Skip to code content (skip section selection)
Compare to:
Woodlawn Overview
Woodlawn, OH Code of Ordinances
VILLAGE OF WOODLAWN, OHIO CODE OF ORDINANCES
OFFICIALS
ADOPTING ORDINANCE
CHARTER FOR VILLAGE OF WOODLAWN, OHIO
PART TWO: ADMINISTRATION CODE
PART FOUR: TRAFFIC CODE
PART SIX: GENERAL OFFENSES CODE
CHAPTER 606: GENERAL PROVISIONS; ADMINISTRATION AND ENFORCEMENT
CHAPTER 612: ALCOHOLIC BEVERAGES
CHAPTER 618: ANIMALS
CHAPTER 624: DRUGS
CHAPTER 630: GAMBLING
CHAPTER 636: OFFENSES RELATING TO PERSONS
CHAPTER 642: OFFENSES RELATING TO PROPERTY
§ 642.01 DEFINITIONS.
§ 642.02 THEFT.
§ 642.03 DEGREE OF OFFENSE WHEN CERTAIN PROPERTY INVOLVED.
§ 642.035 EVIDENCE OF THEFT OF RENTED PROPERTY.
§ 642.04 UNAUTHORIZED USE OF A VEHICLE; VEHICLE TRESPASS.
§ 642.05 UNAUTHORIZED USE OF PROPERTY.
§ 642.06 INJURING VINES, BUSHES, TREES OR CROPS.
§ 642.07 DESECRATION.
§ 642.08 ASSAULTING POLICE DOG OR HORSE OR ASSISTANCE DOG.
§ 642.09 ARSON.
§ 642.10 CRIMINAL DAMAGING OR ENDANGERING; VEHICULAR VANDALISM.
§ 642.11 CRIMINAL MISCHIEF.
§ 642.12 CRIMINAL TRESPASS.
§ 642.125 AGGRAVATED TRESPASS.
§ 642.13 TAMPERING WITH COIN MACHINES.
§ 642.14 PASSING BAD CHECKS.
§ 642.145 FORGING OR SELLING FORGED IDENTIFICATION CARDS.
§ 642.146 CRIMINAL SIMULATION.
§ 642.15 MISUSE OF CREDIT CARDS.
§ 642.155 RECORDING CREDIT CARD, TELEPHONE OR SOCIAL SECURITY NUMBERS.
§ 642.16 MAKING OR USING SLUGS.
§ 642.17 PRIMA FACIE EVIDENCE OF PURPOSE TO DEFRAUD.
§ 642.18 TAMPERING WITH RECORDS.
§ 642.19 SECURING WRITINGS BY DECEPTION.
§ 642.20 PERSONATING AN OFFICER.
§ 642.205 IDENTITY FRAUD. (REPEALED)
§ 642.21 DEFRAUDING CREDITORS.
§ 642.22 RECEIVING STOLEN PROPERTY.
§ 642.23 PURCHASE FROM MINORS OF SECONDHAND BUILDERS’ AND PLUMBERS’ HARDWARE.
§ 642.24 BILLPOSTING.
§ 642.25 THEFT OF C.A.T.V. (REPEALED)
§ 642.26 PROSECUTIONS FOR THEFT OF UTILITIES.
§ 642.27 FOOD STAMPS. (REPEALED) EDITOR’S NOTE:
§ 642.28 INSURANCE FRAUD.
§ 642.29 DIMINISHING OR INTERFERING WITH FORFEITABLE PROPERTY.
§ 642.30 MISCONDUCT INVOLVING A PUBLIC TRANSPORTATION SYSTEM.
§ 642.31 WORKERS’ COMPENSATION FRAUD.
§ 642.32 MEDICAID FRAUD.
§ 642.33 MOTION PICTURE PIRACY.
§ 642.34 RAILROAD VANDALISM; CRIMINAL TRESPASS; INTERFERENCE WITH OPERATION OF TRAIN; GRADE CROSSING DEVICE VANDALISM.
