Bill Text: NY A08149 | 2015-2016 | General Assembly | Introduced
NOTE: There are more recent revisions of this legislation. Read Latest Draft
Bill Title: Relates to cyber crimes and identity theft; increases penalties for certain acts involving use of personal information, fraud, tampering, theft and use of a computer to commit crimes.
Spectrum: Bipartisan Bill
Status: (Introduced - Dead) 2016-04-14 - print number 8149a [A08149 Detail]
Download: New_York-2015-A08149-Introduced.html
Bill Title: Relates to cyber crimes and identity theft; increases penalties for certain acts involving use of personal information, fraud, tampering, theft and use of a computer to commit crimes.
Spectrum: Bipartisan Bill
Status: (Introduced - Dead) 2016-04-14 - print number 8149a [A08149 Detail]
Download: New_York-2015-A08149-Introduced.html
S T A T E O F N E W Y O R K ________________________________________________________________________ 8149 2015-2016 Regular Sessions I N A S S E M B L Y June 10, 2015 ___________ Introduced by M. of A. LENTOL -- read once and referred to the Committee on Codes AN ACT to amend the penal law and the criminal procedure law, in relation to cyber crimes THE PEOPLE OF THE STATE OF NEW YORK, REPRESENTED IN SENATE AND ASSEM- BLY, DO ENACT AS FOLLOWS: 1 Section 1. Subdivisions 1, 2, 3 and 4 of section 155.00 of the penal 2 law, subdivision 1 as amended by chapter 514 of the laws of 1986, are 3 amended and two new subdivisions 10 and 11 are added to read as follows: 4 1. "Property" means any money, personal property, real property, 5 computer data, computer program, PERSONAL IDENTIFYING INFORMATION, 6 SECRET SCIENTIFIC MATERIAL, thing in action, evidence of debt or 7 contract, or any article, substance or thing of value, including any 8 gas, steam, water or electricity, which is provided for a charge or 9 compensation. 10 2. "Obtain" includes, but is not limited to, the bringing about of a 11 transfer or purported transfer of property or of a legal interest there- 12 in, whether to the obtainer or another. WITH REGARD TO PERSONAL IDENTI- 13 FYING INFORMATION, COMPUTER DATA OR COMPUTER PROGRAM, OBTAIN INCLUDES 14 DUPLICATING, RECORDING, COPYING, DOWNLOADING, UPLOADING OR PRINTING OUT 15 THE INFORMATION, DATA, OR PROGRAM, OR OBTAINING A PHYSICAL OBJECT 16 CONTAINING SUCH INFORMATION. WITH REGARD TO SERVICE, OBTAIN INCLUDES, 17 BUT IS NOT LIMITED TO, USING OR ACCESSING A SERVICE. 18 3. "Deprive." To "deprive" another of property means (a) to withhold 19 it or cause it to be withheld from him OR HER permanently or for so 20 extended a period or under such circumstances that the major portion of 21 its economic value or benefit is lost to him OR HER, or (b) to dispose 22 of the property in such manner or under such circumstances as to render 23 it unlikely that an owner will recover such property. WHEN THE PROPERTY 24 IS PERSONAL IDENTIFYING INFORMATION, COMPUTER DATA OR COMPUTER PROGRAM, 25 TO DEPRIVE ANOTHER OF ITS MEANS TO OBTAIN IT OR CAUSE A THIRD PERSON TO EXPLANATION--Matter in ITALICS (underscored) is new; matter in brackets [ ] is old law to be omitted. LBD08856-02-5 A. 8149 2 1 OBTAIN IT UNDER SUCH CIRCUMSTANCES THAT A SUBSTANTIAL PORTION OF THE 2 ECONOMIC BENEFIT OR VALUE OF HAVING CONTROL OVER IT OR AUTHORITY OVER 3 ITS USE IS LOST TO AN OWNER. TO DEPRIVE ANOTHER OF SERVICE IS TO USE OR 4 ACCESS A SERVICE OR CAUSE A THIRD PERSON TO USE OR ACCESS A SERVICE 5 UNDER SUCH CIRCUMSTANCES THAT SOME OF THE ECONOMIC BENEFIT OR VALUE OF 6 HAVING CONTROL OR AUTHORITY OVER PROVIDING THE SERVICE IS LOST TO AN 7 OWNER. 8 4. "Appropriate." To "appropriate" property of another to oneself or a 9 third person means (a) to exercise control over it, or to aid a third 10 person to exercise control over it, permanently or for so extended a 11 period or under such circumstances as to acquire the major portion of 12 its economic value or benefit, or (b) to dispose of the property for the 13 benefit of oneself or a third person. WHEN THE PROPERTY IS PERSONAL 14 IDENTIFYING INFORMATION, COMPUTER DATA OR COMPUTER PROGRAM OF ANOTHER, 15 TO APPROPRIATE IT TO ONESELF OR A THIRD PERSON MEANS TO OBTAIN IT UNDER 16 SUCH CIRCUMSTANCES AS TO ACQUIRE THE ABILITY TO USE IT OR DISPOSE OF IT 17 TO THE ECONOMIC BENEFIT OF ONESELF OR A THIRD PERSON OR TO THE ECONOMIC 18 DETRIMENT OR DAMAGE OF AN OWNER. TO APPROPRIATE A SERVICE PROVIDED BY 19 ANOTHER TO ONESELF OR A THIRD PERSON MEANS TO USE OR ACCESS THE SERVICE 20 UNDER SUCH CIRCUMSTANCES AS TO ACQUIRE THE ABILITY TO USE IT TO THE 21 ECONOMIC BENEFIT OF ONESELF OR A THIRD PERSON OR TO THE ECONOMIC DETRI- 22 MENT OR DAMAGE OF AN OWNER. 23 10. "COMPUTER PROGRAM" MEANS AN ORDERED SET OF DATA REPRESENTING CODED 24 INSTRUCTIONS OR STATEMENTS THAT WHEN EXECUTED BY THE COMPUTER, CAUSE THE 25 COMPUTER TO PROCESS DATA OR DIRECT THE COMPUTER TO PERFORM ONE OR MORE 26 COMPUTER OPERATIONS OR BOTH AND MAY BE IN ANY FORM, INCLUDING MAGNETIC 27 STORAGE MEDIA, OPTICAL MEDIA, COMPUTING DEVICES, PUNCHED CARDS, OR 28 STORED INTERNALLY IN THE MEMORY OF THE COMPUTER. 29 11. "COMPUTER DATA" MEANS A REPRESENTATION OF INFORMATION, KNOWLEDGE, 30 FACTS, CONCEPT OR INSTRUCTIONS WHICH ARE BEING PROCESSED, OR HAVE BEEN 31 PROCESSED IN A COMPUTER AND MAY BE IN ANY FORM INCLUDING MAGNETIC STOR- 32 AGE MEDIA, PUNCHED CARDS, OR STORED INTERNALLY IN THE MEMORY OF THE 33 COMPUTER. 34 S 2. Paragraph (c) of subdivision 2 of section 155.05 of the penal law 35 is amended and a new paragraph (f) is added to read as follows: 36 (c) By committing the crime of issuing a bad check, as defined in 37 section 190.05, OR BY OBTAINING PROPERTY OR SERVICE BY USING OR PRESENT- 38 ING A FORM OF PAYMENT OR PERSONAL IDENTIFYING INFORMATION THE ACTOR 39 KNOWS HE OR SHE IS NOT AUTHORIZED TO USE OR KNOWS IS EXPIRED OR FORGED 40 OR OTHERWISE NOT VALID; 41 (F) BY THEFT OF SERVICE. THEFT OF SERVICE MEANS EITHER: (I) USING OR 42 ACCESSING A SERVICE IN A MANNER THAT OTHERWISE REQUIRES PAYMENT AND 43 INTENTIONALLY FAILING TO PAY FOR SUCH USE OR ACCESS BY EITHER TAMPERING 44 WITHOUT AUTHORITY WITH A DELIVERY, PAYMENT, OR MEASUREMENT DEVICE OR 45 MECHANISM, OR BY ENTERING OR LEAVING PREMISES WHERE THE SERVICE IS 46 PROVIDED BY STEALTH OR BY EVADING A PHYSICAL BARRIER, OR (II) USING OR 47 ACCESSING A SERVICE IN A MANNER THAT OTHERWISE REQUIRES PAYMENT OR THE 48 PRESENTATION OF PERSONAL IDENTIFYING INFORMATION AND USING OR PRESENTING 49 A FORM OF PAYMENT OR PERSONAL IDENTIFYING INFORMATION THE ACTOR KNOWS HE 50 OR SHE IS NOT AUTHORIZED TO USE OR KNOWS IS EXPIRED OR FORGED OR OTHER- 51 WISE NOT VALID. 52 S 3. Subdivision 1 of section 155.20 of the penal law is amended to 53 read as follows: 54 1. Except as otherwise specified in this section, value means the 55 market value of the property at the time and place of the crime, or if 56 such cannot be satisfactorily ascertained, the cost of replacement of A. 8149 3 1 the property within a reasonable time after the crime. WITH REGARD TO 2 SERVICE, VALUE SHALL ALSO MEAN THE COST OF PROVIDING THE SERVICE AT THE 3 TIME OF THE CRIME, AND WITH REGARD TO THE VALUE OF COMPUTER DATA OR 4 COMPUTER PROGRAM VALUE SHALL MEAN THE REPLACEMENT COST OR THE MARKET 5 VALUE AT THE TIME AND PLACE OF THE CRIME, OR THE COST TO WRITE OR DEVEL- 6 OP SUCH DATA AND/OR PROGRAM, WHICHEVER IS GREATER. 7 S 4. The penal law is amended by adding a new section 155.23 to read 8 as follows: 9 S 155.23 PETIT THEFT OF SERVICE. 10 A PERSON IS GUILTY OF PETIT THEFT OF SERVICE WHEN HE OR SHE STEALS A 11 SERVICE. 