ARIZONA REVISED STATUTES ANNOTATED
              COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                           TITLE 13.  CRIMINAL CODE
                    CHAPTER 23.  ORGANIZED CRIME AND FRAUD

s 13-2316. COMPUTER fraud;  classification

 A. A person commits COMPUTER fraud in the first degree by accessing, altering,
damaging or destroying without authorization any COMPUTER, COMPUTER system,
COMPUTER network, or any part of such COMPUTER, system or network, with the
intent to devise or execute any scheme or artifice to defraud or deceive, or
control property or services by means of false or fraudulent pretenses,
representations or promises.
 B. A person commits COMPUTER fraud in the second degree by intentionally and
without authorization accessing, altering, damaging or destroying any COMPUTER,
COMPUTER system or COMPUTER network or any COMPUTER software, program or data
contained in such COMPUTER, COMPUTER system or COMPUTER network.
 C. COMPUTER fraud in the first degree is a class 3 felony.  COMPUTER fraud in
the second degree is a class 6 felony.

                          1989 Main Volume Credit(s)

Added by Laws 1978, Ch. 204, s 2, eff. Oct. 1, 1978.

                               HISTORICAL NOTES

                        HISTORICAL AND STATUTORY NOTES

                1989 Main Volume Historical and Statutory Notes

 For effective date provision of Laws 1978, Ch. 204, see Historical Note
following s 13-2301.


                      ARIZONA REVISED STATUTES ANNOTATED
              COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                           TITLE 13.  CRIMINAL CODE
                    CHAPTER 23.  ORGANIZED CRIME AND FRAUD

