(a) For the purpose of this Section:
         “Computer” has the meaning ascribed to the term in
    
Section 17-0.5.
        “Encryption” means the use of any protective or
    
disruptive measure, including, without limitation, cryptography, enciphering, encoding, or a computer contaminant, to: (1) prevent, impede, delay, or disrupt access to any data, information, image, program, signal, or sound; (2) cause or make any data, information, image, program, signal, or sound unintelligible or unusable; or (3) prevent, impede, delay, or disrupt the normal operation or use of any component, device, equipment, system, or network.
        “Network” means a set of related, remotely connected
    
devices and facilities, including more than one system, with the capability to transmit data among any of the devices and facilities. The term includes, without limitation, a local, regional, or global computer network.
        “Program” means an ordered set of data representing
    
coded instructions or statements which can be executed by a computer and cause the computer to perform one or more tasks.
        “System” means a set of related equipment, whether or
    
not connected, which is used with or for a computer.
    (b) A person shall not knowingly use or attempt to use encryption, directly or indirectly, to:

Attorney's Note

Under the Illinois Statutes, punishments for crimes depend on the classification. In the case of this section:
ClassPrisonFine
Class A misdemeanorup to 1 yearup to $2,500
For details, see § Ill. Comp. Stat. 730 ILCS 5/5-4.5-55

Have a question?
Click here to chat with a criminal defense lawyer and protect your rights.

Terms Used In Illinois Compiled Statutes 720 ILCS 5/17-52.5

  • Evidence: Information presented in testimony or in documents that is used to persuade the fact finder (judge or jury) to decide the case for one side or the other.

         (1) commit, facilitate, further, or promote any
    
criminal offense;
        (2) aid, assist, or encourage another person to
    
commit any criminal offense;
        (3) conceal evidence of the commission of any
    
criminal offense; or
        (4) conceal or protect the identity of a person who
    
has committed any criminal offense.
    (c) Telecommunications carriers and information service providers are not liable under this Section, except for willful and wanton misconduct, for providing encryption services used by others in violation of this Section.
     (d) Sentence. A person who violates this Section is guilty of a Class A misdemeanor, unless the encryption was used or attempted to be used to commit an offense for which a greater penalty is provided by law. If the encryption was used or attempted to be used to commit an offense for which a greater penalty is provided by law, the person shall be punished as prescribed by law for that offense.
     (e) A person who violates this Section commits a criminal offense that is separate and distinct from any other criminal offense and may be prosecuted and convicted under this Section whether or not the person or any other person is or has been prosecuted or convicted for any other criminal offense arising out of the same facts as the violation of this Section.