Subject: Texas Computer Crimes Law

Computer Crimes Law

In 1985, a computer crimes law for the state of  Texas  took
effect.   Under  this  state  law,  it  is  a  crime to make
unauthorized use of protected computer systems or data files
on  computers,  or to make intentionally harmful use of such
computers or data files.  The seriousness of  such  a  crime
ranges from Class B misdemeanor to third-degree felony.

The complete text of the  computer  crimes  chapter  of  the
Penal Code appears below. Instructors should make sure their
students are familiar with this law and the  consequences of
violating it.

              Texas Computer Crimes Statute

     SECTION 1. Title 7, Chapter 33, Texas Penal Code

    "Section 33.01.  DEFINITIONS.  In this chapter:
        "(1) 'Communications common carrier' means a person
who  owns  or operates a telephone system in this state that
includes  equipment  or  facilities  for   the   conveyance,
transmission,   or   reception  of  communications  and  who
receives compensation from persons who use that system.
        "(2) 'Computer' means  an  electronic  device  that
performs  logical,  arithmetic,  or  memory functions by the
manipulations  of  electronic  or  magnetic   impulses   and
includes   all   input,   output,  processing,  storage,  or
communications facilities that are connected or  related  to
the  device.  'Computer'  includes  a network of two or more
computers that are interconnected to function or communicate
together.
        "(3)  'Computer program' means an  ordered  set  of
data representing coded instructions or statements that when
executed by a computer cause the computer to process data or
perform specific functions.
        "(4)  'Computer security system' means the  design,
procedures,  or  other  measures that the person responsible
for the operation and use of a computer employs to  restrict
the  use  of  the  computer to particular persons or uses or
that the owner or licensee of data stored or maintained by a
computer in which the owner or licensee is entitled to store
or maintain the data employs to restrict access to the data.
        "(5)  'Data' means a representation of information,
knowledge,  facts,  concepts,  or instructions that is being
prepared or has been prepared in a formalized manner and  is
intended  to  be  stored  or  processed,  is being stored or
processed, or has been stored or processed  in  a  computer.
Data  may be embodied in any form, including but not limited
to  computer  printouts,   magnetic   storage   media,   and
punchcards, or may be stored internally in the memory of the
computer.
        "(6)  'Electric utility' has the  meaning  assigned
by  Subsection (c), Section 3, Public Utility Regulatory Act
(Article 1446c, Vernon's Texas Civil Statutes).

    "Section 33.02.  BREACH OF COMPUTER SECURITY.
    (a) A person commits an offense if the person:
        "(1) uses a computer without the effective  consent
of  the  owner  of  the  computer  or a person authorized to
license access to the computer  and  the  actor  knows  that
there  exists a computer security system intended to prevent
him from making that use of the computer; or
        "(2) gains access to data stored or maintained by a
computer  without  the  effective  consent  of  the owner or
licensee of the data and the actor knows that there exists a
computer  security  system  intended  to  prevent  him  from
gaining access to that data.
    "(b)   A  person  commits  an  offense  if  the  person
intentionally  or  knowingly  gives  a password, identifying
code, personal identification number, or other  confidential
information  about  a  computer  security  system to another
person without the effective consent of the person employing
the  computer  security  system  to  restrict  the  use of a
computer or to restrict access to data stored or  maintained
by a computer.
    "(c) An  offense  under  this  section  is  a  Class  A
misdemeanor.

    "Section 33.03.  HARMFUL ACCESS.
    (a)   A  person  commits  an  offense  if  the   person
intentionally or knowingly:
        "(1)   causes  a   computer   to   malfunction   or
interrupts the operation of a computer without the effective
consent of the owner of the computer or a person  authorized
to license access to the computer; or
        "(2)   alters,  damages,  or  destroys  data  or  a
computer  program  stored,  maintained,  or  produced  by  a
computer, without the effective  consent  of  the  owner  or
licensee of the data or computer program.
    "(b)  An offense under this section is:
        "(1) a Class B misdemeanor if the conduct  did  not
cause  any  loss  or  damage  or if the value of the loss or
damage caused by the conduct is less than $200;
        "(2)  a Class A misdemeanor if  the  value  of  the
loss  or  damage  caused  by the conduct is $200 or more but
less than $2,500; or
        "(3) a felony of the third degree if the  value  of
the loss or damage caused by the conduct is $2,500 or more.

    "Section  33.04.   DEFENSES.   It  is  an   affirmative
defense  to  prosecution  under  Sections 33.02 and 33.03 of
this code that the actor was an officer, employee, or  agent
of  a  communications common carrier or electric utility and
committed the proscribed  act  or  acts  in  the  course  of
employment  while  engaged  in an activity that is necessary
incident to the rendition of service or to the protection of
the  rights or property of the communications common carrier
or electric utility.

    "Section 33.05.  ASSISTANCE BY ATTORNEY  GENERAL.   The
attorney  general,  if  requested  to do so by a prosecuting
attorney,  may  assist  the  prosecuting  attorney  in   the
investigation  or  prosecution  of  an  offense  under  this
chapter or of any other  offense  involving  the  use  of  a
computer."