1 | 1 | | 103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB1621 Introduced , by Rep. Dan Caulkins SYNOPSIS AS INTRODUCED: 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 Amends the Criminal Code of 2012. Provides that a person commits computer tampering when he or she knowingly and without the authorization of a computer's owner or in excess of the authority granted to him or her falsifies or forges electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission (rather than the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers). Provides that computer tampering by knowingly and without authorization of a computer's owner or in excess of the authority granted to him or her: (1) accessing or causing to be accessed a computer or any part thereof, a computer network, or a program or data; or (2) falsifying or forging electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission is a Class A (rather than a Class B) misdemeanor. Creates the offense of purchasing hacking software. Provides that a person commits the offense when he or she knowingly purchases hacking software with the intent to use or employ that software for the purpose of introduction into a computer, computer system, or computer network, without the authorization of the computer owner. Provides that a violation is a Class B misdemeanor. Defines "hacking software". LRB103 25558 RLC 51907 b A BILL FOR 103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB1621 Introduced , by Rep. Dan Caulkins SYNOPSIS AS INTRODUCED: 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 Amends the Criminal Code of 2012. Provides that a person commits computer tampering when he or she knowingly and without the authorization of a computer's owner or in excess of the authority granted to him or her falsifies or forges electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission (rather than the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers). Provides that computer tampering by knowingly and without authorization of a computer's owner or in excess of the authority granted to him or her: (1) accessing or causing to be accessed a computer or any part thereof, a computer network, or a program or data; or (2) falsifying or forging electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission is a Class A (rather than a Class B) misdemeanor. Creates the offense of purchasing hacking software. Provides that a person commits the offense when he or she knowingly purchases hacking software with the intent to use or employ that software for the purpose of introduction into a computer, computer system, or computer network, without the authorization of the computer owner. Provides that a violation is a Class B misdemeanor. Defines "hacking software". LRB103 25558 RLC 51907 b LRB103 25558 RLC 51907 b A BILL FOR |
---|
2 | 2 | | 103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB1621 Introduced , by Rep. Dan Caulkins SYNOPSIS AS INTRODUCED: |
---|
3 | 3 | | 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 |
---|
4 | 4 | | 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 |
---|
5 | 5 | | 720 ILCS 5/17-53 new |
---|
6 | 6 | | 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 |
---|
7 | 7 | | Amends the Criminal Code of 2012. Provides that a person commits computer tampering when he or she knowingly and without the authorization of a computer's owner or in excess of the authority granted to him or her falsifies or forges electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission (rather than the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers). Provides that computer tampering by knowingly and without authorization of a computer's owner or in excess of the authority granted to him or her: (1) accessing or causing to be accessed a computer or any part thereof, a computer network, or a program or data; or (2) falsifying or forging electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission is a Class A (rather than a Class B) misdemeanor. Creates the offense of purchasing hacking software. Provides that a person commits the offense when he or she knowingly purchases hacking software with the intent to use or employ that software for the purpose of introduction into a computer, computer system, or computer network, without the authorization of the computer owner. Provides that a violation is a Class B misdemeanor. Defines "hacking software". |
