ORDER GRANTING PARTIAL SUMMARY JUDGMENT AND ENTERING PERMANENT INJUNCTION AGAINST DEFENDANT GEORGE COLLETT
THIS MATTER is before the Court on Plaintiff, T-Mobile USA, Inc.’s (“T-Mobile”) Motion for Partial Summary Judgment Against Defendant George Collett (“Motion”). [Dkt. # 134]. T-Mobile contends that there are no material facts in dispute and summary judgment should be granted in T-Mobile’s favor on its Federal
The Court makes the following findings:
This Court has jurisdiction over the parties and the claims set forth in T-Mobile’s Amended Complaint.
A. T-Mobile’s Business Model
. T-Mobile has the right to use and enforce said rights in the standard character mark T-Mobile and a stylized T-Mobile Mark (collectively, the “T-Mobile Marks”), as depicted below:
T
T-Mobile uses the T-Mobile Marks on and in connection with telecommunications services and products, which are provided nationwide.
T-Mobile’s prepaid programs provide T-Mobile customers with wireless service without a term contract, deposit or activation fee. To obtain service, customers purchase a T-Mobile phone from T-Mobile or from an authorized T-Mobile dealer or retailer, pay for the first month of service, and then pay a monthly fee in advance for their service on T-Mobile’s wireless network for that month. T-Mobile subsidizes each handset, or, in other words charges its customers less for the prepaid phone than it cost T-Mobile to purchase it. T-Mobile recoups the loss over time through the sale of T-Mobile services. Along with the phone, customers receive a SIM card, which is inserted in the handset. The SIM card allows the phone to access the T-Mobile wireless network, and to track and regulate airtime usage. Both T-Mobile SIM cards and handsets carry the T-Mobile Mark.
The SIM card provides access to T-Mobile’s wireless network only if it is properly activated, which can only be accomplished through a confidential and proprietary website or through a T-Mobile customer service representative. To activate a T-Mobile SIM card, an authorized T-Mobile dealer must enter a confidential activation code into T-Mobile’s secure activation website or orally give the code and customer-related information over the phone to the T-Mobile customer service representative. Upon receiving all of the required information, T-Mobile then activates the SIM card, and the customer may use the SIM card to access the T-Mobile wireless network.
T-Mobile’s post-paid business accounts allow businesses to purchase and activate numerous phone lines from T-Mobile on a post-paid basis, usually with unlimited airtime and a variety of services. . These activations can only be legitimately made in T-Mobile’s computer systems by a T-Mobile representative or authorized T-Mobile dealer.
B. Defendant’s Illegal Conduct
Defendant and his co-conspirators engaged in unlawful business practices involving the unauthorized use of T-Mobile’s
Defendants also acquired large quantities of T-Mobile SIM cards and, through fraudulent means activated those SIM cards on T-Mobile’s network. There is no legitimate reason for anyone to buy or sell bulk quantities of T-Mobile SIM cards. Defendant and his co-conspirators utilize improperly-acquired confidential codes to hack into T-Mobile’s proprietary database with the intent of defrauding T-Mobile and stealing airtime and other services for their own use and for sale. Defendant then affirmatively advertised to the public that the SIM cards for sale, which were loaded with illegally-acquired airtime minutes, are authentic T-Mobile SIM cards properly activated for use on T-Mobile’s wireless service. Mr. Collett admits to this activity. He testified that he sold T-Mobile Phones and SIM cards on eBay and Craigslist, purchased T-Mobile SIM cards, pin numbers and activation codes, posted a sign in his store saying “unlimited T-Mobile service $50 a month” and falsely advertised that he was a T-Mobile dealer. Defendant, who is not an authorized T-Mobile dealer, has also improperly advertised that his store is a T-Mobile store and that his store has an unlimited T-Mobile service plan for $45 per month without a credit check. These representations were false, as George Collett’s store and the service plans he offered were not sanctioned by T-Mobile.
C. Harm Caused by Defendant’s Schemes
Defendant’s actions have substantially harmed T-Mobile by, among other things: defrauding T-Mobile into providing airtime without receiving compensation; causing T-Mobile to incur the cost of paying a third-party carrier for roaming charges and overseas calls made using the fraudulently-activated SIM cards; depriving T-Mobile of the opportunity to earn profits by providing service to legitimate T-Mobile consumers; stealing handset subsidies provided for legitimate customers; and tarnishing T-Mobile’s reputation.
