CERTIFICATION OF ENROLLMENT
ENGROSSED SECOND SUBSTITUTE HOUSE BILL 2375
64th Legislature
2016 Regular Session
ENGROSSED SECOND SUBSTITUTE HOUSE BILL 2375
AS AMENDED BY THE SENATE
Passed Legislature - 2016 Regular Session
State of Washington
64th Legislature
2016 Regular Session
By House General Government & Information Technology (originally sponsored by Representatives Magendanz, Orwall, Smith, Tarleton, MacEwen, Muri, Stanford, and Wylie)
READ FIRST TIME 02/09/16.
AN ACT Relating to cybercrime; amending RCW 9.94A.515; reenacting and amending RCW 9A.52.010; adding a new chapter to Title 9A RCW; creating new sections; repealing RCW 9A.52.110, 9A.52.120, and 9A.52.130; and prescribing penalties.
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF WASHINGTON:
NEW SECTION.  Sec. 1.  The legislature finds that the rapid pace of technological change and information computerization in the digital age generates a never ending sequence of anxiety inducing reports highlighting how the latest device or innovation is being used to harm consumers. The legislature finds that this generates an ongoing pattern of legislation being proposed to regulate each new technology. The legislature finds that a more systemic approach is needed to better protect consumers and address these rapidly advancing technologies. The legislature finds that the application of traditional criminal enforcement measures that apply long-standing concepts of trespass, fraud, and theft to activities in the electronic frontier has not provided the essential clarity, certainty, and predictability that regulators, entrepreneurs, and innovators need. The legislature finds that an integrated, comprehensive methodology, rather than a piecemeal approach, will provide significant economic development benefits by providing certainty to the innovation community about the actions and activities that are prohibited. Therefore, the legislature intends to create a new chapter of crimes to the criminal code to punish and deter misuse or abuse of technology, rather than the perceived threats of individual technologies. This new chapter of crimes has been developed from an existing and proven system of computer security threat modeling known as the STRIDE system.
The legislature intends to strike a balance between public safety and civil liberties in the digital world, including creating sufficient space for white hat security research and whistleblowers. The state whistleblower and public record laws prevent this act from being used to hide any deleterious actions by government officials under the guise of security. Furthermore, this act is not intended to criminalize activity solely on the basis that it violates any terms of service.
The purpose of the Washington cybercrime act is to provide prosecutors the twenty-first century tools they need to combat twenty-first century crimes.
NEW SECTION.  Sec. 2.  This act may be known and cited as the Washington cybercrime act.
NEW SECTION.  Sec. 3.  The definitions in this section apply throughout this chapter unless the context clearly requires otherwise.
(1) "Access" means to gain entry to, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of electronic data, data network, or data system, including via electronic means.
(2) "Cybercrime" includes crimes of this chapter.
(3) "Data" means a digital representation of information, knowledge, facts, concepts, data software, data programs, or instructions that are being prepared or have been prepared in a formalized manner and are intended for use in a data network, data program, data services, or data system.
(4) "Data network" means any system that provides digital communications between one or more data systems or other digital input/output devices including, but not limited to, display terminals, remote systems, mobile devices, and printers.
(5) "Data program" means an ordered set of electronic data representing coded instructions or statements that when executed by a computer causes the device to process electronic data.
(6) "Data services" includes data processing, storage functions, internet services, email services, electronic message services, web site access, internet-based electronic gaming services, and other similar system, network, or internet-based services.
(7) "Data system" means an electronic device or collection of electronic devices, including support devices one or more of which contain data programs, input data, and output data, and that performs functions including, but not limited to, logic, arithmetic, data storage and retrieval, communication, and control. This term does not include calculators that are not programmable and incapable of being used in conjunction with external files.
(8) "Identifying information" means information that, alone or in combination, is linked or linkable to a trusted entity that would be reasonably expected to request or provide credentials to access a targeted data system or network. It includes, but is not limited to, recognizable names, addresses, telephone numbers, logos, HTML links, email addresses, registered domain names, reserved IP addresses, usernames, social media profiles, cryptographic keys, and biometric identifiers.
(9) "Malware" means any set of data instructions that are designed, without authorization and with malicious intent, to disrupt computer operations, gather sensitive information, or gain access to private computer systems. "Malware" does not include software that installs security updates, removes malware, or causes unintentional harm due to some deficiency. It includes, but is not limited to, a group of data instructions commonly called viruses or worms, that are self-replicating or self-propagating and are designed to infect other data programs or data, consume data resources, modify, destroy, record, or transmit data, or in some other fashion usurp the normal operation of the data, data system, or data network.
(10) "White hat security research" means accessing a data program, service, or system solely for purposes of good faith testing, investigation, identification, and/or correction of a security flaw or vulnerability, where such activity is carried out, and where the information derived from the activity is used, primarily to promote security or safety.
(11) "Without authorization" means to knowingly circumvent technological access barriers to a data system in order to obtain information without the express or implied permission of the owner, where such technological access measures are specifically designed to exclude or prevent unauthorized individuals from obtaining such information, but does not include white hat security research or circumventing a technological measure that does not effectively control access to a computer. The term "without the express or implied permission" does not include access in violation of a duty, agreement, or contractual obligation, such as an acceptable use policy or terms of service agreement, with an internet service provider, internet web site, or employer. The term "circumvent technological access barriers" may include unauthorized elevation of privileges, such as allowing a normal user to execute code as administrator, or allowing a remote person without any privileges to run code.
NEW SECTION.  Sec. 4.  (1) A person is guilty of computer trespass in the first degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another; and
(a) The access is made with the intent to commit another crime in violation of a state law not included in this chapter; or
(b) The violation involves a computer or database maintained by a government agency.
(2) Computer trespass in the first degree is a class C felony.
NEW SECTION.  Sec. 5.  (1) A person is guilty of computer trespass in the second degree if the person, without authorization, intentionally gains access to a computer system or electronic database of another under circumstances not constituting the offense in the first degree.
(2) Computer trespass in the second degree is a gross misdemeanor.
NEW SECTION.  Sec. 6.  (1) A person is guilty of electronic data service interference if the person maliciously and without authorization causes the transmission of data, data program, or other electronic command that intentionally interrupts or suspends access to or use of a data network or data service.
(2) Electronic data service interference is a class C felony.
NEW SECTION.  Sec. 7.  (1) A person is guilty of spoofing if he or she, without authorization, knowingly initiates the transmission, display, or receipt of the identifying information of another organization or person for the purpose of gaining unauthorized access to electronic data, a data system, or a data network, and with the intent to commit another crime in violation of a state law not included in this chapter.
(2) Spoofing is a gross misdemeanor.
NEW SECTION.  Sec. 8.  (1) A person is guilty of electronic data tampering in the first degree if he or she maliciously and without authorization:
(a)(i) Alters data as it transmits between two data systems over an open or unsecure network; or
(ii) Introduces any malware into any electronic data, data system, or data network; and
(b)(i) Doing so is for the purpose of devising or executing any scheme to defraud, deceive, or extort, or commit any other crime in violation of a state law not included in this chapter, or of wrongfully controlling, gaining access to, or obtaining money, property, or electronic data; or
(ii) The electronic data, data system, or data network is maintained by a governmental agency.
(2) Electronic data tampering in the first degree is a class C felony.
NEW SECTION.  Sec. 9.  (1) A person is guilty of electronic data tampering in the second degree if he or she maliciously and without authorization:
(a) Alters data as it transmits between two data systems over an open or unsecure network under circumstances not constituting the offense in the first degree; or
(b) Introduces any malware into any electronic data, data system, or data network under circumstances not constituting the offense in the first degree.
(2) Electronic data tampering in the second degree is a gross misdemeanor.
NEW SECTION.  Sec. 10.  (1) A person is guilty of electronic data theft if he or she intentionally, without authorization, and without reasonable grounds to believe that he or she has such authorization, obtains any electronic data with the intent to:
(a) Devise or execute any scheme to defraud, deceive, extort, or commit any other crime in violation of a state law not included in this chapter; or
(b) Wrongfully control, gain access to, or obtain money, property, or electronic data.
(2) Electronic data theft is a class C felony.
NEW SECTION.  Sec. 11.  A person who, in the commission of a crime under this chapter, commits any other crime may be punished for that other crime as well as for the crime under this chapter and may be prosecuted for each crime separately.
Sec. 12.  RCW 9A.52.010 and 2011 c 336 s 369 are each reenacted and amended to read as follows:
The following definitions apply in this chapter:
(1) (("Access" means to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, directly or by electronic means.
(2) "Computer program" means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data.
(3) "Data" means a representation of information, knowledge, facts, concepts, or instructions that are being prepared or have been prepared in a formalized manner and are intended for use in a computer.
(4))) "Enter." The word "enter" when constituting an element or part of a crime, shall include the entrance of the person, or the insertion of any part of his or her body, or any instrument or weapon held in his or her hand and used or intended to be used to threaten or intimidate a person or to detach or remove property((;)).
(((5))) (2) "Enters or remains unlawfully." A person "enters or remains unlawfully" in or upon premises when he or she is not then licensed, invited, or otherwise privileged to so enter or remain.
A license or privilege to enter or remain in a building which is only partly open to the public is not a license or privilege to enter or remain in that part of a building which is not open to the public. A person who enters or remains upon unimproved and apparently unused land, which is neither fenced nor otherwise enclosed in a manner designed to exclude intruders, does so with license and privilege unless notice against trespass is personally communicated to him or her by the owner of the land or some other authorized person, or unless notice is given by posting in a conspicuous manner. Land that is used for commercial aquaculture or for growing an agricultural crop or crops, other than timber, is not unimproved and apparently unused land if a crop or any other sign of cultivation is clearly visible or if notice is given by posting in a conspicuous manner. Similarly, a field fenced in any manner is not unimproved and apparently unused land. A license or privilege to enter or remain on improved and apparently used land that is open to the public at particular times, which is neither fenced nor otherwise enclosed in a manner to exclude intruders, is not a license or privilege to enter or remain on the land at other times if notice of prohibited times of entry is posted in a conspicuous manner.
(((6))) (3) "Premises" includes any building, dwelling, structure used for commercial aquaculture, or any real property.
Sec. 13.  RCW 9.94A.515 and 2015 c 261 s 11 are each amended to read as follows:
 
 
TABLE 2
 
 
 
 
CRIMES INCLUDED WITHIN EACH SERIOUSNESS LEVEL
 
 
 
XVI
Aggravated Murder 1 (RCW 10.95.020)
 
 
 
XV
Homicide by abuse (RCW 9A.32.055)
 
 
 
 
Malicious explosion 1 (RCW 70.74.280(1))
 
 
 
Murder 1 (RCW 9A.32.030)
 
 
XIV
Murder 2 (RCW 9A.32.050)
 
 
 
 
Trafficking 1 (RCW 9A.40.100(1))
 
 
 
XIII
Malicious explosion 2 (RCW 70.74.280(2))
 
 
 
 
 
Malicious placement of an explosive 1 (RCW 70.74.270(1))
 
 
XII
Assault 1 (RCW 9A.36.011)
 
 
 
 
Assault of a Child 1 (RCW 9A.36.120)
 
 
 
 
 
Malicious placement of an imitation device 1 (RCW 70.74.272(1)(a))
 
 
 
 
 
Promoting Commercial Sexual Abuse of a Minor (RCW 9.68A.101)
 
 
 
Rape 1 (RCW 9A.44.040)
 
 
 
 
Rape of a Child 1 (RCW 9A.44.073)
 
 
 
 
Trafficking 2 (RCW 9A.40.100(3))
 
 
 
XI
Manslaughter 1 (RCW 9A.32.060)
 
 
 
Rape 2 (RCW 9A.44.050)
 
 
 
 
Rape of a Child 2 (RCW 9A.44.076)
 
 
 
 
 
 
Vehicular Homicide, by being under the influence of intoxicating liquor or any drug (RCW 46.61.520)
 