---|
8 | 8 | | LRB103 25558 RLC 51907 b LRB103 25558 RLC 51907 b |
---|
9 | 9 | | LRB103 25558 RLC 51907 b |
---|
10 | 10 | | A BILL FOR |
---|
11 | 11 | | HB1621LRB103 25558 RLC 51907 b HB1621 LRB103 25558 RLC 51907 b |
---|
12 | 12 | | HB1621 LRB103 25558 RLC 51907 b |
---|
13 | 13 | | 1 AN ACT concerning criminal law. |
---|
14 | 14 | | 2 Be it enacted by the People of the State of Illinois, |
---|
15 | 15 | | 3 represented in the General Assembly: |
---|
16 | 16 | | 4 Section 5. The Criminal Code of 2012 is amended by |
---|
17 | 17 | | 5 changing Sections 17-51 and 17-54 by adding Section 17-53 as |
---|
18 | 18 | | 6 follows: |
---|
19 | 19 | | 7 (720 ILCS 5/17-51) (was 720 ILCS 5/16D-3) |
---|
20 | 20 | | 8 Sec. 17-51. Computer tampering. |
---|
21 | 21 | | 9 (a) A person commits computer tampering when he or she |
---|
22 | 22 | | 10 knowingly and without the authorization of a computer's owner |
---|
23 | 23 | | 11 or in excess of the authority granted to him or her: |
---|
24 | 24 | | 12 (1) Accesses or causes to be accessed a computer or |
---|
25 | 25 | | 13 any part thereof, a computer network, or a program or |
---|
26 | 26 | | 14 data; |
---|
27 | 27 | | 15 (2) Accesses or causes to be accessed a computer or |
---|
28 | 28 | | 16 any part thereof, a computer network, or a program or |
---|
29 | 29 | | 17 data, and obtains data or services; |
---|
30 | 30 | | 18 (3) Accesses or causes to be accessed a computer or |
---|
31 | 31 | | 19 any part thereof, a computer network, or a program or |
---|
32 | 32 | | 20 data, and damages or destroys the computer or alters, |
---|
33 | 33 | | 21 deletes, or removes a computer program or data; |
---|
34 | 34 | | 22 (4) Inserts or attempts to insert a program into a |
---|
35 | 35 | | 23 computer or computer program knowing or having reason to |
---|
36 | 36 | | |
---|
37 | 37 | | |
---|
38 | 38 | | |
---|
39 | 39 | | 103RD GENERAL ASSEMBLY State of Illinois 2023 and 2024 HB1621 Introduced , by Rep. Dan Caulkins SYNOPSIS AS INTRODUCED: |
---|
40 | 40 | | 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 720 ILCS 5/17-53 new 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 |
---|
41 | 41 | | 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 |
---|
42 | 42 | | 720 ILCS 5/17-53 new |
---|
43 | 43 | | 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 |
---|
44 | 44 | | Amends the Criminal Code of 2012. Provides that a person commits computer tampering when he or she knowingly and without the authorization of a computer's owner or in excess of the authority granted to him or her falsifies or forges electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission (rather than the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers). Provides that computer tampering by knowingly and without authorization of a computer's owner or in excess of the authority granted to him or her: (1) accessing or causing to be accessed a computer or any part thereof, a computer network, or a program or data; or (2) falsifying or forging electronic mail transmission information or other routing information in any manner in connection with delivery of code, software, or hyperlinks to deliver software or code designed to manipulate a computer to allow for remote manipulation without the computer owner's permission is a Class A (rather than a Class B) misdemeanor. Creates the offense of purchasing hacking software. Provides that a person commits the offense when he or she knowingly purchases hacking software with the intent to use or employ that software for the purpose of introduction into a computer, computer system, or computer network, without the authorization of the computer owner. Provides that a violation is a Class B misdemeanor. Defines "hacking software". |
