Code of Alabama

Search for this:
 Search these answers
1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-194
Section 13A-8-194 Obstructing justice using a false identity. (a) A person commits the crime
of obstructing justice using a false identity if he or she uses identification documents or
identifying information of another person or a fictitious person to avoid summons, arrest,
prosecution, or to impede a criminal investigation. (b) Obstructing justice using a false
identity is a Class C felony. (Act 2001-312, p. 399, §5.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-194.htm - 742 bytes - Match Info - Similar pages

31-13-14
Section 31-13-14 Dealing in false identification documents; vital records identity fraud. (a)
A person commits the crime of dealing in false identification documents if he or she knowingly
reproduces, manufactures, sells, or offers for sale any identification document which does
both of the following: (1) Simulates, purports to be, or is designed so as to cause others
reasonably to believe it to be an identification document. (2) Bears a fictitious name or
other false information. (b) A person commits the crime of vital records identity fraud related
to birth, death, marriage, and divorce certificates if he or she does any of the following:
(1) Supplies false information intending that the information be used to obtain a certified
copy of a vital record. (2) Makes, counterfeits, alters, amends, or mutilates any certified
copy of a vital record without lawful authority and with the intent to deceive. (3) Obtains,
possesses, uses, sells, or furnishes, or attempts to obtain, possess, or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/31-13-14.htm - 3K - Match Info - Similar pages

13A-8-111
Section 13A-8-111 Definitions. As used in this article, the following terms shall have the
following meanings: (1) ACCESS. To gain entry to, instruct, communicate with, store data in,
retrieve or intercept data from, alter data or computer software in, or otherwise make use
of any resource of a computer, computer system, or computer network. (2) COMPUTER. An electronic,
magnetic, optical, electrochemical, or other high speed data processing device or system that
performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic
impulses and includes all input, output, processing, storage, or communication facilities
that are connected or related to the device. (3) COMPUTER NETWORK. The interconnection of
two or more computers or computer systems that transmit data over communication circuits connecting
them. (4) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements
that when executed by a computer cause the computer to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages

13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who exceeds
authorization of use commits the crime of computer tampering by knowingly: (1) Accessing and
altering, damaging, or destroying any computer, computer system, or computer network. (2)
Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing, using,
controlling, or taking computer programs, data, or supporting documentation residing in, or
existing internal or external to, a computer, computer system, or network. (4) Directly or
indirectly introducing a computer contaminator or a virus into any computer, computer system,
or network. (5) Disrupting or causing the disruption of a computer, computer system, or network
services or denying or causing the denial of computer or network services to any authorized
user of a computer, computer system, or network. (6) Preventing a computer user from exiting
a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

15-20A-7
Section 15-20A-7 Registration information - Required. (a) The following registration information,
unless otherwise indicated, shall be provided by the sex offender when registering: (1) Name,
including any aliases, nicknames, ethnic, or tribal names. (2) Date of birth. (3) Social Security
number. (4) Address of each residence. (5) Name and address of any school the sex offender
attends or will attend. For purposes of this subdivision, a school includes an educational
institution, public or private, including a secondary school, a trade or professional school,
or an institution of higher education. (6) Name and address of any employer where the sex
offender works or will work, including any transient or day laborer information. (7) The license
plate number, registration number or identifier, description, and permanent or frequent location
where all vehicles are kept for any vehicle used for work or personal use, including land
vehicles, aircraft, and watercraft. (8) Any telephone number...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/15-20A-7.htm - 5K - Match Info - Similar pages

13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking
in stolen identities when, without the authorization, consent, or permission of the victim,
he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture,
sell, transfer, or purchase, identification documents or identifying information for the purpose
of committing identity theft. (b) Possession of five or more identification documents of the
same person, or possession of identifying information of five or more separate persons, without
the authorization, consent, or permission of the person or persons, shall create an inference
that the identities are possessed with intent to manufacture, sell, transfer, or purchase
identification documents or identifying information for the purpose of committing identity
theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...

alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages

13A-8-114
Section 13A-8-114 Phishing. (a) A person commits the crime of phishing if the person by means
of an Internet web page, electronic mail message, or otherwise using the Internet, solicits,
requests, or takes any action to induce another person to provide identifying information
by representing that the person, either directly or by implication, is a business, without
the authority or approval of the business. (b) Any person violating this section, upon conviction,
shall be guilty of a Class C felony. Multiple violations resulting from a single action or
act shall constitute one violation for the purposes of this section. (c) The following persons
may bring an action against a person who violates or is in violation of this section: (1)
A person who is engaged in the business of providing Internet access service to the public,
owns a web page, or owns a trademark, and is adversely affected by a violation of this section.
(2) An individual who is adversely affected by a violation of this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-114.htm - 3K - Match Info - Similar pages

13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without
the authorization, consent, or permission of the victim, and with the intent to defraud for
his or her own benefit or the benefit of a third person, he or she does any of the following:
(1) Obtains, records, or accesses identifying information that would assist in accessing financial
resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains
goods or services through the use of identifying information of the victim. (3) Obtains identification
documents in the victim's name. (4) Obtains employment through the use of identifying information
of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when
a person obtains the identity of another person to misrepresent his or her age for the sole
purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors.
(d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages

8-38-4
Section 8-38-4 Investigation of security breach. (a) If a covered entity determines that a
breach of security has or may have occurred in relation to sensitive personally identifying
information that is accessed, acquired, maintained, stored, utilized, or communicated by,
or on behalf of, the covered entity, the covered entity shall conduct a good faith and prompt
investigation that includes all of the following: (1) An assessment of the nature and scope
of the breach. (2) Identification of any sensitive personally identifying information that
may have been involved in the breach and the identity of any individuals to whom that information
relates. (3) A determination of whether the sensitive personally identifying information has
been acquired or is reasonably believed to have been acquired by an unauthorized person, and
is reasonably likely to cause substantial harm to the individuals to whom the information
relates. (4) Identification and implementation of measures to restore the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-4.htm - 2K - Match Info - Similar pages

41-13-7
Section 41-13-7 Identifying information of state employees on records available for public
inspection. (a) As used in this section, the following terms shall have the following meanings:
(1) EMPLOYEE. Any person who is regularly employed by the state and who is subject to the
provisions of the state Merit System or any person who is regularly employed by a criminal
justice agency or entity or by a law enforcement agency within the state or any honorably
retired employee thereof, to include, but not be limited to, the following: A judge of any
position, including a judge of a municipal court; a district attorney; a deputy district attorney;
an assistant district attorney; an investigator employed by a district attorney; an attorney,
investigator, or special agent of the Office of the Attorney General; a sheriff; a deputy
sheriff; a jailor; or a law enforcement officer of a county, municipality, the state, or special
district, provided the law enforcement officer is certified by the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-13-7.htm - 4K - Match Info - Similar pages

1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>