Understanding Computer Tampering In Arizona: ARS 13-2316
Facing computer tampering charges in Arizona can be overwhelming. The legal system can feel complex and intimidating. Lawyer Listed provides clear information on the specifics of the charge and the potential penalties, helping you navigate each step of the process.
This guide provides an in-depth examination of Arizona’s computer tampering laws, offering detailed explanations of key legal terminology, sentencing frameworks, and the broader implications of the charge.
Remember, this information is for educational purposes only and is not a substitute for legal advice from an experienced Arizona white collar crimes attorney. If you are charged with computer tampering, let Lawyer Listed match you with your ideal white collar crimes lawyer as soon as possible.
What Is Computer Tampering in Arizona?

Arizona’s computer tampering law covers a broad range of illegal activities involving computer systems and networks. In general, the law defines computer tampering as knowingly accessing, altering, damaging, deleting, or destroying a computer, computer program, computer system, or network without authorization.
Types of Computer Tampering
Unauthorized Access
Unauthorized access means entering a computer, computer system, or network without the owner’s permission. Unauthorized access itself is unlawful, even if you do not damage files, steal data, or cause any disruption. Simply gaining entry without authorization is enough to violate the statute. This can occur in many ways, from guessing a password to using advanced hacking tools or techniques.
Data Alteration
Data alteration means changing, manipulating, or corrupting information stored in a computer system or network. Alteration can include deleting files, modifying records, or otherwise interfering with data in a way that compromises its accuracy or integrity. Even small changes—such as adjusting a single number in a financial record or deleting one file—can result in criminal charges.
System Damage
System damage means deliberately causing harm to a computer system or network by introducing a computer contaminant. This can include spreading malware or viruses, disabling security protections, or physically damaging equipment. Importantly, damage does not require physical destruction. Causing a system to malfunction, shut down, or operate improperly is enough to qualify as system damage under Arizona law.
Fraudulent Schemes
Fraudulent schemes involve using a computer, system, or network to deceive others for personal gain. The intent to defraud is the critical element. Prosecutors must show that you acted with the purpose of tricking or misleading someone—whether through identity theft, financial fraud, credit card fraud, or other dishonest activities. Fraudulent conduct often includes stealing personal information, creating fake accounts, or persuading people to hand over money or access to their accounts.
Denial of Service (DoS) Attacks
A denial of service (DoS) attack involves intentionally disrupting or blocking authorized users from accessing a computer system or network. The disruption itself is unlawful under Arizona law, even if no files are stolen or permanently damaged.
Obtaining Confidential Information
Accessing or taking information that is legally protected from unauthorized use is a crime under Arizona law. The act itself is unlawful even if the information is never used, and simply viewing or obtaining protected information without authorization is enough to result in criminal charges. Protected information includes medical records, financial data, Social Security numbers, passwords, trade secrets, and other sensitive personal or business details.
Key Concepts of Computer Tampering
Mental States
- Intentionally / With intent to: Acting with the objective of causing a specific result or engaging in particular conduct. In plain terms, you meant to do it.
- Knowingly: Being aware of your actions or the circumstances that make up the offense. You don’t need to know the conduct is illegal, only that you are conscious of what you are doing.
- Recklessly: Recognizing a significant and unjustifiable risk but deliberately ignoring it. This disregard must be a substantial departure from how a reasonable person would act in the same situation.
Computer-Related Terms
- Computer: An electronic device that performs logic, arithmetic, or memory functions through electronic or magnetic impulses. This includes all input, output, processing, storage, software, or communication facilities connected to the device in a system or network.
- Access: To instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or network.
- Computer contaminant: A set of instructions designed to modify, damage, destroy, record, or transmit information within a computer, system, or network without the owner’s consent. This includes self‑replicating or self‑propagating code such as viruses or worms that contaminate programs or data, consume resources, or disrupt normal operations.
- Computer program: A series of instructions or statements, in a form a computer can accept, that allow the system to function and produce results.
- Computer software: A set of computer programs, procedures, and related documentation concerned with operating a computer system.
- Computer system: A set of related, connected, or unconnected computer equipment, devices, and software, including storage media and peripheral devices.
- Critical infrastructure resource: Any computer or communications system or network that provides services necessary to protect public health, safety, or welfare.
- Network: A complex of interconnected computer or communication systems of any type.
- Services: Computer time, data processing, storage functions, and all types of communication functions.
Arizona Statute of Limitations for Computer Tampering
The statute of limitations is the deadline for prosecutors to file criminal charges after an alleged offense. As a felony offense, prosecutors have up to seven years from the date of the alleged offense to bring computer tampering charges.
Sentencing for Computer Tampering

