Louisiana 2011 2011 Regular Session

Louisiana House Bill HB231 Introduced / Bill

                    HLS 11RS-387	ORIGINAL
Page 1 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
Regular Session, 2011
HOUSE BILL NO. 231
BY REPRESENTATIVE FOIL
Prefiled pursuant to Article III, Section 2(A)(4)(b)(i) of the Constitution of Louisiana.
CONSUMERS/PROTECTI ON:  Provides relative to stolen or misappropriated information
technology
AN ACT1
To amend and reenact R.S. 51:1427, relative to information technology; to provide for2
definitions; to provide for unfair acts involving stolen or misappropriated3
information technology; to provide for limitations on actions; to provide for claims4
against third parties; to provide for notice and an opportunity to cure; to provide for5
remedies; to authorize injunctions; to provide for damages; to provide for a stay of6
action; to authorize in rem jurisdiction; to establish affirmative defenses for third7
parties; to provide for a transition period; to provide for exclusive remedies; and to8
provide for related matters.9
Be it enacted by the Legislature of Louisiana:10
Section 1. R.S. 51:1427 is hereby amended and reenacted to read as follows: 11
ยง1427. Unfair or deceptive trade practices or acts; stolen or misappropriated12
computer software information technology; violations13
A. It shall be unlawful for a person to develop or manufacture a product, or14
to develop or supply a service using stolen or misappropriated property, including15
but not limited to computer software that does not have the necessary copyright16
licenses, where that product or service is sold or offered for sale in competition with17
those doing business in this state.18
As used in this Section, the following words, terms, and phrases have the19
meaning ascribed to them, unless the context clearly indicates a different meaning:20 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 2 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(1) "Article or product" means any tangible article or product, but excludes:1
(a) Any services sold, offered for sale, or made available in this state,2
including free services and online services.3
(b) Any product subject to regulation by the United States Food and Drug4
Administration and that is primarily used for medical or medicinal purposes.5
(c) Food and beverages.6
(d) Restaurant services.7
(2) "Copyrightable end product" means a work within the subject matter of8
copyright as specified by Section 102 of the United States Copyright Act.9
(3) "Essential component" means a component of an article or product10
provided or to be provided to a third party pursuant to a contract, including a11
purchase order, without which the article or product will not perform as intended and12
for which there is no substitute component available that offers a comparable range13
and quality of functionalities and is available in comparable quantities and at a14
comparable price.15
(4) "Manufacture" means to directly manufacture, produce, or assemble an16
article or product subject to Subsection B of this Section, in whole or substantial part,17
but does not include contracting with or otherwise engaging another person, or that18
person engaging another person, to develop, manufacture, produce, or assemble an19
article or product subject to Subsection B of this Section.20
(5) "Material competitive injury" means at least a three percent retail price21
difference between the article or product made in violation of Subsection B of this22
Section designed to harm competition and a directly competing article or product23
that was manufactured without the use of stolen or misappropriated information24
technology, with such a price difference occurring over a four-month period of time.25
(6) "Retail price" means the retail price of stolen or misappropriated26
information technology charged at the time of, and in the jurisdiction where, the27
alleged theft or misappropriation occurred, multiplied by the number of stolen or28 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 3 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
misappropriated items used in the business operations of the person alleged to have1
violated Subsection B of this Section.2
(7)(a) "Stolen or misappropriated information technology" means hardware3
or software that the person referred to in Subsection B of this Section acquired,4
appropriated, or used without the authorization of the owner of the information5
technology or the owner's authorized licensee in violation of applicable law, but shall6
not include situations in which the hardware or software alleged to have been stolen7
or misappropriated was not available for retail purchase on a stand-alone basis at or8
before the time it was acquired, appropriated, or used by such a person.9
(b) Information technology shall be considered to be used in a person's10
business operations if the person uses the technology in the manufacture,11
distribution, marketing, or sales of the articles or products subject to Subsection B12
of this Section.13
B.  Any violation of this Section shall be an unfair method of competition and14
unfair practice or act and shall subject the violator to any and all actions and15
penalties provided for in this Chapter.  For the purpose of this Section, a violation16
shall occur each time such a product or service is sold or offered for sale.17
Any person who manufactures an article or product while using stolen or18
misappropriated information technology in its business operations after notice and19
opportunity to cure as provided in Subsection E of this Section and, with respect to20
remedies sought under Paragraph (F)(6) or Subsection G of this Section, causes a21
material competitive injury as a result of such use of stolen or misappropriated22
information technology, shall be deemed to engage in an unfair act where such an23
article or product is sold or offered for sale in this state, either separately or as a24
component of another article or product, and in competition with an article or25
product sold or offered for sale in this state that was manufactured without violating26
this Subsection. A person who engages in such an unfair act, and any articles or27
products manufactured by the person in violation of this Subsection, shall be subject28
to the liabilities and remedial provisions of this Section in an action by the attorney29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 4 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
general or any person described in Paragraph (F)(5) of this Section, except as1
provided in Subsections C through I of this Section.2
C. No action shall be brought pursuant to this Section, and no liability3
results, where:4
(1) The end article or end product sold or offered for sale in this state and5
alleged to violate Subsection B of this Section is any of the following:6
(a) A copyrightable end product.7
(b) Merchandise manufactured by or on behalf of, or pursuant to a license8
from, a copyright owner and which displays or embodies a name, character, artwork,9
or other indicia of or from a work that falls within Subparagraph (a) of this10
Paragraph, or merchandise manufactured by or on behalf of, or pursuant to a license11
from, a copyright or trademark owner and that displays or embodies a name,12
character, artwork, or other indicia of or from a theme park, theme park attraction,13
or other facility associated with a theme park.14
(c) Packaging, carrier media, or promotional or advertising materials for any15
end article, end product, or merchandise that falls within Subparagraph (a) or (b) of16
this Paragraph.17
(2) The allegation that the information technology is stolen or18
misappropriated is based on a claim that the information technology or its use19
infringes a patent or misappropriates a trade secret under applicable law or that could20
be brought pursuant to any provision of Title 35 of the United States Code.21
(3) The allegation that the information technology is stolen or22
misappropriated is based on a claim that the defendant's use of the information23
technology violates the terms of a license that allows users to modify and redistribute24
