Section
545.01 Definitions
545.02 Determining property value in theft offense
545.03 Degree of offense when certain property involved
545.04 Detention of shoplifters and those committing motion picture piracy; protection of institutional property
545.05 Theft
545.06 Unauthorized use of a vehicle; vehicle trespass
545.07 Insurance fraud
545.08 Unauthorized use of property
545.09 Passing bad checks
545.10 Misuse of credit cards
545.11 Making or using slugs
545.12 Tampering with coin machines
545.13 Criminal simulation
545.14 Tampering with records
545.15 Securing writings by deception
545.16 Personating an officer
545.17 Defrauding creditors
545.18 Receiving stolen property
545.19 Possession of criminal tools
545.20 Forgery of identification cards
545.21 Possession of municipal property
545.22 Diminishing or interfering with forfeitable property
545.23 Motion picture piracy
545.24 Failure to disclose personal information
545.25 Evidence of theft of rented property
545.26 Prosecutions for theft of utilities
545.27 Misconduct involving a public transportation system
545.28 Recording credit card, telephone or Social Security numbers
545.29 Prima facie evidence of purpose to defraud
545.30 Medicaid fraud
545.99 Penalty
Cross-reference:
Cheating, see § 517.05
Falsification, see § 525.02
Impersonating a public servant, see § 525.03
Property defined, see § 501.01(p)
For the purpose of this chapter and Chapter 541, the following definitions shall apply unless the context clearly indicates or requires a different meaning.
(a) ACTIVE DUTY SERVICE MEMBER. Any member of the armed forces of the United States performing active duty under Title 10 of the United States Code.
(b) ANHYDROUS AMMONIA. A compound formed by the combination of two gaseous elements, nitrogen and hydrogen, in the manner described below. ANHYDROUS AMMONIA is one part nitrogen to three parts hydrogen (NH3). ANHYDROUS AMMONIA by weight is 14 parts nitrogen to three parts hydrogen, which is approximately 82% nitrogen to 18% hydrogen.
(c) ASSISTANCE DOG. Has the same meaning as in R.C. § 955.011.
(d) CABLE TELEVISION SERVICE. Any services provided by or through the facilities of any cable television system or other similar closed circuit coaxial cable communications system, or any microwave or similar transmission service used in connection with any cable television system or other similar closed circuit coaxial cable communications system.
(e) COIN MACHINE. Any mechanical or electronic device designed to do both of the following:
(1) Receive a coin or bill, or token made for that purpose; and
(2) In return for the insertion or deposit of a coin, bill or token, automatically dispense property, provide a service or grant a license.
(f) COMPUTER. An electronic device that performs logical, arithmetic and memory functions by the manipulation of electronic or magnetic impulses. COMPUTER includes but is not limited to all input, output, processing, storage, computer program or communication facilities that are connected, or related, in a computer system or network to an electronic device of that nature.
(g) COMPUTER CONTAMINANT. A computer program that is designed to modify, damage, destroy, disable, deny or degrade access to, allow unauthorized access to, functionally impair, record or transmit information within a computer, computer system, or computer network without the express or implied consent of the owner or other person authorized to give consent and that is of a type or kind described in divisions (1) through (4) of this definition or of a type or kind similar to a type or kind described in divisions (1) through (4) of this definition:
(1) A group of computer programs commonly known as “viruses” and “worms” that are self-replicating or self-propagating and that are designed to contaminate other computer programs, compromise computer security, consume computer resources, modify, destroy, record or transmit data, or disrupt the normal operation of the computer, computer system or computer network;
(2) A group of computer programs commonly known as “Trojans” or “Trojan horses” that are not self-replicating or self-propagating and that are designed to compromise computer security, consume computer resources, modify, destroy, record or transmit data, or disrupt the normal operation of the computer, computer system or computer network;
(3) A group of computer programs commonly known as “zombies” that are designed to use a computer without the knowledge and consent of the owner, or other person authorized to give consent, and that are designed to send large quantities of data to a targeted computer network for the purpose of degrading the targeted computer’s or network’s performance, or denying access through the network to the targeted computer or network, resulting in what is commonly known as “denial of service” or “distributed denial of service” attacks; or
(4) A group of computer programs commonly known as “trap doors,” “back doors” or “root kits” that are designed to bypass standard authentication software and that are designed to allow access or use of a computer without the knowledge or consent of the owner, or other person authorized to give consent.
