Bill Text: TX HB9 | 2017-2018 | 85th Legislature | Enrolled
Bill Title: Relating to cybercrime; creating criminal offenses.
Spectrum: Slight Partisan Bill (Republican 8-4)
Status: (Passed) 2017-06-12 - Effective on 9/1/17 [HB9 Detail]
Download: Texas-2017-HB9-Enrolled.html
H.B. No. 9 |
|
||
relating to cybercrime; creating criminal offenses. | ||
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: | ||
SECTION 1. This Act may be cited as the Texas Cybercrime | ||
Act. | ||
SECTION 2. Section 33.01, Penal Code, is amended by | ||
amending Subdivision (2) and adding Subdivisions (11-a), (13-a), | ||
(13-b), (13-c), and (15-a) to read as follows: | ||
(2) "Aggregate amount" means the amount of: | ||
(A) any direct or indirect loss incurred by a | ||
victim, including the value of money, property, or service stolen, | ||
appropriated, or rendered unrecoverable by the offense; or | ||
(B) any expenditure required by the victim to: | ||
(i) determine whether data or [ |
||
a computer, computer network, computer program, or computer system | ||
was [ |
||
disrupted by the offense; or | ||
(ii) attempt to restore, recover, or | ||
replace any data altered, acquired, appropriated, damaged, | ||
deleted, or disrupted. | ||
(11-a) "Decryption," "decrypt," or "decrypted" means | ||
the decoding of encrypted communications or information, whether by | ||
use of a decryption key, by breaking an encryption formula or | ||
algorithm, or by the interference with a person's use of an | ||
encryption service in a manner that causes information or | ||
communications to be stored or transmitted without encryption. | ||
(13-a) "Encrypted private information" means | ||
encrypted data, documents, wire or electronic communications, or | ||
other information stored on a computer or computer system, whether | ||
in the possession of the owner or a provider of an electronic | ||
communications service or a remote computing service, and which has | ||
not been accessible to the public. | ||
(13-b) "Encryption," "encrypt," or "encrypted" means | ||
the encoding of data, documents, wire or electronic communications, | ||
or other information, using mathematical formulas or algorithms in | ||
order to preserve the confidentiality, integrity, or authenticity | ||
of, and prevent unauthorized access to, such information. | ||
(13-c) "Encryption service" means a computing | ||
service, a computer device, computer software, or technology with | ||
encryption capabilities, and includes any subsequent version of or | ||
update to an encryption service. | ||
(15-a) "Privileged information" means: | ||
(A) protected health information, as that term is | ||
defined by Section 182.002, Health and Safety Code; | ||
(B) information that is subject to the | ||
attorney-client privilege; or | ||
(C) information that is subject to the | ||
accountant-client privilege under Section 901.457, Occupations | ||
Code, or other law, if the information is on a computer, computer | ||
network, or computer system owned by a person possessing a license | ||
issued under Subchapter H, Chapter 901, Occupations Code. | ||
SECTION 3. Chapter 33, Penal Code, is amended by adding | ||
Sections 33.022, 33.023, and 33.024 to read as follows: | ||
Sec. 33.022. ELECTRONIC ACCESS INTERFERENCE. (a) A | ||
person, other than a network provider or online service provider | ||
acting for a legitimate business purpose, commits an offense if the | ||
person intentionally interrupts or suspends access to a computer | ||
system or computer network without the effective consent of the | ||
owner. | ||
(b) An offense under this section is a third degree felony. | ||
(c) It is a defense to prosecution under this section that | ||
the person acted with the intent to facilitate a lawful seizure or | ||
search of, or lawful access to, a computer, computer network, or | ||
computer system for a legitimate law enforcement purpose. | ||
Sec. 33.023. ELECTRONIC DATA TAMPERING. (a) In this | ||
section, "ransomware" means a computer contaminant or lock that | ||
restricts access by an unauthorized person to a computer, computer | ||
system, or computer network or any data in a computer, computer | ||
system, or computer network under circumstances in which a person | ||
