Computer Related Offense Act Protects Individuals and Companies

By Scott I. Unger on April 17th, 2020

Posted in Business & Corporate, Cybersecurity

If you are reading this blog post, it is extremely likely that you are reading it on a personal computer at home, on your office computer, on your smart phone, or on all of the above. It is without question that the invention of computers has changed our lives. What was impossible even five years ago is now considered “normal.” For example, I have written this very blog post while seamlessly working remotely from home because my law firm, Stark & Stark, has provided me with the tools and resources to do so. Thankfully, I am able to utilize this technology while my firm protects me and my colleagues from COVID-19.

Unfortunately, there is also a dark side to the increased use of computers, which gives rise to different legal issues. Cybercriminals pray upon various vulnerabilities within computer networks and user mistakes. Rogue employees have easy access to confidential information, accounts, and money.

Legislation, like New Jersey’s Computer Related Offense Act, N.J.S.A. 2A:38-1, et. seq., provides victims of cybercrime, employee misuse, destruction, or unauthorized taking of computer information or programs with the ability to sue wrongdoers. The Computer Related Offense Act protects against the taking of any data and creates a private cause of action against any actor (individual, corporation, entity, or group) who purposefully or knowingly accesses, alters, damages, takes, or destroys computer information.

Successful Computer Related Offense Act claimants may recover compensatory and punitive damages, as well as the costs of bringing the lawsuit, including reasonable attorney’s fees, costs associated with the investigation, and litigation. N.J.S.A. 2A:38A-3.

Individuals and businesses should take important steps to protect their computers and network, including:

  1. establishing and keeping firewalls;
  2. installing and updating antivirus software;
  3. installing and updating antispyware technology;
  4. keeping the operating system up-to-date;
  5. creating and utilizing lengthy and complex passwords;
  6. not carelessly downloading e-mail attachments; and
  7. training employees to prevent cybercrime.

Unfortunately, those steps may not be enough to prevent the misuse, destruction, or unauthorized access to computer networks and data. Hence, legislation like New Jersey’s Computer Related Offense Act offers recourse to victims.

Multiple locations to better serve your needs—

Hamilton, NJ

100 American Metro Boulevard
Hamilton, NJ 08619
Phone: 609.896.9060
Secondary phone: 800.535.3425
Fax: 609.896.0629
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer

Philadelphia, PA

One Liberty Place, 1650 Market St., Suite 3600
Philadelphia, PA 19103
Phone: 267.907.9600
Secondary phone: 800.535.3425
Fax: 215.564.6245
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer

Marlton, NJ

40 Lake Center, 401 NJ-73, Suite 130
Marlton, NJ 08053
Phone: 856.874.4443
Secondary phone: 888.241.7424
Fax: 856.874.0133
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer

Yardley, PA

777 Township Line Road, Suite 120
Yardley, PA 19067
Phone: 267.907.9600
Fax: 267.907.9659
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer

New York, NY

5 Pennsylvania Plaza 23rd Floor
New York, NY 10001
Phone: 800.535.3425
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer

Bridgeton, NJ

78 W Broad St
Bridgeton, NJ 08302
Phone: 856.874.4443
county best pa pennsylvania reviews south jersey berks northhampton montgomery bucks lehigh valley gloucester burlington mercer