Chapter
583
2006 -- H 6811
Enacted 07/14/06
A N A C T
RELATING
TO CRIMINAL OFFENSES
Introduced
By: Representatives Kennedy, Lewiss, San Bento, Costantino, and E
Coderre
Date
Introduced: January 17, 2006
It is enacted by the General Assembly as
follows:
SECTION 1. Title
11 of the General Laws entitled "Criminal Offenses" is hereby
amended by adding thereto the following chapter:
CHAPTER 52.2
SOFTWARE FRAUD
11-52.2-1.
Definitions. – As used in this chapter:
(1)
"Advertisement" means a communication, the purpose of which is the
promotion of a
commercial product or service, including a
communication on an internet website that is operated
for a commercial purpose.
(2)
"Computer software" means a sequence of instructions written in any
programming
language that is executed on a computer.
"Computer software" does not include computer
software that is a web page, or are data
components of web pages that are not executable
independently of the web page.
(3)
"Computer virus" means a computer program or other set of
instructions that is
designed to degrade the performance of or
disable a computer or computer network and is
designed to have the ability to replicate itself
on other computers or computer networks without
the authorization of the owners of those
computers or computer networks.
(4)
"Damage" means any significant impairment to the integrity or
availability of data,
computer software, a system, or information.
(5)
"Execute" means the performance of the functions or the carrying out
of the
instructions of the computer software.
(6)
"Intentionally deceptive" means any of the following:
(a) An
intentionally and materially false or fraudulent statement;
(b) A statement
or description that intentionally omits or misrepresents material
information in order to deceive an owner or
operator; and
(c) An
intentional and material failure to provide any notice to an owner or operator
regarding the installation or execution of
computer software in order to deceive the owner or
operator.
(7)
"Internet" means the global information system that is logically
linked together by a
globally unique address space based on the
internet protocol (IP), or it is subsequent extensions,
and that is able to support communications using
the transmission control protocol/internet
protocol (TCP/IP) suite, or its subsequent
extensions, or other IP-compatible protocols, and that
provides, uses, or makes accessible, either
publicly or privately, high level services layered on the
communications and related infrastructure
described in this subsection.
(8) "Owner
or operator" means the owner or lessee of a computer, or someone using
such
computer with the owner's or lessee's
authorization. "Owner or operator" does not include any
person who owns a computer before the first
retail sale of such computer.
(9)
"Person" means any individual, partnership, corporation, limited
liability company, or
other organization, or any combination thereof.
(10)
"Personally identifiable information" means any of the following with
respect to an
individual who is an owner or operator:
(a) First name or
first initial in combination with last name;
(b) A home or
other physical address including street name;
(c) An
electronic mail address;
(d) A credit or
debit card number, bank account number, or a password or access code
associated with a credit or debit card or bank
account;
(e) Social
security number, tax identification number, driver's license number, passport
number, or any other government-issued
identification number; and
(f) Any of the
following information in a form that personally identifies an owner or
operator:
(i) Account
balances;
(ii) Overdraft
history; and
(iii) Payment
history.
(11)
"Transmit" means to transfer, send, or make available computer
software, or any
component thereof, via the internet or any other
medium, including local area networks of
computers, other nonwire transmission, and disc
or other data storage device. "Transmit" does
not include any action by a person providing:
(a) The
internet connection, telephone connection, or other means of transmission
capability such as a compact disk or digital
video disk through which the software was made
available; or
(b) The storage
or hosting of the software program or a web page through which the
software was made available.
11-52.2-2.
Unlawful modification of computer settings. – It is unlawful for a
person
who is not an owner or operator to transmit
computer software to the owner or operator's
computer with actual knowledge or with conscious
avoidance of actual knowledge and to use
such software to do any of the following:
(1) Modify,
through intentionally deceptive means, settings that control any of the
following:
(a) The page
that appears when an owner or operator launches an internet browser or
similar computer software used to access and
navigate the internet;
(b) The default
provider or web proxy the owner or operator uses to access or search the
internet; and
(c) The owner or
operator's list of bookmarks used to access web pages;
(2) Collect,
through intentionally deceptive means, personally identifiable information:
(a) Through the
use of a keystroke-logging function that records all keystrokes made by
an owner or operator and transfers that
information from the computer to another person;
(b) In a manner
that correlates such information with data respecting all or substantially
all of the websites visited by an owner or
operator, other than websites operated by the person
collecting such information; and
(c) Described
in subsection (10)(d), (e), or (f)(i) or (ii) of section 11-52.2-1 by
extracting
the information from the owner or operator's
hard drive;
(3) Prevent,
through intentionally deceptive means, an owner or operator's reasonable
efforts to block the installation or execution
of, or to disable, computer software by causing the
software that the owner or operator has properly
removed or disabled automatically to reinstall or
reactive on the computer;
(4)
Intentionally misrepresent that the computer software will be uninstalled or
disabled
by an owner or operator's action; and
(5) Through
intentionally deceptive means, remove, disable, or render inoperative
security, antispyware, or antivirus computer
software installed on the computer.
11-52.2-3.
Unlawful control of a computer. – It is unlawful for a person who is
not an
owner or operator to transmit computer software
to the owner or operator's computer with actual
knowledge or with conscious avoidance of actual
knowledge and to use the software to do any of
the following:
(1) Take
control of the computer by:
(a) Accessing
or using the modem or internet service for such computer to cause damage
to the computer or cause an owner or operator to
incur financial charges for a service that is not
authorized by the owner or operator;
(b) Opening
multiple, sequential, stand-alone advertisements in the owner or operator's
internet browser without the authorization of an
owner or operator and that a reasonable computer
user cannot close without turning off the
computer or closing the internet browser;
(2) Modify any
of the following settings related to the computer's access to, or use of, the
internet:
(a) Settings
that protect information about the owner or operator in order to steal the
owner or operator's personally identifiable
information; and
(b) Security
settings in order to cause damage to a computer; and
(3) Prevent an
owner or operator's reasonable efforts to block the installation of, or to
disable, computer software by doing any of the
following:
(a) Presenting
the owner or operator with an option to decline installation of computer
software with knowledge that, when the option is
selected, the installation nevertheless proceeds;
and
(b) Falsely
representing that computer software has been disabled.
11-52.2-4.
Deceptive sale of software. – It is unlawful for a person who is not
an owner
or operator to do any of the following with
regard to the owner or operator's computer:
(1) Induce an
owner or operator to install a computer software component onto the
computer by intentionally misrepresenting the
extent to which installing the software is necessary
for security or privacy reasons or in order to
open, view, or play a particular type of content; and
(2) Deceptively
cause the execution on the computer of a computer software component
with the intent of causing an owner or operator
to use the component in a manner that violates
any other provision of this section.
11-52.2-5.
Exemptions. – Section 11-52.2-3 or 11-52.2-4 does not apply to any
monitoring of, or interaction with, a subscriber's
internet or other network connection or service,
or a computer, by a telecommunications carrier,
cable operator, computer hardware or software
provider, or provider of information service or
interactive computer service for network or
computer security purposes, diagnostics,
technical support, maintenance, repair, authorized
updates of software or system firmware,
authorized remote system management, or detection or
prevention of the unauthorized use of a fraudulent
or other illegal activities in connection with a
network, service, or computer software,
including scanning for and removing software under this
chapter.
11-52.2-6.
Civil action. – (1) A person who is injured under this chapter may
bring a
civil action in the superior court to enjoin
further violations, or to seek up to one thousand dollars
($1,000) per violation, or actual damages,
whichever is greater. The injured individuals may
bring their cause of action as a class action.
Nothing in this section prohibits the attorney general
from bringing a class action suit under section
6-13.1-5.
(2) In an
action under subsection (1) of this section, a court may increase the damages
up
to three (3) times the damages allowed by
subsection (1) of this section if the defendant has
engaged in a pattern and practice of violating
this chapter. The court may also award costs and
reasonable attorneys' fees to the prevailing
party.
11-52.2-7.
Legislative intent. – It is the intent of the legislature that this
chapter is a
matter of statewide concern. This chapter
supersedes and preempts all rules, regulations, codes,
ordinances, and other laws adopted by a city,
county, city and county, municipality, or local
agency regarding spyware and notices to
consumers from computer software providers regarding
information collection.
11-52.2-8.
Severability. – If any one or more sections, clauses, sentences or
parts of this
chapter shall for any reason be adjudged
unconstitutional or otherwise invalid in any court, that
judgment shall not affect, impair or invalidate
the remaining provisions of this chapter but shall
be confined in its operation to the specific
provisions so held unconstitutional or invalid and the
inapplicability or invalidity of any section,
clause or provisions of this chapter in any one or more
instances or circumstances shall not be taken to
affect or prejudice in any way its applicability or
validity in any other instance.
SECTION 2. This act
shall take effect upon passage.
=======
LC00417
=======