home *** CD-ROM | disk | FTP | other *** search
-
- ARIZONA REVISED STATUTES ANNOTATED
- COPR. (c) WEST 1989 No Claim to Orig. Govt. Works
- TITLE 13. CRIMINAL CODE
- CHAPTER 23. ORGANIZED CRIME AND FRAUD
-
- s 13-2316. COMPUTER fraud; classification
-
- A. A person commits COMPUTER fraud in the first degree by accessing, altering,
- damaging or destroying without authorization any COMPUTER, COMPUTER system,
- COMPUTER network, or any part of such COMPUTER, system or network, with the
- intent to devise or execute any scheme or artifice to defraud or deceive, or
- control property or services by means of false or fraudulent pretenses,
- representations or promises.
- B. A person commits COMPUTER fraud in the second degree by intentionally and
- without authorization accessing, altering, damaging or destroying any COMPUTER,
- COMPUTER system or COMPUTER network or any COMPUTER software, program or data
- contained in such COMPUTER, COMPUTER system or COMPUTER network.
- C. COMPUTER fraud in the first degree is a class 3 felony. COMPUTER fraud in
- the second degree is a class 6 felony.
-
- 1989 Main Volume Credit(s)
-
- Added by Laws 1978, Ch. 204, s 2, eff. Oct. 1, 1978.
-
- HISTORICAL NOTES
-
- HISTORICAL AND STATUTORY NOTES
-
- 1989 Main Volume Historical and Statutory Notes
-
- For effective date provision of Laws 1978, Ch. 204, see Historical Note
- following s 13-2301.
-
-
- ARIZONA REVISED STATUTES ANNOTATED
- COPR. (c) WEST 1989 No Claim to Orig. Govt. Works
- TITLE 13. CRIMINAL CODE
- CHAPTER 23. ORGANIZED CRIME AND FRAUD
-
- s 13-2301. Definitions
-
- A. For the purposes of ss 13-2302 through 13-2304:
- 1. "Creditor" means any person making such an extension of credit or any
- person claiming by, under, or through any person making such an extension of
- credit.
- 2. "Debtor" means any person to whom such an extension of credit is made or
- any person who guarantees the repayment of an extension of credit, or in any
- manner undertakes to indemnify the creditor against loss resulting from the
- failure of any person to whom an extension is made to repay the same.
- 3. "Extortionate extension of credit" means any extension of credit with
- respect to which it is the understanding of the creditor and the debtor at the
- time such extension is made that delay in making repayment or failure to make
- repayment could result in the use of violence or other criminal means to cause
- harm to the person, reputation or property of any person.
- 4. "Extortionate means" means the use, or an express or implicit threat of
- use, of violence or other criminal means to cause harm to the person,
- reputation or property of any person.
- 5. "Repayment of any extension of credit" means the repayment, satisfaction or
- discharge in whole or in part of any debt or claim, acknowledged or disputed,
- valid or invalid, resulting from or in connection with that extension of
- credit.
- 6. "To collect an extension of credit" means to induce in any way any person
- to make repayment thereof.
- 7. "To extend credit" means to make or renew any loan or to enter into any
- agreement, tacit or express, whereby the repayment or satisfaction of any debt
- or claim, whether acknowledged or disputed, valid or invalid, and however
- arising, may or shall be deferred.
- B. For the purposes of ss 13-2305 through 13-2307:
- 1. "Dealer in property" means a person who buys and sells property as a
- business.
- 2. "Stolen property" means property that has been the subject of any unlawful
- taking.
- 3. "Traffic" means to sell, transfer, distribute, dispense or otherwise
- dispose of stolen property to another person, or to buy, receive, possess or
- obtain control of stolen property, with intent to sell, transfer, distribute,
- dispense or otherwise dispose of to another person.
- C. For the purposes of s 13-2308:
- 1. "Combination" means persons who collaborate in carrying on or furthering
- the activities or purposes of a criminal syndicate even though such persons may
- not know each other's identity or membership in the combination changes from
- time to time or one or more members may stand in a wholesaler-retailer or other
- arm's length relationship with others as to activities or dealings between or
- among themselves in an illicit operation.
- 2. "Criminal syndicate" means any combination of persons or enterprises
- engaging, or having the purpose of engaging, on a continuing basis in conduct
- which violates any one or more provisions of any felony statute of this state.
