fraudulent use of a credit card
Credit Card Fraud & Identity Theft
817.61. Fraudulent use of credit cards
A person who, with intent to defraud the issuer or a person or organization providing money, goods, services, or anything else of value or any other person, uses, for the purpose of obtaining money, goods, services, or anything else of value, a credit card obtained or retained in violation of this part or a credit card which he or she knows is forged, or who obtains money, goods, services, or anything else of value by representing, without the consent of the cardholder, that he or she is the holder of a specified card or by representing that he or she is the holder of a card and such card has not in fact been issued violates this section. A person who, in any 6-month period, uses a credit card in violation of this section two or fewer times, or obtains money, goods, services, or anything else in violation of this section the value of which is less than $100, is subject to the penalties set forth in s. 817.67(1). A person who, in any 6-month period, uses a credit card in violation of this section more than two times, or obtains money, goods, services, or anything else in violation of this section the value of which is $100 or more, is subject to the penalties set forth in s. 817.67(2).
817.67. Penalties
(1) A person who is subject to the penalties of this subsection shall be guilty of a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
(2) A person who is subject to the penalties of this subsection is guilty of a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
<General Materials (GM) – References, Annotations, or Tables>
817.568. Criminal use of personal identification information
(1) As used in this section, the term:
(a) “Access device” means any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds, other than a transfer originated solely by paper instrument.
(b) “Authorization” means empowerment, permission, or competence to act.
© “Harass” means to engage in conduct directed at a specific person that is intended to cause substantial emotional distress to such person and serves no legitimate purpose. “Harass” does not mean to use personal identification information for accepted commercial purposes. The term does not include constitutionally protected conduct such as organized protests or the use of personal identification information for accepted commercial purposes.
(d) “Individual” means a single human being and does not mean a firm, association of individuals, corporation, partnership, joint venture, sole proprietorship, or any other entity.
(e) “Person” means a “person” as defined in s. 1.01(3).
(f) “Personal identification information” means any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any:
1. Name, social security number, date of birth, official state-issued or United States-issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, Medicaid or food stamp account number, or bank account or credit card number;
2. Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation;
3. Unique electronic identification number, address, or routing code; or
4. Telecommunication identifying information or access device.
(2)(a) Any person who willfully and without authorization fraudulently uses, or possesses with intent to fraudulently use, personal identification information concerning an individual without first obtaining that individual’s consent, commits the offense of fraudulent use of personal identification information, which is a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(b) Any person who willfully and without authorization fraudulently uses personal identification information concerning an individual without first obtaining that individual’s consent commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit, the value of the services received, the payment sought to be avoided, or the amount of the injury or fraud perpetrated is $5,000 or more or if the person fraudulently uses the personal identification information of 10 or more individuals without their consent. Notwithstanding any other provision of law, the court shall sentence any person convicted of committing the offense described in this paragraph to a mandatory minimum sentence of 3 years’ imprisonment.
© Any person who willfully and without authorization fraudulently uses personal identification information concerning an individual without first obtaining that individual’s consent commits a felony of the first degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084, if the pecuniary benefit, the value of the services received, the payment sought to be avoided, or the amount of the injury or fraud perpetrated is $50,000 or more or if the person fraudulently uses the personal identification information of 20 or more individuals without their consent. Notwithstanding any other provision of law, the court shall sentence any person convicted of committing the offense described in this paragraph:
1. To a mandatory minimum sentence of 5 years’ imprisonment.
2. To a mandatory minimum sentence of 10 years’ imprisonment, if the pecuniary benefit, the value of the services received, the payment sought to be avoided, or the amount of the injury or fraud perpetrated is $100,000 or more or if the person fraudulently uses the personal identification information of 30 or more individuals without their consent.
(3) Neither paragraph (2)(b) nor paragraph (2)(c) prevents a court from imposing a greater sentence of incarceration as authorized by law. If the minimum mandatory terms of imprisonment imposed under paragraph (2)(b) or paragraph (2)(c) exceed the maximum sentences authorized under s. 775.082, s. 775.084, or the Criminal Punishment Code under chapter 921, the mandatory minimum sentence must be imposed. If the mandatory minimum terms of imprisonment under paragraph (2)(b) or paragraph (2)(c) are less than the sentence that could be imposed under s. 775.082, s. 775.084, or the Criminal Punishment Code under chapter 921, the sentence imposed by the court must include the mandatory minimum term of imprisonment as required by paragraph (2)(b) or paragraph (2)(c).
(4) Any person who willfully and without authorization possesses, uses, or attempts to use personal identification information concerning an individual without first obtaining that individual’s consent, and who does so for the purpose of harassing that individual, commits the offense of harassment by use of personal identification information, which is a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
(5) If an offense prohibited under this section was facilitated or furthered by the use of a public record, as defined in s. 119.011, the offense is reclassified to the next higher degree as follows:
(a) A misdemeanor of the first degree is reclassified as a felony of the third degree.
(b) A felony of the third degree is reclassified as a felony of the second degree
(c) A felony of the second degree is reclassified as a felony of the first degree.
For purposes of sentencing under chapter 921 and incentive gain-time eligibility under chapter 944, a felony offense that is reclassified under this subsection is ranked one level above the ranking under s. 921.0022 of the felony offense committed, and a misdemeanor offense that is reclassified under this subsection is ranked in level 2 of the offense severity ranking chart in s. 921.0022.
(6) Any person who willfully and without authorization fraudulently uses personal identification information concerning an individual who is less than 18 years of age without first obtaining the consent of that individual or of his or her legal guardian commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(7) Any person who is in the relationship of parent or legal guardian, or who otherwise exercises custodial authority over an individual who is less than 18 years of age, who willfully and fraudulently uses personal identification information of that individual commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(8) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of this state or any of its political subdivisions, of any other state or its political subdivisions, or of the Federal Government or its political subdivisions.
(9)(a) In sentencing a defendant convicted of an offense under this section, the court may order that the defendant make restitution pursuant to s. 775.089 to any victim of the offense. In addition to the victim’s out-of-pocket costs, such restitution may include payment of any other costs, including attorney’s fees incurred by the victim in clearing the victim’s credit history or credit rating, or any costs incurred in connection with any civil or administrative proceeding to satisfy any debt, lien, or other obligation of the victim arising as the result of the actions of the defendant.
(b) The sentencing court may issue such orders as are necessary to correct any public record that contains false information given in violation of this section.
(10) Prosecutions for violations of this section may be brought on behalf of the state by any state attorney or by the statewide prosecutor.
(11) The Legislature finds that, in the absence of evidence to the contrary, the location where a victim gives or fails to give consent to the use of personal identification information is the county where the victim generally resides.
(12) Notwithstanding any other provision of law, venue for the prosecution and trial of violations of this section may be commenced and maintained in any county in which an element of the offense occurred, including the county where the victim generally resides.
(13) A prosecution of an offense prohibited under subsection (2), subsection (6), or subsection (7) must be commenced within 3 years after the offense occurred. However, a prosecution may be commenced within 1 year after discovery of the offense by an aggrieved party, or by a person who has a legal duty to represent the aggrieved party and who is not a party to the offense, if such prosecution is commenced within 5 years after the violation occurred.