top of page

Part 3. Offenses Involving Communications

§ 18-9-301. Definitions

As used in sections 18-9-301 to 18-9-305, unless the context otherwise requires:
(1) “Aggrieved person” means a person who was a party to any intercepted wire, oral, or electronic communication or a person against whom the interception was directed.
(1.5) “Aural transfer” means a transfer containing the human voice at any point between and including the point of origin and the point of reception.
(2) “Common carrier” means any person engaged as a common carrier for hire in intrastate, interstate, or foreign communication by wire or radio or in intrastate, interstate, or foreign radio transmission of energy.
(3) “Contents”, when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication.
(3.3) “Electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic, or photooptical system that affects interstate or foreign commerce but does not include:
(a) (Deleted by amendment, L. 97, p. 602, § 2, effective August 6, 1997.)
(b) Any wire or oral communication;
(c) Any communication made through a tone-only paging device; or
(d) Any communication from a tracking device.
(3.5) “Electronic communication service” means any service which provides to users thereof the ability to send or receive wire or electronic communications.
(3.7) “Electronic communications system” means any wire, radio, electromagnetic, photooptical, or photoelectronic facilities for the transmission of electronic communications and any computer facilities or related electronic equipment for the electronic storage of such communications.
(4) “Electronic, mechanical, or other device” means any device or apparatus which can be used to intercept a wire, oral, or electronic communication, other than:
(a) Any telephone or telegraph instrument, equipment, or facility, or any component thereof, furnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business, or furnished by such subscriber or user for connection to the facilities of such service and being used in the ordinary course of its business, or being used by a provider of wire or electronic communication service in the ordinary course of its business or by an investigative or law enforcement officer in the ordinary course of his duties;
(b) A hearing aid or similar device being used to correct subnormal hearing to not better than normal hearing.
(4.5) “Electronic storage” means:
(a) Any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and
(b) Any storage of such communication by an electronic communication service for purposes of backup protection of such communication.
(5) “Intercept” means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.
(6) “Investigative or law enforcement officer” means any officer of the United States or of the state of Colorado or a political subdivision thereof who is empowered by law to conduct investigations of, or to make arrests for, offenses enumerated in this part 3, and any attorney authorized by law to prosecute or participate in the prosecution of such offenses.
(7) “Judge of competent jurisdiction” means any justice of the supreme court or a judge of any district court of the state of Colorado.
(8) “Oral communication” means any oral communication uttered by any person believing that such communication is not subject to interception, under circumstances justifying such belief, but does not include any electronic communication.
(8.3) “Pen register” means a device which records or decodes electronic or other impulses which identify the numbers dialed or otherwise transmitted on the telephone line to which such device is attached but shall not include any device used by a provider or customer of a wire or electronic communication service for billing, or recording as an incident to billing, for communications services provided by such provider or any device used by a provider or customer of a wire communication service for cost accounting or other like purposes in the ordinary course of its business.
(8.5) “Readily accessible to the general public” means, with respect to a radio communication, that such communication is not:
(a) Scrambled or encrypted;
(b) Transmitted using modulation techniques having essential parameters withheld from the public with the intention of preserving the privacy of such communication;
(c) Carried on a subcarrier or other signal subsidiary to a radio transmission;
(d) Transmitted over a communication system provided by a common carrier, unless the communication is a tone-only paging system communication; or
(e) Transmitted on frequencies allocated under part 25, subpart D, E, or F of part 74, or part 94 of the rules of the federal communications commission, unless, in the case of a communication transmitted on a frequency allocated under part 74 that is not exclusively allocated to broadcast auxiliary services, the communication is a two-way voice communication by radio.
(8.7) “Trap and trace device” means a device which captures the incoming electronic or other impulses which identify the originating number of an instrument or device from which a wire or electronic communication was transmitted.
(8.9) “User” means any person or entity which uses an electronic communication service and is duly authorized by the provider of such service to engage in such use.
(9) “Wire communication” means any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like connection, including the use of such connection in a switching station, between the point of origin and the point of reception, furnished or operated by any person engaged in providing or operating such facilities for the transmission of communications and includes any electronic storage of such communication.

§ 18-9-302. Wiretapping and eavesdropping devices prohibited - penalty

[This version of this section is effective until March 1, 2022.]Any person who manufactures, buys, sells, or knowingly has in his possession any instrument, device, contrivance, machine, or apparatus designed or commonly used for wiretapping or eavesdropping, as prohibited in sections 18-9-303 and 18-9-304, with the intent to unlawfully use or employ or allow the same to be so used or employed, or who knowingly aids, authorizes, agrees with, employs, permits, or conspires with any person to unlawfully manufacture, buy, sell, or have the same in his possession is guilty of a class 2 misdemeanor. Upon commission of a second or subsequent offense, any person committing the same commits a class 5 felony. [This version of this section is effective March 1, 2022.]Any person who manufactures, buys, sells, or knowingly has in the person’s possession any instrument, device, contrivance, machine, or apparatus designed or commonly used for wiretapping or eavesdropping, as prohibited in sections 18-9-303 and 18-9-304, with the intent to unlawfully use or employ or allow the same to be so used or employed, or who knowingly aids, authorizes, agrees with, employs, permits, or conspires with any person to unlawfully manufacture, buy, sell, or have the same in the person’s possession is guilty of a petty offense. Upon commission of a second or subsequent offense, any person committing the same commits a class 5 felony.

§ 18-9-303. Wiretapping prohibited - penalty

(1) Any person not a sender or intended receiver of a telephone or telegraph communication commits wiretapping if he:
(a) Knowingly overhears, reads, takes, copies, or records a telephone, telegraph, or electronic communication without the consent of either a sender or a receiver thereof or attempts to do so; or
(b) Intentionally overhears, reads, takes, copies, or records a telephone, telegraph, or electronic communication for the purpose of committing or aiding or abetting the commission of an unlawful act; or
(c) Knowingly uses for any purpose or discloses to any person the contents of any such communication, or attempts to do so, while knowing or having reason to know the information was obtained in violation of this section; or
(d) Knowingly taps or makes any connection with any telephone or telegraph line, wire, cable, or instrument belonging to another or with any electronic, mechanical, or other device belonging to another or installs any device whether connected or not which permits the interception of messages; or
(e) Repealed.
(f) Knowingly uses any apparatus to unlawfully do, or cause to be done, any act prohibited by this section or aids, authorizes, agrees with, employs, permits, or intentionally conspires with any person to violate the provisions of this section.
(2) [This version of subsection (2) is effective until March 1, 2022.] Wiretapping is a class 6 felony; except that, if the wiretapping involves a cordless telephone, it is a class 1 misdemeanor.
(2) [This version of subsection (2) is effective March 1, 2022.] Wiretapping is a class 6 felony; except that, if the wiretapping involves a cordless telephone, it is a class 2 misdemeanor.

§ 18-9-304. Eavesdropping prohibited - penalty

(1) Any person not visibly present during a conversation or discussion commits eavesdropping if he:
(a) Knowingly overhears or records such conversation or discussion without the consent of at least one of the principal parties thereto, or attempts to do so; or
(b) Intentionally overhears or records such conversation or discussion for the purpose of committing, aiding, or abetting the commission of an unlawful act; or
(c) Knowingly uses for any purpose, discloses, or attempts to use or disclose to any other person the contents of any such conversation or discussion while knowing or having reason to know the information was obtained in violation of this section; or
(d) Knowingly aids, authorizes, agrees with, employs, permits, or intentionally conspires with any person to violate the provisions of this section.
(2) [This version of subsection (2) is effective until March 1, 2022.] Eavesdropping is a class 1 misdemeanor.
(2) [This version of subsection (2) is effective March 1, 2022.] Eavesdropping is a class 2 misdemeanor.

