Definitions

Checkout our iOS App for a better way to browser and research.

As used in this chapter:

  1. (1) “Advertisement” means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including content on an Internet website operated for a commercial purpose;

  2. (2) “Authorized user”, with respect to a computer, means a person that owns or is authorized by the owner or lessee to use the computer;

  3. (3) “Bundled software” means software that is acquired through the installation of a large number of separate programs in a single installation when the programs are wholly unrelated to the purpose of the installation as described to the authorized user;

  4. (4)

    1. (A) “Cause to be copied” means to distribute or transfer computer software or any component of computer software.

    2. (B) “Cause to be copied” does not include providing:

      1. (i) Transmission, routing, intermediate temporary storage, or caching of software;

      2. (ii) A compact disk, website, computer server, or other storage medium through which the software was distributed by a third party; or

      3. (iii) A directory, index, reference, pointer, hypertext link, or other information location tool through which the user of the computer located the software;

  5. (5) “Computer software” means a sequence of instructions written in any programming language that is executed on a computer but does not include a text or data file, including a cookie;

  6. (6) “Computer virus” means a computer program or other set of instructions that is designed to do the following acts without the authorization of the owner or owners of a computer or computer network:

    1. (A) Degrade the performance of or disable a computer or computer network; and

    2. (B) Have the ability to replicate itself on another computer or computer network;

  7. (7) “Damage” means any significant impairment to the integrity, confidentiality, or availability of data, software, a system, or information, including, but not limited to, the:

    1. (A) Significant and intentional degradation of the performance of a computer or a computer network; or

    2. (B) Intentional disabling of a computer or computer network;

  8. (8) “Distributed denial of service” or “DDoS attack” means techniques or actions involving the use of one (1) or more damaged computers to damage another computer or a targeted computer system in order to shut the computer or computer system down and deny the service of the damaged computer or computer system to legitimate users;

  9. (9) “Execute”, when used with respect to computer software, means the performance of the functions or the carrying out of the instructions of the computer software;

  10. (10) “Hardware” means a comprehensive term for all of the discrete physical parts of a computer as distinguished from:

    1. (A) The data the computer contains or that enables it to operate; and

    2. (B) The software that provides instructions for the hardware to accomplish tasks;

  11. (11) “Intentionally deceptive” means with the intent to deceive an authorized user in order to either damage a computer or computer system or wrongfully obtain personally identifiable information without authority:

    1. (A) To make an intentional and materially false or fraudulent statement;

    2. (B) To make a statement or description that intentionally omits or misrepresents material information; or

    3. (C) An intentional and material failure to provide any notice to an authorized user regarding the download or installation of software;

  12. (12) “Internet” means:

    1. (A) The international computer network of both federal and nonfederal interoperable packet switched data networks; or

    2. (B) The global information system that:

      1. (i) Is logically linked together by a globally unique address space based on the Internet Protocol (IP) or its subsequent extensions;

      2. (ii) Is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, its subsequent extensions, or other IP-compatible protocols; and

      3. (iii) Provides, uses, or makes accessible, either publicly or privately, high-level services layered on the communications and related infrastructure described in this subdivision (12);

  13. (13) “Internet address” means a specific location on the Internet accessible through a universal resource locator or Internet protocol address;

  14. (14) “Person” means one (1) or more individuals, partnerships, corporations, limited liability companies, or other organizations;

  15. (15) “Personally identifiable information” means any of the following if it allows the entity holding the information to identify an authorized user by:

    1. (A) First name or first initial in combination with last name;

    2. (B) Credit or debit card numbers or other financial account numbers;

    3. (C) A password or personal identification number or other identification required to access an identified account other than a password, personal identification number, or other identification transmitted by an authorized user to the issuer of the account or its agent;

    4. (D) A social security number; or

    5. (E) Any of the following information in a form that personally identifies an authorized user:

      1. (i) Account balances;

      2. (ii) Overdraft history;

      3. (iii) Payment history;

      4. (iv) A history of websites visited;

      5. (v) Home address;

      6. (vi) Work address; or

      7. (vii) A record of a purchase or purchases; and

  16. (16) “Phishing” means the use of electronic mail or other means to imitate a legitimate company or business in order to entice the user into divulging passwords, credit card numbers, or other sensitive information for the purpose of committing theft or fraud.


Download our app to see the most-to-date content.