Mississippi Computer Crimes and Identity Theft (Miss. Code Ann. § 97-45-1 — § 97-45-33)

Mississippi Computer Crimes and Identity Theft

Miss. Code Ann. § 97-45-1 — § 97-45-33

 

CITATION:

Mississippi Code 1972 Annotated

Title 97. Crimes (Chs. 1 — 47)

Chapter 45. Computer Crimes and Identity Theft (§§ 97-45-1 — 97-45-33)

§ 97-45-1. Definitions.

§ 97-45-2. Identity theft; definitions; investigative authority of Attorney General; form of subpoena; enforcement and penal provisions; refusal to produce documents as requested by subpoena; confidentiality of information.

§ 97-45-3. Computer fraud; penalties.

§ 97-45-5. Offense against computer users; penalties.

§ 97-45-7. Offense against computer equipment; penalties.

§ 97-45-9. Offense against intellectual property; penalties.

§ 97-45-11. Venue.

§ 97-45-13. Effect on other offenses.

§ 97-45-15. “Cyberstalking”; penalties.

§ 97-45-17. Posting of messages through electronic media for purpose of causing injury to any person; penalties.

§ 97-45-19. Identity theft.

§ 97-45-21. Jurisdiction for bringing criminal action.

§ 97-45-23. Investigations and prosecutions.

§ 97-45-25. Additional penalties for violations under this chapter; funding of expenses of Attorney General’s Cyber Crime Central or special fund program; deposit of user charges and fees authorized under this section into State General Fund.

§ 97-45-27. Identity theft; victim authorized to expunge record of false charges accrued on account of activities of the perpetrator.

§ 97-45-29. Identity theft; Attorney General authorized to issue “Identity Theft Passports” verifying that expunction order has been entered or police report has been filed; access to identity theft information.

§ 97-45-31. Using scanning device or reencoder to capture encoded information from magnetic strip on credit, debit or other payment card; definitions; penalty.

§ 97-45-33. Online impersonation; penalties.

 

§ 97-45-1. Definitions.

For the purposes of this chapter, the following words shall have the meanings ascribed herein unless the context clearly requires otherwise:

(a) “Access” means to program, to execute programs on, to communicate with, store data in, retrieve data from or otherwise make use of any resources, including data or programs, of a computer, computer system or computer network.

(b) “Computer” includes an electronic, magnetic, optical or other high-speed data processing device or system performing logical arithmetic and storage functions and includes any property, data storage facility or communications facility directly related to or operating in conjunction with such device or system. “Computer” shall not include an automated typewriter or typesetter, a machine designed solely for word processing which contains no database intelligence or a portable hand-held calculator nor shall “computer” include any other device which contains components similar to those in computers but in which the components have the sole function of controlling the device for the single purpose for which the device is intended unless the thus controlled device is a processor of data or is a storage of intelligence in which case it too is included.

(c) “Computer network” means a set of related, remotely connected devices and communication facilities including at least one (1) computer system with the capability to transmit data through communication facilities.

(d) “Computer program” means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data.

(e) “Computer software” means a set of computer programs, procedures and associated documentation concerned with operation of a computer system.

(f) “Computer system” means a set of functionally related, connected or unconnected, computer equipment, devices or computer software.

(g) “Computer services” means providing access to or service or data from a computer, a computer system or a computer network and includes the actual data processing.

(h) “Credible threat” means a threat made with the intent and the apparent ability to carry out the threat so as to cause the person who is the target of the threat to reasonably fear for his or her safety.

(i) “Loss or damage” includes any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred or other consequential damages incurred because of interruption of service.

(j) “Device” includes, but is not limited to, an electronic, magnetic, electrochemical, biochemical, hydraulic, optical, or organic object that performs input, output, or storage functions by the manipulation of electronic, magnetic or other impulses.

(k) “Electronic communication” means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature, transmitted in whole or in part by a wire, radio, computer, electromagnetic, photoelectric or photo-optical system.

(l) “Electronic mail” means the transmission of information or communication by the use of the Internet, a computer, a facsimile machine, a pager, a cellular telephone, a video recorder or other electronic means sent to a person identified by a unique address or address number and received by that person.

(m) “Emotional distress” means significant mental suffering or distress that may, but does not necessarily, require medical or other professional treatment or counseling.

(n) “Financial instrument” means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card as defined in Section 97-19-9(b), Mississippi Code of 1972, or marketable security.

(o) “Financial transaction device” means any of the following:

(i) An electronic funds transfer card.

(ii) A credit card.

(iii) A debit card.

(iv) A point-of-sale card.

(v) Any instrument, device, card, plate, code, account number, personal identification number, or a record or copy of a code, account number, or personal identification number or other means of access to a credit account or deposit account, or a driver’s license or state identification card used to access a proprietary account, other than access originated solely by a paper instrument, that can be used alone or in conjunction with another access device, for any of the following purposes.

1. Obtaining money, cash refund or credit account credit, goods, services or any other thing of value.

2. Certifying or guaranteeing to a person or business the availability to the device holder of funds on deposit to honor a draft or check payable to the order of that person or business.

3. Providing the device holder access to a deposit account for the purpose of making deposits, withdrawing funds, transferring funds between deposit accounts, obtaining information pertaining to a deposit account or making an electronic funds transfer.

