Code of Alabama

Search for this:
 Search these answers
1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-194
Section 13A-8-194 Obstructing justice using a false identity. (a) A person commits the crime
of obstructing justice using a false identity if he or she uses identification documents or
identifying information of another person or a fictitious person to avoid summons, arrest,
prosecution, or to impede a criminal investigation. (b) Obstructing justice using a false
identity is a Class C felony. (Act 2001-312, p. 399, §5.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-194.htm - 742 bytes - Match Info - Similar pages

31-13-14
Section 31-13-14 Dealing in false identification documents; vital records identity fraud. (a)
A person commits the crime of dealing in false identification documents if he or she knowingly
reproduces, manufactures, sells, or offers for sale any identification document which does
both of the following: (1) Simulates, purports to be, or is designed so as to cause others
reasonably to believe it to be an identification document. (2) Bears a fictitious name or
other false information. (b) A person commits the crime of vital records identity fraud related
to birth, death, marriage, and divorce certificates if he or she does any of the following:
(1) Supplies false information intending that the information be used to obtain a certified
copy of a vital record. (2) Makes, counterfeits, alters, amends, or mutilates any certified
copy of a vital record without lawful authority and with the intent to deceive. (3) Obtains,
possesses, uses, sells, or furnishes, or attempts to obtain, possess, or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/31-13-14.htm - 3K - Match Info - Similar pages

13A-8-111
(12) FINANCIAL INSTRUMENT. Includes, but is not limited to, any check, cashier's check, draft,
warrant, money order, certificate of deposit, negotiable instrument, letter of credit, bill
of exchange, credit or debit card, transaction authorization mechanism, marketable security,
or any computer system representation thereof. (13) HARM. Partial or total alteration, damage,
or erasure of stored data, interruption of computer services, introduction of a virus, or
any other loss, disadvantage, or injury that might reasonably be suffered as a result
of the actor's conduct. (14) IDENTIFICATION DOCUMENT. Any document containing data that is
issued to an individual and which that individual, and only that individual, uses alone or
in conjunction with any other information for the primary purpose of establishing his or her
identity or accessing his or her financial information or benefits. Identification documents
specifically include, but are not limited to, the following: a. Government...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages

13A-8-112
system, or network-connected location in order to compel the user's computer to continue communicating
with, connecting to, or displaying the content of the service, site, or system. (7) Obtaining
any information that is required by law to be kept confidential or any records that are not
public records by accessing any computer, computer system, or network that is operated by
this state, a political subdivision of this state, or a medical institution. (8) Giving a
password, identifying code, personal identification number, debit card number, bank
account number, or other confidential information about a computer security system to another
person without the consent of the person using the computer security system to restrict access
to a computer, computer network, computer system, or data. (b)(1) Except as otherwise provided
in this subsection, the offense of computer tampering is a Class A misdemeanor, punishable
as provided by law. Subsection (a) does not apply to any acts which...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

15-20A-7
of this subdivision, a school includes an educational institution, public or private, including
a secondary school, a trade or professional school, or an institution of higher education.
(6) Name and address of any employer where the sex offender works or will work, including
any transient or day laborer information. (7) The license plate number, registration number
or identifier, description, and permanent or frequent location where all vehicles are kept
for any vehicle used for work or personal use, including land vehicles, aircraft, and
watercraft. (8) Any telephone number used, including land line and cell phone numbers. (9)
Any email addresses or instant message address or identifiers used, including any designations
or monikers used for self-identification in Internet communications or postings other than
those used exclusively in connection with a lawful commercial transaction. (10) A current
photograph. (11) A physical description of the sex offender including physical...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/15-20A-7.htm - 5K - Match Info - Similar pages

13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking
in stolen identities when, without the authorization, consent, or permission of the victim,
he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture,
sell, transfer, or purchase, identification documents or identifying information for the purpose
of committing identity theft. (b) Possession of five or more identification documents of the
same person, or possession of identifying information of five or more separate persons, without
the authorization, consent, or permission of the person or persons, shall create an inference
that the identities are possessed with intent to manufacture, sell, transfer, or purchase
identification documents or identifying information for the purpose of committing identity
theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...

alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages

13A-8-114
Section 13A-8-114 Phishing. (a) A person commits the crime of phishing if the person by means
of an Internet web page, electronic mail message, or otherwise using the Internet, solicits,
requests, or takes any action to induce another person to provide identifying information
by representing that the person, either directly or by implication, is a business, without
the authority or approval of the business. (b) Any person violating this section, upon conviction,
shall be guilty of a Class C felony. Multiple violations resulting from a single action or
act shall constitute one violation for the purposes of this section. (c) The following persons
may bring an action against a person who violates or is in violation of this section: (1)
A person who is engaged in the business of providing Internet access service to the public,
owns a web page, or owns a trademark, and is adversely affected by a violation of this section.
(2) An individual who is adversely affected by a violation of this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-114.htm - 3K - Match Info - Similar pages

13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without
the authorization, consent, or permission of the victim, and with the intent to defraud for
his or her own benefit or the benefit of a third person, he or she does any of the following:
(1) Obtains, records, or accesses identifying information that would assist in accessing financial
resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains
goods or services through the use of identifying information of the victim. (3) Obtains identification
documents in the victim's name. (4) Obtains employment through the use of identifying information
of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when
a person obtains the identity of another person to misrepresent his or her age for the sole
purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors.
(d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages

8-38-4
Section 8-38-4 Investigation of security breach. (a) If a covered entity determines that a
breach of security has or may have occurred in relation to sensitive personally identifying
information that is accessed, acquired, maintained, stored, utilized, or communicated by,
or on behalf of, the covered entity, the covered entity shall conduct a good faith and prompt
investigation that includes all of the following: (1) An assessment of the nature and scope
of the breach. (2) Identification of any sensitive personally identifying information that
may have been involved in the breach and the identity of any individuals to whom that information
relates. (3) A determination of whether the sensitive personally identifying information has
been acquired or is reasonably believed to have been acquired by an unauthorized person, and
is reasonably likely to cause substantial harm to the individuals to whom the information
relates. (4) Identification and implementation of measures to restore the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-4.htm - 2K - Match Info - Similar pages

41-13-7
decertification. (2) IDENTIFYING INFORMATION. Any information, not including a person's name,
which used either alone or in conjunction with other information specifically identifies a
person or a person's property, and includes, but is not limited to, any of the following information
related to a person: a. Date of birth. b. Social Security number. c. Driver's license number.
d. Financial services account numbers, including checking and savings accounts. e. Credit
or debit card numbers. f. Personal identification numbers (PIN). g. Electronic identification
codes. h. Automated or electronic signatures. i. Biometric data. j. Fingerprints. k. Passwords.
l. Parents' legal surname prior to marriage. m. Name or names of any dependent child or children.
n. Home address or phone number. o. Any other numbers or information that can be used to access
a person's financial resources, obtain identification, act as identification, or obtain goods
or services. (b) Notwithstanding any other law to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-13-7.htm - 4K - Match Info - Similar pages

1 through 10 of 149 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>