- D. For the purposes of ss 13-2312 through 13-2315, unless the context
- otherwise requires:
- 1. "Control", in relation to an enterprise, means the possession of sufficient
- means to permit substantial direction over the affairs of an enterprise and, in
- relation to property, means to acquire or possess.
- 2. "Enterprise" means any corporation, partnership, association, labor union,
- or other legal entity or any group of persons associated in fact although not a
- legal entity.
- 3. "Financial institution" means any business under the jurisdiction of the
- state banking department or a banking or securities regulatory agency of the
- United States or business under the jurisdiction of the securities division of
- the corporation commission, the real estate department or the department of
- insurance.
- 4. "Racketeering" means any act, including any preparatory or completed
- offense, committed for financial gain, which is chargeable or indictable under
- the laws of the state in which the act occurred and, if the act occurred in a
- state other than this state, would be chargeable or indictable under the laws
- of this state had the act occurred in this state and punishable by imprisonment
- for more than one year, regardless of whether such act is charged or indicted,
- involving:
- (a) Homicide.
- (b) Robbery.
- (c) Kidnapping.
- (d) Forgery.
- (e) Theft.
- (f) Bribery.
- (g) Gambling.
- (h) Usury.
- (i) Extortion.
- (j) Extortionate extensions of credit.
- (k) Prohibited drugs, marijuana or other prohibited chemicals or substances.
- (l) Trafficking in explosives, weapons or stolen property.
- (m) Leading organized crime.
- (n) Obstructing or hindering criminal investigations or prosecutions.
- (o) Asserting false claims including, but not limited to, false claims
- asserted through fraud or arson.
- (p) False statements or publications concerning land for sale or lease or sale
- of subdivided lands or sale and mortgaging of unsubdivided lands.
- (q) Resale of realty with intent to defraud.
- (r) Fraud in the purchase or sale of securities.
- (s) Sale of unregistered securities or real property securities and
- transactions involving such securities by unregistered dealers or salesmen.
- (t) A scheme or artifice to defraud.
- (u) Obscenity.
- (v) Child pornography.
- (w) Prostitution.
- (x) Restraint of trade or commerce in violation of s 34-252.
- (y) Terrorism.
- (z) Money laundering.
- (aa) Obscene or indecent telephone communications to minors for commercial
- purposes.
- 5. "Records" means any book, paper, writing, record, COMPUTER program or other
- material.
- E. For the purposes of s 13-2316:
- 1. "Access" means to approach, instruct, communicate with, store data in,
- retrieve data from or otherwise make use of any resources of a COMPUTER,
- COMPUTER system or COMPUTER network.
- 2. "COMPUTER" means an electronic device which performs logic, arithmetic or
- memory functions by the manipulations of electronic or magnetic impulses and
- includes all input, output, processing, storage, software or communication
- facilities which are connected or related to such a device in a system or
- network.
- 3. "COMPUTER network" means the interconnection of communication lines with a
- COMPUTER through remote terminals or a complex consisting of two or more
- interconnected COMPUTERS.
- 4. "COMPUTER program" means a series of instructions or statements, in a form
- acceptable to a COMPUTER, which permits the functioning of a COMPUTER system in
- a manner designed to provide appropriate products from such COMPUTER system.
- 5. "COMPUTER software" means a set of COMPUTER programs, procedures and
- associated documentation concerned with the operation of a COMPUTER system.
- 6. "COMPUTER system" means a set of related, connected or unconnected COMPUTER
- equipment, devices and softwares.
- 7. "Financial instrument" means any check, draft, money order, certificate of
- deposit, letter of credit, bill of exchange, credit card or marketable security
- or any other written instrument, as defined by s 13-2001, paragraph 7, which is
- transferable for value.
- 8. "Property" means financial instruments, information, including
- electronically produced data, COMPUTER software and programs in either machine
- or human readable form, and anything of value, tangible or intangible.
- 9. "Services" includes COMPUTER time, data processing and storage functions.
-
- 1989 Main Volume Credit(s)
-
- Added by Laws 1977, Ch. 142, s 82, eff. Oct. 1, 1978. Amended by Laws 1978,
- Ch. 201, s 151, eff. Oct. 1, 1978; Laws 1978, Ch. 204, s 1, eff. Oct. 1,
- 1978; Laws 1980, Ch. 229, s 22, eff. April 23, 1980; Laws 1981, Ch. 102, s
- 1; Laws 1982, Ch. 200, s 1; Laws 1983, Ch. 45, s 1; Laws 1984, Ch. 149, s
- 1; Laws 1985, Ch. 198, s 1; Laws 1985, Ch. 329, s 2; Laws 1987, Ch. 124, s
- 1; Laws 1987, Ch. 307, s 8; Laws 1988, Ch. 34, s 1; Laws 1988, Ch. 150, s 1,
- eff. June 6, 1988.
