As used in this chapter:

(1) “Control” means:

Ask a business law question, get an answer ASAP!
Thousands of highly rated, verified business lawyers.
Click here to chat with a lawyer about your rights.

Terms Used In Utah Code 13-5a-102

  • Malicious cyber activity: means :
         (3)(a) the unlawful use of computing resources to intimidate or coerce others;
         (3)(b) accessing a computer without authorization or exceeding authorized access;
         (3)(c) willfully communicating, delivering, or causing the transmission of a program, information, code, or command without authorization or exceeding authorized access; and
         (3)(d) intentionally or recklessly:
              (3)(d)(i) intends to defraud or materially cause damage or disruption to any computing resources or to the owner of any computing resources; or
              (3)(d)(ii) intends to materially cause damage or disruption to any computing resources indirectly through another party's computing resources. See Utah Code 13-5a-102
  • Property: includes both real and personal property. See Utah Code 68-3-12.5
     (1)(a) ownership of more than 5% of the voting shares or ownership interests of an entity;
     (1)(b) the power to vote more than 5% of the voting shares of an entity; or
     (1)(c) the ability to influence the management of an entity.
(2) “Depository institution” is as defined in Section 7-1-103.
(3) “Malicious cyber activity” means:

     (3)(a) the unlawful use of computing resources to intimidate or coerce others;
     (3)(b) accessing a computer without authorization or exceeding authorized access;
     (3)(c) willfully communicating, delivering, or causing the transmission of a program, information, code, or command without authorization or exceeding authorized access; and
     (3)(d) intentionally or recklessly:

          (3)(d)(i) intends to defraud or materially cause damage or disruption to any computing resources or to the owner of any computing resources; or
          (3)(d)(ii) intends to materially cause damage or disruption to any computing resources indirectly through another party’s computing resources.
(4)

     (4)(a) Except as provided in Subsection (4)(b), “unfair competition” means an intentional business act or practice that:

          (4)(a)(i)

               (4)(a)(i)(A) is unlawful, unfair, or fraudulent; and
               (4)(a)(i)(B) leads to a material diminution in value of intellectual property; and
          (4)(a)(ii) is one of the following:

               (4)(a)(ii)(A) malicious cyber activity;
               (4)(a)(ii)(B) infringement of a patent, trademark, or trade name;
               (4)(a)(ii)(C) a software license violation; or
               (4)(a)(ii)(D) predatory hiring practices.
     (4)(b) Notwithstanding Subsection (4)(a), “unfair competition” does not include the departure and hiring of an employee by a competitor.