---|
45 | 45 | | LRB103 25558 RLC 51907 b LRB103 25558 RLC 51907 b |
---|
46 | 46 | | LRB103 25558 RLC 51907 b |
---|
47 | 47 | | A BILL FOR |
---|
48 | 48 | | |
---|
49 | 49 | | |
---|
50 | 50 | | |
---|
51 | 51 | | |
---|
52 | 52 | | |
---|
53 | 53 | | 720 ILCS 5/17-51 was 720 ILCS 5/16D-3 |
---|
54 | 54 | | 720 ILCS 5/17-53 new |
---|
55 | 55 | | 720 ILCS 5/17-54 was 720 ILCS 5/16D-7 |
---|
56 | 56 | | |
---|
57 | 57 | | |
---|
58 | 58 | | |
---|
59 | 59 | | LRB103 25558 RLC 51907 b |
---|
60 | 60 | | |
---|
61 | 61 | | |
---|
62 | 62 | | |
---|
63 | 63 | | |
---|
64 | 64 | | |
---|
65 | 65 | | |
---|
66 | 66 | | |
---|
67 | 67 | | |
---|
68 | 68 | | |
---|
69 | 69 | | HB1621 LRB103 25558 RLC 51907 b |
---|
70 | 70 | | |
---|
71 | 71 | | |
---|
72 | 72 | | HB1621- 2 -LRB103 25558 RLC 51907 b HB1621 - 2 - LRB103 25558 RLC 51907 b |
---|
73 | 73 | | HB1621 - 2 - LRB103 25558 RLC 51907 b |
---|
74 | 74 | | 1 know that such program contains information or commands |
---|
75 | 75 | | 2 that will or may: |
---|
76 | 76 | | 3 (A) damage or destroy that computer, or any other |
---|
77 | 77 | | 4 computer subsequently accessing or being accessed by |
---|
78 | 78 | | 5 that computer; |
---|
79 | 79 | | 6 (B) alter, delete, or remove a computer program or |
---|
80 | 80 | | 7 data from that computer, or any other computer program |
---|
81 | 81 | | 8 or data in a computer subsequently accessing or being |
---|
82 | 82 | | 9 accessed by that computer; or |
---|
83 | 83 | | 10 (C) cause loss to the users of that computer or the |
---|
84 | 84 | | 11 users of a computer which accesses or which is |
---|
85 | 85 | | 12 accessed by such program; or |
---|
86 | 86 | | 13 (5) Falsifies or forges electronic mail transmission |
---|
87 | 87 | | 14 information or other routing information in any manner in |
---|
88 | 88 | | 15 connection with delivery of code, software, or hyperlinks |
---|
89 | 89 | | 16 to deliver software or code designed to manipulate a |
---|
90 | 90 | | 17 computer to allow for remote manipulation without the |
---|
91 | 91 | | 18 computer owner's permission the transmission of |
---|
92 | 92 | | 19 unsolicited bulk electronic mail through or into the |
---|
93 | 93 | | 20 computer network of an electronic mail service provider or |
---|
94 | 94 | | 21 its subscribers. |
---|
95 | 95 | | 22 (a-5) Distributing software to falsify routing |
---|
96 | 96 | | 23 information. It is unlawful for any person knowingly to sell, |
---|
97 | 97 | | 24 give, or otherwise distribute or possess with the intent to |
---|
98 | 98 | | 25 sell, give, or distribute software which: |
---|
99 | 99 | | 26 (1) is primarily designed or produced for the purpose |
---|
100 | 100 | | |
---|
101 | 101 | | |
---|
102 | 102 | | |
---|
103 | 103 | | |
---|
104 | 104 | | |
---|
105 | 105 | | HB1621 - 2 - LRB103 25558 RLC 51907 b |
---|
106 | 106 | | |
---|
107 | 107 | | |
---|
108 | 108 | | HB1621- 3 -LRB103 25558 RLC 51907 b HB1621 - 3 - LRB103 25558 RLC 51907 b |
---|
109 | 109 | | HB1621 - 3 - LRB103 25558 RLC 51907 b |
---|
110 | 110 | | 1 of facilitating or enabling the falsification of |
---|
111 | 111 | | 2 electronic mail transmission information or other routing |
---|
112 | 112 | | 3 information; |
---|
113 | 113 | | 4 (2) has only a limited commercially significant |
---|
114 | 114 | | 5 purpose or use other than to facilitate or enable the |
---|
115 | 115 | | 6 falsification of electronic mail transmission information |
