New Mexico Computer Crimes Act (NM Stat § 30-45-1 - § 30-45-7)

New Mexico Computer Crimes Act

NM Stat § 30-45-1 - § 30-45-7

 

ARTICLE 45 Computer Crimes

30-45-1. Short title.

30-45-2. Definitions.

30-45-3. Computer access with intent to defraud or embezzle.

30-45-4. Computer abuse.

30-45-5. Unauthorized computer use.

30-45-6. Prosecution.

30-45-7. Forfeiture of property.

 

30-45-1. Short title.

This act [30-45-1 to 30-45-7 NMSA 1978] may be cited as the "Computer Crimes Act".

History: Laws 1989, ch. 215, § 1.

ANNOTATIONS

Am. Jur. 2d, A.L.R. and C.J.S. references. — Computer fraud, 70 A.L.R.5th 647.

 

30-45-2. Definitions.

As used in the Computer Crimes Act:

A.  "access" means to program, execute programs on, intercept, instruct, communicate with, store data in, retrieve data from or otherwise make use of any computer resources, including data or programs of a computer, computer system, computer network or database;

B.  "computer" includes an electronic, magnetic, optical or other high-speed data processing device or system performing logical, arithmetic or storage functions and includes any property, data storage facility or communications facility directly related to or operating in conjunction with such device or system. The term does not include an automated typewriter or typesetter or a single display machine in and of itself, designed and used solely within itself for word processing, or a portable hand-held calculator, or any other device which might contain components similar to those in computers but in which the components have the sole function of controlling the device for the single purpose for which the device is intended;

C.  "computer network" means the interconnection of communication lines and circuits with a computer or a complex consisting of two or more interconnected computers;

D.  "computer program" means a series of instructions or statements, in a form acceptable to a computer, which permits the functioning of a computer system in a manner designed to provide appropriate products from a computer system;

E.  "computer property" includes a financial instrument, data, databases, computer software, computer programs, documents associated with computer systems and computer programs, or copies, whether tangible or intangible, and data while in transit;

F.   "computer service" includes computer time, the use of the computer system, computer network, computer programs or data prepared for computer use, data contained within a computer network and data processing and other functions performed, in whole or in part, by the use of computers, computer systems, computer networks or computer software;

G.  "computer software" means a set of computer programs, procedures and associated documentation concerned with the operation and function of a computer system;

H.  "computer system" means a set of related or interconnected computer equipment, devices and software;

I.    "data" means a representation of information, knowledge, facts, concepts or instructions which are prepared and are intended for use in a computer, computer system or computer network;

J.   "database" means any data or other information classified, processed, transmitted, received, retrieved, originated, switched, stored, manifested, measured, detected, recorded, reproduced, handled or utilized by a computer, computer system, computer network or computer software; and

K.  "financial instrument" includes any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction, authorization mechanism, marketable security or any other computerized representation thereof.

History: Laws 1989, ch. 215, § 2.

ANNOTATIONS

Accessing of computer. — The use of a telephone network consisting in part of computerized switches to make a long distance call does not constitute "accessing" of a "computer" within the meaning of the computer fraud statute. State v. Rowell, 1995-NMSC-079, 121 N.M. 111, 908 P.2d 1379, 70 A.L.R. 5th 819 (1995), rev'g 1995-NMCA-029, 119 N.M. 710, 895 P.2d 232.

 

30-45-3. Computer access with intent to defraud or embezzle.

A person who knowingly and willfully accesses or causes to be accessed a computer, computer system, computer network or any part thereof with the intent to obtain, by means of embezzlement or false or fraudulent pretenses, representations or promises, money, property or anything of value, when the:

A.  money, property or other thing has a value of two hundred fifty dollars ($250) or less, is guilty of a petty misdemeanor;

B.  money, property or other thing has a value of more than two hundred fifty dollars ($250) but not more than five hundred dollars ($500), is guilty of a misdemeanor;

C.  money, property or other thing has a value of more than five hundred dollars ($500) but not more than two thousand five hundred dollars ($2,500), is guilty of a fourth degree felony;

D.  money, property or other thing has a value of more than two thousand five hundred dollars ($2,500) but not more than twenty thousand dollars ($20,000), is guilty of a third degree felony; or

E.  money, property or other thing has a value of more than twenty thousand dollars ($20,000), is guilty of a second degree felony.

History: Laws 1989, ch. 215, § 3; 2006, ch. 29, § 22.

