1As used in this part, the term:8(1) 9“Authorized user” means a director, officer, employee, third-party agent, contractor, or consultant of the owner, operator, or lessee of the protected computer or the owner of information stored in the protected computer if the director, officer, employee, third-party agent, contractor, or consultant is given express permission by the owner, operator, or lessee of the protected computer or by the owner of information stored in the protected computer to access the protected computer through a technological access barrier. Such permission, however, is terminated upon revocation by the owner, operator, or lessee of the protected computer or by the owner of information stored in the protected computer, or upon cessation of employment, affiliation, or agency with the owner, operator, or lessee of the protected computer or the owner of information stored in the protected computer.
142(2) 143“Business” means any trade or business regardless of its for-profit or not-for-profit status.
156(3) 157“Computer” means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device that performs logical, arithmetic, or storage functions and includes any data storage facility, data storage device, or communications facility directly related to, or operating in conjunction with, the device.
199(4) 200“Harm” means any impairment to the integrity, access, or availability of data, programs, systems, or information.
216(5) 217“Loss” means any of the following:223(a) 224Any reasonable cost incurred by the owner, operator, or lessee of a protected computer or the owner of stored information, including the reasonable cost of conducting a damage assessment for harm associated with the violation and the reasonable cost for remediation efforts, such as restoring the data, programs, systems, or information to the condition it was in before the violation.
284(b) 285Economic damages.
287(c) 288Lost profits.
290(d) 291Consequential damages, including the interruption of service.
298(e) 299Profits earned by a violator as a result of the violation.
310(6) 311“Protected computer” means a computer that is used in connection with the operation of a business and stores information, programs, or code in connection with the operation of the business in which the stored information, programs, or code can be accessed only by employing a technological access barrier.
359(7) 360“Technological access barrier” means a password, security code, token, key fob, access device, or similar measure.
376(8) 377“Traffic” means to sell, purchase, or deliver.
384(9) 385“Without authorization” means access to a protected computer by a person who:397(a) 398Is not an authorized user;
403(b) 404Has stolen a technological access barrier of an authorized user; or
415(c) 416Circumvents a technological access barrier on a protected computer without the express or implied permission of the owner, operator, or lessee of the computer or the express or implied permission of the owner of information stored in the protected computer. The term does not include circumventing a technological measure that does not effectively control access to the protected computer or the information stored in the protected computer.