(p) “Intellectual property” includes data, computer programs, computer software, trade secrets, copyrighted materials and confidential or proprietary information in any form or medium when such is stored in, produced by or intended for use or storage with or in a computer, a computer system or a computer network.

(q) “Internet” means that term as defined in Section 230 of Title II of the Communications Act of 1934, Chapter 652, 110 Stat. 137, 47 USCS 230.

(r) “Medical records” includes, but is not limited to, medical and mental health histories, reports, summaries, diagnoses and prognoses, treatment and medication information, notes, entries, and x-rays and other imaging records.

(s) “Personal identity information” means any of the following information of another person:

(i) A social security number.

(ii) A driver’s license number, state personal identification card number or tribal identification card number.

(iii) Employment information.

(iv) Information regarding any financial account held by another person including, but not limited to, any of the following:

1. A savings or checking account number.

2. A financial transaction device account number.

3. A stock or other security certificate or account number.

4. A personal information number for an account described in items 1 through 4.

(t) “Post a message” means transferring, sending, posting, publishing, disseminating, or otherwise communicating or attempting to transfer, send, post, publish, disseminate or otherwise communicate information, whether truthful or untruthful, about the victim.

(u) “Property” means property as defined in Section 1-3-45, Mississippi Code of 1972, and shall specifically include, but not be limited to, financial instruments, electronically stored or produced data and computer programs, whether in machine readable or human readable form.

(v) “Proper means” includes:

(i) Discovery by independent invention;

(ii) Discovery by “reverse engineering”; that is, by starting with the known product and working backward to find the method by which it was developed. The acquisition of the known product must be by lawful means;

(iii) Discovery under license or authority of the owner;

(iv) Observation of the property in public use or on public display; or

(v) Discovery in published literature.

(w) “Unconsented contact” means any contact with another individual that is initiated or continued without that individual’s consent or in disregard of that individual’s expressed desire that the contact be avoided or discontinued. Unconsented contact includes any of the following:

(i) Following or appearing within sight of the victim.

(ii) Approaching or confronting the victim in a public place or on private property.

(iii) Appearing at the victim’s workplace or residence.

(iv) Entering onto or remaining on property owned, leased or occupied by the victim.

(v) Contacting the victim by telephone.

(vi) Sending mail or electronic communications to the victim through the use of any medium, including the Internet or a computer, computer program, computer system or computer network.

(vii) Placing an object on, or delivering or having delivered an object to, property owned, leased or occupied by the victim.

(x) “Use” means to make use of, to convert to one’s service, to avail oneself of or to employ. In the context of this chapter, “use” includes to instruct, communicate with, store data in or retrieve data from, or otherwise utilize the logical arithmetic or memory functions of a computer.

(y) “Victim” means the individual who is the target of the conduct elicited by the posted message or a member of that individual’s immediate family.

History

Laws, 1985, ch. 319, § 1; Laws, 2003, ch. 562, § 4, eff from and after July 1, 2003; Laws, 2021, ch. 378, § 15, eff from and after July 1, 2021.

 

§ 97-45-2. Identity theft; definitions; investigative authority of Attorney General; form of subpoena; enforcement and penal provisions; refusal to produce documents as requested by subpoena; confidentiality of information.

(1) For the purposes of this chapter, “identity theft” includes crimes chargeable under the following provisions of law:

(a) Section 97-9-79, which relates to false information.

(b) Section 97-19-83, which relates to fraud by mail or other means of communication.

(c) Section 97-19-85, which relates to the fraudulent use of identity social security number, credit card or debit card number or other identifying information.

(d) Section 97-45-19, which relates to obtaining personal identity information of another person without authorization.

(2)

(a) In conducting identity theft investigations, the Attorney General shall have the authority to issue and serve subpoenas to any person in control of any designated documents for the production of such documents, including, but not limited to, writings, drawings, graphs, charts, photographs, phono-records and other data compilations from which information can be obtained, or translated through detection devices into reasonably usable form. Such subpoenas shall require the named person, his agent or attorney, to appear and deliver the designated documents to a location in the county of his residence unless the court for good cause shown directs that the subpoena be issued for the person to deliver such documents to a location outside of the county of his residence. Mere convenience of the Attorney General shall not be considered good cause. The Attorney General or his designee shall have the authority to inspect and copy such documents. Such subpoenas shall be issued only upon the ex parte and in camera application of the Attorney General to the circuit or chancery court of the county of residence of the person in control of the documents or the circuit or chancery court of the county where the person in control of the documents may be found, and only upon a showing that the documents sought are relevant to a criminal investigation under this chapter or may lead to the discovery of such relevant evidence. Thereafter said court shall have jurisdiction to enforce or quash such subpoenas and to enter appropriate orders thereon, and nothing contained in this section shall affect the right of a person to assert a claim that the information sought is privileged by law.

