South Dakota Codified Laws 43-43B-1. Unlawful uses of computer system
A person is guilty of unlawful use of a computer system, software, or data if the person:
(1) Knowingly obtains the use of, accesses or exceeds authorized access to, a computer system, or any part thereof, without the consent of the owner;
Terms Used In South Dakota Codified Laws 43-43B-1
- Computer system: includes any computer, computer network, other related device, data input and output and storage devices, and data communications links. See South Dakota Codified Laws 43-43B-2
- Person: includes natural persons, partnerships, associations, cooperative corporations, limited liability companies, and corporations. See South Dakota Codified Laws 2-14-2
- Property: includes property, real and personal. See South Dakota Codified Laws 2-14-2
(2) Knowingly obtains the use of, accesses, or exceeds authorized access to, a computer system, or any part thereof, without the consent of the owner, and the access or use includes access to confidential data or material;
(3) Knowingly copies or obtains information from a computer system, or compromises any security controls for the computer system, or uses or discloses to another, or attempts to use or disclose to another, the numbers, codes, passwords, or other means of access to a computer system without the consent of the owner;
(4) Knowingly disrupts, denies, or inhibits access to software or data without the consent of the owner;
(5) Knowingly disrupts, denies, or inhibits access to a computer system, without consent of the owner;
(6) Knowingly modifies, changes, or alters software or data, without the consent of the owner;
(7) Knowingly obtains use of, alters, accesses, or exceeds authorized access to, destroys, disables, or inhibits access to a computer system, as part of a deception for the purpose of obtaining money, property, or services from the owner of a computer system, or any third party;
(8) Knowingly destroys or disables a computer system, without consent of the owner; or
(9) Knowingly destroys or disables software or computer data, without consent of the owner.
Source: SL 1982, ch 300, § 3; SL 1984, ch 282, § 1; SL 2002, ch 109, § 27.