Cybertelecom
Cybertelecom
Federal Internet Law & Policy
An Educational Project
New Jersey Dont be a FOOL; The Law is Not DIY
Page Sections
- EAS
- Cybercrime
- Muni BB
- - MuniBB Notes
- VoIP

State Links
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming

Cybercrime

N.J. STAT. § 2C:20-23(q) "Authorization" means permission, authority or consent given by a person who possesses lawful authority to grant such permission, authority or consent to another person to access, operate, use, obtain, take, copy, alter, damage or destroy a computer, computer network, computer system, computer equipment, computer software, computer program, computer storage medium, or data. An actor has authorization if a reasonable person would believe that the act was authorized.

2C:20-25 Computer criminal activity; degree of crime; sentencing.

4. A person is guilty of computer criminal activity if the person purposely or knowingly and without authorization, or in excess of authorization:

a.Accesses any data, data base, computer storage medium, computer program, computer software, computer equipment, computer, computer system or computer network;

b.Alters, damages or destroys any data, data base, computer, computer storage medium, computer program, computer software, computer system or computer network, or denies, disrupts or impairs computer services, including access to any part of the Internet, that are available to any other user of the computer services;

c.Accesses or attempts to access any data, data base, computer, computer storage medium, computer program, computer software, computer equipment, computer system or computer network for the purpose of executing a scheme to defraud, or to obtain services, property, personal identifying information, or money, from the owner of a computer or any third party;

d. (Deleted by amendment, P.L.2003, c.39).

e.Obtains, takes, copies or uses any data, data base, computer program, computer software, personal identifying information, or other information stored in a computer, computer network, computer system, computer equipment or computer storage medium; or

f.Accesses and recklessly alters, damages or destroys any data, data base, computer, computer storage medium, computer program, computer software, computer equipment, computer system or computer network.

g.A violation of subsection a. of this section is a crime of the third degree. A violation of subsection b. is a crime of the second degree. A violation of subsection c. is a crime of the third degree, except that it is a crime of the second degree if the value of the services, property, personal identifying information, or money obtained or sought to be obtained exceeds $5,000. A violation of subsection e. is a crime of the third degree, except that it is a crime of the second degree if the data, data base, computer program, computer software, or information:

(1)is or contains personal identifying information, medical diagnoses, treatments or other medical information concerning an identifiable person;

(2)is or contains governmental records or other information that is protected from disclosure by law, court order or rule of court; or

(3)has a value exceeding $5,000.

ECPA :: Cell Phone Location Information :: Expectation of Privacy

 State v. Earls, 70 A.3d 630, 644 (N.J. 2013) 

VoIP

  • Comcast VoIP Trial Union, NJ. Putting VoIP to the Crash Test, CED May 2002
  • Cablevision market deployment Cablecos Set Sights on VoIP, Xchange February 1, 2004
  •  

    News