PPT - Missouri University of Science and Technology

advertisement
Computers and the Law
Randy Canis
CLASS 13
Metatags and Keywords;
Spyware;
Computer Crimes
1
Metatags
2
2
Introduction to Metatags
• Metatags – text used in the header of an
html web page used by search engines to
determine or describe the content of the
particular webpage
• Content – a list of words that indicates the
type of content on a particular web page
• Description – a human readable sentence
intended to be displayed by a search
engine when a particular page of a web site
is presented in search engine results
3
3
Playboy Enterprises v. Terri Welles
Factual Background
• Plaintiff Playboy Enterprises, Inc. (PEI) is an international
publishing and entertainment company. … PEI has
established two websites. According to Plaintiff, its free
website, http://www.playboy.com, has become one of the
most popular sites on the Web and is used to promote its
magazine, goods, and services. Its other website, called the
"Playboy Cyber Club," http://www.cyber.playboy.com, is
devoted to promoting current and former PEI models.
• PEI owns federally registered trademarks for the terms
Playboy, Playmate, Playmate of the Month, and Playmate of
the Year. The term Playmate of the Year is sometimes
abbreviated "PMOY." PEI does not have a federally
registered trademark in the abbreviation "PMOY," although
PEI argues that "PMOY" is worthy of trademark protection
because it is a well-known abbreviation for the trademark
Playmate of the Year.
4
4
Playboy Enterprises v. Terri Welles
Factual Background
• Defendant Terri Welles is a self-employed model and
spokesperson, who began her modeling career with Playboy
magazine in 1980. In May of 1980, Ms. Welles appeared on
the cover of Playboy magazine and was subsequently
featured as the "Playmate of the Month" in the December
1980 issue. Ms. Welles received the "Playmate of the Year"
award in June of 1981. Since 1980, Ms. Welles has
appeared in no less than thirteen (13) issues of Playboy
magazine and eighteen (18) newsstand specials published by
PEI. Ms. Welles claims that since 1980 she has always
referred to herself as a "Playmate" or "Playmate of the Year"
with the knowledge of PEI.
5
5
Playboy Enterprises v. Terri Welles
• How is Welles using the mark on her
website?
– Headlines and banner advertisements
– Metatags
– Wallpaper
6
6
Playboy Enterprises v. Terri Welles
Nominative Use Test:
• “First, the product or service in question must be
one not readily identifiable without use of the
trademark;
• second, only so much of the mark or marks may be
used as is reasonably necessary to identify the
product or service; and
• third, the user must do nothing that would, in
conjunction with the mark, suggest sponsorship or
endorsement by the trademark holder.
• We noted in New Kids that a nominative use may
also be a commercial one. “
7
7
Playboy Enterprises v. Terri Welles
Conclusions:
• Headlines and banner advertisements 
nominative
• Use of the terms in the metatags for
Welles' websitenominative
• Use in the wallpaper of the website. not
nominative (and remand for a
determination of whether it infringes on a
PEI trademark).
Let’s look at the decision to determine how
the court came to this decision.
8
8
Promatek Industries, Ltd. v. Equitrac Corp.
Factual Background
• Promatek and Equitrac are competitors in selling cost-recovery
equipment.
• Equitrac's marketing department advised its web designer that
certain words and phrases should be used as metatags for
Equitrac's website.
• In response, the web designer placed the term "Copitrack" in the
contents of Equitrac's website as a metatag.
• Equitrac used the term as a metatag because it provides
maintenance and service on Copitrak equipment, a product used in
the cost-recovery business.
• Promatek holds the trademark for Copitrak, and once it learned of
Equitrac's use of the term Copitrack in the metatag, it brought suit.
• After learning of Promatek's suit, Equitrac contacted all of the
search engines known to it and requested that they remove any
link between the term Copitrack and Equitrac's website.
• Equitrac also removed the Copitrack metatag from its website.
9
9
Promatek Industries, Ltd. v. Equitrac Corp.
• The mark "Copitrak" is a registered trademark of
Promatek Industries, Ltd., which can be found at
www.promatek.com or www.copitrak.com.
• Equitrac appeals the issuance of the injunction,
arguing that the ordered language will not only
inform consumers of its competitor, Promatek, but
will encourage people to go to Promatek's website.
Promatek counters that without this language,
Equitrac will continue to benefit, to Promatek's
detriment, from consumer internet searches
containing the word Copitrack.
10
10
Promatek Industries, Ltd. v. Equitrac Corp.
• “In assessing the likelihood of consumer confusion, we
consider: (1) the similarity between the marks in appearance
and suggestion, (2) the similarity of the products, (3) the area
and manner of concurrent use of the products, (4) the degree
of care likely to be exercised by consumers, (5) the strength
of the plaintiff's marks, (6) any evidence of actual confusion,
and (7) the defendant's intent to palm off its goods as those of
the plaintiff's. Ty, 237 F.3d at 897-98. None of these factors
are dispositive and the proper weight given to each will vary
in each case. Id. However, the similarity of the marks, the
defendant's intent, and evidence of actual confusion are of
particular importance. Id.”
11
11
Promatek Industries, Ltd. v. Equitrac Corp.
• Why does Promatek have a fair likelihood
of succeeding on the merits?
– The marks Copitrack and Copitrak similar
(Equitrac admits that it meant to use the correct
spelling of Copitrak in its metatag)
– Equitrac's use of Copitrack refers to Promatek's
registered trademark, Copitrak.
– Equitrac and Promatek are direct competitors in
the cost-recovery and cost-control equipment
and services market.
– The degree of care to be exercised by
consumers
12
12
Promatek Industries, Ltd. v. Equitrac Corp.
• “Although Equitrac claims that it did not
intend to mislead consumers with respect to
Copitrak, the fact remains that there is a
strong likelihood of consumer confusion as
a result of its use of the Copitrack metatag.
The degree of care exercised by
consumers could lead to initial interest
confusion.
13
13
Promatek Industries, Ltd. v. Equitrac Corp.
• What is initial interest confusion?
– Initial interest confusion, which is actionable under
the Lanham Act, occurs when a customer is lured to
a product by the similarity of the mark, even if the
customer realizes the true source of the goods
before the sale is consummated. Dorr-Oliver, Inc. v.
Fluid-Quip, Inc., 94 F.3d 376, 382 (7th Cir. 1996).”
• What if the consumers that viewed the
website knew right away that the website
was not associated with the trademark
owner?
14
Promatek Industries, Ltd. v. Equitrac Corp.
• “The Ninth Circuit has dealt with initial interest
confusion for websites and metatags and held that
placing a competitor's trademark in a metatag creates a
likelihood of confusion. … Equitrac's placing the term
Copitrack in its metatag, consumers are diverted to its
website and Equitrac reaps the goodwill Promatek
developed in the Copitrak mark. Id. That consumers
who are misled to Equitrac's website are only briefly
confused is of little or no consequence. In fact, "that
confusion as to the source of a product or service is
eventually dispelled does not eliminate the trademark
infringement which has already occurred." Forum Corp.
of N. Am. v. Forum, Ltd., 903 F.2d 434, 442 n.2 (7th Cir.
1990).”
15
15
Promatek Industries, Ltd. v. Equitrac Corp.
• “What is important is not the duration of the confusion, it
is the misappropriation of Promatek's goodwill. Equitrac
cannot unring the bell. As the court in Brookfield
explained, "using another's trademark in one's metatags
is much like posting a sign with another's trademark in
front of one's store." Brookfield, 174 F.3d at 1064.
Customers believing they are entering the first store
rather than the second are still likely to mill around
before they leave. The same theory is true for websites.
Consumers who are directed to Equitrac's webpage are
likely to learn more about Equitrac and its products
before beginning a new search for Promatek and
Copitrak. Therefore, given the likelihood of initial
consumer confusion, the district court was correct in
finding Promatek could succeed on the merits.”
16
16
Promatek Industries, Ltd. v. Equitrac Corp.
• Holding
– We conclude that the district court was
correct in finding Promatek would suffer
a greater harm than Equitrac if corrective
measures were not taken, and we affirm
the grant of the preliminary injunction.
17
17
Jurisdiction from Keywords
• Is use of a competitor’s trademark in
the metatags of your website sufficient
to cause you to be subject to personal
jurisdiction in competitor’s forum
state?
18
Keywords
19
19
1-800 Contacts v. WhenU.com
• Defendant WhenU – creator of software that
provides Internet users with “pop-up ads” relating
to the users Internet activity
• Plaintiff 1-800 Contacts – distributor that sells
contact lenses and related products by mail,
telephone and web
20
20
1-800 Contacts v. WhenU.com
• To what behavior of the Defendant has Plaintiff
objected?
• “When the SaveNow software recognizes a term, it
randomly selects an advertisement from the
corresponding product or service category to
deliver to the C-user's computer screen at roughly
the same time the website or search result sought
by the C-user appears. … Each type of ad appears
in a window that is separate from the particular
website or search-results page the C-user has
accessed.”
• How easy is it for the Internet user to uninstall the
software?
21
21
1-800 Contacts v. WhenU.com
•
•
•
•
What are the causes of actions?
1114(1) – registered trademarks
1125(a)(1) – unregistered trademarks
“a plaintiff must establish that (1) it has a valid
mark that is entitled to protection under the
Lanham Act; and that (2) the defendant used the
mark, (3) in commerce, (4) ‘in connection with the
sale . . . or advertising of goods or services,’ 15
U.S.C. § 1114(1)(a), (5) without the plaintiff's
consent.”
