Code of Alabama

Search for this:
 Search these answers
1 through 10 of 133 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>

13A-8-192
Section 13A-8-192 Identity theft. (a) A person commits the crime of identity theft if, without
the authorization, consent, or permission of the victim, and with the intent to defraud for
his or her own benefit or the benefit of a third person, he or she does any of the following:
(1) Obtains, records, or accesses identifying information that would assist in accessing financial
resources, obtaining identification documents, or obtaining benefits of the victim. (2) Obtains
goods or services through the use of identifying information of the victim. (3) Obtains identification
documents in the victim's name. (4) Obtains employment through the use of identifying information
of the victim. (b) Identity theft is a Class B felony. (c) This section shall not apply when
a person obtains the identity of another person to misrepresent his or her age for the sole
purpose of obtaining alcoholic beverages, tobacco, or another privilege denied to minors.
(d) Any prosecution brought pursuant to this...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-192.htm - 1K - Match Info - Similar pages

13A-8-193
Section 13A-8-193 Trafficking in stolen identities. (a) A person commits the crime of trafficking
in stolen identities when, without the authorization, consent, or permission of the victim,
he or she manufactures, sells, transfers, purchases, or possesses, with intent to manufacture,
sell, transfer, or purchase, identification documents or identifying information for the purpose
of committing identity theft. (b) Possession of five or more identification documents of the
same person, or possession of identifying information of five or more separate persons, without
the authorization, consent, or permission of the person or persons, shall create an inference
that the identities are possessed with intent to manufacture, sell, transfer, or purchase
identification documents or identifying information for the purpose of committing identity
theft. (c) Trafficking in stolen identities is a Class B felony. (Act 2001-312, p. 399, §4.)...

alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-193.htm - 1K - Match Info - Similar pages

8-35-2
Section 8-35-2 Security freeze on credit report. (a) A consumer may place a security freeze
on the consumer's credit report by making a request in writing by certified mail to a consumer
credit reporting agency. No later than August 31, 2012, a consumer credit reporting agency
shall make available to consumers an Internet based method of requesting a security freeze
and a toll-free telephone number for consumers to use to place a security freeze, temporarily
lift a security freeze, or completely remove a security freeze. A security freeze shall prohibit,
subject to exceptions in subsection (m), the consumer credit reporting agency from releasing
the consumer's credit report or credit score without the prior express authorization of the
consumer as provided in subsection (d) or (e). Nothing in this subsection shall prevent a
consumer credit reporting agency from advising a third party that a security freeze is in
effect with respect to the consumer's credit report. (b) A consumer credit...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-35-2.htm - 12K - Match Info - Similar pages

13A-8-112
Section 13A-8-112 Computer tampering. (a) A person who acts without authority or who exceeds
authorization of use commits the crime of computer tampering by knowingly: (1) Accessing and
altering, damaging, or destroying any computer, computer system, or computer network. (2)
Altering, damaging, deleting, or destroying computer programs or data. (3) Disclosing, using,
controlling, or taking computer programs, data, or supporting documentation residing in, or
existing internal or external to, a computer, computer system, or network. (4) Directly or
indirectly introducing a computer contaminator or a virus into any computer, computer system,
or network. (5) Disrupting or causing the disruption of a computer, computer system, or network
services or denying or causing the denial of computer or network services to any authorized
user of a computer, computer system, or network. (6) Preventing a computer user from exiting
a site, computer system, or network-connected location in order to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-112.htm - 4K - Match Info - Similar pages

13A-8-195
Section 13A-8-195 Restitution for financial loss. Upon conviction for any crime in this article,
in addition to any other punishment, a person found guilty shall be ordered by the court to
make restitution for financial loss caused by the criminal violation of this article to any
person whose identifying information was appropriated. Financial loss may include any costs
incurred by the victim in correcting the credit history or credit rating of the victim or
any costs incurred in connection with any civil or administrative proceeding to satisfy any
debt, lien, or other obligations resulting from the theft of the victim's identification documents
or identifying information, including lost wages and attorney's fees. The court may order
restitution for financial loss to any other person or entity that suffers a loss from the
violation. Additionally, persons convicted of violation of this article shall be assessed
an amount of twenty-five dollars ($25) per day and medical expenses for time...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-195.htm - 1K - Match Info - Similar pages

