Loading...
Minnesota Criminal Justice Statute Service
Search
Subscribe to Updates
Reports
Statute Change Report
About
Glossary
Quick Search
609.89.1(4)
Statute ID:
19349
Statute Function ID:
39004
Computer or Electronic Data Theft - Retain copy of computer software/electronic data; Not authorized
In Effect
New Search
Refine Search
Back to Results
Function Details
History
Text
Charge
Classifications
Offense Level:
Felony (F)
General Offense Code:
Property (2)
Offense Summary Code & Rank:
Theft (T) (Rank 24)
Detailed Offense Code:
Theft (269)
Offense Severity Level:
Function Text:
UCR Code
Description
26G
Hacking/Computer Invasion
Flags
Crime of Violence:
No
Targeted Misdemeanor:
No
Predatory Offender Registration Review:
No
Enhanceable:
No
Certify to DPS:
No
Report to DNR:
No
DPS Group:
No
Conditional Release:
No
Payable:
No
Petty Misdemeanor Only if Prosecutor Certifies:
No
Third Violation Indicator:
No
Qualified Domestic Violence Related:
No
Nonviolent Controlled Substance Offender Review:
No
Wildlife Restitution:
No
Statute Number:
609.89.1(4)
Enactment Date:
May 19, 2023
Effective Date:
Aug 1, 2023
Expiration Date:
Repealed?:
No
Summary Text:
Computer or Electronic Data Theft - Retain copy of computer software/electronic data; Not authorized
Statute ID:
19349
Created:
Jul 17, 2023 by mnjis.legal.analyst@state.mn.us
Updated:
Aug 21, 2023 by mnjis.legal.analyst@state.mn.us
Last Update Action:
Added
Legal Analyst Comment:
Summary Text:
Computer or Electronic Data Theft - Retain copy of computer software/electronic data; Not authorized
Link to MN Statute Text:
https://www.revisor.leg.state.mn.us/stats/609/89.html
Legislative Session:
2023 - Regular
Session Law Text?:
No
Statute text last updated on:
Jul 17, 2023
Whoever does any of the following is guilty of computer or electronic data theft and may be sentenced as provided in subdivision 2: (1) intentionally and without authorization or claim of right accesses or causes to be accessed any computer, computer system, computer network or any part thereof for the purpose of obtaining services or property; or (2) intentionally and without claim of right, and with intent to deprive the owner of use or possession, takes, transfers, conceals or retains possession of any computer, computer system, or any computer software or data contained in a computer, computer system, or computer network.; (3) intentionally and without authorization or claim of right accesses or copies any computer software or electronic data and uses, alters, transfers, retains, or publishes the computer software or electronic data; or (4) intentionally retains copies of any computer software or electronic data beyond the individual's authority.