Not that it was really needed, but Texas just amended its unauthorized access of computers law to specifically address misuse by insiders. I have always read the prior version (one of the broadest) as already prohibiting misuse by insiders. But, that is ok. As someone who regularly explains how these laws work to judges and juries, I can tell you, it never hurts to have something that seems clear be made even more explicit. Belts and suspenders can be a good thing in court and on September 1, 2015, both were cinched up a little more.
3 Key Takeaways About Texas’ Unauthorized Access Law
Breach of Computer Security
Texas’ unauthorized access of computers law is titled Breach of Computer Security, Section 33.02 of the Texas Penal Code, a criminal law that has a civil cause of action if the conduct constituting the violation was committed knowingly or intentionally, Chapter 143 of the Texas Civil Practice and Remedies Code, titled Harmful Access by Computer.
The civil cause of action permits the recovery of actual damages and reasonable attorney’s fees and costs, Tex. Civ. Prac. & Rem. Code 143.002, which is an added benefit for plaintiff’s because the Computer Fraud and Abuse Act does not permit the recovery of attorney’s fees in most cases. The limitations period is the earlier of five years from the date of the last act or two years from the date the plaintiff had a reasonable opportunity to discover the violation.
Prior Version of the Law
The Breach of Computer Security law already made it a crime for a person to, “with the intent to defraud or harm another or alter, damage, or delete property … knowingly access[] … a computer, computer network, or computer system without the effective consent of the owner.” Tex. Penal Code sec. 33.02 (a).
Effective consent is critical to this law and is specifically defined by the statute.
(12) “Effective consent” includes consent by a person legally authorized to act for the owner. Consent is not effective if:
(A) induced by deception, as defined by Section 31.01, or induced by coercion;
(B) given by a person the actor knows is not legally authorized to act for the owner;
(C) given by a person who by reason of youth, mental disease or defect, or intoxication is known by the actor to be unable to make reasonable property dispositions;
(D) given solely to detect the commission of an offense; or
(E) used for a purpose other than that for which the consent was given.
Focusing on this last point, the law prohibits a person from (with the intent to defraud or harm another or alter, damage, or delete property) knowingly accessing a computer for a purpose other than that for which the consent was given. That is similar to the Fifth Circuit’s Intended-Use Theory for determining unauthorized access under the CFAA, which has been effective in insider misuse cases.
The Amended Law
The Breach of Computer Security law has been amended, effective September 1, 2015. The new version applies to offenses committed after the effective date. Nothing was removed from the prior version of the law; the following language in blue italics was added as Section 33.02 (b-1)(2) of the Texas Penal Code:
It is a crime for a person to, with the intent to defraud or harm another or alter, damage, or delete property … knowingly access[] … a computer, computer network, or computer system:
(A) that is owned by:
(i) the government; or
(ii) A business or other commercial entity engaged in a business activity;
(B) in violation of:
(i) A clear and conspicuous prohibition by the owner of the computer, computer network, or computer system; or
(ii) A contractual agreement to which the person has expressly agreed; and
(C) with the intent to obtain or use a file, data, or proprietary information stored in the computer, network, or system to defraud or harm another or alter, damage, or delete property.
(f) it is a defense to prosecution under Subsection (b-1)(2) that the actor’s conduct consisted solely of action taken pursuant to a contract that was entered into with the owner of the computer, computer network, or computer system for the purpose of assessing the security of the computer, network, or system or providing other security-related services.
Passing Thoughts
The addition of the clear and conspicuous and express contractual agreement requirements for this violation are similar to the baseline requirements for the Fifth Circuit’s Intended-Use Theory in applying the CFAA to insider misuse cases. It will be interesting to see how courts apply this new provision vis-a-vis the existing “used for a purpose other than that for which the consent was given.”
I see a lot of discussion points here but far too many for this one blog post.
To be continued …
______________________
Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Protection Partner at Scheef & Stone, LLP, a full-service business law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.
so if I obtain public records (filings) from a government website, display them on my website, that is not defrauding, is it?
The issue would be whether you were authorized to access the government website and used such access for its intended purpose. If you were authorized to access the website for that purpose, it should not violate the Texas Breach of Computer Security law.