Official Text
“Whoever uses computer resources or electronic communication to exploit, groom, or harm minors, including sharing or distributing child exploitation material.”
Legal Analysis
Elements to Prove:
- Using computer resources or electronic communication.
- To exploit, groom, or harm minors.
- Including sharing exploitation material.
Potential Defenses:
- No exploitation or harm.
- Legitimate communication.
- Authorized activities.
Practical Examples
What Constitutes the Offense:
Online grooming of minors, sharing child exploitation material, cyber exploitation of children.
What Doesn't Constitute:
Legitimate communication with minors, authorized educational content, or lawful activities.
Punishment
Imprisonment up to 10 years, and Fine