§ 4-111-103 - Unlawful acts -- Exceptions.
               	 		
4-111-103.    Unlawful acts -- Exceptions.
    (a)  A  person that is not an authorized user with actual knowledge, with  conscious avoidance of actual knowledge or willfully, shall not cause  computer software to be copied onto any computer in this state nor use  the software to:
      (1)  Modify,  through intentionally deceptive means, any of the following settings  related to the computer's access to, or use of, the Internet:
            (A)  The  page which appears when an authorized user launches an Internet browser  or similar software program used to access and navigate the Internet;
            (B)  The default provider or web proxy the authorized user uses to access or search the Internet;
            (C)  The authorized user's list of bookmarks used to access web pages; or
            (D)  Settings  in computer software or in a text or data file on the computer that are  used to resolve a universal resource locator or other location  identifier used to access a public or private network;
      (2)  Collect, through intentionally deceptive means, personally identifiable information about the authorized user that:
            (A)  Is  collected through the use of a keystroke-logging function that records  all keystrokes made by an authorized user who uses the computer and  transmits the information from the computer to another person;
            (B)  Includes  all or substantially all of the Internet addresses visited by an  authorized user, other than Internet addresses of the provider of the  software, if the computer software was installed in an intentionally  deceptive manner to conceal from all authorized users of the computer  the fact that the software is being installed;
            (C)  Is  extracted from a computer hard drive for a purpose wholly unrelated to  any of the purposes of the software or service as described to the  authorized user; or
            (D)  Is  collected by extracting screen shots of an authorized user's use of the  computer for a purpose wholly unrelated to any of the purposes of the  software or service as described to the authorized user;
      (3)  Prevent  without authorization from the authorized user through intentionally  deceptive means an authorized user's reasonable efforts to block the  installation of or disable software by causing software that the  authorized user has properly removed or disabled to automatically  reinstall or reactivate on the computer without the authorization of an  authorized user;
      (4)  Intentionally  misrepresent that software will be uninstalled or disabled by an  authorized user's action with knowledge that the software will not be  uninstalled or disabled; or
      (5)  Through  intentionally deceptive means remove, disable, or render inoperative  security, antispyware, or antivirus software installed on the computer.
(b)  A  person who is not an authorized user who with actual knowledge, with  conscious avoidance of actual knowledge, or willfully shall not:
      (1)  Cause computer software to be copied onto any computer in this state and use the software to take control of a computer by:
            (A)  Transmitting  or relaying without the authorization of an authorized user commercial  electronic mail or a computer virus from the consumer's computer;
            (B)  Accessing or using the authorized user's modem or Internet service for the purpose of causing:
                  (i)  Damage to the authorized user's computer; or
                  (ii)  An authorized user to incur financial charges for a service that is not authorized by the authorized user;
            (C)  Using  the consumer's computer as part of an activity performed by a group of  computers for the purpose of causing damage to another computer,  including, but not limited to, launching a denial of service attack; or
            (D)  Opening  multiple, sequential, stand-alone advertisements in the authorized  user's Internet browser without the authorization of an authorized user  and with knowledge that a reasonable computer user can not close the  advertisements without turning off the computer or closing the  authorized user's Internet browser;
      (2)  Without  authorization obtain the ability to use one (1) or more computers of  other end users on a network to send commercial electronic mail, to  damage other computers, or to locate other computers vulnerable to an  attack without:
            (A)  Notice to or knowledge of the owners of the computers or computer networks; or
            (B)  A  prior or existing personal, business, or contractual relationship with  the owner or owners of the computer or computer networks;
      (3)  Modify any of the following settings related to the computer's access to, or use of, the Internet:
            (A)  An  authorized user's security or other settings that protect information  about the authorized user for the purpose of stealing personal  information of an authorized user; or
            (B)  The security settings of the computer for the purpose of causing damage to one (1) or more computers;
      (4)  Prevent  without the authorization of an authorized user an authorized user's  reasonable efforts to block the installation of or disable software by  presenting the authorized user with an option to decline installation of  software with knowledge that when the option is selected by the  authorized user the installation nevertheless proceeds; or
      (5)  Intentionally interfere with an authorized user's attempt to uninstall the software by:
            (A)  Leaving  behind without authorization on the authorized user's computer for the  purpose of evading an authorized user's attempt to remove the software  from the computer hidden elements of the software that are designed to  and will reinstall the software or portions of the software;
            (B)  Intentionally causing damage to or removing any vital component of the operating system;
            (C)  Falsely representing that software has been disabled;
            (D)  Changing  the name, location, or other designation information of the software  for the purpose of preventing an authorized user from locating the  software to remove it;
            (E)  Using  randomized or intentionally deceptive file names, directory folders,  formats, or registry entries for the purpose of avoiding detection and  removal of the software by an authorized user;
            (F)  Causing  the installation of software in a particular computer directory or  computer memory for the purpose of evading an authorized user's attempt  to remove the software from the computer;
            (G)  Requiring completion of a survey to uninstall software unless reasonably related to the uninstallation; or
            (H)  Requiring  without the authority of the owner of the computer that an authorized  user obtain a special code or download a special program from a third  party to uninstall the software.
(c)  A person that is not an authorized user, with regard to any computer in this state, shall not:
      (1)  Induce  an authorized user to install a software component onto the computer by  intentionally misrepresenting that installing software is necessary for  security or privacy reasons or in order to open, view, or play a  particular type of content or software; or
      (2)  Deceptively  cause the copying and execution on the computer of a computer software  component with the intent of causing an authorized user to use the  component in a way that violates any other provision of this section.
(d)  No person shall engage in phishing.
(e)  A  person who is not an authorized user who with actual knowledge, with  conscious avoidance of actual knowledge, or willfully shall not cause  computer software to be copied onto any computer in this state to carry  out any of the violations described in subsections (a)-(d) of this  section for a purpose wholly unrelated to any of the purposes of the  software or service as described to the authorized user if the software  is installed in an intentionally deceptive manner that:
      (1)  Exploits a security vulnerability in the computer; or
      (2)  Bundles  the software with other software without providing prior notice to the  authorized user of the name of the software and that the software will  be installed on the computer.
(f)  Any  provision of a consumer contract that permits an intentionally  deceptive practice prohibited under this section is not enforceable.
(g)  This  section shall not apply to any monitoring of, or interaction with, a  subscriber's Internet or other network connection or service or a  protected computer in accordance with the relationship or agreement  between the owner of the computer or computer system used by the  authorized user and a:
      (1)  Telecommunications or Internet service provider;
      (2)  Cable Internet provider;
      (3)  Computer hardware or software provider; or
      (4)  Provider of information service or interactive computer service for:
            (A)  Network or computer security purposes;
            (B)  Diagnostics;
            (C)  Technical support;
            (D)  Repair;
            (E)  Authorized updates of software or system firmware;
            (F)  Authorized remote system management;
            (G)  Network management or maintenance; or
            (H)  Detection  or prevention of the unauthorized use or fraudulent or other illegal  activities in connection with a network, service, or computer software,  including scanning for and removing software proscribed under this  subchapter.
(h)  Notwithstanding any other provision of this chapter, the provisions of this chapter shall not apply to the installation of:
      (1)  Software that falls within the scope of a grant of authorization by an authorized user;
      (2)  An  upgrade to a software program that has already been installed on the  computer with the authorization of an authorized user; or
      (3)  Software before the first retail sale and delivery of the computer.