 
 
X
Child Molestation 1 (RCW 9A.44.083)
 
 
 
 
Criminal Mistreatment 1 (RCW 9A.42.020)
 
 
 
 
 
Indecent Liberties (with forcible compulsion) (RCW 9A.44.100(1)(a))
 
 
 
Kidnapping 1 (RCW 9A.40.020)
 
 
 
 
Leading Organized Crime (RCW 9A.82.060(1)(a))
 
 
 
 
Malicious explosion 3 (RCW 70.74.280(3))
 
 
 
 
Sexually Violent Predator Escape (RCW 9A.76.115)
 
 
 
IX
Abandonment of Dependent Person 1 (RCW 9A.42.060)
 
 
 
 
Assault of a Child 2 (RCW 9A.36.130)
 
 
 
 
Explosive devices prohibited (RCW 70.74.180)
 
 
 
 
Hit and RunDeath (RCW 46.52.020(4)(a))
 
 
 
 
 
 
Homicide by Watercraft, by being under the influence of intoxicating liquor or any drug (RCW 79A.60.050)
 
 
 
 
Inciting Criminal Profiteering (RCW 9A.82.060(1)(b))
 
 
 
 
 
Malicious placement of an explosive 2 (RCW 70.74.270(2))
 
 
 
Robbery 1 (RCW 9A.56.200)
 
 
 
 
Sexual Exploitation (RCW 9.68A.040)
 
 
VIII
Arson 1 (RCW 9A.48.020)
 
 
 
 
Commercial Sexual Abuse of a Minor (RCW 9.68A.100)
 
 
 
 
 
 
Homicide by Watercraft, by the operation of any vessel in a reckless manner (RCW 79A.60.050)
 
 
 
 
Manslaughter 2 (RCW 9A.32.070)
 
 
 
 
Promoting Prostitution 1 (RCW 9A.88.070)
 
 
 
 
Theft of Ammonia (RCW 69.55.010)
 
 
 
 
 
 
Vehicular Homicide, by the operation of any vehicle in a reckless manner (RCW 46.61.520)
 
 
VII
Burglary 1 (RCW 9A.52.020)
 
 
 
 
Child Molestation 2 (RCW 9A.44.086)
 
 
 
 
Civil Disorder Training (RCW 9A.48.120)
 
 
 
 
 
 
Dealing in depictions of minor engaged in sexually explicit conduct 1 (RCW 9.68A.050(1))
 
 
 
 
Drive-by Shooting (RCW 9A.36.045)
 
 
 
 
 
Homicide by Watercraft, by disregard for the safety of others (RCW 79A.60.050)
 
 
 
 
 
Indecent Liberties (without forcible compulsion) (RCW 9A.44.100(1) (b) and (c))
 
 
 
 
Introducing Contraband 1 (RCW 9A.76.140)
 
 
 
 
 
Malicious placement of an explosive 3 (RCW 70.74.270(3))
 
 
 
 
 
Negligently Causing Death By Use of a Signal Preemption Device (RCW 46.37.675)
 
 
 
 
 
 
Sending, bringing into state depictions of minor engaged in sexually explicit conduct 1 (RCW 9.68A.060(1))
 
 
 
 
 
Unlawful Possession of a Firearm in the first degree (RCW 9.41.040(1))
 
 
 
 
 
Use of a Machine Gun in Commission of a Felony (RCW 9.41.225)
 
 
 
 
 
Vehicular Homicide, by disregard for the safety of others (RCW 46.61.520)
 
 
 
VI
Bail Jumping with Murder 1 (RCW 9A.76.170(3)(a))
 
 
 
Bribery (RCW 9A.68.010)
 
 
 
Incest 1 (RCW 9A.64.020(1))
 
 
 
 
Intimidating a Judge (RCW 9A.72.160)
 
 
 
 
 
Intimidating a Juror/Witness (RCW 9A.72.110, 9A.72.130)
 
 
 
 
 
Malicious placement of an imitation device 2 (RCW 70.74.272(1)(b))
 
 
 
 
 
 
Possession of Depictions of a Minor Engaged in Sexually Explicit Conduct 1 (RCW 9.68A.070(1))
 
 
 
 
Rape of a Child 3 (RCW 9A.44.079)
 
 
 
 
Theft of a Firearm (RCW 9A.56.300)
 
 
 
 
Unlawful Storage of Ammonia (RCW 69.55.020)
 
 
 
V
Abandonment of Dependent Person 2 (RCW 9A.42.070)
 
 
 
 
 
Advancing money or property for extortionate extension of credit (RCW 9A.82.030)
 
 
 
 
 
Bail Jumping with class A Felony (RCW 9A.76.170(3)(b))
 
 
 
 
Child Molestation 3 (RCW 9A.44.089)
 
 
 
 
Criminal Mistreatment 2 (RCW 9A.42.030)
 
 
 
 
Custodial Sexual Misconduct 1 (RCW 9A.44.160)
 
 
 
 
 
 
Dealing in Depictions of Minor Engaged in Sexually Explicit Conduct 2 (RCW 9.68A.050(2))
 
 
 
 
 
 
 
 
Domestic Violence Court Order Violation (RCW 10.99.040, 10.99.050, 26.09.300, 26.10.220, 26.26.138, 26.50.110, 26.52.070, or 74.34.145)
 
 
 
 
 
Driving While Under the Influence (RCW 46.61.502(6))
 
 
 
Extortion 1 (RCW 9A.56.120)
 
 
 
 
Extortionate Extension of Credit (RCW 9A.82.020)
 
 
 
 
 
Extortionate Means to Collect Extensions of Credit (RCW 9A.82.040)
 
 
 
Incest 2 (RCW 9A.64.020(2))
 
 
 
Kidnapping 2 (RCW 9A.40.030)
 
 
 
Perjury 1 (RCW 9A.72.020)
 
 
 
 
Persistent prison misbehavior (RCW 9.94.070)
 
 
 
 
 
Physical Control of a Vehicle While Under the Influence (RCW 46.61.504(6))
 
 
 
 
Possession of a Stolen Firearm (RCW 9A.56.310)
 
 
 
Rape 3 (RCW 9A.44.060)
 
 
 
 
Rendering Criminal Assistance 1 (RCW 9A.76.070)
 
 
 
 
 
 
 
Sending, Bringing into State Depictions of Minor Engaged in Sexually Explicit Conduct 2 (RCW 9.68A.060(2))
 
 
 
 
Sexual Misconduct with a Minor 1 (RCW 9A.44.093)
 
 
 
 
Sexually Violating Human Remains (RCW 9A.44.105)
 
 
 
Stalking (RCW 9A.46.110)
 
 
 
 
 
Taking Motor Vehicle Without Permission 1 (RCW 9A.56.070)
 
 
IV
Arson 2 (RCW 9A.48.030)
 
 
 
Assault 2 (RCW 9A.36.021)
 
 
 
 
 
Assault 3 (of a Peace Officer with a Projectile Stun Gun) (RCW 9A.36.031(1)(h))
 
 
 
 
Assault by Watercraft (RCW 79A.60.060)
 
 
 
 
 
Bribing a Witness/Bribe Received by Witness (RCW 9A.72.090, 9A.72.100)
 
 
 
Cheating 1 (RCW 9.46.1961)
 
 
 
 
Commercial Bribery (RCW 9A.68.060)
 
 
 
 
Counterfeiting (RCW 9.16.035(4))
 
 
 
 
Endangerment with a Controlled Substance (RCW 9A.42.100)
 
 
 
Escape 1 (RCW 9A.76.110)
 
 
 
 
Hit and RunInjury (RCW 46.52.020(4)(b))
 
 
 
 
 
Hit and Run with VesselInjury Accident (RCW 79A.60.200(3))
 
 
 
 
Identity Theft 1 (RCW 9.35.020(2))
 
 
 
 
 
 
Indecent Exposure to Person Under Age Fourteen (subsequent sex offense) (RCW 9A.88.010)
 