The fraudulent activation of wireless service accounts by Defendant and his co-conspirators irreparably harms T-Mobile because it deprives T-Mobile of the means to control the quality of its product. Further, purchasers of Defendant’s “unlimited” service blamed T-Mobile when their service was deactivated as a fraudulent account. As a result, T-Mobile’s reputation is further harmed by Defendant’s conduct.
Similarly, Defendant’s unauthorized resale of T-Mobile SIM cards and handsets — which still bear the T-Mobile Marks and under the false indication that he was an authorized T-Mobile dealer — resulted in calls by confused and angry consumers
The conduct of Defendant and his co-conspirators has resulted in the dilution of the T-Mobile Marks, substantial harm to T-Mobile’s business reputation and goodwill and a greater likelihood of confusion, mistake, and deception as to the source of origin of T-Mobile products unlawfully sold by the Defendant and his co-conspirators and as to the relationship between T-Mobile and Defendant.
Moreover, the use and trafficking of stolen activation codes and SIM cards over the internet and throughout the United States, and fraudulent activation of the SIM cards and business accounts, substantially affects interstate commerce. T-Mobile provided evidence that it expended over $18,125.88 in investigating Defendant and taking corrective measures to prevent further fraudulent conduct.
In sum, the Court finds that T-Mobile was substantially harmed by Defendant’s actions.
SUMMARY JUDGMENT STANDARD
The United States Supreme Court has held that the: “[sjummary judgment procedure is properly regarded not as a disfavored procedural shortcut, but rather as an integral part of the Federal Rules as a whole, which are designed ‘to secure the just, speedy and inexpensive determination of every action.’ ” Celotex Corp. v. Catrett,
Furthermore,- to overcome summary judgment Defendant must submit evidence demonstrating that a genuine issue of material fact does exist. Defendant cannot merely rely upon allegations, assumptions or speculations, which are legally insufficient to overcome a Motion for Summary Judgment. See Matsushita,
For a transferred case, such as this one, “[ajfter a transfer pursuant to 28 U.S.C. § 1404(a), the transferee district court generally must apply the state law that the transferor district court would have applied had the case not been transferred.” Shannon-Vail Five Inc. v. Bunch,
ANALYSIS
A. Defendant has Violated the Lanham Act and Related State Law Claims
To prevail on its trademark infringement claims, T-Mobile must prove: (1) it has rights senior to Defendant in the T-Mobile Marks; and (2) there is a likelihood of confusion between the T-Mobile Marks and Defendant’s marks as used or intended to be used in the marketplace. GoTo.com, Inc. v. Walt Disney Co.,
With regard to the first element, the Court finds that T-Mobile has been assigned the right to use and enforce the T-Mobile Marks by its parent company, Deutsche Telekom AG; T-Mobile uses the T-Mobile Marks on and in connection with telecommunications services, including on SIM cards and Prepaid Phones; and Defendant does not have rights to use the T-Mobile Marks and his unauthorized use of the T-Mobile Marks began after T-Mobile’s use.
With regard to the second element, the Ninth Circuit assesses a likelihood of confusion with reference to the eight (8) factors set forth in AMF, Inc. v. Sleekcraft Boats,
The undisputed evidence demonstrates that T-Mobile and Defendant sell identical-looking, directly-competing products and services to the same purchasers— individuals looking for affordable, high quality T-Mobile wireless telephones and service — through the same channels of trade, utilizing the same advertising vehicles. Therefore, the trinity factors favor confusion. GoTo.com,
There can be no dispute that the T-Mobile Marks are strong marks. They are well known and established to customers and the trade as symbols identifying and distinguishing T-Mobile’s products and services, and signifying distinctive products and services of exceptional quality. Moreover, Defendant’s bad faith intent to misappropriate the T-Mobile Marks and to trade on Plaintiffs established goodwill is further evidence of the likelihood that additional consumers have been and will be confused.
The undisputed facts demonstrate that Defendant used the T-Mobile Marks without permission. The Court finds that Defendant is not, and has never been, an authorized sales agent of T-Mobile products and services with permission to use the T-Mobile Marks. Accordingly, Defendant is committing trademark infringement and summary judgment is granted to T-Mobile on this claim.