§ 18-9-305. Exceptions

(1) Nothing in sections 18-9-302 to 18-9-304 shall be interpreted to prevent a news agency, or an employee thereof, from using the accepted tools and equipment of that news medium in the course of reporting or investigating a public and newsworthy event; nor shall said sections prevent any person from using wiretapping or eavesdropping devices on his own premises for security or business purposes if reasonable notice of the use of such devices is given to the public.
(2) No part of sections 18-9-302 to 18-9-304 shall apply to the normal use of services, facilities, and equipment provided by a provider of wire or electronic communication service pursuant to its tariffs on file with the public utilities commission of the state of Colorado and with the federal communications commission; and said sections shall not apply to the normal functions of any operator of a switchboard nor to any officer, agent, or employee of a provider of wire or electronic communication service or other person engaged in the business of providing service, equipment, and facilities for communication who performs an otherwise prohibited act if such act is necessary to provide the communication services, equipment, or facilities or is necessary in the construction, maintenance, repair, operations, or use of the same, including the obtaining of billing and accounting information, the protecting of the communication services, equipment, and facilities from illegal use in violation of the tariffs referred to in this subsection (2), the protecting of the provider of wire or electronic communication service from the commission of fraud against it, and the providing of requested information in response to a subpoena or court order issued by a court of competent jurisdiction or on demand of other lawful authority.
(3) It shall not be unlawful under sections 18-9-302 to 18-9-304 for an officer, employee, or agent of any provider of wire or electronic communication service or other person to provide information, facilities, or technical assistance to an investigative or law enforcement officer who, pursuant to section 16-15-102, C.R.S., is authorized to intercept a wire, oral, or electronic communication for that purpose.
(4) A good faith reliance on a court order or the provisions of article 15 of title 16, C.R.S., shall constitute a complete defense to any criminal action brought under provision of sections 18-9-302 to 18-9-304 or any civil action brought under any other law of the state of Colorado. This section shall not be construed in any manner which would allow an investigative or law enforcement officer of the state of Colorado to engage in any wiretapping or eavesdropping without prior authorization by a court of competent jurisdiction under the provisions of article 15 of title 16, C.R.S., except as provided in section 16-15-102 (18), C.R.S.
(4.3) It shall not be unlawful under sections 18-9-302 to 18-9-304 for any person:
(a) To intercept or access an electronic communication made through an electronic communications system that is configured so that such electronic communication is readily accessible to the general public;
(b) To intercept any radio communication which is transmitted by:
(I) Any station for the use of the general public or that relates to ships, aircraft, vehicles, or persons in distress;
(II) Any governmental, law enforcement, civil defense, private land mobile, or public safety communications system, including police and fire, readily accessible to the general public;
(III) A station operating on an authorized frequency within the bands allocated to the amateur, citizens band, or general mobile radio services; or
(IV) Any marine or aeronautical communications system;
(c) To engage in any conduct which is:
(I) Prohibited by section 633 of the federal “Communications Act of 1934”, as amended; or
(II) Excepted from the application of section 705 (a) of the federal “Communications Act of 1934”, as amended, by section 705 (b) of said act;
(d) To intercept any wire or electronic communication, the transmission of which is causing harmful interference to any lawfully operating station or consumer electronic equipment, to the extent necessary to identify the source of such interference; or
(e) For other users of the same frequency to intercept any radio communication made through a system that utilizes frequencies monitored by individuals engaged in the provision or the use of such system, if such communication is not scrambled or encrypted.
(4.5) It shall not be unlawful under sections 18-9-302 to 18-9-304:
(a) To use a pen register or a trap and trace device; or
(b) For a provider of electronic communication service to record the fact that a wire or electronic communication was initiated or completed in order to protect such provider, another provider furnishing service toward the completion of the wire or electronic communication, or a user of that service from fraudulent, unlawful, or abusive use of such service.
(4.7) A person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication other than a communication to such person or entity, or an agent thereof, while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient; except that a person or entity providing electronic communication service to the public may divulge the contents of any such communication:
(a) As otherwise authorized in section 16-15-102 (12), (13), (14), and (16), C.R.S., and subsections (2) and (3) of this section;
(b) With the lawful consent of the originator or any addressee or intended recipient of such communication;
(c) To a person employed or authorized, or whose facilities are used, to forward such communication to its destination; or
(d) Which were inadvertently obtained by the service provider and which appear to pertain to the commission of a crime, if such divulgence is made to a law enforcement agency.
(4.9) It shall not be unlawful for a district attorney or law enforcement officer to listen to a recording of or to read a transcription of the contents of an electronic communication involving a cordless telephone when the district attorney or law enforcement officer has come into possession of such materials from a third party. In order to use such materials as evidence in a prosecution for a crime other than wiretapping or eavesdropping, the district attorney or law enforcement officer shall have a reasonable basis for believing that the recording or transcription is reliable and shall also have separate probable cause based on corroborating evidence to support a reasonable belief that the crime was committed. Nothing in this subsection (4.9) shall preclude a district attorney from prosecuting a person for a violation of section 18-9-303 or 18-9-304.
(5) The exceptions in this section shall be affirmative defenses.

§ 18-9-306. Abuse of telephone and telegraph service

(1) [This version of the introductory portion to subsection (1) is effective until March 1, 2022.] A person commits a class 3 misdemeanor, if:
(1) [This version of the introductory portion to subsection (1) is effective March 1, 2022.] A person commits abuse of telephone and telegraph service, if:
(a) As an employee of a telegraph or telephone company he knowingly divulges the contents or the purport of any message or part thereof sent or intended to be sent to any person other than one to whom said message is sent or person authorized to receive the same; or
(b) He knowingly sends or delivers a false message or furnishes or conspires to furnish such message to an operator to be sent or delivered with intent to injure, deceive, or defraud any person, corporation, or the public; or
(c) He knowingly and without authorization opens any sealed envelope enclosing a message with the purpose of learning the contents; or
(d) He impersonates another, and thereby procures the delivery to himself of the message directed to such person, with the intent to use, destroy, or detain the same; or
(e) He knowingly and without authorization reads or learns the contents or meaning of a message on its transit and uses or communicates to another any information so obtained; or
(f) He knowingly bribes a telegraph or telephone operator or employee of a telegraph or telephone company to disclose any private message or the purport of the same received by him by reason of his trust as agent of the company or uses such information when thus obtained.
(2) [Subsection (2) is effective March 1, 2022.] Abuse of telephone and telegraph service is a civil infraction.

§ 18-9-306.5. Obstruction of telephone or telegraph service

(1) A person commits obstruction of telephone or telegraph service if the person knowingly prevents, obstructs, or delays, by any means whatsoever, the sending, transmission, conveyance, or delivery in this state of any message, communication, or report by or through any telegraph or telephone line, wire, cable, or other facility or any cordless, wireless, electronic, mechanical, or other device.
(2) Obstruction of telephone or telegraph service is a class 1 misdemeanor.