22
22
1-800 Contacts v. WhenU.com
• How did the district court hold with respect
to use in commerce?
– Causing pop-up advertisements for Defendant
to appear when users of the Software have
specifically attempted to access Plaintiff’s
website
– Includes Plaintiff's website address and
trademark in Defendant’s directory of terms that
triggers pop-up advertisements
• How did prior courts rule?
23
23
1-800 Contacts v. WhenU.com
SaveNow Directory
• Court’s analysis focuses on the differences
between use of a trademark and a URL:
• “… a WhenU pop-up ad cannot be triggered
by a C-user's input of the 1-800 trademark
or the appearance of that trademark on a
webpage accessed by the c-user.”
24
24
1-800 Contacts v. WhenU.com
SaveNow Directory
• “In contrast to some of its competitors, moreover,
WhenU does not disclose the proprietary contents of
the SaveNow directory to its advertising clients nor
does it permit these clients to request or purchase
specified keywords to add to the directory. …
• A company's internal utilization of a trademark in a way
that does not communicate it to the public is analogous
to a individual's private thoughts about a trademark.
Such conduct simply does not violate the Lanham Act,
which is concerned with the use of trademarks in
connection with the sale of goods or services in a
manner likely to lead to consumer confusion as to the
source of such goods or services.”
25
25
1-800 Contacts v. WhenU.com
Pop-up Advertisements
• “The fatal flaw with [concluding that placement
of pop-up ads] is that WhenU's pop-up ads do
not display the 1-800 trademark.”
• “[T]he appearance of WhenU's pop-up ad is
not contingent upon or related to 1-800's
trademark, the trademark's appearance on 1800's website, or the mark's similarity to 1800's website address.”
26
26
1-800 Contacts v. WhenU.com
• Why does the court compare the activity
to product placement at drug stores?
27
27
1-800 Contacts v. WhenU.com
Distinguished from past decisions because:
• Does not alter source website
• Does not divert or misdirect users away from
source website
• Does not "sell" keyword trademarks to its
customers or otherwise manipulate which
category-related advertisement will pop up in
response to any particular terms on the
internal directory
– does not link trademarks to any particular
competitor's ads, and a customer cannot pay
to have its pop-up ad appear on any specific
website or in connection with any particular
trademark.
28
28
1-800 Contacts v. WhenU.com
• “We hold that, as a matter of law, WhenU does not
"use" 1-800's trademarks within the meaning of the
Lanham Act, 15 U.S.C. §1127, when it (1) includes 1800's website address, which is almost identical to 1800's trademark, in an unpublished directory of terms
that trigger delivery of WhenU's contextually relevant
advertising to C-users; or (2) causes separate, branded
pop-up ads to appear on a C-user's computer screen
either above, below, or along the bottom edge of the 1800 website window. Accordingly, we reverse the
district court's entry of a preliminary injunction and
remand with instructions to (1) dismiss with prejudice 1800's trademark infringement claims against WhenU,
and (2) proceed with 1-800's remaining claims.”
29
29
Playboy v. Netscape
• “Defendants have various lists of terms to which
they key advertisers' banner ads. Those lists
include the one at issue in this case, a list
containing terms related to sex and adult-oriented
entertainment. Among the over-400 terms in this
list are two for which PEI holds trademarks:
‘playboy’ and ‘playmate.’ Defendants require adultoriented companies to link their ads to this set of
words. Thus, when a user types in ‘playboy,’
‘playmate,’ or one of the other listed terms, those
companies' banner ads appear on the search
results page.”
30
30
Playboy v. Netscape
• What are Keywords and how are the
used in searching?
• What are banner advertisements and
sponsored links?
• What is at stake in this case?
31
31
Playboy v. Netscape
• Trademark infringement
• Direct or Contributory? - “We conclude that
defendants are potentially liable under one theory
and that we need not decide which one.”
• Likelihood of Confusion - We conclude that a
genuine issue of material fact does exist regarding
the likelihood of consumer confusion resulting from
defendants' use of PEI's marks.
• Affirmative Defenses? – “We conclude that no
defenses apply.”
32
32
Playboy v. Netscape
• “Initial interest confusion is customer
confusion that creates initial interest in
a competitor's product. Although
dispelled before an actual sale occurs,
initial interest confusion impermissibly
capitalizes on the goodwill associated
with a mark and is therefore
actionable trademark infringement.”
33
33
Playboy v. Netscape
• Initial Interest Confusion theory
• “Because banner advertisements appear immediately after
users type in PEI's marks, PEI asserts that users are likely to
be confused regarding the sponsorship of unlabeled banner
advertisements. n16 In addition, many of the advertisements
instruct users to ‘click here.’ Because of their confusion, users
may follow the instruction, believing they will be connected to
a PEI cite. Even if they realize ‘immediately upon accessing’
the competitor's site that they have reached a site ‘wholly
unrelated to’ PEI's, the damage has been done: Through
initial consumer confusion, the competitor ‘will still have
gained a customer by appropriating the goodwill that [PEI]
has developed in its [] mark.’”
34
34
Google Adwords
• Adwords enables paid advertisements
that match specific keywords
• Adwords has different trademark
usage in advertising content v. usage
as keyword
35
Content v. Keyword
• Content
– Descriptive Fair Use
– Nominative Fair Use
– Authorized to sell under the trademark
– Does not sell products that compete
directly with products sold under the
trademark
• Keywords
– No trademark restrictions
36
Possible Cause of Actions
• Trademark Infringement
– Initial Interest Confusion
• Trademark Dilution
• False Advertising
• Unfair competition
37
1-800 Contacts v. Lens.com
• “We must resolve whether the
Lanham Act was violated by an
advertiser’s use of keywords that
resembled a competitor’s service
mark. For the most part, we hold that
there was no violation.”
38
1-800 Contacts v. Lens.com
• Parties
• 1-800 Contacts
– Replacement contact lens
• Lens.com
– Competitor of 1-800 contacts
39
1-800 Contacts v. Lens.com
• History
– 1-800 Contacts determined usage of marks
as keywords and tried to settle
– Sued for trademark infringement D.C. Utah
• Trademark infringement through initial
interest confusion
• Secondarily liable (agency and contributory
infringement) through affiliates conduct
– D.C. awarded summary judgment to
Lens.com on all claims
40
1-800 Contacts v. Lens.com
• Adwords
– Organic results
– Sponsored links with advertising copy
• Above or to the right of the organic results
• Notice of sponsored links
• Shading to set them apart
– Advertisers pay per impression
41
1-800 Contacts v. Lens.com
• Direct confusion – when consumers
believe that P is source of D goods or
services
• Reverse confusion – when consumers
believe that D is source of P goods or
services
• Initial interest confusion – lured to the
product of a competitor through use of
a trademark
42
1-800 Contacts v. Lens.com
• “[A] consumer enters a query for ‘1-800
Contacts’ on Google; sees a screen with an
ad for Lens.com that is generated because
of Lens.com’s purchase of one of the nine
Challenged Keywords; becomes confused
about whether Lens.com is the same
source as, or is affiliated with, 1-800; and
therefore clicks on the Lens.com ad to view
the site.”
43
1-800 Contacts v. Lens.com
• “[I]nitial-interest confusion occurred at
most 1.5% of the time that a Lens.com
ad was generated by a Challenged
Keyword in those eight months. This
number cannot support an inference
that Lens.com’s keyword activity was
likely to ‘lure[]’ consumers away from
1-800.”
44
1-800 Contacts v. Lens.com
• “[T]he Ninth Circuit considered ‘the
labeling and appearance of the
advertisements and the surrounding
context on the screen displaying the
results page’ to be a critical factor in
finding no likelihood of confusion in a
case in which the alleged infringer
used a competitor’s mark as a
keyword.”
45
Other Cases
• Rosetta Stone v. Google
– Settled out of court
• Infostream Grp. Inc. v. Avid Life Media Inc.
(C.D.CA 2013)
– Use of trademarks to trigger ads in search engine
without more was not trademark infringement
46
Spyware
47
Sotelo v. Directrevnue
• Stephen Sotelo (P)
• DirectRevenue Holdings, AccuQuote,
and aQuantative (D)
• Nature of dispute – spyware installed
without P consent
48
Sotelo v. Directrevnue
•
•
•
•
•
What does P allege that D has done?
How is the software downloaded?
What is the EULA?
Why isn’t the EULA approved?
What bad stuff is D accused of doing?
49
Sotelo v. Directrevnue
• Trespass to chattels
– “A trespass to a chattel may be committed by
intentionally (a) dispossessing another of a
chattel, or (b) using or intermeddling with a
chattel in possession of another.”
• What is plaintiff’s allegation?
• Did the court find that trespass to chattels
was applicable?
• Why did the court find in favor of the P?
50
Sotelo v. Directrevnue
• Other causes of action
– Illinois Consumer Fraud Act – not
dismissed
– Unjust enrichment – dismissed
– Negligence – not dismissed
– Computer tampering – not dismissed
51
Computer Crimes
• Cyber pornography
• Computer Intrusion
• Other types of crimes
52
What is criminal law?
