Current through Laws 2024, c. 453.
Section 1952 - DefinitionsAs used in the Oklahoma Computer Crimes Act:
1. "Access" means to approach, gain entry to, instruct, communicate with, store data in, retrieve data from or otherwise use the logical, arithmetical, memory or other resources of a computer, computer system or computer network;2. "Computer" means an electronic device which performs work using programmed instruction having one or more of the capabilities of storage, logic, arithmetic or communication. The term includes input, output, processing, storage, software and communication facilities which are connected or related to a device in a system or network;3. "Computer network" means the wired or wireless physical or logical interconnection of one or more computers or computer systems to each other, or to other computer networks, for the purpose of transmitting or receiving computer programs, computer software or data;4. "Computer program" means a set or series of instructions or statements and related data which when executed in actual or modified form directs or is intended to direct the functioning of a computer system in a manner designed to perform certain operations;5. "Computer software" means one or more computer programs, procedures and associated documentation used in the operation of a computer system;6. "Computer system" means a set of related, connected or unconnected, computer equipment, devices including support devices, one or more of which contain computer programs, electronic instructions, input data, and output data, that performs functions including, but not limited to, logic, arithmetic, data storage and retrieval, communication, and control and software. The term does not include calculators which are not programmable and are not capable of being connected to or used to access other computers, computer networks, computer systems or support devices;7. "Data" means a representation of information, knowledge, facts, concepts, computer software, computer programs or instructions. Data may be in any form, in storage media, or as stored in the memory of the computer or in transit or presented on a display device;8. "Malicious computer program" means any computer program that is created, executed, modified or distributed with the intent to disrupt, destroy, deny access to, redirect, defraud, deceive, exceed or gain unauthorized access to any computer, computer system, computer network or data. Malicious computer program includes, but is not limited to, viruses, Trojan horses, spyware, worms, rootkits, backdoors, ransomware and other malicious computer instructions, whether part of or independent of broader computer software or computer systems;9. "Property" means any tangible or intangible item of value and includes, but is not limited to, financial instruments, geophysical data or the interpretation of that data, information, computer software, computer programs, electronically-produced data and computer-produced or stored data, supporting documentation, computer software in either machine or human readable form, electronic impulses, confidential, copyrighted or proprietary information, private identification codes or numbers which permit access to a computer by authorized computer users or generate billings to consumers for purchase of goods and services including, but not limited to, credit card transactions and telecommunications services or permit electronic fund transfers and any other tangible or intangible item of value;10. "Services" includes, but is not limited to, computer time, data processing and storage functions and other uses of a computer, computer system or computer network to perform useful work;11. "Supporting documentation" includes, but is not limited to, all documentation in any form used in the construction, design, classification, implementation, use or modification of computer software, computer programs or data; and12. "Victim expenditure" means any expenditure reasonably and necessarily incurred by the owner or lessee to verify that a computer system, computer network, computer program or data was or was not altered, deleted, disrupted, damaged or destroyed by the access.Okla. Stat. tit. 21, § 1952
Amended by Laws 2021 , c. 545, s. 1, eff. 11/1/2021.Added by Laws 1984, SB 464, c. 70, § 2, emerg. eff. 3/29/1984; Amended by Laws 1989, HB 1096, c. 151, § 1, eff. 11/1/1989.