The New Jersey statute that deals with the so-called “peeping tom” is N.J.S. 2C:18-3c. Here is what it says:
c. Peering into windows or other openings of dwelling places. A person commits a crime of the fourth degree if, knowing that he is not licensed or privileged to do so, he peers into a window or other opening of a dwelling or other structure adapted for overnight accommodation for the purpose of invading the privacy of another person and under circumstances in which a reasonable person in the dwelling or other structure would not expect to be observed

identity theft in New Jersey arrested chargeUpon conviction of a fourth degree crime in New Jersey, a person is exposed to a prison sentence of eighteen months, a fine of up to ten thousand dollars, or both.

Allan Marain is a New Jersey criminal defense lawyer. He has over forty-five years experience. He has prevailed in numerous jury trials over his many years of experience. He is available to discuss your situation with you. He would welcome your call.

 Overview  |  Allan Marain  |  Norman Epting, Jr.  |  The Practice  |  Confidentiality  |  Selecting a Lawyer 
 Trial Transcript  |  Jobs and Internships 

 Abandoned Cars  |  Aiding Suicide  |  Animal Cruelty  |  Appeals  |  Bribery  |  Child Pornography  |  Conspiracy  |  Drug Crimes 
 Endangering  |  Entrapment  |  Evidence  |  Expungements  |  False Swearing  |  Federal Appeals  |  Federal Crimes  |  Guilty Pleas  |  Gun Law 
 Jury Service  |  Mail Fraud  |  Manslaughter  |  Megan's Law  |  Miranda Warnings  |  Money Laundering  |  Municipal Court 
 Murder  |  NERA  |  Peeping Tom  |  Point Assessments  |  Police Misconduct  |  Red Light Cameras  |  Sex Crimes  |  Street Crimes  |  SVPA 
 Tax Crimes--Federal  |  Traffic Offenses  |  Unauth'd Prac Law  |  Vehicular Homicide  |  Wire Fraud 

 Discrimination  |  Domestic Violence  |  Drivers Licenses  |  Excessive Force  |  Freedom of Speech 
 Personal Injury  |  Whistleblowers 

 Case Review  |  Super Links  |  Stray Bullets  |  Directions  |  Poker Portal  |  How Did We Do?  |  Collatz Conjecture  |  PGP Public Key 

 The Bottom Line