any source code associated with the technology free of charge.25
(4) The allegation is based on a claim that the person violated Subsection B26
of this Section by aiding, abetting, facilitating, or assisting someone else to acquire,27
appropriate, use, sell, or offer to sell, or by providing someone else with access to,28 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 5 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
information technology without authorization of the owner of the information1
technology or the owner's authorized licensee in violation of applicable law.2
D. No injunction shall issue against a person other than the person3
adjudicated to have violated Subsection B of this Section, and no attachment order4
shall issue against articles or products other than articles or products in which the5
person alleged to violate Subsection B of this Section holds title.  A person other6
than the person alleged to violate Subsection B of this Section includes any person7
other than the actual manufacturer who contracts with or otherwise engages another8
person to develop, manufacture, produce, market, distribute, advertise, or assemble9
an article or product alleged to violate Subsection B of this Section.10
E.(1)  No action shall be brought pursuant to Subsection B of this Section11
unless the person subject to Subsection B of this Section received written notice of12
the alleged use of the stolen or misappropriated information technology from the13
owner or exclusive licensee of the information technology or the owner's agent and14
the person either failed to establish that its use of the information technology in15
question did not violate Subsection B of this Section or failed, within ninety days16
after receiving such a notice, to cease use of the owner's stolen or misappropriated17
information technology; however, if the person commences and thereafter proceeds18
diligently to replace the information technology with information technology whose19
use would not violate Subsection B of this Section, such a period shall be extended20
for an additional period of ninety days, not to exceed one hundred eighty days total.21
The information technology owner or the owner's agent may extend any period22
described in this Subsection.23
(2) To satisfy the requirements of this Subsection, written notice shall, under24
penalty of perjury, do the following:25
(a) Identify the stolen or misappropriated information technology.26
(b) Identify the lawful owner or exclusive licensee of the information27
technology.28 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 6 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(c) Identify the applicable law the person is alleged to be violating and state1
that the notifier has a reasonable belief that the person has acquired, appropriated,2
or used the information technology in question without authorization of the owner3
of the information technology or the owner's authorized licensee in violation of such4
applicable law.5
(d) To the extent known by the notifier, state the manner in which the6
information technology is being used by the defendant.7
(e) State the articles or products to which the information technology relates.8
(f) Specify the basis and the particular evidence upon which the notifier bases9
the allegation.10
(3) The written notification shall state, under penalty of perjury, that, after a11
reasonable and good faith investigation, the information in the notice is accurate12
based on the notifier's reasonable knowledge, information, and belief.13
F.(1) No earlier than ninety days after the provision of notice in accordance14
with Subsection E of this Section, the attorney general, or any person described in15
Paragraph (5) of this Subsection, may bring an action against any person that is16
subject to Subsection B of this Section:17
(a) To enjoin a violation of Subsection B of this Section, including by18
enjoining the person from selling or offering to sell in this state articles or products19
that are subject to Subsection B of this Section, except as provided in Paragraph (6)20
of this Subsection; however, such an injunction does not encompass articles or21
products to be provided to a third party that establishes that such a third party has22
satisfied one or more of the affirmative defenses set forth in Paragraph (H)(1) of this23
Section with respect to the manufacturer alleged to have violated Subsection B of24
this Section.25
(b) Only after a determination by the court that the person has violated26
Subsection B of this Section, to recover the greater of:27
(i) Actual damages, which may be imposed only against the person who28
violated Subsection B of this Section.29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 7 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(ii) Statutory damages of no more than the retail price of the stolen or1
misappropriated information technology, which may be imposed only against the2
person who violated Subsection B of this Section.3
(c) In the event the person alleged to have violated Subsection B of this4
Section has been subject to a final judgment or has entered into a final settlement,5
or any products manufactured by such a person and alleged to violate Subsection B6
of this Section have been the subject of an injunction or attachment order, in any7
federal or state court in this state or any other state, arising out of the same theft or8
misappropriation of information technology, the court shall dismiss the action.  If9
such a person is a defendant in an ongoing action, or any products manufactured by10
such a person and alleged to violate Subsection B of this Section are the subject of11
an ongoing injunction or attachment order, in any federal or state court in this state12
or any other state, arising out of the same theft or misappropriation of information13
technology, the court shall stay the action against such a person pending resolution14
of the other action.  In the event the other action results in a final judgment or final15
settlement, the court shall dismiss the action against the person.16
(2) After determination by the court that a person has violated Subsection B17
of this Section and entry of a judgment against the person for violating Subsection18
B of this Section, the attorney general, or a person described in Paragraph (5) of this19
Subsection, may add to the action a claim for actual damages against a third party20
who sells or offers to sell in this state products made by that person in violation of21
Subsection B of this Section, subject to the provisions of Subsection H of this22
Section; however, damages may be imposed against a third party only if:23
(a) The third party was provided a copy of a written notice sent to the person24
alleged to have violated Subsection B of this Section that satisfies the requirements25
of Subsection E of this Section at least ninety days prior to the entry of the judgment.26
(b) The person who violated Subsection B of this Section did not make an27
appearance or does not have sufficient attachable assets to satisfy a judgment against28
the person.29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 8 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(c) Such a person either manufactured the final product or produced a1
component equal to thirty percent or more of the value of the final product.2
(d) Such a person has a direct contractual relationship with the third party3
respecting the manufacture of the final product or component.4
(e) The third party has not been subject to a final judgment in any federal or5
state court in this state or any other state arising out of the same theft or6
misappropriation of information technology; however, in the event the third party is7
a party to an ongoing suit for damages, or has entered an appearance as an interested8
third party in proceedings in rem, in any federal or state court in this state or any9
other state arising out of the same theft or misappropriation of information10
technology, the court shall stay the action against the third party pending resolution11
