TUCoPS :: Cyber Law :: arizona.txt

Arizona Computer Crime Law


                       ARIZONA REVISED STATUTES ANNOTATED
               COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                            TITLE 13.  CRIMINAL CODE
                     CHAPTER 23.  ORGANIZED CRIME AND FRAUD

 s 13-2316. COMPUTER fraud;  classification

  A. A person commits COMPUTER fraud in the first degree by accessing, altering,
 damaging or destroying without authorization any COMPUTER, COMPUTER system,
 COMPUTER network, or any part of such COMPUTER, system or network, with the
 intent to devise or execute any scheme or artifice to defraud or deceive, or
 control property or services by means of false or fraudulent pretenses,
 representations or promises.
  B. A person commits COMPUTER fraud in the second degree by intentionally and
 without authorization accessing, altering, damaging or destroying any COMPUTER,
 COMPUTER system or COMPUTER network or any COMPUTER software, program or data
 contained in such COMPUTER, COMPUTER system or COMPUTER network.
  C. COMPUTER fraud in the first degree is a class 3 felony.  COMPUTER fraud in
 the second degree is a class 6 felony.

                           1989 Main Volume Credit(s)

 Added by Laws 1978, Ch. 204, s 2, eff. Oct. 1, 1978.

                                HISTORICAL NOTES

                         HISTORICAL AND STATUTORY NOTES

                 1989 Main Volume Historical and Statutory Notes

  For effective date provision of Laws 1978, Ch. 204, see Historical Note
 following s 13-2301.


                       ARIZONA REVISED STATUTES ANNOTATED
               COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                            TITLE 13.  CRIMINAL CODE
                     CHAPTER 23.  ORGANIZED CRIME AND FRAUD

