THE COPYRIGHT NOTICE

The documents and information contained on this web site are the copyrighted materials of the University of Tennessee-Campbell Clinic Department of Orthopaedic Surgery and the Campbell Clinic, Inc. Reproduction or storage of materials obtained from this site are subject to the U.S. Copyright Act of 1976, Title 17 U.S.C.

The information at this site may only be reproduced with the written permission of the above parties.

THE UNIVERSITY OF TENNESSEE, MEMPHIS INTERNET DISCLAIMER

The University of Tennessee, Memphis provides web pages and internet server space as a service to its faculty, staff and students. All pages are registered with the Computing and Telecommunications Office, however, the University is not responsible for content (See University Pages below). Also, the University and individual publishers are not responsible for the content of information maintained outside the University's server to which links may be provided. These pages are expected to reflect the University's mission, present a favorable image and be in accordance with the University's Publications Guidelines and other applicable policies.

University Pages

All academic and administrative homepages must contain the official University header/footer. The publisher is responsible for the accuracy and currency of the information provided on the pages. Publishers must adhere to all University policies and local, state and federal laws.

Personal Pages

Personal pages are the sole responsibility of the publisher. The University provides space on the server and requires the page to be registered, but it does not edit these pages for content. The University does reserve the right to monitor personal pages and remove any materials that are in violation of University policies and procedures.

Affirmative Action Statement

The University of Tennessee, Memphis does not discriminate on the basis of race, sex, color, religion, national origin, age, disability or veteran status in provision of educations or employment opportunities and benefits. This policy extends to both employment by as well as admission to and matriculation at the University. The University does not discriminate on the basis of race, sex or disability in the educational programs and activities which it operates, pursuant to the requirements of Title IX of the Education Amendments Act of 1972, Publ.L. 92-318; and Section 504 of the Rehabilitation Act of 1973, Pub.L. 93-112, respectively, or on the basis of Titles VI and VII of the Civil Rights Act of 1964, the Americans with Disabilities Act of 1990, and the Age Discrimination in Employment Act with regard to employment, services and programs. Inquiries or charges concerning Titles VI, VII and IX as well as Section 504 and the Americans with Disabilities Act or the Age Discrimination in Employment Act or any of the above referenced policies should be directed to the Office of Affirmative Action.

TENNESSEE COMPUTER CRIMES ACT - (More recent version being printed)

Tennessee law provides that certain computer offenses are criminal acts and prescribes penalties for unlawful activities related to computer usage. This law and its provisions, reprinted below, are found in Tennessee Codes Annotated, Sections 39-14-601, et seq.

39-14-601. Definitions. - The following definitions apply in this part, unless the context otherwise requires:

  1. "Access" means to approach, instruct, communicate with, store data in, retrieve or intercept data from, or otherwise make use of any resources of, a computer, computer system, or computer network;
  2. "Computer" means a device that can perform substantial computation, including numerous arithmetic or logic operations, without intervention by a human operator during the processing of a job;
  3. "Computer network" means a set of two (2) or more computer systems that transmit data over communication circuits connecting them;
  4. "Computer program" means an ordered set of data that are coded instructions or statements that, when executed by a computer, cause the computer to process data;
  5. "Computer software" means a set of computer programs, procedures, and associated documentation concerned with the operation of a computer, computer system, or computer network;
  6. "Computer system" means a set of connected devices including a computer and other devices including, but not limited to, one (1) or more of the following: data input, output, or storage devices, data communication circuits, and operating system computer programs that make the system capable of performing data processing tasks;
  7. "Data" is a representation of information, knowledge, facts, concepts, or instructions which is being prepared or has been prepared in a formalized manner, and is intended to be stored or processed, or is being stored or processed, or has been stored or processed, in a computer, computer system or computer network;
  8. "Financial instruments" includes, but is not limited to, any check, cashier's check, draft, warrant, money order, certificate of deposit, negotiable instrument, letter of credit, bill of exchange, credit card, debit card, marketable security, or any computer system representation thereof,
  9. "Intellectual property" includes data, which may be in any form including, but not limited to, computer printouts, magnetic storage media, punched cards, or may be stored internally in the memory of a computer;
  10. "To process" is to use a computer to put data through a systematic sequence of operations for the purpose of producing a specified result;
  11. "Property" includes, but is not limited to, intellectual property, financial instruments, data, computer programs, documentation associated with data, computers, computer systems and computer programs, all in machine-readable or human-readable form, and any tangible or intangible item of value;and
  12. "Services" includes, but is not limited to, the use of a computer, a computer system, a computer network, computer software, computer program, or data to perform tasks. [Acts 1989, , [[section]]1.]

39-14-602. Violations - Penalties. -

  1. Whoever knowingly, directly or indirectly, accesses, causes to be accessed, or attempts to access any computer software, computer program, data, computer, computer system, computer network, or any part thereof, for the purpose of obtaining money, property, or services for himself or another by means of false or fraudulent pretenses, representations, or promises violates this subsection and is subject to the penalties of [[section]] 39-14-105.
  2. Whoever intentionally and without authorization, directly or indirectly
    1. Accesses; or
    2. Alters, damages, destroys, or attempts to damage or destroy, any computer, computer system, computer network, computer software, program or data;violates this subsection.
  3. A violation of subdivision (b)(1) is a Class C misdemeanor.
  4. A violation of subdivision (b)(2) is punished as in [[section]] 39-14-105.
  5. Whoever receives, conceals, uses, or aids another in receiving, concealing or using any proceeds resulting from a violation of either subsection (a) or subdivision (b)(2), knowing the same to be proceeds of such violation, or whoever receives, conceals, uses, or aids another in receiving, concealing or using, any books, records, documents, property, financial instrument, computer software, program, or other material, property, or objects, knowing the same to have been used in violating either subsection (a) or subdivision (b)(2) violates this subsection and is subject to the penalties of [[section]] 39-14-105. [Acts 1999, ch. 591, [[section]] 1.]

39-14-603. Venue. - For the purposes of venue under the provisions of this part, any violation of this part shall be considered to have been committed:

  1. In any county in which any act was performed in furtherance of any transaction violating this part;
  2. In any county in which any violator had control or possession of any proceeds of the violation or of any books, records, documents, property, financial instrument, computer software, computer program or other material, objects or items which were used in furtherance of the violation; and
  3. In any county from which, to which or through which any access to a computer, computer system, or computer network was made, whether by wire, electromagnetic waves, microwaves or any other means of communication. [Acts 1989, ch.591, [[section]] 1.]