{"id":24994,"date":"2023-12-29T10:53:51","date_gmt":"2023-12-29T10:53:51","guid":{"rendered":"https:\/\/rideoutlaw.com\/?p=24994"},"modified":"2023-12-26T21:03:24","modified_gmt":"2023-12-26T21:03:24","slug":"computer-tampering-laws-a-r-s-13-2316","status":"publish","type":"post","link":"https:\/\/rideoutlaw.com\/es\/computer-tampering-laws-a-r-s-13-2316\/","title":{"rendered":"Computer Tampering Laws: A.R.S. 13-2316"},"content":{"rendered":"<h2 style=\"text-align: center;\"><b><span data-contrast=\"auto\">Computer Tampering Laws: A.R.S. 13-2316<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Hacking into a computer is not always thought of as a serious crime, however Arizona law makes computer tampering a felony offense. Such a conviction will have lasting impacts for the offender. <\/span><a href=\"https:\/\/www.azleg.gov\/ars\/13\/02316.htm\"><span data-contrast=\"none\">A.R.S. 13-2316<\/span><\/a><span data-contrast=\"auto\"> defines computer tampering as tampering that is committed when a person acts without proper authority or exceeds their authorization of computer use.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Class 2 Felony\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Class 2 felony computer tampering is committed when a person acts without authority, or exceeds the authorization of use, by doing any of the following on a computer, computer system, or network that is a <\/span><b><i><span data-contrast=\"auto\">critical infrastructure resource<\/span><\/i><\/b><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly altering, damaging, deleting or destroying computer programs or data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly introducing a computer contaminant into any computer, computer system or network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Recklessly disrupting or causing the disruption of computer, computer system or network services or denying or causing the denial of computer or network services to any authorized user of a computer, computer system or network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Critical infrastructures are defined by Arizona state law as systems and assets, whether physical or virtual, that are so vital to this state and the United States that the incapacity or destruction of those systems and assets would have a debilitating impact on security, economic security, public health or safety.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">First time offenders can face incarceration of up to 12.5 years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Class 3 Felony<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Class 3 felony computer tampering is committed when a person acts without authority, or exceeds the authorization of use, by:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Accessing, altering, damaging, or destroying any computer, computer system or network, or any part of a computer, computer system or network, with the intent to devise or execute any scheme or artifice to defraud or deceive, or to control property or services by means of false or fraudulent pretenses, representations or promises.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">First-time offenders can face incarceration of up to 8.75 years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Class 4 Felony<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Class 4 felony computer tampering is committed when a person acts without authority, or exceeds the authorization of use, by:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly altering, damaging, deleting, or destroying computer programs or data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly introducing a computer contaminant into any computer, computer system or network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Recklessly disrupting or causing the disruption of computer, computer system or network services or denying or causing the denial of computer or network services to any authorized user of a computer, computer system or network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">First-time offenders can face incarceration of up to 3.75 years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Class 5 Felony<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Class 5 felony computer tampering is committed when a person acts without authority, or exceeds the authorization of use, by:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Recklessly using a computer, computer system or network to engage in a scheme or course of conduct that is directed at another person and that seriously alarms, torments, threatens, or terrorizes the person.\u202f For the purposes of this paragraph, the conduct must both:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%2.\" data-font=\"\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%2.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">Cause a reasonable person to suffer substantial emotional distress.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%2.\" data-font=\"\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:1440,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%2.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">Serve no legitimate purpose.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">First-time offenders can face incarceration of up to 2.5 years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Class 6 Felony<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Class 6 felony computer tampering is committed when a person acts without authority, or exceeds the authorization of use, by:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly obtaining any information that is required by law to be kept confidential or any records that are not public records by accessing any computer, computer system or network that is operated by this state, a political subdivision of this state, a health care provider, a clinical laboratory, or a person or entity that provides services on behalf of a health care provider or a clinical laboratory.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Knowingly accessing any computer, computer system or network or any computer software, program or data that is contained in a computer, computer system or network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">First-time offenders can face incarceration of up to 2 years.