(h) COMPUTER HACKING.
(1) Any of the following:
A. Gaining access or attempting to gain access to all or part of a computer, computer system or a computer network without express or implied authorization with the intent to defraud or with intent to commit a crime;
B. Misusing computer or network services, including, but not limited to, mail transfer programs, file transfer programs, proxy servers and web servers, by performing functions not authorized by the owner of the computer, computer system, or computer network or other person authorized to give consent. As used in this division, MISUSE OF COMPUTER AND NETWORK SERVICES includes but is not limited to the unauthorized use of any of the following:
1. Mail transfer programs to send mail to persons other than the authorized users of that computer or computer network;
2. File transfer program services or proxy servers to access other computers, computer systems or computer networks; or
3. Web servers to redirect users to other web pages or web servers.
C. 1. Subject to division (1)C.2. of this definition, using a group of computer programs commonly known as “port scanners” or “probes” to intentionally access any computer, computer system or computer network without the permission of the owner of the computer, computer system or computer network or other person authorized to give consent. The group of computer programs referred to in this division includes but is not limited to those computer programs that use a computer network to access a computer, computer system or another computer network to determine any of the following: the presence or types of computers or computer systems on a network; the computer network’s facilities and capabilities; the availability of computer or network services; the presence or versions of computer software including, but not limited to, operating systems, computer services or computer contaminants; the presence of a known computer software deficiency that can be used to gain unauthorized access to a computer, computer system or computer network; or any other information about a computer, computer system or computer network not necessary for the normal and lawful operation of the computer initiating the access.
2. The group of computer programs referred to in division (1)C.1. of this definition does not include standard computer software used for the normal operation, administration, management and test of a computer, computer system or computer network, including, but not limited to, domain name services, mail transfer services and other operating system services, computer programs commonly called “ping,” “tcpdump” and “traceroute” and other network monitoring and management computer software, and computer programs commonly knows as “nslookup” and “whois” and other systems administration computer software; or
D. The intentional use of a computer, computer system or a computer network in a manner that exceeds any right or permission granted by the owner of the computer, computer system or computer network or other person authorized to give consent.
(2) COMPUTER HACKING does not include the introduction of a computer contaminant, as defined in this section, into a computer, computer system, computer program or computer network.
(i) COMPUTER NETWORK. A set of related and remotely-connected computers and communication facilities that includes more than one computer system that has the capability to transmit among the connected computers and communication facilities through the use of computer facilities.
(j) COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements that, when executed by a computer, causes the computer to process data.
(k) COMPUTER SERVICES. Includes but is not limited to the use of a computer system, computer network, computer program, data that is prepared for computer use, or data that is contained within a computer system or computer network.
(l) COMPUTER SOFTWARE. Computer programs, procedures and other documentation associated with the operation of a computer system.
(m) COMPUTER SYSTEM. A computer and related devices, whether connected or unconnected, including, but not limited to, data input, output and storage devices, data communications links, and computer programs and data that make the system capable of performing specified special purpose data processing tasks.
(n) COUNTERFEIT TELECOMMUNI- CATIONS DEVICE. A telecommunications device that, alone or with another telecommunications device, has been altered, constructed, manufactured or programmed to acquire, intercept, receive or otherwise facilitate the use of a telecommunications service or information service without the authority or consent of the provider of the telecommunications service or information service. The phrase includes but is not limited to a clone telephone, clone microchip, tumbler telephone or tumbler microchip; a wireless scanning device capable of acquiring, intercepting, receiving or otherwise facilitating the use of telecommunications service or information service without immediate detection; or a device, equipment, hardware or software designed for, or capable of, altering or changing the electronic serial number in a wireless telephone.
(o) CREATE A SUBSTANTIAL RISK OF SERIOUS PHYSICAL HARM TO ANY PERSON. Includes the creation of a substantial risk of serious physical harm to any emergency personnel.
(p) CREDIT CARD. Includes but is not limited to a card, code, device or other means of access to a customer’s account for the purpose of obtaining money, property, labor or services on credit, or for initiating an electronic fund transfer at a point-of-sale terminal, an automated teller machine, or a cash dispensing machine. It also includes a county procurement card issued under R.C. § 301.29.
(q) DANGEROUS DRUG. Has the same meaning as in R.C. § 4729.01.
(r) DATA. A representation of information, knowledge, facts, concepts or instructions that are being or have been prepared in a formalized manner and that are intended for use in a computer, computer system or computer network.
(s) DECEPTION. To knowingly deceive another or cause another to be deceived by any false or misleading representation, by withholding information, by preventing another from acquiring information, or by any other conduct, act or omission that creates, confirms or perpetuates a false impression in another, including a false impression as to law, value, state of mind or other objective or subjective fact.
(t) DEFRAUD. To knowingly obtain, by deception, some benefit for oneself or another, or to knowingly cause, by deception, some detriment to another.
(u) DEPRIVE. To do any of the following:
(1) To withhold property of another permanently, or for a period that appropriates a substantial portion of its value or use, or with purpose to restore it only upon payment of a reward or other consideration;
(2) To dispose of property so as to make it unlikely that the owner will recover it; or
(3) To accept, use or appropriate money, property or services, with purpose not to give proper consideration in return for the money, property or services, and without reasonable justification or excuse for not giving proper consideration.
(v) DISABLED ADULT. A person who is 18 years of age or older and has some impairment of body or mind that makes the person unable to work at any substantially remunerative employment that the
person otherwise would be able to perform and that will, with reasonable probability, continue for a period of at least 12 months without any present indication of recovery from the impairment, or who is 18 years of age or older and has been certified as permanently and totally disabled by an agency of this state or the United States that has the function of so classifying persons.
(w) DRUG ABUSE OFFENSE. Has the same meaning as in R.C. § 2925.01.
(x) ELDERLY PERSON. A person who is 65 years of age or older.
(y) ELECTRONIC FUND TRANSFER. Has the same meaning as in 92 Stat. 3728, 15 U.S.C. § 1693a, as amended.
(z) EMERGENCY PERSONNEL. Any of the following persons:
(1) A peace officer, as defined in R.C. § 2935.01;
(2) A member of a fire department or other firefighting agency of a municipal corporation, township, township fire district, joint fire district, other political subdivision or combination of political subdivisions;
(3) A member of a private fire company, as defined in R.C. § 9.60, or a volunteer firefighter;
(4) A member of a joint ambulance district or joint emergency medical services district;
(5) An emergency medical technician-basic, emergency medical technician- intermediate, emergency medical technician- paramedic, ambulance operator or other member of an emergency medical service that is owned of operated by a political subdivision or a private entity;
(6) The State Fire Marshal, the Chief Deputy State Fire Marshal or an assistant state fire marshal; or
(7) A fire prevention officer of a political subdivision or an arson, fire or similar investigator of a political subdivision.
(aa) FEDERALLY-LICENSED FIREARMS DEALER. Has the same meaning as in R.C. § 5502.63.
(bb) FIREARM and DANGEROUS ORDNANCE. Have the same meaning as in R.C. § 2923.11.
(cc) FORGE. To fabricate or create, in whole or in part and by any means, any spurious writing, or to make, execute, alter, complete, reproduce or otherwise purport to authenticate any writing, when the writing in fact is not authenticated by that conduct.
(dd) GAIN ACCESS. To approach, instruct, communicate with, store data in, retrieve data from or otherwise make use of any resources of a computer, computer system or computer network, or any cable service or cable system both as defined in R.C. § 2913.04.
(ee) INFORMATION SERVICE.
