The "Georgia Computer Systems Protection Act" is an act enacted
by the 1991 Georgia General Assembly and signed into law by the
Governor effective July 1, 1991 which repealed and replaced an
act having the same name enacted by the 1981 Georgia General
Assembly and signed into law by the Governor effective
July 1, 1981. This act establishes certain acts involving
computer fraud or abuse as crimes punishable by defined fines
or imprisonment or both.
AN ACT
To amend Chapter 9 of Title 16 of the Official Code of Georgia
Annotated, relating to crimes involving forgery and fraudulent
practices, so as to repeal the existing "Georgia Computer
Systems Protection Act" and enact a new "Georgia Computer
Systems Protection Act"; to provide for legislative intent; to
provide for definitions; to provide for criminal liability and
penalties for the crimes of computer theft, computer trespass,
computer invasion of privacy, computer forgery, and computer
password disclosure; to provide for civil remedies and damages;
to provide for venue; to provide for other related matters; to
provide an effective date; to repeal conflicting laws; and for
other purposes.
BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:
Section 1. Chapter 9 of Title 16 of the Official Code of
Georgia Annotated, relating to crimes involving
forgery and fraudulent practices, is amended by
repealing in its entirety Article 6, the
"Georgia Computer Systems Protection Act," and
inserting in its place a new Article 6 to read
as follows:
"ARTICLE 6
16-9-90. This article may be cited as the 'Georgia Computer
Systems Protection Act.'
16-9-91. The General Assembly finds that:
(1) Computer related crime is a growing problem in
the government and in the private sector;
(2) Such crime occurs at great cost to the public,
since losses for each incident of computer crime
tend to be far greater than the losses
associated with each incident of other white
collar crime;
Page 2
(3) The opportunities for computer related crimes in
state programs, and in other entities which
operate within the state, through the
introduction of fraudulent records into a
computer system, unauthorized use of computer
facilities, alteration or destruction of
computerized information files, and stealing of
financial instruments, data, or other assets are
great;
(4) Computer related crime operations have a direct
effect on state commerce;
(5) Liability for computer crimes should be imposed
on all persons, as that term is defined in this
title; and
(6) The prosecution of persons engaged in computer
related crime is difficult under previously
existing Georgia criminal statutes.
16-9-92. As used in this article, the term:
(1) 'Computer' means an electronic, magnetic,
optical, electrochemical, or other high-speed
data processing device or system performing
computer operations with or on data and includes
any data storage facility or communications
facility directly related to or operating in
conjunction with such device; but such term does
not include an automated typewriter or
typesetter, portable hand-held calculator,
household appliance, or other similar device
that is not used to communicate with or to
manipulate any other computer.
(2) 'Computer network' means a set of related,
remotely connected computers and any
communications facilities with the function and
purpose of transmitting data among them through
the communications facilities.
(3) 'Computer operation' means computing,
classifying, transmitting, receiving,
retrieving, originating, switching, storing,
displaying, manifesting, measuring, detecting,
recording, reproducing, handling, or utilizing
any form of data for business, scientific,
control, or other purposes.
(4) 'Computer program' means one or more statements
or instructions composed and structured in a
form acceptable to a computer that, when
executed by a computer in actual or modified
form, cause the computer to perform one or more
computer operations. The term 'computer program'
shall include all associated procedures and
documentation, whether or not such procedures
and documentation are in human readable form.
Page 3
(5) 'Data' includes any representation of
information, intelligence, or data in any fixed
medium, including documentation, computer
printouts, magnetic storage media, punched
cards, storage in a computer, or transmission by
a computer network.
(6) 'Financial instruments' includes any check,
draft, money order, note, certificate of
deposit, letter of credit, bill of exchange,
credit or debit card, transaction-authorizing
mechanism or marketable security, or any
computer representation thereof.
(7) 'Property' includes computers, computer
networks, computer programs, data, financial
instruments, and services.
(8) 'Services' includes computer time or services or
data processing services.
(9) 'Use' includes causing or attempting to cause:
(A) A computer or computer network to perform
or to stop performing computer operations;
(B) The obstruction, interruption, malfunction,
or denial of the use of a computer,
computer network, computer program, or
data; or
(C) A person to put false information into a
computer.
(10) 'Victim expenditure' means any expenditure
reasonably and necessarily incurred by the owner
to verify that a computer, computer network,
computer program, or data was or was not
altered, deleted, damaged, or destroyed by
unauthorized use.
