State Codes and Statutes

Statutes > North-carolina > Chapter_14 > GS_14-454

§14‑454.  Accessing computers.

(a)        It is unlawful towillfully, directly or indirectly, access or cause to be accessed any computer,computer program, computer system, computer network, or any part thereof, forthe purpose of:

(1)        Devising orexecuting any scheme or artifice to defraud, unless the object of the scheme orartifice is to obtain educational testing material, a false educational testingscore, or a false academic or vocational grade, or

(2)        Obtaining propertyor services other than educational testing material, a false educationaltesting score, or a false academic or vocational grade for a person, by meansof false or fraudulent pretenses, representations or promises.

A violation of this subsectionis a Class G felony if the fraudulent scheme or artifice results in damage ofmore than one thousand dollars ($1,000), or if the property or servicesobtained are worth more than one thousand dollars ($1,000). Any other violationof this subsection is a Class 1 misdemeanor.

(b)        Any person whowillfully and without authorization, directly or indirectly, accesses or causesto be accessed any computer, computer program, computer system, or computernetwork for any purpose other than those set forth in subsection (a) above, isguilty of a Class 1 misdemeanor.

(c)        For the purpose ofthis section, the phrase "access or cause to be accessed" includesintroducing, directly or indirectly, a computer program (including a self‑replicatingor a self‑propagating computer program) into a computer, computerprogram, computer system, or computer network. (1979, c. 831, s. 1; 1979,2nd Sess., c. 1316, s. 19; 1981, cc. 63, 179; 1993, c. 539, s. 293; 1994, Ex.Sess., c. 24, s. 14(c); 1993 (Reg. Sess., 1994), c. 764, s. 1; 2000‑125,s. 4.)

State Codes and Statutes

Statutes > North-carolina > Chapter_14 > GS_14-454

§14‑454.  Accessing computers.

(a)        It is unlawful towillfully, directly or indirectly, access or cause to be accessed any computer,computer program, computer system, computer network, or any part thereof, forthe purpose of:

(1)        Devising orexecuting any scheme or artifice to defraud, unless the object of the scheme orartifice is to obtain educational testing material, a false educational testingscore, or a false academic or vocational grade, or

(2)        Obtaining propertyor services other than educational testing material, a false educationaltesting score, or a false academic or vocational grade for a person, by meansof false or fraudulent pretenses, representations or promises.

A violation of this subsectionis a Class G felony if the fraudulent scheme or artifice results in damage ofmore than one thousand dollars ($1,000), or if the property or servicesobtained are worth more than one thousand dollars ($1,000). Any other violationof this subsection is a Class 1 misdemeanor.

(b)        Any person whowillfully and without authorization, directly or indirectly, accesses or causesto be accessed any computer, computer program, computer system, or computernetwork for any purpose other than those set forth in subsection (a) above, isguilty of a Class 1 misdemeanor.

(c)        For the purpose ofthis section, the phrase "access or cause to be accessed" includesintroducing, directly or indirectly, a computer program (including a self‑replicatingor a self‑propagating computer program) into a computer, computerprogram, computer system, or computer network. (1979, c. 831, s. 1; 1979,2nd Sess., c. 1316, s. 19; 1981, cc. 63, 179; 1993, c. 539, s. 293; 1994, Ex.Sess., c. 24, s. 14(c); 1993 (Reg. Sess., 1994), c. 764, s. 1; 2000‑125,s. 4.)


State Codes and Statutes

State Codes and Statutes

Statutes > North-carolina > Chapter_14 > GS_14-454

§14‑454.  Accessing computers.

(a)        It is unlawful towillfully, directly or indirectly, access or cause to be accessed any computer,computer program, computer system, computer network, or any part thereof, forthe purpose of:

(1)        Devising orexecuting any scheme or artifice to defraud, unless the object of the scheme orartifice is to obtain educational testing material, a false educational testingscore, or a false academic or vocational grade, or

(2)        Obtaining propertyor services other than educational testing material, a false educationaltesting score, or a false academic or vocational grade for a person, by meansof false or fraudulent pretenses, representations or promises.

A violation of this subsectionis a Class G felony if the fraudulent scheme or artifice results in damage ofmore than one thousand dollars ($1,000), or if the property or servicesobtained are worth more than one thousand dollars ($1,000). Any other violationof this subsection is a Class 1 misdemeanor.

(b)        Any person whowillfully and without authorization, directly or indirectly, accesses or causesto be accessed any computer, computer program, computer system, or computernetwork for any purpose other than those set forth in subsection (a) above, isguilty of a Class 1 misdemeanor.

(c)        For the purpose ofthis section, the phrase "access or cause to be accessed" includesintroducing, directly or indirectly, a computer program (including a self‑replicatingor a self‑propagating computer program) into a computer, computerprogram, computer system, or computer network. (1979, c. 831, s. 1; 1979,2nd Sess., c. 1316, s. 19; 1981, cc. 63, 179; 1993, c. 539, s. 293; 1994, Ex.Sess., c. 24, s. 14(c); 1993 (Reg. Sess., 1994), c. 764, s. 1; 2000‑125,s. 4.)