Defendant is also violating the Lanham Act through his false advertising. Section 43(a) of the Lanham Act (15 U.S.C. § 1125(a)) makes it unlawful for “[a]ny person who ... in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person’s goods, services, or commercial activities.” 15 U.S.C. § 1125(a)(1)(B). To succeed on its false advertising claim, T-Mobile must show:
(1) a false statement of fact by the defendant in a commercial advertisement about its own or another’s product; (2) the statement actually deceived or has the tendency to deceive a substantial segment of its audience; (3) the deception is material, in that it is likely to influence the purchasing decision; (4) the defendant caused its false statement to enter interstate commerce; and (5) the plaintiff has been or is likely to be injured as a result of the false statement, either by direct diversion of sales from itself to defendant or by a lessening of the goodwill associated with its products.
Nat’l Products, Inc. v. Gamber-Johnson LLC,
Defendant falsely advertised and promoted through interstate commerce that he was an authorized T-Mobile dealer selling genuine T-Mobile products and services. Mr. Collett testified that he sold T-Mobile Phones and SIM cards on eBay and Craigslist, purchased T-Mobile SIM cards, pin numbers and activation codes, posted a sign in his store saying “unlimited T-Mobile service $50 a month” and advertised that he was a T-Mobile dealer. Defendant also improperly advertised his store as a T-Mobile store with an unlimited T-Mobile service plan for $45 per month without a credit check. These representations were false, as the Court finds that George Collett’s store and the T-Mobile products and service plans he offered were not sanctioned by T-Mobile in any way.
Defendant’s false advertising deceived consumers, as evidenced by them calling T-Mobile regarding the service they pur
Because T-Mobile has successfully established its trademark infringement claim, its deceptive trade practices and unfair competition claims under Georgia state law must also succeed. See Jellibeans, Inc. v. Skating Clubs of Georgia, Inc.,
In sum, T-Mobile has established that there are no disputed facts regarding its trademark infringement, false advertising, unfair competition, and deceptive trade practices claims and, that it is entitled to summary judgment on these claims.
B. Defendant Violated the Computer Fraud and Abuse Act (“CFAA”)
To prevail on a claim under 18 U.S.C. § 1030(a)(4) of the CFAA, T-Mobile must establish that Defendant: (1) knowingly and with intent to defraud;
T-Mobile’s wireless telecommunications network as well as its proprietary computer system for activations are each a “protected computer” as defined in 18 U.S.C. § 1030(e)(2). Defendant with the assistance of his co-conspirators systematically accessed T-Mobile’s protected computers, without authorization, in at least two separate ways. First, Defendant used improperly obtained confidential T-Mobile activation codes to access T-Mobile’s proprietary computer system to activate bulk quantities of SIM cards. Second, after activating the SIM cards, Defendant again improperly accessed a T-Mobile computer system by using the (now counterfeit) SIM cards to access T-Mobile’s computer-based wireless telecommunications network to obtain stolen mobile airtime and services from T-Mobile.
Defendant’s actions have substantially harmed T-Mobile by, among other things: defrauding T-Mobile out of airtime and related services disrupting T-Mobile’s profitable relationships with its dealers and customers, causing T-Mobile to incur the cost of investigating and remedying the breaches and paying third-party carriers for roaming and overseas calls made on the SIM card, diluting the T-Mobile Marks, depriving it of the means to control the quality of its product, harming T-Mobile’s business reputation and goodwill and leading to a greater likelihood of confusion, mistake, and deception as to the source of origin of T-Mobile products, and depriving T-Mobile of the opportunity to earn profits by providing wireless service to legitimate T-Mobile consumers.
The Court further finds that T-Mobile has spent in excess of $5,000 investigating and assessing the possible impairment to the integrity of its proprietary computer system and wireless network, conducting a damage assessment regarding Defendant’s collection and dissemination of dealer codes, SIM cards, and wireless airtime, and tracking down and deactivating improperly-activated SIM cards.
Defendant is also violating 18 U.S.C. §§ 1030(a)(2)(C) and 1030(a)(5)(C). Under 18 U.S.C. § 1030(a)(2)(C) it is unlawful to intentionally access a protected computer without authorization and thereby obtain information from the protected computer. Section 1030(a)(5)(C) makes it unlawful to intentionally access a protected computer without authorization and cause damage and loss. For the reasons discussed above, Defendant has intentionally accessed T-Mobile’s protected computers without authorization. By accessing the T-Mobile proprietary database, Defendant obtained information that allowed him to activate the SIM cards, and gain access to T-Mobile’s wireless network to obtain “free” airtime and stolen services from T-Mobile. T-Mobile suffered loss and was damaged in the process, as set forth above.
