Spying Statutes


§14-454: Accessing Computers

§14-454: Accessing Computers

(a) It is unlawful to willfully, directly or indirectly, access or cause to be accessed any computer, computer program, computer system, computer network, or any part thereof, for the purpose of: (1) Devising or executing any scheme or artifice to defraud, unless the object of the scheme or artifice is to obtain educational testing material, a false educational testing score, or a false academic or...

Read More


§ 14-457: Extortion

§ 14-457: Extortion

Any person who verbally or by a written or printed communication, maliciously threatens to commit an act described in G.S. 14-455 with the intent to extort money or any pecuniary advantage, or with the intent to compel any person to do or refrain from doing any act against his will, is guilty of a Class H felony. (1979, c. 831, s. 1; 1979, 2nd Sess.,...

Read More


§14-458: Computer Trespass

§14-458: Computer Trespass

(a) Except as otherwise made unlawful by this Article, it shall be unlawful for any person to use a computer or computer network without authority and with the intent to do any of the following: (1) Temporarily or permanently remove, halt, or otherwise disable any computer data, computer programs, or computer software from a computer or computer network. (2) Cause a computer to malfunction, regardless...

Read More


§15A-287: Interception and Disclosure of Wire, Oral, or Electronic Communications Prohibited

§15A-287: Interception and Disclosure of Wire, Oral, or Electronic Communications Prohibited

(a) Except as otherwise specifically provided in this Article, a person is guilty of a Class H felony if, without the consent of at least one party to the communication, the person: (1) Willfully intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication. (2) Willfully uses, endeavors to use, or procures any other...

Read More


§14-455: Damaging Computers and Resources

§14-455: Damaging Computers and Resources

(a) It is unlawful to willfully and without authorization alter, damage, or destroy a computer, computer program, computer system, computer network, or any part thereof. A violation of this subsection is a Class G felony if the damage caused by the alteration, damage, or destruction is more than one thousand dollars ($1,000). Any other violation of this subsection is a Class 1 misdemeanor. (a1) It...

Read More




[i]
[i]
[i]
[i]