The penalties for computer tampering in Arizona are substantial and can have long‑lasting consequences, with sentences varying significantly based on your prior criminal history and the circumstances surrounding the crime. Understanding these potential consequences is essential to making informed decisions about your defense strategy.
Crime Classification
- Class 2 felony: Tampering with critical infrastructure resources.
- Class 3 felony: Computer tampering that involves a fraudulent scheme or intent to deceive others.
- Class 4 felony: Computer tampering that involves major data destruction, significant denial of service attacks, or particularly sensitive computer systems.
- Class 5 felony: Using a computer to alarm, threaten, or harass another person.
- Class 6 felony: Gaining unauthorized access to a system without causing significant damage or disruption.
Penalties for Computer Tampering
The following table provides a comprehensive overview of the potential sentences for each computer tampering offense:
Offense | Charge | Prison | Probation (max) |
---|---|---|---|
Targeting critical infrastructure | Class 2 felony | 3 – 12.5 years | 7 years |
Fraudulent intent | Class 3 felony | 2 – 8.75 years | 5 years |
Significant system disruption | Class 4 felony | 1 – 3.75 years | 4 years |
Threats and harassment | Class 5 felony | 6 months – 2.5 years | 3 years |
Unauthorized access | Class 6 felony | 4 months – 2 years | 3 years |
Frequently Asked Questions (FAQs)

A: A critical infrastructure resource is any computer or communications system that provides services essential to public health, safety, or welfare. These are the systems communities rely on for basic services and security. Examples include electrical power grids that supply homes and businesses, water treatment facilities that ensure safe drinking water, emergency communication networks used by police and firefighters, and transportation systems that move people and goods.
A: Yes. This law makes it a crime to recklessly use a computer, computer system, or network to carry out a scheme or ongoing behavior that is directed at another person and that seriously alarms, torments, threatens, or terrorizes them. For the conduct to qualify as criminal, it must both cause a reasonable person to suffer substantial emotional distress and serve no legitimate purpose.
A: Unauthorized access means entering a computer system or network without permission. It can happen in many ways, from something as simple as guessing a password to using advanced hacking tools. What matters is that you did not have authorization. Even if you cause no damage, steal no data, and only intended to “look around,” accessing a system without permission is still a crime and can result in computer tampering charges in Arizona.
A: System damage means deliberately causing harm or disruption to a computer system or network. This can include introducing malware or viruses that corrupt files, disabling security protections that safeguard the system, overwhelming a system with traffic to make it crash or become unavailable, or physically damaging hardware such as servers or other equipment.
A: In Arizona, prosecutors have seven years to initiate criminal charges for computer tampering under ARS 13‑2316. This means that if more than seven years have passed since the alleged offense, the State is typically prohibited from bringing charges.
A: Yes. Under ARS 13‑2316, unauthorized access by itself is a crime. You do not need to delete files, steal information, or damage anything for prosecutors to bring charges. Unauthorized access violates the security and privacy of computer systems. Even if you only “looked around” or accessed a system out of curiosity, you can still face criminal charges.
A: To find the right lawyer for your case, follow these steps: schedule consultations, verify they are licensed and in good standing with the bar, research their experience, check their specialization, consult with other lawyers about their reputation, read client reviews, and ensure you feel comfortable with them.
Don’t worry if this seems overwhelming; Lawyer Listed has already done the work for you and is ready to match you with an elite lawyer tailored to your needs and your case.
Key Takeaways:

- Definition: Arizona Revised Statutes ARS 13-2316 defines computer tampering as a wide range of illegal activities. These include unauthorized access to systems, altering data, damaging networks, destroying information, and using computers to commit other crimes. The law covers everything from simple unauthorized access to sophisticated hacking operations.
- Specific Actions: Several specific actions can lead to computer tampering Arizona charges. These include unauthorized access to computer systems, data alteration or manipulation, system damage through malware or other means, fraudulent schemes using computers, denial of service attacks that disrupt access to systems, and obtaining confidential information without authorization. Each of these actions is treated seriously under Arizona law.
- Sentencing:
- Targeting critical infrastructure: Classified as a Class 2 felony with a potential prison sentence ranging from 3 to 12.5 years and/or up to 7 years of probation.
- Fraudulent intent: Classified as a Class 3 felony with a potential prison sentence ranging from 2 to 8.75 years and/or up to 5 years of probation.
- Significant system disruption: Classified as a Class 4 felony with a potential prison sentence ranging from 1 to 3.75 years and/or up to 4 years of probation.
- Threats and harassment: Classified as a Class 5 felony with a potential prison sentence ranging from 6 months to 2.5 years and/or up to 3 years of probation.
- Unauthorized access: Classified as a Class 6 felony with a potential prison sentence ranging from 4 months to 2 years and/or up to 3 years of probation.
- Statute of limitations: The statute of limitations for computer tampering in Arizona is 7 years from the date of the alleged offense.
Next Steps:

Computer tampering in Arizona is a serious criminal allegation with consequences that can affect the rest of your life. Outcomes depend on many factors. Lawyer Listed meets you where you are and helps you understand the law and your rights.
If you’re facing charges for computer tampering, engaging a skilled white collar crimes attorney is important to protect your rights and manage the process. Don’t try navigating the legal system alone; match with your ideal lawyer at LawyerListed.com and get an experienced criminal defense attorney on your side right away.