| (4) Effect the creation or alteration of a financial | instrument or of an electronic transfer of funds; |
|
| (5) Cause physical injury to the property of another; |
|
| (6) Make or cause to be made an unauthorized copy in | any form, including, but not limited to, any printed | or electronic form of computer data, computer | programs or computer software residing in, | communicated by or produced by the computer or | computer network; or |
|
| (7) Falsify or forge electronic mail transmission | information or other routing information in any | manner in connection with the transmission of | unsolicited bulk electronic mail through or into the | computer network of an electronic mail service | provider or its subscribers; or |
|
| B. Sells, gives or otherwise distributes, or possesses | with the intent to sell, give or otherwise distribute, | software that: |
|
| (1) Is primarily designed or produced for the purpose | of facilitating or enabling the falsification of | electronic mail transmission information or other | routing information; |
|
| (2) Has only limited commercially significant purpose | or use other than to facilitate or enable the | falsification of electronic mail transmission | information or other routing information; or |
|
| (3) Is marketed by that person or another acting in | concert with that person with that person's knowledge | for use in facilitating or enabling the falsification | of electronic mail transmission information or other | routing information. |
|
| | 2. Computer trespass is a Class E crime. If there is damage | to the property of another valued at $2,500 or more caused by | a person's reckless disregard for the consequences of that | person's act, the offense is a Class D crime. If there is | damage to the property of another valued at $5,000 or more | caused by the person's malicious act, the offense is a Class C | crime. |
|
| | 3. This section may not be construed to interfere with or | prohibit terms or conditions in a contract or license related | to computers, computer data, computer networks, computer | operations, computer programs, computer services or computer | software or to create any liability by reason of terms or | conditions adopted by, |
|
|