---|
116 | 116 | | 7 or other routing information; or |
---|
117 | 117 | | 8 (3) is marketed by that person or another acting in |
---|
118 | 118 | | 9 concert with that person with that person's knowledge for |
---|
119 | 119 | | 10 use in facilitating or enabling the falsification of |
---|
120 | 120 | | 11 electronic mail transmission information or other routing |
---|
121 | 121 | | 12 information. |
---|
122 | 122 | | 13 (a-10) For purposes of subsection (a), accessing a |
---|
123 | 123 | | 14 computer network is deemed to be with the authorization of a |
---|
124 | 124 | | 15 computer's owner if: |
---|
125 | 125 | | 16 (1) the owner authorizes patrons, customers, or guests |
---|
126 | 126 | | 17 to access the computer network and the person accessing |
---|
127 | 127 | | 18 the computer network is an authorized patron, customer, or |
---|
128 | 128 | | 19 guest and complies with all terms or conditions for use of |
---|
129 | 129 | | 20 the computer network that are imposed by the owner; |
---|
130 | 130 | | 21 (2) the owner authorizes the public to access the |
---|
131 | 131 | | 22 computer network and the person accessing the computer |
---|
132 | 132 | | 23 network complies with all terms or conditions for use of |
---|
133 | 133 | | 24 the computer network that are imposed by the owner; or |
---|
134 | 134 | | 25 (3) the person accesses the computer network in |
---|
135 | 135 | | 26 compliance with the Revised Uniform Fiduciary Access to |
---|
136 | 136 | | |
---|
137 | 137 | | |
---|
138 | 138 | | |
---|
139 | 139 | | |
---|
140 | 140 | | |
---|
141 | 141 | | HB1621 - 3 - LRB103 25558 RLC 51907 b |
---|
142 | 142 | | |
---|
143 | 143 | | |
---|
144 | 144 | | HB1621- 4 -LRB103 25558 RLC 51907 b HB1621 - 4 - LRB103 25558 RLC 51907 b |
---|
145 | 145 | | HB1621 - 4 - LRB103 25558 RLC 51907 b |
---|
146 | 146 | | 1 Digital Assets Act (2015). |
---|
147 | 147 | | 2 (b) Sentence. |
---|
148 | 148 | | 3 (1) A person who commits computer tampering as set |
---|
149 | 149 | | 4 forth in subdivision (a)(1) or (a)(5) or subsection (a-5) |
---|
150 | 150 | | 5 of this Section is guilty of a Class A B misdemeanor. |
---|
151 | 151 | | 6 (2) A person who commits computer tampering as set |
---|
152 | 152 | | 7 forth in subdivision (a)(2) of this Section is guilty of a |
---|
153 | 153 | | 8 Class A misdemeanor and a Class 4 felony for the second or |
---|
154 | 154 | | 9 subsequent offense. |
---|
155 | 155 | | 10 (3) A person who commits computer tampering as set |
---|
156 | 156 | | 11 forth in subdivision (a)(3) or (a)(4) of this Section is |
---|
157 | 157 | | 12 guilty of a Class 4 felony and a Class 3 felony for the |
---|
158 | 158 | | 13 second or subsequent offense. |
---|
159 | 159 | | 14 (4) If an injury arises from the transmission of |
---|
160 | 160 | | 15 unsolicited bulk electronic mail, the injured person, |
---|
161 | 161 | | 16 other than an electronic mail service provider, may also |
---|
162 | 162 | | 17 recover attorney's fees and costs, and may elect, in lieu |
---|
163 | 163 | | 18 of actual damages, to recover the lesser of $10 for each |
---|
164 | 164 | | 19 unsolicited bulk electronic mail message transmitted in |
---|
165 | 165 | | 20 violation of this Section, or $25,000 per day. The injured |
---|
166 | 166 | | 21 person shall not have a cause of action against the |
---|
167 | 167 | | 22 electronic mail service provider that merely transmits the |
---|
168 | 168 | | 23 unsolicited bulk electronic mail over its computer |
---|
169 | 169 | | 24 network. |
---|
170 | 170 | | 25 (5) If an injury arises from the transmission of |
---|
171 | 171 | | 26 unsolicited bulk electronic mail, an injured electronic |
---|
172 | 172 | | |
---|
173 | 173 | | |
---|
174 | 174 | | |
---|
175 | 175 | | |
---|
176 | 176 | | |
---|
177 | 177 | | HB1621 - 4 - LRB103 25558 RLC 51907 b |
---|
