6. Use a computer or computer network to make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data, computer programs or computer software residing in, communicated by, or produced by a computer or computer network;
8. Install or cause to be installed, or collect information through, computer software that records all or a majority of the keystrokes made on the computer of another without the computer owner’s authorization; or
9. Install or cause to be installed on the computer of another, computer software for the purpose of (i) taking control of that computer so that it can cause damage to another computer or (ii) disabling or disrupting the ability of the computer to share or transmit instructions or data to other computers or to any related computer equipment or devices, including but not limited to printers, scanners, or fax machines.
B. Any person who violates this section is guilty of computer trespass, which shall be a Class 1 misdemeanor. If there is damage to the property of another valued at $ 1,000 or more caused by such person’s act in violation of this section, the offense shall be a Class 6 felony. If a person installs or causes to be installed computer software in violation of this section on more than five computers of another, the offense shall be a Class 6 felony. If a person violates subdivision A 8, the offense shall be a Class 6 felony.
C. Nothing in this section shall be construed to interfere with or prohibit terms or conditions in a contract or license related to computers, computer data, computer networks, computer operations, computer programs, computer services, or computer software or to create any liability by reason of terms or conditions adopted by, or technical measures implemented by, a Virginia-based electronic mail service provider to prevent the transmission of unsolicited electronic mail in violation of this article. Nothing in this section shall be construed to prohibit the monitoring of computer usage of, the otherwise lawful copying of data of, or the denial of computer or Internet access to a minor by a parent or legal guardian of the minor.
1984, c. 751; 1985, c. 322; 1990, c. 663; 1998, c. 892; 1999, cc. 886, 904, 905; 2002, c. 195; 2003, cc. 987, 1016; 2005, cc. 761, 812, 827; 2007, c. 483.