|
|
|
95TH GENERAL ASSEMBLY
State of Illinois
2007 and 2008 SB1199
Introduced 2/9/2007, by Sen. Dave Syverson SYNOPSIS AS INTRODUCED: |
|
|
Creates the Consumer Protection Against Computer Spyware Act. Sets forth provisions for unauthorized collection or culling of personally identifiable information, unauthorized access to or modifications of computer settings and computer damage, unauthorized interference with installation or disabling computer software, and other prohibited conduct. Provides that certain persons may bring a civil action against a violator of the Act. Provides civil penalties for violations of the Act. Permits the Attorney General to obtain a restraining order or injunction for violations of the Act.
|
| |
|
|
| FISCAL NOTE ACT MAY APPLY | |
|
|
A BILL FOR
|
|
|
|
|
SB1199 |
|
LRB095 10480 LCT 30695 b |
|
|
1 |
| AN ACT concerning business.
|
2 |
| Be it enacted by the People of the State of Illinois,
|
3 |
| represented in the General Assembly:
|
4 |
| Section 1. Short title. This Act may be cited as the |
5 |
| Consumer Protection Against Computer Spyware Act. |
6 |
| Section 5. Definitions. In this Act: |
7 |
| "Advertisement" means a communication that
includes the |
8 |
| promotion of a commercial product or service,
including |
9 |
| communication on an Internet website operated for a
commercial |
10 |
| purpose.
|
11 |
| "Cause computer software to be copied" means to
distribute |
12 |
| or transfer computer software or a component of computer
|
13 |
| software. The term does not include:
|
14 |
| (1) the transmission or routing of computer
software or |
15 |
| a component of the software;
|
16 |
| (2) the provision of intermediate temporary
storage or |
17 |
| caching of software;
|
18 |
| (3) the provision of a storage medium, such as a
|
19 |
| compact disk;
|
20 |
| (4) a website; |
21 |
| (5) the distribution of computer software by a
third |
22 |
| party through a computer server; or
|
23 |
| (6) the provision of an information location
tool, such |
|
|
|
SB1199 |
- 2 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| as a directory, index, reference, pointer, or hypertext
|
2 |
| link, through which the user of a computer is able to |
3 |
| locate
computer software.
|
4 |
| "Computer software" means a sequence of
instructions |
5 |
| written in a programming language that is executed on
a |
6 |
| computer. The term does not include:
|
7 |
| (1) a web page; or |
8 |
| (2) a data component of a web page that cannot be
|
9 |
| executed independently of that page.
|
10 |
| "Damage" means,
with respect to a computer, significant |
11 |
| impairment to the integrity or availability of data,
computer |
12 |
| software, a system, or information.
|
13 |
| "Execute" means, with respect to computer software,
to |
14 |
| perform a function or carry out instructions.
|
15 |
| "Keystroke-logging function" means a function of a
|
16 |
| computer software program that records all keystrokes made by a
|
17 |
| person using a computer and transfers that information from the
|
18 |
| computer to another person.
|
19 |
| "Owner or operator of a computer" means the owner
or lessee |
20 |
| of a computer or an individual using a computer with the
|
21 |
| authorization of the owner or lessee of the computer. "Owner or |
22 |
| operator of a computer" does not
include the person who owned |
23 |
| the computer before the date on which
the computer was sold if |
24 |
| a computer
was sold at retail.
|
25 |
| "Person" means any individual, partnership,
corporation, |
26 |
| limited liability company, or other organization or a
|
|
|
|
SB1199 |
- 3 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| combination of those organizations.
|
2 |
| "Personally identifiable information", with
respect to an |
3 |
| individual who is the owner or operator of a computer,
means:
|
4 |
| (1) the first name or first initial in combination
with |
5 |
| the last name;
|
6 |
| (2) a home or other physical address, including
street |
7 |
| name;
|
8 |
| (3) an electronic mail address; |
9 |
| (4) a credit or debit card number; |
10 |
| (5) a bank account number; |
11 |
| (6) a password or access code associated with a
credit |
12 |
| or debit card or bank account;
|
13 |
| (7) a social security number, tax identification
|
14 |
| number, driver's license number, passport number, or other
|
15 |
| government-issued identification number; or
|
16 |
| (8) any of the following information if the
information |
17 |
| alone or in combination with other information
personally |
18 |
| identifies the individual:
|
19 |
| (A) account balances; |
20 |
| (B) overdraft history; or |
21 |
| (C) payment history. |
22 |
| Section 10. Applicability of Act. |
23 |
| (a) Section
20, other than subdivision (1) of that Section, |
24 |
| and Sections
25 and 35 do not apply to a telecommunications |
25 |
| carrier,
cable operator, computer hardware or software |
|
|
|
SB1199 |
- 4 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| provider, or provider
of information service or interactive |
2 |
| computer service that
monitors or has interaction with a |
3 |
| subscriber's Internet or other
network connection or service or |
4 |
| a protected computer for the following:
|
5 |
| (1) network or computer security purposes; |
6 |
| (2) diagnostics, technical support, or repair
|
7 |
| purposes;
|
8 |
| (3) authorized updates of computer software or system
|
9 |
| firmware;
|
10 |
| (4) authorized remote system management; or |
11 |
| (5) detection or prevention of unauthorized use of or
|
12 |
| fraudulent or other illegal activities in connection with a
|
13 |
| network, service, or computer software, including scanning |
14 |
| for and
removing software proscribed under this Act.
