Learn About the Law
Get help with your legal needs
FindLaw’s Learn About the Law features thousands of informational articles to help you understand your options. And if you’re ready to hire an attorney, find one in your area who can help.
Current as of January 01, 2024 | Updated by FindLaw Staff
As used in sections 2909.01 to 2909.07 of the Revised Code:
(A) To “create a substantial risk of serious physical harm to any person” includes the creation of a substantial risk of serious physical harm to any emergency personnel.
(B) “Emergency personnel” means any of the following persons:
(1) A peace officer, as defined in section 2935.01 of the Revised Code;
(2) A member of a fire department or other firefighting agency of a municipal corporation, township, township fire district, joint fire district, other political subdivision, or combination of political subdivisions;
(3) A member of a private fire company, as defined in section 9.60 of the Revised Code, or a volunteer firefighter;
(4) A member of a joint ambulance district or joint emergency medical services district;
(5) An emergency medical technician-basic, emergency medical technician-intermediate, emergency medical technician-paramedic, ambulance operator, or other member of an emergency medical service that is owned or operated by a political subdivision or a private entity;
(6) The state fire marshal, the chief deputy state fire marshal, or an assistant state fire marshal;
(7) A fire prevention officer of a political subdivision or an arson, fire, or similar investigator of a political subdivision.
(C) “Occupied structure” means any house, building, outbuilding, watercraft, aircraft, railroad car, truck, trailer, tent, or other structure, vehicle, or shelter, or any portion thereof, to which any of the following applies:
(1) It is maintained as a permanent or temporary dwelling, even though it is temporarily unoccupied and whether or not any person is actually present.
(2) At the time, it is occupied as the permanent or temporary habitation of any person, whether or not any person is actually present.
(3) At the time, it is specially adapted for the overnight accommodation of any person, whether or not any person is actually present.
(4) At the time, any person is present or likely to be present in it.
(D) “Political subdivision” and “state” have the same meanings as in section 2744.01 of the Revised Code.
(E) “Computer,” “computer hacking,” “computer network,” “computer program,” “computer software,” “computer system,” “data,” and “telecommunications device” have the same meanings as in section 2913.01 of the Revised Code.
(F) “Computer contaminant” means a computer program that is designed to modify, damage, destroy, disable, deny or degrade access to, allow unauthorized access to, functionally impair, record, or transmit information within a computer, computer system, or computer network without the express or implied consent of the owner or other person authorized to give consent and that is of a type or kind described in divisions (F)(1) to (4) of this section or of a type or kind similar to a type or kind described in divisions (F)(1) to (4) of this section:
(1) A group of computer programs commonly known as “viruses” and “worms” that are self-replicating or self-propagating and that are designed to contaminate other computer programs, compromise computer security, consume computer resources, modify, destroy, record, or transmit data, or disrupt the normal operation of the computer, computer system, or computer network;
(2) A group of computer programs commonly known as “Trojans” or “Trojan horses” that are not self-replicating or self-propagating and that are designed to compromise computer security, consume computer resources, modify, destroy, record, or transmit data, or disrupt the normal operation of the computer, computer system, or computer network;
(3) A group of computer programs commonly known as “zombies” that are designed to use a computer without the knowledge and consent of the owner, or other person authorized to give consent, and that are designed to send large quantities of data to a targeted computer network for the purpose of degrading the targeted computer's or network's performance, or denying access through the network to the targeted computer or network, resulting in what is commonly known as “Denial of Service” or “Distributed Denial of Service” attacks;
(4) A group of computer programs commonly know as “trap doors,” “back doors,” or “root kits” that are designed to bypass standard authentication software and that are designed to allow access to or use of a computer without the knowledge or consent of the owner, or other person authorized to give consent.
(G) “Internet” has the same meaning as in section 341.42 of the Revised Code.
Cite this article: FindLaw.com - Ohio Revised Code Title XXIX. Crimes Procedure § 2909.01 - last updated January 01, 2024 | https://codes.findlaw.com/oh/title-xxix-crimes-procedure/oh-rev-code-sect-2909-01/
FindLaw Codes may not reflect the most recent version of the law in your jurisdiction. Please verify the status of the code you are researching with the state legislature or via Westlaw before relying on it for your legal needs.
A free source of state and federal court opinions, state laws, and the United States Code. For more information about the legal concepts addressed by these cases and statutes, visit FindLaw's Learn About the Law.
Get help with your legal needs
FindLaw’s Learn About the Law features thousands of informational articles to help you understand your options. And if you’re ready to hire an attorney, find one in your area who can help.
Search our directory by legal issue
Enter information in one or both fields (Required)