Code of Alabama

Search for this:
 Search these answers
1 through 10 of 160 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-111
Section 13A-8-111 Definitions. As used in this article, the following terms shall have the
following meanings: (1) ACCESS. To gain entry to, instruct, communicate with, store data in,
retrieve or intercept data from, alter data or computer software in, or otherwise make use
of any resource of a computer, computer system, or computer network. (2) COMPUTER. An electronic,
magnetic, optical, electrochemical, or other high speed data processing device or system that
performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic
impulses and includes all input, output, processing, storage, or communication facilities
that are connected or related to the device. (3) COMPUTER NETWORK. The interconnection of
two or more computers or computer systems that transmit data over communication circuits connecting
them. (4) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements
that when executed by a computer cause the computer to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages

27-62-4
Section 27-62-4 Information security program. (a) Commensurate with the size and complexity
of the licensee, the nature and scope of the activities of the licensee, including its use
of third-party service providers, and the sensitivity of the nonpublic information used by
the licensee or in the possession, custody, or control of the licensee, each licensee shall
develop, implement, and maintain a comprehensive written information security program based
on the risk assessment of the licensee that contains administrative, technical, and physical
safeguards for the protection of nonpublic information and the information system of the licensee.
(b) The information security program of a licensee shall be designed to do all of the following:
(1) Protect the security and confidentiality of nonpublic information and the security of
the information system. (2) Protect against any threats or hazards to the security or integrity
of nonpublic information and the information system. (3) Protect...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/27-62-4.htm - 10K - Match Info - Similar pages

13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who exceeds
authorization of use commits the crime of computer tampering by knowingly: (1) Accessing and
altering, damaging, or destroying any computer, computer system, or computer network. (2)
Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing, using,
controlling, or taking computer programs, data, or supporting documentation residing in, or
existing internal or external to, a computer, computer system, or network. (4) Directly or
indirectly introducing a computer contaminator or a virus into any computer, computer system,
or network. (5) Disrupting or causing the disruption of a computer, computer system, or network
services or denying or causing the denial of computer or network services to any authorized
user of a computer, computer system, or network. (6) Preventing a computer user from exiting
a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

22-6-9
Section 22-6-9 Medicaid identification card; issuance and use; confidentiality of recipient.
(a) The Department of Human Resources shall issue to all eligible recipients a special color
picture medicaid identification card, which shall be separate from and entirely distinct from
the valid color picture driver license or non-driver identification card. The Medicaid identification
card shall be issued only on presentation of proper identification and evidence of medicaid
eligibility. The identification card shall be used as identification to providers of medical
service, and the identification card shall contain a suitable medium which when used with
a suitable data processing system, to be developed by the Department of Human Resources with
the technical assistance and advice of the Alabama Criminal Justice Information Center, can
provide real-time verification of Medicaid eligibility by the provider. (b) The Department
of Human Resources shall make provision for adequate protection of...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/22-6-9.htm - 1K - Match Info - Similar pages

8-38-2
Section 8-38-2 Definitions. For the purposes of this chapter, the following terms have the
following meanings: (1) BREACH OF SECURITY or BREACH. The unauthorized acquisition of data
in electronic form containing sensitive personally identifying information. Acquisition occurring
over a period of time committed by the same entity constitutes one breach. The term does not
include any of the following: a. Good faith acquisition of sensitive personally identifying
information by an employee or agent of a covered entity, unless the information is used for
a purpose unrelated to the business or subject to further unauthorized use. b. The release
of a public record not otherwise subject to confidentiality or nondisclosure requirements.
c. Any lawful investigative, protective, or intelligence activity of a law enforcement or
intelligence agency of the state, or a political subdivision of the state. (2) COVERED ENTITY.
A person, sole proprietorship, partnership, government entity, corporation,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-2.htm - 4K - Match Info - Similar pages

