Code of Alabama

Search for this:
 Search these answers
1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking
in stolen identities when, without the authorization, consent, or permission of the victim,
he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture,
sell, transfer, or purchase, identification documents or identifying information for the purpose
of committing identity theft. (b) Possession of five or more identification documents of the
same person, or possession of identifying information of five or more separate persons, without
the authorization, consent, or permission of the person or persons, shall create an inference
that the identities are possessed with intent to manufacture, sell, transfer, or purchase
identification documents or identifying information for the purpose of committing identity
theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...

alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages

20-2-190
Section 20-2-190 Penalties; sale of ephedrine, etc.; Alabama Drug Abuse Task Force. (a) Any
person who manufactures, sells, transfers, receives, or possesses a listed precursor chemical
violates this article if the person: (1) Knowingly fails to comply with the reporting requirements
of this article; (2) Knowingly makes a false statement in a report or record required by this
article or the rules adopted thereunder; (3) Is required by this article to have a listed
precursor chemical license or permit, and is a person as defined by this article, and knowingly
or deliberately fails to obtain such a license or permit. An offense under this subsection
shall constitute a Class C felony. (b) Notwithstanding the provisions of Section 20-2-188,
a person who possesses, sells, transfers, or otherwise furnishes or attempts to solicit another
or conspires to possess, sell, transfer, or otherwise furnish a listed precursor chemical
or a product containing a precursor chemical or ephedrine or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/20-2-190.htm - 25K - Match Info - Similar pages

13A-8-194
Section 13A-8-194 Obstructing justice using a false identity. (a) A person commits the crime
of obstructing justice using a false identity if he or she uses identification documents or
identifying information of another person or a fictitious person to avoid summons, arrest,
prosecution, or to impede a criminal investigation. (b) Obstructing justice using a false
identity is a Class C felony. (Act 2001-312, p. 399, §5.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-194.htm - 742 bytes - Match Info - Similar pages

13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without
the authorization, consent, or permission of the victim, and with the intent to defraud for
his or her own benefit or the benefit of a third person, he or she does any of the following:
(1) Obtains, records, or accesses identifying information that would assist in accessing financial
resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains
goods or services through the use of identifying information of the victim. (3) Obtains identification
documents in the victim's name. (4) Obtains employment through the use of identifying information
of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when
a person obtains the identity of another person to misrepresent his or her age for the sole
purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors.
(d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages

13A-8-114
Section 13A-8-114 Phishing. (a) A person commits the crime of phishing if the person by means
of an Internet web page, electronic mail message, or otherwise using the Internet, solicits,
requests, or takes any action to induce another person to provide identifying information
by representing that the person, either directly or by implication, is a business, without
the authority or approval of the business. (b) Any person violating this section, upon conviction,
shall be guilty of a Class C felony. Multiple violations resulting from a single action or
act shall constitute one violation for the purposes of this section. (c) The following persons
may bring an action against a person who violates or is in violation of this section: (1)
A person who is engaged in the business of providing Internet access service to the public,
owns a web page, or owns a trademark, and is adversely affected by a violation of this section.
(2) An individual who is adversely affected by a violation of this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-114.htm - 3K - Match Info - Similar pages

13A-8-113
Section 13A-8-113 Encoded data fraud. (a) A person commits the crime of encoded data fraud
by: (1) Knowingly and with the intent to commit an unlawful act or to defraud, possessing
a scanning device; or knowingly and with intent to commit an unlawful act or defraud, using
or attempting to use a scanning device to access, read, obtain, memorize, or store, temporarily
or permanently, information encoded on an identification document by means of magnetic strip,
integrated circuit, or radio frequency identification tag without the permission of the authorized
user or issuer of the identification document. (2) Knowingly and with the intent to commit
an unlawful act or to defraud, possessing a reencoder; or knowingly and with intent to commit
an unlawful act or defraud, using or attempting to use a reencoder to place encoded information
on an identification document by means of magnetic strip, integrated circuit, or radio frequency
identification tag without the permission of the authorized...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-113.htm - 2K - Match Info - Similar pages

13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who exceeds
authorization of use commits the crime of computer tampering by knowingly: (1) Accessing and
altering, damaging, or destroying any computer, computer system, or computer network. (2)
Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing, using,
controlling, or taking computer programs, data, or supporting documentation residing in, or
existing internal or external to, a computer, computer system, or network. (4) Directly or
indirectly introducing a computer contaminator or a virus into any computer, computer system,
or network. (5) Disrupting or causing the disruption of a computer, computer system, or network
services or denying or causing the denial of computer or network services to any authorized
user of a computer, computer system, or network. (6) Preventing a computer user from exiting
a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

16-6F-6
Section 16-6F-6 Authorization of establishment; Alabama Public Charter School Commission; registration
requirements; powers and duties of authorizers. (a) Eligible authorizing entities. (1) A public
charter school shall not be established in this state unless its establishment is authorized
by this section. No governmental entity or other entity, other than an entity expressly granted
chartering authority as set forth in this section, may assume any authorizing function or
duty in any form. The following entities shall be authorizers of public charter schools: a.
A local school board, for chartering of schools within the boundaries of the school system
under its jurisdiction, pursuant to state law. b. The Alabama Public Charter School Commission,
pursuant to this section. (2) A local school board that registers as an authorizer may approve
or deny an application to form a public charter school within the boundaries of the local
school system overseen by the local school board. (3) All...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/16-6F-6.htm - 21K - Match Info - Similar pages

31-13-14
Section 31-13-14 Dealing in false identification documents; vital records identity fraud. (a)
A person commits the crime of dealing in false identification documents if he or she knowingly
reproduces, manufactures, sells, or offers for sale any identification document which does
both of the following: (1) Simulates, purports to be, or is designed so as to cause others
reasonably to believe it to be an identification document. (2) Bears a fictitious name or
other false information. (b) A person commits the crime of vital records identity fraud related
to birth, death, marriage, and divorce certificates if he or she does any of the following:
(1) Supplies false information intending that the information be used to obtain a certified
copy of a vital record. (2) Makes, counterfeits, alters, amends, or mutilates any certified
copy of a vital record without lawful authority and with the intent to deceive. (3) Obtains,
possesses, uses, sells, or furnishes, or attempts to obtain, possess, or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/31-13-14.htm - 3K - Match Info - Similar pages

13A-8-197
Section 13A-8-197 Court records to reflect innocence of victim. In any case in which a person
obtains identification documents or identifying information of another person in violation
of this article and uses the documents or information to commit a crime in the name of another
person, the court records for the crime shall reflect that the victim of this act did not
commit the crime. (Act 2001-312, p. 399, §8.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-197.htm - 724 bytes - Match Info - Similar pages

1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>