Idaho 8.80 Fraud in Connection With Identification Documents-Possession (18 U.S.C. Sec. 1028(a)(6)).
Idaho 8.85 Unauthorized Access Devices-Using or Trafficking (18 U.S.C. Sec. 1029(a)(2))
Idaho 8.86 Access Devices-Unlawfully Possessing Fifteen or More (18 U.S.C. Sec. 1029(a)(3)). .
Idaho 8.88 Access Devices-Illegal Transactions (18 U.S.C. Sec. 1029(a)(5))
Idaho 8.89 Access Devices-Unauthorized Solicitation (18 U.S.C. Sec. 1029(a)(6)).
Maintenance Contract for Personal Computers
Operating Unsafe Vehicle
Summaries and Charts Received in Evidence
Sample Letter for Judgment for Support and Other Relief
Sample Letter for Congratulations on Passing the Bar Exam
Expense Account Form
Affidavit of Defendant Spouse in Support of Motion to Amend or Strike Alimony Provisions of Divorce Decree on Remarriage of Plaintiff
Form C Civil appeal pre-argument statement
Rate Your Company - Dealing with Customer Complaints
Resolution Form for Corporation
Kentucky 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Louisiana 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Maine 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Maryland 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))
Massachusetts 8.100 Intentional Damage to a Protected Computer (18 U.S.C. Sec. 1030(a)(5)(A))