subject to imprisonment for not more than one

4-4

year or fined not more than five hundred dollars ($500), or both.

4-5

     (c) A second or subsequent conviction under subsection (b) of this section shall be

4-6

deemed a felony, subject to imprisonment for not more than two (2) years or a fine of not more

4-7

than six thousand dollars ($6,000), or both.

4-8

     (d) If a person accused under this section claims to have been engaged in constitutionally

4-9

protected activity, the court shall determine the validity of the claim as a matter of law and, if

4-10

found valid, shall exclude evidence of the activity.

4-11

     11-52-7.1 Offense of Online Impersonation. – (a) Definitions. As used in this section:

4-12

     (1) “Commercial social networking site” means a business, organization or other similar

4-13

entity that operates a website and permits persons to become registered users for the purpose of

4-14

establishing personal relationships with other users through direct or real-time communication

4-15

with other users or the creation of web pages or profiles available to the public or to other users.

4-16

     (2) “Electronic mail” means an electronic mail message sent through the use of an

4-17

electronic mail program or a message board program.

4-18

     (3) “Identifying information” means information that alone or in conjunction with other

4-19

information identifies a person, including a person's:

4-20

     (i) Name, social security number, date of birth, or government-issued identification

4-21

number;

4-22

     (ii) Unique biometric data, including the person's fingerprint, voice print or retina or iris

4-23

image;

4-24

     (iii) Unique electronic identification number, electronic mail address, routing code or

4-25

financial institution account number; and

4-26

     (iv) Telecommunication identifying information or access device.

4-27

     (4) “Public official” means a person elected by the public or elected or appointed by a

4-28

governmental body or an appointed official in the executive, legislative, or judicial branch of the

4-29

state or any political subdivision thereof.

4-30

     (b) A person commits the crime of online impersonation if the person:

4-31

     (1) Uses the name or persona of another person to create a web page on or to post one or

4-32

more messages on a commercial social networking site or sends an electronic mail, instant

4-33

message, text message or similar communication without obtaining the other person's consent and

4-34

with the intent to harm, defraud, intimidate or threaten any person;

5-1

     (2) Sends an electronic mail, instant message, text message or similar communication that

5-2

references a name, domain address, telephone number or other item of identifying information

5-3

belonging to any person without obtaining the other person's consent, with the intent to cause a

5-4

recipient of the communication to reasonably believe that the other person authorized or

5-5

transmitted the communication and with the intent to harm or defraud any person; or

5-6

     (3) Uses the name or persona of a public official to create a web page on or to post one or

5-7

more messages on a commercial social networking site or sends an electronic mail, instant

5-8

message, text message or similar communication without obtaining the public official's consent

5-9

and with the intent to induce another to submit to such pretended official authority, to solicit

5-10

funds or otherwise to act in reliance upon that pretense to the other person's detriment.

5-11

     (c) Whoever violates this section shall be guilty of a felony and subject to imprisonment

5-12

for not more than three (3) years, or fined not more than two thousand dollars ($2,000), or both.

5-13

     SECTION 4. Section 11-52-1 of the General Laws in Chapter 11-52 entitled “Computer

5-14

Crime” is hereby amended to read as follows:

5-15

     11-52-1. Definitions. - As used in this chapter:

5-16

     (1) "Access" means to approach, instruct, communicate with, store data in, enter data in,

5-17

retrieve data from, or otherwise make use of any resources of, a computer, computer system, or

5-18

computer network.

5-19

     (2) "Computer" means an electronic, magnetic, optical, hydraulic or organic device or

5-20

group of devices which, pursuant to a computer program, to human instruction, or to permanent

5-21

instructions contained in the device or group of devices, can automatically perform computer

5-22

operations with or on computer data and can communicate the results to another computer or to a

5-23

person. The term "computer" includes any connected or directly related device, equipment, or

5-24

facility which enables the computer to store, retrieve or communicate computer programs,

5-25

computer data or the results of computer operations to or from a person, another computer or

5-26

another device.

5-27

     (3) "Computer data" means any representation of information, knowledge, facts,

5-28

concepts, or instructions which is being prepared or has been prepared and is intended to be

5-29

processed, is being processed, or has been processed in a computer or computer network.

5-30

"Computer data" may be in any form, whether readable only by a computer or only by a human

5-31

or by either, including, but not limited to, computer printouts, magnetic storage media, punched

5-32

cards, or data stored internally in the memory of the computer.

5-33

     (4) "Computer network" means a set of related, remotely connected devices, and any

5-34

communications facilities including more than one computer with the capability to transmit data

6-1

among them through the communications facilities.

6-2

     (5) "Computer operation" means arithmetic, logical, monitoring, storage or retrieval

6-3

functions and any combination of them, and includes, but is not limited to, communication with,

6-4

storage of data to, or retrieval of data from any device or human hand manipulation of electronic

6-5

or magnetic impulses. A "computer operation" for a particular computer may also be any function

6-6

for which that computer was generally designed.

6-7

     (6) "Computer program" means a series of instructions or statements or related data that,

6-8

in actual or modified form, is capable of causing a computer or a computer system to perform

6-9

specified functions in a form acceptable to a computer, which permits the functioning of a

6-10

computer system in a manner designed to provide appropriate products from the computer

6-11

systems.

6-12

     (7) "Computer services" includes computer time or services, data processing services,

6-13

Internet service providers' networks and facilities located in the state or information or data stored

6-14

in connection with them.

6-15

     (8) "Computer software" means a set of computer programs, procedures, and associated

6-16

documentation concerned with the operation of a computer, computer program or computer

6-17

network.

6-18

     (9) "Computer system" means a set of related, connected or unconnected, computer

6-19

equipment, devices, and software.

6-20

     (10) “Confidential Information” means data that is protected from disclosure on the

6-21

protected computer, computer program, computer system or computer network and that the

6-22

computer, computer program, computer system or computer network does not transmit or

6-23

disclose unless initiated by the owner of such protected computer, computer program, computer

6-24

system or computer network.

6-25

      (10)(11) "Data" means any representation of information, knowledge, facts, concepts, or

6-26

instructions which are being prepared or have been prepared and are intended to be entered,

6-27

processed, or stored, are being entered, processed, or stored or have been entered, processed, or

6-28

stored in a computer, computer system, or computer network.

6-29

     (11)(12) "Electronic mail service provider" means any business or organization qualified

6-30

to do business in the state of Rhode Island that provides registered users the ability to send or

6-31

receive electronic mail through equipment located in this state and that is an intermediary in

6-32

sending or receiving electronic mail.

6-33

     (12)(13) "Financial instrument" includes, but is not limited to, any check, draft, warrant,

6-34

money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card

7-1

transaction authorization mechanism, marketable security, or any computerized representation of

7-2

any of these.

7-3

     (13) (14) "Owner" means an owner or lessee of a computer or a computer network or an

7-4

owner, lessee, or licensee of computer data, computer programs, or computer software.

7-5

     (14)(15) "Person" shall include any individual, partnership, association, corporation or

7-6

joint venture.

7-7

     (15)(16) "Property" includes, but is not limited to:

7-8

     (i) Real property;

7-9

     (ii) Computers and computer networks;

7-10

     (iii) Financial instruments, computer data, computer programs, computer software and all

7-11

other personal property regardless of whether they are:

7-12

     (A) Tangible or intangible;

7-13

     (B) In a format readable by humans or by a computer;

7-14

     (C) In transit between computers or within a computer network or between any devices

7-15

which comprise a computer; or

7-16

     (D) Located on any paper or in any device on which it is stored by a computer or by a

7-17

human; and

7-18

     (E) Computer services.