§ 18-9-307. Refusal to yield party line - repeal

(1) The following definitions are applicable to this section:
(a) “Party line” means a subscribers’ line telephone circuit, consisting of two or more main telephone stations connected therewith, each station with a distinctive ring or telephone number.
(b) “Emergency” means a situation in which property or human safety is in jeopardy and the prompt summoning of aid is essential.
(2) Any person who willfully refuses to immediately yield or surrender the use of a party line when informed that the line is needed for an emergency call to a fire department, or police department, or sheriff’s office or for medical aid or ambulance service commits a class 1 petty offense. This section shall not apply to persons using a party line for such an emergency call.
(3) Any person who requests the use of a party line on the pretext that an emergency exists, knowing that no emergency in fact exists, commits a class 1 petty offense, punishable by a fine of one hundred dollars.
(4) This section is repealed, effective March 1, 2022.

§ 18-9-308. Telephone directories to contain notice - repeal

(1) Every telephone directory published for distribution to the members of the general public shall contain a notice which explains the provisions of section 18-9-307. Such notice shall be printed in type which is no smaller than ten-point type and shall be preceded by the word “WARNING”. The provisions of this section shall not apply to those directories distributed solely for business advertising purposes, commonly known as classified directories. Any person, firm, or corporation providing telephone service which distributes or causes to be distributed in this state telephone directories which are subject to the provisions of this section and which do not contain the notice provided for in this section commits a class 1 petty offense.
(2) This section is repealed, effective March 1, 2022.

§ 18-9-309. Telecommunications crime

(1) As used in this section and section 18-9-309.5:
(a) “Access device” means any card, plate, code, account number, or other means of access that can be used, alone or in conjunction with another access device, to obtain telecommunications service.
(a.5) “Cellular phone” means a radio telecommunications device that may be used to obtain telecommunications services and that is programmed with an electronic serial number by or with the consent of the cellular phone manufacturer.
(a.7) “Cloned cellular phone” means a cellular phone, the electronic serial number of which has been altered without the consent of the cellular phone’s manufacturer.
(a.8) “Cloning equipment” means any instrument, apparatus, equipment, computer hardware, computer software, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used, is intended to be used, or is capable of being used:
(I) To intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or
(II) To create cloned cellular phones.
(b) “Credit card number” means the card number appearing on a credit card which is an identification card or plate issued to a person by any supplier of telecommunications service which permits the person to whom the card has been issued to obtain telecommunications service on credit. The term includes the number or description of the card or plate even if the card or plate itself is not produced at the time of obtaining telecommunications service.
(b.7) “Electronic serial number” means an electronic number that is programmed into a cellular phone by or with the consent of the manufacturer, transmitted by the cellular phone, and used by cellular phone telecommunications providers to validate radio transmissions as having been made by cellular phones authorized or approved by telecommunications providers.
(c) “Illegal telecommunications equipment” means any instrument, apparatus, equipment, computer hardware, computer software, mechanism, operating procedure or code, or device, whether used separately or in combination, that is designed or adapted and is used or is intended to be used to evade the lawful charges for any telecommunications service or for concealing from any telecommunications provider or lawful authority the existence, place of origin, or destination of any telecommunication. Illegal telecommunications equipment includes cloned cellular phones.
(c.5) To “intercept signals” means to electronically capture, record, reveal, or otherwise access signals, including data, electronic serial numbers, and mobile identification numbers, that are emitted, transmitted, or received by a telecommunications provider without consent of the telecommunications provider or the person receiving or initiating the signal.
(c.7) “Mobile identification number” means the cellular phone number assigned to a cellular phone by the cellular phone telecommunications provider.
(d) “Telecommunications device” means any instrument, apparatus, method, system, or equipment which controls, measures, directs, or facilitates telecommunications service. The term includes, but is not limited to, computer hardware, software, programs, electronic mail systems, voice mail systems, identification validation systems, and private branch exchanges.
