Relates to computer-related crimes; creates the crimes unlawful disruption of computer services in the first and second degree, unlawful computer access assistance in the first and second degree, unauthorized use of internet domain name or profile, and unlawful introduction of a computer contaminant; allows for a civil action for compensatory damages for victims of such crimes.
STATE OF NEW YORK
________________________________________________________________________
3693
2025-2026 Regular Sessions
IN SENATE
January 29, 2025
___________
Introduced by Sen. SANDERS -- read twice and ordered printed, and when
printed to be committed to the Committee on Codes
AN ACT to amend the penal law and the education law, in relation to
computer-related crimes
The People of the State of New York, represented in Senate and Assem-bly, do enact as follows:
1 Section 1. Section 156.00 of the penal law, as amended by chapter 558
2 of the laws of 2006, is amended to read as follows:
3 § 156.00 Offenses involving computers; definition of terms.
4 The following definitions are applicable to this chapter except where
5 different meanings are expressly specified:
6 1. "Computer" means a device or group of devices which, by manipu-
7 lation of electronic, magnetic, optical or electrochemical impulses,
8 pursuant to a computer program, can automatically perform arithmetic,
9 logical, storage or retrieval operations with or on computer data, and
10 includes any connected or directly related device, equipment or facility
11 which enables such computer to store, retrieve or communicate to or from
12 a person, another computer or another device the results of computer
13 operations, computer programs or computer data.
14 2. "Computer program" is property and means an ordered set of data
15 representing coded instructions or statements that, when executed by
16 computer, cause the computer, computer system or computer network to
17 process data or direct the computer, computer system or computer network
18 to perform one or more computer operations or both and may be in any
19 form, including magnetic storage media, punched cards, or stored inter-
20 nally in the memory of the computer.
21 3. "Computer data" is property and means a representation of informa-
22 tion, knowledge, facts, concepts or instructions which are being proc-
23 essed, or have been processed in a computer and may be in any form,
24 including magnetic storage media, punched cards, or stored internally in
25 the memory of the computer.
EXPLANATION--Matter in italics (underscored) is new; matter in brackets
[] is old law to be omitted.
LBD07894-01-5
S. 3693 2
1 4. "Computer service" means any and all services provided by or
2 through the facilities of any computer communication system allowing the
3 input, output, examination, or transfer, of computer data or computer
4 programs from one computer to another, including, but not limited to,
5 computer time, data processing, storage functions, internet services,
6 electronic mail services, electronic message services, or other use of a
7 computer, computer system or computer network.
8 5. "Computer material" is property and means any computer data or
9 computer program which:
10 (a) contains records of the medical history or medical treatment of an
11 identified or readily identifiable individual or individuals. This term
12 shall not apply to the gaining access to or duplication solely of the
13 medical history or medical treatment records of a person by that person
14 or by another specifically authorized by the person whose records are
15 gained access to or duplicated; or
16 (b) contains records maintained by the state or any political subdivi-
17 sion thereof or any governmental instrumentality within the state which
18 contains any information concerning a person, as defined in subdivision
19 seven of section 10.00 of this chapter, which because of name, number,
20 symbol, mark or other identifier, can be used to identify the person and
21 which is otherwise prohibited by law from being disclosed. This term
22 shall not apply to the gaining access to or duplication solely of
23 records of a person by that person or by another specifically authorized
24 by the person whose records are gained access to or duplicated; or
25 (c) is not and is not intended to be available to anyone other than
26 the person or persons rightfully in possession thereof or selected
27 persons having access thereto with [his, her or their] such person or
28 person's consent and which accords or may accord such rightful posses-
29 sors an advantage over competitors or other persons who do not have
30 knowledge or the benefit thereof.
31 6. "Computer network" means the interconnection of hardwire or wire-
32 less communication lines with a computer through remote terminals, or a
33 complex consisting of two or more interconnected computers, including,
34 but not limited to, display terminals, remote systems, mobile devices,
35 and printers connected by computer facilities.
36 7. "Access" means to gain entry to, instruct, cause input to, cause
37 output from, cause data processing with, communicate with, store data
38 in, retrieve from, or otherwise make use of any resources of a computer,
39 computer system or computer network, physically, directly or by elec-
40 tronic means.