 
 
 
 
Influencing Outcome of Sporting Event (RCW 9A.82.070)
 
 
 
 
Malicious Harassment (RCW 9A.36.080)
 
 
 
 
 
 
Possession of Depictions of a Minor Engaged in Sexually Explicit Conduct 2 (RCW 9.68A.070(2))
 
 
 
 
Residential Burglary (RCW 9A.52.025)
 
 
 
Robbery 2 (RCW 9A.56.210)
 
 
 
 
Theft of Livestock 1 (RCW 9A.56.080)
 
 
 
 
Threats to Bomb (RCW 9.61.160)
 
 
 
 
Trafficking in Stolen Property 1 (RCW 9A.82.050)
 
 
 
 
 
 
Unlawful factoring of a credit card or payment card transaction (RCW 9A.56.290(4)(b))
 
 
 
 
 
 
Unlawful transaction of health coverage as a health care service contractor (RCW 48.44.016(3))
 
 
 
 
 
 
Unlawful transaction of health coverage as a health maintenance organization (RCW 48.46.033(3))
 
 
 
 
 
Unlawful transaction of insurance business (RCW 48.15.023(3))
 
 
 
 
 
Unlicensed practice as an insurance professional (RCW 48.17.063(2))
 
 
 
 
 
Use of Proceeds of Criminal Profiteering (RCW 9A.82.080 (1) and (2))
 
 
 
 
 
Vehicle Prowling 2 (third or subsequent offense) (RCW 9A.52.100(3))
 
 
 
 
 
 
 
 
 
Vehicular Assault, by being under the influence of intoxicating liquor or any drug, or by the operation or driving of a vehicle in a reckless manner (RCW 46.61.522)
 
 
 
 
 
 
Viewing of Depictions of a Minor Engaged in Sexually Explicit Conduct 1 (RCW 9.68A.075(1))
 
 
 
 
Willful Failure to Return from Furlough (RCW 72.66.060)
 
 
 
 
III
Animal Cruelty 1 (Sexual Conduct or Contact) (RCW 16.52.205(3))
 
 
 
 
 
 
 
Assault 3 (Except Assault 3 of a Peace Officer With a Projectile Stun Gun) (RCW 9A.36.031 except subsection (1)(h))
 
 
 
 
Assault of a Child 3 (RCW 9A.36.140)
 
 
 
 
 
Bail Jumping with class B or C Felony (RCW 9A.76.170(3)(c))
 
 
 
Burglary 2 (RCW 9A.52.030)
 
 
 
 
 
Communication with a Minor for Immoral Purposes (RCW 9.68A.090)
 
 
 
 
Criminal Gang Intimidation (RCW 9A.46.120)
 
 
 
 
Custodial Assault (RCW 9A.36.100)
 
 
 
 
 
Cyberstalking (subsequent conviction or threat of death) (RCW 9.61.260(3))
 
 
 
Escape 2 (RCW 9A.76.120)
 
 
 
Extortion 2 (RCW 9A.56.130)
 
 
 
Harassment (RCW 9A.46.020)
 
 
 
 
Intimidating a Public Servant (RCW 9A.76.180)
 
 
 
 
Introducing Contraband 2 (RCW 9A.76.150)
 
 
 
 
Malicious Injury to Railroad Property (RCW 81.60.070)
 
 
 
 
Mortgage Fraud (RCW 19.144.080)
 
 
 
 
 
 
Negligently Causing Substantial Bodily Harm By Use of a Signal Preemption Device (RCW 46.37.674)
 
 
 
 
Organized Retail Theft 1 (RCW 9A.56.350(2))
 
 
 
Perjury 2 (RCW 9A.72.030)
 
 
 
 
Possession of Incendiary Device (RCW 9.40.120)
 
 
 
 
 
Possession of Machine Gun or Short-Barreled Shotgun or Rifle (RCW 9.41.190)
 
 
 
 
Promoting Prostitution 2 (RCW 9A.88.080)
 
 
 
 
 
Retail Theft with Special Circumstances 1 (RCW 9A.56.360(2))
 
