Title 18 · CRS Title 18

Possession of identity theft tools

Citation: C.R.S. § 18-5-905

Section: 18-5-905

18-5-905. Possession of identity theft tools. (1) A person commits possession of identity theft tools if he or she possesses any tools, equipment, computer, computer network, scanner, printer, or other article adapted, designed, or commonly used for committing or facilitating the commission of the offense of identity theft as described in section 18-5-902, and intends to use the thing possessed, or knows that a person intends to use the thing possessed, in the commission of the offense of identity theft. (2) Possession of identity theft tools is a class 5 felony. Source: L. 2006: Entire part added, p. 1323, � 8, effective July 1. ARTICLE 5.5 Computer Crime Law reviews: For article, Ownership of Software and Computer-stored Data, see 13 Colo. Law. 577 (1984); for article, Computer Security and Privacy: The Third Wave of Property Law, see 33 Colo. Law. 57 (Feb. 2004). 18-5.5-101. Definitions. As used in this article 5.5, unless the context otherwise requires: (1) Authorization means the express consent of a person which may include an employee's job description to use said person's computer, computer network, computer program, computer software, computer system, property, or services as those terms are defined in this section. (2) Computer means an electronic, magnetic, optical, electromagnetic, or other data processing device which performs logical, arithmetic, memory, or storage functions by the manipulations of electronic, magnetic, radio wave, or light wave impulses, and includes all input, output, processing, storage, software, or communication facilities which are connected or related to or operating in conjunction with such a device. (3) Computer network means the interconnection of communication lines (including microwave or other means of electronic communication) with a computer through remote terminals, or a complex consisting of two or more interconnected computers. (4) Computer program means a series of instructions or statements, in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from such computer system. (5) Computer software means computer programs, procedures, and associated documentation concerned with the operation of a computer system. (6) Computer system means a set of related, connected or unconnected, computer equipment, devices, and software. (6.3) Damage includes, but is not limited to, any impairment to the integrity of availability of information, data, computer program, computer software, or services on or via a computer, computer network, or computer system or part thereof. (6.5) Encoding machine means an electronic device that is used to encode information onto a payment card. (6.7) Exceed authorized access means to access a computer with authorization and to use such access to obtain or alter information, data, computer program, or computer software that the person is not entitled to so obtain or alter. (7) Financial instrument means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, debit card, or marketable security. (7.5) Payment card means a credit card, charge card, debit card, or any other card that is issued to an authorized card user and that allows the user to obtain, purchase, or receive goods, services, money, or anything else of value from a merchant. (8) Property includes, but is not limited to, financial instruments, information, including electronically produced data, and computer software and programs in either machine or human readable form, and any other tangible or intangible item of value. (8.5) Scanning device means a scanner, reader, wireless access device, radio-frequency identification scanner, near-field communications technology, or any other electronic device that is used to access, read, scan, obtain, memorize, or store, temporarily or permanently, information from a payment card. (9) Services includes, but is not limited to, computer time, data processing, and storage functions. (10) To use means to instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or computer network. Source: L. 79: Entire article added, p. 728, � 7, effective July 1. L. 83: (1) R&RE and (10) added, p. 705, �� 1, 2, effective July 1. L. 2000: (2) amended and (6.3) and (6.7) added, p. 694, � 7, effective July 1. L. 2018: IP amended and (6.5), (7.5), and (8.5) added (HB 18-1200), ch. 379, p. 2290, � 1, effective August 8. 18-5.5-102. Cybercrime. (1) A person commits cybercrime if the person knowingly: (a) Accesses a computer, computer network, or computer system or any part thereof without authorization; exceeds authorized access to a computer, computer network, or computer system or any part thereof; or uses a computer, computer network, or computer system or any part thereof without authorization or in excess of authorized access; or (b) Accesses any computer, computer network, or computer system, or any part thereof for the purpose of devising or executing any scheme or artifice to defraud; or (c) Accesses any computer, computer network, or computer system, or any part thereof to obtain, by means of false or fraudulent pretenses, representations, or promises, money; property; services; passwords or similar information through which a computer, computer network, or computer system or any part thereof may be accessed; or other thing of value; or (d) Accesses any computer, computer network, or computer system, or any part thereof to commit theft; or (e) Without authorization or in excess of authorized access alters, damages, interrupts, or causes the interruption or impairment of the proper functioning of, or causes any damage to, any computer, computer network, computer system, computer software, program, application, documentation, or data contained in such computer, computer network, or computer system or any part thereof; or (f) Causes the transmission of a computer program, software, information, code, data, or command by means of a computer, computer network, or computer system or any part thereof with the intent to cause damage to or to cause the interruption or impairment of the proper functioning of or that actually