of the other action. In the event the other action results in a final judgment, the court12
shall dismiss the action against the third party and any in rem action as to any articles13
or products manufactured for such a third party or that have been or are to be14
supplied to such a third party.15
(3) An award of damages against a third party pursuant to Paragraph (2) of16
this Subsection shall be the lesser of the retail price of the stolen or misappropriated17
information technology at issue or two hundred fifty thousand dollars, less any18
amounts recovered from the person adjudicated to have violated Subsection B of this19
Section, and Subparagraph (4)(a) of this Subsection shall not apply to such an award20
or recovery against the third party.21
(4) In an action pursuant to this Section, a court may:22
(a) Against the person adjudicated to have violated Subsection B of this23
Section, increase the damages up to three times the damages authorized by24
Subparagraph (1)(b) of this Subsection where the court finds that the person's use of25
the stolen or misappropriated information technology was willful.26
(b) With respect to an award pursuant to Paragraph (1) of this Subsection27
only, award costs and reasonable attorney fees to either of the following:28 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 9 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(i) A prevailing plaintiff in actions brought by an injured person pursuant to1
Subsection B of this Section.2
(ii) A prevailing defendant in actions brought by an allegedly injured person.3
(c) With respect to an action pursuant to Paragraph (2) of this Subsection4
brought by a private plaintiff only, award costs and reasonable attorney fees to a5
third party who qualifies for an affirmative defense pursuant to Subsection H of this6
Section; however, in a case in which the third party received a copy of the7
notification described in Subparagraph (2)(a) of this Subsection at least ninety days8
before the filing of the action pursuant to Paragraph (2) of this Subsection, with9
respect to a third party's reliance on the affirmative defenses set forth in10
Subparagraphs (H)(1)(c) and (d) of this Section, the court may award costs and11
reasonable attorney fees only if all of the conduct on which the affirmative defense12
is based was undertaken by the third party, and the third party notified the plaintiff13
of the conduct, prior to the end of the ninety-day period.14
(5) A person shall be deemed to have been injured by the sale or offer for sale15
of a directly competing article or product subject to Subsection B of this Section if16
the person establishes by a preponderance of the evidence that:17
(a) The person manufactures articles or products that are sold or offered for18
sale in this state in direct competition with articles or products that are subject to19
Subsection B of this Section.20
(b) The person's articles or products were not manufactured using stolen or21
misappropriated information technology of the owner of the information technology.22
(c) The person suffered economic harm, which may be shown by evidence23
that the retail price of the stolen or misappropriated information technology was24
twenty thousand dollars or more.25
(d) If the person is proceeding in rem or seeks injunctive relief, that the26
person suffered material competitive injury as a result of the violation of Subsection27
B of this Section.28 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 10 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(6)(a) If the court determines that a person found to have violated Subsection1
B of this Section lacks sufficient attachable assets in this state to satisfy a judgment2
rendered against it, the court may enjoin the sale or offering for sale in this state of3
any articles or products subject to Subsection B of this Section, except as provided4
in Subsection D of this Section.5
(b) To the extent that an article or product subject to Subsection B of this6
Section is an essential component of a third party's article or product, the court shall7
deny injunctive relief as to the essential component, provided that the third party has8
undertaken good faith efforts within the third party's rights under its applicable9
contract with the manufacturer to direct the manufacturer of the essential component10
to cease the theft or misappropriation of information technology in violation of11
Subsection B of this Section, which may be satisfied, without limitation, by the third12
party issuing a written directive to the manufacturer demanding that it cease the theft13
or misappropriation and demanding that the manufacturer provide the third party14
with copies of invoices, purchase orders, licenses, or other verification of lawful use15
of the information technology at issue.16
(7) The court shall determine whether a cure period longer than the period17
reflected in Subsection E of this Section would be reasonable given the nature of the18
use of the information technology that is the subject of the action and the time19
reasonably necessary either to bring such use into compliance with applicable law20
or to replace the information technology with information technology that would not21
violate Subsection B of this Section. If the court deems that a longer cure period22
would be reasonable, then the action shall be stayed until the end of that longer cure23
period. If by the end of that longer cure period, the defendant has established that24
its use of the information technology in question did not violate Subsection B of this25
Section, or the defendant ceased use of the stolen or misappropriated information26
technology, then the action shall be dismissed.27
G.(1) In a case in which the court is unable to obtain personal jurisdiction28
over a person subject to Subsection B of this Section, the court may proceed in rem29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 11 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
against any articles or products subject to Subsection B of this Section, sold or1
offered for sale in this state in which the person alleged to have violated Subsection2
B of this Section holds title. Except as provided in Subsection D of this Section and3
Paragraphs (2) through (4) of this Subsection, all such articles or products are subject4
to attachment at or after the time of filing a complaint, regardless of the availability5
or amount of any monetary judgment.6
(2) At least ninety days prior to the enforcement of an attachment order7
against articles or products pursuant to Paragraph (1) of this Subsection, the court8
shall notify any person in possession of the articles or products of the pending9
attachment order.  Prior to the expiration of the ninety-day period, any person for10
whom the articles or products were manufactured, or to whom the articles or11
products have been or are to be supplied, pursuant to an existing contract or purchase12
order, may do either of the following:13
(a) Establish that the person has satisfied one or more of the affirmative14
defenses set forth in Paragraph (H)(1) of this Section with respect to the15
manufacturer alleged to have violated Subsection B of this Section, in which case the16
attachment order shall be dissolved only with respect to those articles or products17
that were manufactured for such a person, or have been or are to be supplied to such18
a person, pursuant to an existing contract or purchase order.19
(b) Post a bond with the court equal to the retail price of the allegedly stolen20
or misappropriated information technology or twenty-five thousand dollars,21
whichever is less, in which case the court shall stay enforcement of the attachment22
order against the articles or products and shall proceed on the basis of its jurisdiction23
over the bond.  The person posting the bond shall recover the full amount of such24
bond, plus interest, after the issuance of a final judgment.25
(3) In the event the person posting the bond pursuant to Subparagraph (2)(b)26
of this Subsection is entitled to claim an affirmative defense in Subsection H of this27
Section, and that person establishes with the court that the person is entitled to any28
affirmative defense, the court shall award costs and reasonable attorney fees to the29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 12 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
person posting the bond and against the plaintiff in the event the plaintiff proceeds1
with an action pursuant to Paragraph (F)(2) of this Section against the person posting2
the bond.3
(4) In the event that the court does not provide notification as described in4
Paragraph (2) of this Subsection, the court, upon motion of any third party, shall stay5
the enforcement of the attachment order for ninety days as to articles or products6
manufactured for the third party, or that have been or are to be supplied to the third7
party, pursuant to an existing contract or purchase order, during which ninety-day8
period the third party may avail itself of the options set forth in Subparagraphs (2)(a)9
and (b) of this Subsection.10
H.(1)  A court shall not award damages against any third party pursuant to11
Paragraph (F)(2) of this Section where that party, after having been afforded12
reasonable notice of at least ninety days and opportunity to plead any of the13
affirmative defenses set forth in this Subsection, establishes by a preponderance of14
the evidence any of the following:15
(a) Such a person is the end consumer or end user of an article or product16
subject to Subsection B of this Section, or acquired the article or product after its sale17
to an end consumer or end user.18
(b) Such a person is a business with annual revenues not in excess of fifty19
million dollars.20
(c)(i) The person acquired the articles or products in good faith reliance on21
either a code of conduct or other written document that governs the person's22
commercial relationships with the manufacturer adjudicated to have violated23
Subsection B of this Section and which includes commitments, such as general24
commitments to comply with applicable laws, that prohibit use of the stolen or25
misappropriated information technology by the manufacturer or written assurances26
from the manufacturer of the articles or products that the articles or products, to the27
manufacturer's reasonable knowledge, were manufactured without the use of stolen28
or misappropriated information technology in the manufacturer's business29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 13 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
operations; however, within one hundred eighty days of receiving written notice of1
the judgment against the manufacturer for a violation of Subsection B of this Section2
and a copy of a written notice that satisfies the requirements of Subsection E of this3
Section, the person shall undertake commercially reasonable efforts to do any of the4
following:5
(aa) Exchange written correspondence confirming that the manufacturer is6
not using the stolen or misappropriated information technology in violation of7
Subsection B of this Section, which may be satisfied, without limitation, by8
obtaining written assurances from the manufacturer accompanied by copies of9
invoices, purchase orders, licenses, or other verification of lawful use of the10
information technology at issue.11
(bb) Direct the manufacturer to cease the theft or misappropriation, which12
may be satisfied, without limitation, by the third party issuing a written directive to13
the manufacturer demanding that it cease the theft or misappropriation and14
demanding that the manufacturer provide the third party with copies of invoices,15
purchase orders, licenses, or other verification of lawful use of the information16
technology at issue.17
(cc) In a case in which the manufacturer has failed to cease the theft or18
misappropriation within the one hundred eighty day period, and the third party has19
not fulfilled either good faith option listed in Item (c)(i) of this Paragraph, prevent20
the future acquisition of the articles or products from the manufacturer during the21
period that the manufacturer continues to engage in the theft or misappropriation22
subject to Subsection B of this Section where doing so would not constitute a breach23
of an agreement between the person and the manufacturer for the manufacture of the24
articles or products in question that was entered into on or before one hundred eighty25
days after the effective date of this Section.26
(ii) The person acquired the articles or products pursuant to an agreement27
between the person and a manufacturer for the manufacture of the articles or28
products in question that was entered into before one hundred eighty days after the29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 14 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
effective date of this Section; however, within one hundred eighty days of receiving1
written notice of the judgment against the manufacturer for a violation of Subsection2
B of this Section and a copy of a written notice that satisfies the requirements of3
Subsection E of this Section, the person shall undertake commercially reasonable4
efforts to do any of the following:5
(aa) Obtain from the manufacturer written assurances that the manufacturer6
is not using the stolen or misappropriated information technology in violation of7
Subsection B of this Section, which may be satisfied, without limitation, by8
obtaining written assurances from the manufacturer accompanied by copies of9
invoices, purchase orders, licenses, or other verification of lawful use of the10
information technology at issue.11
(bb) Direct the manufacturer to cease the theft or misappropriation, which12
may be satisfied, without limitation, by the third party issuing a written directive to13
the manufacturer demanding that it cease the theft or misappropriation and14
demanding that the manufacturer provide the third party with copies of invoices,15
purchase orders, licenses, or other verification of lawful use of the information16
technology at issue.17
(cc) In a case in which the manufacturer has failed to cease the theft or18
misappropriation within the one hundred eighty day period, and the third party has19
not fulfilled either Subitem (c)(ii)(aa) or (bb) of this Paragraph, cease the future20
acquisition of the articles or products from the manufacturer during the period that21
the manufacturer continues to engage in the theft or misappropriation subject to22
Subsection B of this Section where doing so would not constitute a breach of the23
agreement.24
(d) The person has made commercially reasonable efforts to implement25
practices and procedures to require its direct manufacturers, in manufacturing articles26
or products for such person, not to use stolen or misappropriated information27
technology in violation of Subsection B of this Section.  A person may satisfy this28
requirement by either:29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 15 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(i) Adopting and undertaking commercially reasonable efforts to implement1
a code of conduct or similar written requirements, which are applicable to the2
person's direct manufacturers, that prohibit the use of stolen or misappropriated3
information technology by the manufacturer, subject to a right of audit, and the4
person either:5
(aa) Has a practice of auditing its direct manufacturers on a periodic basis in6
accordance with generally accepted industry standards.7
(bb) Requires in its agreements with its direct manufacturers that they submit8
to audits by a third party, which may include a third-party association of businesses9
representing the owner of the stolen or misappropriated intellectual property, and10
further provides that a failure to remedy any deficiencies found in an audit that11
constitute a violation of the applicable law of the jurisdiction where the deficiency12
occurred constitutes a breach of the contract, subject to cure within a reasonable13
period of time.14
(ii) Adopting and undertaking commercially reasonable efforts to implement15
a code of conduct or similar written requirements, which are applicable to the16
person's direct manufacturers, that prohibit use of stolen or misappropriated17
information technology by the manufacturer, and the person undertakes practices and18
procedures to address compliance with the prohibition against the use of the stolen19
or misappropriated information technology in accordance with the applicable code20
of conduct or written requirements.21
(e) The person does not have a contractual relationship with the person22
alleged to have violated Subsection B of this Section respecting the manufacture of23
the articles or products alleged to have been manufactured in violation of Subsection24
B of this Section.25
(2) A third party shall have the opportunity to be heard regarding whether an26
article or product is an essential component provided or to be provided to a third27
party, and shall have the right to file a motion to dismiss any action brought against28
it pursuant to Paragraph (F)(2) of this Section.29 HLS 11RS-387	ORIGINAL
HB NO. 231
Page 16 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(3) The court shall not enforce any award for damages against a third party1
until after the court has ruled on that party's claim of eligibility for any of the2
affirmative defenses set out in this Section, and prior to such a ruling may allow3
discovery, in an action pursuant to Paragraph (F)(2) of this Section, only on the4
particular defenses raised by the third party.5
(4) The court shall allow discovery against a third party on an issue only after6
all discovery on that issue between the parties has been completed and only if the7
evidence produced as a result of the discovery does not resolve an issue of material8
dispute between the parties.9
(5) Any confidential or otherwise sensitive information submitted by a party10
pursuant to this Subsection shall be subject to a protective order.11
I. A court shall not enforce an award of damages against a third party12
pursuant to Paragraph (F)(2) of this Section for a period of eighteen months from the13
effective date of this Section.14
J. The remedies provided pursuant to this Section are the exclusive remedies15
for the parties.16
DIGEST
The digest printed below was prepared by House Legislative Services. It constitutes no part
of the legislative instrument. The keyword, one-liner, abstract, and digest do not constitute
part of the law or proof or indicia of legislative intent.  [R.S. 1:13(B) and 24:177(E)]
Foil	HB No. 231
Abstract: Prohibits the use of stolen or misappropriated information technology.
Present law provides that it shall be unlawful for a person to develop or manufacture a
product, or to develop or supply a service using stolen or misappropriated property,
including but not limited to computer software that does not have the necessary copyright
licenses, where that product or service is sold or offered for sale in competition with those
doing business in this state.
Proposed law repeals present law.
Proposed law defines "article or product" as any tangible article or product, but excludes:
(1)Any services sold, offered for sale, or made available in this state, including free
services and online services.
(2)Any product subject to regulation by the U.S. Food and Drug Administration and
that is primarily used for medical or medicinal purposes. HLS 11RS-387	ORIGINAL
HB NO. 231
Page 17 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(3)Food and beverages.
(4)Restaurant services.
Proposed law defines "copyrightable end product" as a work within the subject matter of
copyright as specified by Section 102 of the U.S. Copyright Act.
Proposed law defines "essential component" as a component of an article or product
provided or to be provided to a third party pursuant to a contract, including a purchase order,
without which the article or product will not perform as intended and for which there is no
substitute component available that offers a comparable range and quality of functionalities
and is available in comparable quantities and at a comparable price.
Proposed law provides that "manufacture" means to directly manufacture, produce, or
assemble an article or product subject to proposed law, in whole or substantial part, but does
not include contracting with or otherwise engaging another person, or that person engaging
another person, to develop, manufacture, produce, or assemble an article or product subject
to proposed law.
Proposed law defines "material competitive injury" as at least a 3% retail price difference
between the article or product made in violation of proposed law designed to harm
competition and a directly competing article or product that was manufactured without the
use of stolen or misappropriated information technology, with such a price difference
occurring over a four-month period of time.
Proposed law defines "retail price" as the retail price of stolen or misappropriated
information technology charged at the time of, and in the jurisdiction where, the alleged theft
or misappropriation occurred, multiplied by the number of stolen or misappropriated items
used in the business operations of the person alleged to have violated proposed law.
Proposed law defines "stolen or misappropriated information technology" as hardware or
software that the person referred to in proposed law acquired, appropriated, or used without
the authorization of the owner of the information technology or the owner's authorized
licensee in violation of applicable law, but shall not include situations in which the hardware
or software alleged to have been stolen or misappropriated was not available for retail
purchase on a stand-alone basis at or before the time it was acquired, appropriated, or used
by such a person.
Proposed law provides that information technology shall be considered to be used in a
person's business operations if the person uses the technology in the manufacture,
distribution, marketing, or sales of the articles or products subject to proposed law.
Present law provides that any violation of present law shall be an unfair method of
competition and unfair practice or act and shall subject the violator to any and all actions and
penalties provided for in present law. For the purpose of present law, a violation shall occur
each time such a product or service is sold or offered for sale.
Proposed law repeals present law.
Proposed law provides that any person who manufactures an article or product while using
stolen or misappropriated information technology in its business operations after notice and
opportunity to cure as provided in proposed law and, with respect to remedies sought under
proposed law, causes a material competitive injury as a result of such use of stolen or
misappropriated information technology, shall be deemed to engage in an unfair act where
such an article or product is sold or offered for sale in this state, either separately or as a
component of another article or product, and in competition with an article or product sold
or offered for sale in this state that was manufactured without violating proposed law.  HLS 11RS-387	ORIGINAL
HB NO. 231
Page 18 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
Proposed law further provides that a person who engages in such an unfair act, and any
articles or products manufactured by the person in violation of proposed law, shall be subject
to the liabilities and remedial provisions of proposed law in an action by the attorney general
or any person described in proposed law, except as provided in proposed law.
Proposed law provides that no action shall be brought pursuant to proposed law, and no
liability results, where:
(1)The end article or end product sold or offered for sale in this state and alleged to
violate proposed law is any of the following:
(a)A copyrightable end product.
(b)Merchandise manufactured by or on behalf of, or pursuant to a license from,
a copyright owner and which displays or embodies a name, character,
artwork, or other indicia of or from a work that falls within proposed law, or
merchandise manufactured by or on behalf of, or pursuant to a license from,
a copyright or trademark owner and that displays or embodies a name,
character, artwork, or other indicia of or from a theme park, theme park
attraction, or other facility associated with a theme park.
(c)Packaging, carrier media, or promotional or advertising materials for any end
article, end product, or merchandise that falls within proposed law.
(2)The allegation that the information technology is stolen or misappropriated is based
on a claim that the information technology or its use infringes a patent or
misappropriates a trade secret under applicable law or that could be brought under
any provision of Title 35 of the U.S. Code.
(3)The allegation that the information technology is stolen or misappropriated is based
on a claim that the defendant's use of the information technology violates the terms
of a license that allows users to modify and redistribute any source code associated
with the technology free of charge.
(4)The allegation is based on a claim that the person violated proposed law by aiding,
abetting, facilitating, or assisting someone else to acquire, appropriate, use, sell, or
offer to sell, or by providing someone else with access to, information technology
without authorization of the owner of the information technology or the owner's
authorized licensee in violation of applicable law.
Proposed law provides that no injunction shall issue against a person other than the person
adjudicated to have violated proposed law, and no attachment order shall issue against
articles or products other than articles or products in which the person alleged to violate
proposed law holds title. A person other than the person alleged to violate proposed law
includes any person other than the actual manufacturer who contracts with or otherwise
engages another person to develop, manufacture, produce, market, distribute, advertise, or
assemble an article or product alleged to violate proposed law.
Proposed law provides that no action shall be brought under proposed law unless the person
subject to proposed law received written notice of the alleged use of the stolen or
misappropriated information technology from the owner or exclusive licensee of the
information technology or the owner's agent and the person either failed to establish that its
use of the information technology in question did not violate proposed law or failed, within
90 days after receiving such a notice, to cease use of the owner's stolen or misappropriated
information technology.  
Proposed law provides that if the person commences and thereafter proceeds diligently to
replace the information technology with information technology whose use would not HLS 11RS-387	ORIGINAL
HB NO. 231
Page 19 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
violate proposed law, such a period shall be extended for an additional period of 90 days, not
to exceed 180 days total. The information technology owner or the owner's agent may
extend any period described in proposed law.
Proposed law requires the written notice to, under penalty of perjury, do the following:
(1)Identify the stolen or misappropriated information technology.
(2)Identify the lawful owner or exclusive licensee of the information technology.
(3)Identify the applicable law the person is alleged to be violating and state that the
notifier has a reasonable belief that the person has acquired, appropriated, or used the
information technology in question without authorization of the owner of the
information technology or the owner's authorized licensee in violation of such
applicable law.
(4)To the extent known by the notifier, state the manner in which the information
technology is being used by the defendant.
(5)State the articles or products to which the information technology relates.
(6)Specify the basis and the particular evidence upon which the notifier bases the
allegation.
Proposed law requires the written notification to state, under penalty of perjury, that, after
a reasonable and good-faith investigation, the information in the notice is accurate based on
the notifier's reasonable knowledge, information, and belief.
Proposed law provides that no earlier than 90 days after the provision of notice in
accordance with proposed law, the attorney general, or any person described in proposed
law, may bring an action against any person that is subject to 	proposed law:
(1)To enjoin a violation of proposed law, including by enjoining the person from selling
or offering to sell in this state articles or products that are subject to proposed law,
except as provided in proposed law; however, such an injunction does not encompass
articles or products to be provided to a third party that establishes that such a third
party has satisfied one or more of the affirmative defenses set forth in proposed law
with respect to the manufacturer alleged to have violated proposed law.
(2)Only after a determination by the court that the person has violated proposed law, to
recover the greater of:
(a)Actual damages, which may be imposed only against the person who violated
proposed law.
(b)Statutory damages of no more than the retail price of the stolen or
misappropriated information technology, which may be imposed only against
the person who violated proposed law.
Proposed law provides that in the event the person alleged to have violated proposed law has
been subject to a final judgment or has entered into a final settlement, or any products
manufactured by such a person and alleged to violate proposed law have been the subject
of an injunction or attachment order, in any federal or state court in this state or any other
state, arising out of the same theft or misappropriation of information technology, the court
shall dismiss the action.  
Proposed law further provides that if such a person is a defendant in an ongoing action, or
any products manufactured by such a person and alleged to violate proposed law are the HLS 11RS-387	ORIGINAL
HB NO. 231
Page 20 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
subject of an ongoing injunction or attachment order, in any federal or state court in this state
or any other state, arising out of the same theft or misappropriation of information
technology, the court shall stay the action against such a person pending resolution of the
other action. In the event the other action results in a final judgment or final settlement, the
court shall dismiss the action against the person.
Proposed law provides that, after determination by the court that a person has violated
proposed law and entry of a judgment against the person for violating proposed law, the
attorney general, or a person described in proposed law, may add to the action a claim for
actual damages against a third party who sells or offers to sell in this state products made by
that person in violation of proposed law, subject to the provisions of proposed law.  
Proposed law provides that damages may be imposed against a third party only if:
(1)The third party was provided a copy of a written notice sent to the person alleged to
have violated proposed law that satisfies the requirements of proposed law at least
90 days prior to the entry of the judgment.
(2)The person who violated proposed law did not make an appearance or does not have
sufficient attachable assets to satisfy a judgment against the person.
(3)Such a person either manufactured the final product or produced a component equal
to 30% or more of the value of the final product.
(4)Such a person has a direct contractual relationship with the third party respecting the
manufacture of the final product or component.
(5)The third party has not been subject to a final judgment in any federal or state court
in this state or any other state arising out of the same theft or misappropriation of
information technology; however, in the event the third party is a party to an ongoing
suit for damages, or has entered an appearance as an interested third party in
proceedings in rem, in any federal or state court in this state or any other state arising
out of the same theft or misappropriation of information technology, the court shall
stay the action against the third party pending resolution of the other action.  In the
event the other action results in a final judgment, the court shall dismiss the action
against the third party and any in rem action as to any articles or products
manufactured for such a third party or that have been or are to be supplied to such
a third party.
Proposed law provides that an award of damages against a third party pursuant to proposed
law shall be the lesser of the retail price of the stolen or misappropriated information
technology at issue or $250,000, less any amounts recovered from the person adjudicated
to have violated proposed law, and proposed law shall not apply to such an award or
recovery against the third party.
Proposed law provides that, in an action pursuant to proposed law, a court may:
(1)Against the person adjudicated to have violated proposed law, increase the damages
up to three times the damages authorized by proposed law where the court finds that
the person's use of the stolen or misappropriated information technology was willful.
(2)With respect to certain awards pursuant to proposed law, award costs and reasonable
attorney fees to either of the following:
(a)A prevailing plaintiff in actions brought by an injured person pursuant to
proposed law.
(b)A prevailing defendant in actions brought by an allegedly injured person. HLS 11RS-387	ORIGINAL
HB NO. 231
Page 21 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
(3)With respect to an action pursuant to proposed law brought by a private plaintiff
only, award costs and reasonable attorney fees to a third party who qualifies for an
affirmative defense pursuant to proposed law; however, in a case in which the third
party received a copy of the notification described in proposed law at least 90 days
before the filing of the action pursuant to proposed law, with respect to a third party's
reliance on certain affirmative defenses set forth in proposed law, the court may
award costs and reasonable attorney fees only if all of the conduct on which the
affirmative defense is based was undertaken by the third party, and the third party
notified the plaintiff of the conduct, prior to the end of the 90-day period.
Proposed law provides that a person shall be deemed to have been injured by the sale or
offer for sale of a directly competing article or product subject to proposed law if the person
establishes by a preponderance of the evidence that:
(1)The person manufactures articles or products that are sold or offered for sale in this
state in direct competition with articles or products that are subject to proposed law.
(2)The person's articles or products were not manufactured using stolen or
misappropriated information technology of the owner of the information technology.
(3)The person suffered economic harm, which may be shown by evidence that the retail
price of the stolen or misappropriated information technology was $20,000 or more.
(4)If the person is proceeding in rem or seeks injunctive relief, that the person suffered
material competitive injury as a result of the violation of proposed law.
Proposed law provides that if the court determines that a person found to have violated
proposed law lacks sufficient attachable assets in this state to satisfy a judgment rendered
against it, the court may enjoin the sale or offering for sale in this state of any articles or
products subject to proposed law, except as provided in proposed law.
Proposed law provides that, to the extent that an article or product subject to proposed law
is an essential component of a third party's article or product, the court shall deny injunctive
relief as to the essential component, provided that the third party has undertaken good faith
efforts within the third party's rights under its applicable contract with the manufacturer to
direct the manufacturer of the essential component to cease the theft or misappropriation of
information technology in violation of proposed law, which may be satisfied, without
limitation, by the third party issuing a written directive to the manufacturer demanding that
it cease the theft or misappropriation and demanding that the manufacturer provide the third
party with copies of invoices, purchase orders, licenses, or other verification of lawful use
of the information technology at issue.
Proposed law requires the court shall determine whether a cure period longer than the period
reflected in proposed law would be reasonable given the nature of the use of the information
technology that is the subject of the action and the time reasonably necessary either to bring
such use into compliance with applicable law or to replace the information technology with
information technology that would not violate proposed law.  
Proposed law provides that if the court deems that a longer cure period would be reasonable,
then the action shall be stayed until the end of that longer cure period. If by the end of that
longer cure period, the defendant has established that its use of the information technology
in question did not violate proposed law, or the defendant ceased use of the stolen or
misappropriated information technology, then the action shall be dismissed.
Proposed law provides that, in a case in which the court is unable to obtain personal
jurisdiction over a person subject to proposed law, the court may proceed in rem against any
articles or products subject to proposed law, sold or offered for sale in this state in which the
person alleged to have violated proposed law holds title. Except as provided in proposed HLS 11RS-387	ORIGINAL
HB NO. 231
Page 22 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
law, all such articles or products are subject to attachment at or after the time of filing a
complaint, regardless of the availability or amount of any monetary judgment.
Proposed law provides that, at least 90 days prior to the enforcement of an attachment order
against articles or products pursuant to proposed law the court shall notify any person in
possession of the articles or products of the pending attachment order. Prior to the expiration
of the 90-day period, any person for whom the articles or products were manufactured, or
to whom the articles or products have been or are to be supplied, pursuant to an existing
contract or purchase order, may do either of the following:
(1)Establish that the person has satisfied one or more of the affirmative defenses set
forth in proposed law with respect to the manufacturer alleged to have violated
proposed law, in which case the attachment order shall be dissolved only with
respect to those articles or products that were manufactured for such a person, or
have been or are to be supplied to such a person, pursuant to an existing contract or
purchase order.
(2)Post a bond with the court equal to the retail price of the allegedly stolen or
misappropriated information technology or $25,000, whichever is less, in which case
the court shall stay enforcement of the attachment order against the articles or
products and shall proceed on the basis of its jurisdiction over the bond. The person
posting the bond shall recover the full amount of such bond, plus interest, after the
issuance of a final judgment.
Proposed law provides that in the event the person posting the bond pursuant to proposed
law is entitled to claim an affirmative defense, and that person establishes with the court that
the person is entitled to any affirmative defense, the court shall award costs and reasonable
attorney fees to the person posting the bond and against the plaintiff in the event the plaintiff
proceeds with an action pursuant to proposed law against the person posting the bond.
Proposed law provides that in the event that the court does not provide notification as
described in proposed law, the court, upon motion of any third party, shall stay the
enforcement of the attachment order for 90 days as to articles or products manufactured for
the third party, or that have been or are to be supplied to the third party, pursuant to an
existing contract or purchase order, during which 90-day period the third party may avail
itself of the options set forth in proposed law.
Proposed law provides that a court shall not award damages against any third party pursuant
to proposed law where that party, after having been afforded reasonable notice of at least 90
days and opportunity to plead any of the affirmative defenses set forth in proposed law,
establishes by a preponderance of the evidence any of the following:
(1)Such a person is the end consumer or end user of an article or product subject to
proposed law, or acquired the article or product after its sale to an end consumer or
end user.
(2)Such a person is a business with annual revenues not in excess of $50 million
(3)The person acquired the articles or products:
(a)In good faith reliance on either a code of conduct or other written document
that governs the person's commercial relationships with the manufacturer
adjudicated to have violated proposed law and which includes commitments,
such as general commitments to comply with applicable laws, that prohibit
use of the stolen or misappropriated information technology by the
manufacturer or written assurances from the manufacturer of the articles or
products that the articles or products, to the manufacturer's reasonable
knowledge, were manufactured without the use of stolen or misappropriated HLS 11RS-387	ORIGINAL
HB NO. 231
Page 23 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
information technology in the manufacturer's business operations; however,
within 180 days of receiving written notice of the judgment against the
manufacturer for a violation of proposed law and a copy of a written notice
that satisfies the requirements of proposed law, the person shall undertake
commercially reasonable efforts to do any of the following:
(i)Exchange written correspondence confirming that the manufacturer
is not using the stolen or misappropriated information technology in
violation of proposed law, which may be satisfied, without limitation,
by obtaining written assurances from the manufacturer accompanied
by copies of invoices, purchase orders, licenses, or other verification
of lawful use of the information technology at issue.
(ii)Direct the manufacturer to cease the theft or misappropriation, which
may be satisfied, without limitation, by the third party issuing a
written directive to the manufacturer demanding that it cease the theft
or misappropriation and demanding that the manufacturer provide the
third party with copies of invoices, purchase orders, licenses, or other
verification of lawful use of the information technology at issue.
(iii)In a case in which the manufacturer has failed to cease the theft or
misappropriation within the 180 day period, and the third party has
not fulfilled either good faith option provided in proposed law,
prevent the future acquisition of the articles or products from the
manufacturer during the period that the manufacturer continues to
engage in the theft or misappropriation subject to proposed law where
doing so would not constitute a breach of an agreement between the
person and the manufacturer for the manufacture of the articles or
products in question that was entered into on or before 180 days after
the effective date of proposed law.
(b)Pursuant to an agreement between the person and a manufacturer for the
manufacture of the articles or products in question that was entered into
before 180 days after the effective date of proposed law; however, within 180
days of receiving written notice of the judgment against the manufacturer for
a violation of proposed law and a copy of a written notice that satisfies the
requirements of proposed law, the person shall undertake commercially
reasonable efforts to do any of the following:
(i)Obtain from the manufacturer written assurances that such a
manufacturer is not using the stolen or misappropriated information
technology in violation of proposed law, which may be satisfied,
without limitation, by obtaining written assurances from the
manufacturer accompanied by copies of invoices, purchase orders,
licenses, or other verification of lawful use of the information
technology at issue.
(ii)Direct the manufacturer to cease the theft or misappropriation, which
may be satisfied, without limitation, by the third party issuing a
written directive to the manufacturer demanding that it cease the theft
or misappropriation and demanding that the manufacturer provide the
third party with copies of invoices, purchase orders, licenses, or other
verification of lawful use of the information technology at issue.
(iii)In a case in which the manufacturer has failed to cease the theft or
misappropriation within the 180 day period, and the third party has
not fulfilled either of the previous two options, cease the future
acquisition of the articles or products from the manufacturer during HLS 11RS-387	ORIGINAL
HB NO. 231
Page 24 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
the period that the manufacturer continues to engage in the theft or
misappropriation subject to proposed law where doing so would not
constitute a breach of the agreement.
(4)The person has made commercially reasonable efforts to implement practices and
procedures to require its direct manufacturers, in manufacturing articles or products
for the person, not to use stolen or misappropriated information technology in
violation of proposed law.  A person may satisfy this requirement by either:
(a)Adopting and undertaking commercially reasonable efforts to implement a
code of conduct or similar written requirements, which are applicable to the
person's direct manufacturers, that prohibit the use of stolen or
misappropriated information technology by the manufacturer, subject to a
right of audit, and the person either:
(i)Has a practice of auditing its direct manufacturers on a periodic basis
in accordance with generally accepted industry standards.
(ii)Requires in its agreements with its direct manufacturers that they
submit to audits by a third party, which may include a third-party
association of businesses representing the owner of the stolen or
misappropriated intellectual property, and further provides that a
failure to remedy any deficiencies found in an audit that constitute a
violation of the applicable law of the jurisdiction where the
deficiency occurred constitutes a breach of the contract, subject to
cure within a reasonable period of time.
(b)Adopting and undertaking commercially reasonable efforts to implement a
code of conduct or similar written requirements, which are applicable to the
person's direct manufacturers, that prohibit use of stolen or misappropriated
information technology by the manufacturer, and the person undertakes
practices and procedures to address compliance with the prohibition against
the use of the stolen or misappropriated information technology in
accordance with the applicable code of conduct or written requirements.
(5)The person does not have a contractual relationship with the person alleged to have
violated proposed law respecting the manufacture of the articles or products alleged
to have been manufactured in violation of proposed law.
Proposed law provides that a third party shall have the opportunity to be heard regarding
whether an article or product is an essential component provided or to be provided to a third
party, and shall have the right to file a motion to dismiss any action brought against it under
proposed law.
Proposed law prohibits the court from enforcing any award for damages against a third party
until after the court has ruled on that party's claim of eligibility for any of the affirmative
defenses set out in proposed law, and prior to such a ruling may allow discovery, in an action
under proposed law, only on the particular defenses raised by the third party.
Proposed law provides that the court shall allow discovery against a third party on an issue
only after all discovery on that issue between the parties has been completed and only if the
evidence produced as a result of the discovery does not resolve an issue of material dispute
between the parties.
Proposed law provides that any confidential or otherwise sensitive information submitted
by a party pursuant to proposed law shall be subject to a protective order. HLS 11RS-387	ORIGINAL
HB NO. 231
Page 25 of 25
CODING: Words in struck through type are deletions from existing law; words underscored
are additions.
Proposed law prohibits a court from enforcing an award of damages against a third party
pursuant to proposed law for a period of 18 months from the effective date of proposed law.
Proposed law provides that the remedies provided pursuant to proposed law are the exclusive
remedies for the parties.
(Amends R.S. 51:1427)