13A-8-198
Section 13A-8-198 Order to correct records. (a) Upon a conviction for any crime in violation
of this article or conviction of any other offense which the court finds involved identity
theft, and at the victim's request, the sentencing court shall issue any orders necessary
to correct any public or private record that contains false information as a result of a criminal
violation of this article. Any order shall be under seal and may be released only as prescribed
by this section. The order shall include the following information: (1) Information about
financial accounts affected by the crime, including, but not limited to, the name of the financial
institution, the account number, amount of money involved in the crime, and the date of the
crime. (2) The specific identifying information and identification documents used to commit
the crime. (3) A description of the perpetrator of the crime. (b) The victim may release the
orders as follows: (1) The victim may submit this order in any...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-198.htm - 1K - Match Info - Similar pages

8-38-4
Section 8-38-4 Investigation of security breach. (a) If a covered entity determines that a
breach of security has or may have occurred in relation to sensitive personally identifying
information that is accessed, acquired, maintained, stored, utilized, or communicated by,
or on behalf of, the covered entity, the covered entity shall conduct a good faith and prompt
investigation that includes all of the following: (1) An assessment of the nature and scope
of the breach. (2) Identification of any sensitive personally identifying information that
may have been involved in the breach and the identity of any individuals to whom that information
relates. (3) A determination of whether the sensitive personally identifying information has
been acquired or is reasonably believed to have been acquired by an unauthorized person, and
is reasonably likely to cause substantial harm to the individuals to whom the information
relates. (4) Identification and implementation of measures to restore the...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-38-4.htm - 2K - Match Info - Similar pages

33-5-100
Section 33-5-100 Unauthorized alteration or removal of identification number or registration
information; forfeiture. (a) As used in this section, the following words have the following
meanings: (1) FALSIFY. The term includes alter and forge. (2) IDENTIFIABLE COMPONENT PART.
The term includes any part of a vessel or outboard motor that has an identifying number stamped,
molded, engraved, cast, or placed on it by the manufacturer or any part that can be identified
by other means as being a part of a particular vessel or outboard motor. (3) IDENTIFICATION
NUMBER. The term includes an identifying number, engine number, outboard motor number, or
other distinguishing number or mark placed on a vessel, outboard motor, vessel trailer, or
the engine, transmission, or other component part of a vessel, by its manufacturer or by authority
of the Department of Conservation and Natural Resources or in accordance with the laws of
another state or country. (4) REMOVE. The term includes deface,...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/33-5-100.htm - 8K - Match Info - Similar pages

13A-8-111
Section 13A-8-111 Definitions. As used in this article, the following terms shall have the
following meanings: (1) ACCESS. To gain entry to, instruct, communicate with, store data in,
retrieve or intercept data from, alter data or computer software in, or otherwise make use
of any resource of a computer, computer system, or computer network. (2) COMPUTER. An electronic,
magnetic, optical, electrochemical, or other high speed data processing device or system that
performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic
impulses and includes all input, output, processing, storage, or communication facilities
that are connected or related to the device. (3) COMPUTER NETWORK. The interconnection of
two or more computers or computer systems that transmit data over communication circuits connecting
them. (4) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements
that when executed by a computer cause the computer to...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/13A-8-111.htm - 7K - Match Info - Similar pages

8-35-3
Section 8-35-3 Notice of rights. At any time that a consumer is required to receive a summary
of rights required by 15 U.S.C. §1681g(d) of the federal Fair Credit Reporting Act, the consumer
shall also be provided with the following notice: "Alabama Consumers Have the Right to
Obtain a Security Freeze. You have a right to place a security freeze on your credit report,
which will prohibit a consumer reporting agency from releasing information in your credit
report without your express authorization. A security freeze must be requested in writing
by certified mail or by electronic means as provided by a consumer reporting agency. The security
freeze is designed to prevent credit, loans, and services from being approved in your name
without your consent. If you are actively seeking a new credit, loan, utility, telephone,
or insurance account, you should understand that the procedures involved in lifting a security
freeze may slow your applications for credit. You should plan ahead and...
alisondb.legislature.state.al.us/alison/CodeOfAlabama/1975/8-35-3.htm - 2K - Match Info - Similar pages

1 through 10 of 133 similar documents, best matches first.
  Page: 1 2 3 4 5 6 7 8 9 10   next>>