7-19

     (iv) A person "uses" a computer or computer network when he or she:

7-20

     (A) Attempts to cause or causes a computer or computer network to perform or to stop

7-21

performing computer operations;

7-22

     (B) Attempts to cause or causes the withholding or denial of the use of a computer,

7-23

computer network, computer program, computer data or computer software to another user; or

7-24

     (C) Attempts to cause or causes another person to put false information into a computer.

7-25

     (v) A person is "without authority" when: (A) he or she has no right or permission of the

7-26

owner to use a computer, or, he or she uses a computer in a manner exceeding his or her right or

7-27

permission or (B) he or she uses an Internet service e-mail system offered by a Rhode Island

7-28

based Internet service provider in contravention of the authority granted by or in violation of the

7-29

policies set by the Internet service provider.

7-30

     (vi) Transmission of electronic mail from an organization to its members shall not be

7-31

deemed to be unsolicited bulk electronic mail.

7-32

     (16)(17) "Services" includes, but is not limited to, computer time, data processing, and

7-33

storage functions.

8-34

     (18) “Social Network Site” means (i) A service accessible on a world wide web domain

8-35

whose primary purpose is to facilitate online social interaction among groups of members for

8-36

primarily social purposes, and which integrates the following features within the unique profile

8-37

web pages of is registered members:

8-38

     (A) The ability of members, including minors, to post a name or nickname in

8-39

combination with, photographs, multimedia and other personal information about the member on

8-40

the profile web page;

8-41

     (B) The ability for members, including minors, to establish interactive links from their

8-42

profile web pages to one or more profile web pages of other members of the same social

8-43

networking service;

8-44

     (C) The ability for members of, or visitors to, the social networking service to leave

8-45

messages or comments on a member’s profile web page that are visible to all or some visitors to

8-46

that page;

8-47

     (D) The ability of members of, or visitors to, the social networking service to search for

8-48

members according to their age, gender, location, or interests in combination with age; and

8-49

     (E) The ability of members to communicate through an embedded electronic mail feature.

8-50

     (ii) A social networking site does not include:

8-51

     (A) Discrete email, instant message, chat room, message board or other communication

8-52

functionalities; or

8-53

     (B) A service whose primary purpose is the facilitation of commercial transactions

8-54

between its members or visitors.

8-55

     (17)(19) "Source document" means an original document or record which forms the basis

8-56

of every electronic entry put into a computer, computer system, or computer network.

8-57

     SECTION 5. Section 11-64-1 of the General Laws in Chapter 11-64 entitled "Electronic

8-58

Imaging Devices" is hereby amended to read as follows:

8-59

     11-64-1. Definitions. -

8-60

      (1) For the purposes of this section the following definitions apply:

8-61

     (a) "Disseminate" means to make available by any means to any person.

8-62

     (b) "Imaging Device" means any electronic instrument capable of capturing, recording,

8-63

storing or transmitting visual images.

8-64

     (c) "Intimate areas" means the naked or undergarment clad genitals, pubic area, buttocks,

8-65

or any portion of the female breast below the top of the areola of a person which the person

8-66

intended to be protected from public view.

8-67

     (d) "Legal entity" means any partnership, firm, association, corporation or any agent or

8-68

servant thereof.

9-1

     (e) "Publish" means to:

9-2

     (i) Disseminate with the intent that such image or images be made available by any

9-3

means to any person or other legal entity;

9-4

     (ii) Disseminate with the intent such images be sold by another person or legal entity;

9-5

     (iii) Post, present, display, exhibit, circulate, advertise or allow access by any means, so

9-6

as to make an image or images available to the public; or

9-7

     (iv) Disseminate with the intent that an image or images be posted, presented, displayed,

9-8

exhibited, circulated, advertised or made accessible by any means, and to make such images

9-9

available to the public.

9-10

     (f) "Sell" means to disseminate to another person, or to publish, in exchange for

9-11

something of value.