s 13-2301. Definitions

 A. For the purposes of ss 13-2302 through 13-2304:
 1. "Creditor" means any person making such an extension of credit or any
person claiming by, under, or through any person making such an extension of
credit.
 2. "Debtor" means any person to whom such an extension of credit is made or
any person who guarantees the repayment of an extension of credit, or in any
manner undertakes to indemnify the creditor against loss resulting from the
failure of any person to whom an extension is made to repay the same.
 3. "Extortionate extension of credit" means any extension of credit with
respect to which it is the understanding of the creditor and the debtor at the
time such extension is made that delay in making repayment or failure to make
repayment could result in the use of violence or other criminal means to cause
harm to the person, reputation or property of any person.
 4. "Extortionate means" means the use, or an express or implicit threat of
use, of violence or other criminal means to cause harm to the person,
reputation or property of any person.
 5. "Repayment of any extension of credit" means the repayment, satisfaction or
discharge in whole or in part of any debt or claim, acknowledged or disputed,
valid or invalid, resulting from or in connection with that extension of
credit.
 6. "To collect an extension of credit" means to induce in any way any person
to make repayment thereof.
 7. "To extend credit" means to make or renew any loan or to enter into any
agreement, tacit or express, whereby the repayment or satisfaction of any debt
or claim, whether acknowledged or disputed, valid or invalid, and however
arising, may or shall be deferred.
 B. For the purposes of ss 13-2305 through 13-2307:
 1. "Dealer in property" means a person who buys and sells property as a
business.
 2. "Stolen property" means property that has been the subject of any unlawful
taking.
 3. "Traffic" means to sell, transfer, distribute, dispense or otherwise
dispose of stolen property to another person, or to buy, receive, possess or
obtain control of stolen property, with intent to sell, transfer, distribute,
dispense or otherwise dispose of to another person.
 C. For the purposes of s 13-2308:
 1. "Combination" means persons who collaborate in carrying on or furthering
the activities or purposes of a criminal syndicate even though such persons may
not know each other's identity or membership in the combination changes from
time to time or one or more members may stand in a wholesaler-retailer or other
arm's length relationship with others as to activities or dealings between or
among themselves in an illicit operation.
 2. "Criminal syndicate" means any combination of persons or enterprises
engaging, or having the purpose of engaging, on a continuing basis in conduct
which violates any one or more provisions of any felony statute of this state.
 D. For the purposes of ss 13-2312 through 13-2315, unless the context
otherwise requires:
 1. "Control", in relation to an enterprise, means the possession of sufficient
means to permit substantial direction over the affairs of an enterprise and, in
relation to property, means to acquire or possess.
 2. "Enterprise" means any corporation, partnership, association, labor union,
or other legal entity or any group of persons associated in fact although not a
legal entity.
 3. "Financial institution" means any business under the jurisdiction of the
state banking department or a banking or securities regulatory agency of the
United States or business under the jurisdiction of the securities division of
the corporation commission, the real estate department or the department of
insurance.
 4. "Racketeering" means any act, including any preparatory or completed
offense, committed for financial gain, which is chargeable or indictable under
the laws of the state in which the act occurred and, if the act occurred in a
state other than this state, would be chargeable or indictable under the laws
of this state had the act occurred in this state and punishable by imprisonment
for more than one year, regardless of whether such act is charged or indicted,
involving:
 (a) Homicide.
 (b) Robbery.
 (c) Kidnapping.
 (d) Forgery.
 (e) Theft.
 (f) Bribery.
 (g) Gambling.
 (h) Usury.
 (i) Extortion.
 (j) Extortionate extensions of credit.
 (k) Prohibited drugs, marijuana or other prohibited chemicals or substances.
 (l) Trafficking in explosives, weapons or stolen property.
 (m) Leading organized crime.
 (n) Obstructing or hindering criminal investigations or prosecutions.
 (o) Asserting false claims including, but not limited to, false claims
asserted through fraud or arson.
 (p) False statements or publications concerning land for sale or lease or sale
of subdivided lands or sale and mortgaging of unsubdivided lands.
 (q) Resale of realty with intent to defraud.
 (r) Fraud in the purchase or sale of securities.
 (s) Sale of unregistered securities or real property securities and
transactions involving such securities by unregistered dealers or salesmen.
 (t) A scheme or artifice to defraud.
 (u) Obscenity.
 (v) Child pornography.
 (w) Prostitution.
 (x) Restraint of trade or commerce in violation of s 34-252.
 (y) Terrorism.
 (z) Money laundering.
 (aa) Obscene or indecent telephone communications to minors for commercial
purposes.
 5. "Records" means any book, paper, writing, record, COMPUTER program or other
material.
 E. For the purposes of s 13-2316:
 1. "Access" means to approach, instruct, communicate with, store data in,
retrieve data from or otherwise make use of any resources of a COMPUTER,
COMPUTER system or COMPUTER network.
 2. "COMPUTER" means an electronic device which performs logic, arithmetic or
memory functions by the manipulations of electronic or magnetic impulses and
includes all input, output, processing, storage, software or communication
facilities which are connected or related to such a device in a system or
network.
 3. "COMPUTER network" means the interconnection of communication lines with a
COMPUTER through remote terminals or a complex consisting of two or more
interconnected COMPUTERS.
 4. "COMPUTER program" means a series of instructions or statements, in a form
acceptable to a COMPUTER, which permits the functioning of a COMPUTER system in
a manner designed to provide appropriate products from such COMPUTER system.
 5. "COMPUTER software" means a set of COMPUTER programs, procedures and
associated documentation concerned with the operation of a COMPUTER system.
 6. "COMPUTER system" means a set of related, connected or unconnected COMPUTER
equipment, devices and softwares.
 7. "Financial instrument" means any check, draft, money order, certificate of
deposit, letter of credit, bill of exchange, credit card or marketable security
or any other written instrument, as defined by s 13-2001, paragraph 7, which is
transferable for value.
 8. "Property" means financial instruments, information, including
electronically produced data, COMPUTER software and programs in either machine
or human readable form, and anything of value, tangible or intangible.
 9. "Services" includes COMPUTER time, data processing and storage functions.

                          1989 Main Volume Credit(s)

Added by Laws 1977, Ch. 142, s 82, eff. Oct. 1, 1978.  Amended by Laws 1978,
Ch. 201, s 151, eff. Oct. 1, 1978;  Laws 1978, Ch. 204, s 1, eff. Oct. 1,
1978;  Laws 1980, Ch. 229, s 22, eff. April 23, 1980;  Laws 1981, Ch. 102, s
1;  Laws 1982, Ch. 200, s 1;  Laws 1983, Ch. 45, s 1;  Laws 1984, Ch. 149, s
1;  Laws 1985, Ch. 198, s 1;  Laws 1985, Ch. 329, s 2;  Laws 1987, Ch. 124, s
1;  Laws 1987, Ch. 307, s 8;  Laws 1988, Ch. 34, s 1;  Laws 1988, Ch. 150, s 1,
eff. June 6, 1988.