|
15 |
| (b) This Act does not apply to the following: |
16 |
| (1) the use of a navigation device, any interaction
|
17 |
| with a navigation device, or the installation or use of |
18 |
| computer
software on a navigation device by a multichannel |
19 |
| video programming
distributor or video programmer in |
20 |
| connection with the provision of
multichannel video |
21 |
| programming or other services offered over a
multichannel |
22 |
| video programming system if the provision of the
|
23 |
| programming or other service is subject to 47 U.S.C. |
24 |
| Section 338
or 551; or
|
25 |
| (2) the collection or disclosure of subscriber
|
26 |
| information by a multichannel video programming |
|
|
|
SB1199 |
- 5 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| distributor or
video programmer in connection with the |
2 |
| provision of multichannel
video programming or other |
3 |
| services offered over a multichannel
video programming |
4 |
| system if the collection or disclosure of the
information |
5 |
| is subject to 47 U.S.C. Section 338 or 551.
|
6 |
| (c) In this Section, "multichannel video programming
|
7 |
| distributor" has the meaning assigned by 47 U.S.C. Section |
8 |
| 522(13).
|
9 |
| (d) A manufacturer or retailer of computer equipment shall |
10 |
| not be liable under this Act to the extent that the |
11 |
| manufacturer or retailer is providing third-party branded |
12 |
| software loaded on the equipment they are manufacturing or |
13 |
| selling. |
14 |
| Section 15. Unauthorized collection or culling of
|
15 |
| personally identifiable information. If a person is not the |
16 |
| owner
or operator of the computer, the person may not knowingly |
17 |
| cause
computer software to be copied to a computer in this |
18 |
| State and use
the software to do any of the following:
|
19 |
| (1) collect, through intentionally deceptive means: |
20 |
| (A) personally identifiable information by using
a |
21 |
| keystroke-logging function; or
|
22 |
| (B) personally identifiable information in a
|
23 |
| manner that correlates that information with |
24 |
| information regarding
all or substantially all of the |
25 |
| websites visited by the owner or
operator of the |
|
|
|
SB1199 |
- 6 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| computer, other than websites operated by the
person |
2 |
| collecting the information; or
|
3 |
| (2) gather, through intentionally deceptive means, the
|
4 |
| following kinds of personally identifiable information |
5 |
| from the
consumer's computer hard drive for a purpose |
6 |
| wholly unrelated to
any of the purposes of the software or |
7 |
| service described to an owner
or operator of the computer:
|
8 |
| (A) a credit or debit card number; |
9 |
| (B) a bank account number; |
10 |
| (C) a password or access code associated with a
|
11 |
| credit or debit card number or a bank account;
|
12 |
| (D) a social security number; |
13 |
| (E) account balances; or |
14 |
| (F) overdraft history. |
15 |
| Section 20. Unauthorized access to or modifications of
|
16 |
| computer settings; computer damage. If a person is not the |
17 |
| owner or
operator of the computer, the person may not knowingly |
18 |
| cause
computer software to be copied to a computer in this |
19 |
| State and use
the software to do any of the following:
|
20 |
| (1) Modify, through intentionally deceptive means, a
|
21 |
| setting that controls:
|
22 |
| (A) the page that appears when an Internet
browser |
23 |
| or a similar software program is launched to access and
|
24 |
| navigate the Internet;
|
25 |
| (B) the default provider or web proxy used to
|
|
|
|
SB1199 |
- 7 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| access or search the Internet; or
|
2 |
| (C) a list of bookmarks used to access web pages. |
3 |
| (2) Take control of the computer by: |
4 |
| (A) accessing or using the computer's modem or
|
5 |
| Internet service to:
|
6 |
| (i) cause damage to the computer; |
7 |
| (ii) cause the owner or operator of the
|
8 |
| computer to incur financial charges for a service |
9 |
| not previously
authorized by the owner or |
10 |
| operator; or
|
11 |
| (iii) cause a third party affected by the
|
12 |
| conduct to incur financial charges for a service |
13 |
| not previously
authorized by the third party; or
|
14 |
| (B) opening, without the consent of the owner or
|
15 |
| operator of the computer, an advertisement that:
|
16 |
| (i) is in the owner's or operator's Internet
|
17 |
| browser in a multiple, sequential, or stand-alone |
18 |
| form; and
|
19 |
| (ii) cannot be closed by an ordinarily
|
20 |
| reasonable person using the computer without |
21 |
| closing the browser or
shutting down the computer.