9-12

     (g) “Sexually explicit conduct” means actual:

9-13

     (i) Graphic sexual intercourse, including genital-genital, oral-genital, anal-genital, or

9-14

oral-anal, or lascivious sexual intercourse where the genitals, or pubic area of any person is

9-15

exhibited;

9-16

     (ii) Bestiality;

9-17

     (iii) Masturbation; or

9-18

     (iv) Sadistic or masochistic abuse.

9-19

     SECTION 6. Chapter 11-64 of the General Laws entitled “Electronic Imaging Devices”

9-20

is hereby amended by adding thereto the following section:

9-21

     11-64-3. Unauthorized Dissemination of Indecent Material. – (a) A person is guilty of

9-22

unauthorized dissemination of indecent material when such person uses an imaging device to

9-23

capture, record, or store visual images of another person eighteen (18) years of age or older

9-24

engaged in sexually explicit conduct or of the intimate areas of another person, with or without

9-25

that other person's knowledge and consent, under circumstances in which that other person would

9-26

have a reasonable expectation of privacy, and, thereafter, without the consent of the person or all

9-27

persons depicted in the visual image, intentionally disseminates, publishes, or sells such visual

9-28

image or images.

9-29

     (b) Constitutionally protected activity is not subject to the provisions of this section.

9-30

     (c) Whoever violates this section shall not be subject to sex offender registration

9-31

requirements set forth in section 11-37.1-1 et seq., entitled “Sexual Offender Registration and

9-32

Community Notification Act.”

9-33

     (d) Whoever violates this section shall be subject to imprisonment for not more than three

9-34

(3) years or fined not more than five thousand dollars ($5000), or both.

10-1

     SECTION 7. Section 11-37.1-2 of the General Laws in Chapter 11-37.1 entitled “Sexual

10-2

Offender Registration and Community Notification” is hereby amended to read as follows:

10-3

     11-37.1-2. Definitions. -- (a) "Aggravated offense" means and includes offenses

10-4

involving sexual penetration of victims of any age through the use of force or the threat of use of

10-5

force or offenses involving sexual penetration of victims who are fourteen (14) years of age or

10-6

under.

10-7

      (b) "Board", "board of review", or "sex offender board of review" means the sex

10-8

offender board of review appointed by governor pursuant to section 11-37.1-6.

10-9

      (c) (1) "Conviction" or "convicted" means and includes any instance where:

10-10

      (i) A judgment of conviction has been entered against any person for any offense

10-11

specified in subsection (e) or (k) of this section, regardless of whether an appeal is pending; or

10-12

      (ii) There has been a finding of guilty for any offense specified in subsection (e) or (k) of

10-13

this section, regardless of whether an appeal is pending; or

10-14

      (iii) There has been a plea of guilty or nolo contendere for any offense specified in

10-15

subsection (e) or (k) of this section, regardless of whether an appeal is pending; or

10-16

      (iv) There has been an admission of sufficient facts or a finding of delinquency for any

10-17

offense specified in subsection (e) or (k) of this section, regardless of whether or not an appeal is

10-18

pending.

10-19

      (2) Provided, in the event that a conviction, as defined in this subsection, has been

10-20

overturned, reversed, or otherwise vacated, the person who was the subject of the conviction shall

10-21

no longer be required to register as required by this chapter and any records of a registration shall

10-22

be destroyed. Provided, further that nothing in this section shall be construed to eliminate a

10-23

registration requirement of a person who is again convicted of an offense for which registration is

10-24

required by this chapter.

10-25

      (d) [Deleted by P.L. 2003, ch. 162, section 1 and by P.L. 2003, ch. 170, section].

