CODE OF ALABAMA 1975
      Copyright (c) 1977-1989 by State of Alabama.  All rights reserved.
                           TITLE 13A. CRIMINAL CODE.
                     CHAPTER 8. OFFENSES INVOLVING THEFT.
                    ARTICLE 1. THEFT AND RELATED OFFENSES.

s 13A-8-10. Theft of services -- Definition.

  (a) A person commits the CRIME of theft of services if:
   (1) He intentionally obtains services known by him to be available only for
  compensation by deception, threat, false token or other means to avoid
  payment for the services; or
   (2) Having control over the disposition of services of others to which he is
  not entitled, he knowingly diverts those services to his own benefit or to
  the benefit of another not entitled thereto.
  (b) "Services" includes but is not necessarily limited to labor, professional
services, transportation, telephone or other public services, accommodation in
motels, hotels, restaurants or elsewhere, admission to exhibitions, COMPUTER se
rvices and the supplying of equipment for use.
  (c) Where compensation for services is ordinarily paid immediately upon the
rendering of them, as in the case of motels, hotels, restaurants and the like,
absconding without payment or bona fide offer to pay is prima facie evidence
under subsection (a) that the services were obtained by deception.
  (d) If services are obtained under subdivision (a) (1) from a hotel, motel,
inn, restaurant or cafe, no prosecution can be commenced after 120 days from
the time of the offense.

  (Acts 1977, No. 607, p. 812, s 3210; Acts 1978, No. 770, p. 1110, s 1; Acts
1979, No. 79-471, p. 862, s 1.)


                             CODE OF ALABAMA 1975
      Copyright (c) 1977-1989 by State of Alabama.  All rights reserved.
                           TITLE 13A. CRIMINAL CODE.
                     CHAPTER 8. OFFENSES INVOLVING THEFT.
                    ARTICLE 5. ALABAMA COMPUTER CRIME ACT.

s 13A-8-100. Short title.

  This article may be cited as the Alabama COMPUTER CRIME Act.

  (Acts 1985, No. 85-383, s 1, p. 326.)


s 13A-8-101. Definitions.

  When used in this chapter, the following terms shall have the following
meanings, respectively, unless a different meaning clearly appears from the
context:
   (1) Data. A representation of information, knowledge, facts, concepts, or
  instructions which are being prepared or have been prepared in a formalized
  manner, and is intended to be processed, is being processed, or has been
  processed in a COMPUTER system or COMPUTER network, and should be classified
  as intellectual property, and may be in any form, including COMPUTER
  printouts, magnetic storage media, punched cards, or stored internally in the
  memory of the COMPUTER.
   (2) Intellectual property. Data, including COMPUTER program.
   (3) COMPUTER program. An ordered set of data representing coded instructions
  or statements that, when executed by a COMPUTER, cause the COMPUTER to
  process data.
   (4) COMPUTER. An electronic magnetic, optical or other high speed data
  processing device or system which performs logical, arithmetic, and memory
  functions by manipulations of electronic magnetic or optical impulses, and
  includes all input, output, processing, storage, COMPUTER software, or
  communication facilities which are connected or related to the COMPUTER in a
  COMPUTER system or COMPUTER network.
   (5) COMPUTER software. A set of COMPUTER programs, procedures, and
  associated documentation concerned with the operation of a COMPUTER, COMPUTER
  system or COMPUTER network.
   (6) COMPUTER system. A set of related, connected or unconnected, COMPUTER
  equipment, devices, or COMPUTER software.
   (7) COMPUTER network. A set of related, remotely connected devices and
  communication facilities, including more than one COMPUTER system, with
  capability to transmit data among them through communication facilities.
   (8) COMPUTER system services. The utilization of a COMPUTER, COMPUTER
  system, or COMPUTER network to assist an individual or entity with the
  performance of a particular lawful function which that individual or entity
has been given the right, duty, and power, together with the responsibility,
  to perform.
   (9) Property. Anything of value as defined by law, and includes financial
  instruments, information, including electronically produced data and COMPUTER
  software and COMPUTER programs in either machine or human readable form, and
  any other tangible or intangible items of value.
   (10) Financial instrument. Includes any check, draft, warrant, money order,
  note, certificate of deposit, letter of credit, bill of exchange, credit or
  debit card, transaction authorization mechanism, marketable security, or any
  COMPUTER system representation thereof.
   (11) Access. To instruct, communicate with, store data in, or retrieve data
  from a COMPUTER, COMPUTER system or COMPUTER network.

