As used in this article, the following terms shall have the following meanings:
(1) ACCESS. To gain entry to, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a computer, computer system, or computer network.
(2) COMPUTER. An electronic, magnetic, optical, electrochemical, or other high speed data processing device or system that performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses and includes all input, output, processing, storage, or communication facilities that are connected or related to the device.
(3) COMPUTER NETWORK. The interconnection of two or more computers or computer systems that transmit data over communication circuits connecting them.
(4) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data or perform specific functions.
(5) COMPUTER SECURITY SYSTEM. The design, procedures, or other measures that the person responsible for the operation and use of a computer employs to restrict the use of the computer to particular persons or uses or that the owner or licensee of data stored or maintained by a computer in which the owner or licensee is entitled to store or maintain the data employs to restrict access to the data.
(6) COMPUTER SERVICES. The product of the use of a computer, the information stored in the computer, or the personnel supporting the computer, including computer time, data processing, and storage functions.
(7) COMPUTER SOFTWARE. A set of instructions or statements, and related data, that when executed in actual or modified form, cause a computer, computer system, or computer network to perform specific functions.
(8) COMPUTER SYSTEM. A set of related or interconnected computer or computer network equipment, devices and software.
(9) DATA. A representation of information, knowledge, facts, concepts, or instructions, which are prepared and are intended for use in a computer, computer system, or computer network. Data may be in any form, in storage media, or as stored in the memory of the computer or in transit.
(10) ELECTRONIC MAIL MESSAGE. A message sent to a unique destination that consists of a unique user name or mailbox and a reference to an Internet domain, whether or not displayed, to which such message can be sent or delivered.
(11) EXCEEDS AUTHORIZATION OF USE. Accessing a computer, computer network, or other digital device with actual or perceived authorization, and using such access to obtain or alter information that the accessor is not entitled to obtain or alter.
(12) FINANCIAL INSTRUMENT. Includes, but is not limited to, any check, cashier's check, draft, warrant, money order, certificate of deposit, negotiable instrument, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security, or any computer system representation thereof.
(13) HARM. Partial or total alteration, damage, or erasure of stored data, interruption of computer services, introduction of a virus, or any other loss, disadvantage, or injury that might reasonably be suffered as a result of the actor's conduct.
(14) IDENTIFICATION DOCUMENT. Any document containing data that is issued to an individual and which that individual, and only that individual, uses alone or in conjunction with any other information for the primary purpose of establishing his or her identity or accessing his or her financial information or benefits. Identification documents specifically include, but are not limited to, the following:
a. Government issued driver's licenses or identification cards.
b. Payment cards such as credit cards, debit cards, and ATM cards.
d. Health insurance or benefit cards.
e. Identification cards issued by educational institutions.
f. Identification cards for employees or contractors.
g. Benefit cards issued in conjunction with any government supported aid program.
h. Library cards issued by any public library.
(15) IDENTIFYING INFORMATION. Specific details that can be used to access a person's financial accounts, obtain identification, or to obtain goods or services, including, but not limited to:
a. Social Security number.
b. Driver's license number.
c. Bank account number.
d. Credit card or debit card number.
e. Personal identification number (PIN).
f. Automated or electronic signature.
g. Unique biometric data.
h. Account password.
(16) INTEGRATED CIRCUIT CARD. Also known as a smart card or chip card, a pocket sized, plastic card with embedded integrated circuits used for data storage or special purpose processing used to validate personal identification numbers (PINs), authorize purchases, verify account balances and store personal records. When inserted into a reader, it transfers data to and from a central computer.
(17) OWNER. An owner or lessee of a computer or a computer network, or an owner, lessee, or licensee of computer data, computer programs, or computer software.
(18) PROPERTY. Includes a financial instrument, data, databases, data while in transit, computer software, computer programs, documents associated with computer systems and computer programs, or copies whether tangible or intangible.
(19) RADIO FREQUENCY IDENTIFICATION (RFID). A technology that uses radio waves to transmit data remotely from an RFID tag, through a reader, from identification documents. It is used in contactless integrated circuit cards, also known as proximity cards.
(20) RADIO FREQUENCY IDENTIFICATION (RFID) TAGS. Also known as RFID labels, the hardware for an RFID system that electronically stores and processes information, and receives and transmits the signal.
(21) REENCODER. An electronic device that places encoded information from the magnetic strip, integrated circuit, RFID tag of an identification document onto the magnetic strip, integrated circuit, or RFID tag of a different identification document.
(22) SCANNING DEVICE. A scanner, reader, or any other electronic device that is used to access, read, scan, obtain, memorize, or store, temporarily or permanently, information encoded on the magnetic strip, integrated circuit, or RFID tag of an identification document.
(23) VIRUS. Means an unwanted computer program or other set of instructions inserted into a computer's memory, operating system, or program that is specifically constructed with the ability to replicate itself or to affect the other programs or files in the computer by attaching a copy of the unwanted program or other set of instructions to one or more computer programs or files.
(24) WEB PAGE. A location that has a single uniform resource locator or other single location with respect to the Internet.