(e) “Telecommunications provider” means any person, firm, association, or any corporation, private or municipal, owning, operating, or managing any facilities used to provide telecommunications service.
(f) “Telecommunications service” means a service which, in exchange for a pecuniary consideration, provides or offers to provide transmission of messages, signals, facsimiles, or other communication between persons who are physically separated from each other by means of telephone, telegraph, cable, wire, or the projection of energy without physical connection.
(g) “Telephone company” means any telecommunications provider which provides local exchange telecommunications service.
(2) [This version of the introductory portion to subsection (2) is effective until March 1, 2022.] A person commits a class 3 misdemeanor if he or she knowingly:
(2) [This version of the introductory portion to subsection (2) is effective March 1, 2022.] A person commits a civil infraction if he or she knowingly:
(a) Accesses, uses, manipulates, or damages any telecommunications device without the authority of the owner or person who has the lawful possession or use thereof;
(b) Makes, possesses, or uses illegal telecommunications equipment; except that a person who knowingly uses cloning equipment to create a cloned cellular phone commits a class 4 felony as provided in subsection (4) of this section;
(c) Sells, gives, or furnishes to another or advertises or offer for sale illegal telecommunications equipment;
(d) Sells, gives, or furnishes to another or advertises or offers for sale any plans or instructions for making, assembling, or using illegal telecommunications equipment; or
(e) Sells, rents, lends, gives, publishes, or otherwise transfers or discloses to another or offers or advertises for sale or rental the number or code of a counterfeited, canceled, expired, revoked, or nonexistent telephone number or credit card number or method of numbering or coding which is employed in the issuance of telephone numbers access devices or credit card numbers or an existing number or code or method of numbering or coding without the authority of the owner or person who has the lawful possession or use thereof.
(2.5) A person commits a class 6 felony if, within five years after a previous violation of subsection (2) of this section, the person commits a second or subsequent violation of subsection (2) of this section; except that a second or subsequent violation of subsection (2) of this section involving knowingly using cloning equipment to create a cloned cellular phone, as described in paragraph (b) of subsection (2) of this section, is a class 4 felony.
(3) A person commits theft as defined in section 18-4-401 and shall be subject to the penalties as set forth in that section if he knowingly:
(a) Obtains any telecommunications service by charging such service to or causing such service to be charged to an existing telephone number, access device, or credit card number without the authority of the person to whom issued or of the subscriber thereto or of the lawful holder thereof or to a nonexistent, counterfeit, expired, revoked, or canceled credit card number, or by any method of code calling, or by installing, rearranging, or tampering with any equipment, physically or electronically, or by the use of any other fraudulent means, method, trick, or device or scheme;
(b) Obtains telecommunications service with fraudulent intent through the use of a false or fictitious name, telephone number, address, or credit information or through the unauthorized use of the name, telephone number, address, or credit information of another.
(4)
(a) A person commits a class 4 felony if he or she knowingly uses cloning equipment to:
(I) Intercept signals, including signals transmitted to or from cellular phones, between a telecommunications provider and persons using telecommunications services or between persons using telecommunications services; or
(II) Create a cloned cellular phone.
(b) A person commits a class 4 felony if he or she aids, abets, advises, or encourages one or more persons who engage in the activities described in paragraph (a) of this subsection (4).
(c) Each violation of this subsection (4), including each instance of intercepting signals or of creating a cloned cellular phone, shall be a separate offense.
(5) The provisions of this section do not apply to:
(a) Officers, employees, or agents of telecommunications providers who engage in conduct prohibited by this section for the purpose of constructing, maintaining, or conducting telecommunications services or for law enforcement purposes;
(b) Law enforcement officers and public officials in charge of jails, police premises, sheriffs’ offices, department of corrections’ institutions, or other penal or correctional institutions or any other person under the color of law who engages in conduct prohibited by this section for the purpose of law enforcement or in the normal course of the officer’s or official’s employment activities or duties; or
(c) Officers, employees, or agents of federal or state agencies who are authorized to monitor or intercept cellular telephone service in the normal course of the officer’s, employee’s, or agent’s employment.
(6) Prosecution under this section does not preclude civil liability under any applicable provision of law.

