2016 New Mexico Statutes
Chapter 30 - Criminal Offenses
Article 45 - Computer Crimes
Section 30-45-4 - Computer abuse.

NM Stat § 30-45-4 (2016) What's This?

30-45-4. Computer abuse.

A person who knowingly, willfully and without authorization, or having obtained authorization, uses the opportunity the authorization provides for purposes to which the authorization does not extend:

A. directly or indirectly alters, changes, damages, disrupts or destroys any computer, computer network, computer property, computer service or computer system, when the:

(1) damage to the computer property or computer service has a value of two hundred fifty dollars ($250) or less, is guilty of a petty misdemeanor;

(2) damage to the computer property or computer service has a value of more than two hundred fifty dollars ($250) but not more than five hundred dollars ($500), is guilty of a misdemeanor;

(3) damage to the computer property or computer service has a value of more than five hundred dollars ($500) but not more than two thousand five hundred dollars ($2,500), is guilty of a fourth degree felony;

(4) damage to the computer property or computer service has a value of more than two thousand five hundred dollars ($2,500) but not more than twenty thousand dollars ($20,000), is guilty of a third degree felony; or

(5) damage to the computer property or computer service has a value of more than twenty thousand dollars ($20,000), is guilty of a second degree felony; or

B. directly or indirectly introduces or causes to be introduced data that the person knows to be false into a computer, computer system, computer network, computer software, computer program, database or any part thereof with the intent of harming the property or financial interests or rights of another person is guilty of a fourth degree felony.

History: Laws 1989, ch. 215, 4; 2006, ch. 29, 23.

Disclaimer: These codes may not be the most recent version. New Mexico may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.