|
|
|
HB0380 Engrossed |
|
LRB094 06868 RXD 36975 b |
|
|
1 |
| AN ACT concerning business.
|
2 |
| Be it enacted by the People of the State of Illinois,
|
3 |
| represented in the General Assembly:
|
4 |
| Section 1. This Act may be cited as the Illinois Spyware |
5 |
| Prevention Initiative Act. |
6 |
| Section 5. Definitions. In this Act: |
7 |
| "Advertisement" means a communication, the primary purpose |
8 |
| of which is the commercial promotion of a commercial product or |
9 |
| service, including content on an Internet web site operated for |
10 |
| a commercial purpose.
|
11 |
| "Authorized user", with respect to a computer, means a |
12 |
| person who owns or is authorized by the owner or lessee to use |
13 |
| the computer. "Authorized user" does not include a person or |
14 |
| entity that has obtained authorization to use the computer |
15 |
| solely through the use of an end user license agreement.
|
16 |
| "Computer software" means a sequence of instructions |
17 |
| written in any programming language that is executed on a |
18 |
| computer.
|
19 |
| "Computer virus" means a computer program or other set of |
20 |
| instructions that is designed to degrade the performance of or |
21 |
| disable a computer or computer network and is designed to have |
22 |
| the ability to replicate itself on other computers or computer |
23 |
| networks without the authorization of the owners of those |
24 |
| computers or computer networks.
|
25 |
| "Consumer" means an individual who resides in this State |
26 |
| and who uses the computer in question primarily for personal, |
27 |
| family, or household purposes.
|
28 |
| "Damage" means any significant impairment to the integrity |
29 |
| or availability of data, software, a system, or information.
|
30 |
| "Deceptive" means any one of the following:
|
31 |
| (1) By means of materially false or fraudulent |
32 |
| statement.
|
|
|
|
HB0380 Engrossed |
- 2 - |
LRB094 06868 RXD 36975 b |
|
|
1 |
| (2) By means of a statement or description that omits |
2 |
| or misrepresents material information in order to deceive |
3 |
| the consumer.
|
4 |
| (3) By means of material failure to provide any notice |
5 |
| to an authorized user regarding the download or |
6 |
| installation of software in order to deceive the consumer.
|
7 |
| "Execute", when used with respect to computer software, |
8 |
| means the performance of the functions of the carrying out of |
9 |
| the instructions of the computer software.
|
10 |
| "Internet" means the global information system that is |
11 |
| logically linked together by a globally unique address space |
12 |
| based on the Internet Protocol (IP), or its subsequent |
13 |
| extensions, and that is able to support communications using |
14 |
| the Transmission Control Protocol/Internet Protocol (TCP/IP) |
15 |
| suite, or its subsequent extensions, or other IP-compatible |
16 |
| protocols, and that provides, uses, or makes accessible, either |
17 |
| publicly or privately, high level services layered on the |
18 |
| communications and related infrastructure.
|
19 |
| "Person" means any individual, partnership, corporation, |
20 |
| limited liability company, or other organization, or any |
21 |
| combination thereof.
|
22 |
| "Personally identifiable information" means any one of the |
23 |
| following:
|
24 |
| (1) First name or first initial in combination with |
25 |
| last name.
|
26 |
| (2) Credit or debit card numbers or other financial |
27 |
| account numbers.
|
28 |
| (3) A password or personal identification number |
29 |
| required to access an
identified financial account.
|
30 |
| (4) Social security number.
|
31 |
| (5) Any of the following information in a form that |
32 |
| personally identifies
an authorized user: (i) account |
33 |
| balances; (ii) overdraft history; (iii) payment history; |
34 |
| (iv) a history of Web sites visited; (v) home address; (vi) |
35 |
| work address; or (vii) a record of a purchase or purchases.
|
|
|
|
HB0380 Engrossed |
- 3 - |
LRB094 06868 RXD 36975 b |
|
|
1 |
| Section 10. Computer spyware; authorized user. A person or |
2 |
| entity that is
not an authorized user shall not, with actual |
3 |
| knowledge, with conscious avoidance of actual knowledge, or |
4 |
| willfully, cause computer software to be copied onto a |
5 |
| consumer's computer and use the software to do any of the |
6 |
| following:
|
7 |
| (1) Modify, through deceptive means, any of the |
8 |
| following settings related to the computer's access to, or |
9 |
| use of, the Internet: |
10 |
| (A) The page that appears when an authorized user |
11 |
| launches an Internet browser or similar software |
12 |
| program used to access and navigate the Internet.
|
13 |
| (B) The default provider or Web proxy an authorized |
14 |
| user uses to access or search the Internet.
|
15 |
| (C) An authorized user's list of bookmarks used to |
16 |
| access Web pages. |
17 |
| (2) Collect, through deceptive means, personally |
18 |
| identifiable information that meets any of the following |
19 |
| criteria: |
20 |
| (A) It is collected through the use of a |
21 |
| keystroke-logging function that records all keystrokes |
22 |
| made by an authorized user who uses the computer and |
23 |
| transfers that information from the computer to |
24 |
| another person.
|
25 |
| (B) It includes all or substantially all of the Web |
26 |
| sites visited by an authorized user, other than Web |
27 |
| sites of the provider of the software, if the computer |
28 |
| software was installed in a manner designed to conceal |
29 |
| from all authorized users of the computer the fact that |
30 |
| the software is being installed.
|
31 |
| (C) It is a data element that is extracted from the |
32 |
| consumer's computer hard drive for a purpose wholly |
33 |
| unrelated to any of the purposes of the software or |
34 |
| service described to an authorized user. |
35 |
| (3) Prevent, without the authorization of an |
36 |
| authorized user, through deceptive means, an authorized |
|
|
|
HB0380 Engrossed |
- 4 - |
LRB094 06868 RXD 36975 b |
|
|
1 |
| user's reasonable efforts to block the installation of, or |
2 |
| to disable software by causing software that the authorized |
3 |
| user has properly removed or disabled to automatically |
4 |
| reinstall or reactivate on the computer without the |
5 |
| authorization of an authorized user.
|
6 |
| (4) Misrepresent that software will be uninstalled or |
7 |
| disabled by an authorized user's action, with knowledge |
8 |
| that the software will not be so uninstalled or disabled.
|
9 |
| (5) Through deceptive means, remove, disable, or |
10 |
| render inoperative security, antispyware, or antivirus |
11 |
| software installed on the computer.
|
12 |
| Section 15. Computer spyware; unauthorized user. |
13 |
| (a) A person or entity that is not an authorized user shall |
14 |
| not, with actual knowledge, with conscious avoidance of actual |
15 |
| knowledge, or willfully, cause computer software to be copied |
16 |
| onto a consumer's computer and use the software to do any of |
17 |
| the following: |
18 |
| (1) Take control of the consumer's computer by doing |
19 |
| any of the following: |
20 |
| (A) Transmit or relay commercial electronic mail |
21 |
| or a computer
virus from the consumer's computer, where |
22 |
| the transmission or relaying is initiated by a person |
23 |
| other than the authorized user and without the |
24 |
| authorization of an authorized user.
|
25 |
| (B) Access or use the consumer's modem or Internet |
26 |
| service for the purpose of causing damage to the |
27 |
| consumer's computer or of causing an authorized user to |
28 |
| incur financial charges for a service that is not |
29 |
| authorized by an authorized user.
|
30 |
| (C) Use the consumer's computer as part of an |
31 |
| activity performed by a group of computers for the |
32 |
| purpose of causing damage to another computer, |
33 |
| including, but not limited to, launching a denial of |
34 |
| service attack.
