| |
Public Act 100-0166 Public Act 0166 100TH GENERAL ASSEMBLY |
Public Act 100-0166 | HB3251 Enrolled | LRB100 10504 RLC 20719 b |
|
| AN ACT concerning criminal law.
| Be it enacted by the People of the State of Illinois,
| represented in the General Assembly:
| Section 5. The Criminal Code of 2012 is amended by changing | Section 12-7.5 as follows:
| (720 ILCS 5/12-7.5)
| Sec. 12-7.5. Cyberstalking.
| (a) A person commits cyberstalking when he or she engages | in a course of conduct using electronic communication directed | at a specific person, and he or she knows or should know that | would cause a reasonable person to: | (1) fear for his or her safety or the safety of a third | person; or | (2) suffer other emotional distress. | (a-3) A person commits cyberstalking when he or she, | knowingly and without
lawful justification, on at least 2 | separate occasions, harasses another person
through the use of | electronic communication and:
| (1) at any time transmits a threat of immediate or | future bodily harm,
sexual assault, confinement, or | restraint and the threat is directed towards
that person or | a family member of that person; or
| (2) places that person or a family member of that |
| person in reasonable
apprehension of immediate or future | bodily harm, sexual assault, confinement,
or restraint; or
| (3) at any time knowingly solicits the commission of an | act by any person which would be a violation of this Code | directed towards that person or a family member of that | person. | (a-4) A person commits cyberstalking when he or she | knowingly, surreptitiously, and without lawful justification, | installs or otherwise places electronic monitoring software or | spyware on an electronic communication device as a means to | harass another person and: | (1) at any time transmits a threat of immediate or | future bodily harm, sexual assault, confinement, or | restraint and the threat is directed towards that person or | a family member of that person; | (2) places that person or a family member of that | person in reasonable apprehension of immediate or future | bodily harm, sexual assault, confinement, or restraint; or | (3) at any time knowingly solicits the commission of an | act by any person which would be a violation of this Code | directed towards that person or a family member of that | person. | For purposes of this Section, an installation or placement | is not surreptitious if: | (1) with respect to electronic software, hardware, or | computer applications, clear notice regarding the use of |
| the specific type of tracking software or spyware is | provided by the installer in advance to the owners and | primary users of the electronic software, hardware, or | computer application; or | (2) written or electronic consent of all owners and | primary users of the electronic software, hardware, or | computer application on which the tracking software or | spyware will be installed has been sought and obtained | through a mechanism that does not seek to obtain any other | approvals or acknowledgement from the owners and primary | users. | (a-5) A person commits cyberstalking when he or she, | knowingly and without lawful justification, creates and | maintains an Internet website or webpage which is accessible to | one or more third parties for a period of at least 24 hours, | and which contains statements harassing another person and: | (1) which communicates a threat of immediate or future | bodily harm, sexual assault, confinement, or restraint, | where the threat is directed towards that person or a | family member of that person, or | (2) which places that person or a family member of that | person in reasonable apprehension of immediate or future | bodily harm, sexual assault, confinement, or restraint, or | (3) which knowingly solicits the commission of an act | by any person which would be a violation of this Code | directed towards that person or a family member of that |
| person.
| (b) Sentence. Cyberstalking is a Class 4 felony; a second | or subsequent
conviction is a Class 3 felony.
| (c) For purposes of this Section: | (1) "Course of conduct" means 2 or more acts, including | but not limited to acts in which a defendant directly, | indirectly, or through third parties, by any action, | method, device, or means follows, monitors, observes, | surveils, threatens, or communicates to or about, a person, | engages in other non-consensual contact, or interferes | with or damages a person's property or pet. The | incarceration in a penal institution of a person who | commits the course of conduct is not a bar to prosecution | under this Section. | (2) "Electronic communication" means any transfer of | signs, signals, writings, sounds, data, or intelligence of | any nature transmitted in whole or in part by a wire, | radio, electromagnetic, photoelectric, or photo-optical | system. "Electronic communication" includes transmissions | through an electronic device including, but not limited to, | a telephone, cellular phone, computer, or pager, which | communication includes, but is not limited to, e-mail, | instant message, text message, or voice mail. | (2.1) "Electronic communication device" means an | electronic device, including, but not limited to, a | wireless telephone, personal digital assistant, or a |
| portable or mobile computer. | (2.2) "Electronic monitoring software or spyware" | means software or an application that surreptitiously | tracks computer activity on a device and records and | transmits the information to third parties with the intent | to cause injury or harm. For the purposes of this paragraph | (2.2), "intent to cause injury or harm" does not include | activities carried out in furtherance of the prevention of | fraud or crime or of protecting the security of networks, | online services, applications, software, other computer | programs, users, or electronic communication devices or | similar devices. | (3) "Emotional distress" means significant mental | suffering, anxiety or alarm. | (4) "Harass"
means to engage in a knowing and willful | course of conduct directed at a
specific person
that | alarms, torments, or terrorizes that person. | (5) "Non-consensual contact" means any contact with | the victim that is initiated or continued without the | victim's consent, including but not limited to being in the | physical presence of the victim; appearing within the sight | of the victim; approaching or confronting the victim in a | public place or on private property; appearing at the | workplace or residence of the victim; entering onto or | remaining on property owned, leased, or occupied by the | victim; or placing an object on, or delivering an object |
| to, property owned, leased, or occupied by the victim. | (6) "Reasonable person" means a person in the victim's | circumstances, with the victim's knowledge of the | defendant and the defendant's prior acts. | (7) "Third party" means any person other than the | person violating these provisions and the person or persons | towards whom the violator's actions are directed. | (d) Telecommunications carriers, commercial mobile service | providers, and providers of information services, including, | but not limited to, Internet service providers and hosting | service providers, are not liable under this Section, except | for willful and wanton misconduct, by virtue of the | transmission, storage, or caching of electronic communications | or messages of others or by virtue of the provision of other | related telecommunications, commercial mobile services, or | information services used by others in violation of this | Section. | (e) A defendant who directed the actions of a third party | to violate this Section, under the principles of accountability | set forth in Article 5 of this Code, is guilty of violating | this Section as if the same had been personally done by the | defendant, without regard to the mental state of the third | party acting at the direction of the defendant. | (f) It is not a violation of this Section to: | (1) provide, protect, maintain, update, or upgrade | networks, online services, applications, software, other |
| computer programs, electronic communication devices, or | similar devices under the terms of use applicable to those | networks, services, applications, software, programs, or | devices; | (2) interfere with or prohibit terms or conditions in a | contract or license related to networks, online services, | applications, software, other computer programs, | electronic communication devices, or similar devices; or | (3) create any liability by reason of terms or | conditions adopted, or technical measures implemented, to | prevent the transmission of unsolicited electronic mail or | communications. | (Source: P.A. 96-328, eff. 8-11-09; 96-686, eff. 1-1-10; | 96-1000, eff. 7-2-10; 96-1551, eff. 7-1-11; 97-303, eff. | 8-11-11; 97-311, eff. 8-11-11; 97-1109, eff. 1-1-13.)
|
Effective Date: 1/1/2018
|
|
|