§ 18-9-309.5. Civil remedies - injunctions - forfeiture

(1) Whenever it appears that any person is engaged in or about to engage in any act which constitutes or will constitute a violation of section 18-9-309 (2) or (3), the attorney general, the district attorney, a representative of a telecommunications provider, or any person or company harmed by such alleged violation may initiate a civil proceeding in a district court to enjoin such violation and may petition the court to issue an order for the discontinuance of telecommunications service, used in violation of section 18-9-309 (2) or (3).
(2) An action under this section shall be brought in the county in which the subject matter of the action, or some part thereof, is located or found and shall be commenced by the filing of a complaint, which shall be verified by affidavit.
(3) If it is shown to the satisfaction of the court, either by verified complaint or affidavit, that a person is engaged in or about to engage in any act which constitutes a violation of section 18-9-309 (2) or (3), the court shall issue a temporary restraining order to abate and prevent the continuance or recurrence of such act. The court shall direct the sheriff to seize and retain until further order of the court any device which is being used in violation of section 18-9-309 (2) or (3). While the temporary restraining order remains in effect, all property seized pursuant to the order of the court shall remain in the custody of the court. Within fourteen days following the filing of a motion of any person adversely affected by a temporary restraining order, the court shall conduct a hearing and determine whether such temporary restraining order shall be continued pending final determination of the action. Until such hearing takes place, the temporary restraining order shall remain in full force and effect.
(4) The court may issue a permanent injunction to restrain, abate, or prevent the continuance or recurrence of the violation of section 18-9-309 (2) or (3). The court may grant declaratory relief, mandatory orders, or any other relief deemed necessary to accomplish the purposes of the injunction. The court may retain jurisdiction of the case for the purpose of enforcing its orders.
(5) If it is shown to the satisfaction of the court, either by verified complaint or affidavit, that a person is engaged in or is about to engage in any act which constitutes a violation of section 18-9-309 (2) or (3), the court may issue an order which shall be promptly served upon the person in whose name the illegal telecommunications equipment is listed, requiring the party, within a reasonable time to be fixed by the court but not exceeding forty-eight hours from the time of service of the petition on said party, to show cause before the judge why telecommunications service should not promptly be discontinued. At the hearing the burden of proof shall be on the complainant.
(6) Upon a finding by the court that the illegal telecommunications equipment is being used or has been used in violation of section 18-9-309 (2) or (3), the court shall issue an order requiring the telephone company which is rendering service over the device to disconnect such service. Upon receipt of such order, which shall be served upon an officer of the telephone company by the sheriff of the county in which the illegal telecommunications equipment is installed or by a duly authorized deputy, the telephone company shall proceed promptly to disconnect and remove such device and discontinue all telecommunications service until further order of the court.
(7) The telecommunications provider who petitions the court for the removal of any illegal telecommunications equipment under this section shall be a necessary party to any proceeding or action arising out of or under section 18-9-309 (2) or (3).
(8) No telephone company shall be liable for any damages, penalty, or forfeiture, whether civil or criminal, for any act performed in good faith and in compliance with any order issued by the court.
(9) Property seized pursuant to the direction of the court which the court has determined to have been used in violation of section 18-9-309 (2) or (3) shall be forfeited to the state. Prior to the disposition of the seized property, a petition for the remission or mitigation of forfeiture may be filed. The court may remit or mitigate the forfeiture upon terms and conditions as the court deems reasonable if it finds that such forfeiture was incurred without willful negligence or without any intention on the petitioner to violate the law or finds the existence of such mitigating circumstances as to justify the remission or the mitigation of the forfeiture. In determining whether to remit or mitigate forfeiture, the court shall consider losses which may have been suffered by victims as the result of the use of the forfeited property.

§ 18-9-310. Unlawful use of information - penalty

Any person who, having obtained information pursuant to a court order for wiretapping or eavesdropping, knowingly uses, publishes, or divulges the information to any person or in any manner not authorized by this part 3 commits a class 6 felony.

§ 18-9-310.5. False statement to the CBI for sex offender registry information

A person who violates section 16-22-110 (6) or who submits a false statement to the Colorado bureau of investigation to obtain information from the sex offender registry pursuant to section 16-22-110 (6)(g) or (6)(h) commits an unclassified misdemeanor punishable by a fine of up to one thousand dollars for each violation.

§ 18-9-311. Automated dialing systems prohibited

(1) No person shall utilize an automated dialing system with a prerecorded message for the purpose of soliciting another person to purchase goods or services, whether such solicitation occurs or is intended to occur during the prerecorded message or during some further communication initiated by or resulting from the prerecorded message, unless there is an existing business relationship between such persons and the person being called then consents to hear the prerecorded message.
(2) [This version of subsection (2) is effective until March 1, 2022.] Any person who violates this section commits a class 1 petty offense.
(2) [This version of subsection (2) is effective March 1, 2022.] Any person who violates this section commits a petty offense.

§ 18-9-312. Hostage, endangered person, or armed person in geographical area - telephone, electronic, cellular, or digital communications