12 PETIT THEFT OF SERVICE IS A CLASS B MISDEMEANOR. 13 S 5. Section 155.25 of the penal law is amended to read as follows: 14 S 155.25 Petit larceny. 15 A person is guilty of petit larceny when he OR SHE steals property, OR 16 STEALS A SERVICE AND THE VALUE OF THE SERVICE EXCEEDS FIVE HUNDRED 17 DOLLARS. 18 Petit larceny is a class A misdemeanor. 19 S 6. The opening paragraph and subdivisions 1, 4 and 6 of section 20 155.30 of the penal law, the opening paragraph and subdivisions 1 and 6 21 as amended by chapter 515 of the laws of 1986, subdivision 4 as amended 22 by chapter 556 of the laws of 1987, are amended to read as follows: 23 A person is guilty of grand larceny in the fourth degree when he OR 24 SHE steals property OR A SERVICE and when: 25 1. The value of the property OR SERVICE exceeds one thousand dollars; 26 or 27 4. The property consists of a credit card or debit card OR PERSONAL 28 IDENTIFYING INFORMATION; or 29 6. The property OR SERVICE, regardless of its nature and value, is 30 obtained by extortion; or 31 S 7. Section 155.35 of the penal law, as amended by chapter 464 of the 32 laws of 2010, is amended to read as follows: 33 S 155.35 Grand larceny in the third degree. 34 A person is guilty of grand larceny in the third degree when he or she 35 steals property OR A SERVICE and: 36 1. when the value of the property exceeds three thousand dollars, or 37 2. the property is an automated teller machine or the contents of an 38 automated teller machine, OR 39 3. THE PROPERTY IS PERSONAL IDENTIFYING INFORMATION OF TWENTY-FIVE OR 40 MORE PERSONS. 41 Grand larceny in the third degree is a class D felony. 42 S 8. Section 155.40 of the penal law, as amended by chapter 515 of the 43 laws of 1986, is amended to read as follows: 44 S 155.40 Grand larceny in the second degree. 45 A person is guilty of grand larceny in the second degree when he OR 46 SHE steals property OR A SERVICE and when: 47 1. The value of the property OR SERVICE exceeds fifty thousand 48 dollars; or 49 2. The property OR SERVICE, regardless of its nature and value, is 50 obtained by extortion committed by instilling in the victim a fear that 51 the actor or another person will (a) cause physical injury to some 52 person in the future, or (b) cause damage to property, or (c) use or 53 abuse his position as a public servant by engaging in conduct within or 54 related to his official duties, or by failing or refusing to perform an 55 official duty, in such manner as to affect some person adversely, OR A. 8149 4 1 3. THE PROPERTY IS PERSONAL IDENTIFYING INFORMATION OF ONE HUNDRED OR 2 MORE PERSONS. 3 Grand larceny in the second degree is a class C felony. 4 S 9. Section 155.42 of the penal law, as added by chapter 515 of the 5 laws of 1986, is amended to read as follows: 6 S 155.42 Grand larceny in the first degree. 7 A person is guilty of grand larceny in the first degree when he OR SHE 8 steals property OR A SERVICE and when the value of the property OR 9 SERVICE exceeds one million dollars; OR THE PROPERTY IS PERSONAL IDENTI- 10 FYING INFORMATION OF ONE THOUSAND OR MORE PERSONS. 11 Grand larceny in the first degree is a class B felony. 12 S 10. Subdivision 8 of section 156.00 of the penal law, as added by 13 chapter 558 of the laws of 2006, is amended to read as follows: 14 8. "Without authorization" means to use or to access a computer, 15 computer service or computer network without the permission of the owner 16 or lessor or someone licensed or privileged by the owner or lessor where 17 such person knew that his or her use or access was without permission or 18 after actual notice to such person that such use or access was without 19 permission, OR THAT SUCH USE OR ACCESS WAS FOR PURPOSES OTHER THAN THOSE 20 FOR WHICH PERMISSION WAS GRANTED BY THE OWNER, LESSOR, OR SOMEONE 21 LICENSED OR PRIVILEGED BY SUCH OWNER OR LESSOR. It shall also mean the 22 access of a computer service by a person without permission where such 23 person knew that such access was without permission or after actual 24 notice to such person, that such access was without permission. 25 Proof that such person used or accessed a computer, computer service 26 or computer network through the knowing use of a set of instructions, 27 code or computer program that bypasses, defrauds or otherwise circum- 28 vents a security measure installed or used with the user's authorization 29 on the computer, computer service or computer network shall be presump- 30 tive evidence that such person used or accessed such computer, computer 31 service or computer network without authorization. 32 S 11. Section 156.20 of the penal law, as amended by chapter 558 of 33 the laws of 2006, is amended to read as follows: 34 S 156.20 Computer tampering in the [fourth] FIFTH degree. 35 A person is guilty of computer tampering in the [fourth] FIFTH degree 36 when he or she uses, causes to be used, or accesses a computer, computer 37 service, or computer network without authorization and he or she inten- 38 tionally alters in any manner or destroys computer data or a computer 39 program of another person. 40 Computer tampering in the [fourth] FIFTH degree is a class A misdemea- 41 nor. 42 S 12. Section 156.25 of the penal law, as amended by chapter 89 of the 43 laws of 1993, subdivision 2 as amended by chapter 376 of the laws of 44 1997, is amended to read as follows: 45 S 156.25 Computer tampering in the [third] FOURTH degree. 46 A person is guilty of computer tampering in the third degree when he 47 OR SHE commits the crime of computer tampering in the [fourth] FIFTH 48 degree and: 49 1. he OR SHE does so with an intent to commit or attempt to commit or 50 further the commission of any felony; or 51 2. he OR SHE has been previously convicted of any crime under this 52 article or subdivision eleven of section 165.15 of this chapter; or 53 3. he OR SHE intentionally alters in any manner or destroys computer 54 material; or A. 8149 5 1 4. he OR SHE intentionally alters in any manner or destroys computer 2 data or a computer program so as to cause damages in an aggregate amount 3 exceeding one thousand dollars. 4 Computer tampering in the [third] FOURTH degree is a class E felony. 5 S 13. Section 156.26 of the penal law, as amended by chapter 590 of 6 the laws of 2008, is amended to read as follows: 7 S 156.26 Computer tampering in the [second] THIRD degree. 8 A person is guilty of computer tampering in the [second] THIRD degree 9 when he or she commits the crime of computer tampering in the fourth 10 degree and he or she intentionally alters in any manner or destroys: 11 1. computer data or a computer program so as to cause damages in an 12 aggregate amount exceeding three thousand dollars; or 13 2. computer material that contains records of the medical history or 14 medical treatment of an identified or readily identifiable individual or 15 individuals and as a result of such alteration or destruction, such 16 individual or individuals suffer serious physical injury, and he or she 17 is aware of and consciously disregards a substantial and unjustifiable 18 risk that such serious physical injury may occur. 19 Computer tampering in the [second] THIRD degree is a class D felony. 20 S 14. Section 156.27 of the penal law, as added by chapter 89 of the 21 laws of 1993, is amended to read as follows: 22 S 156.27 Computer tampering in the [first] SECOND degree. 23 A person is guilty of computer tampering in the [first] SECOND degree 24 when he OR SHE commits the crime of computer tampering in the fourth 25 degree and he OR SHE intentionally alters in any manner or destroys 26 computer data or a computer program so as to cause damages in an aggre- 27 gate amount exceeding fifty thousand dollars. 28 Computer tampering in the [first] SECOND degree is a class C felony. 29 S 15. The penal law is amended by adding a new section 156.28 to read 30 as follows: 31 S 156.28 COMPUTER TAMPERING IN THE FIRST DEGREE. 32 A PERSON IS GUILTY OF COMPUTER TAMPERING IN THE FIRST DEGREE WHEN HE 33 OR SHE COMMITS THE CRIME OF COMPUTER TAMPERING IN THE FIFTH DEGREE AND 34 HE OR SHE INTENTIONALLY ALTERS IN ANY MANNER OR DESTROYS COMPUTER DATA 35 OR A COMPUTER PROGRAM AND THEREBY CAUSES DAMAGES IN AN AGGREGATE AMOUNT 36 OF ONE MILLION DOLLARS OR MORE. 37 COMPUTER TAMPERING IN THE FIRST DEGREE IS A CLASS B FELONY. 38 S 16. The penal law is amended by adding five new sections 156.60, 39 156.65, 156.70, 156.75 and 156.80 to read as follows: 40 S 156.60 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, 41 COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIFTH DEGREE. 42 A PERSON IS GUILTY OF DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER 43 SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIFTH DEGREE WHEN 44 HE OR SHE ACTING ALONE OR WITH OTHERS KNOWINGLY CAUSES THE TRANSMISSION 45 OF A PROGRAM, INFORMATION, CODE, OR COMMAND, OR OTHER ELECTRONIC COMMU- 46 NICATION, AND AS A RESULT OF SUCH CONDUCT, INTENTIONALLY MAKES THE 47 COMPUTER, COMPUTER SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK TEMPO- 48 RARILY OR INDEFINITELY UNAVAILABLE TO ITS INTENDED USERS. 49 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER 50 PROGRAM, OR COMPUTER NETWORK IN THE FIFTH DEGREE IS A CLASS A MISDEMEA- 51 NOR. 52 S 156.65 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, 53 COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FOURTH DEGREE. 54 A PERSON IS GUILTY OF DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER 55 SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FOURTH DEGREE WHEN 56 HE OR SHE COMMITS THE CRIME OF DENIAL OF SERVICE ATTACK ON A COMPUTER, A. 8149 6 1 COMPUTER SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIFTH 2 DEGREE AND THEREBY CAUSES DAMAGES OR LOSS THAT EXCEEDS ONE THOUSAND 3 DOLLARS TO ANOTHER PERSON OR PERSONS, AND/OR ONE OR MORE FINANCIAL 4 INSTITUTIONS AND/OR OTHER BUSINESSES. 5 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER 6 PROGRAM, OR COMPUTER NETWORK IN THE FOURTH DEGREE IS A CLASS E FELONY. 7 S 156.70 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, 8 COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE THIRD DEGREE. 9 A PERSON IS GUILTY OF DENIAL OF SERVICE ATTACK ON A COMPUTER IN THE 10 THIRD DEGREE WHEN HE OR SHE COMMITS THE CRIME OF DENIAL OF SERVICE 11 ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER PROGRAM, OR COMPUTER 12 NETWORK IN THE FIFTH DEGREE AND THEREBY CAUSES DAMAGES OR LOSS THAT 13 EXCEEDS THREE THOUSAND DOLLARS TO ANOTHER PERSON OR PERSONS, AND/OR TO 14 ONE OR MORE FINANCIAL INSTITUTIONS AND/OR OTHER BUSINESSES, OR COMMITS 15 OR ATTEMPTS TO COMMIT A CLASS D FELONY OR HIGHER LEVEL CRIME OR ACTS AS 16 AN ACCESSORY TO THE COMMISSION OF A CLASS D OR HIGHER LEVEL FELONY. 17 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER 18 PROGRAM, OR COMPUTER NETWORK IN THE THIRD DEGREE IS A CLASS D FELONY. 19 S 156.75 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, 20 COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE SECOND DEGREE. 21 A PERSON IS GUILTY OF DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER 22 SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE SECOND DEGREE WHEN 23 HE OR SHE COMMITS THE CRIME OF DENIAL OF SERVICE ATTACK ON A COMPUTER, 24 COMPUTER SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIFTH 25 DEGREE AND THEREBY CAUSES DAMAGES OR LOSS THAT EXCEEDS FIFTY THOUSAND 26 DOLLARS TO ANOTHER PERSON OR PERSONS, AND/OR FINANCIAL INSTITUTIONS 27 AND/OR OTHER BUSINESSES, OR COMMITS OR ATTEMPTS TO COMMIT A CLASS C 28 FELONY OR HIGHER LEVEL CRIME OR ACTS AS AN ACCESSORY IN THE COMMISSION 29 OF A CLASS C OR HIGHER LEVEL FELONY. 30 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER 31 PROGRAM, OR COMPUTER NETWORK IN THE SECOND DEGREE IS A CLASS C FELONY. 32 S 156.80 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, 33 COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIRST DEGREE. 34 A PERSON IS GUILTY OF DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER 35 SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIRST DEGREE WHEN 36 HE OR SHE COMMITS THE CRIME OF DENIAL OF SERVICE ATTACK ON A COMPUTER, 37 COMPUTER SERVICE, COMPUTER PROGRAM, OR COMPUTER NETWORK IN THE FIFTH 38 DEGREE AND THEREBY CAUSES DAMAGES OR LOSS THAT EXCEEDS ONE MILLION 39 DOLLARS TO ANOTHER PERSON OR PERSONS, AND/OR ONE OR MORE FINANCIAL 40 INSTITUTIONS AND/OR OTHER BUSINESSES, OR COMMITS OR ATTEMPTS TO COMMIT A 41 CLASS B FELONY OR HIGHER LEVEL CRIME OR ACTS AS AN ACCESSORY IN THE 42 COMMISSION ON A CLASS B OR HIGHER LEVEL FELONY. 43 DENIAL OF SERVICE ATTACK ON A COMPUTER, COMPUTER SERVICE, COMPUTER 44 PROGRAM, OR COMPUTER NETWORK IN THE FIRST DEGREE IS A CLASS B FELONY. 45 S 17. Subdivision 2 of section 165.45 of the penal law, as amended by 46 chapter 81 of the laws of 1995, is amended to read as follows: 47 2. The property consists of a credit card, debit card or public bene- 48 fit card, OR PERSONAL IDENTIFYING INFORMATION AS DEFINED IN SECTION 49 190.77 OF THIS CHAPTER; or 50 S 18. Section 165.50 of the penal law, as amended by chapter 515 of 51 the laws of 1986, is amended to read as follows: 52 S 165.50 Criminal possession of stolen property in the third degree. 53 A person is guilty of criminal possession of stolen property in the 54 third degree when he OR SHE knowingly possesses stolen property, with 55 intent to benefit himself OR HERSELF or a person other than an owner 56 thereof or to impede the recovery by an owner thereof, and when the A. 8149 7 1 value of the property exceeds three thousand dollars, OR THE PROPERTY 2 CONSISTED OF THE PERSONAL IDENTIFYING INFORMATION OF TWENTY-FIVE OR MORE 3 PERSONS. 4 Criminal possession of stolen property in the third degree is a class 5 D felony. 6 S 19. Section 165.52 of the penal law, as added by chapter 515 of the 7 laws of 1986, is amended to read as follows: 8 S 165.52 Criminal possession of stolen property in the second degree. 9 A person is guilty of criminal possession of stolen property in the 10 second degree when he OR SHE knowingly possesses stolen property, with 11 intent to benefit himself OR HERSELF or a person other than an owner 12 thereof or to impede the recovery by an owner thereof, and when the 13 value of the property exceeds fifty thousand dollars, OR THE PROPERTY 14 CONSISTS OF THE PERSONAL IDENTIFYING INFORMATION OF ONE HUNDRED OR MORE 15 PERSONS. 16 Criminal possession of stolen property in the second degree is a class 17 C felony. 18 S 20. Section 165.54 of the penal law, as added by chapter 515 of the 19 laws of 1986, is amended to read as follows: 20 S 165.54 Criminal possession of stolen property in the first degree. 21 A person is guilty of criminal possession of stolen property in the 22 first degree when he OR SHE knowingly possesses stolen property, with 23 intent to benefit himself OR HERSELF or a person other than an owner 24 thereof or to impede the recovery by an owner, and when the value of the 25 property exceeds one million dollars, OR THE PROPERTY CONSISTS OF THE 26 PERSONAL IDENTIFYING INFORMATION OF ONE THOUSAND OR MORE PERSONS. 27 Criminal possession of stolen property in the first degree is a class 28 B felony. 29 S 21. Section 190.60 of the penal law, as amended by chapter 491 of 30 the laws of 1992, subdivision 1 as amended by chapter 357 of the laws of 31 1996, is amended to read as follows: 32 S 190.60 Scheme to defraud in the [second] FIFTH degree. 33 1. A person is guilty of a scheme to defraud in the [second] FIFTH 34 degree when he OR SHE engages in a scheme constituting a systematic 35 ongoing course of conduct with intent to defraud more than one person or 36 to obtain property from more than one person by false or fraudulent 37 pretenses, representations or promises, and so obtains property from one 38 or more of such persons. 39 2. In any prosecution under this section, it shall be necessary to 40 prove the identity of at least one person from whom the defendant so 41 obtained property, but it shall not be necessary to prove the identity 42 of any other intended victim. 43 Scheme to defraud in the [second] FIFTH degree is a class A misdemea- 44 nor. 45 S 22. The penal law is amended by adding three new sections 190.62, 46 190.63 and 190.64 to read as follows: 47 S 190.62 SCHEME TO DEFRAUD IN THE FOURTH DEGREE. 48 A PERSON IS GUILTY OF A SCHEME TO DEFRAUD IN THE FOURTH DEGREE WHEN HE 49 OR SHE ENGAGES IN A SCHEME TO DEFRAUD IN THE FIFTH DEGREE, AND 50 1. INTENDS TO OBTAIN PROPERTY OR SERVICE FROM TEN OR MORE PERSONS; OR 51 2. THE VALUE OF THE PROPERTY OR SERVICE OBTAINED EXCEEDS ONE THOUSAND 52 DOLLARS; OR 53 3. INTENDS TO OBTAIN AND DOES OBTAIN PROPERTY OR SERVICE FROM AT LEAST 54 ONE VULNERABLE ELDERLY PERSON AS DEFINED IN SECTION 260.31 OF THIS CHAP- 55 TER. 56 SCHEME TO DEFRAUD IN THE FOURTH DEGREE IS A CLASS E FELONY. A. 8149 8 1 S 190.63 SCHEME TO DEFRAUD IN THE THIRD DEGREE. 2 A PERSON IS GUILTY OF A SCHEME TO DEFRAUD IN THE THIRD DEGREE WHEN HE 3 OR SHE ENGAGES IN A SCHEME TO DEFRAUD IN THE FIFTH DEGREE, AND 4 1. INTENDS TO OBTAIN PROPERTY OR SERVICE FROM TWENTY-FIVE OR MORE 5 PERSONS; OR 6 2. THE VALUE OF THE PROPERTY OR SERVICE OBTAINED EXCEEDS THREE THOU- 7 SAND DOLLARS. 8 SCHEME TO DEFRAUD IN THE THIRD DEGREE IS A CLASS D FELONY. 9 S 190.64 SCHEME TO DEFRAUD IN THE SECOND DEGREE. 10 A PERSON IS GUILTY OF A SCHEME TO DEFRAUD IN THE SECOND DEGREE WHEN HE 11 OR SHE ENGAGES IN A SCHEME TO DEFRAUD IN THE FIFTH DEGREE, AND 12 1. INTENDS TO OBTAIN PROPERTY OR SERVICE FROM ONE HUNDRED OR MORE 13 PERSONS; OR 14 2. THE VALUE OF THE PROPERTY OR SERVICE OBTAINED EXCEEDS FIFTY THOU- 15 SAND DOLLARS. 16 SCHEME TO DEFRAUD IN THE SECOND DEGREE IS A CLASS C FELONY. 17 S 23. Section 190.65 of the penal law, as amended by chapter 291 of 18 the laws of 2008, is amended to read as follows: 19 S 190.65 Scheme to defraud in the first degree. 20 [1. A person is guilty of a scheme to defraud in the first degree when 21 he or she[: (a)] engages in CONDUCT CONSTITUTING a scheme [constituting 22 a systematic ongoing course of conduct with intent] to defraud [ten] IN 23 THE FIFTH DEGREE AND INTENDS TO OBTAIN PROPERTY OR SERVICE FROM ONE 24 THOUSAND or more persons or to obtain property from ten or more persons 25 by false or fraudulent pretenses, representations or promises, and so 26 obtains property from one or more of such persons; [or (b) engages in a 27 scheme constituting a systematic ongoing course of conduct with intent 28 to defraud more than one person or to obtain property from more than one 29 person by false or fraudulent pretenses, representations or promises, 30 and so obtains] AND VALUE OF THE property [with a value in excess of one 31 thousand dollars from one or more such persons; or (c) engages in a 32 scheme constituting a systematic ongoing course of conduct with intent 33 to defraud more than one person, more than one of whom is a vulnerable 34 elderly person as defined in subdivision three of section 260.30 of this 35 chapter or to obtain property from more than one person, more than one 36 of whom is a vulnerable elderly person as defined in subdivision three 37 of section 260.30 of this chapter, by false or fraudulent pretenses, 38 representations or promises, and so obtains property from one or more 39 such persons. 40 2. In any prosecution under this section, it shall be necessary to 41 prove the identity of at least one person from whom the defendant so 42 obtained property, but it shall not be necessary to prove the identity 43 of any other intended victim, provided that in any prosecution under 44 paragraph (c) of subdivision one of this section, it shall be necessary 45 to prove the identity of at least one such vulnerable elderly person as 46 defined in subdivision three of section 260.30 of this chapter] OR 47 SERVICE OBTAINED EXCEEDS ONE MILLION DOLLARS. 48 Scheme to defraud in the first degree is a class [E] B felony. 49 S 24. Section 190.78 of the penal law, as added by chapter 619 of the 50 laws of 2002, is amended to read as follows: 51 S 190.78 Identity theft in the [third] FIFTH degree. 52 A person is guilty of identity theft in the [third] FIFTH degree when 53 he or she knowingly and with intent to defraud assumes the identity of 54 another person by presenting himself or herself as that other person, or 55 by acting as that other person or by using personal identifying informa- 56 tion of that other person, and thereby: A. 8149 9 1 1. obtains goods, money, property or services or uses credit in the 2 name of such other person or causes financial loss to such person or to 3 another person or persons; or 4 2. commits a class A misdemeanor or higher level crime. 5 Identity theft in the [third] FIFTH degree is a class A misdemeanor. 6 S 25. Section 190.79 of the penal law, as added by chapter 619 of the 7 laws of 2002, subdivision 4 as amended by chapter 279 of the laws of 8 2008, is amended to read as follows: 9 S 190.79 Identity theft in the [second] FOURTH degree. 10 A person is guilty of [identify] IDENTITY theft in the [second] FOURTH 11 degree when he or she knowingly and with intent to defraud assumes the 12 identity of another person by presenting himself or herself as that 13 other person, or by acting as that other person or by using personal 14 identifying information of that other person, and thereby: 15 1. obtains goods, money, property or services or uses credit in the 16 name of such other person in an aggregate amount that exceeds five 17 hundred dollars; or 18 2. causes financial loss to such person or to another person or 19 persons in an aggregate amount that exceeds five hundred dollars; or 20 3. commits or attempts to commit a felony or acts as an accessory to 21 the commission of a felony; or 22 4. commits the crime of identity theft in the [third] FIFTH degree as 23 defined in section 190.78 of this article and has been previously 24 convicted within the last [five years of identity theft in the third 25 degree as defined in section 190.78, identity theft in the second degree 26 as defined in this section, identity theft in the first degree as 27 defined in section 190.80, unlawful possession of personal identifica- 28 tion information in the third degree as defined in section 190.81, 29 unlawful possession of personal identification information in the second 30 degree as defined in section 190.82, unlawful