|
35 |
| (D) Open multiple, sequential, stand-alone |
|
|
|
HB0380 Engrossed |
- 5 - |
LRB094 06868 RXD 36975 b |
|
|
1 |
| advertisements in the consumer's Internet browser |
2 |
| without the authorization of an authorized user and |
3 |
| with knowledge that a reasonable computer user cannot |
4 |
| close the advertisements without turning off the |
5 |
| computer or closing the consumer's Internet browser.
|
6 |
| (2) Modify any of the following settings related to the |
7 |
| computer's access to, or use of, the Internet: |
8 |
| (A) An authorized user's security or other |
9 |
| settings that protect information about the authorized |
10 |
| user for the purpose of stealing personal information |
11 |
| of an authorized user.
|
12 |
| (B) The security settings of the computer for the |
13 |
| purpose of causing damage to one or more computers.
|
14 |
| (3) Prevent, without the authorization of an |
15 |
| authorized user, an authorized user's reasonable efforts |
16 |
| to block the installation of, or to disable software, by |
17 |
| doing any of the following: |
18 |
| (A) Present the authorized user with an option to |
19 |
| decline installation of software with knowledge that, |
20 |
| when the option is selected by the authorized user, the |
21 |
| installation will nevertheless occur. |
22 |
| (B) Falsely represent that software has been |
23 |
| disabled. |
24 |
| (b) Nothing in this Section shall apply to any monitoring |
25 |
| of, or interaction with, a subscriber's Internet or other |
26 |
| network connection or service, or a protected computer, by a |
27 |
| telecommunications carrier, cable operator, computer hardware |
28 |
| or software provider, or provider of information service or |
29 |
| interactive computer service for network or computer security |
30 |
| purposes, diagnostics, technical support, repair, authorized |
31 |
| updates of software or system firmware, authorized remote |
32 |
| system management, or detection or prevention of the |
33 |
| unauthorized use of or fraudulent or other illegal activities |
34 |
| in connection with a network, service, or computer software, |
35 |
| including scanning for and removing software proscribed under |
36 |
| this Act. |
|
|
|
HB0380 Engrossed |
- 6 - |
LRB094 06868 RXD 36975 b |
|
|
1 |
| Section 20. Spyware installation misrepresentation. |
2 |
| (a) A person or entity, who is not an authorized user, |
3 |
| shall not do any of the following with regard to the computer |
4 |
| of a consumer in this State: |
5 |
| (1) Induce an authorized user to install a software |
6 |
| component onto the computer by misrepresenting that |
7 |
| installing software is necessary for security or privacy |
8 |
| reasons or in order to open, view, or play a particular |
9 |
| type of content.
|
10 |
| (2) Deceptively cause the copying and execution on the |
11 |
| computer of a computer software component with the intent |
12 |
| of causing an authorized user to use the component in a way |
13 |
| that violates any other provision of this Section.
|
14 |
| (b) Nothing in this Section shall apply to any monitoring |
15 |
| of, or interaction with, a subscriber's Internet or other |
16 |
| network connection or service, or a protected computer, by a |
17 |
| telecommunications carrier, cable operator, computer hardware |
18 |
| or software provider, or provider of information service or |
19 |
| interactive computer service for network or computer security |
20 |
| purposes, diagnostics, technical support, repair, authorized |
21 |
| updates of software or system firmware, authorized remote |
22 |
| system management, or detection or prevention of the |
23 |
| unauthorized use of or fraudulent or other illegal activities |
24 |
| in connection with a network, service, or computer software, |
25 |
| including scanning for and removing software proscribed under |
26 |
| this Act. |
27 |
| Section 25. Penalty. |
28 |
| (a) A person who violates Section 10, 15, or 20 of this Act |
29 |
| shall be guilty of a Class B misdemeanor. |
30 |
| (b) Absolute liability as provided under Section 4-9 of the |
31 |
| Criminal Code of 1961 shall be imposed for a violation of |
32 |
| Section 20. |
33 |
| Section 30. Severability. If any provision of this Act or |