(1)
(a) Notwithstanding the provisions of sections 18-9-302 to 18-9-311, any supervising representative of a law enforcement agency shall have the authority to order a previously designated security employee of a communications or internet access provider to arrange, to the extent the necessary technology is reasonably available to the provider, to cut, reroute, or divert telephone lines or cellular or digital communications signals if the supervising representative has probable cause to believe that:
(I) A person has taken one or more other persons hostage and is holding the hostages in the geographical area in which the supervising representative has jurisdiction; or
(II) A person has barricaded himself or herself in a structure or a motor vehicle within the geographical area in which the supervising representative has jurisdiction and the supervising representative has a reasonable belief that the person is armed with a deadly weapon or explosive device and poses a danger to himself or herself or others.
(b) The supervising representative of a law enforcement agency may order the cutting, rerouting, or diverting of telephone lines or cellular or digital communications signals pursuant to paragraph (a) of this subsection (1) only for the purpose of preventing telephone or other electronic, cellular, or digital communication by the hostage holder or the armed person with any person other than a peace officer or a person authorized by the peace officer. The communications or internet access provider shall restore the normal operations of the telephone lines or cellular or digital communications signals as soon as practicable following resolution of the exigent circumstances.
(1.5)
(a) Notwithstanding the provisions of sections 18-9-302 to 18-9-311, any supervising representative of a law enforcement agency may order a previously designated security employee of a wireless telecommunications provider to provide to the law enforcement agency, without requiring the agency to obtain a court order, location information concerning the telecommunications device of a named person if the supervising representative has probable cause to believe that:
(I) An emergency situation exists that involves the risk of death or serious bodily injury to the named person or to another person who is in the named person’s company; and
(II) The time required to obtain a search warrant or other court order authorizing the acquisition of the information would increase such risk.
(b) A wireless telecommunications provider may establish protocols by which the provider discloses location information, provided that such protocols shall include keeping a record of:
(I) The name of the supervising representative of a law enforcement agency that requested the location information; and
(II) The time and date when the request was made.
(c) With regard to compliance with the requirements of this subsection (1.5), no cause of action may be brought against any wireless telecommunications provider, its officers, employees, agents, or other specified persons for providing location information in response to a request from a law enforcement agent with actual or apparent authority to act as a supervising representative under this subsection (1.5).
(d) A law enforcement agency that acquires information pursuant to this subsection (1.5) shall not divulge the acquired information to any person other than to another law enforcement agency, or an employee thereof, unless the law enforcement agency has obtained a court order stating that the information was lawfully obtained and authorizing the law enforcement agency to retain the information, as described in subparagraph (I) of paragraph (d) of this subsection (1.5).
(e)
(I) Not more than forty-eight hours after ordering a previously designated security employee of a wireless telecommunications provider to provide information as described in paragraph (a) of this subsection (1.5), a law enforcement agency shall request a court order stating whether:
(A) At the time that the supervising representative of a law enforcement agency ordered the previously designated security employee of a wireless telecommunications provider to provide the information, the supervising representative had probable cause to believe that the conditions described in paragraph (a) of this subsection (1.5) existed; and
(B) The law enforcement agency may retain the information for a bona fide investigative purpose.
(II) Unless a court orders that the law enforcement agency may retain the information for a bona fide investigative purpose, as described in sub-subparagraph (B) of subparagraph (I) of this paragraph (e), the law enforcement agency shall destroy the information and not retain any copy of the information for any purpose.
(III) If the court issues an order stating that the supervising representative of the law enforcement agency did not have probable cause to believe that the conditions described in paragraph (a) of this subsection (1.5) existed and that the information was not lawfully obtained, then neither the information nor any other evidence that is obtained as a result of the law enforcement agency’s acquisition of the information may be admitted in any subsequent criminal proceeding unless the information or other evidence was also acquired independently in a lawful manner.
(IV) Any ruling by a court that the information obtained may be retained for a bona fide investigative purpose shall not be considered a ruling on the admissibility of the evidence in any criminal proceeding under the constitutional and statutory provisions of the United States or Colorado.
(2) The serving communications or internet access provider within the geographical area of a law enforcement agency shall designate a security official employed by the provider and an alternate to provide all required assistance to law enforcement officials to carry out the purposes of this section.
(3) Good faith reliance on an order by any supervising representative of a law enforcement agency shall constitute a complete defense to any action brought against a communications or internet access provider or any of its employees or agents in connection with actions taken under this section. A communications or internet access provider and its employees or agents shall not be liable in any civil action to any person or entity for injuries, death, or loss to any person or property incurred as a result of any act or omission resulting from, connected with, or incidental to compliance with this section.

§ 18-9-313. Personal information on the internet - victims of domestic violence, sexual assault, and stalking - other protected persons - definitions