(1) Subject to division (2) of this definition, the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing or making available information via telecommunications, including, but not limited to, electronic publishing.
(2) INFORMATION SERVICE does not include any use of a capability of a type described in division (1) of this definition for the management, control or operation of a telecommunications system or the management of a telecommunications service.
(ff) INTERNET. Has the same meaning as in R.C. § 341.42.
(gg) MOTOR VEHICLE. Has the same meaning as in R.C. § 4501.01.
(hh) OCCUPIED STRUCTURE. Any house, building, outbuilding, watercraft, aircraft, railroad car, truck, trailer, tent or other structure, vehicle or shelter, or any portion thereof, to which any of the following applies:
(1) It is maintained as a permanent or temporary dwelling, even though it is temporarily unoccupied and whether or not any person is actually present;
(2) At the time, it is occupied as the permanent or temporary habitation of any person, whether or not any person is actually present;
(3) At the time, it is specially adapted for the overnight accommodation of any person, whether or not any person is actually present; or
(4) At the time, any person is present or likely to be present in it.
(ii) OWNER. Unless the context requires a different meaning, any person, other than the actor, who is the owner of, who has possession or control of, or who has any license or interest in property or services, even though the ownership, possession, control, license or interest is unlawful.
(jj) POLICE DOG OR HORSE. Has the same meaning as in R.C. § 2921.321.
(kk) POLITICAL SUBDIVISION. Has the same meaning as in R.C. § 2744.01.
(ll) RENTED PROPERTY. Personal property in which the right of possession and use of the property is for a short and possibly indeterminate term in return for consideration; the rentee generally controls the duration of possession of the property within any applicable minimum or maximum term; and the amount of consideration is generally determined by the duration of possession of the property.
(mm) SERVICES. Includes labor, personal services, professional services, rental services, public utility services including wireless service as defined in R.C. § 5507.01(F)(1), common carrier services, and food, drink, transportation, entertainment and cable television services and, for purposes of R.C. § 2913.04 or any substantially equivalent municipal ordinance, includes cable services as defined in that section.
(nn) SLUG. An object that, by virtue of its size, shape, composition or other quality, is capable of being inserted or deposited in a coin machine as an improper substitute for a genuine coin, bill or token made for that purpose.
(oo) STATE. Has the same meaning as in R.C. § 2744.01.
(pp) TELECOMMUNICATION. The origination, emission, dissemination, transmission or reception of data, images, signals, sounds or other intelligence or equivalence or intelligence of any nature over any communications system by any method, including, but not limited to, a fiber optic, electronic, magnetic, optical, digital or analog method.
(qq) TELECOMMUNICATIONS DEVICE. Any instrument, equipment, machine or other device that facilitates telecommunication, including, but not limited to, a computer, computer network, computer chip, computer circuit, scanner, telephone, cellular telephone, pager, personal communications device, transponder, receiver, radio, modem or device that enables the use of a modem.
(rr) TELECOMMUNICATIONS SERVICE. The providing, allowing, facilitating or generating of any form of telecommunication through the use of a telecommunications device over a telecommunications system.
(ss) THEFT OFFENSE. Any of the following:
(1) A violation of R.C. § 2911.01, § 2911.02, § 2911.11, § 2911.12, § 2911.13, § 2911.31, § 2911.32, § 2913.02, § 2913.03, § 2913.04, § 2913.041, § 2913.11, § 2913.21, § 2913.31, § 2913.32, § 2913.33, § 2913.34, § 2913.40, § 2913.42, § 2913.43, § 2913.44, § 2913.45, § 2913.47, 2913.48, former R.C. § 2913.47§ 2913.48, R.C. § 2913.51, § 2915.05, § 2921.41, or R.C. § 4737.04(B)(2);
(2) A violation of an existing or former municipal ordinance or law of this or any other state or of the United States substantially equivalent to any section listed in division (1) of this definition, or a violation of R.C. § 2913.41, § 2913.81 or § 2915.06 as it existed prior to July 1, 1996;
(3) An offense under an existing or former municipal ordinance or law of this or any other state or the United States involving robbery, burglary, breaking and entering, theft, embezzlement, wrongful conversion, forgery, counterfeiting, deceit or fraud; or
(4) A conspiracy to commit, attempt to commit, or complicity in committing any offense under division (1), (2) or (3) of this definition.