• Crime is a wrong against society
proclaimed in a statute and
punishable by a fine and/or
imprisonment (or death)
53
Felonies
• Serious crimes punishable by death or
by imprisonment in a federal or state
penitentiary for one year or longer
• Four Degrees of Felony (from Model
Penal Code)
– Capital offenses—death penalty
– First degree felonies—life in prison (max)
– Second degree felonies—10 years (max)
– Third degree felonies—5 years (max)
54
Misdemeanors and Petty
Offenses
• Misdemeanor
– any crime that is not a felony
– Punishable by a fine of by incarceration
for up to one year
• Petty Offenses
– Subset of misdemeanors
– Minor violations
– Jail for a few days and/or fine
55
U.S. v. Crow
•
•
•
Chuck Esposito ("Esposito"), a detective with the Clearwater, Florida
Police Department, conducted an undercover child sexual abuse
and pornography investigation by logging onto various "chat rooms."
Esposito represented himself to be a thirteen year old girl. His
screen name was StephieFL and the attached profile revealed, in
part, his assumed identity as Stephanie, a single female from
Clearwater, Florida, born on January 26, 1983. …
On August 8, 1996, Esposito encountered Appellant, William R.
Crow ("Crow"), in a "Pre-teen" chat room on the Internet. Crow
utilized the screen name VideoDom and his profile indicated that he
was a male from Texas whose name was Bill. Crow's profile on the
Internet read: "seeking young slender amateur women interested in
making very explicit adult videos!" His personal quote stated, "I am
very $ generous$ if you are good and nasty! Email me for an
interview! I travel!"
Crow therefore sent several explicit pictures to StephieFL…
56
U.S. v. Crow
•
•
•
“Crow asked permission to call StephieFL to verify her identity.
When she declined, he gave her a telephone number and hours
during which she could call him. Crow asked StephieFL her age and
she told him she was ‘13.’”
“Throughout their contact, which occurred via the Internet and email, Crow continued to provide StephieFL with sexually explicit
photographs of pre-pubescent and pubescent girls while requesting
voice verification.”
“In late September of 1996, StephieFL had secured a mailing
address and informed Crow that she had forwarded a video. A
twenty-nine year old secretary for the Midland, Texas Police
Department phoned Crow at his place of employment, identified
herself and left a message for him. A receptionist left the message
on Crow's desk. United States Postal Inspector Ron Massey
arranged a controlled delivery of a videotape to Crow. The video
tape, which Massey had received from the Dallas Police
Department, presented a young female performing the type of
sexually explicit conduct Stephanie had described recording for
Crow. On September 30, 1996, Crow was arrested as he left the
post office with the videotape. “
57
U.S. v. Crow
•
•
“On October 17, 1996, the grand jury returned a six count indictment against
Crow. Counts one, two and three charged him with interstate shipment of
visual depictions of minors engaged in sexually explicit conduct in violation of
18 U.S.C. § 2252(a)(1)(B). Count four charged attempted sexual exploitation
of a minor in violation of 18 U.S.C. § 2251(a) and (d), while count five
charged Crow with receipt of interstate shipment of visual depiction of minors
engaged in sexually explicit conduct in violation of 18 U.S.C. § 2252(a)(2).
Finally, count six alleged possession of three or more visual depictions of
minors engaged in sexually explicit conduct in violation of 18 U.S.C. §
2252(a)(4).
At trial, Crow admitted to using the name VideoDom to send, via interstate
commerce, the visual depictions of minors engaged in sexually explicit
conduct as alleged in counts one, two and three. Crow also admitted to
possessing three or more visual depictions of minors engaged in sexually
explicit conduct as alleged in count six. Crow admitted guilt to those counts,
but maintained his innocence with regard to counts four and five. A jury
convicted Crow on all counts. On September 11, 1997, Crow was sentenced
to ninety-seven months imprisonment on counts one through five, and to a
concurrent sixty months imprisonment on count six. A fine and supervised
release were imposed. On September 19, 1997, the trial court entered its
judgment. This appeal followed.
58
U.S. v. Crow
•
•
•
“Crow claims that the allegation charged in count four of the
indictment did not satisfy the minimum constitutional requirements
because: (1) it failed to state an offense under 18 U.S.C. § 2251;
and (2) it failed to state an essential element of the crime requiring
that the person exploited through various means must be a "minor."
Crow, in challenging the sufficiency of the indictment, focuses on the
indictment's phrase "a person whom the defendant believed was a
13 year old female." He contends that the statute requires that the
individual exploited or that the defendant attempted to exploit had to
actually be a minor.”
“Crow contends that section 2251 should be interpreted to require
the individual involved to actually be a minor female, and not merely
a person believed to be a minor female. Crow asserts that the
indictment is insufficient because the statutory language provides
that the person must be a minor and the indictment fails to reflect
the statute's intent.”
The rest of the case seems like a plea bargain gone bad…
59
Federal Criminal Code Related to
Computer Intrusions
Federal Criminal Code Related to Computer Intrusions:
• 18 U.S.C. § 1029. Fraud and Related Activity in
Connection with Access Devices
• 18 U.S.C. § 1030. Fraud and Related Activity in
Connection with Computers
• 18 U.S.C. § 1362. Communication Lines, Stations, or
Systems
• 18 U.S.C. § 2510 et seq. Wire and Electronic
Communications Interception and Interception of Oral
Communications
• 18 U.S.C. § 2701 et seq. Stored Wire and Electronic
Communications and Transactional Records Access
• 18 U.S.C. § 3121 et seq. Recording of Dialing, Routing,
Addressing, and Signaling Information
http://www.cybercrime.gov/cclaws.html
60
Computer Fraud and Abuse Act (CFAA)
• Crimes under the CFAA:
– Knowingly commit espionage by accessing information
without authorization or exceeding authorized access;
– Access other information without authorization or
exceeding authorized access;
– Access any nonpublic government computer;
– Access any computer with an intent to commit fraud;
– Knowingly or intentionally damage a computer;
– Knowingly traffic in passwords;
– Threaten to cause damage to a computer with the intent
to extort money or other things of value
61
CFAA Penalties
• Obtaining National Security Information Section
(a)(1) 10 years
• Accessing a Computer and Obtaining Information
Section (a)(2)  1 or 5 years
• Trespassing in a Government Computer Section
(a)(3)  1 year
• Accessing a Computer to Defraud & Obtain Value
Section (a)(4)  5 years
• Intentionally Damaging by Knowing Transmission
Section (a)(5)(A)  1 or 10 years
62
CFAA Penalties
• Recklessly Damaging by Intentional Access
Section (a)(5)(B)  1 or 5 years
• Negligently Causing Damage & Loss by Intentional
Access Section (a)(5)(C)  1 year
• Trafficking in Passwords Section (a)(6)  1 year
• Extortion Involving Computers Section (a)(7)  5
years
63
Protected Computer
• Section 1030(e)(2) defines protected computer as:
a computer—
(A) exclusively for the use of a financial institution
or the United States Government, or, in the case of
a computer not exclusively for such use, used by or
for a financial institution or the United States
Government and the conduct constituting the
offense affects that use by or for the financial
institution or the Government; or
(B) which is used in or affecting interstate or
foreign commerce or communication . . . .
64
Insiders v. Outsiders
• Insiders – exceed authorized access
• Outsiders – without authorization
65
Exceeds Authorized Access
• The term “exceeds authorized access”
means “to access a computer with
authorization and to use such access
to obtain or alter information in the
computer that the accesser is not
entitled so to obtain or alter.”
• Without authorization is not defined…
66
Exceeds Authorized Access
• “It is relatively easy to prove that a
defendant had only limited authority to
access a computer in cases where the
defendant’s access was limited by
restrictions that were memorialized in
writing, such as terms of service, a
computer access policy, a website
notice, or an employment agreement
or similar contract.”
67
Obtaining National Security Information
1030(a)(1) Summary (Felony)
1. Knowingly access computer without or in excess of
authorization
2. obtain national security information
3. reason to believe the information could injure the
U.S. or benefit a foreign nation
4. willful communication, delivery, transmission (or
attempt) OR willful retention of the information
68
Accessing
a Computer and Obtaining Information
1030(a)(2) Summary (Misd.)
1. Intentionally access a computer
2. without or in excess of authorization
3. obtain information
4. from financial records of financial institution
or consumer reporting agency OR the U.S.
government OR a protected computer
69
Accessing
a Computer and Obtaining Information
(Felony)
5. committed for commercial advantage
or private financial gain OR committed
in furtherance of any criminal or
tortious act OR the value of the
information obtained exceeds $5,000
70
Trespassing in a
Government Computer
1030(a)(3) Summary (Misd.)
1. Intentionally access
2. without authorization
3. a nonpublic computer of the U.S. that
was exclusively for the use of U.S. or
was used by or for U.S.
4. affected U.S. use of computer
71
Accessing to Defraud and
Obtain Value
1030(a)(4) Summary (Felony)
1. Knowingly access a protected computer
without or in excess of authorization
2. with intent to defraud
3. access furthered the intended fraud
4. obtained anything of value, including use if
value exceeded $5000
72
Damaging a Computer or
Information
Summary of (a)(5)(A)
1. Knowingly cause transmission of a
program, information, code, or
command
2. intentionally cause damage to
protected computer without
authorization
73
Damaging a Computer or
Information
Summary of (a)(5)(B)
1. Intentionally access a protected
computer without authorization
2. recklessly cause damage
74
Damaging a Computer or
Information
Summary of (a)(5)(C)
1. Intentionally access a protected
computer without authorization
2. cause damage
3. cause loss
75
Felony
3. resulting in loss of $5,000 during 1 year OR
modifies medical care of a person OR
causes physical injury OR threatens public
health or safety OR damages systems used
by or for government entity for
administration of justice, national defense,
or national security OR damages affect 10
or more protected computers during 1 year
76
Trafficking in Passwords
1030(a)(6) Summary (Misd.)