178 | 178 | | |
---|
179 | 179 | | |
---|
180 | 180 | | HB1621- 5 -LRB103 25558 RLC 51907 b HB1621 - 5 - LRB103 25558 RLC 51907 b |
---|
181 | 181 | | HB1621 - 5 - LRB103 25558 RLC 51907 b |
---|
182 | 182 | | 1 mail service provider may also recover attorney's fees and |
---|
183 | 183 | | 2 costs, and may elect, in lieu of actual damages, to |
---|
184 | 184 | | 3 recover the greater of $10 for each unsolicited electronic |
---|
185 | 185 | | 4 mail advertisement transmitted in violation of this |
---|
186 | 186 | | 5 Section, or $25,000 per day. |
---|
187 | 187 | | 6 (6) The provisions of this Section shall not be |
---|
188 | 188 | | 7 construed to limit any person's right to pursue any |
---|
189 | 189 | | 8 additional civil remedy otherwise allowed by law. |
---|
190 | 190 | | 9 (c) Whoever suffers loss by reason of a violation of |
---|
191 | 191 | | 10 subdivision (a)(4) of this Section may, in a civil action |
---|
192 | 192 | | 11 against the violator, obtain appropriate relief. In a civil |
---|
193 | 193 | | 12 action under this Section, the court may award to the |
---|
194 | 194 | | 13 prevailing party reasonable attorney's fees and other |
---|
195 | 195 | | 14 litigation expenses. |
---|
196 | 196 | | 15 (Source: P.A. 99-775, eff. 8-12-16.) |
---|
197 | 197 | | 16 (720 ILCS 5/17-53 new) |
---|
198 | 198 | | 17 Sec. 17-53. Purchasing hacking software. |
---|
199 | 199 | | 18 (a) In this section, "hacking software" means a computer |
---|
200 | 200 | | 19 or data contaminant, encryption, or lock that when placed or |
---|
201 | 201 | | 20 introduced without authorization into a computer, computer |
---|
202 | 202 | | 21 system, or computer network allows the individual who |
---|
203 | 203 | | 22 introduced the software to access the computer, computer |
---|
204 | 204 | | 23 system, or computer network without the knowledge of the |
---|
205 | 205 | | 24 owner. |
---|
206 | 206 | | 25 (b) A person commits purchasing hacking software when he |
---|
207 | 207 | | |
---|
208 | 208 | | |
---|
209 | 209 | | |
---|
210 | 210 | | |
---|
211 | 211 | | |
---|
212 | 212 | | HB1621 - 5 - LRB103 25558 RLC 51907 b |
---|
213 | 213 | | |
---|
214 | 214 | | |
---|
215 | 215 | | HB1621- 6 -LRB103 25558 RLC 51907 b HB1621 - 6 - LRB103 25558 RLC 51907 b |
---|
216 | 216 | | HB1621 - 6 - LRB103 25558 RLC 51907 b |
---|
217 | 217 | | 1 or she knowingly purchases hacking software with the intent to |
---|
218 | 218 | | 2 use or employ that software for the purpose of introduction |
---|
219 | 219 | | 3 into a computer, computer system, or computer network, without |
---|
220 | 220 | | 4 the authorization of the computer owner. |
---|
221 | 221 | | 5 (c) Sentence. Purchasing hacking software is a Class B |
---|
222 | 222 | | 6 misdemeanor. |
---|
223 | 223 | | 7 (720 ILCS 5/17-54) (was 720 ILCS 5/16D-7) |
---|
224 | 224 | | 8 Sec. 17-54. Evidence of lack of authority. For the |
---|
225 | 225 | | 9 purposes of Sections 17-50 through 17-53 17-52, the trier of |
---|
226 | 226 | | 10 fact may infer that a person accessed a computer without the |
---|
227 | 227 | | 11 authorization of its owner or in excess of the authority |
---|
228 | 228 | | 12 granted if the person accesses or causes to be accessed a |
---|
229 | 229 | | 13 computer, which access requires a confidential or proprietary |
---|
230 | 230 | | 14 code which has not been issued to or authorized for use by that |
---|
231 | 231 | | 15 person. This Section does not apply to a person who acquires |
---|
232 | 232 | | 16 access in compliance with the Revised Uniform Fiduciary Access |
---|
233 | 233 | | 17 to Digital Assets Act (2015). |
---|
234 | 234 | | 18 (Source: P.A. 99-775, eff. 8-12-16.) |
---|
235 | 235 | | |
---|
236 | 236 | | |
---|
237 | 237 | | |
---|
238 | 238 | | |
---|
239 | 239 | | |
---|
240 | 240 | | HB1621 - 6 - LRB103 25558 RLC 51907 b |
---|