Ask Reggi Your Question Now
Can you summarize 97 MSCO Chapter 45?
Crimes > Computer Crimes and Identity Theft
Short Summary
The provided legal document content covers various aspects of computer crimes, identity theft, cyberstalking, offenses against computer users, offenses against computer equipment or supplies, and offenses against intellectual property in Mississippi. It defines key terms related to these offenses and outlines the provisions and penalties associated with each offense. The document prohibits obtaining personal identity information without authorization, with the intent to unlawfully use that information for various purposes. It also prohibits accessing or causing to be accessed any computer, computer system, or computer network with the intent to defraud or obtain money, property, or services through false or fraudulent conduct. The penalties for these offenses vary based on the value of the damage or loss caused. The document also includes provisions for the investigation and prosecution of identity theft crimes, as well as the enforcement of subpoenas and the confidentiality of information gathered during investigations. It establishes venue for violations and clarifies that the criminal offenses created by this chapter do not supersede or repeal any other criminal offense. Additionally, the document addresses cyberstalking, online impersonation, and the use of scanning devices or reencoders to capture encoded information from payment cards. It outlines the penalties for these offenses and includes exemptions for constitutionally protected activities and lawful information sharing. Overall, these documents provide a comprehensive framework for addressing computer crimes, identity theft, cyberstalking, and related offenses in Mississippi.
Whom does it apply to?
Individuals involved in computer crimes, identity theft, cyberstalking, offenses against computer users, offenses against computer equipment or supplies, offenses against intellectual property
What does it govern?
Computer crimes, identity theft, cyberstalking, offenses against computer users, offenses against computer equipment or supplies, offenses against intellectual property
What are exemptions?
Obtaining personal identity information through the discovery process of a civil action, administrative proceeding, or arbitration proceeding; disclosure, use, copying, taking, or accessing by proper means as defined in this chapter; peaceable, nonviolent, or nonthreatening activities intended to express political views or provide lawful information; constitutionally protected activities such as speech, protest, or assembly
What are the Penalties?
For computer fraud, penalties vary based on the value of the damage or loss. Offenders may face fines, imprisonment, or both, depending on the severity of the offense. For offenses against computer users, offenses against computer equipment or supplies, and offenses against intellectual property, penalties also vary based on the value of the damage or loss. Offenders may face fines, imprisonment, or both, depending on the severity of the offense.
Jurisdiction
Mississippi