(tt) UTTER. To issue, publish, transfer, use, put or send into circulation, deliver or display.
(uu) WRITING. Any computer software, document, letter, memorandum, note, paper, plate, data, film or other thing having in or upon it any written, type-written or printed matter, and any token, stamp, seal, credit card, badge, trademark, label or other symbol of value, right, privilege, license or identification.
(R.C. §§ 2909.01, 2913.01)
(a) If more than one item of property or services is involved in a theft offense or in a violation of R.C. § 1716.14(A) involving a victim who is an elderly person or disabled adult, or any substantially equivalent municipal ordinance, the value of the property or services involved for the purpose of determining the value as required by R.C. § 2913.61(A) is the aggregate value of all property or services involved in the offense.
(b) (1) When a series of offenses under § 545.05, or a series of violations of, attempts to commit a violation of, conspiracies to violate, or complicity in violations of § 545.05, § 545.06 or § 545.08, § 545.10(b)(1) or (b)(2) of § 545.15 or 545.20 involving a victim who is an elderly person or disabled adult, or any substantially equivalent municipal ordinance to any of these offenses, is committed by the offender in the offender’s same employment, capacity or relationship to another, all of those offenses shall be tried as a single offense. When a series of offenses under R.C. § 2913.02, or a series of violations of, attempts to commit a violation of, conspiracies to violate, or complicity in violations of R.C. § 2913.02 or 2913.43 involving a victim who is an active duty service member or spouse of an active duty service member, or any substantially equivalent municipal ordinance to any of these offenses, is committed by the offender in the offender’s same employment, capacity, or relationship to another, all of those offenses shall be tried as a single offense. The value of the property or services involved in the series of offenses for the purpose of determining the value as required by R.C. § 2913.61(A) is the aggregate value of all property and services involved in all offenses in the series.
(2) If an offender commits a series of offenses under § 545.05 that involves a common course of conduct to defraud multiple victims, all of the offenses may be tried as a single offense. If an offender is being tried for the commission of a series of violations of, attempts to commit a violation of, conspiracies to violate, or complicity in violations of § 545.05, § 545.06 or § 545.08, § 545.10(b)(1) or (b)(2), or § 545.15 or § 545.20, whether committed against one victim or more than one victim, involving a victim who is an elderly person or disabled adult, or any substantially equivalent municipal ordinance to any of these offenses, pursuant to a scheme or course of conduct, all of those offenses may be tried as a single offense. If an offender is being tried for the commission of a series of violations of, attempts to commit a violation of, conspiracies to violate, or complicity in violations of R.C. § 2913.02 or 2913.43, or any substantially equivalent municipal ordinance to any of these offenses, whether committed against one victim or more than one victim, involving a victim who is an active duty service member or spouse of an active duty service member pursuant to a scheme or course of conduct, all of those offenses may be tried as a single offense. If the offenses are tried as a single offense, the value of the property or services involved for the purpose of determining the value as required by R.C. § 2913.61(A) is the aggregate value of all property and services involved in all of the offenses in the course of conduct.
(3) When a series of two or more offenses under R.C. § 2913.40, 2913.48, or 2921.41 is committed by the offender in the offender’s same employment, capacity or relationship to another, all of those offenses may be tried as a single offense. If the offenses are tried as a single offense, the value of the property or services involved for the purpose of determining the value as required by R.C. § 2913.61(A) is the aggregate value of all property and services involved in all of the offenses in the series of two or more offenses.
