Bill Text: WV HB2308 | 2011 | Regular Session | Introduced
Bill Title: Protecting computer owners and users from computer spyware
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Introduced - Dead) 2011-01-12 - To House Judiciary [HB2308 Detail]
Download: West_Virginia-2011-HB2308-Introduced.html
(By Delegate Iaquinta)
[Introduced January 12, 2011 ; referred to the
Committee on the Judiciary.]
A Bill to amend and reenact §61-3C-3 and §61-3C-16 of the Code of West Virginia, 1931, as amended; and to amend said code by adding thereto four new sections, designated §61-3C-4a, §61- 3C-4b, §61-3C-4c and §61-3C-4d, all relating to protecting computer owners and users from computer spyware; making it unlawful for persons to transmit computer software for the purpose of modifying settings, collecting personal information by deceptive means or preventing efforts to protect a computer to access a computer; making it unlawful to transmit software to control in such a way as to cause damage or opening multiple pop-up windows; making it unlawful to transmit software for the purpose of modifying settings that protect personal information; making it unlawful to transmit software for the purpose of blocking efforts to block or disable computer software; making it unlawful to induce the installation by misrepresentations or deception; exceptions; and authorizing the Attorney General to enforce this act.
Be it enacted by the Legislature of West Virginia:
That §61-3C-3 and §61-3C-16 of the Code of West Virginia, 1931, as amended, be amended and reenacted; and that said code be amended by adding thereto four new sections, designated §61-3C-4a, §61-3C-4b, §61-3C-4c and §61-3C-4d, all to read as follows:
ARTICLE 3C. WEST VIRGINIA COMPUTER CRIME AND ABUSE ACT.
§61-3C-3. Definitions.
As used in this article, unless the context clearly indicates otherwise:
(a) "Access" means to instruct, communicate with, store data in, retrieve data from, intercept data from or otherwise make use of
(b) "Advertisement" means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including a communication on an Internet web site that is operated for a commercial purpose.
(n) "Damage" means significant impairment to the integrity or availability of data, computer software, a system or information.
(o) "Execute" means the performance of the functions or the carrying out of the instructions of the computer software.
(p) "Financial instrument" includes, but is not limited to, a check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security or its computerized representation.
(q) "Intentionally deceptive" means any of the following:
(1) An intentionally and materially false or fraudulent statement;
(2) A statement or description that intentionally omits or misrepresents material information in order to deceive an owner or operator; and
(3) An intentional and material failure to provide any notice to an owner or operator regarding the installation or execution of computer software in order to deceive the owner or operator.
(r) "Internet" means the global information system that is logically linked together by a globally unique address space based on the Internet protocol (IP), or its subsequent extensions, and that is able to support communications using the transmission control protocol/Internet protocol (TCP/IP) suite, or its subsequent extensions, or other IP-compatible protocols, and that provides, uses, or makes accessible, either publicly or privately, high level services layered on the communications and related infrastructure described in this subsection.
(u) "Personally identifiable information" means any of the following with respect to an individual who is an owner or operator:
(1) First name or first initial in combination with last name;
(2) A home or other physical address including street name;
(3) An electronic mail address;
(4) A credit or debit card number, bank account number or a password or access code associated with a credit or debit card or bank account;
(5) Social security number, tax identification number, driver's license number, passport number, or any other government- issued identification number; and
(6) Any of the following information in a form that personally identifies an owner or operator:
(i) Account balances;
(ii) Overdraft history; and
(iii) Payment history.
(1) Real property;
(2) Computers and computer networks;
(3) Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are:
(i) Tangible or intangible;
(ii) In a format readable by humans or by a computer;
(iii) In transit between computers or within a computer network or between any devices which comprise a computer; or
(iv) Located on
(4) Computer services.
(w) "Transmit" means to transfer, send, or make available computer software, or a component thereof, via the Internet or other medium, including local area networks of computers, other nonwire transmission and disc or other data storage device. "Transmit" does not include any action by a person providing:
(1) The Internet connection, telephone connection or other means of transmission capability such as a compact disk or digital video disk through which the software was made available;
(2) The storage or hosting of the software program or a web page through which the software was made available; or
(3) An information location tool, such as a directory, index reference, pointer, or hypertext link through which the user of the computer located the software unless the person receives a direct economic benefit from the execution of the software on the computer.
(1) The market value of the property or computer services at the time of a violation of this article; or
(2) If the property or computer services are unrecoverable, damaged or destroyed as a result of a violation of section six or seven of this article, the cost of reproducing or replacing the property or computer services at the time of the violation.