CHAPTER 648: PEACE DISTURBANCES
CHAPTER 654: RAILROADS
CHAPTER 660: SAFETY, SANITATION AND HEALTH
CHAPTER 666: SEX RELATED OFFENSES
CHAPTER 668: TREES, WEEDS AND GRASS
CHAPTER 672: WEAPONS AND EXPLOSIVES
CHAPTER 698: PENALTIES AND SENTENCING
PART EIGHT: BUSINESS REGULATION AND TAXATION CODE
PART TEN: UTILITIES AND PUBLIC SERVICES CODE
PART TWELVE: PLANNING AND ZONING CODE
PART FOURTEEN: BUILDING AND HOUSING CODE
PART SIXTEEN: FIRE PREVENTION CODE
TABLE OF SPECIAL ORDINANCES
COMPARATIVE TABLES
CHAPTER 642: OFFENSES RELATING TO PROPERTY
642.01   Definitions.
642.02   Theft.
642.03   Degree of offense when certain property involved.
642.035   Evidence of theft of rented property.
642.04   Unauthorized use of a vehicle; vehicle trespass.
642.05   Unauthorized use of property.
642.06   Injuring vines, bushes, trees or crops.
642.07   Desecration.
642.08   Assaulting police dog or horse or assistance dog.
642.09   Arson.
642.10   Criminal damaging or endangering; vehicular vandalism.
642.11   Criminal mischief.
642.12   Criminal trespass.
642.125   Aggravated trespass.
642.13   Tampering with coin machines.
642.14   Passing bad checks.
642.145   Forging or selling forged identification cards.
642.146   Criminal simulation.
642.15   Misuse of credit cards.
642.155   Recording credit card, telephone or Social Security numbers.
642.16   Making or using slugs.
642.17   Prima facie evidence of purpose to defraud.
642.18   Tampering with records.
642.19   Securing writings by deception.
642.20   Personating an officer.
642.205   Identity fraud. (Repealed)
642.21   Defrauding creditors.
642.22   Receiving stolen property.
642.23   Purchase from minors of secondhand builders’ and plumbers’ hardware.
642.24   Billposting.
642.25   Theft of C.A.T.V. (Repealed)
642.26   Prosecutions for theft of utilities.
642.27   Food stamps. (Repealed)
642.28   Insurance fraud.
642.29   Diminishing or interfering with forfeitable property.
642.30   Misconduct involving a public transportation system.
642.31   Workers’ compensation fraud.
642.32   Medicaid fraud.
642.33   Motion picture piracy.
642.34   Railroad vandalism; criminal trespass; interference with operation of train; grade crossing device vandalism.
   CROSS REFERENCES
   See section histories for similar State law
   Value of written instrument or evidence of debt - see Ohio R.C. 1.07
   Determining property value or amount of physical harm in arson - see Ohio R.C. 2909.11
   Value of stolen property - see Ohio R.C. 2913.61
   Parents’ liability for destructive acts of their children - see Ohio R.C. 3109.09
   Alteration, injury, removal of traffic control devices - see TRAF. 414.08
   Offenses relating to theft of motor vehicles - see TRAF. Ch. 444
   Removing, altering, etc. bicycle frame numbers or license plates - see TRAF. 474.17
   Definitions generally - see GEN. OFF. 606.01
   “Physical harm to property” defined - see GEN. OFF. 606.01
   “Property” defined - see GEN. OFF. 606.01
   “Serious physical harm to property” defined - see GEN. OFF. 606.01
   Detention of shoplifters and those committing motion picture piracy - see GEN. OFF. 606.23
   Disposition of unclaimed or forfeited property held by Police Division - see GEN. OFF. 606.24
   Endangering aircraft and airport operations - see GEN. OFF. 672.14
§ 642.01 DEFINITIONS.
   For the purpose of this chapter, the following definitions shall apply unless the context clearly indicates or requires a different meaning.
   (a)   ACTIVE DUTY SERVICE MEMBER. Any member of the armed forces of the United States performing active duty under Title 10 of the United States Code.
   (b)   ANHYDROUS AMMONIA. A compound formed by the combination of two gaseous elements, nitrogen and hydrogen, in the manner described below. Anhydrous ammonia is one part nitrogen to three parts hydrogen (NH3). Anhydrous ammonia by weight is fourteen parts nitrogen to three parts hydrogen, which is approximately 82% nitrogen to 18% hydrogen.
   (c)   ASSISTANCE DOG. Has the same meaning as in R.C. § 955.011.