41 8. "Without authorization" means to use or to access a computer,
42 computer service or computer network without the permission of the owner
43 or lessor or someone licensed or privileged by the owner or lessor where
44 such person knew that [his or her] such person's use or access was with-
45 out permission or after actual notice to such person that such use or
46 access was without permission. It shall also mean the access of a
47 computer service by a person without permission where such person knew
48 that such access was without permission or after actual notice to such
49 person, that such access was without permission.
50 Proof that such person used or accessed a computer, computer service
51 or computer network through the knowing use of a set of instructions,
52 code or computer program that bypasses, defrauds or otherwise circum-
53 vents a security measure installed or used with the user's authorization
54 on the computer, computer service or computer network shall be presump-
55 tive evidence that such person used or accessed such computer, computer
56 service or computer network without authorization.
S. 3693 3
1 9. "Felony" as used in this article means any felony defined in the
2 laws of this state or any offense defined in the laws of any other
3 jurisdiction for which a sentence to a term of imprisonment in excess of
4 one year is authorized in this state.
5 10. "Computer system" means a device or collection of devices, includ-
6 ing support devices and excluding calculators that are not programmable
7 and capable of being used in conjunction with external files, one or
8 more of which contain computer programs, electronic instructions, input
9 data, and output data, that performs functions, including, but not
10 limited to, logic, arithmetic, data storage and retrieval, communi-
11 cation, and control.
12 11. "Government computer system" means any computer system, or part
13 thereof, that is owned, operated, or used by any federal, state, or
14 local governmental entity.
15 12. "Public safety infrastructure computer system" means any computer
16 system, or part thereof, that is necessary for the health and safety of
17 the public including computer systems owned, operated, or used by drink-
18 ing water and wastewater treatment facilities, hospitals, emergency
19 service providers, telecommunication companies, and gas and electric
20 utility companies.
21 13. "Supporting documentation" includes, but is not limited to, all
22 information, in any form, pertaining to the design, construction, clas-
23 sification, implementation, use, or modification of a computer, computer
24 system, computer network, computer program, or computer software, which
25 information is not generally available to the public and is necessary
26 for the operation of a computer, computer system, computer network,
27 computer program, or computer software.
28 14. "Injury" means any alteration, deletion, damage, or destruction of
29 a computer system, computer network, computer program, or data caused by
30 the access, or the denial of access to legitimate users of a computer
31 system, network, or program.
32 15. "Victim expenditure" means any expenditure reasonably and neces-
33 sarily incurred by the owner or lessee to verify that a computer system,
34 computer network, computer program, or data was or was not altered,
35 deleted, damaged, or destroyed by the access.
36 16. "Computer contaminant" means any set of computer instructions that
37 are designed to modify, damage, destroy, record, or transmit information
38 within a computer, computer system, or computer network without the
39 intent or permission of the owner of the information. They include, but
40 are not limited to, a group of computer instructions commonly called
41 viruses or worms, that are self-replicating or self-propagating and are
42 designed to contaminate other computer programs or computer data,
43 consume computer resources, modify, destroy, record, or transmit data,
44 or in some other fashion usurp the normal operation of the computer,
45 computer system, or computer network.
46 17. "Internet domain name" means a globally unique, hierarchical
47 reference to an internet host or service, assigned through centralized
48 internet naming authorities, comprising a series of character strings
49 separated by periods, with the rightmost character string specifying the
50 top of the hierarchy.
51 18. "Electronic mail" means an electronic message or computer file
52 that is transmitted between two or more telecommunications devices;
53 computers; computer networks, regardless of whether the network is a
54 local, regional, or global network; or electronic devices capable of
55 receiving electronic messages, regardless of whether the message is
S. 3693 4
1 converted to hard copy format after receipt, viewed upon transmission,
2 or stored for later retrieval.
3 19. "Profile" means either of the following:
4 (a) a configuration of user data required by a computer so that the
5 user may access programs or services and have the desired functionality
6 on that computer; or
7 (b) an internet web site user's personal page or section of a page
8 that is made up of data, in text or graphical form, that displays
9 significant, unique, or identifying information, including, but not
10 limited to, listing acquaintances, interests, associations, activities,
11 or personal statements.
12 § 2. Section 156.29 of the penal law, as added by chapter 590 of the
13 laws of 2008, is amended to read as follows:
14 § 156.29 Unlawful duplication of computer related material in the second
15 degree.
