SENATE
HOUSE
JOINT
BILL STATUS
STATE LAW
REPORTS
EDUCATIONAL
CONTACT
home
home
Introduced Version House Bill 2008 History

   |  Email
Key: Green = existing Code. Red = new code to be enacted
H. B. 2008


          (By Delegate Iaquinta)
          [Introduced February 13, 2013; referred to the
          Committee on the Judiciary.]




A Bill to amend and reenact §61-3C-3 and §61-3C-16 of the Code of West Virginia, 1931, as amended; and to amend said code by adding thereto four new sections, designated §61-3C-4a, §61- 3C-4b, §61-3C-4c and §61-3C-4d, all relating to protecting computer owners and users from computer spyware; making it unlawful for persons to transmit computer software for the purpose of modifying settings, collecting personal information by deceptive means or preventing efforts to protect a computer to access a computer; making it unlawful to transmit software to control in such a way as to cause damage or opening multiple pop-up windows; making it unlawful to transmit software for the purpose of modifying settings that protect personal information; making it unlawful to transmit software for the purpose of blocking efforts to block or disable computer software; making it unlawful to induce the installation by misrepresentations or deception; exceptions; and authorizing the Attorney General to enforce this act.
Be it enacted by the Legislature of West Virginia:
     That §61-3C-3 and §61-3C-16 of the Code of West Virginia, 1931, as amended, be amended and reenacted; and that said code be amended by adding thereto four new sections, designated §61-3C-4a, §61-3C-4b, §61-3C-4c and §61-3C-4d, all to read as follows:
ARTICLE 3C. WEST VIRGINIA COMPUTER CRIME AND ABUSE ACT.
§61-3C-3. Definitions.
     As used in this article, unless the context clearly indicates otherwise:
     (a) "Access" means to instruct, communicate with, store data in, retrieve data from, intercept data from or otherwise make use of any a computer, computer network, computer program, computer software, computer data or other computer resources.
     (b) "Advertisement" means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including a communication on an Internet web site that is operated for a commercial purpose.
_____
(b) (c) "Authorization" means the express or implied consent given by a person to another to access or use said the person's computer, computer network, computer program, computer software, computer system, password, identifying code or personal identification number.
     (c) (d) "Computer" means an electronic, magnetic, optical, electrochemical or other high speed data processing device performing logical, arithmetic or storage functions and includes any data storage facility or communication facility directly related to or operating in conjunction with such the device. The term "computer" includes any connected or directly related device, equipment or facility which enables the computer to store, retrieve or communicate computer programs, computer data or the results of computer operations to or from a person, another computer or another device. but such The term "computer" does not include an automated typewriter or typesetter, a portable hand-held calculator or other similar device.
     (d) (e) "Computer contaminant" means any a set of computer instructions that are designed to damage or destroy information within a computer, computer system or computer network without the consent or permission of the owner of the information. They These include, but are not limited to, a group of computer instructions commonly called viruses or worms that are self-replicating or self- propagating and are designed to contaminate other computer programs or computer data, consume computer resources or damage or destroy the normal operation of the computer.
     (e)  (f) "Computer data" means any a representation of knowledge, facts, concepts, instruction or other information computed, classified, processed, transmitted, received, retrieved, originated, stored, manifested, measured, detected, recorded, reproduced, handled or utilized by a computer, computer network, computer program or computer software and may be in any medium, including, but not limited to, computer print-outs, microfilm, microfiche, magnetic storage media, optical storage media, punch paper tape or punch cards, or it may be stored internally in read- only memory or random access memory of a computer or any other peripheral device.
     (f) (g) "Computer network" means a set of connected devices and communication facilities, including more than one computer, with the capability to transmit computer data among them through such the communication facilities.
     (g) (h) "Computer operations" means arithmetic, logical, storage, display, monitoring or retrieval functions or any combination thereof and includes, but is not limited to, communication with, storage of data in or to, or retrieval of data from any device and the human manual manipulation of electronic magnetic impulses. A "computer operation" for a particular computer shall also mean also means any function for which that computer was designed.
     (h) (i) "Computer program" means an ordered set of computer data representing instructions or statements, in a form readable by a computer, which controls, directs or otherwise influences the functioning of a computer or computer network.
     (i) (j) "Computer software" means a set of computer programs, procedures and associated documentation concerned with computer data or with the operation of a computer, computer program or computer network sequence of instructions written in a programming language that is executed on a computer. "Computer software" does not include computer software that is a web page or data components of web pages that are not executable independently of the web page.
_____
(j) (k) "Computer services" means computer access time, computer data processing or computer data storage and the associated computer data processed or stored. in connection therewith.
     