-
- HISTORICAL NOTES
-
- HISTORICAL AND STATUTORY NOTES
-
- 1989 Main Volume Historical and Statutory Notes
-
- Source:
- Pen.Code 1901, ss 469-472.
- Pen.Code 1913, ss 512-515.
- Rev.Code 1928, ss 4770, 4771.
- Code 1939, ss 43-1901, 43-1902.
- A.R.S. former s 13-401.
-
- Subsec. A, pars. 1 to 7, were adopted from the United States Code; see 18
- U.S.C.A. ss 891 through 894.
-
- Laws 1978, Ch. 204, s 4 provides:
-
- "The provisions of this act shall become effective on October 1, 1978."
-
- Reviser's Notes:
-
- 1978 Note. Prior to the 1980 amendment, this section contained the amendments
- made by Laws 1978, Ch. 201, s 151 and Ch. 204, s 1 which were blended together
- pursuant to authority of s 41-1304.03.
-
- 1985 Note. Pursuant to authority of s 41-1304.02, the spelling of "terrorism"
- in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch. 198, s 1 was
- corrected as a manifest clerical error. Prior to this correction the spelling
- of "terrorism" in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch.
- 329, s 2 was corrected without striking existing language and showing new
- language in capital letters as required by house and senate rules.
-
- 1987 Note. Prior to the 1988 amendments this section contained the amendments
- made by Laws 1987, Ch. 124, s 1 and Ch. 307, s 8 which were blended together
- pursuant to authority of s 41-1304.03.
-
- 1988 Note. This section contains the amendments made by Laws 1988, Ch. 34, s
- 1 and Ch. 150, s 1 which were blended together as shown above pursuant to
- authority of s 41-1304.03.
-
- ARIZONA REVISED STATUTES ANNOTATED
- COPR. (c) WEST 1989 No Claim to Orig. Govt. Works
- TITLE 13. CRIMINAL CODE
- CHAPTER 30. EAVESDROPPING AND COMMUNICATIONS
-
- s 13-3016. Government agency access to contents of stored electronic
- communications; backup preservation; delayed notice; violation;
- classification
-
- A. The provisions of this section apply to electronic communications entrusted
- to a communication service provider or remote computing service solely for the
- purpose of transmission, storage or processing. Electronic communications in
- the possession of a person who is entitled to access the contents of such
- communications for any purpose other than transmission, storage or processing
- are ordinary business records, and may be obtained by subpoena or court order.
- B. An agency of this state or its political subdivisions may require the
- disclosure by a provider of electronic communication services of the contents
- of an electronic communication that has been in electronic storage for one
- hundred eighty days or less only by obtaining a search warrant pursuant to
- chapter 38 of this title. [FN1MV]
- C. An agency of this state or its political subdivisions may require the
- disclosure by a provider of electronic communication services of the contents
- of an electronic communication that has been in electronic storage for more
- than one hundred eighty days:
- 1. Without notice to the subscriber or customer, by obtaining a search warrant
- issued pursuant to chapter 38 of this title.
- 2. With prior notice to the subscriber or customer, by subpoena, except that
- such notice may be delayed pursuant to subsection E. [FN2MV]
- 3. With prior notice to the subscriber or customer if the agency obtains a
- court order on application and certification to the court that the information
- likely to be obtained is relevant to a legitimate law enforcement inquiry,
- except that such notice may be delayed pursuant to subsection E. [FN2MV]
- D. An agency of this state or its political subdivisions may require a
- provider of remote computing services to disclose the contents of any
- electronic communication that is held or maintained on that service on behalf
- of a subscriber or customer of the remote computing service solely for the
- purpose of providing storage or COMPUTER processing services to the subscriber
- or customer:
- 1. Without notice to the subscriber or customer, by obtaining a search warrant
- issued pursuant to chapter 38 of this title.
