As used in this chapter: 
(1) “Advertisement” means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including content on an Internet website operated for a commercial purpose; 
(2) “Authorized user”, with respect to a computer, means a person that owns or is authorized by the owner or lessee to use the computer; 
(3) “Bundled software” means software that is acquired through the installation of a large number of separate programs in a single installation when the programs are wholly unrelated to the purpose of the installation as described to the authorized user; 
(4) 
(A) “Cause to be copied” means to distribute or transfer computer software or any component of computer software. 
(B) “Cause to be copied” does not include providing: 
(i) Transmission, routing, intermediate temporary storage, or caching of software; 
(ii) A compact disk, website, computer server, or other storage medium through which the software was distributed by a third party; or 
(iii) A directory, index, reference, pointer, hypertext link, or other information location tool through which the user of the computer located the software; 
(5) “Computer software” means a sequence of instructions written in any programming language that is executed on a computer but does not include a text or data file, including a cookie; 
(6) “Computer virus” means a computer program or other set of instructions that is designed to do the following acts without the authorization of the owner or owners of a computer or computer network: 
(A) Degrade the performance of or disable a computer or computer network; and 
(B) Have the ability to replicate itself on another computer or computer network; 
(7) “Damage” means any significant impairment to the integrity, confidentiality, or availability of data, software, a system, or information, including, but not limited to, the: 
(A) Significant and intentional degradation of the performance of a computer or a computer network; or 
(B) Intentional disabling of a computer or computer network; 
(8) “Distributed denial of service” or “DDoS attack” means techniques or actions involving the use of one (1) or more damaged computers to damage another computer or a targeted computer system in order to shut the computer or computer system down and deny the service of the damaged computer or computer system to legitimate users; 
(9) “Execute”, when used with respect to computer software, means the performance of the functions or the carrying out of the instructions of the computer software; 
(10) “Hardware” means a comprehensive term for all of the discrete physical parts of a computer as distinguished from: 
(A) The data the computer contains or that enables it to operate; and 
(B) The software that provides instructions for the hardware to accomplish tasks; 
(11) “Intentionally deceptive” means with the intent to deceive an authorized user in order to either damage a computer or computer system or wrongfully obtain personally identifiable information without authority: 
(A) To make an intentional and materially false or fraudulent statement; 
(B) To make a statement or description that intentionally omits or misrepresents material information; or 
(C) An intentional and material failure to provide any notice to an authorized user regarding the download or installation of software; 
(12) “Internet” means: 
(A) The international computer network of both federal and nonfederal interoperable packet switched data networks; or 
(B) The global information system that: 
(i) Is logically linked together by a globally unique address space based on the Internet Protocol (IP) or its subsequent extensions; 
(ii) Is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, its subsequent extensions, or other IP-compatible protocols; and 
(iii) Provides, uses, or makes accessible, either publicly or privately, high-level services layered on the communications and related infrastructure described in this subdivision (12); 
(13) “Internet address” means a specific location on the Internet accessible through a universal resource locator or Internet protocol address; 
(14) “Person” means one (1) or more individuals, partnerships, corporations, limited liability companies, or other organizations; 
(15) “Personally identifiable information” means any of the following if it allows the entity holding the information to identify an authorized user by: 
(A) First name or first initial in combination with last name; 
(B) Credit or debit card numbers or other financial account numbers; 
(C) A password or personal identification number or other identification required to access an identified account other than a password, personal identification number, or other identification transmitted by an authorized user to the issuer of the account or its agent; 
(D) A social security number; or 
(E) Any of the following information in a form that personally identifies an authorized user: 
(i) Account balances; 
(ii) Overdraft history; 
(iii) Payment history; 
(iv) A history of websites visited; 
(v) Home address; 
(vi) Work address; or 
(vii) A record of a purchase or purchases; and 
(16) “Phishing” means the use of electronic mail or other means to imitate a legitimate company or business in order to entice the user into divulging passwords, credit card numbers, or other sensitive information for the purpose of committing theft or fraud.