Defendant is also violating Section 1030(a)(6) of the CFAA. A claim under 18 U.S.C. § 1030(a)(6) requires the following elements: (1) the Defendant knowingly; (2) trafficked in; (3) a computer password; (4) in a manner that affects interstate commerce. See 18 U.S.C. §§ 1030(a)(6); 1030(c)(4)(A)(i)(I); 1030(g). Defendant and his co-conspirators are doing exactly that-they trafficked in T-Mobile’s confidential pass-codes that access its proprietary computer systems. Defendant also has bought and sold counterfeit and illegally-activated SIM cards to consumers. These illegally-activated SIM cards operate as a gateway (or computer password) to T-Mobile’s nationwide wireless telecommunications network.
C. Defendant Violated the Georgia Computer Systems Protection Act
Georgia Statute § 16-9-93 provides civil remedies for those- engaging in computer theft, computer - trespass, and computer password disclosure.
Defendant repeatedly committed computer theft, computer trespass and computer password disclosure by illegally accessing T-Mobile’s computers and advertising, using, and selling codes that allow the user to access T-Mobile’s computers to acquire airtime and services without remuneration to T-Mobile. Accordingly, Defendant violated the Georgia Computer Systems Protection Act, and summary judgment is granted in Plaintiffs favor with respect to this claim.
D. Defendant’s Unlawful Activities are Part of an Illegal Conspiracy
To prove conspiracy, T-Mobile “must show that two or more persons combined either to do some act which is a tort, or else to do some lawful act by methods which constitute a tort.” Tyler v. Thompson,
RELIEF
A. Permanent Injunction
On August 3, 2011, a preliminary injunction was entered against Defendant. (Dkt. #82). T-Mobile now seeks to make this injunction permanent based on Defendant’s numerous violations of the Lanham Act and CFAA. T-Mobile is entitled to a permanent injunction because: (1) it has suffered an irreparable injury; (2) remedies available at law are inadequate to compensate T-Mobile’s injuries; (3) considering the balance of hardships between T-Mobile and Defendant, a remedy in equity is warranted; and (4) the public interest would not be disserved by a permanent injunction. See eBay Inc. v. MercExchange LLC,
Even without the legal presumptions afforded it by the law of this Circuit, T-Mobile will be irreparably harmed because Defendant’s actions, if allowed to persist, will continue to cause T-Mobile to suffer harm to its business reputation and dilution of the T-Mobile Marks as Defendant introduces more and more infringing products and services into the marketplace. Moreover, the actual irreparable harm that T-Mobile has suffered will worsen over time if Defendant is not permanently enjoined by the Court. Defendant could sell T-Mobile’s confidential and proprietary codes, SIM cards and Phones throughout the world, making it virtually impossible for T-Mobile to retrieve the infringing products, thereby causing T-Mobile further irreparable harm.
When these infringing products (which are advertised using the T-Mobile trademarks) fail to meet the expectations of consumers, such as when they stop working, the consumers will devalue T-Mobile’s brand and products. See eBay, Inc. v. Bidder’s Edge, Inc.,
Furthermore, the balance of hardships weighs strongly in T-Mobile’s favor. Defendant has no legitimate interest in holding himself out as an authorized T-Mobile dealer, when he is not, or in selling hacked
T-Mobile, on the other hand, is threatened with irreparable injury if an injunction is not issued. The continued use and sale of proprietary codes and counterfeit SIM cards and Phones that contain the T-Mobile Marks, but no longer conform to T-Mobile’s specifications and do not operate as advertised on the T-Mobile wireless network, poses a substantial threat to T-Mobile’s business reputation. Additionally, by Defendant holding himself out as an authorized T-Mobile dealer, who is providing illicit and defective products to customers, he is irreparably harming T-Mobile’s reputation. Defendant’s continued violations of the Preliminary Injunction demonstrate that he is unable to advertise and lawfully sell T-Mobile products and services. His actions threaten to irreparably damage T-Mobile’s hard-earned business reputation as a provider of quality wireless service dedicated to customer service.
