This website will be unavailable from Friday, April 26, 2024 at 6:00 p.m. through Monday, April 29, 2024 at 7:00 a.m. due to data center maintenance.

 
 
  H.B. No. 3396
 
 
 
 
AN ACT
  relating to the prosecution of and punishment for the offense of
  breach of computer security.
         BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
         SECTION 1.  Section 33.01, Penal Code, is amended by adding
  Subdivisions (10-a) and (14-a) to read as follows:
               (10-a)  "Critical infrastructure facility" means:
                     (A)  a chemical manufacturing facility;
                     (B)  a refinery;
                     (C)  an electrical power generating facility,
  substation, switching station, electrical control center, or
  electrical transmission or distribution facility;
                     (D)  a water intake structure, water treatment
  facility, wastewater treatment plant, or pump station;
                     (E)  a natural gas transmission compressor
  station;
                     (F)  a liquid natural gas terminal or storage
  facility;
                     (G)  a telecommunications central switching
  office;
                     (H)  a port, railroad switching yard, trucking
  terminal, or other freight transportation facility;
                     (I)  a gas processing plant, including a plant
  used in the processing, treatment, or fractionation of natural gas;
                     (J)  a transmission facility used by a federally
  licensed radio or television station; or
                     (K)  a cable television or video service provider
  headend.
               (14-a)  "Identifying information" has the meaning
  assigned by Section 32.51.
         SECTION 2.  Section 33.02, Penal Code, is amended by
  amending Subsections (b) and (d) and adding Subsections (b-1),
  (b-2), and (e) to read as follows:
         (b)  An offense under Subsection (a) [this section] is a
  Class B misdemeanor, except that the offense is a state jail felony
  if:
               (1)  the defendant has been previously convicted two or
  more times of an offense under this chapter; or
               (2)  the computer, computer network, or computer system
  is owned by the government or a critical infrastructure facility.
         (b-1)  A person commits an offense if with the intent to 
  defraud [unless in committing the offense the actor knowingly
  obtains a benefit, defrauds] or harm [harms] another[,] or alter 
  [alters], damage [damages], or delete [deletes] property, the
  person knowingly accesses a computer, computer network, or computer
  system without the effective consent of the owner.
         (b-2)  An offense under Subsection (b-1) [in which event the
  offense] is:
               (1)  [a Class A misdemeanor if the aggregate amount
  involved is less than $1,500;
               [(2)]  a state jail felony if [:
                     [(A)]  the aggregate amount involved is [$1,500 or
  more but] less than $20,000[; or
                     [(B)     the aggregate amount involved is less than
  $1,500 and the defendant has been previously convicted two or more
  times of an offense under this chapter];
               (2) [(3)]  a felony of the third degree if the
  aggregate amount involved is $20,000 or more but less than
  $100,000;
               (3) [(4)]  a felony of the second degree if:
                     (A)  the aggregate amount involved is $100,000 or
  more but less than $200,000;
                     (B)  the aggregate amount involved is any amount
  less than $200,000 and the computer, computer network, or computer
  system is owned by the government or a critical infrastructure
  facility; or
                     (C)  the actor obtains the identifying
  information of another by accessing only one computer, computer
  network, or computer system; or
               (4) [(5)]  a felony of the first degree if:
                     (A)  the aggregate amount involved is $200,000 or
  more; or
                     (B)  the actor obtains the identifying
  information of another by accessing more than one computer,
  computer network, or computer system.
         (d)  A person who is [his] subject to prosecution under this
  section and any other section of this code may be prosecuted under
  either or both sections.
         (e)  It is a defense to prosecution under this section that
  the person acted with the intent to facilitate a lawful seizure or
  search of, or lawful access to, a computer, computer network, or
  computer system for a legitimate law enforcement purpose.
         SECTION 3.  The change in law made by this Act applies only
  to an offense committed on or after the effective date of this Act.  
  An offense committed before the effective date of this Act is
  covered by the law in effect when the offense was committed, and the
  former law is continued in effect for that purpose.  For purposes of
  this section, an offense was committed before the effective date of
  this Act if any element of the offense occurred before that date.
         SECTION 4.  This Act takes effect September 1, 2011.
 
 
  ______________________________ ______________________________
     President of the Senate Speaker of the House     
 
 
         I certify that H.B. No. 3396 was passed by the House on May 5,
  2011, by the following vote:  Yeas 146, Nays 0, 1 present, not
  voting; and that the House concurred in Senate amendments to H.B.
  No. 3396 on May 26, 2011, by the following vote:  Yeas 142, Nays 0,
  2 present, not voting.
 
  ______________________________
  Chief Clerk of the House   
 
         I certify that H.B. No. 3396 was passed by the Senate, with
  amendments, on May 24, 2011, by the following vote:  Yeas 31, Nays
  0
  .
 
  ______________________________
  Secretary of the Senate   
  APPROVED: __________________
                  Date       
   
           __________________
                Governor