§61-3C-4a. Unlawful transmission of computer software to modify settings; collection of personal information by deceptive means; prevention of efforts to protect a computer.
It is unlawful for a person who is not an owner or operator to transmit computer software to the owner or operator's computer with actual knowledge or with conscious avoidance of actual knowledge and to use the software to do any of the following:
(1) Modify, through intentionally deceptive means, settings that control any of the following:
(A) The page that appears when an owner or operator launches an Internet browser or similar computer software used to access and navigate the Internet;
(B) The default provider or web proxy the owner or operator uses to access or search the Internet; and
(C) The owner or operator's list of bookmarks used to access web pages;
(2) Collect, through intentionally deceptive means, personally identifiable information:
(A) Through the use of a keystroke-logging function that records all keystrokes made by an owner or operator and transfers that information from the computer to another person;
(B) In a manner that correlates the information with data respecting all or substantially all of the web sites visited by an owner or operator, other than web sites operated by the person collecting the information; and
(C) Described in section three, subdivision (u), paragraph (4), (5), or (6) of this article by extracting the information from the owner or operator's hard drive;
(3) Prevent, through intentionally deceptive means, an owner or operator's efforts to block the installation or execution of, or to disable, computer software by causing the software that the owner or operator has properly removed or disabled automatically to reinstall or reactivate on the computer;
(4) Intentionally misrepresent that computer software will be uninstalled or disabled by an owner or operator's action; or
(5) Through intentionally deceptive means, remove, disable or render inoperative security, anti-spyware or anti-virus computer software installed on the computer.
§61-3C-4b. Unlawful transmission of software to take control of a computer or by opening multiple pop-up windows; modifying computer setting to steal personal information or damage computer; preventing efforts to block or disable software.
It is unlawful for a person who is not an owner or operator to transmit computer software to the owner or operator's computer with actual knowledge or with conscious avoidance of actual knowledge and to use the software to do any of the following:
(1) Take control of the computer by:
(A) Accessing or using the modem or Internet service for the computer to cause damage to the computer or cause an owner or operator to incur financial charges for a service that is not authorized by the owner or operator;
(B) Opening multiple, sequential, stand-alone advertisements in the owner or operator's Internet browser without the authorization of an owner or operator and that a computer user cannot close without turning off the computer or closing the Internet browser;
(2) Modify any of the following settings related to the computer's access to, or use of, the Internet:
(A) Settings that protect information about the owner or operator in order to steal the owner or operator's personally identifiable information; and
(B) Security settings in order to cause damage to a computer; or
(3) Prevent an owner or operator's efforts to block the installation of, or to disable, computer software by doing any of the following:
(A) Presenting the owner or operator with an option to decline installation of computer software with knowledge that, when the option is selected, the installation nevertheless proceeds; and
(B) Falsely representing that computer software has been disabled.
§61-3C-4c. Unlawful inducement to install software or deceptively causing the execution of harmful software.
It is unlawful for a person who is not an owner or operator to do any of the following with regard to the owner or operator's computer:
(1) Induce an owner or operator to install a computer software component onto the computer by intentionally misrepresenting the extent to which installing the software is necessary for security or privacy reasons or in order to open, view, or play a particular type of content; or
(2) Deceptively cause the execution on the computer of a computer software component with the intent of causing the owner or operator to use the component in a manner that violates any other provision of this section.
§61-3C-4d. Exceptions.
Sections four-b and four-c of this article do not apply to any monitoring of, or interaction with, a subscriber's Internet or other network connection or service, or a computer, by a telecommunications carrier, cable operator, computer hardware or software provider, or provider of information service or interactive computer service for network or computer security purposes, diagnostics, technical support, maintenance, repair, authorized updates of software or system firmware, authorized remote system management, or detection or prevention of the use of or fraudulent or other illegal activities prohibited by this act in connection with a network, service, or computer software, including scanning for and removing software under this article.
§61-3C-16. Civil relief; damages.
(a) Any person whose property or person is injured by reason of a violation of
(1) Compensatory damages;
(2) Punitive damages; and
(3)
Without limiting the generality of the term, "damages"
(b) The Attorney General is authorized to receive and act on complaints and take action designed to obtain voluntary compliance with this article and to commence proceedings against a person who violates this article to enjoin further violations and to recover damages as provided in subsection (a) of this section.
NOTE: The purpose of this bill provides protection for computer owners and users from deceptive or otherwise unauthorized spyware including civil remedies and authorization for the Attorney General to receive and act on complaints of owners and users.
Strike-throughs indicate language that would be stricken from the present law and underscoring indicates new language that would be added.