Furthermore, the monetary benefits that Defendant receives from his actions are not benefits to be protected. Ty, Inc. v. GMA Accessories, Inc.,
Finally, the public interest will not be disserved by the issuance of a permanent injunction. On the contrary, the permanent injunction will benefit the public by preventing likelihood of confusion to consumers. Hokto Kinoko Co. v. Concord Farms, Inc.,
For these reasons, the Court enters a permanent injunction as further detailed below.
B. Monetary Damages
Damages under the Lanham Act include “(1) defendant’s profits; (2) any damages sustained by the plaintiff, and (3) the costs of the action.” 15 USC § 1117(a). Further the Lanham Act provides for enhanced damages of up to three times the amount of actual damages. Id. Under the CFAA, T-Mobile is entitled to recover its compensatory damages. See 18 U.S.C. § 1030(g). Damages under the Georgia Computer Systems Protection Act “shall include loss of profits and victim expenditure.” Ga.Code Ann., § 16-9-93(g)(1). When a conspiracy exists, as it
T-Mobile has established that Defendant and his co-conspirators, including Sherman Terry and Custom Access, Inc., collectively activated at least 824 fraudulent prepaid accounts and 104 fraudulent business accounts. See Tyler,
In addition, T-Mobile established that it expended over $18,125.88 in investigating Defendant and taking corrective measures to prevent further fraudulent conduct, excluding litigation costs or attorneys’ fees. T-Mobile is entitled to actual damages in the amount of $116,493.88. As a result of Defendant’s willful conduct as described above, the Court finds it proper to treble T-Mobile’s award of actual damages. Therefore, the Court awards T-Mobile $349,481.64 in damages. See 15 USC § 1117(a).
C. Attorneys’ Fees
The Lanham Act also gives the Court discretion to award reasonable attorneys’ fees in “exceptional cases.” 15 U.S.C. § 1117(a). “A trademark case is exceptional where the district court finds that the defendant acted maliciously, fraudulently, deliberately, or willfully.” Earthquake Sound Corp. v. Bumper Industries,
In addition, a case may be deemed “exceptional” and merit an award of attorneys’ fees under the Lanham Act when the Defendant disregards legal proceedings. See Lien v. Compusoft of Kalamazoo, Inc.,
CONCLUSION
For the foregoing reasons, the Court GRANTS Plaintiff’s Motion for Partial Summary Judgment Against George Collett.
2. Plaintiff, T-Mobile USA, Inc. is awarded damages in the principal amount of Three Hundred and Forty-Nine Thousand, Four Hundred and Eighty-One Dollars and Sixty-Four Cents ($349,481.64) for monetary and exemplary damages against Defendant George Collett, which shall bear interest at the legal rate, for which let execution issue forthwith.
3. Defendant George Collett, and each of his respective partners, agents, representatives, employees, servants, heirs, personal representatives, beneficiaries, relatives, contractors, companies, corporations, including, but not limited to, Cell Phone George Inc., and each and all of their respective past and present officers, directors, successors, assigns, parents, subsidiaries, affiliates, related companies, predecessors-in-interest, agents, representatives, and employees, and all other persons acting on behalf of or for the benefit of Defendant or who are in active concert or participation with Defendant, including but not limited to any corporation, partnership, association, proprietorship or entity of any type that is in any way affiliated or associated with Defendant or Defendant’s representatives, agents, assigns, employees, servants, affiliated entities, and any and all persons and entities in active concert and participation with Defendant who receive notice of this Order, shall be and hereby are PERMANENTLY ENJOINED from:
a. purchasing, selling, providing, altering, . advertising, soliciting, using, and/or shipping, directly or indirectly, any T-Mobile “Activation Materials,” which consist of SIM cards, PIN numbers, activation and proprietary codes, and/or other mechanism, process or materials used to activate service or acquire airtime in connection with an activation on the T-Mobile network;
b. purchasing, selling, unlocking, re-flashing, altering, advertising, soliciting, using, and/or shipping, directly or indirectly, any T-Mobile products or services;
c. purchasing, selling,- unlocking, re-flashing, altering, advertising, soliciting and/or shipping, directly or indirectly, any Activation Materials or T-Mobile mobile device that Defendants. know or should know bears any T-Mobile marks or any marks likely to cause confusion with the T-Mobile marks, or any other trademark, service mark, trade name and/or trade dress owned or used by T-Mobile now or in the future;
d. accessing, directly or indirectly, personally or through an agent or associate, any of T-Mobile’s internal computers or computer systems;
e. accessing, altering, erasing, ■ tampering with, deleting or otherwise disabling the software contained in any T-Mobile mobile device;
f. supplying T-Mobile Activation Materials or mobile device(s) to or facilitating or assisting in any way other persons or entities who Defendants know or should know are engaged inselling SIM cards, Activation Materials, and/or methods or processes to defraud T-Mobile or are unlocking T-Mobile mobile device and/or hacking, altering, erasing, tampering with, deleting or otherwise disabling the software installed in T-Mobile mobile device(s);
g. supplying T-Mobile Activation Materials or devices to or facilitating or in any way assisting other persons or entities who Defendants know or should know are engaged in any of the acts prohibited under this Permanent Injunction, including, without limitation, the buying and/or selling of T-Mobile Activation Materials or mobile device; and
h. using the T-Mobile Marks or any other trademark, service mark, trade name and/or trade dress owned or used by T-Mobile now or in the future, or that is likely to cause confusion with T-Mobile’s marks, without T-Mobile’s prior written authorization.
