Sec. 2. A person who is not the owner or operator of the computer may not knowingly or intentionally:

(1) transmit computer software to the computer; and

Have a question?
Click here to chat with a criminal defense lawyer and protect your rights.

(2) by means of the computer software transmitted under subdivision (1), do any of the following:

(A) Use intentionally deceptive means to modify computer settings that control:

(i) the page that appears when an owner or operator opens an Internet browser or similar computer software used to access and navigate the Internet;

(ii) the Internet service provider, search engine, or web proxy that an owner or operator uses to access or search the Internet; or

(iii) the owner or operator’s list of bookmarks used to access web pages.

(B) Use intentionally deceptive means to collect personally identifying information:

(i) through the use of computer software that records a keystroke made by an owner or operator and transfers that information from the computer to another person; or

(ii) in a manner that correlates the personally identifying information with data respecting all or substantially all of the web sites visited by the owner or operator of the computer, not including a web site operated by the person collecting the personally identifying information.

(C) Extract from the hard drive of an owner or operator’s computer:

(i) a credit card number, debit card number, bank account number, or any password or access code associated with these numbers;

(ii) a Social Security number, tax identification number, driver’s license number, passport number, or any other government issued identification number; or

(iii) the account balance or overdraft history of a person in a form that identifies the person.

(D) Use intentionally deceptive means to prevent reasonable efforts by an owner or operator to block or disable the installation or execution of computer software.

(E) Knowingly or intentionally misrepresent that computer software will be uninstalled or disabled by an owner or operator’s action.

(F) Use intentionally deceptive means to remove, disable, or otherwise make inoperative security, antispyware, or antivirus computer software installed on the computer.

(G) Take control of another person’s computer with the intent to cause damage to the computer or cause the owner or operator to incur a financial charge for a service that the owner or operator has not authorized by:

(i) accessing or using the computer’s modem or Internet service; or

(ii) without the authorization of the owner or operator, opening multiple, sequential, standalone advertisements in the owner or operator’s Internet browser that a reasonable computer user cannot close without turning off the computer or closing the browser.

(H) Modify:

(i) computer settings that protect information about a person with the intent of obtaining personally identifying information without the permission of the owner or operator; or

(ii) security settings with the intent to cause damage to a computer.

(I) Prevent reasonable efforts by an owner or operator to block or disable the installation or execution of computer software by:

(i) presenting an owner or operator with an option to decline installation of computer software knowing that the computer software will be installed even if the owner or operator attempts to decline installation; or

(ii) falsely representing that computer software has been disabled.

As added by P.L.115-2005, SEC.1.