As used in this subchapter:
(1) “Access” means to intercept, instruct, communicate with, store data in, retrieve from, or otherwise make use of any resource of a computer, network, or data;
(2)
(A) “Computer” means an electronic, magnetic, electrochemical, or other high-speed data-processing device performing a logical, arithmetic, or storage function and includes any data storage facility or communications facility directly related to or operating in conjunction with the device.
(B) “Computer” also includes any online service, internet service, local bulletin board, any electronic storage device, including a floppy disk or other magnetic storage device, or any compact disk that has read-only memory and the capacity to store audio, video, or written material;
(3)
(A) “Computer contaminant” means any data, information, image, program, signal, or sound that is designed or has the capability to:
(i) Contaminate, corrupt, consume, damage, destroy, disrupt, modify, record, or transmit; or
(ii) Cause to be contaminated, corrupted, consumed, damaged, destroyed, disrupted, modified, recorded, or transmitted any other data, information, image, program, signal, or sound contained in a computer, system, or network without the knowledge or consent of the person who owns the other data, information, image, program, signal, or sound or the computer, system, or network.
(B) “Computer contaminant” includes, but is not limited to:
(i) A virus, worm, or trojan horse; or
(ii) Any other similar data, information, image, program, signal, or sound that is designed or has the capability to prevent, impede, delay, or disrupt the normal operation or use of any component, device, equipment, system, or network;
(4) “Data” means a representation of any form of information, knowledge, a fact, concept, or an instruction that is being prepared or has been formally prepared and is intended to be processed, is being processed, or has been processed in a system or network;
(5) “Encryption” means the use of any protection or disruptive measure, including without limitation cryptography, enciphering, encoding, or a computer contaminant to:
(A) Prevent, impede, delay, or disrupt access to any data, information, image, program, signal, or sound;
(B) Cause or make any data, information, image, program, signal, or sound unintelligible or unusable; or
(C) Prevent, impede, delay, or disrupt the normal operation or use of any component, device, equipment, system, or network;
(6) “Information service” means a service that is designed or has the capability to generate, process, store, retrieve, convey, emit, transmit, receive, relay, record, or reproduce any data, information, image, program, signal, or sound by means of any component, device, equipment, system, or network, including, but not limited to, by means of:
(A) A computer, computer system, computer network, modem, or scanner;
(B) A telephone, cellular phone, satellite phone, pager, personal communications device, or facsimile machine;
(C) Any type of transmitter or receiver; or
(D) Any other component, device, equipment, system, or network that uses analog, digital, electronic, electromagnetic, magnetic, or optical technology;
(7) “Internet service provider” means any provider that provides a subscriber with access to the Internet or an electronic mail address, or both;
(8)
(A) “Network” means a set of related and remotely connected devices and facilities, including more than one (1) system, with the capability to transmit data among any of the devices and facilities.
(B) “Network” includes, but is not limited to, a local, regional, or global computer network;
(9) “Program” means an ordered set of data representing coded instructions or statements that can be executed by a computer and cause the computer to perform one (1) or more tasks;
(10) “Property” means anything of value and includes a financial instrument, information, electronically produced data, program, and any other tangible or intangible item of value;
(11) “Provider” means any person who provides an information service; and
(12) “System” means a set of related equipment, whether or not connected, that is used with or for a computer.
Structure Arkansas Code
Subtitle 4 - Offenses Against Property
Chapter 41 - Computers, Computer Systems, and Networks
Subchapter 2 - Computers and Networks
§ 5-41-202. Unlawful act regarding a computer
§ 5-41-203. Unlawful interference with access to computers — Unlawful use or access to computers
§ 5-41-204. Unlawful use of encryption