   (d)   CABLE TELEVISION SERVICE. Any services provided by or through the facilities of any cable television system or other similar closed circuit coaxial cable communications system, or any microwave or similar transmission service used in connection with any cable television system or other similar closed circuit coaxial cable communications system.
   (e)   COIN MACHINE. Any mechanical or electronic device designed to do both of the following:
      (1)   Receive a coin or bill, or token made for that purpose;
      (2)   In return for the insertion or deposit of a coin, bill, or token, automatically dispense property, provide a service, or grant a license.
   (f)   COMPUTER. An electronic device that performs logical, arithmetic, and memory functions by the manipulation of electronic or magnetic impulses. The term includes but is not limited to all input, output, processing, storage, computer program, or communication facilities that are connected, or related, in a computer system or network to an electronic device of that nature.
   (g)   COMPUTER CONTAMINANT. Means a computer program that is designed to modify, damage, destroy, disable, deny or degrade access to, allow unauthorized access to, functionally impair, record, or transmit information within a computer, computer system, or computer network without the express or implied consent of the owner or other person authorized to give consent and that is of a type or kind described in divisions (1) through (4) of this definition or of a type or kind similar to a type or kind described in divisions (1) through (4) of this definition:
      (1)   A group of computer programs commonly known as “viruses” and “worms” that are self-replicating or self-propagating and that are designed to contaminate other computer programs, compromise computer security, consume computer resources, modify, destroy, record, or transmit data, or disrupt the normal operation of the computer, computer system, or computer network;
      (2)   A group of computer programs commonly known as “Trojans” or “Trojan horses” that are not self-replicating or self-propagating and that are designed to compromise computer security, consume computer resources, modify, destroy, record, or transmit data, or disrupt the normal operation of the computer, computer system, or computer network;
      (3)   A group of computer programs commonly known as “zombies” that are designed to use a computer without the knowledge and consent of the owner, or other person authorized to give consent, and that are designed to send large quantities of data to a targeted computer network for the purpose of degrading the targeted computer’s or network’s performance, or denying access through the network to the targeted computer or network, resulting in what is commonly known as “denial of service” or “distributed denial of service” attacks;
      (4)   A group of computer programs commonly known as “trap doors”, “back doors”, or “root kits” that are designed to bypass standard authentication software and that are designed to allow access or use of a computer without the knowledge or consent of the owner, or other person authorized to give consent.
   (h)   COMPUTER HACKING.
      (1)   The term means any of the following:
         A.   Gaining access or attempting to gain access to all or part of a computer, computer system, or a computer network without express or implied authorization with the intent to defraud or with intent to commit a crime;
         B.   Misusing computer or network services including but not limited to mail transfer programs, file transfer programs, proxy servers, and web servers by performing functions not authorized by the owner of the computer, computer system, or computer network or other person authorized to give consent. As used in this division, “misuse of computer and network services” includes but is not limited to the unauthorized use of any of the following:
            1.   Mail transfer programs to send mail to persons other than the authorized users of that computer or computer network;
            2.   File transfer program services or proxy servers to access other computers, computer systems, or computer networks;
            3.   Web servers to redirect users to other web pages or web servers.
         C.   1.   Subject to division (1)C.2. of this definition, using a group of computer programs commonly known as “port scanners” or “probes” to intentionally access any computer, computer system, or computer network without the permission of the owner of the computer, computer system, or computer network or other person authorized to give consent. The group of computer programs referred to in this division includes but is not limited to those computer programs that use a computer network to access a computer, computer system, or another computer network to determine any of the following: the presence or types of computers or computer systems on a network; the computer network’s facilities and capabilities; the availability of computer or network services; the presence or versions of computer software including but not limited to operating systems, computer services, or computer contaminants; the presence of a known computer software deficiency that can be used to gain unauthorized access to a computer, computer system, or computer network; or any other information about a computer, computer system, or computer network not necessary for the normal and lawful operation of the computer initiating the access.
            2.   The group of computer programs referred to in division (1)C.1. of this definition does not include standard computer software used for the normal operation, administration, management, and test of a computer, computer system, or computer network including but not limited to domain name services, mail transfer services, and other operating system services, computer programs commonly called “ping”, “tcpdump”, and “traceroute” and other network monitoring and management computer software, and computer programs commonly knows as “nslookup” and “whois” and other systems administration computer software.
