|
| | 100TH GENERAL ASSEMBLY
State of Illinois
2017 and 2018
SB3202 Introduced 2/15/2018, by Sen. Michael E. Hastings SYNOPSIS AS INTRODUCED:
|
| 720 ILCS 5/17-52.6 new | | 720 ILCS 5/17-55 | |
|
Amends the Criminal Code of 2012. Creates the offense of cyber extortion. Provides that a person commits cyber extortion when he or she, with the intent to unlawfully extort money, property, or anything of value from another person, knowingly creates, places, or introduces without authorization into a computer, computer system, or computer network computer software that is designed to encrypt, lock, or otherwise restrict access or use in any way by an authorized user of the computer, computer system, or computer network. Provides that a person who has suffered a specific and direct injury because of a violation of this provision may bring a civil action in circuit court. Provides that in the civil action, the court may award actual damages, reasonable attorney's fees, and court costs. Provides that a conviction for cyber extortion is not a prerequisite for bringing an action under this provision. Provides that a violation is a Class 1 felony. Defines "computer system", "extort", and "software".
|
| |
| | | CORRECTIONAL BUDGET AND IMPACT NOTE ACT MAY APPLY | |
| | A BILL FOR |
|
|
| | SB3202 | | LRB100 19689 RLC 34963 b |
|
|
1 | | AN ACT concerning criminal law.
|
2 | | Be it enacted by the People of the State of Illinois,
|
3 | | represented in the General Assembly:
|
4 | | Section 5. The Criminal Code of 2012 is amended by changing |
5 | | Section 17-55 and by adding Section 17-52.6 as follows:
|
6 | | (720 ILCS 5/17-52.6 new) |
7 | | Sec. 17-52.6. Cyber extortion. |
8 | | (a) A person commits cyber extortion when he or she, with |
9 | | the intent to unlawfully extort money, property, or anything of |
10 | | value from another person, knowingly creates, places, or |
11 | | introduces without authorization into a computer, computer |
12 | | system, or computer network computer software that is designed |
13 | | to encrypt, lock, or otherwise restrict access or use in any |
14 | | way by an authorized user of the computer, computer system, or |
15 | | computer network. |
16 | | (b) A person who has suffered a specific and direct injury |
17 | | because of a violation of this Section may bring a civil action |
18 | | in circuit court. In a civil action under this subsection (b), |
19 | | the court may award actual damages, reasonable attorney's fees, |
20 | | and court costs. A conviction for cyber extortion is not a |
21 | | prerequisite for bringing an action under this subsection (b). |
22 | | (c) Sentence. Cyber extortion is a Class 1 felony.
|