(730 ILCS 5/5-4-3.2)
Sec. 5-4-3.2. Collection and storage of Internet protocol addresses.
(a) Cyber-crimes Location Database. The Attorney General is hereby authorized to establish and maintain the "Illinois Cyber-crimes Location Database" (ICLD) to collect, store, and use Internet protocol (IP) addresses for purposes of investigating and prosecuting child exploitation crimes on the Internet.
(b) "Internet protocol address" means the string of numbers by which a location on the Internet is identified by routers or other computers connected to the Internet.
(c) Collection of Internet Protocol addresses.
(1) Collection upon commitment under the Sexually
Dangerous Persons Act. Upon motion for a defendant's confinement under the Sexually Dangerous Persons Act for criminal charges under Section 11-6, 11-20.1, 11-20.1B, 11-20.3, or 11-21 of the Criminal Code of 1961 or the Criminal Code of 2012, the State's Attorney or Attorney General shall record all Internet protocol (IP) addresses which the defendant may access from his or her residence or place of employment, registered in his or her name, or otherwise has under his or her control or custody.
(2) Collection upon conviction. Upon conviction for
crimes under Section 11-6, 11-20.1, 11-20.1B, 11-20.3, or 11-21 of the Criminal Code of 1961 or the Criminal Code of 2012, a State's Attorney shall record from defendants all Internet protocol (IP) addresses which the defendant may access from his or her residence or place of employment, registered in his or her name, or otherwise has under his or her control or custody, regardless of the sentence or disposition imposed.
(d) Storage and use of the Database. Internet protocol (IP) addresses recorded pursuant to this Section shall be submitted to the Attorney General for storage and use in the Illinois Cyber-crimes Location Database. The Attorney General and its designated agents may access the database for the purpose of investigation and prosecution of crimes listed in this Section. In addition, the Attorney General is authorized to share information stored in the database with the National Center for Missing and Exploited Children (NCMEC) and any federal, state, or local law enforcement agencies for the investigation or prosecution of child exploitation crimes.
(Source: P.A. 96-1551, eff. 7-1-11; 97-1150, eff. 1-25-13.)
Sections: Previous 5-3-3 5-3-4 5-4-1 5-4-2 5-4-3 5-4-3a 5-4-3.1 5-4-3.2 5-4.5-5 5-4.5-10 5-4.5-15 5-4.5-20 5-4.5-25 5-4.5-30 5-4.5-35 Next
Last modified: February 18, 2015