(k) (l) "Computer supplies" means punch cards, paper tape, magnetic tape, magnetic disks or diskettes, optical disks or diskettes, disk or diskette packs, paper, microfilm and any other tangible input, output or storage medium used in connection with a computer, computer network, computer data, computer software or computer program.
     (l) (m) "Computer resources" includes, but is not limited to, information retrieval; computer data processing, transmission and storage; and any other functions performed, in whole or in part, by the use of a computer, computer network, computer software or computer program.
     (n) "Damage" means significant impairment to the integrity or availability of data, computer software, a system or information.
_____(o) "Execute" means the performance of the functions or the carrying out of the instructions of the computer software.
_____(p) "Financial instrument" includes, but is not limited to, a check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security or its computerized representation.
_____(q) "Intentionally deceptive" means any of the following:
_____(1) An intentionally and materially false or fraudulent statement;
_____(2) A statement or description that intentionally omits or misrepresents material information in order to deceive an owner or operator; and
_____(3) An intentional and material failure to provide any notice to an owner or operator regarding the installation or execution of computer software in order to deceive the owner or operator.
_____(r) "Internet" means the global information system that is logically linked together by a globally unique address space based on the Internet protocol (IP), or its subsequent extensions, and that is able to support communications using the transmission control protocol/Internet protocol (TCP/IP) suite, or its subsequent extensions, or other IP-compatible protocols, and that provides, uses, or makes accessible, either publicly or privately, high level services layered on the communications and related infrastructure described in this subsection.
_____
(m) (s) "Owner or Operator" means any person who owns or leases or is a licensee of a computer, computer network, computer data, computer program, computer software, computer resources or computer supplies the owner or lessee of a computer or someone using the computer with the owner's or lessee's authorization. "Owner or operator" does not include any person who owns a computer before the first retail sale of the computer.
_____
(n) (t) "Person" means any a natural person, general partnership, limited partnership, trust, association, corporation, joint venture or any a state, county or municipal government and any a subdivision, branch, department or agency thereof.
     (u) "Personally identifiable information" means any of the following with respect to an owner or operator:
_____(1) First name or first initial in combination with last name;
_____(2) A home or other physical address including street name;
_____(3) An electronic mail address;
_____(4) A credit or debit card number, bank account number or a password or access code associated with a credit or debit card or bank account;
_____(5) Social security number, tax identification number, driver's license number, passport number, or any other government- issued identification number; and
_____(6) Any of the following information in a form that personally identifies an owner or operator:
_____(i) Account balances;
_____(ii) Overdraft history; and
_____(iii) Payment history.
_____
(o) (v) "Property" includes:
     (1) Real property;
     (2) Computers and computer networks;
     (3) Financial instruments, computer data, computer programs, computer software and all other personal property regardless of whether they are:
     (i) Tangible or intangible;
     (ii) In a format readable by humans or by a computer;
     (iii) In transit between computers or within a computer network or between any devices which comprise a computer; or
     (iv) Located on any a paper or in any a device on which it is stored by a computer or by a human; and
     (4) Computer services.
     (w) "Transmit" means to transfer, send or make available computer software, or a component thereof, via the Internet or other medium, including local area networks of computers, other nonwire transmission and disc or other data storage device. "Transmit" does not include any action by a person that provides:
_____(1) The Internet connection, telephone connection or other means of transmission capability such as a compact disk or digital video disk through which the software was made available;
_____(2) The storage or hosting of the software program or a web page through which the software was made available; or
_____(3) An information location tool, such as a directory, index reference, pointer, or hypertext link through which the user of the computer located the software unless the person receives a direct economic benefit from the execution of the software on the computer.
_____
(p) (x) "Value" means having any potential to provide any a direct or indirect gain or advantage to any person.
     (q) "Financial instrument" includes, but is not limited to, any check, draft, warrant, money order, note, certificate of deposit, letter of credit, bill of exchange, credit or debit card, transaction authorization mechanism, marketable security or any computerized representation thereof.
     