 s 13-2301. Definitions

  A. For the purposes of ss 13-2302 through 13-2304:
  1. "Creditor" means any person making such an extension of credit or any
 person claiming by, under, or through any person making such an extension of
 credit.
  2. "Debtor" means any person to whom such an extension of credit is made or
 any person who guarantees the repayment of an extension of credit, or in any
 manner undertakes to indemnify the creditor against loss resulting from the
 failure of any person to whom an extension is made to repay the same.
  3. "Extortionate extension of credit" means any extension of credit with
 respect to which it is the understanding of the creditor and the debtor at the
 time such extension is made that delay in making repayment or failure to make
 repayment could result in the use of violence or other criminal means to cause
 harm to the person, reputation or property of any person.
  4. "Extortionate means" means the use, or an express or implicit threat of
 use, of violence or other criminal means to cause harm to the person,
 reputation or property of any person.
  5. "Repayment of any extension of credit" means the repayment, satisfaction or
 discharge in whole or in part of any debt or claim, acknowledged or disputed,
 valid or invalid, resulting from or in connection with that extension of
 credit.
  6. "To collect an extension of credit" means to induce in any way any person
 to make repayment thereof.
  7. "To extend credit" means to make or renew any loan or to enter into any
 agreement, tacit or express, whereby the repayment or satisfaction of any debt
 or claim, whether acknowledged or disputed, valid or invalid, and however
 arising, may or shall be deferred.
  B. For the purposes of ss 13-2305 through 13-2307:
  1. "Dealer in property" means a person who buys and sells property as a
 business.
  2. "Stolen property" means property that has been the subject of any unlawful
 taking.
  3. "Traffic" means to sell, transfer, distribute, dispense or otherwise
 dispose of stolen property to another person, or to buy, receive, possess or
 obtain control of stolen property, with intent to sell, transfer, distribute,
 dispense or otherwise dispose of to another person.
  C. For the purposes of s 13-2308:
  1. "Combination" means persons who collaborate in carrying on or furthering
 the activities or purposes of a criminal syndicate even though such persons may
 not know each other's identity or membership in the combination changes from
 time to time or one or more members may stand in a wholesaler-retailer or other
 arm's length relationship with others as to activities or dealings between or
 among themselves in an illicit operation.
  2. "Criminal syndicate" means any combination of persons or enterprises
 engaging, or having the purpose of engaging, on a continuing basis in conduct
 which violates any one or more provisions of any felony statute of this state.
  D. For the purposes of ss 13-2312 through 13-2315, unless the context
 otherwise requires:
  1. "Control", in relation to an enterprise, means the possession of sufficient
 means to permit substantial direction over the affairs of an enterprise and, in
 relation to property, means to acquire or possess.
  2. "Enterprise" means any corporation, partnership, association, labor union,
 or other legal entity or any group of persons associated in fact although not a
 legal entity.
  3. "Financial institution" means any business under the jurisdiction of the
 state banking department or a banking or securities regulatory agency of the
 United States or business under the jurisdiction of the securities division of
 the corporation commission, the real estate department or the department of
 insurance.
  4. "Racketeering" means any act, including any preparatory or completed
 offense, committed for financial gain, which is chargeable or indictable under
 the laws of the state in which the act occurred and, if the act occurred in a
 state other than this state, would be chargeable or indictable under the laws
 of this state had the act occurred in this state and punishable by imprisonment
 for more than one year, regardless of whether such act is charged or indicted,
 involving:
  (a) Homicide.
  (b) Robbery.
  (c) Kidnapping.
  (d) Forgery.
  (e) Theft.
  (f) Bribery.
  (g) Gambling.
  (h) Usury.
  (i) Extortion.
  (j) Extortionate extensions of credit.
  (k) Prohibited drugs, marijuana or other prohibited chemicals or substances.
  (l) Trafficking in explosives, weapons or stolen property.
  (m) Leading organized crime.
  (n) Obstructing or hindering criminal investigations or prosecutions.
  (o) Asserting false claims including, but not limited to, false claims
 asserted through fraud or arson.
  (p) False statements or publications concerning land for sale or lease or sale
 of subdivided lands or sale and mortgaging of unsubdivided lands.
  (q) Resale of realty with intent to defraud.
  (r) Fraud in the purchase or sale of securities.
  (s) Sale of unregistered securities or real property securities and
 transactions involving such securities by unregistered dealers or salesmen.
  (t) A scheme or artifice to defraud.
  (u) Obscenity.
  (v) Child pornography.
  (w) Prostitution.
  (x) Restraint of trade or commerce in violation of s 34-252.
  (y) Terrorism.
  (z) Money laundering.
  (aa) Obscene or indecent telephone communications to minors for commercial
 purposes.
  5. "Records" means any book, paper, writing, record, COMPUTER program or other
 material.
  E. For the purposes of s 13-2316:
  1. "Access" means to approach, instruct, communicate with, store data in,
 retrieve data from or otherwise make use of any resources of a COMPUTER,
 COMPUTER system or COMPUTER network.
  2. "COMPUTER" means an electronic device which performs logic, arithmetic or
 memory functions by the manipulations of electronic or magnetic impulses and
 includes all input, output, processing, storage, software or communication
 facilities which are connected or related to such a device in a system or
 network.
  3. "COMPUTER network" means the interconnection of communication lines with a
 COMPUTER through remote terminals or a complex consisting of two or more
 interconnected COMPUTERS.
  4. "COMPUTER program" means a series of instructions or statements, in a form
 acceptable to a COMPUTER, which permits the functioning of a COMPUTER system in
 a manner designed to provide appropriate products from such COMPUTER system.
  5. "COMPUTER software" means a set of COMPUTER programs, procedures and
 associated documentation concerned with the operation of a COMPUTER system.
  6. "COMPUTER system" means a set of related, connected or unconnected COMPUTER
 equipment, devices and softwares.
  7. "Financial instrument" means any check, draft, money order, certificate of
 deposit, letter of credit, bill of exchange, credit card or marketable security
 or any other written instrument, as defined by s 13-2001, paragraph 7, which is
 transferable for value.
  8. "Property" means financial instruments, information, including
 electronically produced data, COMPUTER software and programs in either machine
 or human readable form, and anything of value, tangible or intangible.
  9. "Services" includes COMPUTER time, data processing and storage functions.

                           1989 Main Volume Credit(s)

 Added by Laws 1977, Ch. 142, s 82, eff. Oct. 1, 1978.  Amended by Laws 1978,
 Ch. 201, s 151, eff. Oct. 1, 1978;  Laws 1978, Ch. 204, s 1, eff. Oct. 1,
 1978;  Laws 1980, Ch. 229, s 22, eff. April 23, 1980;  Laws 1981, Ch. 102, s
 1;  Laws 1982, Ch. 200, s 1;  Laws 1983, Ch. 45, s 1;  Laws 1984, Ch. 149, s
 1;  Laws 1985, Ch. 198, s 1;  Laws 1985, Ch. 329, s 2;  Laws 1987, Ch. 124, s
 1;  Laws 1987, Ch. 307, s 8;  Laws 1988, Ch. 34, s 1;  Laws 1988, Ch. 150, s 1,
 eff. June 6, 1988.