4. The purchase, sale, trafficking, use, or shipment of any T-Mobile mobile device, SIM card, accessory, or Activation Material -without T-Mobile’s prior written consent within and/or outside of the continental United States is and shall be deemed a presumptive violation of this permanent injunction.
5. Pursuant to the Lanham Act, Defendant shall deliver and turn over all T-Mobile SIM cards, handsets, and products in his possession, or subject to his custody or control, bearing or infringing on any T-Mobile trademark or a confusingly similar copy thereof, to T-Mobile within 10 days of the date of this Final Judgment.
6. T-Mobile is awarded its attorneys’ fees and costs incurred as a result of this action, in the amount of $182,221.34, in accordance with the amounts set forth in the declarations of T-Mobile’s counsel James Baldinger and James Grant, which this Court finds reasonable.
7. The address of George Collett is 510 South 112th Street, Tacoma, WA 98444.
8. The address of Plaintiff, T-Mobile USA, Inc., is 12920 S.E. 38th Street, Bellevue, Washington 98006.
9. The Court retains jurisdiction over this matter and the parties to this action to enforce any violation of the terms of this Permanent Injunction by a finding of contempt and an order for payment of compensatory damages to T-Mobile in an amount of $5,000 for each T-Mobile prepaid handset, accessory, or item of Activation Material that Defendant is found to have purchased, sold, advertised, activated, used, provided or unlocked in violation of this Injunction. The Court finds that these amounts are compensatory and will serve to compensate T-Mobile for its losses in the event any Defendant violates the terms of this Order.
10. The Court hereby finds, pursuant to Fed.R.Civ.P. 54(b), that there is no just reason for delay and orders that Judgment shall be entered against Defendant as set forth herein.
11. This case will remain open with respect to the other Defendants and the other claims T-Mobile has brought against Defendant George Collett.
Notes
. "Intent to defraud" under Section 1030(a)(4) "simply means wrongdoing ...” whereby "the defendant participated in dishonest methods to obtain the plaintiff’s secret information.” Shurgard Storage Ctrs., Inc. v. Safeguard Self Storage, Inc.,
. T-Mobile’s proprietary activation computer system and its wireless telecommunications network both constitute a "protected computer” for purposes of the CFAA, as defined at 18 U.S.C. § 1030(e)(2)(B). See United States v. Trotter,
. According to the statute, “loss” includes “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, systems, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of the interruption of service.” See 18 U.S.C. § 1030(e)(ll).
. The term "damage” is defined in the statute to mean "any impairment to the integrity or availability of data, a program, a system, or information.” See 18 U.S.C. § 1030(e)(8).
. O.C.G.A. § 16-9-93 states in pertinent part:
(a) Computer Theft. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
(1) Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession;
(2) Obtaining property by any deceitful means or artful practice; or
(3) Converting properly to such person’s use in violation of an agreement or other known legal obligation to make a specified application or disposition of such property ... shall be guilty of the crime of computer theft.
(b) Computer Trespass. Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:
(1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
(2) Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or
(3) Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists ... shall be guilty of the crime of computer trespass....
(e) Computer Password Disclosure. Any person who discloses a number, code, password, or other means of access to a computer or computer network knowing that such disclosure is without authority and which results in damages (including the fair market-value of any services used and victim expenditure) to the owner of the computer or computer network in excess of $500.00 shall be guilty of the crime of computer password disclosure.
