|
|
A BILL TO BE ENTITLED
|
|
AN ACT
|
|
relating to the installation, copying, or use of certain computer |
|
software for unauthorized purposes. |
|
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
|
SECTION 1. Section 48.002, Business & Commerce Code, as |
|
added by Chapter 298, Acts of the 79th Legislature, Regular |
|
Session, 2005, is amended by adding Subdivisions (1-a) and (1-b) to |
|
read as follows: |
|
(1-a) "Bot" means computer software that operates as an |
|
agent for a user or another computer program or simulates a human |
|
activity. |
|
(1-b) "Botnet" means a number of computers that, |
|
without the knowledge of the computers' owners or operators, have |
|
been compromised to: |
|
(A) run a computer program under a command and |
|
control infrastructure; or |
|
(B) forward a transmission, including an |
|
unsolicited electronic mail message or virus, to other computers on |
|
the Internet. |
|
SECTION 2. Section 48.054, Business & Commerce Code, as |
|
added by Chapter 298, Acts of the 79th Legislature, Regular |
|
Session, 2005, is amended to read as follows: |
|
Sec. 48.054. KNOWING VIOLATION. A person knowingly |
|
violates Section 48.051, 48.052, [or] 48.053, or 48.055(b) if the |
|
person: |
|
(1) acts with actual knowledge of the facts that |
|
constitute the violation; or |
|
(2) consciously avoids information that would |
|
establish actual knowledge of those facts. |
|
SECTION 3. Section 48.055, Business & Commerce Code, as |
|
added by Chapter 298, Acts of the 79th Legislature, Regular |
|
Session, 2005, is amended to read as follows: |
|
Sec. 48.055. OTHER PROHIBITED CONDUCT. (a) If a person is |
|
not the owner or operator of the computer, the person may not: |
|
(1) induce the owner or operator of a computer in this |
|
state to install a computer software component to the computer by |
|
intentionally misrepresenting the extent to which the installation |
|
is necessary for security or privacy reasons, to open or view text, |
|
or to play a particular type of musical or other content; or |
|
(2) copy and execute or cause the copying and |
|
execution of a computer software component to a computer in this |
|
state in a deceptive manner with the intent of causing the owner or |
|
operator of the computer to use the component in a manner that |
|
violates this chapter. |
|
(b) If a person is not the owner or operator of the computer, |
|
the person may not knowingly cause a bot to be copied to a computer |
|
in this state and, without the owner's or operator's knowledge, use |
|
the bot: |
|
(1) to become part of a botnet; |
|
(2) to send an unsolicited commercial electronic mail |
|
message, as defined by Section 46.001; |
|
(3) for an attack: |
|
(A) on a computer system or network that causes a |
|
loss of service to users; or |
|
(B) against an Internet Relay Chat network; |
|
(4) to artificially add increments to a click counter |
|
by automatically clicking on an advertisement on an Internet |
|
website; |
|
(5) to forward computer software designed to damage or |
|
disrupt a system; |
|
(6) to collect personally identifiable information; |
|
(7) to manipulate online polls or games; or |
|
(8) for another purpose not authorized by the owner or |
|
operator of the computer. |
|
SECTION 4. This Act takes effect September 1, 2007. |