← Back to White-Collar & Financial Crime Defense
Computer / cyber crimes can be charged in Florida state court under §815.06 (offenses against users of computers) and §815.04 (offenses against intellectual property), or federally under the Computer Fraud and Abuse Act (18 U.S.C. §1030). Early counsel helps control your exposure, preserve favorable digital artifacts, and push back on overbroad warrants or “exceeds authorization” theories.
Key definitions (e.g., “computer contaminant”) appear in §815.03.
Penalties & ExposureFlorida penalties depend on conduct and loss thresholds. Unauthorized access may be a third-degree felony; higher degrees can apply if losses exceed statutory amounts, government operations are affected, or victims suffer harm (§815.06). Federal penalties under 18 U.S.C. §1030 can include fines, forfeiture, and prison, often hinging on “unauthorized access,” intent, and valuation.
Scheme to Defraud Organized fraud under §817.034 and value thresholds.
Identity Theft Fraudulent use of personal identifying information (§817.568).
Money Laundering Tracing proceeds, structuring, and intent challenges.
Federal Crimes Defense When investigations move to U.S. agencies and courts.
We defend computer and cyber allegations across Central Florida, including Orange, Osceola, Seminole, Lake, and Brevard counties.
Next Step: Before you speak with agents or click “send,” talk to us. Call 407-214-3837 or request a confidential consult. See recent case results and learn about our credentials. We also handle asset forfeiture issues and record sealing/expungement when eligible.
Is violating a website’s Terms of Service a crime?
Not by itself. Prosecutors must prove the required mental state and elements under Florida law or the CFAA; mere policy violations often are not enough.
Can the state search my entire phone or cloud account?
Not without lawful scope and particularity. We challenge overbroad warrants and suppress unlawfully obtained data where appropriate.
What if multiple people used the same device or Wi-Fi?
Attribution is key. We examine logs, timestamps, router records, and artifacts to show reasonable doubt about “who” performed the act.
Fill out the form below for an free evaluation of your case.


