A person shall not intentionally and without authorization or by exceeding valid authorization do any of the following:
  (a) Access or cause access to be made to a computer program, computer, computer system, or computer network to acquire, alter, damage, delete, or destroy property or otherwise use the service of a computer program, computer, computer system, or computer network.

Have a question?
Click here to chat with a criminal defense lawyer and protect your rights.

Terms Used In Michigan Laws 752.795

  • Amendment: A proposal to alter the text of a pending bill or other measure by striking out some of it, by inserting new language, or both. Before an amendment becomes part of the measure, thelegislature must agree to it.
  • Attachment: A procedure by which a person's property is seized to pay judgments levied by the court.
  • person: may extend and be applied to bodies politic and corporate, as well as to individuals. See Michigan Laws 8.3l
  • state: when applied to the different parts of the United States, shall be construed to extend to and include the District of Columbia and the several territories belonging to the United States; and the words "United States" shall be construed to include the district and territories. See Michigan Laws 8.3o
  • United States: shall be construed to include the district and territories. See Michigan Laws 8.3o
  (b) Insert or attach or knowingly create the opportunity for an unknowing and unwanted insertion or attachment of a set of instructions or a computer program into a computer program, computer, computer system, or computer network, that is intended to acquire, alter, damage, delete, disrupt, or destroy property or otherwise use the services of a computer program, computer, computer system, or computer network. This subdivision does not prohibit conduct protected under section 5 of article I of the state constitution of 1963 or under the first amendment of the constitution of the United States.