Official Text
“Whoever uses computer resources or communication devices to harass, threaten, or intimidate any person.”
Legal Analysis
Elements to Prove:
- Using computer resources.
- Harassing, threatening, or intimidating.
- Another person.
Potential Defenses:
- No harassment.
- Legitimate communication.
- Authorized messages.
Practical Examples
What Constitutes the Offense:
Online harassment, cyber bullying, threatening messages, intimidating emails.
What Doesn't Constitute:
Legitimate communication, authorized messages, or lawful online activities.
Punishment
Imprisonment up to 3 years, and Fine