1. Trafficking
2. in computer password or similar
information
3. knowingly and with intent to defraud
4. trafficking affects interstate or foreign
commerce OR computer used by or for
U.S.
77
Threatening to Damage a
Computer
1030(a)(7) Summary (Felony)
1. With intent to extort money or any other thing of
value
2. transmits in interstate or foreign commerce a
communication
3. containing a: threat to damage a protected
computer OR threat to obtain or reveal confidential
information without or in excess of authorization
OR demand or request for money or value in
relation to damage done in connection with the
extortion.
78
U.S. v. Morris
•
•
“This appeal presents two narrow issues of statutory construction concerning
a provision Congress recently adopted to strengthen protection against
computer crimes. Section 2(d) of the Computer Fraud and Abuse Act of
1986, 18 U.S.C. § 1030(a)(5)(A) (1988), punishes anyone who intentionally
accesses without authorization a category of computers known as ‘federal
interest computers’ and damages or prevents authorized use of information
in such computers, causing loss of $ 1,000 or more. The issues raised are
(1) whether the Government must prove not only that the defendant intended
to access a federal interest computer, but also that the defendant intended to
prevent authorized use of the computer's information and thereby cause
loss; and (2) what satisfies the statutory requirement of ‘access without
authorization.’”
“These questions are raised on an appeal by Robert Tappan Morris from the
May 16, 1990, judgment of the District Court for the Northern District of New
York (Howard G. Munson, Judge) convicting him, after a jury trial, of violating
18 U.S.C. § 1030(a)(5)(A). Morris released into INTERNET, a national
computer network, a computer program known as a ‘worm’ that spread and
multiplied, eventually causing computers at various educational institutions
and military sites to ‘crash’ or cease functioning. “
79
U.S. v. Morris
• Holding: We conclude that section
1030(a)(5)(A) does not require the
Government to demonstrate that the
defendant intentionally prevented
authorized use and thereby caused loss.
We also find that there was sufficient
evidence for the jury to conclude that Morris
acted "without authorization" within the
meaning of section 1030(a)(5)(A). We
therefore affirm.
80
U.S. v. Morris
• “In October 1988, Morris began work on a computer program,
later known as the INTERNET "worm" or "virus." The goal of
this program was to demonstrate the inadequacies of current
security measures on computer networks by exploiting the
security defects that Morris had discovered. The [**4] tactic
he selected was release of a worm into network computers.
Morris designed the program to spread across a national
network of computers after being inserted at one computer
location connected to the network. Morris released the worm
into INTERNET, which is a group of national networks that
connect university, governmental, and military computers
around the country. The network permits communication and
transfer of information between computers on the network.”
• “Morris sought to program the INTERNET worm to spread
widely without drawing attention to itself. …”
81
U.S. v. Morris
• Morris identified four ways in which the worm could break into
computers on the network:
• (1) through a "hole" or "bug" (an error) in SEND MAIL, a
computer program that transfers and receives electronic mail
on a computer;
• (2) through a bug in the "finger demon" program, a program
that permits a person to obtain limited information about the
users of another computer;
• (3) through the "trusted hosts" feature, which permits a user
with certain privileges on one computer to have equivalent
privileges on another computer without using a password;
and
• (4) through a program of password guessing, whereby
various combinations of letters are tried out in rapid sequence
in the hope that one will be an authorized user's password,
which is entered to permit whatever level of activity that user
is authorized to perform.”
82
U.S. v. Morris
• “On November 2, 1988, Morris released the worm from a
computer at the Massachusetts Institute of Technology. MIT
was selected to disguise the fact that the worm came from
Morris at Cornell. Morris soon discovered that the worm was
replicating and reinfecting machines at a much faster rate
than he had anticipated. Ultimately, many machines at
locations around the country either crashed or became
"catatonic." When Morris realized what was happening, he
contacted a friend at Harvard to discuss a solution.
Eventually, they sent an anonymous message from Harvard
over the network, instructing programmers how to kill the
worm and prevent reinfection. However, because the network
route was clogged, this message did not get through until it
was too late. Computers were affected at numerous
installations, including leading universities, military sites, and
medical research facilities. The estimated cost of dealing with
the worm at each installation ranged from $ 200 to more than
$ 53,000.”
83
U.S. v. Morris
• Morris was found guilty, following a
jury trial, of violating 18 U.S.C. §
1030(a)(5)(A). He was sentenced to
three years of probation, 400 hours of
community service, a fine of $ 10,050,
and the costs of his supervision.
84
U.S. v. Morris
The intent requirement in Section 1030(a)(5)(A)
• Section 1030(a)(5)(A), covers anyone who (5)
intentionally accesses a Federal interest computer
without authorization, and by means of one or
more instances of such conduct alters, damages,
or destroys information in any such Federal interest
computer, or prevents authorized use of any such
computer or information, and thereby (A) causes
loss to one or more others of a value aggregating $
1,000 or more during any one year period; ...
[emphasis added].
85
U.S. v. Morris
Analysis of the legislative history…
• “Despite some isolated language in the
legislative history that arguably suggests a
scienter component for the "damages"
phrase of section 1030(a)(5)(A), the
wording, structure, and purpose of the
subsection, examined in comparison with
its departure from the format of its
predecessor provision persuade us that the
"intentionally" standard applies only to the
"accesses" phrase of section 1030(a)(5)(A),
and not to its "damages" phrase.”
86
Copyright Legislation
• Family Entertainment and Copyright Act of
2005
– S.167/H.R.357
• Title I--Artists' Rights And Theft
Prevention
• Title II--Exemption From Infringement For
Skipping Audio And Video Content In
Motion Pictures
• Title III--National Film Preservation
• Title IV--Preservation Of Orphan Works
87
Artists' Rights and Theft Prevention
(a) In General- Chapter 113 of title 18, United States Code, is amended
by adding after section 2319A the following new section:
• Sec. 2319B. Unauthorized recording of Motion pictures in a
Motion picture exhibition facility
• (a) Offense- Any person who, without the authorization of the
copyright owner, knowingly uses or attempts to use an audiovisual
recording device to transmit or make a copy of a motion picture or
other audiovisual work protected under title 17, or any part thereof,
from a performance of such work in a motion picture exhibition
facility, shall-(1) be imprisoned for not more than 3 years, fined under this title, or both;
or
(2) if the offense is a second or subsequent offense, be imprisoned for no
more than 6 years, fined under this title, or both.
•
The possession by a person of an audiovisual recording device in a
motion picture exhibition facility may be considered as evidence in
any proceeding to determine whether that person committed an
offense under this subsection, but shall not, by itself, be sufficient to
support a conviction of that person for such offense.
88
Artists' Rights and Theft Prevention
•
•
•
(b) Forfeiture and Destruction- When a person is convicted of a violation of
subsection (a), the court in its judgment of conviction shall, in addition to any
penalty provided, order the forfeiture and destruction or other disposition of
all unauthorized copies of motion pictures or other audiovisual works
protected under title 17, or parts thereof, and any audiovisual recording
devices or other equipment used in connection with the offense.
(c) Authorized Activities- This section does not prevent any lawfully
authorized investigative, protective, or intelligence activity by an officer,
agent, or employee of the United States, a State, or a political subdivision of
a State, or by a person acting under a contract with the United States, a
State, or a political subdivision of a State.
(d) Immunity for Theaters- With reasonable cause, the owner or lessee of a
motion picture exhibition facility where a motion picture or other audiovisual
work is being exhibited, the authorized agent or employee of such owner or
lessee, the licensor of the motion picture or other audiovisual work being
exhibited, or the agent or employee of such licensor-(1) may detain, in a reasonable manner and for a reasonable time, any
person suspected of a violation of this section with respect to that motion
picture or audiovisual work for the purpose of questioning or summoning
a law enforcement officer; and
(2) shall not be held liable in any civil or criminal action arising out of a
detention under paragraph (1).
89
Artists' Rights and Theft Prevention
•
(e) Victim Impact Statement(1) IN GENERAL- During the preparation of the presentence report under
rule 32(c) of the Federal Rules of Criminal Procedure, victims of an
offense under this section shall be permitted to submit to the probation
officer a victim impact statement that identifies the victim of the offense
and the extent and scope of the injury and loss suffered by the victim,
including the estimated economic impact of the offense on that victim.
(2) CONTENTS- A victim impact statement submitted under this subsection
shall include-(A) producers and sellers of legitimate works affected by conduct involved in the
offense;
(B) holders of intellectual property rights in the works described in subparagraph
(A); and
(C) the legal representatives of such producers, sellers, and holders.
•
(f) State Law Not Preempted- Nothing in this section may be
construed to annul or limit any rights or remedies under the laws of
any State.
90
Artists' Rights and Theft Prevention
•
(g) Definitions- In this section, the following definitions shall apply:
–
–
(1) TITLE 17 DEFINITIONS- The terms `audiovisual work', `copy', `copyright
owner', `motion picture', `motion picture exhibition facility', and `transmit' have,
respectively, the meanings given those terms in section 101 of title 17.
(2) AUDIOVISUAL RECORDING DEVICE- The term `audiovisual recording device'
means a digital or analog photographic or video camera, or any other technology or
device capable of enabling the recording or transmission of a copyrighted motion
picture or other audiovisual work, or any part thereof, regardless of whether
audiovisual recording is the sole or primary purpose of the device.'.