possession of personal 31 identification information in the first degree as defined in section 32 190.83, unlawful possession of a skimmer device in the second degree as 33 defined in section 190.85, unlawful possession of a skimmer device in 34 the first degree as defined in section 190.86, grand larceny in the 35 fourth degree as defined in section 155.30, grand larceny in the third 36 degree as defined in section 155.35, grand larceny in the second degree 37 as defined in section 155.40 or grand larceny in the first degree as 38 defined in section 155.42 of this chapter] TEN YEARS, EXCLUDING ANY TIME 39 PERIOD DURING WHICH SUCH PERSON WAS INCARCERATED FOR ANY REASON, OF ANY 40 CRIME IN THIS ARTICLE OR ARTICLE ONE HUNDRED SEVENTY OF THIS CHAPTER, OR 41 OF ANY LARCENY CRIME AS DEFINED IN ARTICLE ONE HUNDRED FIFTY-FIVE OF 42 THIS CHAPTER, OR OF ANY CRIMINAL POSSESSION OF STOLEN PROPERTY CRIME AS 43 DEFINED IN ARTICLE ONE HUNDRED SIXTY-FIVE OF THIS CHAPTER; OR HE OR SHE 44 KNOWINGLY AND WITH INTENT TO DEFRAUD ASSUMES THE IDENTITY OF THREE OR 45 MORE PERSONS BY PRESENTING HIMSELF OR HERSELF AS THOSE PERSONS OR BY 46 ACTING AS THOSE PERSONS OR BY USING PERSONAL IDENTIFYING INFORMATION OF 47 ANY OF THOSE PERSONS AND THEREBY OBTAINS GOODS, MONEY, PROPERTY OR 48 SERVICES OR USES CREDIT IN THE NAME OF AT LEAST ONE SUCH PERSON, OR 49 CAUSES FINANCIAL LOSS TO AT LEAST ONE SUCH PERSON OR TO ANOTHER PERSON 50 OR PERSONS. 51 Identity theft in the [second] FOURTH degree is a class E felony. 52 S 26. Section 190.80 of the penal law, as added by chapter 619 of the 53 laws of 2002, subdivision 4 as amended by chapter 279 of the laws of 54 2008, is amended to read as follows: 55 S 190.80 Identity theft in the [first] THIRD degree. A. 8149 10 1 A person is guilty of identity theft in the [first] THIRD degree when 2 he or she knowingly and with intent to defraud assumes the identity of 3 another person by presenting himself or herself as that other person, or 4 by acting as that other person or by using personal identifying informa- 5 tion of that other person, and thereby: 6 1. obtains goods, money, property or services or uses credit in the 7 name of such other person in an aggregate amount that exceeds two thou- 8 sand dollars; or 9 2. causes financial loss to such person or to another person or 10 persons in an aggregate amount that exceeds two thousand dollars; or 11 3. commits or attempts to commit a class D felony or higher level 12 crime or acts as an accessory in the commission of a class D or higher 13 level felony; or 14 4. commits the crime of identity theft in the [second] FOURTH degree 15 as defined in section 190.79 of this article and has been previously 16 convicted within the last [five years of identity theft in the third 17 degree as defined in section 190.78, identity theft in the second degree 18 as defined in section 190.79, identity theft in the first degree as 19 defined in this section, unlawful possession of personal identification 20 information in the third degree as defined in section 190.81, unlawful 21 possession of personal identification information in the second degree 22 as defined in section 190.82, unlawful possession of personal identifi- 23 cation information in the first degree as defined in section 190.83, 24 unlawful possession of a skimmer device in the second degree as defined 25 in section 190.85, unlawful possession of a skimmer device in the first 26 degree as defined in section 190.86, grand larceny in the fourth degree 27 as defined in section 155.30, grand larceny in the third degree as 28 defined in section 155.35, grand larceny in the second degree as defined 29 in section 155.40 or grand larceny in the first degree as defined in 30 section 155.42 of this chapter] TEN YEARS, EXCLUDING ANY TIME PERIOD 31 DURING WHICH SUCH PERSON WAS INCARCERATED FOR ANY REASON, OF ANY CRIME 32 IN THIS ARTICLE OR ARTICLE ONE HUNDRED SEVENTY OF THIS CHAPTER, OR OF 33 ANY LARCENY CRIME AS DEFINED IN ARTICLE ONE HUNDRED FIFTY-FIVE OF THIS 34 CHAPTER, OR OF ANY CRIMINAL POSSESSION OF STOLEN PROPERTY CRIME AS 35 DEFINED IN ARTICLE ONE HUNDRED SIXTY-FIVE OF THIS CHAPTER; OR ASSUMES 36 THE IDENTITY OF TEN OR MORE PERSONS BY PRESENTING HIMSELF OR HERSELF AS 37 THOSE OTHER PERSONS, OR BY ACTING AS THOSE OTHER PERSONS, OR BY USING 38 PERSONAL IDENTIFYING INFORMATION OF THOSE OTHER PERSONS, AND THEREBY 39 OBTAINING GOODS, MONEY, PROPERTY OR SERVICES OR USES CREDIT IN THE NAME 40 OF AT LEAST ONE SUCH PERSON, OR CAUSES FINANCIAL LOSS TO AT LEAST ONE 41 SUCH PERSON, TO ANOTHER PERSON OR PERSONS. 42 Identity theft in the [first] THIRD degree is a class D felony. 43 S 27. Section 190.80-a of the penal law, as added by chapter 226 of 44 the laws of 2008, is renumbered section 190.80-c and amended, and two 45 new sections 190.80-a and 190.80-b are added to read as follows: 46 S 190.80-A IDENTITY THEFT IN THE SECOND DEGREE. 47 A PERSON IS GUILTY OF IDENTITY THEFT IN THE SECOND DEGREE WHEN: 48 1. HE OR SHE KNOWINGLY AND WITH INTENT TO DEFRAUD ASSUMES THE IDENTITY 49 OF ANOTHER PERSON BY PRESENTING HIMSELF OR HERSELF AS THAT OTHER PERSON, 50 OR BY ACTING AS THAT OTHER PERSON OR BY USING PERSONAL IDENTIFYING 51 INFORMATION OF THAT OTHER PERSON, AND THEREBY: 52 A. OBTAINS GOODS, MONEY, PROPERTY OR SERVICES OR USES CREDIT IN THE 53 NAME OF SUCH OTHER PERSON IN AN AGGREGATE AMOUNT THAT EXCEEDS 54 TWENTY-FIVE THOUSAND DOLLARS; OR 55 B. CAUSES FINANCIAL LOSS TO SUCH PERSON TO ANOTHER PERSON OR PERSONS 56 IN AN AGGREGATE AMOUNT THAT EXCEEDS TWENTY-FIVE THOUSAND DOLLARS; OR A. 8149 11 1 C. COMMITS OR ATTEMPTS TO COMMIT A CLASS C FELONY OR HIGHER LEVEL 2 CRIME OR ACTS AS AN ACCESSORY IN THE COMMISSION OF A CLASS C OR HIGHER 3 LEVEL FELONY; OR 4 D. COMMITS THE CRIME OF IDENTITY THEFT IN THE THIRD DEGREE AS DEFINED 5 IN SECTION 190.80 OF THIS ARTICLE AND HAS BEEN PREVIOUSLY CONVICTED 6 WITHIN THE LAST TEN YEARS, EXCLUDING ANY TIME DURING WHICH SUCH PERSON 7 WAS INCARCERATED FOR ANY REASON, OF ANY CRIME IN THIS ARTICLE OR ARTICLE 8 ONE HUNDRED SEVENTY OF THIS CHAPTER, OR ANY LARCENY CRIME AS DEFINED IN 9 ARTICLE ONE HUNDRED FIFTY-FIVE OF THIS CHAPTER, OR OF ANY CRIMINAL 10 POSSESSION OF STOLEN PROPERTY CRIME AS DEFINED IN ARTICLE ONE HUNDRED 11 SIXTY-FIVE OF THIS CHAPTER; OR 12 2. ASSUMES THE IDENTITY OF TWENTY-FIVE OR MORE PERSON BY PRESENTING 13 HIMSELF OR HERSELF AS THOSE OTHER PERSONS, OR BY ACTING AS THOSE OTHER 14 PERSONS, OR BY USING PERSONAL IDENTIFYING INFORMATION OF THOSE OTHER 15 PERSONS, AND THEREBY OBTAINS GOODS, MONEY, PROPERTY OR OR SERVICES OR 16 USES CREDIT IN THE NAME OF AT LEAST ONE SUCH PERSON, OR CAUSES FINANCIAL 17 LOSS TO AT LEAST ONE SUCH PERSON, OR TO ANOTHER PERSON OR PERSONS. 18 IDENTITY THEFT IN THE SECOND DEGREE OF A CLASS C FELONY. 19 S 190.80-B IDENTITY THEFT IN THE FIRST DEGREE. 