         D.   The intentional use of a computer, computer system, or a computer network in a manner that exceeds any right or permission granted by the owner of the computer, computer system, or computer network or other person authorized to give consent.
      (2)   The term does not include the introduction of a computer contaminant, as defined in this section, into a computer, computer system, computer program, or computer network.
   (i)   COMPUTER NETWORK. A set of related and remotely-connected computers and communication facilities that includes more than one computer system that has the capability to transmit among the connected computers and communication facilities through the use of computer facilities.
   (j)   COMPUTER PROGRAM. An ordered set of data representing coded instructions or statements that, when executed by a computer, causes the computer to process data.
   (k)   COMPUTER SERVICES. Includes but is not limited to the use of a computer system, computer network, computer program, data that is prepared for computer use, or data that is contained within a computer system or computer network.
   (l)   COMPUTER SOFTWARE. Computer programs, procedures, and other documentation associated with the operation of a computer system.
   (m)   COMPUTER SYSTEM. A computer and related devices, whether connected or unconnected, including but not limited to data input, output, and storage devices, data communications links, and computer programs and data that make the system capable of performing specified special purpose data processing tasks.
   (n)   COUNTERFEIT TELECOMMUNI- CATIONS DEVICE. A telecommunications device that, alone or with another telecommunications device, has been altered, constructed, manufactured, or programmed to acquire, intercept, receive, or otherwise facilitate the use of a telecommunications service or information service without the authority or consent of the provider of the telecommunications service or information service. The phrase includes but is not limited to a clone telephone, clone microchip, tumbler telephone, or tumbler microchip; a wireless scanning device capable of acquiring, intercepting, receiving, or otherwise facilitating the use of telecommunications service or information service without immediate detection; or a device, equipment, hardware, or software designed for, or capable of, altering or changing the electronic serial number in a wireless telephone.
   (o)   CREATE A SUBSTANTIAL RISK OF SERIOUS PHYSICAL HARM TO ANY PERSON. Includes the creation of a substantial risk of serious physical harm to any emergency personnel.
   (p)   CREDIT CARD. Includes but is not limited to a card, code, device, or other means of access to a customer’s account for the purpose of obtaining money, property, labor, or services on credit, or for initiating an electronic fund transfer at a point-of-sale terminal, an automated teller machine, or a cash dispensing machine. It also includes a county procurement card issued under R.C. § 301.29.
   (q)   DANGEROUS DRUG. Has the same meaning as in R.C. § 4729.01.
   (r)   DANGEROUS ORDNANCE. Has the same meaning as in R.C. § 2923.11.
   (s)   DATA. A representation of information, knowledge, facts, concepts, or instructions that are being or have been prepared in a formalized manner and that are intended for use in a computer, computer system, or computer network.
   (t)   DECEPTION. To knowingly deceive another or cause another to be deceived by any false or misleading representation, by withholding information, by preventing another from acquiring information, or by any other conduct, act, or omission that creates, confirms, or perpetuates a false impression in another, including a false impression as to law, value, state of mind, or other objective or subjective fact.
   (u)   DEFRAUD. To knowingly obtain, by deception, some benefit for oneself or another, or to knowingly cause, by deception, some detriment to another.
   (v)   DEPRIVE. To do any of the following:
      (1)   To withhold property of another permanently, or for a period that appropriates a substantial portion of its value or use, or with purpose to restore it only upon payment of a reward or other consideration;
      (2)   To dispose of property so as to make it unlikely that the owner will recover it;
      (3)   To accept, use, or appropriate money, property, or services, with purpose not to give proper consideration in return for the money, property, or services, and without reasonable justification or excuse for not giving proper consideration.
   (w)   DISABLED ADULT. A person who is 18 years of age or older and has some impairment of body or mind that makes the person unable to work at any substantially remunerative employment that the person otherwise would be able to perform and that will, with reasonable probability, continue for a period of at least 12 months without any present indication of recovery from the impairment, or who is 18 years of age or older and has been certified as permanently and totally disabled by an agency of this state or the United States that has the function of so classifying persons.