(4) In prosecuting a single offense under division (b)(1), (b)(2) or (b)(3) of this section, it is not necessary to separately allege and prove each offense in the series. Rather, it is sufficient to allege and prove that the offender, within a given span of time, committed one or more theft offenses or violations of R.C. § 2913.40, 2913.48, or 2921.41 in the offender’s same employment, capacity, or relationship to another as described in division (b)(1) or (b)(3) of this section, or committed one or more theft offenses that involve a common course of conduct to defraud multiple victims or a scheme or course of conduct as described in division (b)(2) of this section. While it is not necessary to separately allege and prove each offense in the series in order to prosecute a single offense under division (b)(1), (b)(2), or (b)(3) of this section, it remains necessary in prosecuting them as a single offense to prove the aggregate value of the property or services in order to meet the requisite statutory offense level sought by the prosecution.
(c) The following criteria shall be used in determining the value of property or services involved in a theft offense:
(1) The value of an heirloom, memento, collector’s item, antique, museum piece, manuscript, document, record or other thing that has intrinsic worth to its owner and that either is irreplaceable or is replaceable only on the expenditure of substantial time, effort or money, is the amount which would compensate the owner for its loss.
(2) The value of personal effects and household goods, and of materials, supplies, equipment and fixtures used in the profession, business, trade, occupation, or avocation of its owner, which property is not covered under division (c)(1) of this section, and which retains substantial utility for its purpose regardless of its age or condition, is the cost of replacing the property with new property of like kind and quality.
(3) The value of any real or personal property that is not covered under division (c)(1) or (c)(2) of this section, and the value of services, is the fair market value of the property or services. As used in this section,
FAIR MARKET VALUE is the money consideration which a buyer would give and a seller would accept for property or services, assuming that the buyer is willing to buy and the seller is willing to sell, that both are fully informed as to all facts material to the transaction, and that neither is under any compulsion to act.
(d) Without limitation on the evidence which may be used to establish the value of property or services involved in a theft offense:
(1) When the property involved is personal property held for sale at wholesale or retail, the price at which the property was held for sale is prima facie evidence of its value.
(2) When the property involved is a security or commodity traded on an exchange, the closing price or, if there is no closing price, the asked price, given in the latest marked quotation prior to the offense, is prima facie evidence of the value of the security or commodity.
(3) When the property involved is livestock, poultry or raw agricultural products for which a local market price is available, the latest local market price prior to the offense is prima facie evidence of the value of the livestock, poultry or products.
(4) When the property involved is a negotiable instrument, the face value is prima facie evidence of the value of the instrument.
(5) When the property involved is a warehouse receipt, bill of lading, pawn ticket, claim check or other instrument entitling the holder or bearer to receive property, the face value or, if there is no face value, the value of the property covered by the instrument less any payment necessary to receive the property, is prima facie evidence of the value of the instrument.
(6) When the property involved is a ticket of admission, ticket for transportation, coupon, token or other instrument entitling the holder or bearer to receive property or services, the face value or, if there is no face value, the value of the property or services which may be received by the instrument is prima facie evidence of the value of the instrument.
(7) When the services involved are gas, electricity, water, telephone, transportation, shipping or other services for which the rate is established by law, the duly established rate is prima facie evidence of the value of the services.
(8) When the services involved are services for which the rate is not established by law, and the offender has been notified prior to the offense of the rate for the services, either in writing or orally, or by posting in a manner reasonably calculated to come to the attention of potential offenders, the rate contained in the notice is prima facie evidence of the value of the services.
(R.C. § 2913.61(B) - (E))
(a) A credit card;
(b) A printed form for a check or other negotiable instrument, that on its face identifies the drawer or maker for whose use it is designed or identifies the account on which it is to be drawn, and that has not been executed by the drawer or maker or on which the amount is blank;
(c) A motor vehicle identification license plate as prescribed by R.C. § 4503.22, a temporary motor vehicle license registration as prescribed by R.C. § 4503.182, or any comparable temporary motor vehicle license registration as prescribed by the applicable law of another state or the United States;
(d) A blank form for a certificate of title or a manufacturer’s or importer’s certificate to a motor vehicle, as prescribed by R.C. § 4505.07; or
(e) A blank form for any license listed in R.C. § 4507.01.
