Section 342.1 Highlights
(A) fraudulently obtaining a computer service
(B) intercepting any function of a computer system
(C) using computer system with intent
Previous slide
Next slide
Back to first slide
View graphic version