(b) A subpoena issued pursuant to this subsection shall be in substantially the following form:

SUBPOENA TO PRODUCE DOCUMENTS PURSUANT

TO AN INVESTIGATION BY THE

ATTORNEY GENERAL

TO:

YOU ARE HEREBY COMMANDED to appear before the Attorney General of the State of Mississippi or his designated staff attorney at the place, date and time specified below in an investigation being conducted by the Attorney General pursuant to Section , Mississippi Code of 1972:

Place  Date and Time

YOU ARE ALSO COMMANDED to bring with you the following document(s) or object(s) .

You are advised that the  Court of the  Judicial District of  County, Mississippi, has approved the ex parte and in camera application of the Attorney General to issue this subpoena, and jurisdiction to enforce and/or quash the subpoena and to enter appropriate orders thereon is statutorily vested in the said court; enforcement and penal provisions applicable to an Attorney General’s investigation include those set forth in Section , Mississippi Code of 1972; and disclosure of testimony and/or records coming into possession of the Attorney General pursuant to this subpoena shall be limited by and subject to the provisions of said section (for informational purposes, these cited statutes are reproduced on the reverse side of this subpoena).

You may wish to consult an attorney in regard to this subpoena. You have certain state and federal constitutional rights, including your protection against self-incrimination and unreasonable search and seizure which this subpoena may affect.

ISSUED BY AND UNDER SEAL OF THE ATTORNEY GENERAL OF THE STATE OF MISSISSIPPI, this the  day of , 20.

(SEAL)

(c) Following service of any subpoena, pursuant to the provisions of this subsection, a record of the return shall be made and kept by the Attorney General and subject only to such disclosure as may be authorized pursuant to the provisions of this section.

(3) Enforcement and penal provisions applicable to an investigation under this section shall include the following:

(a) If a person who has been served with a subpoena, which has been issued and served upon him in accordance with the provisions of this section, shall fail to deliver or have delivered the designated documents at the time and place required in the subpoena, on application of the Attorney General the circuit or chancery court having approved the issuance of the subpoena may issue an attachment for such person, returnable immediately, or at such time and place as the court may direct. Bond may be required and fine imposed and proceedings had thereon as in the case of a subpoenaed witness who fails to appear in circuit or chancery court.

(b) Every person who shall knowingly and willfully obstruct, interfere with or impede an investigation under this section by concealing or destroying any documents, papers or other tangible evidence which are relevant to an investigation under this section shall be guilty of a felony and, upon conviction, shall be punished by a fine of not more than Five Thousand Dollars ($5,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(c) Every person who shall knowingly and willfully endeavor, by means of bribery, force or intimidation, to obstruct, delay or prevent the communication of information to any agent or employee of the Office of the Attorney General or who injures another person for the purpose of preventing the communication of such information or an account of the giving of such information relevant to an investigation under this section shall be guilty of a felony and, upon conviction, shall be punished by a fine of not more than Five Thousand Dollars ($5,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(d) The provisions of paragraphs (a), (b) and (c) of this subsection shall not prohibit the enforcement of, or prosecution under, any other statutes of this state.

(4)

(a) If any person shall refuse, or is likely to refuse, on the basis of his privilege against self-incrimination, to produce the designated documents as requested by a subpoena issued under this section or issued by a court, the Attorney General may request the court, ex parte and in camera, to issue an order requiring such person to produce the documents information which he refuses to give or provide on the basis of his privilege against self-incrimination. The Attorney General may request said order under this subsection when, in his judgment:

(i) The documents sought from such individual may be necessary to the public interest; and

(ii) Such individual has refused or is likely to refuse to produce the designated document on the basis of his privilege against self-incrimination.

Following such request, an order shall issue in accordance with this section requiring such person to produce the documents which he refuses to produce on the basis of his privilege against self-incrimination.

(b) Whenever a witness refuses, on the basis of his privilege against self-incrimination, to produce documents, and the court issues to the witness an order under paragraph (a) of this subsection, the witness may not refuse to comply with the order on the basis of his privilege against self-incrimination, but no documents or information compelled under the aforesaid order, or any information directly or indirectly derived from such documents may be used against the witness in any criminal proceeding, except a prosecution for perjury, giving a false statement, or otherwise failing to comply with the order.

(5) Documents in the possession of the Attorney General gathered pursuant to the provisions of this section and subpoenas issued by him shall be maintained in confidential files with access limited to prosecutorial and other law enforcement investigative personnel on a “need to know” basis and shall be exempt from the provisions of the Mississippi Public Records Act of 1983, except that upon the filing of an indictment or information, or upon the filing of an action for recovery of property, funds or fines, such documents shall be subject to such disclosure as may be required pursuant to the applicable statutes or court rules governing the trial of any such judicial proceeding.

(6) No person, including the Attorney General, a member of his staff, prosecuting attorney, law enforcement officer, witness, court reporter, attorney or other person, shall disclose to an unauthorized person documents, including subpoenas issued and served, gathered by the Attorney General pursuant to the provisions of this section, except that upon the filing of an indictment or information, or upon the filing of an action for recovery of property, funds or fines, or in other legal proceedings, such documents shall be subject to such disclosure as may be required pursuant to applicable statutes and court rules governing the trial of any such judicial proceeding. In event of an unauthorized disclosure of any such documents gathered by the Attorney General pursuant to the provisions of this section, the person making any such unauthorized disclosure shall be guilty of a misdemeanor, and upon conviction thereof, shall be punished by a fine of not more than One Thousand Dollars ($1,000.00), or imprisonment of not more than six (6) months, or by both such fine and imprisonment.