 
 
 
Securities Act violation (RCW 21.20.400)
 
 
 
 
Tampering with a Witness (RCW 9A.72.120)
 
 
 
 
 
 
Telephone Harassment (subsequent conviction or threat of death) (RCW 9.61.230(2))
 
 
 
 
Theft of Livestock 2 (RCW 9A.56.083)
 
 
 
 
Theft with the Intent to Resell 1 (RCW 9A.56.340(2))
 
 
 
 
Trafficking in Stolen Property 2 (RCW 9A.82.055)
 
 
 
 
Unlawful Hunting of Big Game 1 (RCW 77.15.410(3)(b))
 
 
 
 
Unlawful Imprisonment (RCW 9A.40.040)
 
 
 
 
 
Unlawful Misbranding of Food Fish or Shellfish 1 (RCW 69.04.938(3))
 
 
 
 
 
Unlawful possession of firearm in the second degree (RCW 9.41.040(2))
 
 
 
 
 
Unlawful Taking of Endangered Fish or Wildlife 1 (RCW 77.15.120(3)(b))
 
 
 
 
 
Unlawful Trafficking in Fish, Shellfish, or Wildlife 1 (RCW 77.15.260(3)(b))
 
 
 
 
 
Unlawful Use of a Nondesignated Vessel (RCW 77.15.530(4))
 
 
 
 
 
 
 
Vehicular Assault, by the operation or driving of a vehicle with disregard for the safety of others (RCW 46.61.522)
 
 
 
 
 
Willful Failure to Return from Work Release (RCW 72.65.070)
 
 
 
 
II
Commercial Fishing Without a License 1 (RCW 77.15.500(3)(b))
 
 
 
 
 
Computer Trespass 1 (((RCW 9A.52.110)) section 4 of this act)
 
 
 
 
Counterfeiting (RCW 9.16.035(3))
 
 
 
 
 
Electronic Data Service Interference (section 6 of this act)
 
 
 
 
Electronic Data Tampering 1 (section 8 of this act)
 
 
 
 
Electronic Data Theft (section 10 of this act)
 
 
 
 
 
Engaging in Fish Dealing Activity Unlicensed 1 (RCW 77.15.620(3))
 
 
 
 
Escape from Community Custody (RCW 72.09.310)
 
 
 
 
 
 
 
Failure to Register as a Sex Offender (second or subsequent offense) (RCW 9A.44.130 prior to June 10, 2010, and RCW 9A.44.132)
 
 
 
 
Health Care False Claims (RCW 48.80.030)
 
 
 
 
Identity Theft 2 (RCW 9.35.020(3))
 
 
 
 
Improperly Obtaining Financial Information (RCW 9.35.010)
 
 
 
 
Malicious Mischief 1 (RCW 9A.48.070)
 
 
 
 
Organized Retail Theft 2 (RCW 9A.56.350(3))
 
 
 
 
Possession of Stolen Property 1 (RCW 9A.56.150)
 
 
 
 
Possession of a Stolen Vehicle (RCW 9A.56.068)
 
 
 
 
 
Retail Theft with Special Circumstances 2 (RCW 9A.56.360(3))
 
 
 
 
 
 
Scrap Processing, Recycling, or Supplying Without a License (second or subsequent offense) (RCW 19.290.100)
 
 
 
Theft 1 (RCW 9A.56.030)
 
 
 
 
Theft of a Motor Vehicle (RCW 9A.56.065)
 
 
 
 
 
 
 
 
Theft of Rental, Leased, ((or)) Lease-purchased, or Loaned Property (valued at ((one)) five thousand ((five hundred)) dollars or more) (RCW 9A.56.096(5)(a))
 
 
 
 
Theft with the Intent to Resell 2 (RCW 9A.56.340(3))
 
 
 
 
Trafficking in Insurance Claims (RCW 48.30A.015)
 
 
 
 
 
 
Unlawful factoring of a credit card or payment card transaction (RCW 9A.56.290(4)(a))
 
 
 
 
 