|
22 |
| (3) Modify settings on the computer that relate to
|
23 |
| access to or use of the Internet and protection of |
24 |
| information for
purposes of stealing personally |
25 |
| identifiable information of the
owner or operator of the |
26 |
| computer.
|
|
|
|
SB1199 |
- 8 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| (4) Modify security settings on the computer relating
|
2 |
| to access to or use of the Internet for purposes of causing |
3 |
| damage
to one or more computers.
|
4 |
| Section 25. Unauthorized interference with installation
or |
5 |
| disabling of computer software. If a person is not the owner or
|
6 |
| operator of the computer, the person may not knowingly cause
|
7 |
| computer software to be copied to a computer in this State and |
8 |
| use
the software to do any of the following:
|
9 |
| (1) Prevent, through intentionally deceptive means,
|
10 |
| reasonable efforts of the owner or operator of the computer |
11 |
| to block
the installation or execution of or to disable |
12 |
| computer software by
causing computer software that the |
13 |
| owner or operator has properly
removed or disabled to |
14 |
| automatically reinstall or reactivate on the
computer.
|
15 |
| (2) Intentionally misrepresent to another that
|
16 |
| computer software will be uninstalled or disabled by the |
17 |
| actions of
the owner or operator of the computer.
|
18 |
| (3) Remove, disable, or render inoperative, through
|
19 |
| intentionally deceptive means, security, antispyware, or |
20 |
| antivirus
computer software installed on the computer. |
21 |
| (4) Prevent the owner's or operator's reasonable
|
22 |
| efforts to block the installation of or to disable computer
|
23 |
| software by:
|
24 |
| (A) presenting the owner or operator with an
option |
25 |
| to decline the installation of software knowing that, |
|
|
|
SB1199 |
- 9 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| when
the option is selected, the installation process |
2 |
| will continue to
proceed; or
|
3 |
| (B) misrepresenting that software has been
|
4 |
| disabled.
|
5 |
| (5) Change the name, location, or other designation of
|
6 |
| computer software to prevent the owner from locating and |
7 |
| removing
the software.
|
8 |
| (6) Create randomized or intentionally deceptive file
|
9 |
| names or random or intentionally deceptive directory |
10 |
| folders,
formats, or registry entries to avoid detection |
11 |
| and prevent the
owner from removing computer software.
|
12 |
| Section 30. Knowing violation. A person knowingly
violates |
13 |
| Section 15, 20, or 25 if the person does either of the |
14 |
| following:
|
15 |
| (1) acts with actual knowledge of the facts that
|
16 |
| constitute the violation; or
|
17 |
| (2) consciously avoids information that would
|
18 |
| establish actual knowledge of those facts.
|
19 |
| Section 35. Other prohibited conduct. If a person is not
|
20 |
| the owner or operator of the computer, the person may not do |
21 |
| any of the following:
|
22 |
| (1) induce the owner or operator of a computer in this
|
23 |
| State to install a computer software component to the |
24 |
| computer by
intentionally misrepresenting the extent to |
|
|
|
SB1199 |
- 10 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| which the installation
is necessary for security or privacy |
2 |
| reasons, to open or view text,
or to play a particular type |
3 |
| of musical or other content; or
|
4 |
| (2) copy and execute or cause the copying and
execution |
5 |
| of a computer software component to a computer in this
|
6 |
| State in a deceptive manner with the intent of causing the |
7 |
| owner or
operator of the computer to use the component in a |
8 |
| manner that
violates this Act.
|
9 |
| Section 40. Deceptive act or omission. For purposes of
this |
10 |
| Act, a person is considered to have acted through
intentionally |
11 |
| deceptive means if the person, with the intent to
deceive an |
12 |
| owner or operator of a computer, does any of the following:
|
13 |
| (1) intentionally makes a materially false or
|
14 |
| fraudulent statement;
|
15 |
| (2) intentionally makes a statement or uses a
|
16 |
| description that omits or misrepresents material |
17 |
| information; or
|
18 |
| (3) intentionally and materially fails to provide to
|
19 |
| the owner or operator any notice regarding the installation |
20 |
| or
execution of computer software.