ANNOTATIONS

The 2006 amendment, effective July 1, 2006, increased the value in Subsection A from $100 to $250; increased the value in Subsection B from more than $100, but not more than $250, and to more than $250, but not more than $500; increased the value in Subsection C from more than $250 to more than $500; and deleted the reference to sentencing pursuant to Section 31-18-15 NMSA 1978 in Subsections B through E.

"Accessing" construed. — The use of a telephone network consisting in part of computerized switches to make a long-distance call does not constitute the "accessing" of a "computer" within the meaning of this article. State v. Rowell, 1995-NMSC-079, 121 N.M. 111, 908 P.2d 1379.

Using a computer as a passive conduit not covered by statute. — The Computer Crimes Act, 30-45-1 NMSA 1978 et seq., was intended by the legislature to deter and punish crimes committed through the abuse of computer sophistication and to protect against the introduction of fraudulent data into a computer system, the unauthorized use of computer facilities, the alteration or destruction of computerized information or files, and the stealing of financial information data or other assets, but was not intended to apply to the use of a computer as a passive conduit through which the defendant’s criminal activity passed. State v. Garcia, 2015-NMCA-094, rev’d on other grounds, 2016-NMSC-034.

Insufficient evidence of computer access with intent to defraud. — Where defendant, with the victim’s permission, used a computer to access victim’s bank accounts and transfer funds to defendant’s own bank accounts for personal use, the evidence was insufficient to convict defendant of computer access with intent to defraud because defendant did not introduce fraudulent data into a computer system, use computer facilities without authorization, alter or destroy computerized information or files, nor did she steal financial information, data or other assets, but merely used the computer as a passive conduit to access accounts and transfer funds, just as any banking customer would. State v. Garcia, 2015-NMCA-094, rev’d on other grounds, 2016-NMSC-034.

Law reviews. — For note, "Criminal Law: Applying the General/Specific Statute Rule in New Mexico - State v. Santillanes," see 32 N.M. L. Rev. 313 (2002).

Am. Jur. 2d, A.L.R. and C.J.S. references. — Computer fraud, 70 A.L.R.5th 647.

 

30-45-4. Computer abuse.

A person who knowingly, willfully and without authorization, or having obtained authorization, uses the opportunity the authorization provides for purposes to which the authorization does not extend:

A.  directly or indirectly alters, changes, damages, disrupts or destroys any computer, computer network, computer property, computer service or computer system, when the:

(1)       damage to the computer property or computer service has a value of two hundred fifty dollars ($250) or less, is guilty of a petty misdemeanor;

(2)       damage to the computer property or computer service has a value of more than two hundred fifty dollars ($250) but not more than five hundred dollars ($500), is guilty of a misdemeanor;

(3)       damage to the computer property or computer service has a value of more than five hundred dollars ($500) but not more than two thousand five hundred dollars ($2,500), is guilty of a fourth degree felony;

(4)       damage to the computer property or computer service has a value of more than two thousand five hundred dollars ($2,500) but not more than twenty thousand dollars ($20,000), is guilty of a third degree felony; or

(5)       damage to the computer property or computer service has a value of more than twenty thousand dollars ($20,000), is guilty of a second degree felony; or

B.  directly or indirectly introduces or causes to be introduced data that the person knows to be false into a computer, computer system, computer network, computer software, computer program, database or any part thereof with the intent of harming the property or financial interests or rights of another person is guilty of a fourth degree felony.

History: Laws 1989, ch. 215, § 4; 2006, ch. 29, § 23.

ANNOTATIONS

The 2006 amendment, effective July 1, 2006, provided that a person who uses the opportunity the authorization provides for purposes to which the authorization does not extend is guilty of computer abuse; increased the damage in Paragraph (1) of Subsection A from $100 to $250; increased the damage in Paragraph (2) of Subsection A from more than $100, but not more than $250, and to more than $250, but not more than $500; increased the damage in Paragraph (3) of Subsection A from more than $250 to more than $500; deleted the reference to sentencing pursuant to Section 31-19-1 NMSA 1978 in Paragraph (2) of Subsection A; and deleted the reference to sentencing pursuant to Section 31-18-15 NMSA 1978 in Paragraphs (3) through (5) of Subsection A and in Subsection B.

 

30-45-5. Unauthorized computer use.