20 A PERSON IS GUILTY OF IDENTITY THEFT IN THE FIRST DEGREE WHEN: 21 1. HE OR SHE KNOWINGLY AND WITH INTENT TO DEFRAUD ASSUMES THE IDENTITY 22 OF ANOTHER PERSON BY PRESENTING HIMSELF OR HERSELF AS THAT OTHER PERSON, 23 OR BY ACTING AS THAT OTHER PERSON OR BY USING PERSONAL IDENTIFYING 24 INFORMATION, AND THEREBY: 25 A. OBTAINS GOODS, MONEY, PROPERTY OR SERVICES OR USES CREDIT IN THE 26 NAME OF SUCH OTHER PERSON IN AN AGGREGATE AMOUNT THAT EXCEEDS FIVE 27 HUNDRED THOUSAND DOLLARS; OR 28 B. CAUSES FINANCIAL LOSS TO SUCH PERSON OR TO ANOTHER PERSON OR 29 PERSONS IN AN AGGREGATE AMOUNT THAT EXCEEDS FIVE HUNDRED THOUSAND 30 DOLLARS; OR 31 C. COMMITS OR ATTEMPTS TO COMMIT A CLASS B FELONY OR HIGHER LEVEL 32 CRIME OR ACT AS AN ACCESSORY IN THE COMMISSION OF A CLASS B OR HIGHER 33 LEVEL FELONY; OR 34 D. COMMITS THE CRIME OF IDENTITY THEFT IN THE SECOND DEGREE AS DEFINED 35 IN SECTION 190.80-A OF THIS ARTICLE AND HAS BEEN PREVIOUSLY CONVICTED 36 WITHIN THE LAST TEN YEARS, EXCLUDING ANY TIME DURING WHICH SUCH PERSON 37 WAS INCARCERATED FOR ANY REASON, OF ANY CRIME IN THIS ARTICLE OR ARTICLE 38 ONE HUNDRED SEVENTY OF THIS CHAPTER, OR OF ANY LARCENY CRIME AS DEFINED 39 IN ARTICLE ONE HUNDRED FIFTY-FIVE OF THIS CHAPTER, OR OF ANY CRIMINAL 40 POSSESSION OF STOLEN PROPERTY CRIME AS DEFINED IN ARTICLE ONE HUNDRED 41 SIXTY-FIVE OF THIS CHAPTER; OR 42 2. ASSUMES THE IDENTITY OF ONE HUNDRED OR MORE PERSONS BY PRESENTING 43 HIMSELF OR HERSELF AS THOSE OTHER PERSONS, OR BY ACTING AS THOSE OTHER 44 PERSONS, OR BY USING PERSONAL IDENTIFYING INFORMATION OF THOSE OTHER 45 PERSONS, AND THEREBY OBTAINS GOODS, MONEY, PROPERTY OR SERVICES OR USES 46 CREDIT IN THE NAME OF A LEAST ON SUCH PERSON, OR CAUSES FINANCIAL LOSS 47 TO AT LEAST ON SUCH PERSON, OR TO ANOTHER PERSON OR PERSONS. 48 IDENTITY THEFT IN THE FIRST DEGREE IS A CLASS B FELONY. 49 S 190.80-c Aggravated identity theft. 50 A person is guilty of aggravated identity theft when he or she know- 51 ingly and with intent to defraud assumes the identity of another person 52 by presenting himself or herself as that other person, or by acting as 53 that other person or by using personal identifying information of that 54 other person, and knows that such person is a member of the armed forc- 55 es, and knows that such member is presently deployed outside of the 56 continental United States OR KNOWS THAT SUCH PERSON IS A VULNERABLE A. 8149 12 1 ELDERLY PERSON OR A PHYSICALLY DISABLED PERSON AS SUCH TERMS ARE DEFINED 2 IN SECTION 260.31 OF THIS CHAPTER AND: 3 1. thereby obtains goods, money, property or services or uses credit 4 in the name of such [member of the armed forces] INDIVIDUAL in an aggre- 5 gate amount that exceeds five hundred dollars; or 6 2. thereby causes financial loss to such [member of the armed forces] 7 INDIVIDUAL in an aggregate amount that exceeds five hundred dollars. 8 Aggravated identity theft is a class D felony. 9 S 28. Sections 190.85 and 190.86 of the penal law, as added by chapter 10 279 of the laws of 2008, are amended to read as follows: 11 S 190.85 [Unlawful] CRIMINAL possession of a skimmer device in the 12 second degree. 13 1. A person is guilty of [unlawful] CRIMINAL possession of a skimmer 14 device in the second degree when he or she possesses a skimmer device 15 with the intent that such device be used in furtherance of the commis- 16 sion of the crime of identity theft [or unlawful possession of personal 17 identification information] as defined in this article, LARCENY AS 18 DEFINED IN ARTICLE ONE HUNDRED FIFTY-FIVE OF THIS CHAPTER; OR CRIMINAL 19 POSSESSION OF STOLEN PROPERTY AS DEFINED IN ARTICLE ONE HUNDRED 20 SIXTY-FIVE OF THIS CHAPTER. 21 2. For purposes of this article, "skimmer device" means a device 22 designed or adapted to obtain personal identifying information from a 23 credit card, debit card, public benefit card, access card or device, or 24 other card or device that contains personal identifying information. 25 [Unlawful] CRIMINAL possession of a skimmer device in the second 26 degree is a class [A misdemeanor] D FELONY. 27 S 190.86 [Unlawful] CRIMINAL possession of a skimmer device in the first 28 degree. 29 A person is guilty of [unlawful] CRIMINAL possession of a skimmer 30 device in the first degree when he or she commits the crime of [unlaw- 31 ful] CRIMINAL possession of a skimmer device in the second degree and he 32 or she has been previously convicted within the last [five years of 33 identity theft in the third degree as defined in section 190.78, identi- 34 ty theft in the second degree as defined in section 190.79, identity 35 theft in the first degree as defined in section 190.80, unlawful 36 possession of personal identification information in the third degree as 37 defined in section 190.81, unlawful possession of personal identifica- 38 tion information in the second degree as defined in section 190.82, 39 unlawful possession of personal identification information in the first 40 degree as defined in section 190.83, unlawful possession of a skimmer 41 device in the second degree as defined in section 190.85, unlawful 42 possession of a skimmer device in the first degree as defined in this 43 section, grand larceny in the fourth degree as defined in section 44 155.30, grand larceny in the third degree as defined in section 155.35, 45 grand larceny in the second degree as defined in section 155.40 or grand 46 larceny in the first degree as defined in section 155.42 of this chap- 47 ter] TEN YEARS, EXCLUDING ANY TIME DURING WHICH SUCH PERSON WAS INCAR- 48 CERATED FOR ANY REASON, FOR ANY CRIME IN THIS ARTICLE OR ARTICLE ONE 49 HUNDRED SEVENTY OF THIS CHAPTER, OR OF ANY LARCENY CRIME AS DEFINED IN 50 ARTICLE ONE HUNDRED FIFTY-FIVE OF THIS CHAPTER, OR OF ANY CRIMINAL 51 POSSESSION OF STOLEN PROPERTY CRIME AS DEFINED IN ARTICLE ONE HUNDRED 52 SIXTY-FIVE OF THIS CHAPTER. 53 [Unlawful] CRIMINAL possession of a skimmer device in the first degree 54 is a class [E] C felony. A. 8149 13 1 S 29. Paragraph (1) of subdivision 4 of section 20.40 of the criminal 2 procedure law, as amended by section 3 of subpart C of part C of chapter 3 97 of the laws of 2011, is amended to read as follows: 4 (l) An offense of identity theft, LARCENY, CRIMINAL POSSESSION OF 5 STOLEN PROPERTY, or unlawful possession of personal identifying informa- 6 tion, IN WHICH THE PROPERTY STOLEN OR CRIMINALLY POSSESSED IS PERSONAL 7 IDENTIFYING INFORMATION OR COMPUTER DATA OR COMPUTER PROGRAM, and all 8 criminal acts committed as part of the same criminal transaction as 9 defined in subdivision two of section 40.10 of this chapter may be pros- 10 ecuted (i) in any county in which part of the offense took place regard- 11 less of whether the defendant was actually present in such county, or 12 (ii) in the county in which the person who suffers financial loss 13 resided at the time of the commission of the offense, or (iii) in the 14 county where the person whose personal identifying information was used 15 in the commission of the offense resided at the time of the commission 16 of the offense. The law enforcement agency of any such county shall take 17 a police report of the matter and provide the complainant with a copy of 18 such report at no charge. 19 S 30. Subdivision 2 of section 690.05 of the criminal procedure law, 20 as amended by chapter 504 of the laws of 1991, the opening paragraph as 21 amended by chapter 424 of the laws of 1998, is amended to read as 22 follows: 23 2. A search warrant is a court order and process directing a police 24 officer, DISTRICT ATTORNEY OR OTHER PUBLIC SERVANT OF THE KIND DESCRIBED 25 IN SUBDIVISION ONE OF THIS SECTION, to conduct: 26 (a) a search of designated premises, or of a designated vehicle, or of 27 a designated person, OR OF AN ELECTRONIC COMMUNICATION SERVICE OR REMOTE 28 COMPUTING SERVICE, for the purpose of seizing designated property or 29 kinds of property, and to deliver any property so obtained to the court 30 which issued the warrant; or 31 (b) a search of a designated premises for the purpose of searching for 32 and arresting a person who is the subject of: (i) a warrant of arrest 33 issued pursuant to this chapter, a superior court warrant of arrest 34 issued pursuant to this chapter, or a bench warrant for a felony issued 35 pursuant to this chapter, where the designated premises is the dwelling 36 of a third party who is not the subject of the arrest warrant; or 37 (ii) a warrant of arrest issued by any other state or federal court 38 for an offense which would constitute a felony under the laws of this 39 state, where the designated premises is the dwelling of a third party 40 who is not the subject of the arrest warrant. 