(7) The powers of the Attorney General under this section shall not diminish the powers of local authorities to investigate or prosecute any type of identity theft crime or any other criminal conduct within their respective jurisdictions, and the provisions of this section shall be in addition to the powers and authority previously granted the Attorney General by common, constitutional, statutory or case law.

History

Laws, 2004, ch. 526, § 6, eff from and after July 1, 2004.

 

§ 97-45-3. Computer fraud; penalties.

(1) Computer fraud is the accessing or causing to be accessed of any computer, computer system, computer network or any part thereof with the intent to:

(a) Defraud;

(b) Obtain money, property or services by means of false or fraudulent conduct, practices or representations; or through the false or fraudulent alteration, deletion or insertion of programs or data; or

(c) Insert or attach or knowingly create the opportunity for an unknowing and unwanted insertion or attachment of a set of instructions or a computer program into a computer program, computer, computer system, or computer network, that is intended to acquire, alter, damage, delete, disrupt, or destroy property or otherwise use the services of a computer program, computer, computer system or computer network.

(2) Whoever commits the offense of computer fraud when the damage or loss or attempted damage or loss amounts to a value of less than One Thousand Dollars ($1,000.00) may be punished, upon conviction, by a fine of not more than One Thousand Dollars ($1,000.00), or by imprisonment for not more than six (6) months in the county jail, or by both if the court finds substantial and compelling reasons why the offender cannot be safely and effectively supervised in the community, is not amenable to community-based treatment, or poses a significant risk to public safety. If such a finding is not made, the court shall suspend the sentence of imprisonment and impose a period of probation not exceeding one (1) year or a fine of not more than One Thousand Dollars ($1,000.00), or both. Any person convicted of a third or subsequent offense under this subsection where the value of the property is not less than Five Hundred Dollars ($500.00), shall be imprisoned in the Penitentiary for a term not exceeding three (3) years or fined an amount not exceeding Two Thousand Dollars ($2,000.00), or both.

(3) Whoever commits the offense of computer fraud when the damage or loss or attempted damage or loss amounts to a value of One Thousand Dollars ($1,000.00) or more but less than Five Thousand Dollars ($5,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(4) Whoever commits the offense of computer fraud when the damage or loss or attempted damage or loss amounts to a value of Five Thousand Dollars ($5,000.00) or more but less than Twenty-five Thousand Dollars ($25,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than ten (10) years, or by both such fine and imprisonment.

(5) Whoever commits the offense of computer fraud when the damage or loss or attempted damage or loss amounts to a value of Twenty-five Thousand Dollars ($25.000.00) or more, may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than twenty (20) years, or by both such fine and imprisonment.

(6) The definition of the term “computer network” includes the Internet, as defined in Section 230 of Title II of the Communications Act of 1934, Chapter 652, 110 Stat. 137, codified at 47 USCS 230.

History

Laws, 1985, ch. 319, § 2; Laws, 2003, ch. 562, § 5; Laws, 2013, ch. 367, § 1; Laws, 2014, ch. 457, § 31, eff from and after July 1, 2014.

 

§ 97-45-5. Offense against computer users; penalties.

(1) An offense against computer users is the intentional:

(a) Denial to an authorized user, without consent, of the full and effective use of or access to a computer, a computer system, a computer network or computer services; or

(b) Use or disclosure to another, without consent, of the numbers, codes, passwords or other means of access to a computer, a computer system, a computer network or computer services.

(2) Whoever commits an offense against computer users when the damage or loss or attempted damage or loss amounts to a value of less than One Thousand Dollars ($1,000.00) may be punished, upon conviction, by a fine of not more than One Thousand Dollars ($1,000.00), or by imprisonment for not more than six (6) months in the county jail, or by both if the court finds substantial and compelling reasons why the offender cannot be safely and effectively supervised in the community, is not amenable to community-based treatment, or poses a significant risk to public safety. If such a finding is not made, the court shall suspend the sentence of imprisonment and impose a period of probation not exceeding one (1) year or a fine of not more than One Thousand Dollars ($1,000.00), or both. The total value of property taken, stolen or carried away by the person from a single victim shall be aggregated in determining the gravity of the offense. Any person convicted of a third or subsequent offense under this subsection where the value of the property is not less than Five Hundred Dollars ($500.00), shall be imprisoned in the Penitentiary for a term not exceeding three (3) years or fined an amount not exceeding One Thousand Dollars ($1,000.00), or both.

(3) Whoever commits an offense against computer users when the damage or loss amounts to a value of One Thousand Dollars ($1,000.00) or more but less than Five Thousand Dollars ($5,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00), or imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(4) Whoever commits an offense against computer users when the damage or loss amounts to a value of Five Thousand Dollars ($5,000.00) or more but less than Twenty-five Thousand Dollars ($25,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00), or imprisonment for not more than ten (10) years, or by both such fine and imprisonment.

(5) Whoever commits an offense against computer users when the damage or loss amounts to a value of Twenty-five Thousand Dollars ($25,000.00) or more, may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00), or imprisonment for not more than twenty (20) years, or by both such fine and imprisonment.

