1 | 1 | | 85R5150 ADM-D |
---|
2 | 2 | | By: Taylor of Collin S.B. No. 1020 |
---|
3 | 3 | | |
---|
4 | 4 | | |
---|
5 | 5 | | A BILL TO BE ENTITLED |
---|
6 | 6 | | AN ACT |
---|
7 | 7 | | relating to cybercrime; creating criminal offenses. |
---|
8 | 8 | | BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: |
---|
9 | 9 | | SECTION 1. This Act may be cited as the Texas Cybercrime |
---|
10 | 10 | | Act. |
---|
11 | 11 | | SECTION 2. Chapter 33, Penal Code, is amended by adding |
---|
12 | 12 | | Sections 33.022 and 33.023 to read as follows: |
---|
13 | 13 | | Sec. 33.022. ELECTRONIC ACCESS INTERFERENCE. (a) A person |
---|
14 | 14 | | commits an offense if the person intentionally interrupts or |
---|
15 | 15 | | suspends access to a computer system or computer network without |
---|
16 | 16 | | the effective consent of the owner. |
---|
17 | 17 | | (b) An offense under this section is a third degree felony. |
---|
18 | 18 | | (c) It is a defense to prosecution under this section that |
---|
19 | 19 | | the person acted with the intent to facilitate a lawful seizure or |
---|
20 | 20 | | search of, or lawful access to, a computer, computer network, or |
---|
21 | 21 | | computer system for a legitimate law enforcement purpose. |
---|
22 | 22 | | Sec. 33.023. ELECTRONIC DATA TAMPERING. (a) In this |
---|
23 | 23 | | section: |
---|
24 | 24 | | (1) "Malware" means computer software used to: |
---|
25 | 25 | | (A) gather data without the effective consent of |
---|
26 | 26 | | the owner of the data; |
---|
27 | 27 | | (B) gain access to a computer, computer network, |
---|
28 | 28 | | or computer system without the effective consent of the owner; or |
---|
29 | 29 | | (C) disrupt the operation of a computer, computer |
---|
30 | 30 | | network, or computer system without the effective consent of the |
---|
31 | 31 | | owner. |
---|
32 | 32 | | (2) "Ransomware" means malware that demands a ransom |
---|
33 | 33 | | payment to: |
---|
34 | 34 | | (A) restore access to a person's property; or |
---|
35 | 35 | | (B) not publish the person's data. |
---|
36 | 36 | | (b) A person commits an offense if the person: |
---|
37 | 37 | | (1) alters data as it transmits between two computers |
---|
38 | 38 | | in a computer network or computer system without the effective |
---|
39 | 39 | | consent of the owner; or |
---|
40 | 40 | | (2) introduces malware, including ransomware, onto a |
---|
41 | 41 | | computer, computer network, or computer system without the |
---|
42 | 42 | | effective consent of the owner. |
---|
43 | 43 | | (c) An offense under this section is a Class A misdemeanor, |
---|
44 | 44 | | unless the person acted with the intent to defraud or harm another |
---|
45 | 45 | | or alter, damage, or delete property, in which event the offense is: |
---|
46 | 46 | | (1) a state jail felony if the aggregate amount |
---|
47 | 47 | | involved is $2,500 or more but less than $30,000; |
---|
48 | 48 | | (2) a felony of the third degree if the aggregate |
---|
49 | 49 | | amount involved is $30,000 or more but less than $150,000; |
---|
50 | 50 | | (3) a felony of the second degree if: |
---|
51 | 51 | | (A) the aggregate amount involved is $150,000 or |
---|
52 | 52 | | more but less than $300,000; or |
---|
53 | 53 | | (B) the aggregate amount involved is any amount |
---|
54 | 54 | | less than $300,000 and the computer, computer network, or computer |
---|
55 | 55 | | system is owned by the government or a critical infrastructure |
---|
56 | 56 | | facility; or |
---|
57 | 57 | | (4) a felony of the first degree if the aggregate |
---|
58 | 58 | | amount involved is $300,000 or more. |
---|
59 | 59 | | (d) When benefits are obtained, a victim is defrauded or |
---|
60 | 60 | | harmed, or property is altered, damaged, or deleted in violation of |
---|
61 | 61 | | this section, whether or not in a single incident, the conduct may |
---|
62 | 62 | | be considered as one offense and the value of the benefits obtained |
---|
63 | 63 | | and of the losses incurred because of the fraud, harm, or |
---|
64 | 64 | | alteration, damage, or deletion of property may be aggregated in |
---|
65 | 65 | | determining the grade of the offense. |
---|
66 | 66 | | (e) A person who is subject to prosecution under this |
---|
67 | 67 | | section and any other section of this code may be prosecuted under |
---|
68 | 68 | | either or both sections. |
---|
69 | 69 | | SECTION 3. Section 33.03, Penal Code, is amended to read as |
---|
70 | 70 | | follows: |
---|
71 | 71 | | Sec. 33.03. DEFENSES. It is an affirmative defense to |
---|
72 | 72 | | prosecution under Section 33.02, 33.022, or 33.023(b)(1) that the |
---|
73 | 73 | | actor was an officer, employee, or agent of a communications common |
---|
74 | 74 | | carrier or electric utility and committed the proscribed act or |
---|
75 | 75 | | acts in the course of employment while engaged in an activity that |
---|
76 | 76 | | is a necessary incident to the rendition of service or to the |
---|
77 | 77 | | protection of the rights or property of the communications common |
---|
78 | 78 | | carrier or electric utility. |
---|
79 | 79 | | SECTION 4. The change in law made by this Act applies only |
---|
80 | 80 | | to an offense committed on or after the effective date of this Act. |
---|
81 | 81 | | An offense committed before the effective date of this Act is |
---|
82 | 82 | | governed by the law in effect on the date the offense was committed, |
---|
83 | 83 | | and the former law is continued in effect for that purpose. For |
---|
84 | 84 | | purposes of this section, an offense was committed before the |
---|
85 | 85 | | effective date of this Act if any element of the offense occurred |
---|
86 | 86 | | before that date. |
---|
87 | 87 | | SECTION 5. This Act takes effect September 1, 2017. |
---|