1 STATE OF OKLAHOMA
2 1st Session of the 58th Legislature (2021)
3 HOUSE BILL 1759 By: Ranson
4
5
6 AS INTRODUCED
7 An Act relating to crimes and punishments; amending
21 O.S. 2011, Sections 1952 and 1953, as amended by
8 Section 1, Chapter 66, O.S.L. 2013 (21 O.S. Supp.
2020, Section 1953), which relate to the Oklahoma
9 Computer Crimes Act; modifying definition; defining
term; expanding scope of certain prohibited acts;
10 making certain acts unlawful; providing construing
provision; and providing an effective date.
11
12
13 BE IT ENACTED BY THE PEOPLE OF THE STATE OF OKLAHOMA:
14 SECTION 1. AMENDATORY 21 O.S. 2011, Section 1952, is
15 amended to read as follows:
16 Section 1952. As used in the Oklahoma Computer Crimes Act:
17 1. "Access" means to approach, gain entry to, instruct,
18 communicate with, store data in, retrieve data from or otherwise use
19 the logical, arithmetical, memory or other resources of a computer,
20 computer system or computer network;
21 2. "Computer" means an electronic device which performs work
22 using programmed instruction having one or more of the capabilities
23 of storage, logic, arithmetic or communication. The term includes
24 input, output, processing, storage, software and communication
Req. No. 6191 Page 1
1 facilities which are connected or related to a device in a system or
2 network;
3 3. "Computer network" means the wired or wireless physical or
4 logical interconnection of terminals by communication modes with a
5 one or more computers or computer, or a complex consisting of two or
6 more interconnected computers systems to each other, or to other
7 computer networks, for the purpose of transmitting or receiving
8 computer programs, computer software or data;
9 4. "Computer program" means a set or series of instructions or
10 statements and related data which when executed in actual or
11 modified form directs or is intended to direct the functioning of a
12 computer system in a manner designed to perform certain operations;
13 5. "Computer software" means one or more computer programs,
14 procedures and associated documentation used in the operation of a
15 computer system;
16 6. "Computer system" means a set of related, connected or
17 unconnected, computer equipment, devices including support devices,
18 one or more of which contain computer programs, electronic
19 instructions, input data, and output data, that performs functions
20 including, but not limited to, logic, arithmetic, data storage and
21 retrieval, communication, and control and software. "Computer
22 system" The term does not include calculators which are not
23 programmable and are not capable of being connected to or used to
24
Req. No. 6191 Page 2
1 access other computers, computer networks, computer systems or
2 support devices;
3 7. "Data" means a representation of information, knowledge,
4 facts, concepts, computer software, computer programs or
5 instructions. Data may be in any form, in storage media, or as
6 stored in the memory of the computer or in transit or presented on a
7 display device;
8 8. "Malicious computer program" means any computer program that
9 is created, executed, modified or distributed with the intent to
10 disrupt, destroy, deny access to, redirect, defraud, deceive, exceed
11 or gain unauthorized access to any computer, computer system,
12 computer network or data. "Malicious computer program" includes,
13 but is not limited to, viruses, Trojan horses, spyware, worms,
14 rootkits, backdoors, ransomware and other malicious computer
15 instructions, whether part of or independent of broader computer
16 software or computer systems;
17 9. "Property" means any tangible or intangible item of value
18 and includes, but is not limited to, financial instruments,
19 geophysical data or the interpretation of that data, information,
20 computer software, computer programs, electronically-produced data
21 and computer-produced or stored data, supporting documentation,
22 computer software in either machine or human readable form,
23 electronic impulses, confidential, copyrighted or proprietary
24 information, private identification codes or numbers which permit
Req. No. 6191 Page 3
1 access to a computer by authorized computer users or generate
2 billings to consumers for purchase of goods and services, including,
3 but not limited to, credit card transactions and telecommunications
4 services or permit electronic fund transfers and any other tangible
5 or intangible item of value;
6 9. 10. "Services" includes, but is not limited to, computer
7 time, data processing and storage functions and other uses of a
8 computer, computer system or computer network to perform useful
9 work;
10 10. 11. "Supporting documentation" includes, but is not limited
11 to, all documentation in any form used in the construction, design,
12 classification, implementation, use or modification of computer
13 software, computer programs or data; and
14 11. 12. "Victim expenditure" means any expenditure reasonably
15 and necessarily incurred by the owner or lessee to verify that a
16 computer system, computer network, computer program or data was or
17 was not altered, deleted, disrupted, damaged or destroyed by the
18 access.