History

Laws, 1985, ch. 319, § 3; Laws, 2014, ch. 457, § 32, eff from and after July 1, 2014.

 

§ 97-45-7. Offense against computer equipment; penalties.

(1) An offense against computer equipment or supplies is the intentional modification or destruction, without consent, of computer equipment or supplies used or intended to be used in a computer, computer system or computer network.

(2) Whoever commits an offense against computer equipment or supplies when the damage or loss or attempted damage or loss amounts to a value of less than One Thousand Dollars ($1,000.00) may be punished, upon conviction, by a fine of not more than One Thousand Dollars ($1,000.00), or by imprisonment for not more than six (6) months in the county jail, or both if the court finds substantial and compelling reasons why the offender cannot be safely and effectively supervised in the community, is not amenable to community-based treatment, or poses a significant risk to public safety. If such a finding is not made, the court shall suspend the sentence of imprisonment and impose a period of probation not exceeding one (1) year or a fine of not more than One Thousand Dollars ($1,000.00), or both. The total value of property taken, stolen or carried away by the person from a single victim shall be aggregated in determining the gravity of the offense. Any person convicted of a third or subsequent offense under this subsection where the value of the property is not less than Five Hundred Dollars ($500.00), shall be imprisoned in the Penitentiary for a term not exceeding three (3) years or fined an amount not exceeding One Thousand Dollars ($1,000.00), or both.

(3) Whoever commits an offense against computer equipment or supplies when the damage or loss amounts to a value of One Thousand Dollars ($1,000.00) or more but less than Five Thousand Dollars ($5,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(4) Whoever commits an offense against computer equipment or supplies when the damage or loss amounts to a value of Five Thousand Dollars ($5,000.00) or more but less than Twenty-five Thousand Dollars ($25,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than ten (10) years, or by both such fine and imprisonment.

(5) Whoever commits an offense against computer equipment or supplies when the damage or loss amounts to a value of Twenty-five Thousand Dollars ($25,000.00) or more, may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than twenty (20) years, or by both such fine and imprisonment.

History

Laws, 1985, ch. 319, § 4; Laws, 2014, ch. 457, § 33, eff from and after July 1, 2014.

 

§ 97-45-9. Offense against intellectual property; penalties.

(1) An offense against intellectual property is the intentional:

(a) Destruction, insertion or modification, without consent, of intellectual property; or

(b) Disclosure, use, copying, taking or accessing, without consent, of intellectual property.

(2) Whoever commits an offense against intellectual property when the damage or loss or attempted damage or loss amounts to a value of less than One Thousand Dollars ($1,000.00) may be punished, upon conviction, by a fine of not more than One Thousand Dollars ($1,000.00), or by imprisonment for not more than six (6) months in the county jail, or by both if the court finds substantial and compelling reasons why the offender cannot be safely and effectively supervised in the community, is not amenable to community-based treatment, or poses a significant risk to public safety. If such a finding is not made, the court shall suspend the sentence of imprisonment and impose a period of probation not exceeding one (1) year or a fine of not more than One Thousand Dollars ($1,000.00), or both. The total value of property taken, stolen or carried away by the person from a single victim shall be aggregated in determining the gravity of the offense. Any person convicted of a third or subsequent offense under this subsection where the value of the property is not less than Five Hundred Dollars ($500.00), shall be imprisoned in the Penitentiary for a term not exceeding three (3) years or fined an amount not exceeding One Thousand Dollars ($1,000.00), or by both.

(3) Whoever commits an offense against intellectual property when the damage or loss amounts to a value of One Thousand Dollars ($1,000.00) or more but less than Five Thousand Dollars ($5,000.00), the offender may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.

(4) Whoever commits an offense against intellectual property when the damage or loss amounts to a value of Five Thousand Dollars ($5,000.00) or more but less than Twenty-five Thousand Dollars ($25,000.00), may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than ten (10) years, or by both such fine and imprisonment.

(5) Whoever commits an offense against intellectual property when the damage or loss amounts to a value of Twenty-five Thousand Dollars ($25,000.00) or more, may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than twenty (20) years, or by both such fine and imprisonment.

(6) The provisions of this section shall not apply to the disclosure, use, copying, taking, or accessing by proper means as defined in this chapter.

History

Laws, 1985, ch. 319, § 5; Laws, 2014, ch. 457, § 34, eff from and after July 1, 2014.

 

§ 97-45-11. Venue.

For the purposes of venue under the provisions of this chapter, any violation of this chapter shall be considered to have been committed:

(a) In any county in which any act was performed in furtherance of any transaction violating this chapter; and

(b) In any county from which, to which or through which any access to a computer, computer system or computer network was made, whether by wire, electromagnetic waves, microwaves or any other means of communication.

History

Laws, 1985, ch. 319, § 6, eff from and after July 1, 1985.

 

§ 97-45-13. Effect on other offenses.

The criminal offenses created by this chapter shall not be deemed to supersede, or repeal, any other criminal offense.

History

Laws, 1985, ch. 319, § 7, eff from and after July 1, 1985.

 

§ 97-45-15. “Cyberstalking”; penalties.

