Cyber Crime C.R.S. 18-5.5-102 Attorney in Weld County
Arrested for a Cyber Crime?

Have you been falsely accused of Cyber crimes? Call 970-616-6009 to meet with an experienced criminal defense lawyer in Weld County.

Cyber Crime or Computer Crime in Weld County is a computer charge.  Located at C.R.S. 18-5.5-102, Cyber Crime is similar to computer hacking.  Cyber Crimes  also involve the internet Recently in Denver, the city was forced to pay $45,000 to hackers who shut down multiple municipal services in an attack.  Often, when talking about Computer or Cyber Crimes, people think of attacks like this one where a ransom is demanded.  However, you can also be charged if you simply gain unauthorized access or make unauthorized changes to a former girlfriend’s  computer system, social media, or email. Understanding all dimensions of  the charge  against you is important, so read below for more information on Cyber Crimes. Knowledge is power.

What is the Definition of Cyber Crimes or Computer Crimes in Greeley, Colorado?

A person commits cyber crime under C.R.S. 18-5.5-102, if the person knowingly:

(a) Accesses a computer, computer network, or computer system or any part thereof without authorization;  exceeds authorized access to a computer, computer network, or computer system or any part thereof;  or uses a computer, computer network, or computer system or any part thereof without authorization or in excess of authorized access;  or

(b) Accesses any computer, computer network, or computer system, or any part thereof for the purpose of devising or executing any scheme or artifice to defraud;  or

(c) Accesses any computer, computer network, or computer system, or any part thereof to obtain, by means of false or fraudulent pretenses, representations, or promises, money;  property;  services;  passwords or similar information through which a computer, computer network, or computer system or any part thereof may be accessed;  or other thing of value;  or

(d) Accesses any computer, computer network, or computer system, or any part thereof to commit theft;  or

(e) Without authorization or in excess of authorized access alters, damages, interrupts, or causes the interruption or impairment of the proper functioning of, or causes any damage to, any computer, computer network, computer system, computer software, program, application, documentation, or data contained in such computer, computer network, or computer system or any part thereof;  or

(f) Causes the transmission of a computer program, software, information, code, data, or command by means of a computer, computer network, or computer system or any part thereof with the intent to cause damage to or to cause the interruption or impairment of the proper functioning of or that actually causes damage to or the interruption or impairment of the proper functioning of any computer, computer network, computer system, or part thereof;  or

(g) Uses or causes to be used a software application that runs automated tasks over the internet to access a computer, computer network, or computer system, or any part thereof, that circumvents or disables any electronic queues, waiting periods, or other technological measure intended by the seller to limit the number of event tickets that may be purchased by any single person in an online event ticket sale as defined in section 6-1-720, C.R.S .;  or

(h) Solicits or offers to arrange a situation in which a minor may engage in prostitution, by means of using a computer, computer network, computer system, or any part thereof;  or

(i) Directly or indirectly uses a scanning device to access, read, obtain, memorize, or store, temporarily or permanently, information encoded on the payment card without the permission of the authorized user of the payment card, and with the intent to defraud the authorized user, the issuer of the authorized user’s payment card, or a merchant;  or

(j) Directly or indirectly uses an encoding machine to place information encoded on the payment card onto a different payment card without the permission of the authorized user of the payment card from which the information being re-encoded was obtained, and with the intent to defraud the authorized user, the issuer of the authorized user’s payment card, or a merchant.

Simply put, if you unlawfully use or access of a computer, network, or system you can be charged with a Cyber Crime. This includes the use of a computer to commit theft, purchase online tickets to an event, or cause damage.  But is also includes minor conduct like signing into someone’s Facebook account and leaving a silly message as if the owner posted it.  Either way, this is a felony which can change the course of your life.

Examples of Cyber Crimes or Computer Crimes in Weld County?

In Weld County here are some examples of Computer Crimes or Cyber Crimes:

  • Identity Theft
  • Hacking
  • Faking comments or data
  • Stealing data, information, or product from a site
  • Accessing accounts that you do not have permission to
  • Spreading malware or viruses

In Weld County What is the Sentence or Punishment for Cyber Crimes?

The penalties in Weld County, for Cyber Crimes depend on the offense and the value of theft, damage, or loss that happened.

Value of Damage or Loss Punishment Sentence
Less than $300 Class 2 Misdemeanor 3-12 months in the Weld County Jail and up to a $1,000 in fines
$500 – $1,000 Class 1 Misdemeanor 6-18 months in jail and up to $5,000 in fines
$1,000 – $20,000 Class 4 Felony 2 – 6 years in the Department of Corrections and up to $500,000 in fines
$20,000 or more Class 3 Felony 4 -12 years in the DOC and up to $750,000 in fines

Have you been falsely accused of a Cybercrime or Computer Crime? Are the police treating you like a criminal for what is only a practical joke? Be smart and do not talk to the Greeley Police or Weld County Sheriff – they are not your friends.  We have the experience to defend you and protect your criminal record. Call 970-616-6009 to meet with an experienced criminal defense lawyer in Weld County. Together, we can protect your future.

Image by fancycrave1 from Pixabay