13A-8-113
Section 13A-8-113 Encoded data fraud. (a) A person commits the crime of encoded data fraud by: (1) Knowingly and with the intent to commit an unlawful act or to defraud, possessing a scanning device; or knowingly and with intent to commit an unlawful act or defraud, using or attempting to use a scanning device to access, read, obtain, memorize, or store, temporarily or permanently, information encoded on an identification document by means of magnetic strip, integrated circuit, or radio frequency identification tag without the permission of the authorized user or issuer of the identification document. (2) Knowingly and with the intent to commit an unlawful act or to defraud, possessing a reencoder; or knowingly and with intent to commit an unlawful act or defraud, using or attempting to use a reencoder to place encoded information on an identification document by means of magnetic strip, integrated circuit, or radio frequency identification tag without the permission of the authorized...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-113.htm - 2K - Match Info - Similar pages
14-11-50
Section 14-11-50 Prohibited activities; violations. (a) Except as otherwise authorized by law, or when authorized by the person in charge of the prison or other institution subject to this section, or by an officer of the institution empowered to give that authorization, it shall be unlawful for an inmate to possess a cellular telephone, wireless communication device, or computer that allows the input, output, examination, or transfer of computer programs from one computer to another person or for any person to possess with the intent to deliver, or delivers, to an inmate in the custody of the Alabama Department of Corrections a cellular telephone, wireless communication device, or a computer that allows the input, output, examination, or transfer of computer programs from one computer to another person. (b) An inmate in the custody of the Alabama Department of Corrections who by means of a cellular telephone, wireless communication device, or computer communication system that allows...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/14-11-50.htm - 2K - Match Info - Similar pages
30-3-192
Section 30-3-192 Data match system; accounts encumbered or surrendered; reasonable fees; liability; disclosure of financial records; penalties. (a) The state Title IV-D agency shall enter into agreements with financial institutions doing business in Alabama to develop and operate a data match system, using automated data exchanges to the maximum extent feasible, to provide on a calendar quarter basis the following information to the extent available for each noncustodial parent who maintains an account with the contracting financial institution and who owes past due support as identified by the state Title IV-D agency by name and Social Security number or other taxpayer identifying information: (i) name, (ii) record address, (iii) Social Security number or other tax identification number, and (iv) other identifying information that may be a part of the institution's records. (b) Upon service of a notice of lien or levy from the state Title IV-D agency on a financial institution, the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/30-3-192.htm - 2K - Match Info - Similar pages
32-7B-4
Section 32-7B-4 Functions of the Online Insurance Verification System. The online insurance verification system shall: (1) Be accessible by authorized personnel of the department for direct inquiry. Access by the courts, insurers, law enforcement, and offices of the licensing officials charged with motor vehicle registration and titling responsibilities shall be through authorized personnel of the department. Insurer access shall be limited to data or information transmission as required to operate the online insurance verification system. (2) Be able to verify, on a 24-hour, seven days per week basis, minus permitted down time for system maintenance as prescribed by the advisory council, the insurance status of a motor vehicle via the Internet, or similar electronic system consistent with insurance industry and IICMVA recommendations and the specifications and standards of the IICMVA model dated May 8, 2008, or later models as recommended by the advisory council and adopted by the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/32-7B-4.htm - 1K - Match Info - Similar pages
41-10-591
Section 41-10-591 Definitions. (a) Except as otherwise expressly provided herein, words and phrases used in this division that are defined in Section 41-10-541, shall have the meanings assigned in such section. (b) The following words and phrases used in this division, and others evidently intended as the equivalent thereof, shall, in the absence of clear implication herein otherwise, be given the following respective meanings: (1) COMPUTER SYSTEMS. Any and all computer hardware, firmware, and software owned by or useful in the performance of any function for any state entity. (2) STATE ENTITY. The State of Alabama and any agency, authority, board, commission, department, or instrumentality thereof. (3) Y2K COMPLIANT. When used to describe the state's computer systems, such computer systems are, or will be, capable of accurately processing, storing, providing and/or receiving date data from, into, and between the twentieth and twenty-first centuries, including the years 1999 and 2000,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-10-591.htm - 4K - Match Info - Similar pages
