Current through Pa Acts 2024-53, 2024-56 through 2024-111
Section 2330.4 - Control or modificationA person or entity that is not an authorized user shall not, with actual knowledge, with conscious avoidance of actual knowledge or willfully, cause computer software to be copied or procure the copying onto the computer of an authorized user in this Commonwealth and use the software to do any of the following acts or any other acts deemed to be deceptive:
(1) Take control of the authorized user's computer by doing any of the following:(i) Transmitting or relaying commercial electronic mail or a computer virus from the authorized user's computer where the transmission or relaying is initiated by a person other than the authorized user and without the authorization of an authorized user.(ii) Accessing or using the authorized user's modem or Internet service for the purpose of causing damage to the authorized user's computer or of causing an authorized user to incur financial charges for a service that is not authorized by an authorized user.(iii) Using the authorized user's computer as part of an activity performed by a group of computers for the purpose of causing damage to another computer, including, but not limited to, launching a denial of service attack.(iv) Opening a series of stand-alone messages in the authorized user's computer without the authorization of an authorized user and with knowledge that a reasonable computer user cannot close the advertisements without turning off the computer or closing the Internet application.(2) Modify any of the following settings related to the computer's access to or use of the Internet:(i) An authorized user's security or other settings that protect information about the authorized user for the purpose of stealing personal information of an authorized user.(ii) The security settings of the computer for the purpose of causing damage to one or more computers.(3) Prevent, without the authorization of an authorized user, an authorized user's reasonable efforts to block the installation of or to disable software by doing any of the following: (i) Presenting the authorized user with an option to decline installation of software with knowledge that, when the option is selected by the authorized user, the installation nevertheless proceeds.(ii) Falsely representing that software has been disabled.(iii) Requiring, in a deceptive manner, the user to access the Internet to remove the software with knowledge or reckless disregard of the fact that the software frequently operates in a manner that prevents the user from accessing the Internet.(iv) Changing the name, location or other designation information of the software for the purpose of preventing an authorized user from locating the software to remove it.(v) Using randomized or deceptive file names, directory folders, formats or registry entries for the purpose of avoiding detection and removal of the software by an authorized user.(vi) Causing the installation of software in a particular computer directory or computer memory for the purpose of evading authorized users' attempts to remove the software from the computer.(vii) Requiring, without the authority of the owner of the computer, that an authorized user obtain a special code or download software from a third party to uninstall the software.2010, Oct. 27, P.L. 855, No. 86, §4, effective in 60 days [ 12/27/2010].