(r) (y) "Value of property or computer services" shall be is:
     (1) The market value of the property or computer services at the time of a violation of this article; or
     (2) If the property or computer services are unrecoverable, damaged or destroyed as a result of a violation of section six or seven of this article, the cost of reproducing or replacing the property or computer services at the time of the violation.
§61-3C-4a. Unlawful transmission of computer software to modify ________settings; collection of personal information by __deceptive means; prevention of efforts to protect a __computer.
_____It is unlawful for a person who is not an owner or operator to transmit computer software to the owner or operator's computer with actual knowledge or with conscious avoidance of actual knowledge and to use the software to do any of the following:
_____(1) Modify, through intentionally deceptive means, settings that control any of the following:
_____(A) The page that appears when an owner or operator launches an Internet browser or similar computer software used to access and navigate the Internet;
_____(B) The default provider or web proxy the owner or operator uses to access or search the Internet; and
_____(C) The owner or operator's list of bookmarks used to access web pages;
_____(2) Collect, through intentionally deceptive means, personally identifiable information:
_____(A) Through the use of a keystroke-logging function that records all keystrokes made by an owner or operator and transfers that information from the computer to another person;
_____(B) In a manner that correlates the information with data respecting all or substantially all of the web sites visited by an owner or operator, other than web sites operated by the person collecting the information; and
_____(C) Described in paragraph (4),(5)or(6), subsection (u), section three of this article by extracting the information from the owner or operator's hard drive;
_____(3) Prevent, through intentionally deceptive means, an owner or operator's efforts to block the installation or execution of, or to disable, computer software by causing the software that the owner or operator has properly removed or disabled automatically to reinstall or reactivate on the computer;
_____(4) Intentionally misrepresent that computer software will be uninstalled or disabled by an owner or operator's action; or
_____(5) Through intentionally deceptive means, remove, disable or render inoperative security, antispyware or antivirus computer software installed on the computer.
§61-3C-4b. Unlawful transmission of software to take control of a __computer or by opening multiple pop-up windows; __modifying computer setting to steal personal __information or damage computer; preventing efforts __to block or disable software.
_____It is unlawful for a person who is not an owner or operator to transmit computer software to the owner or operator's computer with actual knowledge or with conscious avoidance of actual knowledge and to use the software to do any of the following:
_____(1) Take control of the computer by:
_____(A) Accessing or using the modem or Internet service for the computer to cause damage to the computer or cause an owner or operator to incur financial charges for a service that is not authorized by the owner or operator;
_____(B) Opening multiple, sequential, stand-alone advertisements in the owner or operator's Internet browser without the authorization of an owner or operator and that a computer user cannot close without turning off the computer or closing the Internet browser;
_____(2) Modify any of the following settings related to the computer's access to, or use of, the Internet:
_____(A) Settings that protect information about the owner or operator in order to steal the owner or operator's personally identifiable information; and
_____(B) Security settings in order to cause damage to a computer; or
_____(3) Prevent an owner or operator's efforts to block the installation of, or to disable, computer software by doing any of the following:
_____(A) Presenting the owner or operator with an option to decline installation of computer software with knowledge that, when the option is selected, the installation nevertheless proceeds; and
_____(B) Falsely representing that computer software has been disabled.
§61-3C-4c. Unlawful inducement to install software or deceptively __causing the execution of harmful software.
_____It is unlawful for a person who is not an owner or operator to do any of the following with regard to the owner or operator's computer:
_____(1) Induce an owner or operator to install a computer software component onto the computer by intentionally misrepresenting the extent to which installing the software is necessary for security or privacy reasons or in order to open, view, or play a particular type of content; or
_____(2) Deceptively cause the execution on the computer of a computer software component with the intent of causing the owner or operator to use the component in a manner that violates any other provision of this section.
§61-3C-4d. Exceptions.
_____Sections four-b and four-c of this article do not apply to any monitoring of, or interaction with, a subscriber's Internet or other network connection or service, or a computer, by a telecommunications carrier, cable operator, computer hardware or software provider, or provider of information service or interactive computer service for network or computer security purposes, diagnostics, technical support, maintenance, repair, authorized updates of software or system firmware, authorized remote system management, or detection or prevention of the use of or fraudulent or other illegal activities prohibited by this act in connection with a network, service, or computer software, including scanning for and removing software under this article.
§61-3C-16. Civil relief; damages.
     (a) Any person whose property or person is injured by reason of a violation of any provision of this article may sue therefor in circuit court and may be entitled to recover for each violation:
     (1) Compensatory damages;
     (2) Punitive damages; and
     (3) Such Other relief, including injunctive relief, as the court may deem appropriate.
     Without limiting the generality of the term, "damages" shall include includes loss of profits.
     (b) The Attorney General is authorized to receive and act on complaints and take action designed to obtain voluntary compliance with this article and to commence proceedings against a person who violates this article to enjoin further violations and to recover damages as provided in subsection (a) of this section.
_____
(b) (c) At the request of any party to an action brought pursuant to this section, the court may, in its discretion, conduct all legal proceedings in such a manner as to protect the secrecy and security of the computer network, computer data, computer program or computer software involved in order to prevent any possible recurrence of the same or a similar act by another person or to protect any a trade secret or confidential information of any a person. For the purposes of this section, "trade secret" means the whole or any portion or phase of any scientific or technological information, design, process, procedure or formula or improvement which is secret and of value. A trade secret shall be is presumed to be secret when the its owner thereof takes measures to prevent it from becoming available to persons other than those authorized by the owner to have access thereto for a limited purpose.
     (c) (d) The provisions of This section shall not be construed to does not limit any person's right to pursue any additional civil remedies otherwise allowed by law.
     (d) (e) A civil action under this section must be commenced before the earlier of: (1) Five years after the last act in the course of conduct constituting a violation of this article; or (2) two years after the plaintiff discovers or reasonably should have discovered the last act in the course of conduct constituting a violation of this article.



     NOTE: The purpose of this bill provides protection for computer owners and users from deceptive or otherwise unauthorized spyware including civil remedies and authorization for the Attorney General to receive and act on complaints of owners and users.

     Strike-throughs indicate language that would be stricken from the present law and underscoring indicates new language that would be added.

     NOTE: §61-3C-4a, §61-3C-4b, §61-3C-4c and §61-3C-4d, are new; therefore, they have been completely underscored.
This Web site is maintained by the West Virginia Legislature's Office of Reference & Information.  |  Terms of Use  |   Email WebmasterWebmaster   |   © 2024 West Virginia Legislature **


X

Print On Demand

Name:
Email:
Phone:

Print