Are You a Legal Professional?

Arizona Computer Crimes Laws

There are various types of criminal activities that fall under the umbrella of "computer crimes" in Arizona. Many people may be familiar with the term "hacking," however, there are computer crimes that are even broader and cover a variety of topics.

Most state laws identify and prohibit a number of offenses collectively called "computer crimes," which include crimes such as hacking into a secure network or damaging a computer system. Arizona computer crime laws include misdemeanor charges as well as felonies, for offenses ranging from unlawful access to a computer (misdemeanor) to using that access to defraud, obtain property, alter, or destroy a computer system or network (felony).

The highlights of Arizona's computer crime laws are listed below. See FindLaw's Cyber Crimes section to learn more about the topic.

Code Section 13-2316
Mental State Required for Prosecution Intentionally, knowingly, recklessly
Misdemeanor Computer Crimes None
Felony Computer Crimes Access; access plus scheme to defraud; computer fraud in the 1st degree, class 3 felony; computer fraud in the 2nd degree, class 5 felony
Attempt Considered a Crime? No
Civil Lawsuit Permitted? No
Definition of computer tampering

A person who acts without authority or who exceeds authorization of use commits computer tampering by:

  1. Accessing, altering, damaging or destroying any computer, computer system or network, or any part of a computer, computer system or network, with the intent to devise or execute any scheme or artifice to defraud or deceive, or to control property or services by means of false or fraudulent pretenses, representations or promises.
  2. Knowingly altering, damaging, deleting or destroying computer programs or data.
  3. Knowingly introducing a computer contaminant into any computer, computer system or network.
  4. Recklessly disrupting or causing the disruption of computer, computer system or network services or denying or causing the denial of computer or network services to any authorized user of a computer, computer system or network.
  5. Recklessly using a computer, computer system or network to engage in a scheme or course of conduct that is directed at another person and that seriously alarms, torments, threatens or terrorizes the person. For the purposes of this paragraph, the conduct must both: (a) Cause a reasonable person to suffer substantial emotional distress. (b) Serve no legitimate purpose
  6. Preventing a computer user from exiting a site, computer system or network-connected location in order to compel the user's computer to continue communicating with, connecting to or displaying the content of the service, site or system.
  7. Knowingly obtaining any information that is required by law to be kept confidential or any records that are not public records by accessing any computer, computer system or network that is operated by this state, a political subdivision of this state, a health care provider as defined in section 12-2291, a clinical laboratory as defined in section 36-451 or a person or entity that provides services on behalf of a health care provider or a clinical laboratory.
  8. Knowingly accessing any computer, computer system or network or any computer software, program or data that is contained in a computer, computer system or network.

Note: State laws are constantly changing -- contact an Arizona criminal defense attorney or conduct your own legal research to verify the state law(s) you are researching.

Arizona Criminal Laws: Related Resources:

Next Step Search and Browse
Contact a qualified attorney.
(e.g., Chicago, IL or 60611)