The Dallas Court of Appeals recently decided a civil case involving claims under Texas’ unauthorized access of computer law that provides some helpful guidance for this relatively new law that has very little case law construing it. The 3 takeaways that follow are the key legal principles that apply to this law as set forth in the case Miller v. Talley Dunn Gallery, LLC, 2016 WL 836775 (Tex. App.–Dallas, Mar. 3, 2016).

Texas’ unauthorized access of computers law is titled Breach of Computer Security, Chapter 33, Section 33.02 of the Texas Penal Code, a criminal law that has a civil cause of action if the conduct constituting the violation was committed knowingly or intentionally, Chapter 143 of the Texas Civil Practice and Remedies Code, titled Harmful Access by Computer Act (HACA). This law was amended effective September 1, 2015, which is discussed in another post.

The Miller v. Talley Dunn Gallery, LLC, case is one of the few civil cases construing either the amended version of the law, or its predecessor. Here are the 3 key legal principles to take from this case:

3 Key Legal Principles for Texas’ Unauthorized Access Law (HACA)

  1. A cell phone is a “computer” for purposes of HACA (“In reality, ‘a modern cell phone is a computer ….'”).
  2. Examining a phone log and text messages from a cell phone necessarily requires retrieving the data on the phone which constitutes an “access” of a computer under HACA.
  3. The misguided belief that, because a cell phone used exclusively by one spouse may technically constitute “community property,” the other spouse has “effective consent” to access the data on the cell phone, is absolutely false. “Nothing in chapter 33 of the penal code incorporates community property law for the purpose of establishing ownership of the computer. Rather, the statute defines ‘owner’ as a person who: (1) has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor; (2) has the right to restrict access to the property; or (3) is the licensee of data or computer software.” Note, the Court’s fact-intensive approach to analyzing this issue is very important: Because both spouses agreed that the phone belonged to one spouse, she used it on a daily basis, it was the only way to reach her, she had the right to place a password on the phone, and had at various times restricted access to it by the password, and the other spouse accessed the phone at night when she was asleep and not using it, the evidence showed she had a greater right to possession of the phone.

NOTE:

Based upon several discussions I have had since publishing this post, I need to make this point clear: I have not thoroughly researched this issue as it pertains to family law cases, however, in my past research on other issues, when I have seen family law cases dealing with “unauthorized access” issues nationwide, the way the Dallas Court of Appeals handled it is the prevailing view — but only when the device is clearly used by only one spouse or the other — this is definitely not the case in instances of things such as family computers, jointly used devices, etc.

This is only the rule in cases where the device is treated by the parties as being only one spouse’s or the others, despite the technicality that it’s true property ownership may be “community property.” In cases where devices are shared, the prevailing view is that both have a right to access the device.

Now, where this gets trickier is in a situation where you may have a family computer, that is jointly used by both spouses, but one spouse then uses that family computer device (which is proper) to surreptitiously access an online account such as Facebook, Gmail, etc. that is exclusively the other spouses, because such accounts are considered to be separate “computers” within these laws, which depending upon how the access was gained, would be prohibited by these laws.

Given the popularity of and amount of discussion this post has generated, I may share more on these issues — let me know in the comments if you’d be interested in hearing more!

Published by Shawn E. Tuma

Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at stuma@spencerfane.com.

Join the Conversation

9 Comments

  1. Mr Tuma, I love your blog, I read all your articles. I learn lots and they are easy to understand.  This article, please check because paragraph is repeated twice. Have a great easter sir. Toni 

    From: Cybersecurity Business Law To: faux.reality@yahoo.com Sent: Saturday, March 26, 2016 5:02 AM Subject: [New post] 3 Key Takeaways About Texas’ Unauthorized Access Law #yiv6732762581 a:hover {color:red;}#yiv6732762581 a {text-decoration:none;color:#0088cc;}#yiv6732762581 a.yiv6732762581primaryactionlink:link, #yiv6732762581 a.yiv6732762581primaryactionlink:visited {background-color:#2585B2;color:#fff;}#yiv6732762581 a.yiv6732762581primaryactionlink:hover, #yiv6732762581 a.yiv6732762581primaryactionlink:active {background-color:#11729E;color:#fff;}#yiv6732762581 WordPress.com | Shawn E. Tuma posted: “The Dallas Court of Appeals recently decided a civil case involving claims under Texas’ unauthorized access of computer law that provides some helpful guidance for this relatively new law that has very little case law construing it. The 3 takeaways that f” | |

    1. Thank you so much for your comment, your very kind words, and for catching my mess-up (updated as I was running out the door to a wedding!). I have updated it – please let me know if you see anything else! Have a great weekend and a very Happy Easter!

Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Business Cyber Risk

Subscribe now to keep reading and get access to the full archive.

Continue reading