(R.C. § 2913.71)
(a) For the purpose of this section, the following definitions shall apply unless the context clearly indicates or requires a different meaning.
(1) ARCHIVAL INSTITUTION. Any public or private building, structure, or shelter in which are stored historical documents, devices, records, manuscripts or items of public interest, which historical materials are stored to preserve the materials or the information in the materials, to disseminate the information contained in the materials, or to make the materials available for public inspection or for inspection by certain persons who have a particular interest in, use for, or knowledge concerning the materials.
(2) AUDIOVISUAL RECORDING FUNCTION and FACILITY. Have the same meaning as in R.C. § 2913.07.
(3) MUSEUM. Any public or private nonprofit institution that is permanently organized for primarily educational or aesthetic purposes, owns or borrows objects or items of public interest, and cares for and exhibits to the public the objects or items.
(4) PRETRIAL DIVERSION PROGRAM. Means a rehabilitative, educational program designed to reduce recidivism and promote personal responsibility that is at least four hours in length and that has been approved by any court in this state.
(b) A merchant, or an employee or agent of a merchant, who has probable cause to believe that things offered for sale by a mercantile establishment have been unlawfully taken by a person, may, for the purposes set forth in division (d) below, detain the person in a reasonable manner for a reasonable length of time within the mercantile establishment or its immediate vicinity.
(c) Any officer, employee or agent of a library, museum or archival institution may, for the purposes set forth in division (d) below or for the purpose of conducting a reasonable investigation of a belief that the person has acted in a manner described in divisions (c)(1) and (c)(2) below, detain a person in a reasonable manner for a reasonable length of time within, or in the immediate vicinity of, the library, museum or archival institution, if the officer, employee or agent has probable cause to believe that the person has:
(1) Without privilege to do so, knowingly moved, defaced, damaged, destroyed or otherwise improperly tampered with property owned by or in the custody of the library, museum or archival institution; or
(2) With purpose to deprive the library, museum or archival institution of property owned by it or in its custody, knowingly obtained or exerted control over the property without the consent of the owner or person authorized to give consent, beyond the scope of the express or implied consent of the owner or person authorized to give consent, by deception, or by threat.
(d) An officer, agent or employee of a library, museum or archival institution pursuant to division (c) above or a merchant or an employee or agent of a merchant pursuant to division (b) above may detain another person for any of the following purposes:
(1) To recover the property that is the subject of the unlawful taking, criminal mischief or theft;
(2) To cause an arrest to be made by a peace officer; or
(3) To obtain a warrant of arrest;
(4) To offer the person, if the person is suspected of the unlawful taking, criminal mischief, or theft and notwithstanding any other provision of this Code or the Ohio Revised Code, an opportunity to complete a pretrial diversion program and to inform the person of the other legal remedies available to the library, museum, archival institution, or merchant.
(e) The owner or lessee of a facility in which a motion picture is being shown, or the owner’s or lessee’s employee or agent, who has probable cause to believe that a person is or has been operating an audiovisual recording function of a device in violation of R.C. § 2935.041(A) may, for the purpose of causing an arrest to be made by a peace officer or of obtaining an arrest warrant, detain the person in a reasonable manner for a reasonable length of time within the facility or its immediate vicinity.
(f) The officer, agent or employee of the library, museum or archival institution, the merchant or an employee or agent of a merchant, or the owner, lessee, employee or agent of the facility acting under divisions (b), (c) or (e) above shall not search the person detained, search or seize any property belonging to the person detained without the person’s consent, or use undue restraint upon the person detained.
(g) Any peace officer may arrest without a warrant any person that the officer has probable cause to believe has committed any act described in division (c)(1) or (c)(2) above, that the officer has probable cause to believe has committed an unlawful taking in a mercantile establishment, or that the officer has reasonable cause to believe has committed an act prohibited by R.C. § 2913.07. An arrest under this division shall be made within a reasonable time after the commission of the act or unlawful taking.
(R.C. § 2935.041)
Loading...