Computer Crime Statutes
Computer crime laws encompass a variety of actions that destroy or interfere with normal operation of a computer system, including the following types of actions, among others.
Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings. When malicious in nature, these break-ins may cause damage or disruption to computer systems or networks. People with malevolent intent are referred to as "crackers"--as in "cracking" into computers.
"Unauthorized access" entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to either or both, or any other actions that interfere with computers, systems, programs or networks.
Viruses or contaminants are a set of computer instructions that are designed to modify, damage, destroy, record, or transmit information within a computer system or network without the permission of the owner. Generally, they are designed to infect other computer programs or computer data, consume resources, modify, destroy, record or transmit data, and disrupt normal operation of a computer system.