(b) Clerical Amendment- The table of sections at the beginning of chapter 113 of
title 18, United States Code, is amended by inserting after the item relating to
section 2319A the following:
• …
(c) Definition- Section 101 of title 17, United States Code, is amended by
inserting after the definition of `Motion pictures' the following: `The term
`motion picture exhibition facility' means a movie theater, screening room, or
other venue that is being used primarily for the exhibition of a copyrighted
motion picture, if such exhibition is open to the public or is made to an
assembled group of viewers outside of a normal circle of a family and its
social acquaintances.'.
91
Criminal Infringement of a Work Being
Prepared for Commercial Distribution.
(a) Prohibited Acts- Section 506(a) of title 17, United States Code, is
amended to read as follows:
• (a) Criminal Infringement(1) IN GENERAL- Any person who willfully infringes a copyright shall be
punished as provided under section 2319 of title 18, if the infringement
was committed-(A) for purposes of commercial advantage or private financial gain;
(B) by the reproduction or distribution, including by electronic means, during any
180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted
works, which have a total retail value of more than $1,000; or
(C) by the distribution of a work being prepared for commercial distribution, by
making it available on a computer network accessible to members of the
public, if such person knew or should have known that the work was intended
for commercial distribution.
(2) EVIDENCE- For purposes of this subsection, evidence of reproduction
or distribution of a copyrighted work, by itself, shall not be sufficient to
establish willful infringement of a copyright.
92
Criminal Infringement of a Work Being
Prepared for Commercial Distribution.
• (3) DEFINITION- In this subsection, the term `work being
prepared for commercial distribution' means-(A) a computer program, a musical work, a motion picture or other
audiovisual work, or a sound recording, if, at the time of
unauthorized distribution-(i) the copyright owner has a reasonable expectation of commercial
distribution; and
(ii) the copies or phonorecords of the work have not been
commercially distributed; or
(B) a motion picture, if, at the time of unauthorized distribution, the
motion picture-(i) has been made available for viewing in a motion picture exhibition
facility; and
(ii) has not been made available in copies for sale to the general public
in the United States in a format intended to permit viewing outside a
motion picture exhibition facility.'
93
Criminal Infringement of a Work Being
Prepared for Commercial Distribution.
• (d) Any person who commits an offense under section
506(a)(1)(C) of title 17-• (1) shall be imprisoned not more than 3 years, fined under
this title, or both;
• (2) shall be imprisoned not more than 5 years, fined under
this title, or both, if the offense was committed for purposes of
commercial advantage or private financial gain;
• (3) shall be imprisoned not more than 6 years, fined under
this title, or both, if the offense is a second or subsequent
offense; and
• (4) shall be imprisoned not more than 10 years, fined under
this title, or both, if the offense is a second or subsequent
offense under paragraph (2).
94
Civil Remedies for Infringement of A Work
Being Prepared for Commercial Distribution
(a) Preregistration- Section 408 of title 17, United States Code, is amended by adding at the
end the following:
(f) Preregistration of Works Being Prepared for Commercial Distribution(1) RULEMAKING- Not later than 180 days after the date of enactment of this
subsection, the Register of Copyrights shall issue regulations to establish
procedures for preregistration of a work that is being prepared for commercial
distribution and has not been published.
(2) CLASS OF WORKS- The regulations established under paragraph (1) shall
permit preregistration for any work that is in a class of works that the Register
determines has had a history of infringement prior to authorized commercial
distribution.
(3) APPLICATION FOR REGISTRATION- Not later than 3 months after the first
publication of a work preregistered under this subsection, the applicant shall
submit to the Copyright Office-(A) an application for registration of the work;
(B) a deposit; and
(C) the applicable fee.
(4) EFFECT OF UNTIMELY APPLICATION- An action under this chapter for
infringement of a work preregistered under this subsection, in a case in which
the infringement commenced no later than 2 months after the first publication
of the work, shall be dismissed if the items described in paragraph (3) are not
submitted to the Copyright Office in proper form within the earlier of-(A) 3 months after the first publication of the work; or
(B) 1 month after the copyright owner has learned of the infringement.
95
Civil Remedies for Infringement of A Work
Being Prepared for Commercial Distribution
• Exclusion- Section 412 of title 17, United
States Code, is amended by inserting after
`section 106A(a)' the following: `, an action
for infringement of the copyright of a work
that has been preregistered under section
408(f) before the commencement of the
infringement and that has an effective date
of registration not later than the earlier of 3
months after the first publication of the work
or 1 month after the copyright owner has
learned of the infringement,
96
Family Movie Act of 2005
• Title - Exemption from Infringement for
Skipping Audio and Video Content in
Motion Pictures
97
Family Movie Act of 2005
• `(C) The requirement under subparagraph (B) to
provide notice shall apply only with respect to
technology manufactured after the end of the 180day period beginning on the date of the enactment
of the Family Movie Act of 2005.
• `(D) Any failure by a manufacturer, licensee, or
licensor of technology to qualify for the exemption
under subparagraphs (A) and (B) shall not be
construed to create an inference that any such
party that engages in conduct described in
paragraph (11) of section 110 of title 17, United
States Code, is liable for trademark infringement by
reason of such conduct.'.
98
Cybercrime.gov
• Computer Crime & Intellectual
Property Section of the United
States Department of Justice (DOJ)
99
Program
Completed
All course materials - Copyright 2000-14 Randy L. Canis, Esq.
100
Criminal Trade Secret Violation
18 U.S.C. §§ 1831-1839
§1831
• (a)When a D intending or knowing that the offense will benefit any foreign
government, foreign instrumentality, or foreign agent, knowingly
(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by
fraud, artifice, or deception obtains a trade secret;
(2) without authorization copies, duplicates, sketches, draws, photographs, downloads,
uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails,
communicates, or conveys a trade secret;
(3) receives, buys, or possesses a trade secret, knowing the same to have been stolen
or appropriated, obtained, or converted without authorization;
(4) attempts to commit any offense described in any of paragraphs (1) through (3); or
(5) conspires with one or more other persons to commit any offense described in any
of paragraphs (1) through (3), and one or more of such persons do any act to effect
the object of the conspiracy,
•
•
shall, except as provided in subsection (b), be fined not more than $500,000
or imprisoned not more than 15 years, or both.
(b) Organizations.— Any organization that commits any offense described
in subsection (a) shall be fined not more than $10,000,000.
101
Criminal Trade Secret Violation
§1832
•
(a) Whoever, with intent to convert a trade secret, that is related to or included in a
product that is produced for or placed in interstate or foreign commerce, to the economic
benefit of anyone other than the owner thereof, and intending or knowing that the
offense will, injure any owner of that trade secret, knowingly—
•
(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by
fraud, artifice, or deception obtains such information;
•
(2) without authorization copies, duplicates, sketches, draws, photographs, downloads,
uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails,
communicates, or conveys such information;
•
(3) receives, buys, or possesses such information, knowing the same to have been
stolen or appropriated, obtained, or converted without authorization;
•
(4) attempts to commit any offense described in paragraphs (1) through (3); or
•
(5) conspires with one or more other persons to commit any offense described in
paragraphs (1) through (3), and one or more of such persons do any act to effect the
object of the conspiracy,
•
shall, except as provided in subsection (b), be fined under this title or imprisoned not
more than 10 years, or both.
•
(b) Any organization that commits any offense described in subsection (a) shall be fined
not more than $5,000,000.
102
Criminal Trade Secret Violation
§ 1839. Definitions
•
As used in this chapter—
•
(1) the term “foreign instrumentality” means any agency, bureau, ministry, component,
institution, association, or any legal, commercial, or business organization, corporation,
firm, or entity that is substantially owned, controlled, sponsored, commanded, managed,
or dominated by a foreign government;
•
(2) the term “foreign agent” means any officer, employee, proxy, servant, delegate, or
representative of a foreign government;
•
(3) the term “trade secret” means all forms and types of financial, business, scientific,
technical, economic, or engineering information, including patterns, plans, compilations,
program devices, formulas, designs, prototypes, methods, techniques, processes,
procedures, programs, or codes, whether tangible or intangible, and whether or how
stored, compiled, or memorialized physically, electronically, graphically,
photographically, or in writing if—
•
(A) the owner thereof has taken reasonable measures to keep such information secret;
and (B) the information derives independent economic value, actual or potential, from
not being generally known to, and not being readily ascertainable through proper means
by, the public; and
•
(4) the term “owner”, with respect to a trade secret, means the person or entity in whom
or in which rightful legal or equitable title to, or license in, the trade secret is reposed.
