Thursday march 10th 2011 @8:38am ( discussion of /emails/monitoring of emails/ hacking/and florida computer crimes law!)





  


today on mornign Joe- discussion on privacy ont he internet led into discussion of governments restriction from  infringing on a person’s liberty or privacy BUT 

the allowance of internt marketing for gaining information to target specific adds to their consumers-( interesting discussion)

being an american who has lived overseas…  i take my right/freedoms  for  life liberty and the pursuit of happiness  as jsut basic rights that should be upheld… that should ramian constant.. and that should not be abused!

This discussion along with the  events of last evenings use of my internet service has  raised some questions concerning the rights for the freedom  speech…  but  also what laws would be broken should say the personal emails /blog entries be censered by a 3rd party! 

or for that matter anything done on the internet.. what if it is allowed to be   altered/manipulated…. ..( and what  if the altered information then paints an incorrect picture of who you are… how could it be corrected?  as for the marketing… or incorrect marketing… how  could this affect your life… 

  What if let’s say someone wanted to manputate /steal jobs or  even steal an entire business…. a business. a business that someoen or even a family worked really hard to create.. to protect… to manage and to promote….
 what laws protect the  origional and real company from such thieves?   

The day before yesterday i received  and sent out a series of emails to confirm jobs… and for correspondence   to set up  jobs.. 

To my knowledge my emails were sent… when i sent them form my email acconts the regualr acknowledgemetn of sent email showed in my box…
 but  they appeared to not have been received…. …( or possibly not received.  i still need to verify and check on status of the emails… )  Other people who were very deligent about their  follow up emails i havent heard from…. i know there have  also been tons of emails i sent out and responses i never received… 
(?) is it a glitch?   or a coisidence? or a criminal act…..

for example Andre from the apple store… I’ve repeatively emailed and not heard back fom him.  even questions to the police department.. or other authories who i’m sure are very careful to reply…. very odd. right? 

But if  by chance, the same group of conartists.. ie.. criminals who have the capacity to not only intercept phone messges (via spoofing)… and break all kinds of laws, ie… trespasssing, breaking and entering… and of course the stealing.. of not only physical  property… but also  files… and customer information.. and the intellicutal property via business ideas..  now if these ruthless and imoral people can do those things.. why wouldnt they also hack into acounts used by others… to fraudently gain information… from their competitors.. or their victims!      
 


Pose the question:  If someone believes they have a right to monitor you emails.. or for that matter what is posted on the internet via facebook or your own personal webbsite or blog.. by whose standards are  these restrictions or tampering with personal property  to be held accountable as infringement of that personal property ?  

another example:  what if you needed to  emai the polcie to notify them of a theft… yet the  theives are allowedo monitor yoru emails?  Woudl tye not intercept or mae sure that the email sent  to the police does not reach the actual police? 
Therefore, perpetuate  the  ability for them to comit crimes! 

  


Chapter 815, Florida Statutes






Fla. Stat. 815.01 Short Title


The provisions of this act shall be known and may be cited as the “Florida Computer Crimes Act.”






Stat. 815.02 Legislative Intent


The Legislature finds and declares that:





  1. Computer-related crime is a growing problem in government as well as in the private sector.



  2. Computer-related crime occurs at great cost to the public since losses for each incident of computer crime tend to be far greater than the losses associated with each incident of other white collar crime.



  3. The opportunities for computer-related crimes in financial institutions, government programs, government records, and other business enterprises through the introduction of fraudulent records into a computer system, the unauthorized use of computer facilities, the alteration or destruction of computerized information or files, and the stealing of financial instruments, data, and other assets, are great.



  4. While various forms of computer crime might possibly be the subject of criminal charges based on other provisions of law, it is appropriate and desirable that a supplemental and additional statute be provided which proscribes various forms of computer abuse.






Fla. Stat. 815.03 Definitions


As used in this chapter, unless the context clearly indicates otherwise:





  1. “Intellectual property” means data, including programs.



  2. “Computer program” means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data.



  3. “Computer” means an internally programmed, automatic device that performs data processing.



  4. “Computer software” means a set of computer programs, procedures, and associated documentation concerned with the operation of a computer system.



  5. “Computer system” means a set of related, connected or unconnected computer equipment, devices, or computer software.



  6. “Computer network” means a set of related, remotely connected devices and communication facilities including more than one computer system with the capability to transmit data among them through communication facilities.



  7. “Computer system services” means providing a computer system or computer network to perform useful work.