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Individuals can also be given felony charges for preventing a computer user from exiting a site, computer system, or network-connected location in order to compel the user&#8217;s computer to continue communicating with, connecting to or displaying the content of the service, site or system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Where Will Computer Tampering Be Charged?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Typically, criminal prosecutions in the state of Arizona will be tried in the county in which the actual offense occurred. However, computer tampering charges allow the defendant to be tried in any of the following counties:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The county in which the victimized computer, computer system or network is located.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The county in which the computer, computer system or network that was used in the commission of the offense is located or in which any books, records, documents, property, financial instruments, computer software, data, access devices or instruments of the offense were used.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">The county in which any authorized user was denied service or in which an authorized user&#8217;s service was interrupted.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">The county in which critical infrastructure resources were tampered with or affected.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Once a defendant has been convicted of computer tampering, the court will order that any computer system or instrument of communication that was owned or used exclusively by the defendant and used in the commission of the crime be forfeited and sold, destroyed, or otherwise properly disposed of.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Offenses Related to Computer Tampering<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In many instances, computer tampering charges come in conjunction with other charges, such as credit card fraud, identity theft, and unauthorized possession of an access device. Rideout Law Group\u2019s defense attorneys are able to navigate these charges to provide the best outcome in every computer tampering case.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h5><b><span data-contrast=\"none\">RIDEOUT LAW GROUP<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h5>\n<p><span data-contrast=\"none\">With offices in Lake Havasu City and Scottsdale, our firm serves the entire state of Arizona, with a particular focus on criminal defense, family law, and juvenile cases.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Our goal is for the best outcome for your criminal case, which can include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">charges that are reduced or dropped.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">top experts reviewing your case.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">aggressive negotiations with the prosecution for plea bargains.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">fines or probation in lieu of jail time.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">At Rideout Law Group, our attorneys are able to expertly examine the evidence in your case to provide a strong strategy for argument that leads to an outcome that is most favorable to you. We have experience in all types of criminal cases for both adults and juveniles, with positive outcomes both in plea negotiations as well as jury trial settings.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Call us today for a free consultation at 480-584-3328.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Tampering Laws: A.R.S. 13-2316\u00a0 Hacking into a computer is not always thought of as a serious crime, however Arizona law makes computer tampering a felony offense. Such a conviction will have lasting impacts for the offender. A.R.S. 13-2316 defines [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":24996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[76,207],"tags":[1557,92,1558,1554,1553,1564,1565,1559,1560,1555,1556,1561,146,94,327,1562,1563],"class_list":["post-24994","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-criminal-defense","category-felony","tag-13-2316","tag-arizona","tag-ars-13-2316","tag-computer-hacking","tag-computer-tampering","tag-critical-infrastructure","tag-critical-infrastructure-resource","tag-deleting-data","tag-destroying-programs","tag-hacking-a-computer","tag-hacking-into-a-computer","tag-illegal-computer-use","tag-lake-havasu-city","tag-rideout-law-group","tag-scottsdale","tag-unauthorized-computer-use","tag-unauthorized-use-of-a-computer","post_format-post-format-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computer Tampering Laws: A.R.S. 13-2316 - Rideout Law Group<\/title>\n<meta name=\"description\" content=\"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Tampering Laws: A.R.S. 13-2316\" \/>\n<meta property=\"og:description\" content=\"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\" \/>\n<meta property=\"og:site_name\" content=\"Rideout Law Group\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-29T10:53:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brad Rideout\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brad Rideout\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\"},\"author\":{\"name\":\"Brad Rideout\",\"@id\":\"https:\/\/rideoutlaw.com\/#\/schema\/person\/8b544dfe73cf6a15279ec30099c7ce94\"},\"headline\":\"Computer Tampering Laws: A.R.S. 13-2316\",\"datePublished\":\"2023-12-29T10:53:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\"},\"wordCount\":1024,\"publisher\":{\"@id\":\"https:\/\/rideoutlaw.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg\",\"keywords\":[\"13-2316\",\"Arizona\",\"ars 13-2316\",\"computer hacking\",\"computer tampering\",\"critical infrastructure\",\"critical infrastructure resource\",\"deleting data\",\"destroying programs\",\"hacking a computer\",\"hacking into a computer\",\"illegal computer use\",\"Lake Havasu City\",\"Rideout Law Group\",\"Scottsdale\",\"unauthorized computer use\",\"unauthorized use of a computer\"],\"articleSection\":[\"Criminal Defense\",\"Felony\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\",\"url\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\",\"name\":\"Computer Tampering Laws: A.R.S. 13-2316 - Rideout Law Group\",\"isPartOf\":{\"@id\":\"https:\/\/rideoutlaw.