   (x)   DRUG ABUSE OFFENSE. Has the same meaning as in R.C. § 2925.01.
   (y)   ELDERLY PERSON. A person who is 65 years of age or older.
   (z)   ELECTRONIC FUND TRANSFER. Has the same meaning as in 92 Stat. 3728, 15 U.S.C. § 1693a, as amended.
      (aa)   EMERGENCY PERSONNEL. Means any of the following persons:
      (1)   A peace officer, as defined in R.C. § 2935.01;
      (2)   A member of a fire department or other firefighting agency of a municipal corporation, township, township fire district, joint fire district, other political subdivision, or combination of political subdivisions;
      (3)   A member of a private fire company, as defined in R.C. § 9.60, or a volunteer firefighter;
      (4)    A member of a joint ambulance district or joint emergency medical services district;
      (5)   An emergency medical technician-basic, emergency medical technician-intermediate, emergency medical technician-paramedic, ambulance operator, or other member of an emergency medical service that is owned or operated by a political subdivision or a private entity;
      (6)   The State Fire Marshal, the Chief Deputy State Fire Marshal, or an assistant state fire marshal;
      (7)   A fire prevention officer of a political subdivision or an arson, fire, or similar investigator of a political subdivision.
   (bb)   FEDERALLY-LICENSED FIREARMS DEALER. Has the same meaning as in R.C. § 5502.63.
   (cc)   FIREARM. Has the same meaning as in R.C. § 2923.11.
   (dd)   FORGE. To fabricate or create, in whole or in part and by any means, any spurious writing, or to make, execute, alter, complete, reproduce, or otherwise purport to authenticate any writing, when the writing in fact is not authenticated by that conduct.
   (ee)   GAIN ACCESS. To approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or computer network, or any cable service or cable system both as defined in R.C. § 2913.04.
   (ff)   INFORMATION SERVICE.
      (1)   Subject to division (2) of this definition, the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing, or making available information via telecommunications, including but not limited to electronic publishing.
      (2)   The term does not include any use of a capability of a type described in division (1) of this definition for the management, control, or operation of a telecommunications system or the management of a telecommunications service.
   (gg)   INTERNET. Has the same meaning as in R.C. § 341.42.
   (hh)   MOTOR VEHICLE. Has the same meaning as in R.C. § 4501.01.
   (ii)   OCCUPIED STRUCTURE. Means any house, building, outbuilding, watercraft, aircraft, railroad car, truck, trailer, tent, or other structure, vehicle, or shelter, or any portion thereof, to which any of the following applies:
      (1)   It is maintained as a permanent or temporary dwelling, even though it is temporarily unoccupied and whether nor not any person is actually present;
      (2)   At the time, it is occupied as the permanent or temporary habitation of any person, whether or not any person is actually present;
      (3)   At the time, it is specially adapted for the overnight accommodation of any person, whether or not any person is actually present;
      (4)   At the time, any person is present or likely to be present in it.
   (jj)   OWNER. Unless the context requires a different meaning, any person, other than the actor, who is the owner of, who has possession or control of, or who has any license or interest in property or services, even though the ownership, possession, control, license, or interest is unlawful.
   (kk)   POLICE DOG OR HORSE. Has the same meaning as in R.C. § 2921.321.
   (ll)   POLITICAL SUBDIVISION. Has the same meaning as in R.C. § 2744.01.
   (mm)   RENTED PROPERTY. Personal property in which the right of possession and use of the property is for a short and possibly indeterminate term in return for consideration; the rentee generally controls the duration of possession of the property within any applicable minimum or maximum term; and the amount of consideration is generally determined by the duration of possession of the property.
   (nn)   SERVICES. Includes labor, personal services, professional services, rental services, public utility services including wireless service as defined in R.C. § 128.01(F)(1), common carrier services, and food, drink, transportation, entertainment, and cable television services and, for purposes of R.C. § 2913.04 or any substantially equivalent municipal ordinance, includes cable services as defined in that section.
   (oo)   SLUG. An object that, by virtue of its size, shape, composition, or other quality, is capable of being inserted or deposited in a coin machine as an improper substitute for a genuine coin, bill, or token made for that purpose.
   (pp)   STATE. Has the same meaning as in R.C. § 2744.01.
   (qq)   TELECOMMUNICATION. The origination, emission, dissemination, transmission, or reception of data, images, signals, sounds, or other intelligence or equivalence or intelligence of any nature over any communications system by any method, including but not limited to a fiber optic, electronic, magnetic, optical, digital or analog method.
   (rr)   TELECOMMUNICATIONS DEVICE. Any instrument, equipment, machine, or other device that facilitates telecommunication, including but not limited to a computer, computer network, computer chip, computer circuit, scanner, telephone, cellular telephone, pager, personal communications device, transponder, receiver, radio, modem, or device that enables the use of a modem.
   (ss)   TELECOMMUNICATIONS SERVICE. The providing, allowing, facilitating, or generating of any form of telecommunication through the use of a telecommunications device over a telecommunications system.
   (tt)   THEFT OFFENSE. Any of the following:
      (1)   A violation of R.C. § 2911.01, 2911.02, 2911.11, 2911.12, 2911.13, 2911.31, 2911.32, 2913.02, 2913.03, 2913.04, 2913.041, 2913.11, 2913.21, 2913.31, 2913.32, 2913.33, 2913.34, 2913.40, 2913.42, 2913.43, 2913.44, 2913.45, 2913.47, 2913.48, former R.C. § 2913.47 or 2913.48, or R.C. § 2913.51, 2915.05, or 2921.41;
      (2)   A violation of an existing or former municipal ordinance or law of this or any other state or of the United States substantially equivalent to any section listed in division (1) of this definition, or a violation of R.C. § 2913.41, 2913.81 or 2915.06 as it existed prior to July 1, 1996;
      (3)   An offense under an existing or former municipal ordinance or law of this or any other state or the United States involving robbery, burglary, breaking and entering, theft, embezzlement, wrongful conversion, forgery, counterfeiting, deceit, or fraud;
      (4)   A conspiracy to commit, attempt to commit, or complicity in committing any offense under division (1), (2), or (3) of this definition.
   (uu)   UTTER. To issue, publish, transfer, use, put or send into circulation, deliver, or display.
   (vv)   WRITING. Any computer software, document, letter, memorandum, note, paper, plate, data, film, or other thing having in or upon it any written, type-written, or printed matter, and any token, stamp, seal, credit card, badge, trademark, label, or other symbol of value, right, privilege, license, or identification.
(ORC 2909.01, 2913.01)
§ 642.02 THEFT.
   (a)   No person, with purpose to deprive the owner of property or services, shall knowingly obtain or exert control over either the property or services in any of the following ways:
      (1)   Without the consent of the owner or person authorized to give consent;
      (2)   Beyond the scope of the express or implied consent of the owner or person authorized to give consent;
      (3)   By deception;
      (4)   By threat;
      (5)   By intimidation.
   (b)   Whoever violates this section is guilty of theft. Except as otherwise provided in this division, a violation of this section is misdemeanor theft, a misdemeanor of the first degree. If any of the following criteria are met, then a violation of this section is a felony to be prosecuted under appropriate state law:
      (1)   If the value of the property or services is $1,000 or more;
      (2)   If the property stolen is any of the property listed in R.C. § 2913.71;
      (3)   If the victim of the offense is an elderly person, disabled adult, active duty service member, or spouse of an active duty service member;
      (4)   If the property stolen is a firearm or dangerous ordnance;
      (5)   If the property stolen is a motor vehicle;
      (6)   If the property stolen is any dangerous drug, or if the offender previously has been convicted of a felony drug abuse offense;
      (7)   If the property stolen is a police dog or horse or an assistance dog and the offender knows or should know that the property stolen is a police dog or horse or an assistance dog;
      (8)   If the property stolen is anhydrous ammonia; or
      (9)   If the property stolen is a special purchase article as defined in R.C. § 4737.04 or is a bulk merchandise container as defined in R.C. § 4737.012.
