Understanding Computer Tampering In Arizona: ARS 13-2316

Facing computer tampering charges in Arizona can be overwhelming. The legal system can feel complex and intimidating. Lawyer Listed provides clear information on the specifics of the charge and the potential penalties, helping you navigate each step of the process. 

This guide provides an in-depth examination of Arizona’s computer tampering laws, offering detailed explanations of key legal terminology, sentencing frameworks, and the broader implications of the charge. 

Remember, this information is for educational purposes only and is not a substitute for legal advice from an experienced Arizona white collar crimes attorney. If you are charged with computer tampering, let Lawyer Listed match you with your ideal white collar crimes lawyer as soon as possible.

What Is Computer Tampering in Arizona?

Computer Tampering Arizona ARS 13-2316

Arizona’s computer tampering law covers a broad range of illegal activities involving computer systems and networks. In general, the law defines computer tampering as knowingly accessing, altering, damaging, deleting, or destroying a computer, computer program, computer system, or network without authorization.

Types of Computer Tampering

Unauthorized Access

Unauthorized access means entering a computer, computer system, or network without the owner’s permission. Unauthorized access itself is unlawful, even if you do not damage files, steal data, or cause any disruption. Simply gaining entry without authorization is enough to violate the statute. This can occur in many ways, from guessing a password to using advanced hacking tools or techniques.

Data Alteration

Data alteration means changing, manipulating, or corrupting information stored in a computer system or network. Alteration can include deleting files, modifying records, or otherwise interfering with data in a way that compromises its accuracy or integrity. Even small changes—such as adjusting a single number in a financial record or deleting one file—can result in criminal charges.

System Damage

System damage means deliberately causing harm to a computer system or network by introducing a computer contaminant. This can include spreading malware or viruses, disabling security protections, or physically damaging equipment. Importantly, damage does not require physical destruction. Causing a system to malfunction, shut down, or operate improperly is enough to qualify as system damage under Arizona law.

Fraudulent Schemes

Fraudulent schemes involve using a computer, system, or network to deceive others for personal gain. The intent to defraud is the critical element. Prosecutors must show that you acted with the purpose of tricking or misleading someone—whether through identity theft, financial fraud, credit card fraud, or other dishonest activities. Fraudulent conduct often includes stealing personal information, creating fake accounts, or persuading people to hand over money or access to their accounts.

Denial of Service (DoS) Attacks

A denial of service (DoS) attack involves intentionally disrupting or blocking authorized users from accessing a computer system or network. The disruption itself is unlawful under Arizona law, even if no files are stolen or permanently damaged. 

Obtaining Confidential Information

Accessing or taking information that is legally protected from unauthorized use is a crime under Arizona law. The act itself is unlawful even if the information is never used, and simply viewing or obtaining protected information without authorization is enough to result in criminal charges. Protected information includes medical records, financial data, Social Security numbers, passwords, trade secrets, and other sensitive personal or business details.

Key Concepts of Computer Tampering

Mental States

  • Intentionally / With intent to: Acting with the objective of causing a specific result or engaging in particular conduct. In plain terms, you meant to do it.
  • Knowingly: Being aware of your actions or the circumstances that make up the offense. You don’t need to know the conduct is illegal, only that you are conscious of what you are doing.
  • Recklessly: Recognizing a significant and unjustifiable risk but deliberately ignoring it. This disregard must be a substantial departure from how a reasonable person would act in the same situation.

Computer-Related Terms

  • Computer: An electronic device that performs logic, arithmetic, or memory functions through electronic or magnetic impulses. This includes all input, output, processing, storage, software, or communication facilities connected to the device in a system or network.
  • Access: To instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or network.
  • Computer contaminant: A set of instructions designed to modify, damage, destroy, record, or transmit information within a computer, system, or network without the owner’s consent. This includes selfreplicating or selfpropagating code such as viruses or worms that contaminate programs or data, consume resources, or disrupt normal operations.
  • Computer program: A series of instructions or statements, in a form a computer can accept, that allow the system to function and produce results.
  • Computer software: A set of computer programs, procedures, and related documentation concerned with operating a computer system.
  • Computer system: A set of related, connected, or unconnected computer equipment, devices, and software, including storage media and peripheral devices.
  • Critical infrastructure resource: Any computer or communications system or network that provides services necessary to protect public health, safety, or welfare.
  • Network: A complex of interconnected computer or communication systems of any type.
  • Services: Computer time, data processing, storage functions, and all types of communication functions.

Arizona Statute of Limitations for Computer Tampering

The statute of limitations is the deadline for prosecutors to file criminal charges after an alleged offense. As a felony offense, prosecutors have up to seven years from the date of the alleged offense to bring computer tampering charges. 

Sentencing for Computer Tampering

Sentencing Under Arizona Laws Lawyer Listed

The penalties for computer tampering in Arizona are substantial and can have longlasting consequences, with sentences varying significantly based on your prior criminal history and the circumstances surrounding the crime. Understanding these potential consequences is essential to making informed decisions about your defense strategy.

Crime Classification

  • Class 2 felony: Tampering with critical infrastructure resources.
  • Class 3 felony: Computer tampering that involves a fraudulent scheme or intent to deceive others. 
  •  Class 4 felony: Computer tampering that involves major data destruction, significant denial of service attacks, or particularly sensitive computer systems.
  • Class 5 felony: Using a computer to alarm, threaten, or harass another person. 
  • Class 6 felony: Gaining unauthorized access to a system without causing significant damage or disruption.

Penalties for Computer Tampering

The following table provides a comprehensive overview of the potential sentences for each computer tampering offense:

Offense Charge Prison Probation (max)
Targeting critical infrastructure Class 2 felony 3 – 12.5 years 7 years
Fraudulent intent Class 3 felony 2 – 8.75 years 5 years
Significant system disruption Class 4 felony 1 – 3.75 years 4 years
Threats and harassment Class 5 felony 6 months – 2.5 years 3 years
Unauthorized access Class 6 felony 4 months – 2 years 3 years

Frequently Asked Questions (FAQs)

Don’t worry if this seems overwhelming; Lawyer Listed has already done the work for you and is ready to match you with an elite lawyer tailored to your needs and your case.

Key Takeaways:

  • Definition: Arizona Revised Statutes ARS 13-2316 defines computer tampering as a wide range of illegal activities. These include unauthorized access to systems, altering data, damaging networks, destroying information, and using computers to commit other crimes. The law covers everything from simple unauthorized access to sophisticated hacking operations.  
  • Specific Actions: Several specific actions can lead to computer tampering Arizona charges. These include unauthorized access to computer systems, data alteration or manipulation, system damage through malware or other means, fraudulent schemes using computers, denial of service attacks that disrupt access to systems, and obtaining confidential information without authorization. Each of these actions is treated seriously under Arizona law.
  • Sentencing: 
    • Targeting critical infrastructure: Classified as a Class 2 felony with a potential prison sentence ranging from 3 to 12.5 years and/or up to 7 years of probation.
    • Fraudulent intent: Classified as a Class 3 felony with a potential prison sentence ranging from 2 to 8.75 years and/or up to 5 years of probation.
    • Significant system disruption: Classified as a Class 4 felony with a potential prison sentence ranging from 1 to 3.75 years and/or up to 4 years of probation.
    • Threats and harassment: Classified as a Class 5 felony with a potential prison sentence ranging from 6 months to 2.5 years and/or up to 3 years of probation.
    • Unauthorized access: Classified as a Class 6 felony with a potential prison sentence ranging from 4 months to 2 years and/or up to 3 years of probation.
  • Statute of limitations: The statute of limitations for computer tampering in Arizona is 7 years from the date of the alleged offense. 

Next Steps:

Computer tampering in Arizona is a serious criminal allegation with consequences that can affect the rest of your life. Outcomes depend on many factors. Lawyer Listed meets you where you are and helps you understand the law and your rights. 

If you’re facing charges for computer tampering, engaging a skilled white collar crimes attorney is important to protect your rights and manage the process. Don’t try navigating the legal system alone; match with your ideal lawyer at LawyerListed.com and get an experienced criminal defense attorney on your side right away.