                                HISTORICAL NOTES

                         HISTORICAL AND STATUTORY NOTES

                 1989 Main Volume Historical and Statutory Notes

 Source:
  Pen.Code 1901, ss 469-472.
  Pen.Code 1913, ss 512-515.
  Rev.Code 1928, ss 4770, 4771.
  Code 1939, ss 43-1901, 43-1902.
  A.R.S. former s 13-401.

  Subsec. A, pars. 1 to 7, were adopted from the United States Code;  see 18
 U.S.C.A. ss 891 through 894.

  Laws 1978, Ch. 204, s 4 provides:

  "The provisions of this act shall become effective on October 1, 1978."

 Reviser's Notes:

  1978 Note.  Prior to the 1980 amendment, this section contained the amendments
 made by Laws 1978, Ch. 201, s 151 and Ch. 204, s 1 which were blended together
 pursuant to authority of s 41-1304.03.

  1985 Note.  Pursuant to authority of s 41-1304.02, the spelling of "terrorism"
 in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch. 198, s 1 was
 corrected as a manifest clerical error.  Prior to this correction the spelling
 of "terrorism" in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch.
 329, s 2 was corrected without striking existing language and showing new
 language in capital letters as required by house and senate rules.

  1987 Note.  Prior to the 1988 amendments this section contained the amendments
 made by Laws 1987, Ch. 124, s 1 and Ch. 307, s 8 which were blended together
 pursuant to authority of s 41-1304.03.

  1988 Note.  This section contains the amendments made by Laws 1988, Ch. 34, s
 1 and Ch. 150, s 1 which were blended together as shown above pursuant to
 authority of s 41-1304.03.

                       ARIZONA REVISED STATUTES ANNOTATED
               COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                            TITLE 13.  CRIMINAL CODE
                  CHAPTER 30.  EAVESDROPPING AND COMMUNICATIONS

 s 13-3016. Government agency access to contents of stored electronic
   communications;  backup preservation;  delayed notice;  violation;
   classification