(11) 'Without authority' includes the use of a
computer or computer network in a manner that
exceeds any right or permission granted by the
owner of the computer or computer network.
16-9-93. (a) Computer Theft. Any person who uses a computer
or computer network with knowledge that such use
is without authority and with the intention of:
(1) Taking or appropriating any property of
another, whether or not with the intention
of depriving the owner of possession;
(2) Obtaining property by any deceitful means
or artful practice; or
Page 4
(3) Converting property to such person's use in
violation of an agreement or other known
legal obligation to make a specified
application or disposition of such property
shall be guilty of the crime of computer theft.
(b) Computer Trespass. Any person who uses a
computer or computer network with knowledge that
such use is without authority and with the
intention of:
(1) Deleting or in any way removing, either
temporarily or permanently, any computer
program or data from a computer or computer
network;
(2) Obstructing, interrupting, or in any way
interfering with the use of a computer
program or data; or
(3) Altering, damaging, or in any way causing
the malfunction of a computer, computer
network, or computer program, regardless of
how long the alteration, damage, or
malfunction persists
shall be guilty of the crime of computer
trespass.
(c) Computer Invasion of Privacy. Any person who
uses a computer or computer network with the
intention of examining any employment, medical,
salary, credit, or any other financial or
personal data relating to any other person with
knowledge that such examination is without
authority shall be guilty of the crime of
computer invasion of privacy.
(d) Computer Forgery. Any person who creates,
alters, or deletes any data contained in any
computer or computer network, who, if such
person had created, altered, or deleted a
tangible document or instrument would have
committed forgery under Article 1 of this
chapter, shall be guilty of the crime of
computer forgery. The absence of a tangible
writing directly created or altered by the
offender shall not be a defense to the crime of
computer forgery if a creation, alteration, or
deletion of data was involved in lieu of a
tangible document or instrument.
Page 5
(e) Computer Password Disclosure. Any person who
discloses a number, code, password, or other
means of access to a computer or computer
network knowing that such disclosure is without
authority and which results in damages
(including the fair market value of any services
used and victim expenditure) to the owner of the
computer or computer network in excess of
$500.00 shall be guilty of the crime of computer
password disclosure.
(f) Article not Exclusive. The provisions of this
article shall not be construed to preclude the
applicability of any other law which presently
applies or may in the future apply to any
transaction or course of conduct which violates
this article.
(g) Civil Relief; Damages.
(1) Any person whose property or person is
insured by reason of a violation of any
provision of this article may sue therefor
and recover for any damages sustained and
the costs of suit. Without limiting the
generality of the term, 'damages' shall
include loss of profits and victim
expenditure.
(2) At the request of any party to an action
brought pursuant to this Code section, the
court shall by reasonable means conduct all
legal proceedings in such a way as to
protect the secrecy and security of any
computer, computer network, data, or
computer program involved in order to
prevent possible recurrence of the same or
a similar act by another person and to
protect any trade secrets of any party.
(3) The provisions of this article shall not be
construed to limit any person's right to
pursue any additional civil remedy
otherwise allowed by law.
(4) A civil action under, this Code section
must be brought within four years after the
violation is discovered or by exercise of
reasonable diligence should have been
discovered. For purposes of this article,
a continuing violation of any one
subsection of this Code section by any
person constitutes a single violation by
such person.
Page 6
(h) Criminal Penalties.
(1) Any person convicted of the crime of
computer theft, computer trespass, computer
invasion of privacy, or computer forgery
shall be fined not more than $50,000.00
or imprisoned not more than 15 years, or
both.
(2) Any person convicted of computer password
disclosure shall be fined not more than
$5,000.00 or incarcerated for a period not
to exceed one year, or both.
16-9-94. For the purpose of venue under this article, any
violation of this article shall be considered to have
been committed:
(1) In the county of the principal place of business
in this state of the owner of a computer,
computer network, or any part thereof; and,
(2) In any county in which any person alleged to
have violated any provision of this article had
control or possession of any proceeds of the
violation or of any books, records, documents,
or property which were used in furtherance of
the violation; and,
(3) In any county in which any act was performed in
furtherance of any transaction which violated
this article; and,
(4) In any county from which, to which, or through
which any use of a computer or computer network
was made, whether by wires, electro-magnetic
waves, microwaves, or any other means of
communication."
Section 2. This Act shall become effective on July 1, 1991.
Section 3. All laws and parts of laws in conflict with this
Act are repealed.