10-26

      (e) "Criminal offense against a victim who is a minor" means and includes any of the

10-27

following offenses or any offense in another jurisdiction which is substantially the equivalent of

10-28

the following or for which the person is or would be required to register under 42 U.S.C. section

10-29

14071 or 18 U.S.C. section 4042(c):

10-30

      (1) Kidnapping or false imprisonment of a minor, in violation of section 11-26-1.4, 11-

10-31

26-1 or 11-26-2, where the victim of the offense is sixteen (16) years of age or older and under

10-32

the age of eighteen (18) years;

10-33

      (2) Enticement of a child in violation of section 11-26-1.5 with the intent to violate

10-34

sections 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3;

11-1

      (3) Any violation of section 11-37-6, 11-37-8, 11-37-8.1, or 11-37-8.3;

11-2

      (4) Any violation of section 11-1-10, where the underlying offense is a violation of

11-3

chapter 34 of this title and the victim or person solicited to commit the offense is under the age of

11-4

eighteen (18) years;

11-5

      (5) Any violation of section 11-9-1(b) or (c); or

11-6

      (6) Any violation of section 11-9-1.3 and/or section 11-9-1.5;

11-7

      (7) Any violation of section 11-37.1-10;

11-8

      (8) Any violation of section 11-37-8.8;

11-9

      (9) Any violation of section 11-64-2 where the victim is under the age of eighteen (18)

11-10

years; or

11-11

      (10) Murder in violation of section 11-23-1 where the murder was committed in the

11-12

perpetration of, or attempted perpetration of, kidnapping and where the victim of the offense is

11-13

under eighteen (18) years of age.

11-14

      (f) "Designated state law enforcement agency" means the attorney general or his or her

11-15

designee.

11-16

      (g) "Employed, carries on a vocation" means and includes the definition of "employed,

11-17

carries on a vocation" under 42 U.S.C. section 14071.

11-18

      (h) "Institutions of higher education" means any university, two (2) or four (4) year

11-19

college or community college.

11-20

      (i) "Mental abnormality" means a congenital or acquired condition of a person that

11-21

affects the emotional or volitional capacity of the person in a manner that predisposes that person

11-22

to the commission of criminal sexual acts to a degree that makes the person a menace to the

11-23

health and safety of other persons.

11-24

      (j) "Predator" means a person whose act(s) is (are) or was (were) directed at a stranger,

11-25

or at a person with whom a relationship has been established or promoted for the primary purpose

11-26

of victimization.

11-27

      (k) "Sexually violent offense" means and includes any violation of section 11-37-2, 11-

11-28

37-4, 11-37-6, 11-37-8, 11-37-8.1, 11-37-8.3, or 11-5-1 where the specified felony is sexual

11-29

assault, or section 11-23-1 where the murder was committed in the perpetration of, or attempted

11-30

perpetration of, rape or any degree of sexual assault or child molestation, or any offense in

11-31

another jurisdiction which is substantially the equivalent of any offense listed in this subsection or

11-32

for which the person is or would be required to register under 42 U.S.C. section 14071 or 18

11-33

U.S.C. section 4042(c).

12-34

      (l) "Sexually violent predator" means a person who has been convicted of a sexually

12-35

violent offense and who has a mental abnormality or personality disorder that makes the person

12-36

likely to engage in predatory sexually violent offenses.

12-37

      (m) "Student" means and includes the definition of "student" under 42 U.S.C. section

12-38

14071.

12-39

      (n) "Parole board" means the parole board or its designee.

12-40

     SECTION 8. Nothing in this act may be construed to provide a basis for a private right

12-41

of action against an interactive computer service, as defined in 47 U.S.C. § 230, or a

12-42

telecommunications carrier as used by another person to violate this act, for content provided by

12-43

such person or by another information content provider.

12-44

     SECTION 9. This act shall take effect upon passage.

     

     

=======

LC00306

========

EXPLANATION

BY THE LEGISLATIVE COUNCIL

OF

A N A C T

RELATING TO CRIMINAL OFFENSES - COMPUTER CRIME

***

13-1

     This act would amend various chapters and provisions of the general laws to create to

13-2

additional offenses relating to Internet activity.

13-3

     This act would take effect upon passage.

     

=======

LC00306

=======

S2647