19 SECTION 2. AMENDATORY 21 O.S. 2011, Section 1953, as
20 amended by Section 1, Chapter 66, O.S.L. 2013 (21 O.S. Supp. 2020,
21 Section 1953), is amended to read as follows:
22 Section 1953. A. It shall be unlawful to:
23 1. Willfully, and without authorization, gain or attempt to gain
24 access to and damage, modify, alter, delete, destroy, copy, make use
Req. No. 6191 Page 4
1 of, use malicious computer programs on, disclose or take possession
2 of a computer, computer system, computer network, data or any other
3 property;
4 2. Use a computer, computer system, computer network or any
5 other property as hereinbefore defined for the purpose of devising
6 or executing a scheme or artifice with the intent to defraud,
7 deceive, extort or for the purpose of controlling or obtaining
8 money, property, data, services or other thing of value by means of
9 a false or fraudulent pretense or representation;
10 3. Willfully exceed the limits of authorization and damage,
11 modify, alter, destroy, copy, delete, disclose or take possession of
12 a computer, computer system, computer network, data or any other
13 property;
14 4. Willfully and without authorization, gain or attempt to gain
15 access to a computer, computer system, computer network, data or any
16 other property;
17 5. Willfully and without authorization use or cause to be used
18 computer services;
19 6. Willfully and without authorization disrupt or cause the
20 disruption of computer services or deny or cause the denial of
21 access or other computer services to an authorized user of a
22 computer, computer system or computer network, other than an
23 authorized computer network provider acting for a legitimate
24 business purpose without the effective consent of the owner;
Req. No. 6191 Page 5
1 7. Willfully and without authorization provide or assist in
2 providing a means of accessing a computer, computer system, data or
3 computer network in violation of this section;
4 8. Willfully use a computer, computer system, or computer
5 network to annoy, abuse, threaten, or harass another person; and
6 9. Willfully use a computer, computer system, or computer
7 network to put another person in fear of physical harm or death; and
8 10. Willfully solicit another, regardless of any financial
9 consideration or exchange of property, of any acts descried in
10 paragraphs 1 through 9 of this subsection.
11 B. Any person convicted of violating paragraph 1, 2, 3, 6, 7
12 or, 9 or 10 of subsection A of this section shall be guilty of a
13 felony punishable as provided in Section 1955 of this title.
14 C. Any person convicted of violating paragraph 4, 5 or 8 of
15 subsection A of this section shall be guilty of a misdemeanor.
16 D. Nothing in the Oklahoma Computer Crimes Act shall be
17 construed to prohibit the monitoring of computer usage of, or the
18 denial of computer or Internet access to, a child by a parent, legal
19 guardian, legal custodian, or foster parent. As used in this
20 subsection, "child" shall mean any person less than eighteen (18)
21 years of age.
22 E. Nothing in the Oklahoma Computer Crimes Act shall be
23 construed to prohibit testing by an authorized entity, the purpose
24 of which is to provide to the owner or operator of the computer,
Req. No. 6191 Page 6
1 computer system or computer network an evaluation of the security of
2 the computer, computer system or computer network against real or
3 imagined threats or harms.
4 SECTION 3. This act shall become effective November 1, 2021.
5
6 58-1-6191 GRS 01/16/21
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Req. No. 6191 Page 7

Statutes affected:
Introduced: 21-1953
House Committee Substitute: 21-1953
Floor (House): 21-1953
Floor (Senate): 21-1953
Engrossed: 21-1953
Amended And Engrossed: 21-1953
Enrolled (final version): 21-1953