14:73.6 B.(1)Offenses against electronic mail service provider - unlawful for any person to knowingly sell, give or otherwise distribute or possess software for distributing bulk email
It is unlawful for any person to use a computer or computer network without authority with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers. It is also unlawful for any person knowingly to sell, give, or otherwise distribute or possess with the intent to sell, give, or distribute software which is primarily designed or produced for the purpose of facilitating or enabling the falsification of electronic mail transmission information or other routing information.
Effective: 08/15/1999 - Present
|
14:73.6 B.(2)Offenses against electronic mail service provider - unlawful for any person to knowingly sell, give or otherwise distribute or possess software for facilitating falsification of email transmission
It is unlawful for any person to use a computer or computer network without authority with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers. It is also unlawful for any person knowingly to sell, give, or otherwise distribute or possess with the intent to sell, give, or distribute software which has only limited commercially significant purpose or use other than to facilitate or enable the falsification of electronic mail transmission information or other routing information.
Effective: 08/15/1999 - Present
|
14:73.6 B.(3)Offenses against electronic mail service provider - unlawful for any person to knowingly sell, give or otherwise distribute or possess software marketed for use in falsification fo email transmission
It is unlawful for any person to use a computer or computer network without authority with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers. It is also unlawful for any person knowingly to sell, give, or otherwise distribute or possess with the intent to sell, give, or distribute software which marketed by that person or another acting in concert with that person with that person's knowledge for use in facilitating or enabling the falsification of electronic mail transmission information or other routing info
Effective: 08/15/1999 - Present
|
14:73.6 C.Offenses against electronic mail service provider - penalty
Whoever violates the provisions of this Section shall be fined not more than five thousand dollars.
Effective: 08/15/1999 - Present
|
14:73.6 D.Offenses against electronic mail service provider - section shall not interfere with or prohibit terms in a contract or license related to computers or data
D. Nothing in this Section shall be construed to interfere with or prohibit terms or conditions in a contract or license related to computers, computer data, computer networks, computer operations, computer programs, computer services, or computer software, or to create any liability by reason of terms or conditions adopted by, or technical measures implemented by, an electronic mail service provider to prevent the transmission of unsolicited electronic mail in violation of this Section.
Effective: 08/15/1999 - Present
|
14:73.7 A.(1)Computer tampering - misdemeanor accessing of a computer or any program or data without the authorization of the owner
Computer tampering is the intentional accessing or causing to be accessed a computer or any part of a computer or any program or data contained within a computer when that action is taken knowingly and without the authorization of the owner of a computer.
Effective: 08/15/2001 - Present
|
14:73.7 A.(2)Computer tampering - misdemeanor intentional copying or otherwise obtaining any program or data contained within a computer.
Computer tampering is the intentional copying or otherwise obtaining any program or data contained within a computer when that action is taken knowingly and without the authorization of the owner of a computer,
Effective: 08/15/2001 - Present
|
14:73.7 A.(3)Computer tampering - felony intentional introducing any electronic info onto one or more computers without the authorization of the owner
Computer tampering is the intentional introducing or attempting to introduce any electronic information of any kind and in any form into one or more computers, either directly or indirectly, and either simultaneously or sequentially, with the intention of damaging or destroying a computer, or altering, deleting, or removing any program or data contained within a computer, or eliminating or reducing the ability of the owner of the computer to access or utilize the computer or any program or data contained within the computer when that action is taken knowingly and without the authorization of the owner of a computer.
Effective: 08/15/2001 - Present
|
14:73.7 A.(4)Computer tampering - felony intentional introducing any electronic info onto one or more computers without the authorization of the owner
Computer tampering is the intentional introducing or attempting to introduce any electronic information of any kind and in any form into one or more computers, either directly or indirectly, and either simultaneously or sequentially, with the intention of damaging or destroying a computer, or altering, deleting, or removing any program or data contained within a computer, or eliminating or reducing the ability of the owner of the computer to access or utilize the computer or any program or data contained within the computer when that action is taken knowingly and without the authorization of the owner of a computer.
Effective: 08/15/2001 - Present
|
14:73.7 B.(1)Computer tampering - actions taken without authorization include those which intentionally exceed limits of authorization
For purposes of this Section, actions which are taken without authorization include actions which intentionally exceed the limits of authorization.
Effective: 08/15/2001 - Present
|
14:73.7 B.(2)Computer tampering - a person using an access code not issued to them is a rebuttable presumption that the action was taken without authorization
For purposes of this Section, if an owner of a computer has established a confidential or proprietary code which is required in order to access a computer, and that code has not been issued to a person, and that person uses that code to access that computer or to cause that computer to be accessed, that action creates a rebuttable presumption that the action was taken without authorization or intentionally exceeded the limits of authorization.
Effective: 08/15/2001 - Present
|
14:73.7 B.(3)Computer tampering - the vital services of the state for purposes of this section
For purposes of this Section, the vital services or operations of the state, or of any parish, municipality, or other local governing authority, or of any utility company are the services or operations which are necessary to protect the public health, safety, and welfare, and include but are not limited to: law enforcement; fire protection; emergency services; health care; transportation; communications; drainage; sewerage; and utilities, including water, electricity, and natural gas and other forms of energy.