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg\",\"datePublished\":\"2023-12-29T10:53:51+00:00\",\"description\":\"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.\",\"breadcrumb\":{\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage\",\"url\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg\",\"contentUrl\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Computer tampering is a felony.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rideoutlaw.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Tampering Laws: A.R.S. 13-2316\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rideoutlaw.com\/#website\",\"url\":\"https:\/\/rideoutlaw.com\/\",\"name\":\"Rideout Law Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/rideoutlaw.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rideoutlaw.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/rideoutlaw.com\/#organization\",\"name\":\"Rideout Law Group\",\"url\":\"https:\/\/rideoutlaw.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/rideoutlaw.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2019\/03\/rideoutlawgroup-logo-reverse.png\",\"contentUrl\":\"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2019\/03\/rideoutlawgroup-logo-reverse.png\",\"width\":1299,\"height\":149,\"caption\":\"Rideout Law Group\"},\"image\":{\"@id\":\"https:\/\/rideoutlaw.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/rideoutlaw.com\/#\/schema\/person\/8b544dfe73cf6a15279ec30099c7ce94\",\"name\":\"Brad Rideout\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g\",\"caption\":\"Brad Rideout\"},\"url\":\"https:\/\/rideoutlaw.com\/es\/author\/bradrideoutlaw-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Computer Tampering Laws: A.R.S. 13-2316 - Rideout Law Group","description":"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/","og_locale":"es_ES","og_type":"article","og_title":"Computer Tampering Laws: A.R.S. 13-2316","og_description":"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.","og_url":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/","og_site_name":"Rideout Law Group","article_published_time":"2023-12-29T10:53:51+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg","type":"image\/jpeg"}],"author":"Brad Rideout","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brad Rideout","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#article","isPartOf":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/"},"author":{"name":"Brad Rideout","@id":"https:\/\/rideoutlaw.com\/#\/schema\/person\/8b544dfe73cf6a15279ec30099c7ce94"},"headline":"Computer Tampering Laws: A.R.S. 13-2316","datePublished":"2023-12-29T10:53:51+00:00","mainEntityOfPage":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/"},"wordCount":1024,"publisher":{"@id":"https:\/\/rideoutlaw.com\/#organization"},"image":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage"},"thumbnailUrl":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg","keywords":["13-2316","Arizona","ars 13-2316","computer hacking","computer tampering","critical infrastructure","critical infrastructure resource","deleting data","destroying programs","hacking a computer","hacking into a computer","illegal computer use","Lake Havasu City","Rideout Law Group","Scottsdale","unauthorized computer use","unauthorized use of a computer"],"articleSection":["Criminal Defense","Felony"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/","url":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/","name":"Computer Tampering Laws: A.R.S. 13-2316 - Rideout Law Group","isPartOf":{"@id":"https:\/\/rideoutlaw.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage"},"image":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage"},"thumbnailUrl":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg","datePublished":"2023-12-29T10:53:51+00:00","description":"Computer tampering, or hacking into another computer or computer system, can result in charges ranging from class 6 to class 2 felonies.","breadcrumb":{"@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#primaryimage","url":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg","contentUrl":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2023\/12\/Computer-scaled.jpg","width":2560,"height":1707,"caption":"Computer tampering is a felony."},{"@type":"BreadcrumbList","@id":"https:\/\/rideoutlaw.com\/computer-tampering-laws-a-r-s-13-2316\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rideoutlaw.com\/es\/"},{"@type":"ListItem","position":2,"name":"Computer Tampering Laws: A.R.S. 13-2316"}]},{"@type":"WebSite","@id":"https:\/\/rideoutlaw.com\/#website","url":"https:\/\/rideoutlaw.com\/","name":"Rideout Law Group","description":"","publisher":{"@id":"https:\/\/rideoutlaw.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rideoutlaw.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/rideoutlaw.com\/#organization","name":"Rideout Law Group","url":"https:\/\/rideoutlaw.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/rideoutlaw.com\/#\/schema\/logo\/image\/","url":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2019\/03\/rideoutlawgroup-logo-reverse.png","contentUrl":"https:\/\/rideoutlaw.com\/wp-content\/uploads\/2019\/03\/rideoutlawgroup-logo-reverse.png","width":1299,"height":149,"caption":"Rideout Law Group"},"image":{"@id":"https:\/\/rideoutlaw.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/rideoutlaw.com\/#\/schema\/person\/8b544dfe73cf6a15279ec30099c7ce94","name":"Brad Rideout","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e90d6e584b929eababdb5a6868123d754034d29c9520fa4d56c8e3d69deb49f?s=96&d=mm&r=g","caption":"Brad Rideout"},"url":"https:\/\/rideoutlaw.com\/es\/author\/bradrideoutlaw-com\/"}]}},"_links":{"self":[{"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/posts\/24994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/comments?post=24994"}],"version-history":[{"count":2,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/posts\/24994\/revisions"}],"predecessor-version":[{"id":24998,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/posts\/24994\/revisions\/24998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/media\/24996"}],"wp:attachment":[{"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/media?parent=24994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/categories?post=24994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rideoutlaw.com\/es\/wp-json\/wp\/v2\/tags?post=24994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}