Tenn. Code § 39-14-602

Current through Acts 2023-2024, ch. 1003
Section 39-14-602 - Offenses - Penalties - Implicit consent to access
(a)
(1) It is an offense to:
(A) Knowingly, directly, or indirectly access, cause to be accessed, or attempt to access any telephone system, telecommunications facility, computer software, computer program, data, computer, computer system, computer network, or any part thereof, for the purpose of:
(i) Obtaining money, property, or services for oneself or another by means of false or fraudulent pretenses, representations, or promises;
(ii) Causing computer output to purposely be false for, but not limited to, the purpose of obtaining money, property, or services for oneself or another by means of false or fraudulent pretenses, representations, or promises; or
(iii) Affecting the creation or alteration of a financial instrument or of an electronic transfer of funds with the intent to disrupt, alter, misappropriate, or commit fraud;
(B) Intentionally and without authorization, directly or indirectly:
(i) Alter, damage, destroy, or attempt to damage or destroy, or cause the disruption to the proper operation of any computer, or perform an act which is responsible for the disruption of any computer, computer system, computer network, computer software, program, or data which resides or exists internal or external to a computer, computer system, or computer network; or
(ii) Make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs, or computer software residing in, communicated by, or produced by a computer or computer network; or
(C) Receive, conceal, use, or aid another in receiving, concealing, or using any proceeds resulting from a violation of this subsection (a), knowing the proceeds to be the result of such violation, or receive, conceal, use, or aid another in receiving, concealing, or using any books, records, documents, property, financial instrument, computer software, program, or other material, property, or objects, knowing that the item has been used in violating this subsection (a).
(2) A violation of this subsection (a) is subject to the penalties of § 39-14-105.
(b)
(1) It is an offense to intentionally and without authorization, directly or indirectly:
(A) Access any computer, computer system, or computer network;
(B) Introduce or be responsible for the malicious input of any computer contaminant into any computer, computer system, or computer network;
(C) Access, cause to be accessed, or attempt to access any computer software, computer network, or any part thereof, for the purpose of maliciously gaining access to computer material or to tamper maliciously with computer security devices; or
(D) Possess a computer contaminant.
(2) A violation of this subsection (b) is a Class A misdemeanor.
(c) Operating a computer network in such a way as to allow anonymous access to that network constitutes implicit consent to access under this part.
(d) Any person who violates this section in connection with an act of terrorism commits a Class A felony.
(e) Any person who accesses, causes to be accessed, or attempts to access a digital asset pursuant to the Revised Uniform Fiduciary Access to Digital Assets Act, compiled in title 35, chapter 8, is not in violation of this part.

T.C.A. § 39-14-602

Amended by 2022 Tenn. Acts, ch. 1042, s 1, eff. 7/1/2022.
Amended by 2016 Tenn. Acts, ch. 570, s 20, eff. 7/1/2016.
Acts 1989, ch. 591, § 1; 1993, ch. 445, § 1; 2002, ch. 849, § 4; 2003 , ch. 317, § 3; 2006, ch. 809, § 1.