(1) It is unlawful for a person to:

(a) Use in electronic mail or electronic communication any words or language threatening to inflict bodily harm to any person or to that person’s child, sibling, spouse or dependent, or physical injury to the property of any person, or for the purpose of extorting money or other things of value from any person.

(b) Electronically mail or electronically communicate to another repeatedly, whether or not conversation ensues, for the purpose of threatening, terrifying or harassing any person.

(c) Electronically mail or electronically communicate to another and to knowingly make any false statement concerning death, injury, illness, disfigurement, indecent conduct, or criminal conduct of the person electronically mailed or of any member of the person’s family or household with the intent to threaten, terrify or harass.

(d) Knowingly permit an electronic communication device under the person’s control to be used for any purpose prohibited by this section.

(2) Whoever commits the offense of cyberstalking shall be punished, upon conviction:

(a) Except as provided herein, the person is guilty of a felony punishable by imprisonment for not more than two (2) years or a fine of not more than Five Thousand Dollars ($5,000.00), or both.

(b) If any of the following apply, the person is guilty of a felony punishable by imprisonment for not more than five (5) years or a fine of not more than Ten Thousand Dollars ($10,000.00), or both:

(i) The offense is in violation of a restraining order and the person has received actual notice of that restraining order or posting the message is in violation of an injunction or preliminary injunction.

(ii) The offense is in violation of a condition of probation, a condition of parole, a condition of pretrial release or a condition of release on bond pending appeal.

(iii) The offense results in a credible threat being communicated to the victim, a member of the victim’s family, or another individual living in the same household as the victim.

(iv) The person has been previously convicted of violating this section or a substantially similar law of another state, a political subdivision of another state, or of the United States.

(3) This section does not apply to any peaceable, nonviolent, or nonthreatening activity intended to express political views or to provide lawful information to others. This section shall not be construed to impair any constitutionally protected activity, including speech, protest or assembly.

History

Laws, 2003, ch. 562, § 6, eff from and after July 1, 2003.

 

§ 97-45-17. Posting of messages through electronic media for purpose of causing injury to any person; penalties.

(1) A person shall not post a message for the purpose of causing injury to any person through the use of any medium of communication, including the Internet or a computer, computer program, computer system or computer network, or other electronic medium of communication without the victim’s consent, for the purpose of causing injury to any person.

(2) A person who violates this section, upon conviction, shall be guilty of a felony punishable by imprisonment for not more than five (5) years or a fine of not more than Ten Thousand Dollars ($10,000.00), or both.

History

Laws, 2003, ch. 562, § 7, eff from and after July 1, 2003.

 

§ 97-45-19. Identity theft.

(1) A person shall not obtain or attempt to obtain personal identity information of another person with the intent to unlawfully use that information for any of the following purposes without that person’s authorization:

(a) To obtain financial credit.

(b) To purchase or otherwise obtain or lease any real or personal property.

(c) To obtain employment.

(d) To obtain access to medical records or information contained in medical records.

(e) To commit any illegal act.

(2)

(a) A person who violates this section is guilty of a felony punishable by imprisonment for not less than two (2) nor more than fifteen (15) years or a fine of not more than Ten Thousand Dollars ($10,000.00), or both.

(b) Notwithstanding the provisions of paragraph (a) of this subsection (2), if the violation involves an amount of less than Two Hundred Fifty Dollars ($250.00), a person who violates this section may be found guilty of a misdemeanor punishable by imprisonment in the county jail for a term of not more than six (6) months, or by a fine of not more than One Thousand Dollars ($1,000.00), or both, in the discretion of the court.

(c) For purposes of determining the amount of the violation, the value of all goods, property, services and other things of value obtained or attempted to be obtained by the use of an individual’s identity information shall be aggregated.

(3) This section does not prohibit the person from being charged with, convicted of, or sentenced for any other violation of law committed by that person using information obtained in violation of this section.

(4) This section does not apply to a person who obtains or attempts to obtain personal identity information of another person pursuant to the discovery process of a civil action, an administrative proceeding or an arbitration proceeding.

(5) Upon the request of a person whose identifying information was appropriated, the Attorney General may provide assistance to the victim in obtaining information to correct inaccuracies or errors in the person’s credit report or other identifying information; however, no legal representation shall be afforded such person by the Office of the Attorney General.

(6) A person convicted under this section or under Section 97-19-85 shall be ordered to pay restitution as provided in Section 99-37-1 et seq., and any legal interest in addition to any other fine or imprisonment which may be imposed.

History

Laws, 2003, ch. 562, § 8; Laws, 2004, ch. 526, § 1; brought forward without change, Laws, 2014, ch. 457, § 35, eff from and after July 1, 2014.

 

§ 97-45-21. Jurisdiction for bringing criminal action.

(1) For purposes of bringing a criminal action under this chapter, a person who causes, by any means, the access of a computer, computer system or computer network in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system or computer network in each jurisdiction.

(2) For offenses under Section 97-45-19 or Section 97-19-85 which occur in multiple jurisdictions but which do not involve a computer, computer system or computer network, jurisdiction is deemed to be proper in each jurisdiction where any element of the offense occurred.

History

Laws, 2003, ch. 562, § 9; Laws, 2004, ch. 526, § 2, eff from and after July 1, 2004.

