Sec. 324.051. UNAUTHORIZED COLLECTION OR CULLING OF PERSONALLY IDENTIFIABLE INFORMATION. A person other than the owner or operator of the computer may not knowingly cause computer software to be copied to a computer in this state and use the software to:
(1) collect personally identifiable information through intentionally deceptive means:
(A) by using a keystroke-logging function; or
(B) in a manner that correlates that information with information regarding all or substantially all of the websites visited by the owner or operator of the computer, other than websites operated by the person collecting the information; or
(2) cull, through intentionally deceptive means, the following kinds of personally identifiable information from the consumer's computer hard drive for a purpose wholly unrelated to any of the purposes of the software or service described to an owner or operator of the computer:
(A) a credit or debit card number;
(B) a bank account number;
(C) a password or access code associated with a credit or debit card number or a bank account;
(D) a social security number;
(E) account balances; or
(F) overdraft history.
Added by Acts 2007, 80th Leg., R.S., Ch. 885 (H.B. 2278), Sec. 2.01, eff. April 1, 2009.
Structure Texas Statutes
Title 10 - Use of Telecommunications
Subtitle B - Electronic Communications
Chapter 324 - Consumer Protection Against Computer Spyware
Subchapter B. Prohibited Conduct or Activities
Section 324.051. Unauthorized Collection or Culling of Personally Identifiable Information
Section 324.052. Unauthorized Access to or Modifications of Computer Settings; Computer Damage
Section 324.053. Unauthorized Interference With Installation or Disabling of Computer Software
Section 324.054. Other Prohibited Conduct
Section 324.055. Unauthorized Creation Of, Access To, or Use of Zombies or Botnets; Private Action