37-2A-2
Section 37-2A-2 Definitions. When used in this chapter, the following words have the following
meanings: (1) BASIC TELEPHONE SERVICE. Refers to a service that, as provided by an incumbent
local exchange carrier, may be through any technology and through any affiliate or service
arrangement and includes the functionalities described in 47 C.F.R. 54.101(a). (2) BROADBAND
SERVICE or BROADBAND ENABLED SERVICE. Any service that consists of or includes a high-speed
access capability to transmit at a rate that is not less than 200 kilobits per second either
in the upstream or downstream direction, and either of the following: a. Provides computer
processing, information storage, information content or protocol conversion, including any
service applications or information service provided over such high-speed access service.
b. Is used to provide access to the Internet. (3) BUNDLED OFFERING. A combination of retail
services offered as a package, whether at a single price or with the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/37-2A-2.htm - 7K - Match Info - Similar pages

40-21-80
Section 40-21-80 Definitions. (a) For the purpose of this article, the following terms shall
have the respective meanings ascribed by this section: (1) DEPARTMENT. The Department of Revenue
of the State of Alabama. (2) DOMESTIC WATER. All water except water that is sold to persons
for use or consumption in industrial processes and not primarily for human consumption. (3)
GROSS RECEIPTS. The value proceeding or accruing from the furnishing of utility services,
all receipts actual and accrued, without any deduction on account of the cost of the utility
services sold, the cost of the materials used, labor or service cost, interest paid, or any
other expenses whatever, and without any deductions on account of losses. (4) GROSS SALES.
The value proceeding or accruing from the furnishing of utility services, and including the
proceeds from the sale of any utility services handled on consignment by the taxpayer, without
any deduction on account of the cost of the utility services sold, the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/40-21-80.htm - 10K - Match Info - Similar pages

40-21-100
Section 40-21-100 Definitions. (a) For the purpose of this article, the following terms shall
have the respective meanings ascribed by this section: (1) BUSINESS. All activities relating
to the furnishing of utility services. (2) DEPARTMENT. The Department of Revenue of the State
of Alabama. (3) DOMESTIC WATER. All water except water that is sold to persons for use or
consumption in industrial processes and not primarily for human consumption. (4) GROSS RECEIPTS.
The value proceeding or accruing from the furnishing of utility services, all receipts actual
and accrued, without any deduction on account of the cost of the utility services sold, the
cost of the materials used, labor or service cost, interest paid, or any other expense whatever,
and without any deductions on account of losses. (5) GROSS SALES. The value proceeding or
accruing from the furnishing of utility services, and including the proceeds from the sale
of any utility services handled on consignment by the taxpayer,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/40-21-100.htm - 12K - Match Info - Similar pages

12-19-180
Section 12-19-180 Criminal history processing fee; allocation of monies; access to court data
from within and without Unified Judicial System; user fees to be deposited in Court Automation
Fund; section not bar to public access to court records. (a) In addition to all other costs,
fees, or fines prescribed by law, each person convicted of a crime in a municipal, district,
or circuit court, except traffic cases which do not involve driving under the influence of
alcohol or controlled substances as set out in Section 32-5A-191, and conservation cases and
juvenile cases, shall be assessed a criminal history processing fee of thirty dollars ($30).
The assessment shall be automatically assessed by the clerk of the court upon conviction.
(b) There is created in the State Treasury a fund to be designated as the Public Safety Automated
Fingerprint Identification System Fund, a fund to be designated as the Court Automation Fund,
and a fund to be designated as the Criminal Justice Information...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/12-19-180.htm - 6K - Match Info - Similar pages

27-62-3
Section 27-62-3 Definitions. For purposes of this chapter, the following words have the following
meanings: (1) AUTHORIZED INDIVIDUAL. An individual known to and screened by the licensee and
determined to be necessary and appropriate to have access to the nonpublic information held
by the licensee and its information systems. (2) COMMISSIONER. The Commissioner of Insurance.
(3) CONSUMER. An individual, including, but not limited to, an applicant, policyholder, insured,
beneficiary, claimant, or certificate holder, who is a resident of this state and whose nonpublic
information is in the possession, custody, or control of a licensee. (4)a. CYBERSECURITY EVENT.
An event resulting in unauthorized access to, disruption, or misuse of an information system
or nonpublic information stored on an information system. b. The term cybersecurity event
does not include the unauthorized acquisition of encrypted nonpublic information if the encryption,
process, or key is not also acquired, released,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/27-62-3.htm - 5K - Match Info - Similar pages

1 through 10 of 160 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>