 

§ 97-45-23. Investigations and prosecutions.

Prosecutions for violations under Title 97, Chapter 45, or Section 97-5-33, may be instituted by the Attorney General, his designee or the district attorney of the district in which the violation occurred, and shall be conducted in the name of the State of Mississippi. In the prosecution of any criminal proceeding in accordance with this subsection by the Attorney General, his designee, and in any proceeding before a grand jury in connection therewith, the Attorney General, or his designee, shall exercise all the powers and perform all the duties which the district attorney would otherwise be authorized or required to exercise or perform. The Attorney General, or his designee, shall have the authority to issue and serve subpoenas in the investigation of any matter which may violate Title 97, Chapter 45, or Section 97-5-33.

History

Laws, 2003, ch. 562, § 10, eff from and after July 1, 2003.

 

§ 97-45-25. Additional penalties for violations under this chapter; funding of expenses of Attorney General’s Cyber Crime Central or special fund program; deposit of user charges and fees authorized under this section into State General Fund.

(1) In a proceeding for violations under Title 97, Chapter 45, Section 97-5-33 or Section 97-19-85, the court, in addition to the criminal penalties imposed under this chapter, shall assess against the defendant convicted of such violation double those reasonable costs that are expended by the Office of Attorney General, the district attorney’s office, the sheriff’s office or police department involved in the investigation of such case, including, but not limited to, the cost of investigators, software and equipment utilized in the investigation, together with costs associated with process service, court reporters and expert witnesses. The Attorney General or district attorney may institute and maintain proceedings in his name for enforcement of payment in the circuit court of the county of residence of the defendant and, if the defendant is a nonresident, such proceedings shall be in the Circuit Court of the First Judicial District of Hinds County, Mississippi. The Attorney General or district attorney shall distribute the property or interest assessed under this section as follows:

(a) Fifty percent (50%) shall be distributed to the unit of state or local government whose officers or employees conducted the investigation into computer fraud, identity theft or child exploitation which resulted in the arrest or arrests and prosecution. Amounts distributed to units of local government shall be used for training or enforcement purposes relating to detection, investigation or prosecution of computer and financial crimes, including computer fraud or child exploitation.

(b) Where the prosecution was maintained by the district attorney, fifty percent (50%) shall be distributed to the county in which the prosecution was instituted by the district attorney and appropriated to the district attorney for use in training or enforcement purposes relating to detection, investigation or prosecution of computer and financial crimes, including computer fraud or child exploitation. Where a prosecution was maintained by the Attorney General, fifty percent (50%) of the proceeds shall be paid or distributed into the Attorney General’s Cyber Crime Central or the Attorney General’s special fund to be used for consumer fraud education and investigative and enforcement operations of the Office of Consumer Protection. Where the Attorney General and the district attorney have participated jointly in any part of the proceedings, twenty-five percent (25%) of the property forfeited shall be paid to the county in which the prosecution occurred, and twenty-five percent (25%) shall be paid to the Attorney General’s Cyber Crime Central or the Attorney General’s special fund to be used for the purposes as stated in this paragraph.

(2) From and after July 1, 2016, the expenses of the Attorney General’s Cyber Crime Central or Attorney General’s special fund program shall be defrayed by appropriation from the State General Fund and all user charges and fees authorized under this section shall be deposited into the State General Fund as authorized by law and as determined by the State Fiscal Officer.

(3) From and after July 1, 2016, no state agency shall charge another state agency a fee, assessment, rent or other charge for services or resources received by authority of this section.

History

Laws, 2003, ch. 562, § 11; Laws, 2004, ch. 526, § 3; Laws, 2017, 1st Ex Sess, ch. 7, § 44, eff from and after passage (approved June 23, 2017).

 

§ 97-45-27. Identity theft; victim authorized to expunge record of false charges accrued on account of activities of the perpetrator.

Any person whose name or other identification has been used without his consent or authorization by another person, with the use resulting in charges, an arrest record, or a conviction putatively on the record of the person whose name or other identification was appropriated, the person whose name or other identification has been used without his consent or authorization may file a petition for expunction of such charges or arrest record or conviction, or any of them, with any court which has jurisdiction over the matter.

History

Laws, 2004, ch. 526, § 4, eff from and after July 1, 2004.

 

§ 97-45-29. Identity theft; Attorney General authorized to issue “Identity Theft Passports” verifying that expunction order has been entered or police report has been filed; access to identity theft information.

(1) A person who has petitioned the court pursuant to Section 97-45-27 to expunge any charges, arrest record or conviction falsely entered against the person as a result of the appropriation of his name or other identifying information may submit to the Attorney General a certified copy of a court order obtained. The Office of the Attorney General may issue an “Identity Theft Passport” verifying that such order has been entered.

(2) Any person who has filed a police report alleging that the person’s name or other identification has been used without the person’s consent or authorization by another person may submit a copy of the police report to the Attorney General. The Office of the Attorney General may issue an “Identity Theft Passport” stating that such police report has been submitted.

(3) The Office of the Attorney General may provide access to identity theft information to law enforcement agencies and individuals who have submitted a police report or court order pursuant to this chapter and any other person or entity as appropriate.

