№ lp_1_2_04234
File format: docx
Character count: 9985
File size: 42 KB
The document is a form for individuals who need to declare identity theft to the U.S. Small Business Administration (SBA) in relation to loans or grants, detailing the necessary steps and required information for the declaration.
Year:
N/A
Region / City:
United States
Topic:
Identity Theft, Small Business Administration, Loan Assistance
Document Type:
Form
Organization:
U.S. Small Business Administration
Author:
U.S. Small Business Administration
Target Audience:
Individuals who have experienced identity theft related to SBA loans or grants
Period of Action:
N/A
Approval Date:
N/A
Date of Changes:
N/A
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Note:
Year
Subject:
Crime, Theft
Document Type:
Statute
Target Audience:
Legal professionals, law enforcement
Contextual description:
Statute outlining elements, conditions, and inferences related to theft in Florida, including specific theft classifications and related penalties under Florida law.
Year:
2016
Region / city:
Worldwide
Topic:
Cybersecurity, Credential Theft
Document Type:
Technical Guide
Organization / Institution:
Microsoft
Author:
Microsoft Security Team
Target Audience:
Security administrators, security architects, and security managers
Effective Period:
Ongoing
Approval Date:
Not specified
Modification Date:
Not specified
Year:
2016
Region / City:
Hammamet
Theme:
Countering mobile device theft, ICT policies, telecommunication standards
Document Type:
Resolution Draft
Organization / Institution:
International Telecommunication Union (ITU)
Author:
Isaac Boateng
Target Audience:
Governments, industry stakeholders, telecommunication operators, manufacturers
Period of Validity:
Ongoing
Approval Date:
1 November 2016
Amendment Date:
N/A
Year:
2022
Jurisdiction:
Wisconsin, United States
Subject:
Criminal law, theft
Document type:
Jury instruction
Issuing body:
Wisconsin Judicial Council
Relevant statute:
§ 943.20(1)(a)
Amendments:
1966, 1977, 1987, 1991, 1999, 2000, 2002, 2003, 2006, 2009, 2018, 2022
Effective date of latest revision:
March 5, 2020
Penalty classification:
Class A misdemeanor, escalates to felony based on property value
References:
§§ 971.32, 971.33, 971.36; Wis JI-Criminal 1441B
Legal cases cited:
State v. Trawitzki, 2001 WI 77; State v. Genova, 77 Wis.2d 141, 252 N.W.2d 380 (1977)
Year:
2014
Jurisdiction:
Namibia, High Court, Windhoek
Case Number:
CA 74/2013
Court Division:
Main Division
Type of Document:
Judgment
Parties:
Paulus Iitembu (Appellant) vs The State (Respondent)
Judges:
Shivute J, Siboleka J
Hearing Date:
24 April 2014
Delivery Date:
13 June 2014
Nature of Offense:
Theft of a motor vehicle
Sentence:
Ten years imprisonment, four suspended for five years
Previous Court:
District Magistrate’s Court, Outapi
Representation:
Mr Ipumbu (Appellant), Mr Nyambe (State)
Appeal Outcome:
Conviction confirmed, sentence modified
Key Facts:
Vehicle stolen, found 150 meters away, items missing included battery and radio
Year:
2006
Region / City:
India
Subject:
Electricity theft and compounding procedure
Document Type:
Commercial Circular
Issuing Authority:
Chief Engineer (Commercial)
References:
Commercial Circular Nos. 17 (18.10.2005), 31 (09.02.2006), 32 (28.03.2006)
Legal Basis:
Section 152, Electricity Act 2003
Target Audience:
Electricity supply officers and authorized personnel
Procedure Included:
Guidelines for reconnection and compounding charges
Action Required:
Payment verification and record entry in consumer ledger
Distribution:
As per mailing list
Year:
2023
Region / City:
United States
Topic:
Identity Theft
Document Type:
Informative Speech
Author:
Unknown
Target Audience:
General public
Period of Validity:
Not specified
Date of Approval:
Not specified
Date of Changes:
Not specified
Document type:
Academic research article
Subject:
Water theft, regulatory compliance and deterrence in transboundary water systems