103
18 USCS § 1030
•
§ 1030. Fraud and related activity in connection with computers
(a) Whoever-(1) having knowingly accessed a computer without authorization or exceeding
authorized access, and by means of such conduct having obtained information
that has been determined by the United States Government pursuant to an
Executive order or statute to require protection against unauthorized disclosure
for reasons of national defense or foreign relations, or any restricted data, as
defined in paragraph y.[(y)] of section 11 of the Atomic Energy Act of 1954 [42
USCS § 2014(y)], with reason to believe that such information so obtained could
be used to the injury of the United States, or to the advantage of any foreign
nation willfully communicates, delivers, transmits, or causes to be
communicated, delivered, or transmitted, or attempts to communicate, deliver,
transmit or cause to be communicated, delivered, or transmitted the same to
any person not entitled to receive it, or willfully retains the same and fails to
deliver it to the officer or employee of the United States entitled to receive it;
(2) intentionally accesses a computer without authorization or exceeds
authorized access, and thereby obtains-(A) information contained in a financial record of a financial institution, or of a
card issuer as defined in section 1602(n) of title 15, or contained in a file of a
consumer reporting agency on a consumer, as such terms are defined in the
Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);
(B) information from any department or agency of the United States; or
(C) information from any protected computer if the conduct involved an
interstate or foreign communication;
104
18 USCS § 1030
•
(3) intentionally, without authorization to access any
nonpublic computer of a department or agency of the United
States, accesses such a computer of that department or
agency that is exclusively for the use of the Government of
the United States or, in the case of a computer not
exclusively for such use, is used by or for the Government of
the United States and such conduct affects that use by or for
the Government of the United States;
(4) knowingly and with intent to defraud, accesses a
protected computer without authorization, or exceeds
authorized access, and by means of such conduct furthers
the intended fraud and obtains anything of value, unless the
object of the fraud and the thing obtained consists only of the
use of the computer and the value of such use is not more
than $ 5,000 in any 1-year period;
105
•
18 USCS § 1030
(5) (A) (i) knowingly causes the transmission of a program, information, code, or
command, and as a result of such conduct, intentionally causes damage without
authorization, to a protected computer;
(ii) intentionally accesses a protected computer without authorization, and as a result
of such conduct, recklessly causes damage; or
(iii) intentionally accesses a protected computer without authorization, and as a result
of such conduct, causes damage; and
(B) by conduct described in clause (i), (ii), or (iii) of subparagraph (A), caused (or, in the
case of an attempted offense, would, if completed, have caused)-(i) loss to 1 or more persons during any 1-year period (and, for purposes of an
investigation, prosecution, or other proceeding brought by the United States only, loss
resulting from a related course of conduct affecting 1 or more other protected computers)
aggregating at least $ 5,000 in value;
(ii) the modification or impairment, or potential modification or impairment, of the
medical examination, diagnosis, treatment, or care of 1 or more individuals;
(iii) physical injury to any person;
(iv) a threat to public health or safety; or
(v) damage affecting a computer system used by or for a government entity in
furtherance of the administration of justice, national defense, or national security;
(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any
password or similar information through which a computer may be accessed without
authorization, if-(A) such trafficking affects interstate or foreign commerce; or
(B) such computer is used by or for the Government of the United States;
(7) with intent to extort from any person any money or other thing of value, transmits in
interstate or foreign commerce any communication containing any threat to cause damage
to a protected computer;
shall be punished as provided in subsection (c) of this section.
106
18 USCS § 1030
•
(b) Whoever attempts to commit an offense under subsection (a) of this section shall be
punished as provided in subsection (c) of this section.
(c) The punishment for an offense under subsection (a) or (b) of this section is-(1) (A) a fine under this title or imprisonment for not more than ten years, or both, in the
case of an offense under subsection (a)(1) of this section which does not occur after a
conviction for another offense under this section, or an attempt to commit an offense
punishable under this subparagraph; and
(B) a fine under this title or imprisonment for not more than twenty years, or both, in the
case of an offense under subsection (a)(1) of this section which occurs after a conviction for
another offense under this section; or an attempt to commit an offense punishable under this
subparagraph;
(2) (A) except as provided in subparagraph (B), a fine under this title or imprisonment for
not more than one year, or both, in the case of an offense under subsection (a)(2), (a)(3),
(a)(5)(A)(iii), or (a)(6) of this section which does not occur after a conviction for another
offense under this section, or an attempt to commit an offense punishable under this
subparagraph;
(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case
of an offense under subsection (a)(2), or an attempt to commit an offense punishable under
this subparagraph, if-(i) the offense was committed for purposes of commercial advantage or private
financial gain;
(ii) the offense was committed in furtherance of any criminal or tortious act in violation
of the Constitution or laws of the United States or of any State; or
(iii) the value of the information obtained exceeds $ 5,000; and
(C) a fine under this title or imprisonment for not more than ten years, or both, in the
case of an offense under subsection (a)(2), (a)(3) or (a)(6) of this section which occurs after
a conviction for another offense under this section, or an attempt to commit an offense
punishable under this subparagraph;
107
18 USCS § 1030
•
(3) (A) a fine under this title or imprisonment for not more than five years, or both, in
the case of an offense under subsection (a)(4) or (a)(7) of this section which does not
occur after a conviction for another offense under this section, or an attempt to commit
an offense punishable under this subparagraph; and
(B) a fine under this title or imprisonment for not more than ten years, or both, in the
case of an offense under subsection (a)(4), (a)(5)(A)(iii), or (a)(7) of this section which
occurs after a conviction for another offense under this section, or an attempt to commit
an offense punishable under this section;
(4) (A) except as provided in paragraph (5), a fine under this title, imprisonment for not
more than 10 years, or both, in the case of an offense under subsection (a)(5)(A)(i), or
an attempt to commit an offense punishable under that subsection;
(B) a fine under this title, imprisonment for not more than 5 years, or both, in the
case of an offense under subsection (a)(5)(A)(ii), or an attempt to commit an offense
punishable under that subsection;
(C) except as provided in paragraph (5), a fine under this title, imprisonment for not
more than 20 years, or both, in the case of an offense under subsection (a)(5)(A)(i) or
(a)(5)(A)(ii), or an attempt to commit an offense punishable under either subsection, that
occurs after a conviction for another offense under this section; and
(5) (A) if the offender knowingly or recklessly causes or attempts to cause serious
bodily injury from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or
imprisonment for not more than 20 years, or both; and
(B) if the offender knowingly or recklessly causes or attempts to cause death from
conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for
any term of years or for life, or both.
108
18 USCS § 1030
• (d)
(1) The United States Secret Service shall, in addition to
any other agency having such authority, have the authority to
investigate offenses under this section.
(2) The Federal Bureau of Investigation shall have primary
authority to investigate offenses under subsection (a)(1) for
any cases involving espionage, foreign counterintelligence,
information protected against unauthorized disclosure for
reasons of national defense or foreign relations, or Restricted
Data (as that term is defined in section 11y of the Atomic
Energy Act of 1954 (42 U.S.C. 2014(y)), except for offenses
affecting the duties of the United States Secret Service
pursuant to section 3056(a) of this title.
(3) Such authority shall be exercised in accordance with an
agreement which shall be entered into by the Secretary of the
Treasury and the Attorney General.
109
18 USCS § 1030
•
(e) As used in this section-(1) the term "computer" means an electronic, magnetic, optical,
electrochemical, or other high speed data processing device
performing logical, arithmetic, or storage functions, and includes any
data storage facility or communications facility directly related to or
operating in conjunction with such device, but such term does not
include an automated typewriter or typesetter, a portable hand held
calculator, or other similar device;
(2) the term "protected computer" means a computer-(A) exclusively for the use of a financial institution or the United
States Government, or, in the case of a computer not exclusively for
such use, used by or for a financial institution or the United States
Government and the conduct constituting the offense affects that
use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or
communication, including a computer located outside the United
States that is used in a manner that affects interstate or foreign
commerce or communication of the United States;
(3) the term "State" includes the District of Columbia, the
Commonwealth of Puerto Rico, and any other commonwealth,
possession or territory of the United States;
110
18 USCS § 1030
•
(4) the term "financial institution" means-(A) an institution, with deposits insured by the Federal Deposit Insurance
Corporation;
(B) the Federal Reserve or a member of the Federal Reserve including any
Federal Reserve Bank;
(C) a credit union with accounts insured by the National Credit Union
Administration;
(D) a member of the Federal home loan bank system and any home loan
bank;
(E) any institution of the Farm Credit System under the Farm Credit Act of
1971;
(F) a broker-dealer registered with the Securities and Exchange Commission
pursuant to section 15 of the Securities Exchange Act of 1934 [15 USCS § 78o];
(G) the Securities Investor Protection Corporation;
(H) a branch or agency of a foreign bank (as such terms are defined in
paragraphs (1) and (3) of section 1(b) of the International Banking Act of 1978
[12 USCS § 3101(1) and (3)]); and
(I) an organization operating under section 25 or section 25(a) of the Federal
Reserve Act;
(5) the term "financial record" means information derived from any record held
by a financial institution pertaining to a customer's relationship with the financial
institution;
(6) the term "exceeds authorized access" means to access a computer with
authorization and to use such access to obtain or alter information in the
computer that the accesser is not entitled so to obtain or alter;
111
18 USCS § 1030
•
(7) the term "department of the United States" means the legislative or
judicial branch of the Government or one of the executive department
enumerated in section 101 of title 5;
(8) the term "damage" means any impairment to the integrity or availability
of data, a program, a system, or information;
(9) the term "government entity" includes the Government of the United
States, any State or political subdivision of the United States, any foreign
country, and any state, province, municipality, or other political subdivision of
a foreign country;
(10) the term "conviction" shall include a conviction under the law of any
State for a crime punishable by imprisonment for more than 1 year, an
element of which is unauthorized access, or exceeding authorized access, to
a computer;
(11) the term "loss" means any reasonable cost to any victim, including the
cost of responding to an offense, conducting a damage assessment, and
restoring the data, program, system, or information to its condition prior to
the offense, and any revenue lost, cost incurred, or other consequential
damages incurred because of interruption of service; and
(12) the term "person" means any individual, firm, corporation, educational
institution, financial institution, governmental entity, or legal or other entity.
112
18 USCS § 1030
•
(f) This section does not prohibit any lawfully authorized investigative,
protective, or intelligence activity of a law enforcement agency of the United
States, a State, or a political subdivision of a State, or of an intelligence
agency of the United States.
(g) Any person who suffers damage or loss by reason of a violation of this
section may maintain a civil action against the violator to obtain
compensatory damages and injunctive relief or other equitable relief. A civil
action for a violation of this section may be brought only if the conduct
involves 1 of the factors set forth in clause (i), (ii), (iii), (iv), or (v) of
subsection (a)(5)(B). Damages for a violation involving only conduct
described in subsection (a)(5)(B)(i) are limited to economic damages. No
action may be brought under this subsection unless such action is begun
within 2 years of the date of the act complained of or the date of the
discovery of the damage. No action may be brought under this subsection for
the negligent design or manufacture of computer hardware, computer
software, or firmware.
(h) The Attorney General and the Secretary of the Treasury shall report to
the Congress annually, during the first 3 years following the date of the
enactment of this subsection [enacted Sept. 13, 1994], concerning
investigations and prosecutions under subsection (a)(5).
113
Family Movie Act of 2005
(a) In General- Section 110 of title 17, United States Code, is amended-(1) in paragraph (9), by striking `and' after the semicolon at the end;
(2) in paragraph (10), by striking the period at the end and inserting `; and';
(3) by inserting after paragraph (10) the following:
`(11) the making imperceptible, by or at the direction of a member of a private household, of
limited portions of audio or video content of a motion picture, during a performance in or
transmitted to that household for private home viewing, from an authorized copy of the
motion picture, or the creation or provision of a computer program or other technology
that enables such making imperceptible and that is designed and marketed to be used,
at the direction of a member of a private household, for such making imperceptible, if no
fixed copy of the altered version of the motion picture is created by such computer
program or other technology.'; and
(4) by adding at the end the following:
`For purposes of paragraph (11), the term `making imperceptible' does not include the
addition of audio or video content that is performed or displayed over or in place of
existing content in a motion picture.
`Nothing in paragraph (11) shall be construed to imply further rights under section 106 of this
title, or to have any effect on defenses or limitations on rights granted under any other
section of this title or under any other paragraph of this section.'.
114
Family Movie Act of 2005
(b) Exemption From Trademark Infringement- Section 32 of the Trademark Act
of 1946 (15 U.S.C. 1114) is amended by adding at the end the following:
• `(3)(A) Any person who engages in the conduct described in paragraph (11)
of section 110 of title 17, United States Code, and who complies with the
requirements set forth in that paragraph is not liable on account of such
conduct for a violation of any right under this Act. This subparagraph does
not preclude liability, nor shall it be construed to restrict the defenses or
limitations on rights granted under this Act, of a person for conduct not
described in paragraph (11) of section 110 of title 17, United States Code,
even if that person also engages in conduct described in paragraph (11) of
section 110 of such title.
• `(B) A manufacturer, licensee, or licensor of technology that enables the
making of limited portions of audio or video content of a motion picture
imperceptible as described in subparagraph (A) is not liable on account of
such manufacture or license for a violation of any right under this Act, if such
manufacturer, licensee, or licensor ensures that the technology provides a
clear and conspicuous notice at the beginning of each performance that the
performance of the motion picture is altered from the performance intended
by the director or copyright holder of the motion picture. The limitations on
liability in subparagraph (A) and this subparagraph shall not apply to a
manufacturer, licensee, or licensor of technology that fails to comply with this
paragraph.
115
Missouri Law
Missouri Revised Statutes
• Chapter 566 - Sexual Offenses
• Chapter 567 – Prostitution
• Chapter 568 – Offenses Against the
Family
• Chapter 573 – Pornography and
Related Offenses
116
Missouri Offenses
Definitions
• Chapter 566 and chapter 568 definitions. 566.010. As used in this
chapter and chapter 568, RSMo, the following terms mean:
• (1) "Deviate sexual intercourse", any act involving the genitals of
one person and the hand, mouth, tongue, or anus of another person
or a sexual act involving the penetration, however slight, of the male
or female sex organ or the anus by a finger, instrument or object
done for the purpose of arousing or gratifying the sexual desire of
any person or for the purpose of terrorizing the victim;
• (2) "Sexual conduct", sexual intercourse, deviate sexual intercourse
or sexual contact;
• (3) "Sexual contact", any touching of another person with the
genitals or any touching of the genitals or anus of another person, or
the breast of a female person, or such touching through the clothing,
for the purpose of arousing or gratifying sexual desire of any person;
• (4) "Sexual intercourse", any penetration, however slight, of the
female sex organ by the male sex organ, whether or not an emission
results.
117
Missouri Offenses
Sexual misconduct involving a child, penalty--applicability of section-affirmative defense not allowed, when.
566.083.
1. A person commits the crime of sexual misconduct involving a child if the person:
(1) Knowingly exposes his or her genitals to a child less than fifteen years of age under
circumstances in which he or she knows that his or her conduct is likely to cause
affront or alarm to the child;
(2) Knowingly exposes his or her genitals to a child less than fifteen years of age for
the purpose of arousing or gratifying the sexual desire of any person, including the
child; or
(3) Knowingly coerces or induces a child less than fifteen years of age to expose the
child's genitals for the purpose of arousing or gratifying the sexual desire of any
person, including the child.
2. The provisions of this section shall apply regardless of whether the person violates the
section in person or via the Internet or other electronic means.
3. It is not an affirmative defense to prosecution for a violation of this section that the other
person was a peace officer masquerading as a minor.
4. Sexual misconduct involving a child or attempted sexual misconduct involving a child is a
class D felony unless the actor has previously pleaded guilty to or been found guilty of
an offense pursuant to this chapter or the actor has previously pleaded guilty to or has
been convicted of an offense against the laws of another state or jurisdiction which
would constitute an offense under this chapter, in which case it is a class C felony.
118
Missouri Offenses
Enticement of a child, penalties. 566.151.
1. A person at least twenty-one years of age or older commits
the crime of enticement of a child if that person persuades,
solicits, coaxes, entices, or lures whether by words, actions or
through communication via the Internet or any electronic
communication, any person who is less than fifteen years of
age for the purpose of engaging in sexual conduct.
2. It is not an affirmative defense to a prosecution for a violation
of this section that the other person was a peace officer
masquerading as a minor.
3. Enticement of a child or an attempt to commit enticement of a
child is a felony for which the authorized term of
imprisonment shall be not less than five years and not more
than thirty years. No person convicted under this section shall
be eligible for parole, probation, conditional release, or
suspended imposition or execution of sentence for a period of
five calendar years.
119
Missouri Offenses
Crime of promoting on-line sexual solicitation, violation, penalty.
566.103. 1. A person or entity commits the offense of promoting on-line sexual solicitation if such person or
entity knowingly permits a web-based classified service owned or operated by such person or entity to
be used by individuals to post advertisements promoting prostitution, enticing a child to engage in
sexual conduct, or promoting sexual trafficking of a child after receiving notice under this section.
2. As used in this section, the term "web-based classified service" means a person or entity in whose name
a specific URL or Internet domain name is registered which has advertisements for goods and services
or personal advertisements.
3. An advertisement may be deemed to promote prostitution, entice a child to engage in sexual conduct, or
promote sexual trafficking of a child, if the content of such advertisement would be interpreted by a
reasonable person as offering to exchange sexual conduct for goods or services in violation of chapter
567, RSMo, as seeking a child for the purpose of sexual conduct or commercial sex act, or as offering
a child as a participant in sexual conduct or commercial sex act in violation of section 566.151,
566.212, or 566.213.
4. It shall be prima facie evidence that a person or entity acts knowingly if an advertisement is not removed
from the web-based classified service within seventy-two hours of that person or entity being notified
that an advertisement has been posted on that service which is prohibited under this section.
5. Notice under this section may be provided by certified mail or facsimile transmission by the attorney
general or any prosecuting attorney or circuit attorney.
6. A violation of this section shall be a felony, punishable by a fine in the amount of five thousand dollars per
day that the advertisement remains posted on the web-based classified service after seventy-two hours
of when notice has been provided pursuant to this section.
7. Original jurisdiction for prosecution of a violation of this section shall be with the local prosecuting attorney
or circuit attorney.
120
Missouri Offenses
Defenses by Age
566.020.
1. Whenever in this chapter the criminality of conduct depends upon a
victim's being incapacitated, no crime is committed if the actor
reasonably believed that the victim was not incapacitated and
reasonably believed that the victim consented to the act. The
defendant shall have the burden of injecting the issue of belief as to
capacity and consent.
2. Whenever in this chapter the criminality of conduct depends upon a
child being thirteen years of age or younger, it is no defense that the
defendant believed the child to be older.
3. Whenever in this chapter the criminality of conduct depends upon a
child being under seventeen years of age, it is an affirmative
defense that the defendant reasonably believed that the child was
seventeen years of age or older.
4. Consent is not an affirmative defense to any offense under chapter
566 if the alleged victim is less than twelve years of age.
121
Missouri Offenses
• Pornography and Related Offenses
• http://www.moga.mo.gov/STATUTES/
C573.HTM
122
Federal Law
• Sec. 2251. - Sexual exploitation of children
• (a) Any person who employs, uses, persuades, induces,
entices, or coerces any minor to engage in, or who has a
minor assist any other person to engage in, or who transports
any minor in interstate or foreign commerce, or in any
Territory or Possession of the United States, with the intent
that such minor engage in, any sexually explicit conduct for
the purpose of producing any visual depiction of such
conduct, shall be punished as provided under subsection (d),
if such person knows or has reason to know that such visual
depiction will be transported in interstate or foreign commerce
or mailed, if that visual depiction was produced using
materials that have been mailed, shipped, or transported in
interstate or foreign commerce by any means, including by
computer, or if such visual depiction has actually been
transported in interstate or foreign commerce or mailed.
• …
123
Federal Law
(c) (1) Any person who, in a circumstance described in paragraph (2), knowingly
makes, prints, or publishes, or causes to be made, printed, or published, any
notice or advertisement seeking or offering (A) to receive, exchange, buy, produce, display, distribute, or reproduce,
any visual depiction, if the production of such visual depiction involves
the use of a minor engaging in sexually explicit conduct and such visual
depiction is of such conduct; or
(B) participation in any act of sexually explicit conduct by or with any minor
for the purpose of producing a visual depiction of such conduct; shall be
punished as provided under subsection (d).
(2) The circumstance referred to in paragraph (1) is that (A) such person knows or has reason to know that such notice or
advertisement will be transported in interstate or foreign commerce by
any means including by computer or mailed; or
(B) such notice or advertisement is transported in interstate or foreign
commerce by any means including by computer or mailed.
• …
124
Federal Law
Sec. 2252. - Certain activities relating to material involving
the sexual exploitation of minors
(a) Any person who (1) knowingly transports or ships in interstate or foreign commerce
by any means including by computer or mails, any visual
depiction, if (A) the producing of such visual depiction involves the use of a minor
engaging in sexually explicit conduct; and
(B) such visual depiction is of such conduct;
(2) knowingly receives, or distributes, any visual depiction that has
been mailed, or has been shipped or transported in interstate or
foreign commerce, or which contains materials which have been
mailed or so shipped or transported, by any means including by
computer, or knowingly reproduces any visual depiction for
distribution in interstate or foreign commerce or through the
mails, if (A) the producing of such visual depiction involves the use of a minor
engaging in sexually explicit conduct; and
(B) such visual depiction is of such conduct;
125
Federal Law
(3) either (A) in the special maritime and territorial jurisdiction of the United States, or on any land or building
owned by, leased to, or otherwise used by or under the control of the Government of the United
States, or in the Indian country as defined in section 1151 of this title, knowingly sells or
possesses with intent to sell any visual depiction; or
(B) knowingly sells or possesses with intent to sell any visual depiction that has been mailed, or has
been shipped or transported in interstate or foreign commerce, or which was produced using
materials which have been mailed or so shipped or transported, by any means, including by
computer, if (i) the producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(ii) such visual depiction is of such conduct; or
(4) either (A) in the special maritime and territorial jurisdiction of the United States, or on any land or building
owned by, leased to, or otherwise used by or under the control of the Government of the United
States, or in the Indian country as defined in section 1151 of this title, knowingly possesses 1 or
more books, magazines, periodicals, films, video tapes, or other matter which contain any visual
depiction; or
(B) knowingly possesses 1 or more books, magazines, periodicals, films, video tapes, or other matter
which contain any visual depiction that has been mailed, or has been shipped or transported in
interstate or foreign commerce, or which was produced using materials which have been mailed
or so shipped or transported, by any means including by computer, if (i) the producing of such visual depiction involves the use of a minor engaging in sexually
explicit conduct; and
(ii) such visual depiction is of such conduct; shall be punished as provided in subsection (b) of
this section.
126
Federal Law
(b)
(1) …
(c) Affirmative Defense. It shall be an affirmative defense to a charge of violating
paragraph (4) of subsection (a) that the defendant
(1) possessed less than three matters containing any visual
depiction proscribed by that paragraph; and
(2) promptly and in good faith, and without retaining or
allowing any person, other than a law enforcement
agency, to access any visual depiction or copy thereof (A) took reasonable steps to destroy each such visual
depiction; or
(B) reported the matter to a law enforcement agency
and afforded that agency access to each such visual
depiction
127
Federal Law
Sec. 2257. - Record keeping requirements
(a) Whoever produces any book, magazine, periodical, film, videotape, or other matter which
(1) contains one or more visual depictions made after November 1, 1990 of actual
sexually explicit conduct; and
(2) is produced in whole or in part with materials which have been mailed or shipped in
interstate or foreign commerce, or is shipped or transported or is intended for
shipment or transportation in interstate or foreign commerce;
shall create and maintain individually identifiable records pertaining to every performer
portrayed in such a visual depiction.
(b) Any person to whom subsection (a) applies shall, with respect to every performer
portrayed in a visual depiction of actual sexually explicit conduct (1) ascertain, by examination of an identification document containing such
information, the performer's name and date of birth, and require the performer to
provide such other indicia of his or her identity as may be prescribed by
regulations;
(2) ascertain any name, other than the performer's present and correct name, ever
used by the performer including maiden name, alias, nickname, stage, or
professional name; and
(3) record in the records required by subsection (a) the information required by
paragraphs (1) and (2) of this subsection and such other identifying information as
may be prescribed by regulation.
128
Federal Law
(c) Any person to whom subsection (a) applies shall maintain the records required by this
section at his business premises, or at such other place as the Attorney General may by
regulation prescribe and shall make such records available to the Attorney General for
inspection at all reasonable times.
(d)
(1) No information or evidence obtained from records required to be created or maintained by this
section shall, except as provided in this section, directly or indirectly, be used as evidence
against any person with respect to any violation of law.
(2) Paragraph (1) of this subsection shall not preclude the use of such information or evidence in a
prosecution or other action for a violation of this section or for a violation of any applicable
provision of law with respect to the furnishing of false information.
(e)
(1) Any person to whom subsection (a) applies shall cause to be affixed to every copy of any matter
described in paragraph (1) of subsection (a) of this section, in such manner and in such form as
the Attorney General shall by regulations prescribe, a statement describing where the records
required by this section with respect to all performers depicted in that copy of the matter may be
located.
(2) If the person to whom subsection (a) of this section applies is an organization the statement
required by this subsection shall include the name, title, and business address of the individual
employed by such organization responsible for maintaining the records required by this section.
129
Federal Law
(f) It shall be unlawful (1) for any person to whom subsection (a) applies to fail to create or maintain the
records as required by subsections (a) and (c) or by any regulation promulgated
under this section;
(2) for any person to whom subsection (a) applies knowingly to make any false entry in
or knowingly to fail to make an appropriate entry in, any record required by
subsection (b) of this section or any regulation promulgated under this section;
(3) for any person to whom subsection (a) applies knowingly to fail to comply with the
provisions of subsection (e) or any regulation promulgated pursuant to that
subsection; and
(4) for any person knowingly to sell or otherwise transfer, or offer for sale or transfer,
any book, magazine, periodical, film, video, or other matter, produce in whole or in
part with materials which have been mailed or shipped in interstate or foreign
commerce or which is intended for shipment in interstate or foreign commerce,
which (A) contains one or more visual depictions made after the effective date of this
subsection of actual sexually explicit conduct; and
(B) is produced in whole or in part with materials which have been mailed or
shipped in interstate or foreign commerce, or is shipped or transported or is
intended for shipment or transportation in interstate or foreign commerce;
which does not have affixed thereto, in a manner prescribed as set forth in subsection (e)(1),
a statement describing where the records required by this section may be located, but
such person shall have no duty to determine the accuracy of the contents of the
statement or the records required to be kept.
130
Federal Law
(g) The Attorney General shall issue appropriate regulations to carry out this
section.
(h) As used in this section (1) the term ''actual sexually explicit conduct'' means actual but not simulated conduct
as defined in subparagraphs (A) through (D) of paragraph (2) of section 2256 of
this title;
(2) ''identification document'' has the meaning given that term in section 1028(d) of this
title;
(3) the term ''produces'' means to produce, manufacture, or publish any book,
magazine, periodical, film, video tape or other similar matter and includes the
duplication, reproduction, or reissuing of any such matter, but does not include
mere distribution or any other activity which does not involve hiring, contracting for
managing, or otherwise arranging for the participation of the performers depicted;
and
(4) the term ''performer'' includes any person portrayed in a visual depiction engaging
in, or assisting another person to engage in, actual sexually explicit conduct.
(i) Whoever violates this section shall be imprisoned for not more than 2 years,
and fined in accordance with the provisions of this title, or both. Whoever
violates this section after having been convicted of a violation punishable
under this section shall be imprisoned for any period of years not more than
5 years but not less than 2 years, and fined in accordance with the provisions
of this title, or both
131
Federal Law
Sec. 2421. - Transportation generally
•
Whoever knowingly transports any individual in interstate or foreign commerce, or in any
Territory or Possession of the United States, with intent that such individual engage in
prostitution, or in any sexual activity for which any person can be charged with a criminal
offense, or attempts to do so, shall be fined under this title or imprisoned not more than
10 years, or both
Sec. 2422. - Coercion and enticement
(a) Whoever knowingly persuades, induces, entices, or coerces any individual to travel in
interstate or foreign commerce, or in any Territory or Possession of the United States, to
engage in prostitution, or in any sexual activity for which any person can be charged
with a criminal offense, or attempts to do so, shall be fined under this title or imprisoned
not more than 10 years, or both.
(b) Whoever, using the mail or any facility or means of interstate or foreign commerce, or
within the special maritime and territorial jurisdiction of the United States knowingly
persuades, induces, entices, or coerces any individual who has not attained the age of
18 years, to engage in prostitution or any sexual activity for which any person can be
charged with a criminal offense, or attempts to do so, shall be fined under this title,
imprisoned not more than 15 years, or both
Sec. 2427. - Inclusion of offenses relating to child pornography in definition of sexual
activity for which any person can be charged with a criminal offense
•
In this chapter, the term ''sexual activity for which any person can be charged with a
criminal offense'' includes the production of child pornography, as defined in section
2256(8)
132
Download