Sec. 324.052. UNAUTHORIZED ACCESS TO OR MODIFICATIONS OF COMPUTER SETTINGS; COMPUTER DAMAGE. A person other than the owner or operator of the computer may not knowingly cause computer software to be copied to a computer in this state and use the software to:
(1) modify, through intentionally deceptive means, a setting that controls:
(A) the page that appears when an Internet browser or a similar software program is launched to access and navigate the Internet;
(B) the default provider or web proxy used to access or search the Internet; or
(C) a list of bookmarks used to access web pages;
(2) take control of the computer by:
(A) accessing or using the computer's modem or Internet service to:
(i) cause damage to the computer;
(ii) cause the owner or operator of the computer to incur financial charges for a service the owner or operator did not previously authorize; or
(iii) cause a third party affected by the conduct to incur financial charges for a service the third party did not previously authorize; or
(B) opening, without the consent of the owner or operator of the computer, an advertisement that:
(i) is in the owner's or operator's Internet browser in a multiple, sequential, or stand-alone form; and
(ii) cannot be closed by an ordinarily reasonable person using the computer without closing the browser or shutting down the computer;
(3) modify settings on the computer that relate to access to or use of the Internet and protection of information for purposes of stealing personally identifiable information of the owner or operator of the computer; or
(4) modify security settings on the computer relating to access to or use of the Internet for purposes of causing damage to one or more computers.
Added by Acts 2007, 80th Leg., R.S., Ch. 885 (H.B. 2278), Sec. 2.01, eff. April 1, 2009.
Structure Texas Statutes
Title 10 - Use of Telecommunications
Subtitle B - Electronic Communications
Chapter 324 - Consumer Protection Against Computer Spyware
Subchapter B. Prohibited Conduct or Activities
Section 324.051. Unauthorized Collection or Culling of Personally Identifiable Information
Section 324.052. Unauthorized Access to or Modifications of Computer Settings; Computer Damage
Section 324.053. Unauthorized Interference With Installation or Disabling of Computer Software
Section 324.054. Other Prohibited Conduct
Section 324.055. Unauthorized Creation Of, Access To, or Use of Zombies or Botnets; Private Action