16 A person is guilty of unlawful duplication of computer related materi-
17 al in the second degree when having no right to do so, [he or she] such
18 person copies, reproduces or duplicates or makes use of in any manner
19 any data or computer material [that contains records of the medical
20 history or medical treatment of an identified or readily identifiable
21 individual or individuals with an intent to commit or further the
22 commission of any crime under this chapter] from a computer, computer
23 system, or computer network or takes or copies any supporting documenta-
24 tion, whether existing or residing internal or external to a computer,
25 computer system, or computer network.
26 Unlawful duplication of computer related material in the second degree
27 is a class B misdemeanor.
28 § 3. Section 156.25 of the penal law, as amended by chapter 89 of the
29 laws of 1993, subdivision 2 as amended by chapter 376 of the laws of
30 1997, subdivision 4 as amended by chapter 784 of the laws of 2021 and
31 subdivision 5 as amended by chapter 24 of the laws of 2022, is amended
32 to read as follows:
33 § 156.25 Computer tampering in the third degree.
34 A person is guilty of computer tampering in the third degree when [he]
35 such person commits the crime of computer tampering in the fourth degree
36 and:
37 1. [he] such person does so with an intent: (a) to commit or attempt
38 to commit or further the commission of any felony, (b) to devise or
39 execute any scheme or artifice to defraud, deceive, or extort, or (c) to
40 wrongfully control or obtain money, property or data; or
41 2. [he] such person has been previously convicted of any crime under
42 this article or subdivision eleven of section 165.15 of this [chapter]
43 title; or
44 3. [he] such person intentionally alters in any manner or destroys
45 computer material; or
46 4. [he] such person intentionally alters in any manner or destroys
47 computer data or a computer program so as to cause damages in an aggre-
48 gate amount exceeding one thousand dollars; or
49 5. [he] such person intentionally enters or alters in any manner or
50 destroys computer material indicating that a person did or did not
51 receive a vaccination against COVID-19; or
52 6. such person alters in any manner or destroys any data, computer
53 software, or computer programs which reside or exist internal or
54 external to a public safety infrastructure computer system computer,
55 computer system or computer network.
56 Computer tampering in the third degree is a class E felony.
S. 3693 5
1 § 4. The penal law is amended by adding a new section 156.45 to read
2 as follows:
3 § 156.45 Unlawful disruption of computer services in the second degree.
4 A person is guilty of unlawful disruption of computer services in the
5 second degree when such person knowingly and without permission disrupts
6 or causes the disruption of computer services or denies or causes the
7 denial of computer services to an authorized user of a computer, comput-
8 er system, or computer network.
9 Unlawful disruption of computer services in the second degree is a
10 class A misdemeanor.
11 § 5. The penal law is amended by adding a new section 156.46 to read
12 as follows:
13 § 156.46 Unlawful disruption of computer services in the first degree.
14 A person is guilty of unlawful disruption of computer services in the
15 first degree when such person commits the crime of unlawful disruption
16 of computer services in the second degree and:
17 1. such person disrupts government computer services or denies or
18 causes the denial of government computer services to an authorized user
19 of a government computer, computer system, or computer network; or
20 2. such person disrupts public safety infrastructure computer system
21 computer services or denies or causes the denial of computer services to
22 an authorized user of a public safety infrastructure computer system
23 computer, computer system, or computer network.
24 Unlawful disruption of computer services in the first degree is a
25 class E felony.
26 § 6. The penal law is amended by adding a new section 156.15 to read
27 as follows:
28 § 156.15 Unlawful computer access assistance in the second degree.
29 A person is guilty of unlawful computer access assistance in the
30 second degree when such person knowingly and without permission provides
31 or assists in providing a means of accessing a computer, computer
32 system, or computer network in violation of this article.
33 Unlawful computer access assistance in the second degree is a class A
34 misdemeanor.
35 § 7. The penal law is amended by adding a new section 156.16 to read
36 as follows:
37 § 156.16 Unlawful computer access assistance in the first degree.
38 A person is guilty of unlawful computer access assistance in the first
39 degree when such person commits the crime of unlawful computer access
40 assistance in the second degree and provides or assists in providing a
41 means of accessing a public safety infrastructure computer system
42 computer, computer system or computer network in violation of this arti-
43 cle.