                               HISTORICAL NOTES

                        HISTORICAL AND STATUTORY NOTES

                1989 Main Volume Historical and Statutory Notes

Source:
 Pen.Code 1901, ss 469-472.
 Pen.Code 1913, ss 512-515.
 Rev.Code 1928, ss 4770, 4771.
 Code 1939, ss 43-1901, 43-1902.
 A.R.S. former s 13-401.

 Subsec. A, pars. 1 to 7, were adopted from the United States Code;  see 18
U.S.C.A. ss 891 through 894.

 Laws 1978, Ch. 204, s 4 provides:

 "The provisions of this act shall become effective on October 1, 1978."

Reviser's Notes:

 1978 Note.  Prior to the 1980 amendment, this section contained the amendments
made by Laws 1978, Ch. 201, s 151 and Ch. 204, s 1 which were blended together
pursuant to authority of s 41-1304.03.

 1985 Note.  Pursuant to authority of s 41-1304.02, the spelling of "terrorism"
in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch. 198, s 1 was
corrected as a manifest clerical error.  Prior to this correction the spelling
of "terrorism" in subsection D, paragraph 4, subdivision (y) by Laws 1985, Ch.
329, s 2 was corrected without striking existing language and showing new
language in capital letters as required by house and senate rules.

 1987 Note.  Prior to the 1988 amendments this section contained the amendments
made by Laws 1987, Ch. 124, s 1 and Ch. 307, s 8 which were blended together
pursuant to authority of s 41-1304.03.

 1988 Note.  This section contains the amendments made by Laws 1988, Ch. 34, s
1 and Ch. 150, s 1 which were blended together as shown above pursuant to
authority of s 41-1304.03.

                      ARIZONA REVISED STATUTES ANNOTATED
              COPR. (c) WEST 1989  No Claim to Orig. Govt. Works
                           TITLE 13.  CRIMINAL CODE
                 CHAPTER 30.  EAVESDROPPING AND COMMUNICATIONS

s 13-3016. Government agency access to contents of stored electronic
  communications;  backup preservation;  delayed notice;  violation;
  classification

