Podobne
 
[ Pobierz całość w formacie PDF ]

Subsec. (b)(2). Pub. L. 103-322, Sec. 330016(1)(M), substituted “under this title” for
“not more than $15,000”.
Subsec. (b)(3). Pub. L. 103-322, Sec. 330016(1)(K), substituted “under this title” for
“not more than $5,000”.
1990 – Subsec. (d)(5). Pub. L. 101-647 inserted “commonwealth,” before “possession
or territory of the United States”.
1988 – Subsec. (a)(6). Pub. L. 100-690 inserted “knowingly” before “possesses”, “law-
ful” before first reference to “authority”, and “such” before second reference to “au-
thority”.
1986 – Subsec. (e). Pub. L. 99-646 substituted “chapter 224 of this title” for “title V of
the Organized Crime Control Act of 1970 (18 USC note prec. 3481)”.
EFFECTIVE DATE OF 1996 AMENDMENT
Section 211(c) of div. C of Pub. L. 104-208 provided that: “This section (amending
this section and sections 1425 to 1427, 1541 to 1544, and 1546 of this title and
enacting provisions set out as a note under section 994 of Title 28, Judiciary and
Judicial Procedure) and the amendments made by this section shall apply with respect
to offenses occurring on or after the date of the enactment of this Act (Sept. 30, 1996).”
© 2000 by CRC Press LLC
FRAUD AND RELATED ACTIVITY IN CONNECTION WITH IDENTIFICATION
DOCUMENTS
Pub. L. 98-473, title II, Sec. 609L, Oct. 12, 1984, 98 Stat. 2103, provided that:
“(a) For purposes of section 1028 of title 18, United States Code, to the maximum
extent feasible, personal descriptors or identifiers utilized in identification docu-
ments, as defined in such section, shall utilize common descriptive terms and formats
designed to —
“(1) reduce the redundancy and duplication of identification systems by pro-
viding information which can be utilized by the maximum number of authori-
ties, and
“(2) facilitate positive identification of bona fide holders of identification docu-
ments.
“(b) The President shall, no later than 3 years after the date of enactment of this Act
(Oct. 12, 1984), and after consultation with Federal, State, local, and international
issuing authorities, and concerned groups make recommendations (recommenda-
tions) to the Congress for the enactment of comprehensive legislation on Federal
identification systems. Such legislation shall —
“(1) give due consideration to protecting the privacy of persons who are the
subject of any identification system,
“(2) recommend appropriate civil and criminal sanctions for the misuse or un-
authorized disclosure of personal identification information, and
“(3) make recommendations providing for the exchange of personal identifica-
tion information as authorized by Federal or State law or Executive order of the
President or the chief executive officer of any of the several States.”
–SECREF–
SECTION REFERRED TO IN OTHER SECTIONS
This section is referred to in sections 922, 981, 982, 2257, 2326, 2516 of this title; title
8 section 1324a; title 22 section 2709; title 31 section 9703; title 42 section 5119a.
18 USC Section 1029
–EXPCITE–
TITLE 18 – CRIMES AND CRIMINAL PROCEDURE
PART I – CRIMES
CHAPTER 47 – FRAUD AND FALSE STATEMENTS
© 2000 by CRC Press LLC
–HEAD–
Sec. 1029. Fraud and related activity in connection with access devices
–STATUTE–
(a) Whoever —
(1) knowingly and with intent to defraud produces, uses, or traffics in one or
more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or uses one or more unau-
thorized access devices during any one-year period, and by such conduct obtains
anything of value aggregating $1000 or more during that period;
(3) knowingly and with intent to defraud possesses fifteen or more devices which
are counterfeit or unauthorized access devices;
(4) knowingly, and with intent to defraud, produces, traffics in, has control or
custody of, or possesses device-making equipment;
(5) knowingly and with intent to defraud effects transactions, with 1 or more
access devices issued to another person or persons, to receive payment or any
other thing of value during any 1-year period the aggregate value of which is
equal to or greater than $1,000;
(6) without the authorization of the issuer of the access device, knowingly and
with intent to defraud solicits a person for the purpose of —
(A) offering an access device; or
(B) selling information regarding or an application to obtain an access device;
(7) knowingly and with intent to defraud uses, produces, traffics in, has control
or custody of, or possesses a telecommunications instrument that has been
modified or altered to obtain unauthorized use of telecommunications services;
(8) knowingly and with intent to defraud uses, produces, traffics in, has control
or custody of, or possesses —
(A) a scanning receiver; or
(B) hardware or software used for altering or modifying telecommunica-
tions instruments to obtain unauthorized access to telecommunications
services, (FOOTNOTE 1)
(FOOTNOTE 1) So in original. The comma probably should be a semicolon.
(9) without the authorization of the credit card system member or its agent,
knowingly and with intent to defraud causes or arranges for another person to
present to the member or its agent, for payment, 1 or more evidences or records
of transactions made by an access device; shall, if the offense affects interstate or
foreign commerce, be punished as provided in subsection (c) of this section.
© 2000 by CRC Press LLC
(b)
(1) Whoever attempts to commit an offense under subsection (a) of this section
shall be punished as provided in subsection (c) of this section.
(2) Whoever is a party to a conspiracy of two or more persons to commit an
offense under subsection (a) of this section, if any of the parties engages in any
conduct in furtherance of such offense, shall be fined an amount not greater [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • karro31.pev.pl
  •  
    Copyright © 2006 MySite. Designed by Web Page Templates