US Lawyer Database

For Lawyer-Seekers

YOU DESERVE THE BEST LAWYER

As used in this chapter:

  1. (1) “Advertisement” means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including content on an Internet website operated for a commercial purpose;

  2. (2) “Authorized user”, with respect to a computer, means a person that owns or is authorized by the owner or lessee to use the computer;

  3. (3) “Bundled software” means software that is acquired through the installation of a large number of separate programs in a single installation when the programs are wholly unrelated to the purpose of the installation as described to the authorized user;

  4. (4)

    1. (A) “Cause to be copied” means to distribute or transfer computer software or any component of computer software.

    2. (B) “Cause to be copied” does not include providing:

      1. (i) Transmission, routing, intermediate temporary storage, or caching of software;

      2. (ii) A compact disk, website, computer server, or other storage medium through which the software was distributed by a third party; or

      3. (iii) A directory, index, reference, pointer, hypertext link, or other information location tool through which the user of the computer located the software;

  5. (5) “Computer software” means a sequence of instructions written in any programming language that is executed on a computer but does not include a text or data file, including a cookie;

  6. (6) “Computer virus” means a computer program or other set of instructions that is designed to do the following acts without the authorization of the owner or owners of a computer or computer network:

    1. (A) Degrade the performance of or disable a computer or computer network; and

    2. (B) Have the ability to replicate itself on another computer or computer network;

  7. (7) “Damage” means any significant impairment to the integrity, confidentiality, or availability of data, software, a system, or information, including, but not limited to, the:

    1. (A) Significant and intentional degradation of the performance of a computer or a computer network; or

    2. (B) Intentional disabling of a computer or computer network;

  8. (8) “Distributed denial of service” or “DDoS attack” means techniques or actions involving the use of one (1) or more damaged computers to damage another computer or a targeted computer system in order to shut the computer or computer system down and deny the service of the damaged computer or computer system to legitimate users;

  9. (9) “Execute”, when used with respect to computer software, means the performance of the functions or the carrying out of the instructions of the computer software;

  10. (10) “Hardware” means a comprehensive term for all of the discrete physical parts of a computer as distinguished from:

    1. (A) The data the computer contains or that enables it to operate; and

    2. (B) The software that provides instructions for the hardware to accomplish tasks;

  11. (11) “Intentionally deceptive” means with the intent to deceive an authorized user in order to either damage a computer or computer system or wrongfully obtain personally identifiable information without authority:

    1. (A) To make an intentional and materially false or fraudulent statement;

    2. (B) To make a statement or description that intentionally omits or misrepresents material information; or

    3. (C) An intentional and material failure to provide any notice to an authorized user regarding the download or installation of software;

  12. (12) “Internet” means:

    1. (A) The international computer network of both federal and nonfederal interoperable packet switched data networks; or

    2. (B) The global information system that:

      1. (i) Is logically linked together by a globally unique address space based on the Internet Protocol (IP) or its subsequent extensions;

      2. (ii) Is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, its subsequent extensions, or other IP-compatible protocols; and

      3. (iii) Provides, uses, or makes accessible, either publicly or privately, high-level services layered on the communications and related infrastructure described in this subdivision (12);

  13. (13) “Internet address” means a specific location on the Internet accessible through a universal resource locator or Internet protocol address;

  14. (14) “Person” means one (1) or more individuals, partnerships, corporations, limited liability companies, or other organizations;

  15. (15) “Personally identifiable information” means any of the following if it allows the entity holding the information to identify an authorized user by:

    1. (A) First name or first initial in combination with last name;

    2. (B) Credit or debit card numbers or other financial account numbers;

    3. (C) A password or personal identification number or other identification required to access an identified account other than a password, personal identification number, or other identification transmitted by an authorized user to the issuer of the account or its agent;

    4. (D) A social security number; or

    5. (E) Any of the following information in a form that personally identifies an authorized user:

      1. (i) Account balances;

      2. (ii) Overdraft history;

      3. (iii) Payment history;

      4. (iv) A history of websites visited;

      5. (v) Home address;

      6. (vi) Work address; or

      7. (vii) A record of a purchase or purchases; and

  16. (16) “Phishing” means the use of electronic mail or other means to imitate a legitimate company or business in order to entice the user into divulging passwords, credit card numbers, or other sensitive information for the purpose of committing theft or fraud.