Unlawful Participation of Non-Indians in Indian Fishery (RCW 77.15.570(2))
 
 
 
 
Unlawful Practice of Law (RCW 2.48.180)
 
 
 
 
 
Unlawful Purchase or Use of a License (RCW 77.15.650(3)(b))
 
 
 
 
 
Unlawful Trafficking in Fish, Shellfish, or Wildlife 2 (RCW 77.15.260(3)(a))
 
 
 
 
 
Unlicensed Practice of a Profession or Business (RCW 18.130.190(7))
 
 
 
Voyeurism (RCW 9A.44.115)
 
 
 
 
I
Attempting to Elude a Pursuing Police Vehicle (RCW 46.61.024)
 
 
 
 
False Verification for Welfare (RCW 74.08.055)
 
 
 
Forgery (RCW 9A.60.020)
 
 
 
 
 
 
Fraudulent Creation or Revocation of a Mental Health Advance Directive (RCW 9A.60.060)
 
 
 
 
Malicious Mischief 2 (RCW 9A.48.080)
 
 
 
 
Mineral Trespass (RCW 78.44.330)
 
 
 
 
Possession of Stolen Property 2 (RCW 9A.56.160)
 
 
 
 
Reckless Burning 1 (RCW 9A.48.040)
 
 
 
 
Spotlighting Big Game 1 (RCW 77.15.450(3)(b))
 
 
 
 
 
Suspension of Department Privileges 1 (RCW 77.15.670(3)(b))
 
 
 
 
 
Taking Motor Vehicle Without Permission 2 (RCW 9A.56.075)
 
 
 
Theft 2 (RCW 9A.56.040)
 
 
 
 
 
 
 
 
 
 
Theft of Rental, Leased, ((or)) Lease-purchased, or Loaned Property (valued at ((two)) seven hundred fifty dollars or more but less than ((one)) five thousand ((five hundred)) dollars) (RCW 9A.56.096(5)(b))
 
 
 
 
 
Transaction of insurance business beyond the scope of licensure (RCW 48.17.063)
 
 
 
 
 
Unlawful Fish and Shellfish Catch Accounting (RCW 77.15.630(3)(b))
 
 
 
 
Unlawful Issuance of Checks or Drafts (RCW 9A.56.060)
 
 
 
 
 
Unlawful Possession of Fictitious Identification (RCW 9A.56.320)
 
 
 
 
 
Unlawful Possession of Instruments of Financial Fraud (RCW 9A.56.320)
 
 
 
 
 
Unlawful Possession of Payment Instruments (RCW 9A.56.320)
 
 
 
 
 
Unlawful Possession of a Personal Identification Device (RCW 9A.56.320)
 
 
 
 
 
Unlawful Production of Payment Instruments (RCW 9A.56.320)
 
 
 
 
 
 
Unlawful Releasing, Planting, Possessing, or Placing Deleterious Exotic Wildlife (RCW 77.15.250(2)(b))
 
 
 
 
Unlawful Trafficking in Food Stamps (RCW 9.91.142)
 
 
 
 
Unlawful Use of Food Stamps (RCW 9.91.144)
 
 
 
 
 
Unlawful Use of Net to Take Fish 1 (RCW 77.15.580(3)(b))
 
 
 
 
 
Unlawful Use of Prohibited Aquatic Animal Species (RCW 77.15.253(3))
 
 
 
 
Vehicle Prowl 1 (RCW 9A.52.095)
 
 
 
 
 
Violating Commercial Fishing Area or Time 1 (RCW 77.15.550(3)(b))
 
NEW SECTION.  Sec. 14.  The following acts or parts of acts are each repealed:
(1) RCW 9A.52.110 (Computer trespass in the first degree) and 1984 c 273 s 1;
(2) RCW 9A.52.120 (Computer trespass in the second degree) and 1984 c 273 s 2; and
(3) RCW 9A.52.130 (Computer trespassCommission of other crime) and 1984 c 273 s 3.
NEW SECTION.  Sec. 15.  Sections 3 through 11 of this act constitute a new chapter in Title 9A RCW.
--- END ---