Current through August 26, 2024
(1) COMPUTER DATA, PROGRAMS, EQUIPMENT OR
SUPPLIES. No person may willfully, knowingly and without authorization do or
attempt to do any of the following:
(a)
Modify, destroy, access, take possession of or copy data, computer programs or
supporting documentation;
(b)
Disclose restricted access codes or other restricted access information to a
person not authorized to possess such codes or information;
(c) Modify, destroy, use, take or damage a
computer, computer system or computer network;
(d) Modify, destroy, use, take or damage any
equipment or supplies used, or intended to be used, in a computer, computer
system or computer network.
(e)
Cause an interruption in service by submitting a message or multiple messages
to a computer, computer program, computer system, or computer network that
exceeds the processing capacity of the computer, computer program, computer
system, or computer network.
(2) FRAUD IN UNIVERSITY ACCOMMODATIONS OR
EATING PLACES.
(a) No person may, after
having received any food, lodging or other service or accommodation at any
university housing facility or eating place, intentionally abscond without
paying for it.
(b) No person may,
while in any university housing or lodging facility or eating place,
intentionally defraud the university or its employees or agents in charge of
the facility or eating place, in any transaction arising out of the
relationship as a user of the housing or lodging facility or eating
place.
(c) In this subsection,
prima facie evidence that the person intentionally absconded without paying for
the food, lodging or other service or intentionally defrauded the university or
its employees or agents has the meaning and includes the items of proof set
forth in s.
943.21(2),
Stats.
(3) ISSUE OF
WORTHLESS CHECK.
(a) No person may issue any
check or other order for the payment of money in an amount not more than $2,500
which, at the time of issuance, he or she intends shall not be paid.
(b) In this subsection, prima facie evidence
that the person, at the time he or she issued the check or other order for the
payment of money, intended it should not be paid, has the meaning and includes
the items of proof set forth in s.
943.24,
Stats.
(c) This subsection does not
apply to a postdated check or to a check given for past consideration, except a
payroll check.
(4)
LIBRARY MATERIALS.
(a) No person may
intentionally take, carry away, transfer, conceal or retain possession of any
library material without the consent of a library official, agent or employee
and with the intent to deprive the library of possession of the
material.
(b) The concealment of
library material beyond the last station for borrowing library material in a
library is evidence of intent to deprive the library of possession of the
material. The discovery of library material which has not been borrowed in
accordance with the library's procedures or taken with consent of a library
official, agent or employee and which is concealed upon the person or among the
belongings of the person or concealed by a person upon the person or among the
belongings of another is evidence of intentional concealment on the part of the
person so concealing the material.
(5) RETAIL THEFT.
(a) No person may intentionally alter indicia
of price or value of merchandise or take and carry away, transfer, conceal or
retain possession of merchandise held for resale by a merchant, or property of
the merchant, without his or her consent and with intent to deprive the
merchant permanently of possession, or the full purchase price of the
merchandise.
(b) No person may
intentionally remove a theft detection device from merchandise, or use a theft
detection shielding device, without the merchant's consent and with intent to
deprive the merchant permanently of possession, or the full purchase price of
the merchandise.
(c) In this
subsection, "merchant" includes any "merchant" as defined in s.
402.104(3),
Stats., and any vendor or bookstore authorized to sell in university buildings
or on university lands.
(d) In this
subsection, "theft detection device" means any tag or other device that is used
to prevent or detect theft and that is attached to merchandise held for resale
by a merchant or to property of a merchant, and "theft detection shielding
device" means any laminated or coated bag or device designed to shield such
merchandise from detection by an electronic or magnetic theft alarm
sensor.
(6) THEFT.
(a) No person may intentionally take and
carry away, use, transfer, conceal, or retain possession of movable property of
another with a value of under $100, without consent and with the intent to
deprive the owner permanently of such property.
(b) No person may intentionally take and
carry away, use, transfer, conceal, or retain possession of movable property of
another with a value of at least $100 but not more than $1,000, without consent
and with the intent to deprive the owner permanently of such
property.
(7) USE OF
CHEATING TOKENS. No person may obtain the property or services of another by
depositing anything which he or she knows is not lawful money or is an
unauthorized token in any receptacle used for the deposit of coins or
tokens.
(8) VANDALISM. No person
may break, tear up, mar, destroy or deface any notice, tree, vine, shrub,
flower or other vegetation, or dislocate any stones, or disfigure natural
conditions, or deface, alter, destroy or damage in any way any other property,
real or personal, within the boundaries of any university lands unless
authorized by the chief administrative officer.