§431. Definitions As used in this chapter, unless the context otherwise indicates, the following terms have the following meanings. [PL 1989, c. 620 (NEW).] 1. “Access” means to gain logical entry into, instruct, communicate with, store data in or retrieve data from any computer resource. [PL 1989, c. 620 (NEW).] 2. “Computer” means […]
§432. Criminal invasion of computer privacy 1. A person is guilty of criminal invasion of computer privacy if the person intentionally accesses any computer resource knowing that the person is not authorized to do so. [PL 1989, c. 620 (NEW).] 2. Criminal invasion of computer privacy is a Class D crime. [PL 1989, […]
§433. Aggravated criminal invasion of computer privacy 1. A person is guilty of aggravated criminal invasion of computer privacy if the person: A. Intentionally makes an unauthorized copy of any computer program, computer software or computer information, knowing that the person is not authorized to do so; [PL 1989, c. 620 (NEW).] B. […]
§434. Prosecution of invasion of computer privacy 1. The crime of criminal invasion of computer privacy as defined in section 432 may be prosecuted and punished in: A. The county in which the defendant was located when the defendant accessed the computer resource; or [PL 2011, c. 133, §1 (NEW).] B. A county […]
§435. Added jurisdiction to prosecute 1. In addition to the State’s having jurisdiction pursuant to section 7 to convict a person under section 432 or 433, the State has jurisdiction to convict a person under this chapter when that person is physically located outside of this State and the prohibited conduct: A. Occurs outside […]
§436. Permanent destruction of computer data on a computer used in the commission of a crime 1. If a person is convicted upon a finding of guilt or upon the acceptance of a plea of guilty or nolo contendere or found not criminally responsible of a violation of this Title, the State, after all appeal […]
§437. Permissible destruction or transfer of ownership to the State of a computer used in the commission of a crime 1. Notwithstanding any provision of law to the contrary and except as provided in subsection 3, the State may either permanently destroy or assume ownership of a computer that was used in the commission of […]