80R3733 CLG-D
 
  By: Zaffirini S.B. No. 1009
 
 
 
   
 
 
A BILL TO BE ENTITLED
AN ACT
relating to the installation, copying, or use of certain computer
software for unauthorized purposes.
       BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
       SECTION 1.  Section 48.002, Business & Commerce Code, as
added by Chapter 298, Acts of the 79th Legislature, Regular
Session, 2005, is amended by adding Subdivisions (1-a) and (1-b) to
read as follows:
             (1-a) "Bot" means computer software that operates as an
agent for a user or another computer program or simulates a human
activity.
             (1-b) "Botnet" means a number of computers that,
without the knowledge of the computers' owners or operators, have
been compromised to:
                   (A)  run a computer program under a command and
control infrastructure; or
                   (B) forward a transmission, including an
unsolicited electronic mail message or virus, to other computers on
the Internet.
       SECTION 2.  Section 48.054, Business & Commerce Code, as
added by Chapter 298, Acts of the 79th Legislature, Regular
Session, 2005, is amended to read as follows:
       Sec. 48.054.  KNOWING VIOLATION. A person knowingly
violates Section 48.051, 48.052, [or] 48.053, or 48.055(b) if the
person:
             (1)  acts with actual knowledge of the facts that
constitute the violation; or
             (2)  consciously avoids information that would
establish actual knowledge of those facts.
       SECTION 3.  Section 48.055, Business & Commerce Code, as
added by Chapter 298, Acts of the 79th Legislature, Regular
Session, 2005, is amended to read as follows:
       Sec. 48.055.  OTHER PROHIBITED CONDUCT. (a) If a person is
not the owner or operator of the computer, the person may not:
             (1)  induce the owner or operator of a computer in this
state to install a computer software component to the computer by
intentionally misrepresenting the extent to which the installation
is necessary for security or privacy reasons, to open or view text,
or to play a particular type of musical or other content; or
             (2)  copy and execute or cause the copying and
execution of a computer software component to a computer in this
state in a deceptive manner with the intent of causing the owner or
operator of the computer to use the component in a manner that
violates this chapter.
       (b)  If a person is not the owner or operator of the computer,
the person may not knowingly cause a bot to be copied to a computer
in this state and, without the owner's or operator's knowledge, use
the bot:
             (1)  to become part of a botnet;
             (2)  to send an unsolicited commercial electronic mail
message, as defined by Section 46.001;
             (3)  for an attack:
                   (A)  on a computer system or network that causes a
loss of service to users; or
                   (B)  against an Internet Relay Chat network;
             (4)  to artificially add increments to a click counter
by automatically clicking on an advertisement on an Internet
website;
             (5)  to forward computer software designed to damage or
disrupt a system;
             (6)  to collect personally identifiable information;
             (7)  to manipulate online polls or games; or
             (8)  for another purpose not authorized by the owner or
operator of the computer.
       SECTION 4.  This Act takes effect September 1, 2007.