Code of Alabama

Search for this:
 Search these answers
1 through 10 of 160 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-111
Section 13A-8-111 Definitions. As used in this article, the following terms shall have
the following meanings: (1) ACCESS. To gain entry to, instruct, communicate with, store data
in, retrieve or intercept data from, alter data or computer software in, or otherwise make
use of any resource of a computer, computer system, or computer network. (2) COMPUTER. An
electronic, magnetic, optical, electrochemical, or other high speed data processing device
or system that performs logical, arithmetic, or memory functions by the manipulations of electronic
or magnetic impulses and includes all input, output, processing, storage, or communication
facilities that are connected or related to the device. (3) COMPUTER NETWORK. The interconnection
of two or more computers or computer systems that transmit data over communication circuits
connecting them. (4) COMPUTER PROGRAM. An ordered set of data representing coded instructions
or statements that when executed by a computer cause the computer to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages

27-62-4
Section 27-62-4 Information security program. (a) Commensurate with the size and complexity
of the licensee, the nature and scope of the activities of the licensee, including its use
of third-party service providers, and the sensitivity of the nonpublic information used by
the licensee or in the possession, custody, or control of the licensee, each licensee shall
develop, implement, and maintain a comprehensive written information security program based
on the risk assessment of the licensee that contains administrative, technical, and physical
safeguards for the protection of nonpublic information and the information system of the licensee.
(b) The information security program of a licensee shall be designed to do all of the following:
(1) Protect the security and confidentiality of nonpublic information and the security of
the information system. (2) Protect against any threats or hazards to the security or integrity
of nonpublic information and the information system. (3) Protect...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/27-62-4.htm - 10K - Match Info - Similar pages

13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who
exceeds authorization of use commits the crime of computer tampering by knowingly: (1) Accessing
and altering, damaging, or destroying any computer, computer system, or computer network.
(2) Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing,
using, controlling, or taking computer programs, data, or supporting documentation residing
in, or existing internal or external to, a computer, computer system, or network. (4) Directly
or indirectly introducing a computer contaminator or a virus into any computer, computer system,
or network. (5) Disrupting or causing the disruption of a computer, computer system, or network
services or denying or causing the denial of computer or network services to any authorized
user of a computer, computer system, or network. (6) Preventing a computer user from exiting
a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

22-6-9
Section 22-6-9 Medicaid identification card; issuance and use; confidentiality of recipient.
(a) The Department of Human Resources shall issue to all eligible recipients a special color
picture medicaid identification card, which shall be separate from and entirely distinct from
the valid color picture driver license or non-driver identification card. The Medicaid identification
card shall be issued only on presentation of proper identification and evidence of medicaid
eligibility. The identification card shall be used as identification to providers of medical
service, and the identification card shall contain a suitable medium which when used with
a suitable data processing system, to be developed by the Department of Human Resources with
the technical assistance and advice of the Alabama Criminal Justice Information Center, can
provide real-time verification of Medicaid eligibility by the provider. (b) The Department
of Human Resources shall make provision for adequate protection of...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/22-6-9.htm - 1K - Match Info - Similar pages

8-38-2
Section 8-38-2 Definitions. For the purposes of this chapter, the following terms have
the following meanings: (1) BREACH OF SECURITY or BREACH. The unauthorized acquisition of
data in electronic form containing sensitive personally identifying information. Acquisition
occurring over a period of time committed by the same entity constitutes one breach. The term
does not include any of the following: a. Good faith acquisition of sensitive personally identifying
information by an employee or agent of a covered entity, unless the information is used for
a purpose unrelated to the business or subject to further unauthorized use. b. The release
of a public record not otherwise subject to confidentiality or nondisclosure requirements.
c. Any lawful investigative, protective, or intelligence activity of a law enforcement or
intelligence agency of the state, or a political subdivision of the state. (2) COVERED ENTITY.
A person, sole proprietorship, partnership, government entity, corporation,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-2.htm - 4K - Match Info - Similar pages

37-2A-2
Section 37-2A-2 Definitions. When used in this chapter, the following words have the
following meanings: (1) BASIC TELEPHONE SERVICE. Refers to a service that, as provided by
an incumbent local exchange carrier, may be through any technology and through any affiliate
or service arrangement and includes the functionalities described in 47 C.F.R. 54.101(a).
(2) BROADBAND SERVICE or BROADBAND ENABLED SERVICE. Any service that consists of or includes
a high-speed access capability to transmit at a rate that is not less than 200 kilobits per
second either in the upstream or downstream direction, and either of the following: a. Provides
computer processing, information storage, information content or protocol conversion, including
any service applications or information service provided over such high-speed access service.
b. Is used to provide access to the Internet. (3) BUNDLED OFFERING. A combination of retail
services offered as a package, whether at a single price or with the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/37-2A-2.htm - 7K - Match Info - Similar pages

40-21-80
Section 40-21-80 Definitions. (a) For the purpose of this article, the following terms
shall have the respective meanings ascribed by this section: (1) DEPARTMENT. The Department
of Revenue of the State of Alabama. (2) DOMESTIC WATER. All water except water that is sold
to persons for use or consumption in industrial processes and not primarily for human consumption.
(3) GROSS RECEIPTS. The value proceeding or accruing from the furnishing of utility services,
all receipts actual and accrued, without any deduction on account of the cost of the utility
services sold, the cost of the materials used, labor or service cost, interest paid, or any
other expenses whatever, and without any deductions on account of losses. (4) GROSS SALES.
The value proceeding or accruing from the furnishing of utility services, and including the
proceeds from the sale of any utility services handled on consignment by the taxpayer, without
any deduction on account of the cost of the utility services sold, the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/40-21-80.htm - 10K - Match Info - Similar pages

40-21-100
Section 40-21-100 Definitions. (a) For the purpose of this article, the following terms
shall have the respective meanings ascribed by this section: (1) BUSINESS. All activities
relating to the furnishing of utility services. (2) DEPARTMENT. The Department of Revenue
of the State of Alabama. (3) DOMESTIC WATER. All water except water that is sold to persons
for use or consumption in industrial processes and not primarily for human consumption. (4)
GROSS RECEIPTS. The value proceeding or accruing from the furnishing of utility services,
all receipts actual and accrued, without any deduction on account of the cost of the utility
services sold, the cost of the materials used, labor or service cost, interest paid, or any
other expense whatever, and without any deductions on account of losses. (5) GROSS SALES.
The value proceeding or accruing from the furnishing of utility services, and including the
proceeds from the sale of any utility services handled on consignment by the taxpayer,...

alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/40-21-100.htm - 12K - Match Info - Similar pages

12-19-180
Section 12-19-180 Criminal history processing fee; allocation of monies; access to court
data from within and without Unified Judicial System; user fees to be deposited in Court Automation
Fund; section not bar to public access to court records. (a) In addition to all other
costs, fees, or fines prescribed by law, each person convicted of a crime in a municipal,
district, or circuit court, except traffic cases which do not involve driving under the influence
of alcohol or controlled substances as set out in Section 32-5A-191, and conservation
cases and juvenile cases, shall be assessed a criminal history processing fee of thirty dollars
($30). The assessment shall be automatically assessed by the clerk of the court upon conviction.
(b) There is created in the State Treasury a fund to be designated as the Public Safety Automated
Fingerprint Identification System Fund, a fund to be designated as the Court Automation Fund,
and a fund to be designated as the Criminal Justice Information...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/12-19-180.htm - 6K - Match Info - Similar pages

27-62-3
Section 27-62-3 Definitions. For purposes of this chapter, the following words have
the following meanings: (1) AUTHORIZED INDIVIDUAL. An individual known to and screened by
the licensee and determined to be necessary and appropriate to have access to the nonpublic
information held by the licensee and its information systems. (2) COMMISSIONER. The Commissioner
of Insurance. (3) CONSUMER. An individual, including, but not limited to, an applicant, policyholder,
insured, beneficiary, claimant, or certificate holder, who is a resident of this state and
whose nonpublic information is in the possession, custody, or control of a licensee. (4)a.
CYBERSECURITY EVENT. An event resulting in unauthorized access to, disruption, or misuse of
an information system or nonpublic information stored on an information system. b. The term
cybersecurity event does not include the unauthorized acquisition of encrypted nonpublic information
if the encryption, process, or key is not also acquired, released,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/27-62-3.htm - 5K - Match Info - Similar pages

1 through 10 of 160 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>