  A. The provisions of this section apply to electronic communications entrusted
 to a communication service provider or remote computing service solely for the
 purpose of transmission, storage or processing.  Electronic communications in
 the possession of a person who is entitled to access the contents of such
 communications for any purpose other than transmission, storage or processing
 are ordinary business records, and may be obtained by subpoena or court order.
  B. An agency of this state or its political subdivisions may require the
 disclosure by a provider of electronic communication services of the contents
 of an electronic communication that has been in electronic storage for one
 hundred eighty days or less only by obtaining a search warrant pursuant to
 chapter 38 of this title. [FN1MV]
  C. An agency of this state or its political subdivisions may require the
 disclosure by a provider of electronic communication services of the contents
 of an electronic communication that has been in electronic storage for more
 than one hundred eighty days:
  1. Without notice to the subscriber or customer, by obtaining a search warrant
 issued pursuant to chapter 38 of this title.
  2. With prior notice to the subscriber or customer, by subpoena, except that
 such notice may be delayed pursuant to subsection E. [FN2MV]
  3. With prior notice to the subscriber or customer if the agency obtains a
 court order on application and certification to the court that the information
 likely to be obtained is relevant to a legitimate law enforcement inquiry,
 except that such notice may be delayed pursuant to subsection E. [FN2MV]
  D. An agency of this state or its political subdivisions may require a
 provider of remote computing services to disclose the contents of any
 electronic communication that is held or maintained on that service on behalf
 of a subscriber or customer of the remote computing service solely for the
 purpose of providing storage or COMPUTER processing services to the subscriber
 or customer:
  1. Without notice to the subscriber or customer, by obtaining a search warrant
 issued pursuant to chapter 38 of this title.
  2. With prior notice to the subscriber or customer, by subpoena, except that
 such notice may be delayed pursuant to subsection E. [FN2MV]
  3. With prior notice to the subscriber or customer if the agency obtains a
 court order on application and certification to the court that the information
 likely to be obtained is relevant to a legitimate law enforcement inquiry,
 except that such notice may be delayed pursuant to subsection E. [FN2MV]
  E. An agency acting pursuant to this section may include in its subpoena or
 court order a requirement that the service provider to whom the request is
 directed create a backup copy of the contents of the electronic communications
 sought in order to preserve those communications:
  1. Without notifying the subscriber or customer, the provider shall:
  (a) Create the backup copy as soon as practicable but in no event no later
 than two business days after receipt of the subpoena or order.
  (b) Confirm to the requesting agency that the backup copy has been made.
  (c) Promptly deliver the backup copy to the court issuing the subpoena or
 order.
  2. The court shall seal and retain the backup copy or make such other
 provision as it deems necessary to ensure that the backup copy is preserved
 until resolution of any proceedings pursuant to this section.
  3. Within three days after receipt of confirmation, the agency shall notify
 the subscriber or customer of the creation of the backup copy, except that
 notice may be delayed pursuant to this subsection.
  4. Within fourteen days after notice by the agency, the subscriber or customer
 may challenge the agency's request by filing an application to quash the
 subpoena or vacate the court order and serving the requesting agency.
  5. If after response by the agency and such further proceedings as the court
 may deem necessary, the court finds that the applicant is not the subscriber or
 customer for whom the communications sought by the agency are maintained by the
 provider, or that there is reason to believe that the communications sought are
 relevant to a legitimate law enforcement inquiry, the court shall deny the
 application and deliver the backup copy to the requesting agency.  If the court
 finds that the applicant is the subscriber or customer for whom the
 communications sought by the agency are maintained, and that there is no reason
 to believe the communications sought are relevant to a legitimate law
 enforcement inquiry, the court shall grant the application and order the backup
 copy to be destroyed.
  6. The court shall release the backup copy to the requesting agency no sooner
 than fourteen days after the agency's notice to the subscriber or customer if
 the subscriber or customer has not filed a challenge to the subpoena or court
 order.
  7. The court shall not destroy the backup copy until the information requested
 is delivered or until the resolution of any proceedings arising from a
 challenge to the subpoena or order.
  F. Notice to the subscriber or customer required by this section may be
 delayed for a period of not to exceed ninety days under any of the following
 circumstances:
  1. If the applicant for a search warrant or court order pursuant to this
 section requests a delay of notification and the court finds that such delay is
 necessary to protect the safety of any person or to prevent flight from
 prosecution, tampering with evidence, intimidation of witnesses or jeopardizing
 an investigation.
  2. If the investigator or prosecuting attorney proceeding by subpoena executes
 a written certification that there is reason to believe that notice to the
 subscriber or customer may result in danger to the safety of any person, flight
 from prosecution, tampering with evidence, intimidation of witnesses or
 jeopardizing an investigation.  The agency shall retain a true copy of the
 certification.
  3. If further delay of notification is necessary, extensions of up to ninety
 days each may be obtained by application to the court or certification pursuant
 to paragraphs 1 and 2 of this subsection.
  4. Any agency acting pursuant to this section may apply for a court order
 directing the communication or computing service provider not to notify any
 other person of the existence of the subpoena, court order or warrant for such
 period as the court deems appropriate.  The court shall grant the application
 if it finds that there is reason to believe that notice may cause an adverse
 result described in paragraphs 1 and 2 of this subsection.  A person who
 violates an order issued pursuant to this subsection is guilty of a class 1
 misdemeanor.
  5. On the expiration of any period of delay under this section, the agency
 shall deliver to the subscriber or customer a copy of the process used and
 notice including:
  (a) That information was requested from the service provider.
  (b) The date on which the information was requested.
  (c) That notification to the subscriber or customer was delayed.
  (d) The identity of the court or agency ordering or certifying the delay.
  (e) The provision of this section by which delay was obtained.
  (f) That any challenge to the subpoena or order must be filed within fourteen
 days.

                           1989 Main Volume Credit(s)

 Added by Laws 1988, Ch. 149, s 13.

  [FN1MV] Section 13-3801 et seq.

  [FN2MV] So in original, probably should read "F".

                                HISTORICAL NOTES

                         HISTORICAL AND STATUTORY NOTES

                 1989 Main Volume Historical and Statutory Notes

 1988 Reviser's Note:

  Pursuant to authority of s 41-1304.02, in subsection D, paragraph 3 the
 spelling of "relevant" was corrected.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH