Colorado Code
Article 5.5 - Computer Crime
§ 18-5.5-101. Definitions

As used in this article 5.5, unless the context otherwise requires:





(6.3) "Damage" includes, but is not limited to, any impairment to the integrity of availability of information, data, computer program, computer software, or services on or via a computer, computer network, or computer system or part thereof.
(6.5) "Encoding machine" means an electronic device that is used to encode information onto a payment card.
(6.7) "Exceed authorized access" means to access a computer with authorization and to use such access to obtain or alter information, data, computer program, or computer software that the person is not entitled to so obtain or alter.

(7.5) "Payment card" means a credit card, charge card, debit card, or any other card that is issued to an authorized card user and that allows the user to obtain, purchase, or receive goods, services, money, or anything else of value from a merchant.

(8.5) "Scanning device" means a scanner, reader, wireless access device, radio-frequency identification scanner, near-field communications technology, or any other electronic device that is used to access, read, scan, obtain, memorize, or store, temporarily or permanently, information from a payment card.



Source: L. 79: Entire article added, p. 728, § 7, effective July 1. L. 83: (1) R&RE and (10) added, p. 705, §§ 1, 2, effective July 1. L. 2000: (2) amended and (6.3) and (6.7) added, p. 694, § 7, effective July 1. L. 2018: IP amended and (6.5), (7.5), and (8.5) added (HB 18-1200), ch. 379, p. 2290, § 1, effective August 8.