History

Laws, 2004, ch. 526, § 5, eff from and after July 1, 2004.

 

§ 97-45-31. Using scanning device or reencoder to capture encoded information from magnetic strip on credit, debit or other payment card; definitions; penalty.

(1) For the purposes of this section, the following terms shall have the meanings ascribed to them unless the context clearly requires otherwise:

(a) “Cardholder” means any person:

(i) Named on the face of a credit card to whom or for whose benefit the credit card is issued by an issuer; or

(ii) In possession of a credit card with the consent of the person to whom the credit card was issued.

(b) “Credit card” means:

(i) Any instrument or device, whether known as a credit card, charge card, credit plate, courtesy card, identification card or any other name that is issued with or without fee by an issuer for the use of the cardholder in obtaining money, goods, services or anything else of value, either on credit or in consideration of an undertaking or guaranty by the issuer of the payment of a check drawn by the cardholder, on a promise to pay in part or in full therefor at a future time, whether or not all or any part of the indebtedness that is represented by the promise to make deferred payment is secured or unsecured.

(ii) A debit card, electronic benefit transfer card or other access instrument or device, other than a check that is signed by the holder or other authorized signatory on the deposit account, that draws funds from a deposit account in order to obtain money, goods, services or anything else of value.

(iii) A stored value card, smart card or other instrument or device that enables a person to obtain goods, services or anything else of value through the use of value stored on the card instrument or device.

(iv) The number that is assigned the card, instrument or device, even if the physical card, instrument or device is not used or presented.

(c) “Issuer” means any business organization, state agency or financial institution, or its duly authorized agent, that issues a credit card.

(d) “Merchant” means a person who is authorized under a written contract with a participating party to furnish money, goods, services or anything else of value on presentation of a credit card by a cardholder.

(e) “Reencoder” means an electronic device that places encoded information from the magnetic strip or stripe of a credit card onto the magnetic strip or stripe of a different credit card.

(f) “Scanning device” means a scanner, reader or other electronic device that is used to access, read, scan, obtain, memorize or store, temporarily or permanently, information that is encoded on a magnetic strip or stripe of a credit card.

(2)

(a) It is unlawful for a person to use a scanning device or reencoder without the permission of the cardholder of the credit card from which the information is being scanned or reencoded with the intent to defraud the cardholder, the issuer or a merchant.

(b) A person who violates this section commits a felony punishable, upon conviction thereof, by imprisonment not to exceed five (5) years, a fine not to exceed Ten Thousand Dollars ($10,000.00), or both.

History

Laws, 2005, ch. 511, § 4, eff from and after July 1, 2005.

 

§ 97-45-33. Online impersonation; penalties.

(1) Nothwithstanding any other provision of law, any person who knowingly and without consent impersonates another actual person through or on an Internet website or by other electronic means for purposes of harming, intimidating, threatening or defrauding another person is guilty of a misdemeanor.

(2) For purposes of this section, an impersonation is credible if another person would reasonably believe, or did reasonably believe, that the defendant was or is the person who was impersonated.

(3) For purposes of this section, “electronic means” shall include opening an email account or an account or profile on a social networking Internet website in another person’s name.

(4) A violation of this section is punishable by a fine of not less than Two Hundred Fifty Dollars ($250.00) and not exceeding One Thousand Dollars ($1,000.00) or by imprisonment for not less than ten (10) days and not more than one (1) year, or both.

(5) This section shall not preclude prosecution under any other provision of law and shall be considered supplemental thereto.

History

Laws, 2011, ch. 340, § 1, eff from and after July 1, 2011.

 

Mississippi Code 1972 Annotated

Copyright © 2022 The State of Mississippi All rights reserved.

 

For more information, see here:  https://advance.lexis.com/documentpage/?pdmfid=1000516&crid=f1673cda-414a-4ae0-ad26-3a84f05ef189&nodeid=ABYAAZAAB&nodepath=%2FROOT%2FABY%2FABYAAZ%2FABYAAZAAB&level=3&haschildren=&populated=false&title=Chapter+45+Computer+Crimes+and+Identity+Theft&config=00JABhZDIzMTViZS04NjcxLTQ1MDItOTllOS03MDg0ZTQxYzU4ZTQKAFBvZENhdGFsb2f8inKxYiqNVSihJeNKRlUp&pddocfullpath=%2Fshared%2Fdocument%2Fstatutes-legislation%2Furn%3AcontentItem%3A8P6B-8B52-8T6X-7451-00008-00&ecomp=vg1_kkk&prid=8c726494-f01c-4e5b-af4d-9d4a0addb352

 

These materials were obtained directly from the State Legislative websites and are posted here for your review and reference only.  No Claim to Original State Government Works.  This may not be the most recent version.  The State may have more current information.  We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to.  Please check the linked sources directly.

These materials were obtained directly from the U.S. Federal Government public websites, U.S. State Government public websites, or the International Government public websites and are posted here for your review and reference only. No Claim to Original U.S. Government Works, Original U.S. State Government Works, or Original International Government Works. This information may not be the most recent version. The U.S. Government, U.S. States, or International Governments may have more current information. We make no guarantees or warranties about the accuracy or completeness of this information, or the information linked to. Please check the linked sources directly.