For the purposes of this chapter, the following words shall have the meanings ascribed herein unless the context clearly requires otherwise: “Access” means to program, to execute programs on, to communicate with, store data in, retrieve data from or otherwise make use of any resources, including data or programs, of a computer, computer system or […]
For the purposes of venue under the provisions of this chapter, any violation of this chapter shall be considered to have been committed: In any county in which any act was performed in furtherance of any transaction violating this chapter; and In any county from which, to which or through which any access to a […]
The criminal offenses created by this chapter shall not be deemed to supersede, or repeal, any other criminal offense.
It is unlawful for a person to: Use in electronic mail or electronic communication any words or language threatening to inflict bodily harm to any person or to that person’s child, sibling, spouse or dependent, or physical injury to the property of any person, or for the purpose of extorting money or other things of […]
A person shall not post a message for the purpose of causing injury to any person through the use of any medium of communication, including the Internet or a computer, computer program, computer system or computer network, or other electronic medium of communication without the victim’s consent, for the purpose of causing injury to any […]
A person shall not obtain or attempt to obtain personal identity information of another person with the intent to unlawfully use that information for any of the following purposes without that person’s authorization: To obtain financial credit. To purchase or otherwise obtain or lease any real or personal property. To obtain employment. To obtain access […]
For the purposes of this chapter, “identity theft” includes crimes chargeable under the following provisions of law: Section 97-9-79, which relates to false information. Section 97-19-83, which relates to fraud by mail or other means of communication. Section 97-19-85, which relates to the fraudulent use of identity social security number, credit card or debit card […]
For purposes of bringing a criminal action under this chapter, a person who causes, by any means, the access of a computer, computer system or computer network in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system or computer network in each jurisdiction. For offenses under Section 97-45-19 or […]
Prosecutions for violations under Title 97, Chapter 45, or Section 97-5-33, may be instituted by the Attorney General, his designee or the district attorney of the district in which the violation occurred, and shall be conducted in the name of the State of Mississippi. In the prosecution of any criminal proceeding in accordance with this […]
In a proceeding for violations under Title 97, Chapter 45, Section 97-5-33 or Section 97-19-85, the court, in addition to the criminal penalties imposed under this chapter, shall assess against the defendant convicted of such violation double those reasonable costs that are expended by the Office of Attorney General, the district attorney’s office, the sheriff’s […]
Any person whose name or other identification has been used without his consent or authorization by another person, with the use resulting in charges, an arrest record, or a conviction putatively on the record of the person whose name or other identification was appropriated, the person whose name or other identification has been used without […]
A person who has petitioned the court pursuant to Section 97-45-27 to expunge any charges, arrest record or conviction falsely entered against the person as a result of the appropriation of his name or other identifying information may submit to the Attorney General a certified copy of a court order obtained. The Office of the […]
Computer fraud is the accessing or causing to be accessed of any computer, computer system, computer network or any part thereof with the intent to: Defraud; Obtain money, property or services by means of false or fraudulent conduct, practices or representations; or through the false or fraudulent alteration, deletion or insertion of programs or data; […]
For the purposes of this section, the following terms shall have the meanings ascribed to them unless the context clearly requires otherwise: “Cardholder” means any person: Named on the face of a credit card to whom or for whose benefit the credit card is issued by an issuer; or In possession of a credit card […]
Nothwithstanding any other provision of law, any person who knowingly and without consent impersonates another actual person through or on an Internet website or by other electronic means for purposes of harming, intimidating, threatening or defrauding another person is guilty of a misdemeanor. For purposes of this section, an impersonation is credible if another person […]
An offense against computer users is the intentional: Denial to an authorized user, without consent, of the full and effective use of or access to a computer, a computer system, a computer network or computer services; or Use or disclosure to another, without consent, of the numbers, codes, passwords or other means of access to […]
An offense against computer equipment or supplies is the intentional modification or destruction, without consent, of computer equipment or supplies used or intended to be used in a computer, computer system or computer network. Whoever commits an offense against computer equipment or supplies when the damage or loss or attempted damage or loss amounts to […]
An offense against intellectual property is the intentional: Destruction, insertion or modification, without consent, of intellectual property; or Disclosure, use, copying, taking or accessing, without consent, of intellectual property. Whoever commits an offense against intellectual property when the damage or loss or attempted damage or loss amounts to a value of less than One Thousand […]