109TH CONGRESS 1ST SESSION. discourage spyware, and for other purposes. To amend title 18, United States Code, to AN ACT H. R. 744



Similar documents
COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec Fraud and related activity in connection with computers

Section Fraud and related activity in connection with identification documents and information

H. R AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

Computer Fraud & Abuse Act

TITLE I FORMER VICE PRESIDENT PROTECTION ACT

R IN THE HOUSE OF REPRESENTATIVES

18 USC NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

H. R AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

H. R. IN THE HOUSE OF REPRESENTATIVES A BILL

CYBERCRIME LAWS OF THE UNITED STATES Compiled October 2006 by Al Rees, CCIPS

Updated Administration Proposal: Law Enforcement Provisions

Cybercrime: A Sketch of 18 U.S.C and Related Federal Criminal Laws

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

H. R AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

PUBLIC LAW OCT. 30, 1998 PROTECTION OF CHILDREN FROM SEXUAL PREDATORS

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

Chapter IDENTITY AND ACCESS DEVICE CRIMES. Table of Instructions

REAL ID Act Title II H.R.1268

Legislative Language. Law Enforcement Provisions Related to Computer Security

State Laws Legalizing Marijuana Do Not Make Marijuana Legal Under

H. R IN THE HOUSE OF REPRESENTATIVES

[Discussion Draft] [DISCUSSION DRAFT] H. R. ll

Foreign Corrupt Practices Act Amendments 1

S. ll IN THE SENATE OF THE UNITED STATES A BILL

H. R AN ACT. To repeal the prohibition on the payment of interest on demand deposits, and for other purposes.

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

State Enforcement of Privacy Laws. Phil Ziperman. Mark Pacella. Allen Brandt, CIPP/US, CIPP/E

INTELLECTUAL PROPERTY PROTECTION AND COURTS AMENDMENTS ACT OF 2004

H. R. 529 AN ACT. To amend the Internal Revenue Code of 1986 to improve 529 plans.

No An act relating to unfair business practices of credit card companies and fraudulent use of scanning devices and re-encoders. (S.

HOUSE BILL 184. By Swann BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE:

SOCIAL SECURITY NUMBER PRIVACY ACT (EXCERPT) Act 454 of This act shall be known and may be cited as the "social security number privacy act".

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

Internal Revenue Code Amending Bill Introduced

Small Business Administration Grants - Section 107

PUBLIC LAW JUNE 18, 1997 VOLUNTEER PROTECTION ACT OF 1997

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

H. R IN THE SENATE OF THE UNITED STATES

S. ll. To provide appropriate protection to attorney-client privileged communications and attorney work product. IN THE SENATE OF THE UNITED STATES

Please see Section IX. for Additional Information:

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL

UNITED STATES OF AMERICA ) ) No. vs. ) ) Violation: Title 18, United States ) Code, Section 1832(a) DAVID JACOB NEWMAN ) COUNT ONE

Chapter No. 911] PUBLIC ACTS, CHAPTER NO. 911 HOUSE BILL NO. 3403

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

S AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

First Regular Session Sixty-ninth General Assembly STATE OF COLORADO INTRODUCED HOUSE SPONSORSHIP

Anti-Bribery and Books & Records Provisions of. The Foreign Corrupt Practices Act. Current through Pub. L (November 10, 1998)

ASSEMBLY BILL No. 335

Legislative Language

Public Law th Congress An Act

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

ENGROSSED ORIGINAL A BILL IN THE COUNCIL OF THE DISTRICT OF COLUMBIA

Public Law th Congress An Act

How To Protect Women From Domestic Violence

(S.1) It is hereby enacted by the General Assembly of the State of Vermont: Sec. 1. CRIMINAL OFFENSE CLASSIFICATION WORKING GROUP

Senate Bill No. 86 Committee on Transportation and Homeland Security

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

Senate Bill 50 (S-1) would amend the Code of Criminal Procedure to add the felonies proposed by Senate Bill 49 (S-1) to the sentencing guidelines.

FOREIGN CORRUPT PRACTICES ACT ANTIBRIBERY PROVISIONS

PROPOSED AMENDMENT SENATE AMENDMENTS TO S.B (Reference to printed bill) EACH COUNTY SHALL MAINTAIN A WEBSITE LINK ON THE COUNTY'S WEBSITE TO

SENATE FILE NO. SF0083. Senator(s) Peterson and Representative(s) Harvey A BILL. for. AN ACT relating to Medicaid; creating the Wyoming Medicaid

TITLE I STANDARDS DEVELOPMENT ORGANIZATION ADVANCEMENT ACT OF 2004

S. ll. To amend the Internal Revenue Code of 1986 to prevent identity theft related tax refund fraud, and for other purposes.

In an age where so many businesses and systems are reliant on computer systems,

(No ) (Approved December 27, 2011) AN ACT

(CHRI) CHECKS OF INDIVIDUALS CONDUCTING BUSINESS IN THE AREA OF INSURANCE AND; 2.)

A Bill Regular Session, 2005 HOUSE BILL 2904

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

ASSEMBLY BILL No. 1437

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX (210) OFFICE (210) FAX

H. R IN THE SENATE OF THE UNITED STATES. OCTOBER 7, 2004 Received AN ACT

PUBLIC LAW AUG. 3, 1996 NATIONAL GAMBLING IMPACT STUDY COMMISSION ACT

FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE

COUNT 1. The SPECIAL AUGUST 2012 GRAND JURY charges: a. Allscripts Healthcare Solutions, Inc. was a Chicago-based

Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section Terms, defined.

