§ 33.02. Breach of Computer Security
(a) A person commits an offense if the person knowingly accesses a computer, computer network, or computer system without the effective consent of the owner.
(b) An offense under this section is a Class B misdemeanor unless in committing the offense the actor knowingly obtains a benefit, defrauds or harms another, or alters, damages, or deletes property, in which event the offense is:
(1) a Class A misdemeanor if the aggregate amount involved is less than $1,500;
(2) a state jail felony if:
(A) the aggregate amount involved is $1,500 or more but less than $20,000; or
(B) the aggregate amount involved is less than $1,500 and the defendant has been previously convicted two or more times of an offense under this chapter;
(3) a felony of the third degree if the aggregate amount involved is $20,000 or more but less than $100,000;
(4) a felony of the second degree if the aggregate amount involved is $100,000 or more but less than $200,000; or
(5) a felony of the first degree if the aggregate amount involved is $200,000 or more.
(c) When benefits are obtained, a victim is defrauded or harmed, or property is altered, damaged, or deleted in violation of this section, whether or not in a single incident, the conduct may be considered as one offense and the value of the benefits obtained and of the losses incurred because of the fraud, harm, or alteration, damage, or deletion of property may be aggregated in determining the grade of the offense.
(d) A person who his subject to prosecution under this section and any other section of this code may be prosecuted under either or both sections.
Added by Acts 1985, 69th Leg., ch. 600, Sec. 1, eff. Sept. 1, 1985. Amended by Acts 1989, 71st Leg., ch. 306, Sec. 2, eff. Sept. 1, 1989; Acts 1993, 73rd Leg., ch. 900, Sec. 1.01, eff. Sept. 1, 1994; Acts 1997, 75th Leg., ch. 306, Sec. 2, eff. Sept. 1, 1997; Acts 2001, 77th Leg., ch. 1411, Sec. 1, eff. Sept. 1, 2001.
In this chapter:
(1) "Access" means to approach, instruct, communicate with, store data in, retrieve or intercept data from, alter data or computer software in, or otherwise make use of any resource of a computer, computer network, computer program, or computer system.
(2) "Aggregate amount" means the amount of:
(A) any direct or indirect loss incurred by a victim, including the value of money, property, or service stolen or rendered unrecoverable by the offense; or
(B) any expenditure required by the victim to verify that a computer, computer network, computer program, or computer system was not altered, acquired, damaged, deleted, or disrupted by the offense.
(3) "Communications common carrier" means a person who owns or operates a telephone system in this state that includes equipment or facilities for the conveyance, transmission, or reception of communications and who receives compensation from persons who use that system.
(4) "Computer" means an electronic, magnetic, optical, electrochemical, or other high-speed data processing device that performs logical, arithmetic, or memory functions by the manipulations of electronic or magnetic impulses and includes all input, output, processing, storage, or communication facilities that are connected or related to the device.
(5) "Computer network" means the interconnection of two or more computers or computer systems by satellite, microwave, line, or other communication medium with the capability to transmit information among the computers.
(6) "Computer program" means an ordered set of data representing coded instructions or statements that when executed by a computer cause the computer to process data or perform specific functions.
(7) "Computer services" means the product of the use of a computer, the information stored in the computer, or the personnel supporting the computer, including computer time, data processing, and storage functions.
(8) "Computer system" means any combination of a computer or computer network with the documentation, computer software, or physical facilities supporting the computer or computer network.
(9) "Computer software" means a set of computer programs, procedures, and associated documentation related to the operation of a computer, computer system, or computer network.
(10) "Computer virus" means an unwanted computer program or other set of instructions inserted into a computer's memory, operating system, or program that is specifically constructed with the ability to replicate itself or to affect the other programs or files in the computer by attaching a copy of the unwanted program or other set of instructions to one or more computer programs or files.
(11) "Data" means a representation of information, knowledge, facts, concepts, or instructions that is being prepared or has been prepared in a formalized manner and is intended to be stored or processed, is being stored or processed, or has been stored or processed in a computer. Data may be embodied in any form, including but not limited to computer printouts, magnetic storage media, laser storage media, and punchcards, or may be stored internally in the memory of the computer.