41-9-591
Section 41-9-591 Creation and functions; policies and procedures; transmittal exchange, and retrieval of information. (a) There is created and established an Alabama Justice Information Commission, which shall be the regulatory body to establish policy and procedures for the interstate and intrastate accumulation, storage, retrieval, analysis, and dissemination of information relating to offenses, criminals, and criminal activity collection, and the use of data within the state for criminal investigation and public safety purposes. (b) Central responsibility for the development, maintenance, operation, and administration of the policies and procedures dictated by the commission, and legal mandates of this article shall be vested with the secretary. (c) ALEA is designated the CJIS Systems Agency to the FBI CJIS, or its successor, and the NLETS System Agency to NLETS, or its successor. ALEA may enforce all laws, rules, and regulations regarding transmittal, exchange, and retrieval of...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/41-9-591.htm - 1K - Match Info - Similar pages
32-7B-5
Section 32-7B-5 Responsibilities of insurers. Each insurer shall do the following: (1) Cooperate with the department in operating the online insurance verification system. (2) Maintain the data necessary to verify insurance status through the online insurance verification system for a period of at least six months. (3) Maintain the web service, pursuant to the requirements established under the online insurance verification system and as specified by the advisory council. (4) Provide data security for the type of information transferred as prescribed by the advisory council that will not violate state or federal privacy laws. (5) Be immune from civil and administrative liability for good faith efforts to comply with the terms of this chapter. (6) Provide an insured under a commercial automobile insurance liability policy with an insurance card clearly indicating that the vehicle is insured under a commercial automobile liability insurance policy in accordance with Section 32-7A-6. (7)...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/32-7B-5.htm - 1K - Match Info - Similar pages
36-18-20
Section 36-18-20 Declaration of purpose. The Legislature hereby finds, determines and declares: (a) That the tragic incidence of violent crime in our society is growing at an alarming rate, and that these offenses often times are committed by repeat or habitual offenders against our most innocent and defenseless citizens. (b) That there is a critical and urgent need to provide law enforcement officers and agencies with the latest scientific technology available for the purpose of identifying, apprehending, arresting, and convicting those violent offenders. (c) That DNA testing, profiling, and analysis allows a more certain and rapid identification of such offenders as well as the exoneration of those wrongfully suspected or accused. (d) That genetic identification technology through DNA testing is generally accepted by the relevant scientific community. (e) That the procedures and techniques employing the underlying theory of DNA identification is capable of producing reliable results...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/36-18-20.htm - 3K - Match Info - Similar pages
40-23-240
Section 40-23-240 Development and implementation of system. (a) No later than September 30, 2013, the Department of Revenue shall develop and make available a system which allows any taxpayer required to file and remit a state, county, or municipal sales or use tax or a state, county, or municipal leasing or rental tax or a state, county, or municipal lodgings tax the ability to file and remit such sales and use tax or leasing or rental tax or lodgings tax returns and payments through an electronic single point of filing program. The system shall be known as the Optional Network Election for Single Point Online Transactions or "ONE SPOT." The system shall be available for use by any taxpayer for tax periods after September 30, 2013, provided the taxpayer complies with this article and any rules promulgated by the department for the administration of the system. The ONE SPOT system shall allow for sales and use tax or leasing or rental tax or lodgings tax return filing and tax...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/40-23-240.htm - 3K - Match Info - Similar pages
27-62-6
Section 27-62-6 Notification of cybersecurity event. (a) Each licensee shall notify the commissioner as promptly as possible, but in no event later than three business days from a determination that a cybersecurity event involving nonpublic information that is in the possession of a licensee has occurred when either of the following criteria has been met: (1) This state is the state of domicile of the licensee, in the case of an insurer, or this state is the home state of the licensee, in the case of a producer, as those terms are defined in Section 27-7-1, and the cybersecurity event has a reasonable likelihood of materially harming a consumer residing in this state or reasonable likelihood of materially harming any material part of the normal operation of the licensee. (2) The licensee reasonably believes that the nonpublic information involves 250 or more consumers residing in this state and the cybersecurity event is either of the following: a. A cybersecurity event impacting the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/27-62-6.htm - 7K - Match Info - Similar pages
|