  8. “Property” means anything of value as defined in S.812.011 and includes, but is not limited to, financial instruments, information including electronically produced data and computer software and programs in either machine- or human-readable form, and any other tangible or intangible item of value.



  9. “Instrument” means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, or marketable security.



  10. “Access” means to approach, instruct, communicate with, store data, retrieve data, or otherwise make use of any resources of a computer, computer system, or computer network.






Fla. Stat. 815.04 Offenses against Intellectual Property






  1. Whoever willfully, knowingly, and without authorization modifies data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.



  2. Whoever willfully, knowingly, and without authorization destroys data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.



  3. Whoever willfully, knowingly, and without authorization discloses or takes data, programs, or supporting documentation which is a trade secret as defined in S.812.081 or is confidential as provided by law residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.






    1. Except as otherwise provided in this subsection, an offense against intellectual property is a felony of the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.



    2. If the offense is committed for the purpose of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony in the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.






Fla. Stat. 815.05 Offenses against Computer Equipment or Supplies










    1. Whoever willfully, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer, computer system, or computer network commits an offense against computer equipment or supplies.



    2. Except as provided in this paragraph an offense against computer equipment or supplies as provided in paragraph (a) is a misdemeanor of the first degree, punishable as provided in S.775.082, S.775.083, or S.775.084.



  1. If the offense is committed for the purpose of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony in the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.





    1. Whoever willfully, knowingly, and without authorization destroys, takes, injures, or damages equipment or supplies used or intended to be used in a computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization destroys, injures, or damages any computer, computer system, or computer network commits an offense against computer equipment or supplies.



    2. Except as provided in this paragraph an offense against computer equipment or supplies as provided in paragraph (a) is a misdemeanor of the first degree, punishable as provided in S.775.082, S.775.083, or S.775.084.



  2. If the damage to such computer equipment or supplies or to the computer, computer system, or computer network is greater than $200 but less than $1,000, then the offender is guilty of a felony of the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.



  3. If the damage to such computer equipment or supplies or to the computer, computer system, or computer network is $1,000 or greater, or if there is an interruption or impairment of governmental operation or public communication, transportation, or supply of water, gas, or other public service, then the offender is guilty of a felony of the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.






Fla. Stat. 815.06 Offenses against Computer Users






  1. Whoever willfully, knowingly, and without authorization accesses or causes to be accessed any computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization denies or causes the denial of computer system services to an authorized user of such computer system services, which, in whole or part, is owned by, under contract to, or operated for, on behalf of, or in conjunction with another commits an offense against computer users.







    1. Except as provided in this subsection an offense against computer users is a felony of the third degree, punish- able as provided in S.775.082, S.775.083, or S.775.084.



    2. If the offense is committed for the purposes of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony of the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.






Fla. Stat. 815.07 This Chapter Is Not Exclusive


The provisions of this chapter shall not be construed to preclude the applicability of any other provision of the criminal law of this state which presently applies or may in the future be applied to any transaction which violates this chapter, unless such provision is inconsistent with the terms of this chapter.






Fla. Stat. 815.08


If any provision of this act or the application thereof to any person or circumstance is held invalid, it is the legislative intent that the invalidity shall not affect other provisions or applications of the act which can be given effect without the invalid provisions or applications, and to this end the provisions of this act are severable.


This act shall take effect August 1, 1978.


Approved by the Governor May 29, 1978.


Filed in the Office Secretary of State May 30, 1978.






Summary of Fla. Stat. 775.082 and 775.083


(Below is a summary of the penalties applicable to the offenses described in the act. Penalties for habitual offenders are dealt with in S775.084, which is not included below.)


Misdemeanor of the First Degree. Up to 1 year of imprisonment and a fine of up to $1,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.


Felony of the Second Degree. Up to 15 years of imprisonment and a fine of up to $10,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.


Felony of the Third Degree. Up to 5 years of imprisonment and a fine of up to $5,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.






Your Comments are Welcome


We welcome your comments and suggestions on this and all CNS documentation. Please send your comments to:




CNS Information Services

2124 NE Waldo Rd, Suite 2100
Gainesville Florida  32609-8922
(352) 392.2061





UF Computing & Networking Services
2124 NE Waldo Rd, Suite 2100
Gainesville, Florida 32609-8922

Phone: (352) 392.2061
E-mail: editor@cns.ufl.edu










CNS DOCWEB Home

CNS Home Page

CNS Publications Page

Search All CNS Docs