(12) "Effective consent" includes consent by a person legally authorized to act for the owner. Consent is not effective if:
(A) induced by deception, as defined by Section 31.01, or induced by coercion;
(B) given by a person the actor knows is not legally authorized to act for the owner;
(C) given by a person who by reason of youth, mental disease or defect, or intoxication is known by the actor to be unable to make reasonable property dispositions;
(D) given solely to detect the commission of an offense; or
(E) used for a purpose other than that for which the consent was given.
(13) "Electric utility" has the meaning assigned by Section 31.002, Utilities Code.
(14) "Harm" includes partial or total alteration, damage, or erasure of stored data, interruption of computer services, introduction of a computer virus, or any other loss, disadvantage, or injury that might reasonably be suffered as a result of the actor's conduct.
(15) "Owner" means a person who:
(A) has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor;
(B) has the right to restrict access to the property; or
(C) is the licensee of data or computer software.
(16) "Property" means:
(A) tangible or intangible personal property including a computer, computer system, computer network, computer software, or data; or
(B) the use of a computer, computer system, computer network, computer software, or data.
Added by Acts 1985, 69th Leg., ch. 600, Sec. 1, eff. Sept. 1, 1985. Amended by Acts 1989, 71st Leg., ch. 306, Sec. 1, eff. Sept. 1, 1989; Acts 1993, 73rd Leg., ch. 900, Sec. 1.01, eff. Sept. 1, 1994; Acts 1997, 75th Leg., ch. 306, Sec. 1, eff. Sept. 1, 1997; Acts 1999, 76th Leg., ch. 62, Sec. 18.44, eff. Sept. 1, 1999.
Note about Punishments:
A Class "A" Misdemeanor is punishable by up to one year in the County Jail and a fine up to $4,000.
A State Jail Felony is punishable by between 180 days and 2 years in a State Jail Facility and a fine up to $10,000.
A 3rd Degree Felony is punishable by up between 2 and 10 years in the State Prison, or up to one year in a community based correctional facility, and a fine up to $10,000.
§ 33.03. Defenses
It is an affirmative defense to prosecution under Section 33.02 that the actor was an officer, employee, or agent of a communications common carrier or electric utility and committed the proscribed act or acts in the course of employment while engaged in an activity that is a necessary incident to the rendition of service or to the protection of the rights or property of the communications common carrier or electric utility.
Texas Code of Criminal Procedure
Art. 13.25. Computer crimes
(a) In this section "access," "computer," "computer network," "computer program," "computer system," and "owner" have the meanings assigned to those terms in Section 33.01, Penal Code.
(b) An offense under Chapter 33, Penal Code, may be prosecuted in:
- the county of the principal place of business of the owner or lessee of a computer, computer system, or computer network involved in the violation;
- any county in which a defendant had control or possession of any proceeds from the violation or any books, records, documents, property, negotiable instruments, computer programs, or other material that were used in furtherance of the violation; or
- any county from which, to which, or through which any access to a computer or computer network was made, whether by wires, electromagnetic waves, microwaves, or any other means of communication.
§ 33.04. Assistance by Attorney General
The attorney general, if requested to do so by a prosecuting attorney, may assist the prosecuting attorney in the investigation or prosecution of an offense under this chapter or of any other offense involving the use of a computer.
Texas Civil Practice and Remedies Code:
Article 143.001. Cause of Action
(a) A person who is injured or whose property has been injured as a result of a violation under Chapter 33, Penal Code, has a civil cause of action if the conduct constituting the violation was committed knowingly or intentionally.
(b) A person must bring suit for damages under this section before the earlier of the fifth anniversary of the date of the last act in the course of the conduct constituting a violation under Chapter 33, Penal Code, or the second anniversary of the date the claimant first discovered or had reasonable opportunity to discover the violation.
Article 143.002. Damages
A person who establishes a cause of action under this chapter is entitled to:
(1) actual damages; and
(2) reasonable attorney's fees and costs.
These offenses were originally effective September 1, 1985, and were substantially changed effective September 1, 1994. The version provided is the current version.