View Our Newest Version Here

2018 Arkansas Code
Title 5 - Criminal Offenses
Subtitle 4 - Offenses Against Property
Chapter 41 - Computers, Computer Systems, and Networks
Subchapter 2 - Computers and Networks
§ 5-41-204. Unlawful use of encryption

Universal Citation:
AR Code § 5-41-204 (2018)
Learn more This media-neutral citation is based on the American Association of Law Libraries Universal Citation Guide and is not necessarily the official citation.
  • (a) A person commits unlawful use of encryption if the person knowingly uses or attempts to use encryption, directly or indirectly, to:

    • (1) Commit, facilitate, further, or promote any criminal offense;

    • (2) Aid, assist, or encourage another person to commit any criminal offense;

    • (3) Conceal the commission of any criminal offense;

    • (4) Conceal or protect the identity of a person who has committed any criminal offense; or

    • (5) Delay, hinder, or obstruct the administration of the law.

  • (b) A person who violates any provision of this section commits a criminal offense that is separate and distinct from any other criminal offense and may be prosecuted and convicted pursuant to this section whether or not the person or any other person is or has been prosecuted or convicted for any other criminal offense arising out of the same facts as the violation of this section.

  • (c) An unlawful use of encryption is a:

    • (1) Class D felony if the criminal offense concealed by encryption is a Class Y felony, Class A felony, or Class B felony;

    • (2) Class A misdemeanor if the criminal offense concealed by encryption is a Class C felony, Class D felony, or an unclassified felony; or

    • (3) Misdemeanor classed one (1) degree below the misdemeanor constituted by the criminal offense concealed by encryption for any other unlawful use of encryption.

Disclaimer: These codes may not be the most recent version. Arkansas may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.