Effective: 08/15/2001 - Present
|
14:73.7 C.Computer tampering - penalty for violations of (A)(1) and (2)
Whoever commits the crime of computer tampering as defined in Paragraphs (A)(1) and (2) of this Section shall be fined not more than five hundred dollars or imprisoned for not more than six months, or both.
Effective: 08/15/2001 - Present
|
14:73.7 D.Computer tampering - penalty for violations of (A)(3) and (4)
Whoever commits the crime of computer tampering as defined in Paragraphs (A)(3) and (4) of this Section shall be fined not more than ten thousand dollars or imprisoned, with or without hard labor, for not more than five years, or both.
Effective: 08/15/2001 - Present
|
14:73.7 E.Computer tampering - penalty for violations of (A)(3) and (4) with intent of disrupting vital services
Whoever violates the crime of computer tampering as defined in Paragraphs (A)(3) and (4) of this Section with the intention of disrupting the vital services or operations of the state, or of any parish, municipality, or other local governing authority, or of any utility company, or with the intention of causing death or great bodily harm to one or more persons, shall be fined not more than ten thousand dollars or imprisoned at hard labor for not more than fifteen years, or both.
Effective: 08/15/2001 - Present
|
14:73.8 A.Unauthorized use of a wireless router system to access pornography involving a juvenile - charging and definition
Unauthorized use of a wireless router system is the accessing or causing to be accessed of any computer, computer system, computer network, or any part thereof via any wireless router system for the purposes of uploading, downloading, or selling of pornography involving juveniles as defined in R.S. 14:81.1.
Effective: 08/15/2009 - Present
|
14:73.8 B.Unauthorized use of a wireless router system to access pornography involving a juvenile - definition of 'wireless router system'
For purposes of this Section, 'wireless router system' means a device in a wireless local area network that determines the next network point to which a unit of data is routed between an origin and a destination on the Internet.
Effective: 08/15/2009 - Present
|
14:73.8 C.Unauthorized use of a wireless router system to access pornography involving a juvenile - penalty
Whoever commits the crime of unauthorized use of a wireless router system for the purpose of accessing pornography involving a juvenile shall be imprisoned at hard labor for not less than two years or more than ten years, and fined not more than ten thousand dollars. Imprisonment shall be without benefit of parole, probation, or suspension of sentence.
Effective: 08/15/2009 - Present
|
14:73.8 D.Unauthorized use of a wireless router system to access pornography involving a juvenile - penalty when used for accessing pornography involving a juvenile under 13 when offender is 17 or older
Whoever commits the crime of unauthorized use of a wireless routing system for the purpose of accessing pornography involving a juvenile when the victim is under the age of thirteen years and the offender is seventeen years of age or older, shall be punished by imprisonment at hard labor for not less than twenty-five years nor more than ninety-nine years. At least twenty-five years of the sentence imposed shall be served without benefit of parole, probation, or suspension of sentence.
Effective: 08/15/2009 - Present
|
14:73.9 A.Criminal use of Internet, virtual, street-map - additional penalty for use
When an Internet, virtual, street-level map is used in the commission of a criminal offense against a person or against property, an additional sentence for a period of not less than one year shall be imposed. The additional penalty imposed pursuant to this Subsection shall be served consecutively with the sentence imposed for the underlying offense.
Effective: 08/15/2010 - Present
|
14:73.9 B.Criminal use of Internet, virtual, street-map - additional penalty for use in act of terrorism
When an Internet, virtual, street-level map is used in the commission or attempted commission of an act of terrorism, as is defined in R.S. 14:100.12(1), an additional sentence for a period of not less than ten years shall be imposed without the benefit of parole, probation, or suspension of the sentence. The additional penalty imposed pursuant to this Subsection shall be served consecutively with the sentence imposed for the underlying offense.
Effective: 08/15/2010 - Present
|
14:74Criminal neglect of family
Criminal neglect of family is the desertion or intentional nonsupport by a spouse of his or her spouse who is in destitute or necessitous circumstances; or
Effective: 09/03/1984 - Present
|
14:74 A.(1)(a)Criminal neglect of family - desertion or intentional nonsupport by a spouse who is destitute
Criminal neglect of family is the desertion or intentional nonsupport by a spouse of his or her spouse who is in destitute or necessitous circumstances; or
Effective: 09/03/1984 - Present
|
14:74 A.(1)(b)Criminal neglect of family - desertion or intentional nonsupport by either parent of a minor child in necessitous circumstances
Criminal neglect of family is the desertion or intentional nonsupport by either parent of his minor child who is in necessitous circumstances, there being a duty established by this Section for either parent to support his child.
Effective: 09/03/1984 - Present
|
14:74 A.(2)Criminal neglect of family - parents have duty without regard to reasons and irrespective to reasons of living separate from other parent
Each parent shall have this duty without regard to the reasons and irrespective of the causes of his living separate from the other parent. The duty established by this Section shall apply retrospectively to all children born prior to the effective date of this Section.
Effective: 09/03/1984 - Present
|