Geographical focus:
Murray–Darling Basin, Australia
Countries / jurisdictions mentioned:
Australia; New South Wales; Victoria; Queensland; South Australia; Western Australia; Northern Territory; Australian Capital Territory
Institutions referenced:
Inspector General of Water Compliance; Natural Resource Access Regulator
Key individual referenced:
Troy Grant
Keywords:
water theft; Murray–Darling Basin; legal review; detection; deterrence; penalties
Economic context:
Water allocation trade exceeding AU$2 billion annually; estimated water value AU$96.5 billion
Environmental context:
Drought periods and water scarcity affecting basin users
Time references in text:
Millennium Drought (2000–2010); regulatory data reported up to June 2023
Stakeholders:
irrigators; environmental water users; government regulators; First Nations peoples; urban and recreational water users
Research focus:
Legal frameworks, penalty-setting processes, and institutional consistency for deterring water theft
Data references:
Suspicious activity reports, investigations, warnings, penalty notices and prosecutions recorded by regulatory authorities
Organization:
Beemac Logistics
Department:
Claims Department
Document Type:
Standard Operating Procedure
Subject:
Freight claim reporting and submission process
Industry:
Logistics and freight transportation
Related Departments:
Carrier Payables Team
Contact Person:
Tanner Kutek
Contact Email:
[email protected]
Claims Submission Email:
[email protected]
Carrier Payables Email:
[email protected]
Required Reference:
Beemac Load Number
Key Topics:
Cargo damage reporting, rejected loads, freight theft, claim documentation, carrier payment hold procedures
Supporting Materials Mentioned:
Photos of damaged goods, delivery receipts, customer communications
Intended Users:
Employees or partners responsible for reporting freight incidents and submitting claims
Year:
2010
Region:
Alberta, Canada
Topic:
Identity Theft and Fraud
Document Type:
Informational Guide
Organization:
Alberta Provincial Rural Crime Watch Association
Target Audience:
Rural residents and community members
Legal Reference:
Senate Bill S-4, January 8, 2010
Sources:
RCMP, Service Alberta websites
Prevention Tips Included:
Yes
Distribution Format:
Online and print
Year:
2017–2020
Region / City:
South Africa, Nigeria, Guinea-Bissau
Topic:
Electricity pricing, electricity theft, power sector regulation
Document Type:
News report / Analysis
Source:
SA City Press, BusinessDay
Author:
Unspecified businessman, Mike Schussler (economist)
Target Audience:
Business owners, electricity consumers, policymakers
Affected Entities:
Municipalities, Eskom, power distribution companies, consumers
Key Issues:
Tariff discrepancies, electricity theft, regulatory compliance, financial losses, network strain
Date Reported:
November 12, 2020
Notable Locations:
Johannesburg, Ekurhuleni, Nelson Mandela Bay, Cape Town, Durban, Yola, Bissau
Legislation / Regulation Referenced:
National Energy Regulator of South Africa (NERSA), Electric Power Sector Reform Act (EPSRA), NERC regulations
Year:
2025
Region / City:
New York, USA
Subject:
Immigration, Habeas Corpus
Document Type:
Legal Memorandum
Organization / Institution:
United States District Court for the Southern District of New York
Author:
[Client Name]
Target Audience:
Legal professionals, Court
Period of Validity:
Ongoing
Approval Date:
[Date]
Date of Changes:
[Date]
Name:
Dori Saini
Location:
Ball Ground, Georgia, United States
Contact Information:
Phone number and email address provided
Profession:
Identity and Access Management Specialist
Total Experience:
Over 19 years
Current Position:
Advisory Specialist Master (Manager)
Current Employer:
Deloitte
Previous Employers:
CDW; Verizon Telematics; Techdemocracy LLC; Cotelligent; IBM India; Ilantus Technologies
Industry Focus:
Identity and Access Management; Information Security
Key Technologies:
Okta; SailPoint IdentityIQ; SailPoint IdentityNow; Ping Identity; CyberArk; Oracle Identity and Access Management; Tivoli Security Products
Certifications:
CISSP; CISM; CompTIA Security+; Okta Certifications; Ping Identity Certifications; SailPoint Certifications; ForgeRock Certification; CyberArk Certification
Education:
Master of Computer Application
Education Institution:
Uttar Pradesh Technical University
Education Completion Year:
2005
Professional Memberships:
Senior Member of IEEE
Awards and Honors:
IBM Best Project Award; Employee of the Month at CDW
Publications:
Article on Identity and Access Management best practices; IEEE research paper
Document Type:
Professional resume
Year:
2012
Region / City:
N/A
Theme:
Identity Management, Software Deployment
Document Type:
Deployment Guide
Organization / Institution:
Microsoft Corporation
Author:
Bill Mathers
Target Audience:
Architects, Consultants, System Engineers, System Administrators
Validity Period:
N/A
Approval Date:
June 2012
Date of Changes:
N/A
Year:
2015
Applies to:
Microsoft Office 2013, Microsoft SQL Server 2012 SP1 or higher, Microsoft SQL Server 2014
Type of document:
White paper
Author:
Kay Unkroth
Technical reviewers:
Alex Shteynberg, Andy Wu, Ariel Netz, Ashvini Sharma, Carolyn Rowe, Dave McPherson, Dave Wickert, David Hill, David Maguire, David Vugteveen, Denise Stendera, Diego Oppenheimer, Donny Rose, Dotan Elharrar, Frederic Gisbert, Guy Alroy, Haroon Ahmed, Haydn Richardson, Heidi Steen, Ileana Koller, Il-Sung Lee, Irina Gorbach, James Wu, Joanne Hendrickson, Joe Davies, John Hancock, John Sirmon, Kedar Dubhashi, Kevin Donovan, Mey Meenakshisundaram, Michiko Short, Mike Plumley, Nathaniel Scharer, Nick Simons, Nicolas Menigon, Parul Manek, Peter Brundrett, Prash Shirolkar, Reddy Duggempudi, Rob Lefferts, Robert Bruckner, Robert Skoglund, Sesha Mani, Sunil Gottumukkala, T.K. Anand, Uval Blumenfeld, V.B. Balayoghan, Venky Krishnan, Venky Veeraraghavan, Wayne Clark, Yair Tor, Craig Guyer
Publisher:
Microsoft Corporation
Copyright:
© 2014 Microsoft Corporation. All rights reserved.
Trademarks:
Microsoft, Microsoft Office 2013, Microsoft SharePoint Server, Microsoft SQL Server 2012, Microsoft SQL Server 2014, Microsoft Windows Azure
Scope:
Enterprise Microsoft BI solutions, including authentication, identity delegation, and multi-tier architectures
Target audience:
IT professionals, system architects, BI solution developers
Document type:
Technical reference
Year:
2021
Region / City:
Australia
Topic:
Gender Identity, LGB Rights, Legal Reforms
Document Type:
Submission
Author:
LGB Alliance Australia
Target Audience:
UN member states, policymakers, LGBTQI+ organizations
Period of Validity:
Ongoing
Date of Approval:
N/A
Date of Changes:
N/A
Year:
2023
Region / city:
Australia
Topic:
Identity verification
Document type:
Guidelines
Organization:
Department of Home Affairs
Author:
N/A
Target audience:
Applicants for NDIS Worker Screening Check
Validity period:
N/A
Approval date:
N/A
Modification date:
N/A
Context:
A set of guidelines outlining acceptable documents for identity verification as part of the NDIS Worker Screening Check application process.
Year:
2016
Region / City:
Mongolia
Subject:
Tibetan Buddhism, Mongolian History, National Identity, Qing Dynasty, Soviet Influence
Document Type:
MA Thesis
Institution:
University
Author:
Andrew Marcoux
Target Audience:
Scholars, Historians, Students of Mongolian History, Buddhist Studies
Period of Action:
Post-Qing Mongolia
Approval Date:
April 4, 2016
Date of Modifications:
N/A
Year:
2023
Region / City:
United Kingdom
Topic:
Identity Verification, DBS Check
Document Type:
Form
Organization:
Catholic Safeguarding Standards Agency
Target Audience:
Individuals applying for a DBS check
Effective Period:
Not specified
Approval Date:
Not specified
Amendment Date:
Not specified