|
21 |
| Section 45. Civil remedy. |
22 |
| (a) The following persons, if
adversely affected by the |
23 |
| violation, may bring a civil action
against a person who |
24 |
| violates this Act:
|
|
|
|
SB1199 |
- 11 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| (1) a provider of computer hardware or software; |
2 |
| (2) an owner of a web page or trademark; |
3 |
| (3) a telecommunications carrier; |
4 |
| (4) a cable operator; or |
5 |
| (5) an Internet service provider. |
6 |
| (b) In addition to any other remedy provided by law and
|
7 |
| except as provided by subsection (g) of this Section, a person |
8 |
| bringing an action
under this Section may:
|
9 |
| (1) seek injunctive relief to restrain the violator
|
10 |
| from continuing the violation;
|
11 |
| (2) recover damages in an amount equal to the greater
|
12 |
| of:
|
13 |
| (A) actual damages arising from the violation; or |
14 |
| (B) $100,000 for each violation of the same
nature; |
15 |
| or
|
16 |
| (3) both seek injunctive relief and recover damages as
|
17 |
| provided by this subsection (b).
|
18 |
| (c) The circuit court may increase an award of actual |
19 |
| damages in an
action brought under subsection (b) to an amount |
20 |
| not to exceed 3
times the actual damages sustained if the court |
21 |
| finds that the
violations have occurred with a frequency as to |
22 |
| constitute a
pattern or practice.
|
23 |
| (d) A plaintiff who prevails in an action filed under
|
24 |
| subsection (b) is entitled to recover reasonable attorneys' |
25 |
| fees
and court costs.
|
26 |
| (e) Each separate violation of this Act is an actionable
|
|
|
|
SB1199 |
- 12 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| violation.
|
2 |
| (f) For purposes of subsection (b), violations are of the
|
3 |
| same nature if the violations consist of the same course of |
4 |
| conduct
or action, regardless of the number of times the |
5 |
| conduct or act
occurred.
|
6 |
| (g) In the case of a violation of Section 20 that causes
a |
7 |
| telecommunications carrier or cable operator to incur costs for
|
8 |
| the origination, transportation, or termination of a call |
9 |
| triggered
using the modem of a customer of the |
10 |
| telecommunications carrier or
cable operator as a result of the |
11 |
| violation and in addition to any
other remedy provided by law, |
12 |
| a telecommunications carrier or cable
operator bringing an |
13 |
| action under this Section may:
|
14 |
| (1) apply to a court for an order to enjoin the
|
15 |
| violation;
|
16 |
| (2) recover the charges the telecommunications
carrier |
17 |
| or cable operator is obligated to pay to a
|
18 |
| telecommunications carrier, a cable operator, an other |
19 |
| provider of
transmission capability, or an information |
20 |
| service provider as a
result of the violation, including |
21 |
| charges for the origination,
transportation, or |
22 |
| termination of the call;
|
23 |
| (3) recover the costs of handling customer inquiries
or |
24 |
| complaints with respect to amounts billed for calls as a |
25 |
| result
of the violation;
|
26 |
| (4) recover other costs, including court costs, and
|
|
|
|
SB1199 |
- 13 - |
LRB095 10480 LCT 30695 b |
|
|
1 |
| reasonable attorneys' fees; or
|
2 |
| (5) both apply for injunctive relief and recover
|
3 |
| charges and other costs as provided by this subsection (g).
|
4 |
| Section 50. Civil penalty; injunction. |
5 |
| (a) A person who
violates this Act is liable to the State |
6 |
| for a civil penalty in
an amount not to exceed $100,000 for |
7 |
| each violation. The Attorney
General may bring suit to recover |
8 |
| the civil penalty imposed by this
subsection (a).
|
9 |
| (b) If it appears to the Attorney General that a person is
|
10 |
| engaging in, has engaged in, or is about to engage in conduct |
11 |
| that
violates this Act, the Attorney General may bring an |
12 |
| action in
the name of this State against the person to restrain |
13 |
| the violation
by a temporary restraining order or a permanent |
14 |
| or temporary
injunction.
|
15 |
| (c) The Attorney General is entitled to recover reasonable
|
16 |
| expenses incurred in obtaining injunctive relief, civil |
17 |
| penalties,
or both under this Section, including reasonable |
18 |
| attorney's fees
and court costs.
|