(1) As used in this section, unless the context otherwise requires:
(a) “Human services worker” means:
(I) A state or county employee, or an attorney representing the state or county, who is engaged in investigating or taking legal action regarding allegations of child abuse or neglect pursuant to article 3 of title 19, and a state or county support staff person who has contact with the public relating to these allegations;
(II) A state or county employee, or an attorney representing the state or county, who is engaged in investigating or taking legal action regarding allegations of mistreatment of an at-risk adult pursuant to article 3.1 of title 26, and a state or county support staff person who has contact with the public relating to these allegations;
(III) A state or county employee, including a county attorney or an employee of a person under contract with a state or county, who is engaged in establishing, modifying, and enforcing child support orders pursuant to article 13 of title 26, and a state or county support staff person who has contact with the public relating to these duties;
(IV) A state or county employee, including a county attorney, who is engaged in determining eligibility for or investigating fraud in public programs established in article 2 of title 26, and who has contact with the public relating to these duties; or
(V) An employee of a juvenile detention facility established and operated pursuant to section 19-2.5-1502 or an employee of the division of youth services within the department of human services, including an employee under contract with the division of youth services, who has contact with juveniles involved with youth services.
(b) “Immediate family” means a protected person’s spouse, child, or parent or any other blood relative who lives in the same residence as the protected person.
(b.5) “Judge” has the same meaning as defined by section 18-8-615 (3).
(c) Repealed.
(d) “Participant in the address confidentiality program” means an individual accepted into the address confidentiality program in accordance with part 21 of article 30 of title 24.
(d.5) “Peace officer” has the same meaning as described in section 16-2.5-101.
(e) “Personal information” means the home address, home telephone number, personal mobile telephone number, pager number, personal e-mail address, or a personal photograph of a participant in the address confidentiality program or protected person; directions to the home of a participant in the address confidentiality program or protected person; or photographs of the home or vehicle of a participant in the address confidentiality program or protected person.
(e.5) “Prosecutor” has the same meaning as defined in section 18-8-616 (3).
(f) “Protected person” means a human services worker, a public health worker, a judge, a peace officer, a prosecutor, a public defender, or a public safety worker.
(f.6) “Public defender” means an attorney employed by the office of the state public defender created in section 21-1-101, or an attorney employed by the office of alternate defense counsel created in section 21-2-101.
(g) “Public health worker” means:
(I) An employee, contractor, or employee of a contractor of the department of public health and environment, created in section 25-1-102, who is engaged in public health duties, as described in section 25-1.5-101;
(II) An employee, contractor, or employee of a contractor of a county or district public health agency, as defined in section 25-1-502, who is engaged in public health duties, as described in section 25-1-506; or
(III) A member of a county or district board of health, other than an elected county commissioner.
(h) “Public safety worker” means:
(I) An employee, contractor, or an employee of a contractor of the department of corrections who has contact with persons in the custody of the department of corrections or with the family or associates of such persons;
(II) A noncertified deputy sheriff or detention officer, as described in section 16-2.5-103 (2), who has contact with inmates; or
(III) An employee, contractor, or an employee of a contractor of a community corrections program, as defined in section 17-27-102, who has contact with offenders in a community corrections program.
(2) Repealed.
(2.5) An address confidentiality program participant may submit a written request to a state or local government official and follow the process in section 24-30-2108, C.R.S., including the presentation of a valid address confidentiality program authorization card. If a state or local government official has received the above information, then the state or local government official shall not knowingly make available on the internet personal information about such participant in the address confidentiality program or the actual address, as defined in section 24-30-2103 (1), C.R.S., of such participant in the address confidentiality program.
(2.7) It is unlawful for a person to knowingly make available on the internet personal information about a protected person or the protected person’s immediate family if the dissemination of personal information poses an imminent and serious threat to the protected person’s safety or the safety of the protected person’s immediate family and the person making the information available on the internet knows or reasonably should know of the imminent and serious threat.
(2.8)
(a) A protected person may submit a written request pursuant to subsection (2.8)(b) of this section to a state or local government official to remove personal information from records that are available on the internet. If a state or local government official receives the written request, then the state or local government official shall not knowingly make available on the internet personal information about the protected person or the protected person’s immediate family.
(b) A protected person’s written request to a state or local government official to remove records that the official makes available on the internet must include:
(I) Evidence that the person submitting the request is a protected person, as defined in subsection (1) of this section; and
(II) An affirmation stating under penalty of perjury that the person submitting the request has reason to believe that the dissemination of the personal information contained in the records that the official makes available on the internet poses an imminent and serious threat to the person’s safety or the safety of the person’s immediate family.
(3) A violation of subsection (2.7) of this section is a class 1 misdemeanor.

§ 18-9-314. Interference with lawful distribution of newspapers - definitions

(1) A person commits the offense of interference with lawful distribution of newspapers when that person obtains or exerts unauthorized control over more than five copies of an edition of a newspaper from a newspaper distribution container owned or leased by the newspaper publisher with the intent to prevent other individuals from reading that edition of the newspaper. Control is unauthorized if there is a notice on the newspaper or on the newspaper distribution container that possession of more than five copies with intent to prevent other individuals from reading that edition of the newspaper is illegal.
(2) [This version of the introductory portion to subsection (2) is effective until March 1, 2022.] Interference with lawful distribution of newspapers is an unclassified misdemeanor and shall be punished by a fine of:
(2) [This version of the introductory portion to subsection (2) is effective March 1, 2022.] Interference with lawful distribution of newspapers is a civil infraction and shall be punished by a fine of:
(a) Up to one thousand dollars if the number of newspapers involved was one hundred or fewer or the number of newspapers involved was not determined;
(b) Up to two thousand five hundred dollars if the number of newspapers involved was more than one hundred and fewer than five hundred;
(c) Up to five thousand dollars if the number of newspapers involved was five hundred or more.
(3) As used in this section:
(a) “Edition of a newspaper” means a single press run of a newspaper.
(b) “Newspaper” means a periodical that includes news, editorials, opinion, features, or other matters of public interest distributed on a complimentary basis. “Newspaper” includes any student periodical distributed at any institution of higher education.
(c) “Periodical” means a publication produced on a regular interval.
(4) Notwithstanding any other remedies provided under this section, the newspaper publisher who is the victim of interference with lawful distribution of newspapers, an advertiser who placed an advertisement in the newspaper, or a newspaper reader who regularly reads the newspaper shall have a private civil right of action as provided in section 13-21-123, C.R.S., against the person or persons who acted in violation of subsection (1) of this section.
(5) This section shall not apply to a person who, with the authority or permission of the person who possesses real or personal property, removes or disposes of newspapers that have been deposited in or left on that property without the authority or permission of the person who possesses the real or personal property.

bottom of page