A person who knowingly, willfully and without authorization, or having obtained authorization, uses the opportunity the authorization provides for purposes to which the authorization does not extend, directly or indirectly accesses, uses, takes, transfers, conceals, obtains, copies or retains possession of any computer, computer network, computer property, computer service, computer system or any part thereof, when the:

A.  damage to the computer property or computer service has a value of two hundred fifty dollars ($250) or less, is guilty of a petty misdemeanor;

B.  damage to the computer property or computer service has a value of more than two hundred fifty dollars ($250) but not more than five hundred dollars ($500), is guilty of a misdemeanor;

C.  damage to the computer property or computer service has a value of more than five hundred dollars ($500) but not more than two thousand five hundred dollars ($2,500), is guilty of a fourth degree felony;

D.  damage to the computer property or computer service has a value of more than two thousand five hundred dollars ($2,500) but not more than twenty thousand dollars ($20,000), is guilty of a third degree felony; or

E.  damage to the computer property or computer service has a value of more than twenty thousand dollars ($20,000), is guilty of a second degree felony.

History: Laws 1989, ch. 215, § 5; 2006, ch. 29, § 24.

ANNOTATIONS

The 2006 amendment, effective July 1, 2006, increased the value in Subsection A from $100 to $250; increased the value in Subsection B from more than $100 but not more than $250 to more than $250 but not more than $500; increased the value in Subsection C from more than $250 to more than $500; deleted the reference to sentencing pursuant to Section 31-19-1 NMSA 1978 in Subsection B; and deleted the reference to sentencing pursuant Section 31-18-15 NMSA 1978 in Subsections C through E.

 

30-45-6. Prosecution.

A.  Prosecution pursuant to the Computer Crimes Act shall not prevent any prosecutions pursuant to any other provisions of the law where such conduct also constitutes a violation of that other provision.

B.  A person found guilty of violating any provision of the Computer Crimes Act shall, in addition to any other punishment, be ordered to make restitution for any financial loss sustained by anyone injured as the direct result of the commission of the crime. Restitution shall be imposed in addition to incarceration, forfeiture or fine, and not in lieu thereof, and may be made a condition of probation. The defendant's present and future ability to make such restitution shall be considered. In an extraordinary case, the court may determine that the interests of those injured and justice would not be served by ordering restitution. In such a case, the court shall make and enter specific written findings on the record substantiating the extraordinary circumstance presented upon which the court determined not to order restitution. In all other cases, the court shall determine the amount and method of restitution.

History: Laws 1989, ch. 215, § 6.

 

30-45-7. Forfeiture of property.

A.  The following are subject to forfeiture:

(1)       all computer property, equipment or products of any kind that have been used, manufactured, acquired or distributed in violation of the Computer Crimes Act;

(2)       all materials, products and equipment of any kind that are used or intended for use in manufacturing, using, accessing, altering, disrupting, copying, concealing, destroying, transferring, delivering, importing or exporting any computer property or computer service in violation of the Computer Crimes Act;

(3)       all books, records and research products and materials involving formulas, microfilm, tapes and data that are used or intended for use in violation of the Computer Crimes Act;

(4)       all conveyances, including aircraft, vehicles or vessels, that are used or intended for use to transport or in any manner to facilitate the transportation of property described in this subsection for the purpose of violating the Computer Crimes Act;

(5)       all property, real, personal or mixed, that has been used or intended for use, maintained or acquired in violation of the Computer Crimes Act; and

(6)       all money or proceeds that constitute an instrumentality or derive from a violation of the Computer Crimes Act.

B.  The provisions of the Forfeiture Act [Chapter 31, Article 27 NMSA 1978] apply to the seizure, forfeiture and disposal of property subject to forfeiture pursuant to Subsection A of this section.

History: Laws 1989, ch. 215, § 7; 2002, ch. 4, § 18.

ANNOTATIONS

The 2002 amendment, effective July 1, 2002, in Paragraph A(4), substituted "this section" for "A, B or C of this section"; deleted former Subsections B through H, which contained standards and procedures for the forfeiture of property subject to forfeiture and disposal under the Computer Crimes Act; and added present Subsection B.

Am. Jur. 2d, A.L.R. and C.J.S. references. — Forfeiture of homestead based on criminal activity conducted on premises - state cases, 16 A.L.R.5th 855.

 

For more information, see here:  https://nmonesource.com/nmos/nmsa/en/item/4371/index.do#!fragment/zoupio-_Toc98843898/BQCwhgziBcwMYgK4DsDWszIQewE4BUBTADwBdoAvbRABwEtsBaAfX2zgE4AOLgFgGYu3AJQAaZNlKEIARUSFcAT2gByFaIiEwuBHIXK1GrTpABlPKQBCygEoBRADJ2AagEEAcgGE7o0mABG0KTswsJAA

 

These materials were obtained directly from the State Legislative websites and are posted here for your review and reference only.  No Claim to Original State Government Works.  This may not be the most recent version.  The State may have more current information.  We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to.  Please check the linked sources directly.