Skip to main content Skip to office menu Skip to footer
Minnesota Legislature
Advanced Search

Office of the Revisor of Statutes

609.87 COMPUTER CRIME; DEFINITIONS.

Subdivision 1.Applicability.

For purposes of sections 609.87 to 609.891 and 609.8912 to 609.8913, the terms defined in this section have the meanings given them.

Subd. 2.Access.

"Access" means to instruct, communicate with, store data in, or retrieve data from a computer, computer system, or computer network.

Subd. 2a.Authorization.

(a) "Authorization" means:

(1) with the permission of the owner of the computer, computer system, computer network, computer software, or other property;

(2) access by employees of the Department of Commerce acting under the authority and powers granted to the director of the Weights and Measures Division in chapter 239 at any time the device is commercially available for use;

(3) access by registrants in the voluntary placing in service program and registered liquefied petroleum gas (LPG) meter inspectors acting under the authority and powers granted in Minnesota Rules, chapter 7601, but only at times specified by the device owner or operator or the device owner's or operator's designated representative; or

(4) access by other people who have the express permission of the device owner or operator or the device owner's or operator's designated representative but only at times as approved by the device owner or operator and only for purposes approved by the device owner or operator.

(b) Authorization may be limited by the owner by:

(1) giving the user actual notice orally or in writing;

(2) posting a written notice in a prominent location adjacent to the computer being used; or

(3) using a notice displayed on or announced by the computer being used.

Subd. 3.Computer.

"Computer" means an electronic device which performs logical, arithmetic or memory functions by the manipulations of signals, including but not limited to electronic or magnetic impulses.

Subd. 4.Computer system.

"Computer system" means related, connected or unconnected, computers and peripheral equipment.

Subd. 5.Computer network.

"Computer network" means the interconnection of a communication system with a computer through a remote terminal, or with two or more interconnected computers or computer systems, and includes private and public telecommunications networks.

Subd. 6.Property.

"Property" includes, but is not limited to, electronically processed or produced data and information contained in a computer or computer software in either machine or human readable form.

Subd. 7.Services.

"Services" includes but is not limited to, computer time, data processing, and storage functions.

Subd. 8.Computer program.

"Computer program" means an instruction or statement or a series of instructions or statements, in a form acceptable to a computer, which directs the functioning of a computer system in a manner designed to provide appropriate products from the computer.

Subd. 9.Computer software.

"Computer software" means a computer program or procedures, or associated documentation concerned with the operation of a computer.

Subd. 10.Loss.

"Loss" means the greatest of the following:

(1) the retail market value of the property or services involved;

(2) the reasonable repair or replacement cost, whichever is less; or

(3) the reasonable value of the damage created by the unavailability or lack of utility of the property or services involved until repair or replacement can be effected.

Subd. 11.Computer security system.

"Computer security system" means a software program or computer device that is intended to protect the confidentiality and secrecy of data and information stored in or accessible through the computer system.

Subd. 12.Destructive computer program.

"Destructive computer program" means a computer program that performs a destructive function or produces a destructive product. A program performs a destructive function if it degrades performance of the affected computer, associated peripherals or a computer program; disables the computer, associated peripherals or a computer program; or destroys or alters computer programs or data. A program produces a destructive product if it produces unauthorized data, including data that make computer memory space unavailable; results in the unauthorized alteration of data or computer programs; or produces a destructive computer program, including a self-replicating computer program.

Subd. 13.Encryption.

"Encryption" means any protective or disruptive measure, including but not limited to, cryptography, enciphering, or encoding that:

(1) causes or makes any data, information, image, program, signal, or sound unintelligible or unusable; or

(2) prevents, impedes, delays, or disrupts access to any data, information, image, program, signal, or sound.

Subd. 14.Personal data.

"Personal data" means any computer property or computer program which contains records of the employment, salary, credit, or other financial or personal information relating to another person.

Subd. 15.Electronic terminal.

"Electronic terminal" means an electronic device, other than a telephone operated by a consumer, through which an individual or company may initiate an electronic fund transfer. The term includes, but is not limited to, point-of-sale terminals, automated teller machines, cash dispensing machines, and gas pump dispensers.

Subd. 16.Access device.

"Access device" means a card that is used by an individual or company to initiate transactions and is:

(1) a means of access to an individual's or company's account;

(2) issued on a prepaid basis to the individual or company in a specific amount; or

(3) used by the individual or company to access government benefits.