Utah Code 63D-3-102. Definitions
Current as of: 2024 | Check for updates
|
Other versions
As used in this part, the term:
(1) “Authorized user” means, for a protected computer:
Terms Used In Utah Code 63D-3-102
- Authorized user: means , for a protected computer:(1)(a) the protected computer's owner; or(1)(b) an individual who has permission to access the protected computer under Section 63D-3-103. See Utah Code 63D-3-102
- Computer: includes any data storage device, data storage facility, or communications facility that is directly related to or that operates in conjunction with the device described in Subsection (2)(a). See Utah Code 63D-3-102
- Damages: Money paid by defendants to successful plaintiffs in civil cases to compensate the plaintiffs for their injuries.
- Owner: means a person who:
(5)(a) owns or leases a protected computer; or(5)(b) owns the information stored in a protected computer. See Utah Code 63D-3-102- Person: means :
(24)(a) an individual;(24)(b) an association;(24)(c) an institution;(24)(d) a corporation;(24)(e) a company;(24)(f) a trust;(24)(g) a limited liability company;(24)(h) a partnership;(24)(i) a political subdivision;(24)(j) a government office, department, division, bureau, or other body of government; and(24)(k) any other organization or entity. See Utah Code 68-3-12.5- Protected computer: means a computer that:
(6)(a)(i) is used in connection with the operation of a business, state government entity, or political subdivision; and(6)(a)(ii) requires a technological access barrier for an individual to access the computer. See Utah Code 63D-3-102- State: when applied to the different parts of the United States, includes a state, district, or territory of the United States. See Utah Code 68-3-12.5
- Technological access barrier: means a password, security code, token, key fob, access device, or other digital security measure. See Utah Code 63D-3-102
(1)(a) the protected computer‘s owner; or(1)(b) an individual who has permission to access the protected computer under Section 63D-3-103.(2)(2)(a) “Computer” means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device that performs logical, arithmetic, or storage functions.(2)(b) “Computer” includes any data storage device, data storage facility, or communications facility that is directly related to or that operates in conjunction with the device described in Subsection (2)(a).(3)(3)(a) “Damage” means, for a protected computer’s owner, the cost associated with an individual’s unauthorized access to information stored on a protected computer.(3)(b) “Damage” includes:(3)(b)(i) the cost of repairing or restoring a protected computer;(3)(b)(ii) economic damages;(3)(b)(iii) consequential damages, including interruption of service; and(3)(b)(iv) profit by the individual from the unauthorized access to the protected computer.(4) “Harm” means any impairment to the integrity, access, or availability of:(4)(a) data;(4)(b) a program;(4)(c) a system; or(4)(d) information.(5) “Owner” means a person who:(5)(a) owns or leases a protected computer; or(5)(b) owns the information stored in a protected computer.(6)(6)(a) “Protected computer” means a computer that:(6)(a)(i) is used in connection with the operation of a business, state government entity, or political subdivision; and(6)(a)(ii) requires a technological access barrier for an individual to access the computer.(6)(b) “Protected computer” does not include a computer that an individual can access using a technological access barrier that does not, to a reasonable degree of security, effectively control access to the information stored in the computer.(7) “Technological access barrier” means a password, security code, token, key fob, access device, or other digital security measure.(8) “Traffic” means to sell, purchase, or deliver.(9) “Unauthorized user” means an individual who, for a protected computer:(9)(a) is not an authorized user of the protected computer; and(9)(b) accesses the protected computer by:(9)(b)(i) obtaining, without an authorized user’s permission, the authorized user’s technological access barrier; or(9)(b)(ii) circumventing, without the permission of the protected computer’s owner, a technological access barrier on the protected computer.