Computer CrimesComputer Invasion of Privacy
Virginia Code § 18.2-152.5

Virginia Computer Invasion of Privacy Defense

Virginia's computer invasion of privacy statute targets the unauthorized examination of personal information through a computer. What begins as a misdemeanor can escalate to a felony when financial records are involved or when the information is used to commit another crime. D.J. Rivera provides the technical and legal expertise to challenge these charges at every level.

What Is Computer Invasion of Privacy?

Virginia Code § 18.2-152.5 — Computer Invasion of Privacy

It shall be unlawful for any person to use a computer or computer network to examine without authority any employment, salary, credit, or any other financial or personal information relating to any other person. "Examination" includes the copying of such information. The intent to examine is sufficient; no further use or disclosure of the information is required for the offense to be complete.

Unlike computer fraud or computer trespass, computer invasion of privacy does not require any damage, alteration, or theft of data. The mere act of examining personal information about another person without authority — even if the information is not copied, shared, or used — is sufficient to constitute the offense. This makes § 18.2-152.5 one of the broadest and most easily charged computer crime statutes in Virginia.

The statute is frequently charged in cases involving employees who access co-workers' personnel files, individuals who access ex-partners' accounts, and professionals who look up client or patient information beyond the scope of their authorized access. It is also commonly charged alongside identity theft and stalking offenses.

Penalties for Computer Invasion of Privacy

OffenseClassificationMaximum Penalty
Examination of personal informationClass 3 MisdemeanorUp to $500 fine
Examination of financial/employment recordsClass 2 MisdemeanorUp to 6 months / $1,000 fine
Repeat offense or used in another crimeClass 6 Felony1–5 years / $2,500 fine

Note: Even a misdemeanor conviction for computer invasion of privacy can have serious professional consequences — particularly for healthcare workers, financial professionals, and government employees with security clearances. A felony conviction is career-ending in many fields.

Defense Strategies

1. Scope of Authorization

The central defense in most computer invasion of privacy cases is whether the defendant had authority to access the information. Authorization is not always clearly defined — employees often have broad system access that may implicitly include access to information beyond their specific job function. D.J. Rivera examines the defendant's role, the system's access controls, and the employer's policies to establish that the defendant's access was within the scope of their authorization.

2. Lack of Intent to Examine

The statute requires an intent to examine personal information. Inadvertent access — such as stumbling upon personal information while conducting an authorized search — does not constitute computer invasion of privacy. D.J. Rivera develops evidence of the defendant's purpose and the context of the access to demonstrate that any viewing of personal information was incidental rather than intentional.

3. Challenging the Definition of "Personal Information"

The statute covers "employment, salary, credit, or any other financial or personal information." The scope of what constitutes "personal information" is not unlimited. Publicly available information, information the defendant had a legitimate interest in accessing, and information that does not relate to a specific identifiable person may fall outside the statute's coverage.

4. Fourth Amendment Suppression

Evidence of the alleged examination — typically access logs, forensic analysis of browser history, or system audit trails — must be obtained through constitutionally valid means. D.J. Rivera scrutinizes every search warrant and investigative technique used to obtain this evidence and files suppression motions where appropriate.

Why D.J. Rivera for Computer Privacy Defense

Computer invasion of privacy cases turn on technical evidence — access logs, audit trails, and forensic analysis of system activity. D.J. Rivera's GCFE certification and D.Eng. in Cybersecurity Analytics give him the expertise to challenge this evidence at the same level as the investigators who collected it. He understands how access control systems work, how audit logs are generated and can be misinterpreted, and how to present technical defenses to a judge and jury in clear, compelling terms.

D.Eng. Cybersecurity (GWU)CISSPGCFECEHUS Cyber CommandVirginia & Federal Courts

Facing Computer Privacy Charges in Virginia?

D.J. Rivera is available 24/7 for a free, confidential consultation.

Get Your Free Consultation Now