RSA 638:21 Definitions

LibraryNew Hampshire Statutes
Edition2023
CurrencyCurrent through 2023 Legislative Session
Year2023
CitationRSA 638:21

In this subdivision:

I."Access device'' means property consisting of any telephone calling card number, credit card number, account number, mobile identification number electronic serial number, personal identification number, or any other data intended to control or limit access to telecommunications or other computer networks in either human readable or computer readable form, either copy or original, that can be used to obtain telephone service.

II."Clone'' means to program or reprogram a wireless telephone or access device with an electronic serial number, mobile identification number, or personal identification number which has been obtained from a registered wireless telephone without the consent of the telecommunication service provider.

III."Defaced access device'' means any cloned wireless telephone or access device in either human readable or computer readable form, either copy or original, which has been removed, erased defaced, altered, destroyed, covered, or otherwise changed in any manner from its original configuration. In any prosecution regarding a defaced access device, any removal, erasure, defacement, alteration, destruction, covering, or other change in such access device from its original configuration performed by any person other than an authorized manufacturer of, or service provider to, access devices shall be presumed to be for an unlawful purpose.

IV."Manufacture'' means to produce or assemble, modify, alter, program, or re-program any wireless telephone or reader without the consent of the telecommunication service provider.

V."Reader'' means a device which is capable of, or has been manufactured, assembled, altered, modified, programmed, or re-programmed so as to be capable of acquiring or facilitating the acquisition of an electronic serial number, mobile identification number, personal identification number, or any code, or encoded or encrypted transmission, used in originating, facilitating, or transmitting telecommunication service without the consent of the telecommunication service provider.

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT