Current as of: 2010
(5) all property, real, personal or mixed, that has been used or intended for use, maintained or acquired in violation of the Computer Crimes Act; and
(6) all money or proceeds that constitute an instrumentality or derive from a violation of the Computer Crimes Act.
A. The following are subject to forfeiture:
(3) all books, records and research products and materials involving formulas, microfilm, tapes and data that are used or intended for use in violation of the Computer Crimes Act;
(1) all computer property, equipment or products of any kind that have been used, manufactured, acquired or distributed in violation of the Computer Crimes Act [30-45-1 NMSA 1978];
(2) all materials, products and equipment of any kind that are used or intended for use in manufacturing, using, accessing, altering, disrupting, copying, concealing, destroying, transferring, delivering, importing or exporting any computer property or computer service in violation of the Computer Crimes Act;
(4) all conveyances, including aircraft, vehicles or vessels, that are used or intended for use to transport or in any manner to facilitate the transportation of property described in this subsection for the purpose of violating the Computer Crimes Act;
B. The provisions of the Forfeiture Act [31-27-1 NMSA 1978] apply to the seizure, forfeiture and disposal of property subject to forfeiture pursuant to Subsection A of this section.
U.S. Code Provisions: Computer Crimes
Related Articles: Computer Crimes