   (c)   In addition to the penalties described in division (b) of this section, if the offender committed the violation by causing a motor vehicle to leave the premises of an establishment at which gasoline is offered for retail sale without the offender making full payment for gasoline that was dispensed into the fuel tank of the motor vehicle or into another container, the court may do one of the following:
      (1)   Unless division (c)(2) of this section applies, suspend for not more than six months the offender’s driver’s license, probationary driver’s license, commercial driver’s license, temporary instruction permit or nonresident operating privilege;
      (2)   If the offender’s driver’s license, probationary driver’s license, commercial driver’s license, temporary instruction permit or nonresident operating privilege has previously been suspended pursuant to division (c)(1) of this section, or any other substantially equivalent state or local law, impose a class seven suspension of the offender’s license, permit or privilege from the range specified in R.C. § 4510.02(A)(7), provided that the suspension shall be at least six months;
      (3)   The court, in lieu of suspending the offender’s driver’s or commercial driver’s license, probationary driver’s license, temporary instruction permit, or nonresident operating privilege pursuant to division (c)(1) or (c)(2) of this section, instead may require the offender to perform community service for a number of hours determined by the court.
   (d)   In addition to the penalties described in division (b) of this section, if the offender committed the violation by stealing rented property or rental services, the court may order that the offender make restitution pursuant to R.C. § 2929.18 or 2929.28. Restitution may include, but is not limited to, the cost of repairing or replacing the stolen property, or the cost of repairing the stolen property and any loss of revenue resulting from deprivation of the property due to theft of rental services that is less than or equal to the actual value of the property at the time it was rented. Evidence of intent to commit theft of rented property or rental services shall be determined pursuant to the provisions of R.C. § 2913.72.
   (e)   The sentencing court that suspends an offender’s license, permit, or nonresident operating privilege under division (c) of this section may grant the offender limited driving privileges during the period of the suspension in accordance with R.C. Chapter 4510.
(ORC 2913.02)
Statutory reference:
   Felony theft provisions, see Ohio R.C. 2913.02(B)
§ 642.03 DEGREE OF OFFENSE WHEN CERTAIN PROPERTY INVOLVED.
   Regardless of the value of the property involved, and regardless of whether the offender previously has been convicted of a theft offense, a violation of Section 642.02 or Section 642.22 is a felony to be prosecuted under appropriate State law if the property involved is any of the following:
   (a)   A credit card;
   (b)   A printed form for a check or other negotiable instrument, that on its face identifies the drawer or maker for whose use it is designed or identifies the account on which it is to be drawn, and that has not been executed by the drawer or maker or on which the amount is blank;
   (c)   A motor vehicle identification license plate as prescribed by R.C. § 4503.22, a temporary motor vehicle license registration as prescribed by R.C. § 4503.182, or any comparable temporary motor vehicle license registration as prescribed by the applicable law of another state or the United States;
   (d)   A blank form for a certificate of title or a manufacturer’s or importer’s certificate to a motor vehicle, as prescribed by Ohio R.C. 4505.07;
   (e)   A blank form for any license listed in Ohio R.C. 4507.01.
(R.C. § 2913.71)
§ 642.035 EVIDENCE OF THEFT OF RENTED PROPERTY.
   (a)   For the purpose of this section, the following definitions shall apply unless the context clearly indicates or requires a different meaning.
      (1)   RENTER. A person who owns rented property or rental services:
      (2)   RENTEE. A person who pays consideration to a renter for the use of rented property or rental services:
   (b)   Each of the following shall be considered evidence of intent to commit theft of rented property:
      (1)   At the time of entering into the rental contract, the rentee presented the renter with identification that was materially false, fictitious, or not current with respect to name, address, place of employment, or other relevant information.
      (2)   After receiving a notice demanding the return of the rented property as provided in division (c) of this section, the rentee neither returned the rented property nor made arrangements acceptable with the renter to return the rented property.
   (c)   To establish that a rentee has an intent to commit theft of rented property or rental services under division (b)(2) above, a renter may issue a notice to a rentee demanding the return of the rented property. The renter shall mail the notice by certified mail, return receipt requested, to the rentee at the address the rentee gave when the rental contract was executed, or to the rentee at the last address the rentee or the rentee’s agent furnished in writing to the renter.
   (d)   A demand for the return of the rented property is not a prerequisite for the prosecution of a rentee for theft of rented property or rental services. The evidence specified in division (b) above does not constitute the only evidence that may be considered as evidence of intent to commit theft of rented property or rental services.
(ORC 2913.72)
Loading...