44 Unlawful computer access assistance in the first degree is a class E
45 felony.
46 § 8. The penal law is amended by adding a new section 156.12 to read
47 as follows:
48 § 156.12 Unauthorized use of internet domain name or profile.
49 A person is guilty of unauthorized use of internet domain name or
50 profile when such person knowingly and without permission uses the
51 internet domain name or profile of another individual, corporation, or
52 entity in connection with the sending of one or more electronic mail
53 messages or posts and thereby damages or causes damage to a computer,
54 computer data, computer system or computer network.
55 Unauthorized use of internet domain name or profile is a class A
56 misdemeanor.
S. 3693 6
1 § 9. The penal law is amended by adding a new section 156.37 to read
2 as follows:
3 § 156.37 Unlawful introduction of a computer contaminant.
4 A person is guilty of unlawful introduction of a computer contaminant
5 when such person knowingly introduces a computer contaminant into any
6 computer, computer system, or computer network.
7 Unlawful introduction of a computer contaminant is a class A misdemea-
8 nor.
9 § 10. The penal law is amended by adding a new section 156.55 to read
10 as follows:
11 § 156.55 Civil actions.
12 1. In addition to any other civil remedy available, the owner or
13 lessee of the computer, computer system, computer network, computer
14 program, or data who suffers damage or loss by reason of a violation of
15 any section of this article may bring a civil action against the viola-
16 tor for compensatory damages and injunctive relief or other equitable
17 relief. Compensatory damages shall include any expenditure reasonably
18 and necessarily incurred by the owner or lessee to verify that a comput-
19 er system, computer network, computer program, or data was or was not
20 altered, damaged, or deleted by the access. In any action brought pursu-
21 ant to this section, the court may award reasonable attorney's fees. For
22 the purposes of actions authorized by this section, the conduct of an
23 unemancipated minor shall be imputed to the parent or legal guardian
24 having control or custody of the minor.
25 2. No action may be brought pursuant to this section for a willful
26 violation of this article unless it is initiated within three years of
27 the date of the act complained of, or the date of the discovery of the
28 damage, whichever is later.
29 § 11. The penal law is amended by adding a new section 156.60 to read
30 as follows:
31 § 156.60 Offenses involving computers; forfeiture.
32 Any computer, computer system, computer network, or any software or
33 data, owned by the defendant, that is used during the commission of any
34 offense described in this article or any computer, owned by the defend-
35 ant, which is used as a repository for the storage of software or data
36 illegally obtained in violation of this article shall be subject to
37 forfeiture.
38 § 12. Subdivision 1 of section 6430 of the education law, as amended
39 by chapter 75 of the laws of 2004, is amended to read as follows:
40 1. The trustees or other governing board of every college chartered by
41 the regents or incorporated by special act of the legislature and which
42 maintains a campus, unless otherwise provided, shall adopt written rules
43 for implementing all policies required pursuant to this article and for
44 the maintenance of public order on college campuses and other college
45 property used for educational purposes and provide a program for the
46 enforcement thereof. Such rules shall prohibit, among other things, any
47 action or situation which recklessly or intentionally endangers mental
48 or physical health or involves the forced consumption of liquor or drugs
49 for the purpose of initiation into or affiliation with any organization.
50 Such rules shall govern the conduct of students, faculty and other staff
51 as well as visitors and other licensees and invitees on such campuses
52 and property and shall include computer-related crimes as a specific
53 violation of such rules. The penalties for violations of such rules
54 shall be clearly set forth therein and shall include provisions for the
55 ejection of a violator from such campus and property, in the case of a
56 student or faculty violator [his or her], such student or faculty viola-
S. 3693 7
1 tor's suspension, expulsion, or other appropriate disciplinary action,
2 and in the case of an organization which authorizes such conduct, reci-
3 sion of permission for that organization to operate on campus property
4 and shall also include penalties for computer-related crimes that may
5 subject a student to disciplinary sanctions up to and including dismiss-
6 al from the institution. Such penalties shall be in addition to any
7 penalty pursuant to the penal law or any other law to which a violator
8 or organization may be subject.
9 § 13. This act shall take effect on the one hundred eightieth day
10 after it shall have become a law.