(a) Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor in circuit court and may be entitled to recover for each violation:
(1) Compensatory damages;
(2) Punitive damages; and
(3) Such other relief, including injunctive relief, as the court may deem appropriate.
Without limiting the generality of the term, “damages” shall include loss of profits.
(b) At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a manner as to protect the secrecy and security of the computer network, computer data, computer program or computer software involved in order to prevent any possible recurrence of the same or a similar act by another person or to protect any trade secret or confidential information of any person. For the purposes of this section “trade secret” means the whole or any portion or phase of any scientific or technological information, design, process, procedure or formula or improvement which is secret and of value. A trade secret shall be presumed to be secret when the owner thereof takes measures to prevent it from becoming available to persons other than those authorized by the owner to have access thereto for a limited purpose.
(c) The provisions of this section shall not be construed to limit any person's right to pursue any additional civil remedy otherwise allowed by law.
(d) A civil action under this section must be commenced before the earlier of: (1) Five years after the last act in the course of conduct constituting a violation of this article; or (2) two years after the plaintiff discovers or reasonably should have discovered the last act in the course of conduct constituting a violation of this article.
Structure West Virginia Code
Chapter 61. Crimes and Their Punishment
Article 3C. West Virginia Computer Crime and Abuse Act
§61-3C-2. Legislative Findings
§61-3C-4. Computer Fraud; Access to Legislature Computer; Criminal Penalties
§61-3C-5. Unauthorized Access to Computer Services
§61-3C-6. Unauthorized Possession of Computer Data or Programs
§61-3C-7. Alteration, Destruction, etc., of Computer Equipment
§61-3C-8. Disruption of Computer Services
§61-3C-9. Unauthorized Possession of Computer Information, etc.
§61-3C-10. Disclosure of Computer Security Information
§61-3C-11. Obtaining Confidential Public Information
§61-3C-12. Computer Invasion of Privacy
§61-3C-13. Fraud and Related Activity in Connection With Access Devices
§61-3C-14. Endangering Public Safety
§61-3C-15. Computer as Instrument of Forgery
§61-3C-16. Civil Relief; Damages
§61-3C-17. Defenses to Criminal Prosecution
§61-3C-19. Prosecution Under Other Criminal Statutes Not Prohibited