- 2. With prior notice to the subscriber or customer, by subpoena, except that
- such notice may be delayed pursuant to subsection E. [FN2MV]
- 3. With prior notice to the subscriber or customer if the agency obtains a
- court order on application and certification to the court that the information
- likely to be obtained is relevant to a legitimate law enforcement inquiry,
- except that such notice may be delayed pursuant to subsection E. [FN2MV]
- E. An agency acting pursuant to this section may include in its subpoena or
- court order a requirement that the service provider to whom the request is
- directed create a backup copy of the contents of the electronic communications
- sought in order to preserve those communications:
- 1. Without notifying the subscriber or customer, the provider shall:
- (a) Create the backup copy as soon as practicable but in no event no later
- than two business days after receipt of the subpoena or order.
- (b) Confirm to the requesting agency that the backup copy has been made.
- (c) Promptly deliver the backup copy to the court issuing the subpoena or
- order.
- 2. The court shall seal and retain the backup copy or make such other
- provision as it deems necessary to ensure that the backup copy is preserved
- until resolution of any proceedings pursuant to this section.
- 3. Within three days after receipt of confirmation, the agency shall notify
- the subscriber or customer of the creation of the backup copy, except that
- notice may be delayed pursuant to this subsection.
- 4. Within fourteen days after notice by the agency, the subscriber or customer
- may challenge the agency's request by filing an application to quash the
- subpoena or vacate the court order and serving the requesting agency.
- 5. If after response by the agency and such further proceedings as the court
- may deem necessary, the court finds that the applicant is not the subscriber or
- customer for whom the communications sought by the agency are maintained by the
- provider, or that there is reason to believe that the communications sought are
- relevant to a legitimate law enforcement inquiry, the court shall deny the
- application and deliver the backup copy to the requesting agency. If the court
- finds that the applicant is the subscriber or customer for whom the
- communications sought by the agency are maintained, and that there is no reason
- to believe the communications sought are relevant to a legitimate law
- enforcement inquiry, the court shall grant the application and order the backup
- copy to be destroyed.
- 6. The court shall release the backup copy to the requesting agency no sooner
- than fourteen days after the agency's notice to the subscriber or customer if
- the subscriber or customer has not filed a challenge to the subpoena or court
- order.
- 7. The court shall not destroy the backup copy until the information requested
- is delivered or until the resolution of any proceedings arising from a
- challenge to the subpoena or order.
- F. Notice to the subscriber or customer required by this section may be
- delayed for a period of not to exceed ninety days under any of the following
- circumstances:
- 1. If the applicant for a search warrant or court order pursuant to this
- section requests a delay of notification and the court finds that such delay is
- necessary to protect the safety of any person or to prevent flight from
- prosecution, tampering with evidence, intimidation of witnesses or jeopardizing
- an investigation.
- 2. If the investigator or prosecuting attorney proceeding by subpoena executes
- a written certification that there is reason to believe that notice to the
- subscriber or customer may result in danger to the safety of any person, flight
- from prosecution, tampering with evidence, intimidation of witnesses or
- jeopardizing an investigation. The agency shall retain a true copy of the
- certification.
- 3. If further delay of notification is necessary, extensions of up to ninety
- days each may be obtained by application to the court or certification pursuant
- to paragraphs 1 and 2 of this subsection.
- 4. Any agency acting pursuant to this section may apply for a court order
- directing the communication or computing service provider not to notify any
- other person of the existence of the subpoena, court order or warrant for such
- period as the court deems appropriate. The court shall grant the application
- if it finds that there is reason to believe that notice may cause an adverse
- result described in paragraphs 1 and 2 of this subsection. A person who
- violates an order issued pursuant to this subsection is guilty of a class 1
- misdemeanor.
- 5. On the expiration of any period of delay under this section, the agency
- shall deliver to the subscriber or customer a copy of the process used and
- notice including:
- (a) That information was requested from the service provider.
- (b) The date on which the information was requested.
- (c) That notification to the subscriber or customer was delayed.
- (d) The identity of the court or agency ordering or certifying the delay.
- (e) The provision of this section by which delay was obtained.
- (f) That any challenge to the subpoena or order must be filed within fourteen
- days.
-
- 1989 Main Volume Credit(s)
-
- Added by Laws 1988, Ch. 149, s 13.
-
- [FN1MV] Section 13-3801 et seq.
-
- [FN2MV] So in original, probably should read "F".
-
- HISTORICAL NOTES
-
- HISTORICAL AND STATUTORY NOTES
-
- 1989 Main Volume Historical and Statutory Notes
-
- 1988 Reviser's Note:
-
- Pursuant to authority of s 41-1304.02, in subsection D, paragraph 3 the
- spelling of "relevant" was corrected.
-
-