US Lawyer Database

For Lawyer-Seekers

YOU DESERVE THE BEST LAWYER

Section 359-H:1 – Definitions.

    359-H:1 Definitions. – In this chapter: I. " Advertisement " means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including content on an Internet website operated for a commercial purpose. II. " Authorized user " means a consumer who owns or is permitted to use […]

Section 359-H:2 – Prohibited Conduct.

    359-H:2 Prohibited Conduct. – A person or entity conducting business in this state, who is not an authorized user, shall not knowingly cause a computer program or spyware to be copied onto the computer of a consumer and use the program or spyware to do any of the following: I. Take control, through intentionally […]

Section 359-H:3 – Violation; Criminal Penalty.

    359-H:3 Violation; Criminal Penalty. – Any person who uses a computer program or spyware in violation of RSA 359-H:2 shall be guilty of a class A misdemeanor. Source. 2005, 238:1, eff. July 14, 2005.

Section 359-H:4 – Limitations on Actions.

    359-H:4 Limitations on Actions. – A person may not bring an action for a violation of this chapter against an Internet service provider for the routine transmission of security information or information that contains an advertisement violating this chapter. No person may bring a class action under this chapter. Source. 2005, 238:1, eff. July […]

Section 359-H:5 – Enforcement; Information Gathering.

    359-H:5 Enforcement; Information Gathering. – The house standing committee responsible for science, technology, and energy issues, in consultation with the department of justice, may periodically review implementation and enforcement of this chapter and shall make such legislative recommendations as may be appropriate. Source. 2005, 238:1, eff. July 14, 2005.

Section 359-H:6 – Exemption.

    359-H:6 Exemption. – A provider of software or provider of interactive computer service shall not be held liable under this chapter for any action voluntarily taken in good faith, or any service provided in good faith, to remove or disable programs used to violate RSA 359-H:2 that reside on the consumer’s computer if the […]