Can you summarize 815 ILCS 140?
The Credit Card Issuance Act, outlined in the Illinois Compiled Statutes, regulates the use and acceptance of credit cards in purchase and sale transactions. It defines a credit card as a card that can be used to obtain money, goods, services, or anything else of value on credit. The Act specifically excludes debit cards and negotiable instruments as defined in the Uniform Commercial Code. It also defines a merchant credit card agreement as a written agreement between a seller and the issuer of a credit card, which obligates the seller to accept credit cards.
Can you summarize 815 ILCS 145?
The Credit Card Liability Act, also known as the Credit Card Liability Act, is a legal document in Illinois that governs the liability of individuals who have credit cards issued in their name without their request or application. According to the Act, a person is not liable to the issuer of the card for any purchases made or amounts owing unless they have indicated their acceptance of the card through signing, using the card, or permitting its use by another.
Can you summarize 815 ILCS 150?
The Unsolicited Credit Card Act of 1977, also known as the Illinois Compiled Statutes 815 ILCS 150/1, defines key terms related to credit cards and establishes regulations for their use. The Act applies to financial institutions, including banks, insurance companies, credit unions, savings and loan associations, investment trusts, and other depositories of money or medium of savings or collective investment. It also applies to cardholders who use credit cards to obtain money, goods, services, or anything else of value on credit or in consideration of an undertaking or guaranty by the issuer of the payment of a check drawn by the cardholder.
Can you summarize 815 ILCS 505?
The Consumer Fraud and Deceptive Business Practices Act is a legal document that governs the advertising, offering for sale, sale, or distribution of services and any property, tangible or intangible, real, personal or mixed, that directly or indirectly affects the people of Illinois. The Act applies to sellers and individuals involved in chain referral sales techniques or pyramid sales schemes. It defines various terms such as ‘advertisement’, ‘merchandise’, ‘person’, ‘sale’, ‘consumer’, ’trade’, ‘commerce’, and ‘pyramid sales scheme’.
Can you summarize 815 ILCS 530?
The Personal Information Protection Act, as defined in the Illinois Compiled Statutes, governs the handling, collection, dissemination, and dealing with nonpublic personal information by data collectors. It applies to government agencies, public and private universities, corporations, financial institutions, retail operators, and other entities. The Act defines ‘breach of the security of the system data’ as the unauthorized acquisition of computerized data compromising the security, confidentiality, or integrity of personal information. It excludes good faith acquisition of personal information by an employee or agent of the data collector for a legitimate purpose, as long as it is not used for an unrelated purpose or subject to further unauthorized disclosure.
Can you summarize 815 ILCS 530/10?
This section of the Illinois Compiled Statutes, specifically the Personal Information Protection Act, outlines the requirements for data collectors in Illinois regarding the notification of breaches of personal information. It mandates that data collectors who own or license personal information of Illinois residents must notify the affected residents of any breach of the security of the data system. The notification should be made as soon as possible and without unreasonable delay.
Can you summarize 815 ILCS 530/5?
The Personal Information Protection Act, as defined in the Illinois Compiled Statutes, governs the handling, collection, dissemination, and dealing with nonpublic personal information by data collectors. Data collectors include government agencies, public and private universities, corporations, financial institutions, retail operators, and other entities. The Act defines ‘breach of the security of the system data’ as the unauthorized acquisition of computerized data compromising the security, confidentiality, or integrity of personal information. However, it excludes good faith acquisition of personal information by an employee or agent of the data collector for a legitimate purpose, as long as it is not used for an unrelated purpose or subject to further unauthorized disclosure.
Can you summarize WYST 11-25-302?
(a) Each vendor shall provide for a nationally recognized, independent gaming laboratory approved by the commission to submit to the commission a general functional evaluation laboratory report regarding the software installed on each skill based amusement game indicating whether the skill based amusement game is in compliance with this article. Any skill based amusement game that does not meet the requirements of this article shall immediately be removed from the state by the vendor.
Can you summarize WYST 11-25-306?
Any person who violates any provision of this article is guilty of a misdemeanor and shall be fined not more than ten thousand dollars ($10,000.00), imprisoned for not more than six (6) months, or both. Each violation of this section shall constitute a separate offense.
Can you summarize WYST 13-10-104?
This provision under Wyoming Statutes governs the wrongful certification, issuance, or delivery of instruments, preferences, or borrowing by individuals associated with financial institutions. It applies to owners, directors, officers, agents, and employees of financial institutions. The provision states that willfully certifying a check without sufficient funds is a misdemeanor punishable by a fine not exceeding $1,000. Issuing or delivering any certificate of deposit, drawing checks, drafts or bills of exchange, making acceptances, or signing certain financial instruments without board approval is a felony punishable by imprisonment for a period ranging from 1 to 20 years.