 A. The provisions of this section apply to electronic communications entrusted
to a communication service provider or remote computing service solely for the
purpose of transmission, storage or processing.  Electronic communications in
the possession of a person who is entitled to access the contents of such
communications for any purpose other than transmission, storage or processing
are ordinary business records, and may be obtained by subpoena or court order.
 B. An agency of this state or its political subdivisions may require the
disclosure by a provider of electronic communication services of the contents
of an electronic communication that has been in electronic storage for one
hundred eighty days or less only by obtaining a search warrant pursuant to
chapter 38 of this title. [FN1MV]
 C. An agency of this state or its political subdivisions may require the
disclosure by a provider of electronic communication services of the contents
of an electronic communication that has been in electronic storage for more
than one hundred eighty days:
 1. Without notice to the subscriber or customer, by obtaining a search warrant
issued pursuant to chapter 38 of this title.
 2. With prior notice to the subscriber or customer, by subpoena, except that
such notice may be delayed pursuant to subsection E. [FN2MV]
 3. With prior notice to the subscriber or customer if the agency obtains a
court order on application and certification to the court that the information
likely to be obtained is relevant to a legitimate law enforcement inquiry,
except that such notice may be delayed pursuant to subsection E. [FN2MV]
 D. An agency of this state or its political subdivisions may require a
provider of remote computing services to disclose the contents of any
electronic communication that is held or maintained on that service on behalf
of a subscriber or customer of the remote computing service solely for the
purpose of providing storage or COMPUTER processing services to the subscriber
or customer:
 1. Without notice to the subscriber or customer, by obtaining a search warrant
issued pursuant to chapter 38 of this title.
 2. With prior notice to the subscriber or customer, by subpoena, except that
such notice may be delayed pursuant to subsection E. [FN2MV]
 3. With prior notice to the subscriber or customer if the agency obtains a
court order on application and certification to the court that the information
likely to be obtained is relevant to a legitimate law enforcement inquiry,
except that such notice may be delayed pursuant to subsection E. [FN2MV]
 E. An agency acting pursuant to this section may include in its subpoena or
court order a requirement that the service provider to whom the request is
directed create a backup copy of the contents of the electronic communications
sought in order to preserve those communications:
 1. Without notifying the subscriber or customer, the provider shall:
 (a) Create the backup copy as soon as practicable but in no event no later
than two business days after receipt of the subpoena or order.
 (b) Confirm to the requesting agency that the backup copy has been made.
 (c) Promptly deliver the backup copy to the court issuing the subpoena or
order.
 2. The court shall seal and retain the backup copy or make such other
provision as it deems necessary to ensure that the backup copy is preserved
until resolution of any proceedings pursuant to this section.
 3. Within three days after receipt of confirmation, the agency shall notify
the subscriber or customer of the creation of the backup copy, except that
notice may be delayed pursuant to this subsection.
 4. Within fourteen days after notice by the agency, the subscriber or customer
may challenge the agency's request by filing an application to quash the
subpoena or vacate the court order and serving the requesting agency.
 5. If after response by the agency and such further proceedings as the court
may deem necessary, the court finds that the applicant is not the subscriber or
customer for whom the communications sought by the agency are maintained by the
provider, or that there is reason to believe that the communications sought are
relevant to a legitimate law enforcement inquiry, the court shall deny the
application and deliver the backup copy to the requesting agency.  If the court
finds that the applicant is the subscriber or customer for whom the
communications sought by the agency are maintained, and that there is no reason
to believe the communications sought are relevant to a legitimate law
enforcement inquiry, the court shall grant the application and order the backup
copy to be destroyed.
 6. The court shall release the backup copy to the requesting agency no sooner
than fourteen days after the agency's notice to the subscriber or customer if
the subscriber or customer has not filed a challenge to the subpoena or court
order.
 7. The court shall not destroy the backup copy until the information requested
is delivered or until the resolution of any proceedings arising from a
challenge to the subpoena or order.
 F. Notice to the subscriber or customer required by this section may be
delayed for a period of not to exceed ninety days under any of the following
circumstances:
 1. If the applicant for a search warrant or court order pursuant to this
section requests a delay of notification and the court finds that such delay is
necessary to protect the safety of any person or to prevent flight from
prosecution, tampering with evidence, intimidation of witnesses or jeopardizing
an investigation.
 2. If the investigator or prosecuting attorney proceeding by subpoena executes
a written certification that there is reason to believe that notice to the
subscriber or customer may result in danger to the safety of any person, flight
from prosecution, tampering with evidence, intimidation of witnesses or
jeopardizing an investigation.  The agency shall retain a true copy of the
certification.
 3. If further delay of notification is necessary, extensions of up to ninety
days each may be obtained by application to the court or certification pursuant
to paragraphs 1 and 2 of this subsection.
 4. Any agency acting pursuant to this section may apply for a court order
directing the communication or computing service provider not to notify any
other person of the existence of the subpoena, court order or warrant for such
period as the court deems appropriate.  The court shall grant the application
if it finds that there is reason to believe that notice may cause an adverse
result described in paragraphs 1 and 2 of this subsection.  A person who
violates an order issued pursuant to this subsection is guilty of a class 1
misdemeanor.
 5. On the expiration of any period of delay under this section, the agency
shall deliver to the subscriber or customer a copy of the process used and
notice including:
 (a) That information was requested from the service provider.
 (b) The date on which the information was requested.
 (c) That notification to the subscriber or customer was delayed.
 (d) The identity of the court or agency ordering or certifying the delay.
 (e) The provision of this section by which delay was obtained.
 (f) That any challenge to the subpoena or order must be filed within fourteen
days.

                          1989 Main Volume Credit(s)

Added by Laws 1988, Ch. 149, s 13.

 [FN1MV] Section 13-3801 et seq.

 [FN2MV] So in original, probably should read "F".

                               HISTORICAL NOTES

                        HISTORICAL AND STATUTORY NOTES

                1989 Main Volume Historical and Statutory Notes

1988 Reviser's Note:

 Pursuant to authority of s 41-1304.02, in subsection D, paragraph 3 the
spelling of "relevant" was corrected.