Have a question?
Click here to chat with a criminal defense lawyer and protect your rights.

Terms Used In Texas Penal Code 33.01

  • Act: means a bodily movement, whether voluntary or involuntary, and includes speech. See Texas Penal Code 1.07
  • Actor: means a person whose criminal responsibility is in issue in a criminal action. See Texas Penal Code 1.07
  • Coercion: means a threat, however communicated:
    (A) to commit an offense;
    (B) to inflict bodily injury in the future on the person threatened or another;
    (C) to accuse a person of any offense;
    (D) to expose a person to hatred, contempt, or ridicule;
    (E) to harm the credit or business repute of any person; or
    (F) to take or withhold action as a public servant, or to cause a public servant to take or withhold action. See Texas Penal Code 1.07
  • Conduct: means an act or omission and its accompanying mental state. See Texas Penal Code 1.07
  • Consent: means assent in fact, whether express or apparent. See Texas Penal Code 1.07
  • Law: means the constitution or a statute of this state or of the United States, a written opinion of a court of record, a municipal ordinance, an order of a county commissioners court, or a rule authorized by and lawfully adopted under a statute. See Texas Penal Code 1.07
  • Owner: means a person who:
    (A) has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor; or
    (B) is a holder in due course of a negotiable instrument. See Texas Penal Code 1.07
  • Person: means an individual or a corporation, association, limited liability company, or other entity or organization governed by the Business Organizations Code. See Texas Penal Code 1.07
  • Personal property: All property that is not real property.
  • Possession: means actual care, custody, control, or management. See Texas Penal Code 1.07
  • Property: means real and personal property. See Texas Government Code 311.005

In this chapter:
(1) “Access” means to approach, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a computer, computer network, computer program, or computer system.
(2) “Aggregate amount” means the amount of:
(A) any direct or indirect loss incurred by a victim, including the value of money, property, or service stolen, appropriated, or rendered unrecoverable by the offense; or
(B) any expenditure required by the victim to:
(i) determine whether data or a computer, computer network, computer program, or computer system was altered, acquired, appropriated, damaged, deleted, or disrupted by the offense; or
(ii) attempt to restore, recover, or replace any data altered, acquired, appropriated, damaged, deleted, or disrupted.
(3) “Communication common carrier” means a person who owns or operates a telephone system in this state that includes equipment or facilities for the conveyance, transmission, or reception of communications and who receives compensation from persons who use that system.
(4) “Computer” means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device that performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses and includes all input, output, processing, storage, or communication facilities that are connected or related to the device.
(5) “Computer network” means the interconnection of two or more computers or computer systems by satellite, microwave, line, or other communication medium with the capability to transmit information among the computers.
(6) “Computer program” means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data or perform specific functions.
(7) “Computer services” means the product of the use of a computer, the information stored in the computer, or the personnel supporting the computer, including computer time, data processing, and storage functions.
(8) “Computer system” means any combination of a computer or computer network with the documentation, computer software, or physical facilities supporting the computer or computer network.
(9) “Computer software” means a set of computer programs, procedures, and associated documentation related to the operation of a computer, computer system, or computer network.
(10) “Computer virus” means an unwanted computer program or other set of instructions inserted into a computer’s memory, operating system, or program that is specifically constructed with the ability to replicate itself or to affect the other programs or files in the computer by attaching a copy of the unwanted program or other set of instructions to one or more computer programs or files.
(10-a) “Critical infrastructure facility” means:
(A) a chemical manufacturing facility;
(B) a refinery;
(C) an electrical power generating facility, substation, switching station, electrical control center, or electrical transmission or distribution facility;
(D) a water intake structure, water treatment facility, wastewater treatment plant, or pump station;
(E) a natural gas transmission compressor station;
(F) a liquid natural gas terminal or storage facility;
(G) a telecommunications central switching office;
(H) a port, railroad switching yard, trucking terminal, or other freight transportation facility;
(I) a gas processing plant, including a plant used in the processing, treatment, or fractionation of natural gas;
(J) a transmission facility used by a federally licensed radio or television station; or
(K) a cable television or video service provider headend.
(11) “Data” means a representation of information, knowledge, facts, concepts, or instructions that is being prepared or has been prepared in a formalized manner and is intended to be stored or processed, is being stored or processed, or has been stored or processed in a computer. Data may be embodied in any form, including but not limited to computer printouts, magnetic storage media, laser storage media, and punchcards, or may be stored internally in the memory of the computer.
(11-a) “Decryption,” “decrypt,” or “decrypted” means the decoding of encrypted communications or information, whether by use of a decryption key, by breaking an encryption formula or algorithm, or by the interference with a person’s use of an encryption service in a manner that causes information or communications to be stored or transmitted without encryption.
(12) “Effective consent” includes consent by a person legally authorized to act for the owner. Consent is not effective if:
(A) induced by deception, as defined by § 31.01, or induced by coercion;
(B) given by a person the actor knows is not legally authorized to act for the owner;
(C) given by a person who by reason of youth, mental disease or defect, or intoxication is known by the actor to be unable to make reasonable property dispositions;
(D) given solely to detect the commission of an offense; or
(E) used for a purpose other than that for which the consent was given.
(13) “Electric utility” has the meaning assigned by § 31.002, Utilities Code.
(13-a) “Encrypted private information” means encrypted data, documents, wire or electronic communications, or other information stored on a computer or computer system, whether in the possession of the owner or a provider of an electronic communications service or a remote computing service, and which has not been accessible to the public.
(13-b) “Encryption,” “encrypt,” or “encrypted” means the encoding of data, documents, wire or electronic communications, or other information, using mathematical formulas or algorithms in order to preserve the confidentiality, integrity, or authenticity of, and prevent unauthorized access to, such information.
(13-c) “Encryption service” means a computing service, a computer device, computer software, or technology with encryption capabilities, and includes any subsequent version of or update to an encryption service.
(14) “Harm” includes partial or total alteration, damage, or erasure of stored data, interruption of computer services, introduction of a computer virus, or any other loss, disadvantage, or injury that might reasonably be suffered as a result of the actor’s conduct.
(14-a) “Identifying information” has the meaning assigned by § 32.51.
(15) “Owner” means a person who:
(A) has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor;
(B) has the right to restrict access to the property; or
(C) is the licensee of data or computer software.
(15-a) “Privileged information” means:
(A) protected health information, as that term is defined by § 182.002, Health and Safety Code;
(B) information that is subject to the attorney-client privilege; or
(C) information that is subject to accountant-client confidentiality under § 901.457, Occupations Code, or other law, if the information is on a computer, computer network, or computer system owned by a person possessing a license issued under Subchapter H, Chapter 901, Occupations Code.
(16) “Property” means:
(A) tangible or intangible personal property including a computer, computer system, computer network, computer software, or data; or
(B) the use of a computer, computer system, computer network, computer software, or data.