California Penal Code. California
Чтение книги онлайн.

Читать онлайн книгу California Penal Code - California страница 199

Название: California Penal Code

Автор: California

Издательство: Проспект

Жанр: Юриспруденция, право

Серия:

isbn: 9785392105397

isbn:

СКАЧАТЬ to or an accomplice in any operation or unauthorized taking or stealing is guilty of a felony, and upon conviction thereof shall be punished by imprisonment in a county jail for not more than one year or by imprisonment pursuant to subdivision (h) of Section 1170, or by a fine of not more than ten thousand dollars ($10,000) or by both that fine and imprisonment.

      (Amended by Stats. 2011, Ch. 15, Sec. 376. Effective April 4, 2011. Operative October 1, 2011, by Sec. 636 of Ch. 15, as amended by Stats. 2011, Ch. 39, Sec. 68.)

      500.

      (a) Any person who receives money for the actual or purported purpose of transmitting the same or its equivalent to foreign countries as specified in Section 1800.5 of the Financial Code who fails to do at least one of the following acts unless otherwise instructed by the customer is guilty of a misdemeanor or felony as set forth in subdivision (b):

      (1) Forward the money as represented to the customer within 10 days of receipt of the funds.

      (2) Give instructions within 10 days of receipt of the customer’s funds, committing equivalent funds to the person designated by the customer.

      (3) Refund to the customer any money not forwarded as represented within 10 days of the customer’s written request for a refund pursuant to subdivision (a) of Section 1810.5 of the Financial Code.

      (b) (1) If the total value of the funds received from the customer is less than nine hundred fifty dollars ($950), the offense set forth in subdivision (a) is punishable by imprisonment in a county jail not exceeding one year or by a fine not exceeding one thousand dollars ($1,000), or by both that imprisonment and fine.

      (2) If the total value of the money received from the customer is nine hundred fifty dollars ($950) or more, or if the total value of all moneys received by the person from different customers is nine hundred fifty dollars ($950) or more, and the receipts were part of a common scheme or plan, the offense set forth in subdivision (a) is punishable by imprisonment pursuant to subdivision (h) of Section 1170 for 16 months, two, or three years, by a fine not exceeding ten thousand dollars ($10,000), or by both that imprisonment and fine.

      (Amended by Stats. 2011, Ch. 15, Sec. 377. Effective April 4, 2011. Operative October 1, 2011, by Sec. 636 of Ch. 15, as amended by Stats. 2011, Ch. 39, Sec. 68.)

      501.

      Upon a trial for larceny or embezzlement of money, bank notes, certificates of stock, or valuable securities, the allegation of the indictment or information, so far as regards the description of the property, is sustained, if the offender be proved to have embezzled or stolen any money, bank notes, certificates of stock, or valuable security, although the particular species of coin or other money, or the number, denomination, or kind of bank notes, certificates of stock, or valuable security, is not proved; and upon a trial for embezzlement, if the offender is proved to have embezzled any piece of coin or other money, any bank note, certificate of stock, or valuable security, although the piece of coin or other money, or bank note, certificate of stock, or valuable security, may have been delivered to him or her in order that some part of the value thereof should be returned to the party delivering the same, and such part shall have been returned accordingly.

      (Added by Stats. 1989, Ch. 897, Sec. 21.)

      502.

      (a) It is the intent of the Legislature in enacting this section to expand the degree of protection afforded to individuals, businesses, and governmental agencies from tampering, interference, damage, and unauthorized access to lawfully created computer data and computer systems. The Legislature finds and declares that the proliferation of computer technology has resulted in a concomitant proliferation of computer crime and other forms of unauthorized access to computers, computer systems, and computer data.

      The Legislature further finds and declares that protection of the integrity of all types and forms of lawfully created computers, computer systems, and computer data is vital to the protection of the privacy of individuals as well as to the well-being of financial institutions, business concerns, governmental agencies, and others within this state that lawfully utilize those computers, computer systems, and data.

      (b) For the purposes of this section, the following terms have the following meanings:

      (1) “Access” means to gain entry to, instruct, cause input to, cause output from, cause data processing with, or communicate with, the logical, arithmetical, or memory function resources of a computer, computer system, or computer network.

      (2) “Computer network” means any system that provides communications between one or more computer systems and input/output devices including, but not limited to, display terminals, remote systems, mobile devices, and printers connected by telecommunication facilities.

      (3) “Computer program or software” means a set of instructions or statements, and related data, that when executed in actual or modified form, cause a computer, computer system, or computer network to perform specified functions.

      (4) “Computer services” includes, but is not limited to, computer time, data processing, or storage functions, Internet services, electronic mail services, electronic message services, or other uses of a computer, computer system, or computer network.

      (5) “Computer system” means a device or collection of devices, including support devices and excluding calculators that are not programmable and capable of being used in conjunction with external files, one or more of which contain computer programs, electronic instructions, input data, and output data, that performs functions including, but not limited to, logic, arithmetic, data storage and retrieval, communication, and control.

      (6) “Government computer system” means any computer system, or part thereof, that is owned, operated, or used by any federal, state, or local governmental entity.

      (7) “Public safety infrastructure computer system” means any computer system, or part thereof, that is necessary for the health and safety of the public including computer systems owned, operated, or used by drinking water and wastewater treatment facilities, hospitals, emergency service providers, telecommunication companies, and gas and electric utility companies.

      (8) “Data” means a representation of information, knowledge, facts, concepts, computer software, computer programs or instructions. Data may be in any form, in storage media, or as stored in the memory of the computer or in transit or presented on a display device.

      (9) “Supporting documentation” includes, but is not limited to, all information, in any form, pertaining to the design, construction, classification, implementation, use, or modification of a computer, computer system, computer network, computer program, or computer software, which information is not generally available to the public and is necessary for the operation of a computer, computer system, computer network, computer program, or computer software.

      (10) “Injury” means any alteration, deletion, damage, or destruction of a computer system, computer network, computer program, or data caused by the access, or the denial of access to legitimate users of a computer system, network, or program.

      (11) “Victim expenditure” means any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program, or data was or was not altered, deleted, damaged, or destroyed by the access.

      (12) “Computer contaminant” means any set of computer instructions that are designed to modify, damage, destroy, record, or transmit information within a computer, computer system, or computer network without the intent or permission СКАЧАТЬ