41 AS USED IN THIS SECTION, THE TERM "ELECTRONIC COMMUNICATIONS SERVICE" 42 MEANS ANY SERVICE WHICH PROVIDES TO USERS THEREOF THE ABILITY TO SEND OR 43 RECEIVE WIRE OR ELECTRONIC COMMUNICATIONS. "REMOTE COMPUTING SERVICE" 44 MEANS ANY SERVICE WHICH PROVIDES TO USERS THEREOF COMPUTER STORAGE OR 45 PROCESSING SERVICES BY MEANS OF AN ELECTRONIC COMMUNICATIONS SYSTEM. THE 46 TERMS "ELECTRONIC COMMUNICATION SERVICE" AND "REMOTE COMPUTING SERVICE" 47 SHALL BE CONSTRUED IN ACCORDANCE WITH THE ELECTRONIC COMMUNICATIONS 48 PRIVACY ACT IN CHAPTER 121 (COMMENCING WITH SECTION 2701) OF PART I OF 49 TITLE 18 OF THE UNTIED STATE CODE ANNOTATED. THIS SECTION SHALL NOT 50 APPLY TO CORPORATIONS THAT DO NOT PROVIDE THOSE SERVICES TO THE GENERAL 51 PUBLIC. 52 S 31. Subdivision 1 of section 690.15 of the criminal procedure law is 53 amended to read as follows: 54 1. A search warrant must direct a search of one or more of the 55 following: 56 (a) A designated or described place or premises; A. 8149 14 1 (b) A designated or described vehicle, as that term is defined in 2 section 10.00 of the penal law; 3 (c) A designated or described person[.]; 4 (D) A DESIGNATED OR DESCRIBED ELECTRONIC COMMUNICATION SERVICE OR 5 REMOTE COMPUTING SERVICE. 6 S 32. Section 690.20 of the criminal procedure law is amended by 7 adding a new subdivision 3 to read as follows: 8 3. THE PROVISIONS OF SUBDIVISION ONE OF THIS SECTION TO THE CONTRARY 9 NOTWITHSTANDING, A SEARCH WARRANT DIRECTING THE SEARCH OF A DESIGNATED 10 OR DESCRIBED ELECTRONIC COMMUNICATION SERVICE OR REMOTE COMPUTING 11 SERVICE, MAY BE EXECUTED ON ANY COMPANY, CORPORATION OR ENTITY WHICH IS 12 HEADQUARTERED OR LOCATED OUTSIDE OF THE STATE OF NEW YORK, AND WHICH 13 CONDUCTS ITS REGULAR BUSINESS IN NEW YORK OR THAT OFFERS ITS SERVICES TO 14 RESIDENTS OF NEW YORK. SERVICE ON ANY SUCH ELECTRONIC COMMUNICATION 15 SERVICE OR REMOTE COMPUTING SERVICE ENTITY MAY BE MADE BY PERSONAL 16 DELIVERY WITHIN THE STATE, BY REGISTERED OR CERTIFIED MAIL. SERVICE MAY 17 ALSO BE MADE BY FACSIMILE OR OTHER ELECTRONIC MEANS IF THE SERVICE IS 18 ACCOMPANIED WITH A CERTIFICATION FROM THE SENDER THAT SUCH SENDER IS A 19 POLICE OFFICER, DISTRICT ATTORNEY OR OTHER PUBLIC SERVANT SPECIFIED IN 20 SUBDIVISION ONE OF SECTION 690.05 OF THIS ARTICLE. IF AN ENTITY SHALL 21 REFUSE SUCH SERVICE, THEN SUCH POLICE OFFICER, DISTRICT ATTORNEY OR 22 OTHER PUBLIC SERVANT LOCATED WITHIN THE JURISDICTION IN WHICH THE ELEC- 23 TRONIC COMMUNICATION SERVICE OR REMOTE COMPUTING SERVICE ENTITY IS 24 LOCATED MAY SERVE THE WARRANT UPON SUCH ENTITY. A SEARCH WARRANT ISSUED 25 PURSUANT TO THIS SUBDIVISION SHALL BE LIMITED IN SCOPE TO THE DESIGNATED 26 OR DESCRIBED ELECTRONIC RECORDS OR DATA, EITHER IN PAPER OR ELECTRONIC 27 FORM, THAT ARE MADE, KEPT, OR MAINTAINED BY THE ELECTRONIC COMMUNICATION 28 SERVICE OR REMOTE COMPUTING SERVICE, AND SHALL NOT INCLUDE ANY OTHER 29 PHYSICAL OR TANGIBLE ITEMS. ANY ELECTRONIC RECORDS OR DATA RESPONSIVE TO 30 A SEARCH WARRANT ISSUED PURSUANT TO THIS SUBDIVISION SHALL BE ADMITTED 31 INTO EVIDENCE BEFORE THE GRAND JURY OR AT TRIAL IN ACCORD WITH THE RULES 32 AND LAWS OF NEW YORK STATE. 33 S 33. Section 690.30 of the criminal procedure law is amended by 34 adding a new subdivision 3 to read as follows: 35 3. ANY PROVISION OF SUBDIVISION ONE OF THIS SECTION TO THE CONTRARY 36 NOTWITHSTANDING, A SEARCH WARRANT THAT IS ISSUED PURSUANT TO SUBDIVISION 37 THREE OF SECTION 690.20 OF THIS ARTICLE IS DEEMED EXECUTED AT THE TIME 38 THAT SERVICE IS MADE UPON THE ELECTRONIC COMMUNICATION SERVICE OR REMOTE 39 COMPUTING SERVICE ENTITY PURSUANT TO SUCH SUBDIVISION. 40 S 34. Section 496.06 of the penal law, as added by section 14 of 41 subpart A of part H of chapter 55 of the laws of 2014, is amended to 42 read as follows: 43 S 496.06 Public corruption. 44 1. A person commits the crime of public corruption when: (a) (i) being 45 a public servant he or she commits a specified offense through the use 46 of his or her public office, or (ii) being a person acting in concert 47 with such public servant he or she commits a specified offense, and (b) 48 the state or any political subdivision thereof or any governmental 49 instrumentality within the state is the owner of the property. 50 2. A "specified offense" is an offense defined by any of the following 51 provisions of this chapter: section 155.25 (petit larceny); section 52 155.30 (grand larceny in the fourth degree); section 155.35 (grand 53 larceny in the third degree); section 155.40 (grand larceny in the 54 second degree); section 155.42 (grand larceny in the first degree); 55 section 190.60 (scheme to defraud in the [second] FIFTH degree); SECTION 56 190.62 (SCHEME TO DEFRAUD IN THE FOURTH DEGREE); SECTION 190.63 (SCHEME A. 8149 15 1 TO DEFRAUD IN THE THIRD DEGREE); SECTION 190.64 (SCHEME TO DEFRAUD IN 2 THE SECOND DEGREE); or section 190.65 (scheme to defraud in the first 3 degree). 4 S 35. Section 190.77 of the penal law, as amended by chapter 226 of 5 the laws of 2008, subdivision 1 as separately amended by chapter 279 of 6 the laws of 2008, is amended to read as follows: 7 S 190.77 Offenses involving theft of identity; definitions. 8 1. For the purposes of sections 190.78, 190.79, 190.80 [and], 9 190.80-a, 190.80-B, 190.80-C and 190.85 of this article "personal iden- 10 tifying information" means a person's name, address, telephone number, 11 date of birth, driver's license number, social security number, place of 12 employment, mother's maiden name, financial services account number or 13 code, savings account number or code, checking account number or code, 14 brokerage account number or code, credit card account number or code, 15 debit card number or code, automated teller machine number or code, 16 taxpayer identification number, computer system password, signature or 17 copy of a signature, electronic signature, unique biometric data that is 18 a fingerprint, voice print, retinal image or iris image of another 19 person, telephone calling card number, mobile identification number or 20 code, electronic serial number or personal identification number, or any 21 other name, number, code or information that may be used alone or in 22 conjunction with other such information to assume the identity of anoth- 23 er person. 24 2. For the purposes of sections 190.78, 190.79, 190.80, 190.80-a, 25 190.80-B, 190.80-C, 190.81, 190.82 and 190.83 of this article: 26 a. "electronic signature" shall have the same meaning as defined in 27 subdivision three of section three hundred two of the state technology 28 law. 29 b. "personal identification number" means any number or code which may 30 be used alone or in conjunction with any other information to assume the 31 identity of another person or access financial resources or credit of 32 another person. 