demands money, property, or a service to remove the computer | ||
contaminant or lock, restore access to the computer, computer | ||
system, computer network, or data, or otherwise remediate the | ||
impact of the computer contaminant or lock. | ||
(b) A person commits an offense if the person intentionally | ||
alters data as it transmits between two computers in a computer | ||
network or computer system through deception and without a | ||
legitimate business purpose. | ||
(c) A person commits an offense if the person intentionally | ||
introduces ransomware onto a computer, computer network, or | ||
computer system through deception and without a legitimate business | ||
purpose. | ||
(d) Subject to Subsections (d-1) and (d-2), an offense under | ||
this section is a Class C misdemeanor. | ||
(d-1) Subject to Subsection (d-2), if it is shown on the | ||
trial of the offense that the defendant acted with the intent to | ||
defraud or harm another, an offense under this section is: | ||
(1) a Class C misdemeanor if the aggregate amount | ||
involved is less than $100 or cannot be determined; | ||
(2) a Class B misdemeanor if the aggregate amount | ||
involved is $100 or more but less than $750; | ||
(3) a Class A misdemeanor if the aggregate amount | ||
involved is $750 or more but less than $2,500; | ||
(4) a state jail felony if the aggregate amount | ||
involved is $2,500 or more but less than $30,000; | ||
(5) a felony of the third degree if the aggregate | ||
amount involved is $30,000 or more but less than $150,000; | ||
(6) a felony of the second degree if the aggregate | ||
amount involved is $150,000 or more but less than $300,000; and | ||
(7) a felony of the first degree if the aggregate | ||
amount involved is $300,000 or more. | ||
(d-2) If it is shown on the trial of the offense that the | ||
defendant knowingly restricted a victim's access to privileged | ||
information, an offense under this section is: | ||
(1) a state jail felony if the value of the aggregate | ||
amount involved is less than $2,500; | ||
(2) a felony of the third degree if: | ||
(A) the value of the aggregate amount involved is | ||
$2,500 or more but less than $30,000; or | ||
(B) a client or patient of a victim suffered harm | ||
attributable to the offense; | ||
(3) a felony of the second degree if: | ||
(A) the value of the aggregate amount involved is | ||
$30,000 or more but less than $150,000; or | ||
(B) a client or patient of a victim suffered | ||
bodily injury attributable to the offense; and | ||
(4) a felony of the first degree if: | ||
(A) the value of the aggregate amount involved is | ||
$150,000 or more; or | ||
(B) a client or patient of a victim suffered | ||
serious bodily injury or death attributable to the offense. | ||
(e) When benefits are obtained, a victim is defrauded or | ||
harmed, or property is altered, appropriated, damaged, or deleted | ||
in violation of this section, whether or not in a single incident, | ||
the conduct may be considered as one offense and the value of the | ||
benefits obtained and of the losses incurred because of the fraud, | ||
harm, or alteration, appropriation, damage, or deletion of property | ||
may be aggregated in determining the grade of the offense. | ||
(f) A person who is subject to prosecution under this | ||
section and any other section of this code may be prosecuted under | ||
either or both sections. | ||
(g) Software is not ransomware for the purposes of this | ||
section if the software restricts access to data because: | ||
(1) authentication is required to upgrade or access | ||
purchased content; or | ||
(2) access to subscription content has been blocked | ||
for nonpayment. | ||
Sec. 33.024. UNLAWFUL DECRYPTION. (a) A person commits an | ||
offense if the person intentionally decrypts encrypted private | ||
information through deception and without a legitimate business | ||
purpose. | ||
(b) Subject to Subsections (b-1) and (b-2), an offense under | ||
this section is a Class C misdemeanor. | ||
(b-1) Subject to Subsection (b-2), if it is shown on the | ||
trial of the offense that the defendant acted with the intent to | ||
defraud or harm another, an offense under this section is: | ||
