eLaws of Florida

  SECTION 815.06. Offenses against users of computers, computer systems, computer networks, and electronic devices.  


Latest version.
  • 1(1) 2As used in this section, the term “user” means a person with the authority to operate or maintain a computer, computer system, computer network, or electronic device.
    29(2) 30A person commits an offense against users of computers, computer systems, computer networks, or electronic devices if he or she willfully, knowingly, and without authorization or exceeding authorization:
    58(a) 59Accesses or causes to be accessed any computer, computer system, computer network, or electronic device with knowledge that such access is unauthorized or the manner of use exceeds authorization;
    88(b) 89Disrupts or denies or causes the denial of the ability to transmit data to or from an authorized user of a computer, computer system, computer network, or electronic device, which, in whole or in part, is owned by, under contract to, or operated for, on behalf of, or in conjunction with another;
    141(c) 142Destroys, takes, injures, or damages equipment or supplies used or intended to be used in a computer, computer system, computer network, or electronic device;
    166(d) 167Destroys, injures, or damages any computer, computer system, computer network, or electronic device;
    180(e) 181Introduces any computer contaminant into any computer, computer system, computer network, or electronic device; or
    196(f) 197Engages in audio or video surveillance of an individual by accessing any inherent feature or component of a computer, computer system, computer network, or electronic device, including accessing the data or information of a computer, computer system, computer network, or electronic device that is stored by a third party.
    246(3)(a) 247Except as provided in paragraphs (b) and (c), a person who violates subsection (2) commits a felony of the third degree, punishable as provided in s. 273775.082, 274s. 275775.083, 276or s. 278775.084279.
    280(b) 281A person commits a felony of the second degree, punishable as provided in s. 295775.082, 296s. 297775.083, 298or s. 300775.084, 301if he or she violates subsection (2) and:
    3091. 310Damages a computer, computer equipment or supplies, a computer system, or a computer network and the damage or loss is at least $5,000;
    3342. 335Commits the offense for the purpose of devising or executing any scheme or artifice to defraud or obtain property;
    3543. 355Interrupts or impairs a governmental operation or public communication, transportation, or supply of water, gas, or other public service; or
    3754. 376Intentionally interrupts the transmittal of data to or from, or gains unauthorized access to, a computer, computer system, computer network, or electronic device belonging to any mode of public or private transit, as defined in s. 412341.031413.
    414(c) 415A person who violates subsection (2) commits a felony of the first degree, punishable as provided in s. 433775.082, 434s. 435775.083, 436or s. 438775.084, 439if the violation:
    4421. 443Endangers human life; or
    4472. 448Disrupts a computer, computer system, computer network, or electronic device that affects medical equipment used in the direct administration of medical care or treatment to a person.
    475(4) 476A person who willfully, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer, computer system, computer network, or electronic device commits a misdemeanor of the first degree, punishable as provided in s. 516775.082 517or s. 519775.083520.
    521(5)(a) 522In addition to any other civil remedy available, the owner or lessee of the computer, computer system, computer network, computer program, computer equipment or supplies, electronic device, or computer data may bring a civil action against a person convicted under this section for compensatory damages.
    567(b) 568In an action brought under this subsection, the court may award reasonable attorney fees to the prevailing party.
    586(6) 587A computer, computer system, computer network, computer software, computer data, or electronic device owned by a defendant that is used during the commission of a violation of this section or a computer or electronic device owned by the defendant that is used as a repository for the storage of software or data obtained in violation of this section is subject to forfeiture as provided under ss. 653932.701654-655932.704656.
    657(7) 658This section does not apply to a person who:
    667(a) 668Acts pursuant to a search warrant or to an exception to a search warrant authorized by law;
    685(b) 686Acts within the scope of his or her lawful employment; or
    697(c) 698Performs authorized security operations of a government or business.
    707(8) 708For purposes of bringing a civil or criminal action under this section, a person who causes, by any means, the access to a computer, computer system, computer network, or electronic device in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system, computer network, or electronic device in both jurisdictions.
    763(9) 764This chapter does not impose liability on a provider of an interactive computer service as defined in 47 U.S.C. s. 230(f), information service as defined in 47 U.S.C. s. 153, or communications service as defined in s. 801202.11 802that provides the transmission, storage, or caching of electronic communications or messages of others; other related telecommunications or commercial mobile radio service; or content provided by another person.
History.-s. 1, ch. 78-92; s. 11, ch. 2001-54; s. 5, ch. 2014-208; s. 40, ch. 2019-167.

Bills Cite this Section:

None

Cited by Court Cases:

None