33 c. "member of the armed forces" shall mean a person in the military 34 service of the United States or the military service of the state, 35 including but not limited to, the armed forces of the United States, the 36 army national guard, the air national guard, the New York naval militia, 37 the New York guard, and such additional forces as may be created by the 38 federal or state government as authorized by law. 39 S 36. Subdivision 2 of section 190.83 of the penal law, as separately 40 amended by chapters 226 and 279 of the laws of 2008, is amended to read 41 as follows: 42 2. he or she has been previously convicted within the last five years 43 of identity theft in the third degree as defined in section [190.78] 44 190.80, identity theft in the second degree as defined in section 45 [190.79] 190.80-A, identity theft in the first degree as defined in 46 section [190.80] 190.80-B, unlawful possession of personal identifica- 47 tion information in the third degree as defined in section 190.81, 48 unlawful possession of personal identification information in the second 49 degree as defined in section 190.82, unlawful possession of personal 50 identification information in the first degree as defined in this 51 section, [unlawful] CRIMINAL possession of a skimmer device in the 52 second degree as defined in section 190.85, [unlawful] CRIMINAL 53 possession of a skimmer device in the first degree as defined in section 54 190.86, grand larceny in the fourth degree as defined in section 155.30, 55 grand larceny in the third degree as defined in section 155.35, grand 56 larceny in the second degree as defined in section 155.40 or grand A. 8149 16 1 larceny in the first degree as defined in section 155.42 of this chap- 2 ter; or 3 S 37. Paragraph (s) of subdivision 8 of section 700.05 of the criminal 4 procedure law, as added by chapter 619 of the laws of 2002, is amended 5 to read as follows: 6 (s) Identity theft in the second degree, as defined in section 7 [190.79] 190.80-A of the penal law, identity theft in the first degree, 8 as defined in section [190.80] 190.80-B of the penal law, unlawful 9 possession of personal identification information in the second degree, 10 as defined in section 190.82 of the penal law, and unlawful possession 11 of personal identification information in the first degree, as defined 12 in section 190.83 of the penal law. 13 S 38. Paragraph (a) of subdivision 3 of section 490.05 of the penal 14 law, as amended by section 7 of part A of chapter 1 of the laws of 2004, 15 is amended to read as follows: 16 (a) "Specified offense" for purposes of this article means a class A 17 felony offense other than an offense as defined in article two hundred 18 twenty, a violent felony offense as defined in section 70.02, 19 manslaughter in the second degree as defined in section 125.15, criminal 20 tampering in the first degree as defined in section 145.20, identity 21 theft in the second degree as defined in section [190.79] 190.80-A, 22 identity theft in the first degree as defined in section [190.80] 23 190.80-B, unlawful possession of personal identification information in 24 the second degree as defined in section 190.82, unlawful possession of 25 personal identification information in the first degree as defined in 26 section 190.83, money laundering in support of terrorism in the fourth 27 degree as defined in section 470.21, money laundering in support of 28 terrorism in the third degree as defined in section 470.22, money laun- 29 dering in support of terrorism in the second degree as defined in 30 section 470.23, money laundering in support of terrorism in the first 31 degree as defined in section 470.24 of this chapter, and includes an 32 attempt or conspiracy to commit any such offense. 33 S 39. Subdivision 1 of paragraph (b) of subdivision 4 of section 60.27 34 of the penal law, subdivision 1 as amended by chapter 279 of the laws of 35 2008, paragraph (b) of subdivision 4 as amended by chapter 313 of the 36 laws of 2011, are amended to read as follows: 37 1. In addition to any of the dispositions authorized by this article, 38 the court shall consider restitution or reparation to the victim of the 39 crime and may require restitution or reparation as part of the sentence 40 imposed upon a person convicted of an offense, and after providing the 41 district attorney with an opportunity to be heard in accordance with the 42 provisions of this subdivision, require the defendant to make restitu- 43 tion of the fruits of his or her offense or reparation for the actual 44 out-of-pocket loss caused thereby and, in the case of a violation of 45 section 190.78, 190.79, 190.80, 190.80-A, 190.80-B, 190.82 or 190.83 of 46 this chapter, any costs or losses incurred due to any adverse action 47 taken against the victim. The district attorney shall where appropriate, 48 advise the court at or before the time of sentencing that the victim 49 seeks restitution or reparation, the extent of injury or economic loss 50 or damage of the victim, and the amount of restitution or reparation 51 sought by the victim in accordance with his or her responsibilities 52 under subdivision two of section 390.50 of the criminal procedure law 53 and article twenty-three of the executive law. The court shall hear and 54 consider the information presented by the district attorney in this 55 regard. In that event, or when the victim impact statement reports that 56 the victim seeks restitution or reparation, the court shall require, A. 8149 17 1 unless the interests of justice dictate otherwise, in addition to any of 2 the dispositions authorized by this article that the defendant make 3 restitution of the fruits of the offense and reparation for the actual 4 out-of-pocket loss and, in the case of a violation of section 190.78, 5 190.79, 190.80, 190.82 or 190.83 of this chapter, any costs or losses 6 incurred due to any adverse action, caused thereby to the victim. In the 7 event that restitution or reparation are not ordered, the court shall 8 clearly state its reasons on the record. Adverse action as used in this 9 subdivision shall mean and include actual loss incurred by the victim, 10 including an amount equal to the value of the time reasonably spent by 11 the victim attempting to remediate the harm incurred by the victim from 12 the offense, and the consequential financial losses from such action. 13 (b) the term "victim" shall include the victim of the offense, the 14 representative of a crime victim as defined in subdivision six of 15 section six hundred twenty-one of the executive law, an individual whose 16 identity was assumed or whose personal identifying information was used 17 in violation of section 190.78, 190.79 [or], 190.80, 190.80-A OR 18 190.80-B of this chapter, or any person who has suffered a financial 19 loss as a direct result of the acts of a defendant in violation of 20 section 190.78, 190.79, 190.80, 190.80-A, 190.80-B, 190.82 or 190.83 of 21 this chapter, a good samaritan as defined in section six hundred twen- 22 ty-one of the executive law and the office of victim services or other 23 governmental agency that has received an application for or has provided 24 financial assistance or compensation to the victim. A victim shall also 25 mean any owner or lawful producer of a master recording, or a trade 26 association that represents such owner or lawful producer, that has 27 suffered injury as a result of an offense as defined in article two 28 hundred seventy-five of this chapter. 29 S 40. This act shall take effect immediately.