I Am Banned
The LEOAffairs.com™ Message Board (this Forum, LEOAffairs.com™, we, us, our, or ours as applicable) is located at www.LEOAffairs.com (this site).
If your access to the LEOAffairs.com™ Message Board (this Forum) area has been BANNED or RESTRICTED and you desire to have it reinstated, please follow the instructions below to submit a request to have your access restored:
1: Access the Restore my Access Page and post a test message using your initials as the User Name
2: Send a private email to Mod 1 at [email protected] and request to be reinstated if that is your desire.
3: You MUST include the following information in your email:
- Your full name (first and last name)
- Your User Name at LEOAffairs.com™
- Your contact information: your email and at least one telephone number
- The Message Board you normally access (and were probably banned from)
- The date of your last post/upload
- The reason why you believe that the ban should be reversed and your access reinstated.
***** DO NOT ACCESS LEOAffairs.com™ IF YOU’VE BEEN BANNED *****
If your access to this Forum has been banned, DO NOT access LEOAffairs.com™ outside the parameters listed above.
Title XLVI Chapter 815.06: Offenses against computer users
(1)?Whoever willfully, knowingly, and without authorization:
(a) Accesses or causes to be accessed any computer, computer system, or computer network;
(b) Disrupts or denies or causes the denial of computer system services to an authorized user of such computer system services, which, in whole or part, is owned by, under contract to, or operated for, on behalf of, or in conjunction with another;
(c) Destroys, takes, injures, or damages equipment or supplies used or intended to be used in a computer, computer system, or computer network;
(d) Destroys, injures, or damages any computer, computer system, or computer network; or
(e) Introduces any computer contaminant into any computer, computer system, or computer network, commits an offense against computer users.
(2)(a) Except as provided in paragraphs (b) and (c), whoever violates subsection (1) commits a felony of the third degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(b) Whoever violates subsection (1) and:
1. Damages a computer, computer equipment, computer supplies, a computer system, or a computer network, and the monetary damage or loss incurred as a result of the violation is $5,000 or greater.
2. Commits the offense for the purpose of devising or executing any scheme or artifice to defraud or obtain property; or
3. Interrupts or impairs a governmental operation or public communication, transportation, or supply of water, gas, or other public service, commits a felony of the second degree, punishable as provided in s. 775.082, s. 775.083, or s.775.084.
(c) Whoever violates subsection (1) and the violation endangers human life commits a felony of the first degree, punishable as provided in s. 775.082, s. 775.083, or s. 775.084.
(3) Whoever willfully, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer, computer system, or computer network commits a misdemeanor of the first degree, punishable as provided in s. 775.082 or s. 775.083.
(4)(a) In addition to any other civil remedy available, the owner or lessee of the computer, computer system, computer network, computer program, computer equipment, computer supplies, or computer data may bring a civil action against any person convicted under this section for compensatory damages.
(b) In any action brought under this subsection, the court may award reasonable attorney’s fees to the prevailing party.
(5) Any computer, computer system, computer network, computer software, or computer data owned by a defendant which is used during the commission of any violation of this section or any computer owned by the defendant which is used as a repository for the storage of software or data obtained in violation of this section is subject to forfeiture as provided under ss. 932.701–932.704.
(6) This section does not apply to any person who accesses his or her employer’s computer system, computer network, computer program, or computer data when acting within the scope of his or her lawful employment.
(7) For purposes of bringing a civil or criminal action under this section, a person who causes, by any means, the access to a computer, computer system, or computer network in one jurisdiction from another jurisdiction is deemed to have personally accessed the computer, computer system, or computer network in both jurisdictions.
History.—s. 1, ch. 78-92; s. 11, ch. 2001-54.
Thanks for your support!