(1) a Class C misdemeanor if the value of the aggregate | ||
amount involved is less than $100 or cannot be determined; | ||
(2) a Class B misdemeanor if the value of the aggregate | ||
amount involved is $100 or more but less than $750; | ||
(3) a Class A misdemeanor if the value of the aggregate | ||
amount involved is $750 or more but less than $2,500; | ||
(4) a state jail felony if the value of the aggregate | ||
amount involved is $2,500 or more but less than $30,000; | ||
(5) a felony of the third degree if the value of the | ||
aggregate amount involved is $30,000 or more but less than | ||
$150,000; | ||
(6) a felony of the second degree if the value of the | ||
aggregate amount involved is $150,000 or more but less than | ||
$300,000; and | ||
(7) a felony of the first degree if the value of the | ||
aggregate amount involved is $300,000 or more. | ||
(b-2) If it is shown on the trial of the offense that the | ||
defendant knowingly decrypted privileged information, an offense | ||
under this section is: | ||
(1) a state jail felony if the value of the aggregate | ||
amount involved is less than $2,500; | ||
(2) a felony of the third degree if: | ||
(A) the value of the aggregate amount involved is | ||
$2,500 or more but less than $30,000; or | ||
(B) a client or patient of a victim suffered harm | ||
attributable to the offense; | ||
(3) a felony of the second degree if: | ||
(A) the value of the aggregate amount involved is | ||
$30,000 or more but less than $150,000; or | ||
(B) a client or patient of a victim suffered | ||
bodily injury attributable to the offense; and | ||
(4) a felony of the first degree if: | ||
(A) the value of the aggregate amount involved is | ||
$150,000 or more; or | ||
(B) a client or patient of a victim suffered | ||
serious bodily injury or death attributable to the offense. | ||
(c) It is a defense to prosecution under this section that | ||
the actor's conduct was pursuant to an agreement entered into with | ||
the owner for the purpose of: | ||
(1) assessing or maintaining the security of the | ||
information or of a computer, computer network, or computer system; | ||
or | ||
(2) providing other services related to security. | ||
(d) A person who is subject to prosecution under this | ||
section and any other section of this code may be prosecuted under | ||
either or both sections. | ||
SECTION 4. Section 33.03, Penal Code, is amended to read as | ||
follows: | ||
Sec. 33.03. DEFENSES. It is an affirmative defense to | ||
prosecution under Section 33.02 or 33.022 that the actor was an | ||
officer, employee, or agent of a communications common carrier or | ||
electric utility and committed the proscribed act or acts in the | ||
course of employment while engaged in an activity that is a | ||
necessary incident to the rendition of service or to the protection | ||
of the rights or property of the communications common carrier or | ||
electric utility. | ||
SECTION 5. The change in law made by this Act applies only | ||
to an offense committed on or after the effective date of this Act. | ||
An offense committed before the effective date of this Act is | ||
governed by the law in effect on the date the offense was committed, | ||
and the former law is continued in effect for that purpose. For | ||
purposes of this section, an offense was committed before the | ||
effective date of this Act if any element of the offense occurred | ||
before that date. | ||
SECTION 6. This Act takes effect September 1, 2017. | ||
______________________________ | ______________________________ | |
President of the Senate | Speaker of the House | |
I certify that H.B. No. 9 was passed by the House on April 13, | ||
2017, by the following vote: Yeas 139, Nays 0, 2 present, not | ||
voting; and that the House concurred in Senate amendments to H.B. | ||
No. 9 on May 26, 2017, by the following vote: Yeas 142, Nays 0, 2 | ||
present, not voting. | ||
______________________________ | ||
Chief Clerk of the House | ||
I certify that H.B. No. 9 was passed by the Senate, with | ||
amendments, on May 24, 2017, by the following vote: Yeas 31, Nays | ||
0. | ||
______________________________ | ||
Secretary of the Senate | ||
APPROVED: __________________ | ||
Date | ||
__________________ | ||
Governor |