Rhode Island General Laws 11-52-8. Tampering with computer source documents
(a) Whoever intentionally or knowingly conceals, destroys, or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source document used for a computer, computer program, computer system, or computer network, when the computer source document is required to be kept by law, shall be guilty of a misdemeanor and shall be subject to the provisions of § 11-52-5.
Terms Used In Rhode Island General Laws 11-52-8
- computer: includes any connected or directly related device, equipment, or facility which enables the computer to store, retrieve or communicate computer programs, computer data or the results of computer operations to or from a person, another computer or another device. See Rhode Island General Laws 11-52-1
- Computer network: means a set of related, remotely connected devices and any communications facilities including more than one computer with the capability to transmit data among them through the communications facilities. See Rhode Island General Laws 11-52-1
- Computer program: means a series of instructions or statements or related data that, in actual or modified form, is capable of causing a computer or a computer system to perform specified functions in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from the computer systems. See Rhode Island General Laws 11-52-1
- Computer system: means a set of related, connected or unconnected, computer equipment, devices, and software. See Rhode Island General Laws 11-52-1
- Source document: means an original document or record which forms the basis of every electronic entry put into a computer, computer system, or computer network. See Rhode Island General Laws 11-52-1
(b) Whoever intentionally or knowingly conceals, destroys, or alters or intentionally, knowingly conceals, destroys, or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source document used for a computer, computer program, computer system, or computer network, when the computer source document is required to be kept by law, with the intent to obstruct an official investigation by any state agency authorized by law to conduct any civil or criminal investigation, shall be guilty of a felony and shall be subject to the provisions of § 11-52-5.
History of Section.
P.L. 1989, ch. 136 § 2.