So the girls who used to steal jobs via the phone are at it again! they must be pretty scummy this time and pretty simple.. ie stupid… they are actually doing it through the emails which gives me written documentation… and time frames.. this woman wants to steal jobs from a family by the name of Alyssa and Sean grace from atlanta georgia. I am in the process of finding out about impromptu cancelation and the email via naplesmarion for her offer to take alt other jobs by the grace family. so i will let you know… I would love to have the police involved because these girls must be pretty desperate. to steal my own clients and personal jobs instead of all the jobs from the hotels The reason i know that the “mom” i have who is doing this is because there was someone who filled in when i was already committed to another babysitting job… and even though i got a very nice email explaining what a great job the babysitter did for the family i know form the language and the manner of writing that it was not from my actual mother. There is a black suv that has been at my mothers’s house with license plate of: . It is supposed to be a renter from one of her apartment units but i think there is still a La playa boy or group still involved in stealing all jobs via her telephone and now emails… I have inserted in another blog the cyber law that pertains to fraudently sealing funds via the internet. I may look it up again adn put it in this blog post as well.
A Tender Loving Care Service
Mary Jean Ziska Assistant Director whatabtmary@yahoo.com
From: “exporter13@hotmail.com” <exporter13@hotmail.com>
To: Mary Jean Ziska <whatabtmary@yahoo.com>
Sent: Sat, March 19, 2011 10:00:21 AM
Subject: Cancellation of Sunday, March 20th Babysitting
Hi Mary Jean,
I left you a voicemail message a few minutes ago stating that we have to cancel babysitting for tomorrow night, Sunday, March 20th. I apologize for this; my in-laws cancelled their flights this morning much to our surprise and we were to go to dinner with them tomorrow night.
Please confirm that you received this email and my v/m message.
Thank you,
Alyssa Grace
A Tender Loving Care Service
Mary Jean Ziska Assistant Director whatabtmary@yahoo.com
Chapter 815, Florida Statutes
The provisions of this act shall be known and may be cited as the “Florida Computer Crimes Act.”
The Legislature finds and declares that:
Computer-related crime is a growing problem in government as well as in the private sector.
Computer-related crime occurs at great cost to the public since losses for each incident of computer crime tend to be far greater than the losses associated with each incident of other white collar crime.
The opportunities for computer-related crimes in financial institutions, government programs, government records, and other business enterprises through the introduction of fraudulent records into a computer system, the unauthorized use of computer facilities, the alteration or destruction of computerized information or files, and the stealing of financial instruments, data, and other assets, are great.
While various forms of computer crime might possibly be the subject of criminal charges based on other provisions of law, it is appropriate and desirable that a supplemental and additional statute be provided which proscribes various forms of computer abuse.
As used in this chapter, unless the context clearly indicates otherwise:
“Intellectual property” means data, including programs.
“Computer program” means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data.
“Computer” means an internally programmed, automatic device that performs data processing.
“Computer software” means a set of computer programs, procedures, and associated documentation concerned with the operation of a computer system.
“Computer system” means a set of related, connected or unconnected computer equipment, devices, or computer software.
“Computer network” means a set of related, remotely connected devices and communication facilities including more than one computer system with the capability to transmit data among them through communication facilities.
“Computer system services” means providing a computer system or computer network to perform useful work.
“Property” means anything of value as defined in S.812.011 and includes, but is not limited to, financial instruments, information including electronically produced data and computer software and programs in either machine- or human-readable form, and any other tangible or intangible item of value.
“Instrument” means any check, draft, money order, certificate of deposit, letter of credit, bill of exchange, credit card, or marketable security.
“Access” means to approach, instruct, communicate with, store data, retrieve data, or otherwise make use of any resources of a computer, computer system, or computer network.
Whoever willfully, knowingly, and without authorization modifies data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.
Whoever willfully, knowingly, and without authorization destroys data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.
Whoever willfully, knowingly, and without authorization discloses or takes data, programs, or supporting documentation which is a trade secret as defined in S.812.081 or is confidential as provided by law residing or existing internal or external to a computer, computer system, or computer network commits an offense against intellectual property.
Except as otherwise provided in this subsection, an offense against intellectual property is a felony of the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
If the offense is committed for the purpose of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony in the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
Whoever willfully, knowingly, and without authorization modifies equipment or supplies used or intended to be used in a computer, computer system, or computer network commits an offense against computer equipment or supplies.
Except as provided in this paragraph an offense against computer equipment or supplies as provided in paragraph (a) is a misdemeanor of the first degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
If the offense is committed for the purpose of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony in the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
Whoever willfully, knowingly, and without authorization destroys, takes, injures, or damages equipment or supplies used or intended to be used in a computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization destroys, injures, or damages any computer, computer system, or computer network commits an offense against computer equipment or supplies.
Except as provided in this paragraph an offense against computer equipment or supplies as provided in paragraph (a) is a misdemeanor of the first degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
If the damage to such computer equipment or supplies or to the computer, computer system, or computer network is greater than $200 but less than $1,000, then the offender is guilty of a felony of the third degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
If the damage to such computer equipment or supplies or to the computer, computer system, or computer network is $1,000 or greater, or if there is an interruption or impairment of governmental operation or public communication, transportation, or supply of water, gas, or other public service, then the offender is guilty of a felony of the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
Whoever willfully, knowingly, and without authorization accesses or causes to be accessed any computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization denies or causes the denial of computer system services to an authorized user of such computer system services, which, in whole or part, is owned by, under contract to, or operated for, on behalf of, or in conjunction with another commits an offense against computer users.
Except as provided in this subsection an offense against computer users is a felony of the third degree, punish- able as provided in S.775.082, S.775.083, or S.775.084.
If the offense is committed for the purposes of devising or executing any scheme or artifice to defraud or to obtain any property, then the offender is guilty of a felony of the second degree, punishable as provided in S.775.082, S.775.083, or S.775.084.
The provisions of this chapter shall not be construed to preclude the applicability of any other provision of the criminal law of this state which presently applies or may in the future be applied to any transaction which violates this chapter, unless such provision is inconsistent with the terms of this chapter.
If any provision of this act or the application thereof to any person or circumstance is held invalid, it is the legislative intent that the invalidity shall not affect other provisions or applications of the act which can be given effect without the invalid provisions or applications, and to this end the provisions of this act are severable.
This act shall take effect August 1, 1978.
Approved by the Governor May 29, 1978.
Filed in the Office Secretary of State May 30, 1978.
(Below is a summary of the penalties applicable to the offenses described in the act. Penalties for habitual offenders are dealt with in S775.084, which is not included below.)
Misdemeanor of the First Degree. Up to 1 year of imprisonment and a fine of up to $1,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.
Felony of the Second Degree. Up to 15 years of imprisonment and a fine of up to $10,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.
Felony of the Third Degree. Up to 5 years of imprisonment and a fine of up to $5,000 or any higher amount equal to double the pecuniary gain derived from the offense by the offender or double the pecuniary loss suffered by the victim.
We welcome your comments and suggestions on this and all CNS documentation. Please send your comments to:
CNS Information Services
2124 NE Waldo Rd, Suite 2100
Gainesville Florida 32609-8922
(352) 392.2061
<editor@cns.ufl.edu>
2124 NE Waldo Rd, Suite 2100
Gainesville, Florida 32609-8922
Phone: (352) 392.2061
E-mail: editor@cns.ufl.edu
but here is the email i sent today to he grace family: