We have gathered the following New Jersey laws and statutes governing computer crimes. With the growing popularity of computer use, computers are increasingly playing a role in various criminal activities. The statutes provided below are meant only to serve as general information. If you have been charged under one of the following statutes, please contact Villani & DeLuca, P.C. at (732) 965-3350 for a free consultation.
Computer Crimes Laws in NJ:
- 2C:20-25. Computer crimes. – A computer crime is defined as deliberately accessing computer data, computer equipment or computer networks without proper authorization, for the purpose of criminal activity. Computer crimes are handled by the Cyber Crimes Unit (CCU) of the New Jersey State Police Computer Crimes and High Technology Surveillance Bureau (CC&HTSB). The CCU specializes in the investigation of computer crimes, such as identity theft, cyber terrorism and account hijacking.
- 2C:20-31. Wrongful computer access. – Wrongful access and disclosure of information involve accessing computers, computer equipment, data, data storage systems and software to obtain personally identifying information without authorization. The most serious charge is for the reckless disclosure of personal information that is protected from disclosure by law or court order. Such action is considered a second degree crime, and is punishable by an automatic prison sentence, with no eligibility for parole.
- 2C:20-33. Obtaining, copying, accessing program, software valued at $1,000 or less. – An individual may be prosecuted under 2C:20-33 for obtaining, accessing or copying any computer or software program valued at less than $1,000 without proper authorization. However, this charge is only applicable to perpetrators who did not disclose the data or program to any other individuals.
- 2C:20-34. Location of offense. – The situs, or site of a computer criminal activity refers to the location of the computer, equipment, network, or storage system at which the offense or damage occurred. The New Jersey State Police often locate computers through the device’s Internet Protocol (IP) address in order to determine the site of criminal activity.