causes damage to or the interruption or impairment of the proper functioning of any computer, computer network, computer system, or part thereof; or (g) Uses or causes to be used a software application that runs automated tasks over the internet to access a computer, computer network, or computer system, or any part thereof, that circumvents or disables any electronic queues, waiting periods, or other technological measure intended by the seller to limit the number of event tickets that may be purchased by any single person in an online event ticket sale as defined in section 6-1-720, C.R.S.; or (h) Solicits or offers to arrange a situation in which a minor may engage in prostitution, by means of using a computer, computer network, computer system, or any part thereof; or (i) Directly or indirectly uses a scanning device to access, read, obtain, memorize, or store, temporarily or permanently, information encoded on the payment card without the permission of the authorized user of the payment card, and with the intent to defraud the authorized user, the issuer of the authorized user's payment card, or a merchant; or (j) Directly or indirectly uses an encoding machine to place information encoded on the payment card onto a different payment card without the permission of the authorized user of the payment card from which the information being reencoded was obtained, and with the intent to defraud the authorized user, the issuer of the authorized user's payment card, or a merchant. (2) (Deleted by amendment, L. 2000, p. 695, � 8, effective July 1, 2000.) (3) (a) Except as provided in subsections (3)(b), (3)(b.5), and (3)(c) of this section, if the loss, damage, value of services, or thing of value taken, or cost of restoration or repair caused by a violation of this section is: (I) (Deleted by amendment, L. 2018.) (II) Less than three hundred dollars, cybercrime is a petty offense; (III) Three hundred dollars or more but less than one thousand dollars, cybercrime is a class 2 misdemeanor; (IV) One thousand dollars or more but less than two thousand dollars, cybercrime is a class 1 misdemeanor; (V) Two thousand dollars or more but less than five thousand dollars, cybercrime is a class 6 felony; (VI) Five thousand dollars or more but less than twenty thousand dollars, cybercrime is a class 5 felony; (VII) Twenty thousand dollars or more but less than one hundred thousand dollars, cybercrime is a class 4 felony; (VIII) One hundred thousand dollars or more but less than one million dollars, cybercrime is a class 3 felony; and (IX) One million dollars or more, cybercrime is a class 2 felony. (b) Cybercrime committed in violation of subsection (1)(a) of this section is a class 2 misdemeanor. (b.5) Cybercrime committed in violation of subsection (1)(h), (1)(i), or (1)(j) of this section is a class 5 felony. (c) (I) Cybercrime committed in violation of subsection (1)(g) of this section is a class 2 misdemeanor. (II) If cybercrime is committed to obtain event tickets, each ticket purchased shall constitute a separate offense. (III) Subsection (1)(g) of this section shall not prohibit the resale of tickets in a secondary market by a person other than the event sponsor or promoter. (d) Consistent with section 18-1-202, a prosecution for a violation of subsection (1)(g) of this section may be tried in the county where the event has been, or will be, held. (4) Nothing in this section precludes punishment pursuant to any other section of law. (5) Notwithstanding any other provision of this section, an individual may authorize an agent to access and process, on that individual's behalf, that individual's personal data or other information held on a computer, computer network, or computer system and that is otherwise accessible to the individual. An authorized agent remains liable for any unauthorized activity on a system under applicable unfair competition laws; the federal Computer Fraud and Abuse Act, 18 U.S.C. sec. 1030 et seq., as amended; and other provisions of this section. Source: L. 79: Entire article added, p. 728, � 7, effective July 1. L. 83: (1) amended, p. 705, � 3, effective July 1. L. 84: (3) amended, p. 538, � 14, effective July 1, 1985. L. 89: (3) amended, p. 839, � 75, effective July 1. L. 92: (3) amended, p. 437, � 9, effective April 10. L. 98: (3) amended, p. 1440, � 18, effective July 1; (3) amended, p. 797, � 12, effective July 1. L. 2000: Entire section amended, p. 695, � 8, effective July 1. L. 2007: (3)(a) amended, p. 1696, � 14, effective July 1. L. 2008: (1)(g), (3)(c), and (3)(d) added and (3)(a) amended, p. 2230, �� 3, 4, effective July 1. L. 2014: (3)(a) amended, (HB 14-1266), ch. 155, p. 539, � 5, effective August 6. L. 2018: IP(1) and (3) amended and (1)(h), (1)(i), (1)(j), and (4) added, (HB 18-1200), ch. 379, p. 2290, � 2, effective August 8. L. 2021: (3)(a)(II), (3)(a)(III), (3)(a)(IV), and (3)(c)(I) amended, (SB 21-271), ch. 462, p. 3191, � 256, effective March 1, 2022. L. 2022: (5) added, (SB 22-113), ch. 463, p. 3294, � 7, effective August 10. L. 2023: (3)(b) amended, (HB 23-1293), ch. 298, p. 1787, � 24, effective October 1. Cross references: For the legislative declaration contained in the 2007 act amending subsection (3)(a), see section 1 of chapter 384, Session Laws of Colorado 2007. ARTICLE 6 Offenses Involving the Family Relations Editor's note: This title was repealed and reenacted in 1971. For historical information concerning the repeal and reenactment, see the editor's note following the title heading. PART 1 ABORTION 18-6-101 to 18-6-105. (Repealed) Source: L. 2013: Entire part repealed, (HB 13-1154), ch. 372, p. 2192, � 3, effective July 1. Editor's note: This article was numbered as article 6 of chapter 40, C.R.S. 1963. For amendments to this part 1 prior to its repeal in 2013, consult the 2012 Colorado Revised Statutes, the Colorado statutory research explanatory note beginning on page vii in the front of this volume, and the editor's note following the article heading. Cross references: For the legislative declaration in the 2013 act repealing this part 1, see section 1 of chapter 372, Session Laws of Colorado 2013. PART 2 BIGAMY