  (Acts 1985, No. 85-383, s 2, p. 326.)


s 13A-8-102. Acts constituting offenses against intellectual property;
  punishment.

  (a) Whoever willfully, knowingly, and without authorization or without
reasonable grounds to believe that he has such authorization, attempts or
achieves access, communication, examination, or modification of data, COMPUTER
programs, or supporting documentation residing or existing internal or external
to a COMPUTER, COMPUTER system, or COMPUTER network commits an offense against
intellectual property.
  (b) Whoever willfully, knowingly, and without authorization or without
reasonable grounds to believe that he has such authorization, destroys data,
COMPUTER programs, or supporting documentation residing or existing internal or
external to a COMPUTER, COMPUTER system, or COMPUTER network commits an offense
against intellectual property.
  (c) Whoever willfully, knowingly, and without authorization or without
reasonable grounds to believe that he has such authorization, discloses, uses,
or takes data, COMPUTER programs, or supporting documentation residing or
existing internal or external to a COMPUTER, COMPUTER system, or COMPUTER
network commits an offense against intellectual property.
   (d)(1) Except as otherwise provided in this subsection, an offense against
  intellectual property is a Class A misdemeanor, punishable as provided by
  law.
   (2) If the offense is committed for the purpose of devising or executing any
  scheme or artifice to defraud or to obtain any property, then the offender is
  guilty of a Class C felony, punishable as provided by law.
   (3) If the damage to such intellectual property is $2,500.00 or greater, or
  if there is an interruption or impairment of governmental operation or public
  communication, transportation, or supply of water, gas, or other public or
  utility service, then the offender is guilty of a Class B felony, punishable
  as provided by law.
   (4) Whoever willfully, knowingly, and without authorization alters or
  removes data causing physical injury to any person who is not involved in
  said act shall be guilty of a Class A felony, punishable as provided by law.


  (Acts 1985, No. 85-383, s 3, p. 326.)


s 13A-8-103. Acts constituting offense against COMPUTER equipment or supplies;
  punishment.

   (a)(1) Whoever willfully, knowingly, and without authorization or without
  reasonable grounds to believe that he has such authorization, modifies
  equipment or supplies that are used or intended to be used in a COMPUTER,
  COMPUTER system, or COMPUTER network commits an offense against COMPUTER
  equipment or supplies.
    (2)a. Except as provided in this subsection, an offense against COMPUTER
   equipment or supplies as provided in subdivision (a)(1) is a Class A
   misdemeanor, punishable as provided by law.
    b. If the offense is committed for the purpose of devising or executing any
   scheme or artifice to defraud or to obtain any property, then the offender i
s guilty of a Class C felony, punishable as provided by law.
   (b)(1) Whoever willfully, knowingly, and without authorization or without
  reasonable grounds to believe that he has such authorization, destroys, uses,
  takes, injures, or damages equipment or supplies used or intended to be used
  in a COMPUTER, COMPUTER system, or COMPUTER network, or whoever willfully,
  knowingly, and without authorization or without reasonable grounds to believe
  that he has such authorization, destroys, injures, takes, or damages any
  COMPUTER, COMPUTER system, or COMPUTER network commits an offense against
  COMPUTER equipment and supplies.
    (2)a. Except as provided in this subsection, an offense against COMPUTER
   equipment or supplies as provided in subdivision (b)(1) is a Class A
   misdemeanor, punishable as provided by law.
    b. If the damage to such COMPUTER equipment or supplies or to the COMPUTER,
   COMPUTER system, or COMPUTER network is $2,500.00 or greater, or if there is
   an interruption or impairment of governmental operation or public
   communication, transportation, or supply of water, gas, or other public
   utility service, then the offender is guilty of a Class B felony, punishable
   as provided by law.

  (Acts 1985, No. 85-383, s 4, p. 326.)