13A-8-194
Section 13A-8-194 Obstructing justice using a false identity. (a) A person commits the crime of obstructing justice using a false identity if he or she uses identification documents or identifying information of another person or a fictitious person to avoid summons, arrest, prosecution, or to impede a criminal investigation. (b) Obstructing justice using a false identity is a Class C felony. (Act 2001-312, p. 399, §5.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-194.htm - 742 bytes - Match Info - Similar pages
31-13-14
Section 31-13-14 Dealing in false identification documents; vital records identity fraud. (a) A person commits the crime of dealing in false identification documents if he or she knowingly reproduces, manufactures, sells, or offers for sale any identification document which does both of the following: (1) Simulates, purports to be, or is designed so as to cause others reasonably to believe it to be an identification document. (2) Bears a fictitious name or other false information. (b) A person commits the crime of vital records identity fraud related to birth, death, marriage, and divorce certificates if he or she does any of the following: (1) Supplies false information intending that the information be used to obtain a certified copy of a vital record. (2) Makes, counterfeits, alters, amends, or mutilates any certified copy of a vital record without lawful authority and with the intent to deceive. (3) Obtains, possesses, uses, sells, or furnishes, or attempts to obtain, possess, or...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/31-13-14.htm - 3K - Match Info - Similar pages
13A-8-111
(12) FINANCIAL INSTRUMENT. Includes, but is not limited to, any check, cashier's check, draft, warrant, money order, certificate of deposit, negotiable instrument, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security, or any computer system representation thereof. (13) HARM. Partial or total alteration, damage, or erasure of stored data, interruption of computer services, introduction of a virus, or any other loss, disadvantage, or injury that might reasonably be suffered as a result of the actor's conduct. (14) IDENTIFICATION DOCUMENT. Any document containing data that is issued to an individual and which that individual, and only that individual, uses alone or in conjunction with any other information for the primary purpose of establishing his or her identity or accessing his or her financial information or benefits. Identification documents specifically include, but are not limited to, the following: a. Government...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages
13A-8-112
system, or network-connected location in order to compel the user's computer to continue communicating with, connecting to, or displaying the content of the service, site, or system. (7) Obtaining any information that is required by law to be kept confidential or any records that are not public records by accessing any computer, computer system, or network that is operated by this state, a political subdivision of this state, or a medical institution. (8) Giving a password, identifying code, personal identification number, debit card number, bank account number, or other confidential information about a computer security system to another person without the consent of the person using the computer security system to restrict access to a computer, computer network, computer system, or data. (b)(1) Except as otherwise provided in this subsection, the offense of computer tampering is a Class A misdemeanor, punishable as provided by law. Subsection (a) does not apply to any acts which...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages
15-20A-7
of this subdivision, a school includes an educational institution, public or private, including a secondary school, a trade or professional school, or an institution of higher education. (6) Name and address of any employer where the sex offender works or will work, including any transient or day laborer information. (7) The license plate number, registration number or identifier, description, and permanent or frequent location where all vehicles are kept for any vehicle used for work or personal use, including land vehicles, aircraft, and watercraft. (8) Any telephone number used, including land line and cell phone numbers. (9) Any email addresses or instant message address or identifiers used, including any designations or monikers used for self-identification in Internet communications or postings other than those used exclusively in connection with a lawful commercial transaction. (10) A current photograph. (11) A physical description of the sex offender including physical...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/15-20A-7.htm - 5K - Match Info - Similar pages
13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking in stolen identities when, without the authorization, consent, or permission of the victim, he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture, sell, transfer, or purchase, identification documents or identifying information for the purpose of committing identity theft. (b) Possession of five or more identification documents of the same person, or possession of identifying information of five or more separate persons, without the authorization, consent, or permission of the person or persons, shall create an inference that the identities are possessed with intent to manufacture, sell, transfer, or purchase identification documents or identifying information for the purpose of committing identity theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages
13A-8-114
Section 13A-8-114 Phishing. (a) A person commits the crime of phishing if the person by means of an Internet web page, electronic mail message, or otherwise using the Internet, solicits, requests, or takes any action to induce another person to provide identifying information by representing that the person, either directly or by implication, is a business, without the authority or approval of the business. (b) Any person violating this section, upon conviction, shall be guilty of a Class C felony. Multiple violations resulting from a single action or act shall constitute one violation for the purposes of this section. (c) The following persons may bring an action against a person who violates or is in violation of this section: (1) A person who is engaged in the business of providing Internet access service to the public, owns a web page, or owns a trademark, and is adversely affected by a violation of this section. (2) An individual who is adversely affected by a violation of this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-114.htm - 3K - Match Info - Similar pages
13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without the authorization, consent, or permission of the victim, and with the intent to defraud for his or her own benefit or the benefit of a third person, he or she does any of the following: (1) Obtains, records, or accesses identifying information that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains goods or services through the use of identifying information of the victim. (3) Obtains identification documents in the victim's name. (4) Obtains employment through the use of identifying information of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when a person obtains the identity of another person to misrepresent his or her age for the sole purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors. (d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages
8-38-4
Section 8-38-4 Investigation of security breach. (a) If a covered entity determines that a breach of security has or may have occurred in relation to sensitive personally identifying information that is accessed, acquired, maintained, stored, utilized, or communicated by, or on behalf of, the covered entity, the covered entity shall conduct a good faith and prompt investigation that includes all of the following: (1) An assessment of the nature and scope of the breach. (2) Identification of any sensitive personally identifying information that may have been involved in the breach and the identity of any individuals to whom that information relates. (3) A determination of whether the sensitive personally identifying information has been acquired or is reasonably believed to have been acquired by an unauthorized person, and is reasonably likely to cause substantial harm to the individuals to whom the information relates. (4) Identification and implementation of measures to restore the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-4.htm - 2K - Match Info - Similar pages
41-13-7
decertification. (2) IDENTIFYING INFORMATION. Any information, not including a person's name, which used either alone or in conjunction with other information specifically identifies a person or a person's property, and includes, but is not limited to, any of the following information related to a person: a. Date of birth. b. Social Security number. c. Driver's license number. d. Financial services account numbers, including checking and savings accounts. e. Credit or debit card numbers. f. Personal identification numbers (PIN). g. Electronic identification codes. h. Automated or electronic signatures. i. Biometric data. j. Fingerprints. k. Passwords. l. Parents' legal surname prior to marriage. m. Name or names of any dependent child or children. n. Home address or phone number. o. Any other numbers or information that can be used to access a person's financial resources, obtain identification, act as identification, or obtain goods or services. (b) Notwithstanding any other law to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-13-7.htm - 4K - Match Info - Similar pages
|