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 S 1 SENATE BILL 655. Short Title: Dentistry Management Arrangements. (Public)

Foreign Corrupt Practices Act ( FCPA )

PART VIII. AUTOMATED CRIMINAL JUSTICE INFORMATION SYSTEMS

H. R IN THE HOUSE OF REPRESENTATIVES

b Issued by document (ID) 31 Total price if different from item 29 $.00

First Regular Session Seventieth General Assembly STATE OF COLORADO INTRODUCED SENATE SPONSORSHIP

FEDE DOMESTIC VIOLENCE STATUTES AND ELEMENTS FOR FEDERAL PROSECUTION

S AN ACT. To codify an existing operations center for cybersecurity.

ASSEMBLY BILL No. 1521

Public Law th Congress An Act

Michie's Legal Resources. This part shall be known and may be cited as the Tennessee Identity Theft Deterrence Act of [Acts 1999, ch. 201, 2.

S. 63 IN THE SENATE OF THE UNITED STATES

The General Assembly of the Commonwealth of Pennsylvania hereby enacts as follows:

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

No. 76. An act relating to civil penalties for possession of marijuana. (H.200) It is hereby enacted by the General Assembly of the State of Vermont:

House Substitute for SENATE BILL No. 117

H. R Subtitle D Privacy

Public Law th Congress An Act

Legislative Council, State of Michigan Courtesy of History: 2000, Act 305, Imd. Eff. Oct. 16, 2000.

NORTH CAROLINA GENERAL ASSEMBLY 1981 SESSION CHAPTER 956 HOUSE BILL 89

Transcription:

09TH CONGRESS 1ST SESSION H. R. 7 AN ACT To amend title 18, United States Code, to discourage spyware, and for other purposes.

09TH CONGRESS 1ST SESSION H. R. 7 AN ACT To amend title 18, United States Code, to discourage spyware, and for other purposes. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 SECTION 1. SHORT TITLE. This Act may be cited as the Internet Spyware (I- SPY) Prevention Act of 00. SEC.. PENALTIES FOR CERTAIN UNAUTHORIZED ACTIVI- TIES RELATING TO COMPUTERS. (a) IN GENERAL. Chapter 7 of title 18, is amended by inserting after section 100 the following: 100A. Illicit indirect use of protected computers (a) Whoever intentionally accesses a protected computer without authorization, or exceeds authorized access to a protected computer, by causing a computer program or code to be copied onto the protected computer, and intentionally uses that program or code in furtherance of another Federal criminal offense shall be fined under this title or imprisoned not more than years, or both. (b) Whoever intentionally accesses a protected computer without authorization, or exceeds authorized access to a protected computer, by causing a computer program or code to be copied onto the protected computer, and by means of that program or code (1) intentionally obtains, or transmits to another, personal information with the intent to defraud or injure a person or cause damage to a protected computer; or () intentionally impairs the security protection of the protected computer with the intent to de- HR 7 EH

7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 fraud or injure a person or damage a protected computer; shall be fined under this title or imprisoned not more than years, or both. (c) No person may bring a civil action under the law of any State if such action is premised in whole or in part upon the defendant s violating this section. For the purposes of this subsection, the term State includes the District of Columbia, Puerto Rico, and any other territory or possession of the United States. (d) As used in this section (1) the terms protected computer and exceeds authorized access have, respectively, the meanings given those terms in section 100; and () the term personal information means (A) a first and last name; (B) a home or other physical address, including street name; (C) an electronic mail address; (D) a telephone number; (E) a Social Security number, tax identification number, drivers license number, passport number, or any other government-issued identification number; or HR 7 EH

7 8 9 10 11 1 (F) a credit card or bank account number or any password or access code associated with a credit card or bank account. (e) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.. (b) CONFORMING AMENDMENT. The table of sections at the beginning of chapter 7 of title 18, is amended by inserting after the item relating to section 100 the following new item: 100A. Illicit indirect use of protected computers.. 1 1 1 1 17 18 19 0 1 SEC.. AUTHORIZATION OF APPROPRIATIONS. In addition to any other sums otherwise authorized to be appropriated for this purpose, there are authorized to be appropriated for each of fiscal years 00 through 009, the sum of $10,000,000 to the Attorney General for prosecutions needed to discourage the use of spyware and the practices commonly called phishing and pharming. SEC.. FINDINGS AND SENSE OF CONGRESS CONCERNING THE ENFORCEMENT OF CERTAIN CYBERCRIMES. (a) FINDINGS. Congress makes the following findings: HR 7 EH

7 8 9 10 11 1 1 1 1 1 17 18 19 0 1 (1) Software and electronic communications are increasingly being used by criminals to invade individuals and businesses computers without authorization. () Two particularly egregious types of such schemes are the use of spyware and phishing scams. () These schemes are often used to obtain personal information, such as bank account and credit card numbers, which can then be used as a means to commit other types of theft. () In addition to the devastating damage that these heinous activities can inflict on individuals and businesses, they also undermine the confidence that citizens have in using the Internet. () The continued development of innovative technologies in response to consumer demand is crucial in the fight against spyware. (b) SENSE OF CONGRESS. Because of the serious nature of these offenses, and the Internet s unique importance in the daily lives of citizens and in interstate commerce, it is the sense of Congress that the Department of Justice should use the amendments made by this Act, and all other available tools, vigorously to prosecute those HR 7 EH

who use spyware to commit crimes and those that conduct phishing and pharming scams. Passed the House of Representatives May, 00. Attest: Clerk. HR 7 EH