(1) Any person who has devised any scheme or artifice to defraud another or to obtain from another money, property, or anything of value by means of false or fraudulent pretenses, representations, promises, or material omissions, and who communicates directly or indirectly with any person by any means for the purpose of executing or concealing the scheme or artifice is guilty of:

Attorney's Note

Under the Utah Code, punishments for crimes depend on the classification. In the case of this section:
ClassPrisonFine
class A misdemeanorup to 364 daysup to $2,500
class B misdemeanorup to 6 monthsup to $1,000
For details, see Utah Code § 76-3-204

Ask a criminal law question, get an answer ASAP!
Click here to chat with a criminal defense lawyer and protect your rights.

Terms Used In Utah Code 76-10-1801

  • Act: means a voluntary bodily movement and includes speech. See Utah Code 76-1-101.5
  • Fraud: Intentional deception resulting in injury to another.
  • Offense: means a violation of any penal statute of this state. See Utah Code 76-1-101.5
  • Person: means an individual, public or private corporation, government, partnership, or unincorporated association. See Utah Code 76-1-101.5
  • Property: includes both real and personal property. See Utah Code 68-3-12.5
  • Signature: includes a name, mark, or sign written with the intent to authenticate an instrument or writing. See Utah Code 68-3-12.5
     (1)(a) a class B misdemeanor when the value of the property, money, or thing obtained or sought to be obtained is less than $500;
     (1)(b) a class A misdemeanor when the value of the property, money, or thing obtained or sought to be obtained is or exceeds $500 but is less than $1,500;
     (1)(c) a third degree felony when the value of the property, money, or thing obtained or sought to be obtained is or exceeds $1,500 but is less than $5,000;
     (1)(d) a second degree felony when the value of the property, money, or thing obtained or sought to be obtained is or exceeds $5,000; and
     (1)(e) a second degree felony when the object or purpose of the scheme or artifice to defraud is the obtaining of sensitive personal identifying information, regardless of the value.
(2) The determination of the degree of any offense under Subsection (1) shall be measured by the total value of all property, money, or things obtained or sought to be obtained by the scheme or artifice described in Subsection (1) except as provided in Subsection (1)(e).
(3) Reliance on the part of any person is not a necessary element of the offense described in Subsection (1).
(4) An intent on the part of the perpetrator of any offense described in Subsection (1) to permanently deprive any person of property, money, or thing of value is not a necessary element of the offense.
(5) Each separate communication made for the purpose of executing or concealing a scheme or artifice described in Subsection (1) is a separate act and offense of communication fraud.
(6)

     (6)(a) To communicate as described in Subsection (1) means to:

          (6)(a)(i) bestow, convey, make known, recount, or impart;
          (6)(a)(ii) give by way of information;
          (6)(a)(iii) talk over; or
          (6)(a)(iv) transmit information.
     (6)(b) Means of communication include use of the mail, telephone, telegraph, radio, television, newspaper, computer, and spoken and written communication.
(7) A person may not be convicted under this section unless the pretenses, representations, promises, or material omissions made or omitted were made or omitted intentionally, knowingly, or with a reckless disregard for the truth.
(8) As used in this section, “sensitive personal identifying information” means information regarding an individual’s:

     (8)(a) Social Security number;
     (8)(b) driver’s license number or other government issued identification number;
     (8)(c) financial account number or credit or debit card number;
     (8)(d) password or personal identification number or other identification required to gain access to a financial account or a secure website;
     (8)(e) automated or electronic signature;
     (8)(f) unique biometric data; or
     (8)(g) any other information that can be used to gain access to an individual’s financial accounts or to obtain goods or services.