13A-8-194
Section 13A-8-194 Obstructing justice using a false identity. (a) A person commits the crime of obstructing justice using a false identity if he or she uses identification documents or identifying information of another person or a fictitious person to avoid summons, arrest, prosecution, or to impede a criminal investigation. (b) Obstructing justice using a false identity is a Class C felony. (Act 2001-312, p. 399, §5.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-194.htm - 742 bytes - Match Info - Similar pages
31-13-14
Section 31-13-14 Dealing in false identification documents; vital records identity fraud. (a) A person commits the crime of dealing in false identification documents if he or she knowingly reproduces, manufactures, sells, or offers for sale any identification document which does both of the following: (1) Simulates, purports to be, or is designed so as to cause others reasonably to believe it to be an identification document. (2) Bears a fictitious name or other false information. (b) A person commits the crime of vital records identity fraud related to birth, death, marriage, and divorce certificates if he or she does any of the following: (1) Supplies false information intending that the information be used to obtain a certified copy of a vital record. (2) Makes, counterfeits, alters, amends, or mutilates any certified copy of a vital record without lawful authority and with the intent to deceive. (3) Obtains, possesses, uses, sells, or furnishes, or attempts to obtain, possess, or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/31-13-14.htm - 3K - Match Info - Similar pages
13A-8-111
Section 13A-8-111 Definitions. As used in this article, the following terms shall have the following meanings: (1) ACCESS. To gain entry to, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a computer, computer system, or computer network. (2) COMPUTER. An electronic, magnetic, optical, electrochemical, or other high speed data processing device or system that performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses and includes all input, output, processing, storage, or communication facilities that are connected or related to the device. (3) COMPUTER NETWORK. The interconnection of two or more computers or computer systems that transmit data over communication circuits connecting them. (4) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages
13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who exceeds authorization of use commits the crime of computer tampering by knowingly: (1) Accessing and altering, damaging, or destroying any computer, computer system, or computer network. (2) Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing, using, controlling, or taking computer programs, data, or supporting documentation residing in, or existing internal or external to, a computer, computer system, or network. (4) Directly or indirectly introducing a computer contaminator or a virus into any computer, computer system, or network. (5) Disrupting or causing the disruption of a computer, computer system, or network services or denying or causing the denial of computer or network services to any authorized user of a computer, computer system, or network. (6) Preventing a computer user from exiting a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages
15-20A-7
Section 15-20A-7 Registration information - Required. (a) The following registration information, unless otherwise indicated, shall be provided by the sex offender when registering: (1) Name, including any aliases, nicknames, ethnic, or tribal names. (2) Date of birth. (3) Social Security number. (4) Address of each residence. (5) Name and address of any school the sex offender attends or will attend. For purposes of this subdivision, a school includes an educational institution, public or private, including a secondary school, a trade or professional school, or an institution of higher education. (6) Name and address of any employer where the sex offender works or will work, including any transient or day laborer information. (7) The license plate number, registration number or identifier, description, and permanent or frequent location where all vehicles are kept for any vehicle used for work or personal use, including land vehicles, aircraft, and watercraft. (8) Any telephone number...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/15-20A-7.htm - 5K - Match Info - Similar pages
13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking in stolen identities when, without the authorization, consent, or permission of the victim, he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture, sell, transfer, or purchase, identification documents or identifying information for the purpose of committing identity theft. (b) Possession of five or more identification documents of the same person, or possession of identifying information of five or more separate persons, without the authorization, consent, or permission of the person or persons, shall create an inference that the identities are possessed with intent to manufacture, sell, transfer, or purchase identification documents or identifying information for the purpose of committing identity theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages
13A-8-114
Section 13A-8-114 Phishing. (a) A person commits the crime of phishing if the person by means of an Internet web page, electronic mail message, or otherwise using the Internet, solicits, requests, or takes any action to induce another person to provide identifying information by representing that the person, either directly or by implication, is a business, without the authority or approval of the business. (b) Any person violating this section, upon conviction, shall be guilty of a Class C felony. Multiple violations resulting from a single action or act shall constitute one violation for the purposes of this section. (c) The following persons may bring an action against a person who violates or is in violation of this section: (1) A person who is engaged in the business of providing Internet access service to the public, owns a web page, or owns a trademark, and is adversely affected by a violation of this section. (2) An individual who is adversely affected by a violation of this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-114.htm - 3K - Match Info - Similar pages
13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without the authorization, consent, or permission of the victim, and with the intent to defraud for his or her own benefit or the benefit of a third person, he or she does any of the following: (1) Obtains, records, or accesses identifying information that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains goods or services through the use of identifying information of the victim. (3) Obtains identification documents in the victim's name. (4) Obtains employment through the use of identifying information of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when a person obtains the identity of another person to misrepresent his or her age for the sole purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors. (d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages
8-38-4
Section 8-38-4 Investigation of security breach. (a) If a covered entity determines that a breach of security has or may have occurred in relation to sensitive personally identifying information that is accessed, acquired, maintained, stored, utilized, or communicated by, or on behalf of, the covered entity, the covered entity shall conduct a good faith and prompt investigation that includes all of the following: (1) An assessment of the nature and scope of the breach. (2) Identification of any sensitive personally identifying information that may have been involved in the breach and the identity of any individuals to whom that information relates. (3) A determination of whether the sensitive personally identifying information has been acquired or is reasonably believed to have been acquired by an unauthorized person, and is reasonably likely to cause substantial harm to the individuals to whom the information relates. (4) Identification and implementation of measures to restore the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-4.htm - 2K - Match Info - Similar pages
41-13-7
Section 41-13-7 Identifying information of state employees on records available for public inspection. (a) As used in this section, the following terms shall have the following meanings: (1) EMPLOYEE. Any person who is regularly employed by the state and who is subject to the provisions of the state Merit System or any person who is regularly employed by a criminal justice agency or entity or by a law enforcement agency within the state or any honorably retired employee thereof, to include, but not be limited to, the following: A judge of any position, including a judge of a municipal court; a district attorney; a deputy district attorney; an assistant district attorney; an investigator employed by a district attorney; an attorney, investigator, or special agent of the Office of the Attorney General; a sheriff; a deputy sheriff; a jailor; or a law enforcement officer of a county, municipality, the state, or special district, provided the law enforcement officer is certified by the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-13-7.htm - 4K - Match Info - Similar pages
|