Florida Senate - 2015                        COMMITTEE AMENDMENT
       Bill No. CS for SB 222
       
       
       
       
       
       
                                Ì807090ÊÎ807090                         
       
                              LEGISLATIVE ACTION                        
                    Senate             .             House              
                  Comm: RCS            .                                
                  03/10/2015           .                                
                                       .                                
                                       .                                
                                       .                                
       —————————————————————————————————————————————————————————————————




       —————————————————————————————————————————————————————————————————
       The Committee on Communications, Energy, and Public Utilities
       (Hukill) recommended the following:
       
    1         Senate Amendment 
    2  
    3         Delete lines 41 - 90
    4  and insert:
    5         (1)“Authorized user” means, with respect to a protected
    6  computer:
    7         (a) A director, officer, or employee of the owner,
    8  operator, or lessee of the computer or the owner of information
    9  stored in the protected computer.
   10         (b)A third-party agent, contractor, consultant, or
   11  employee of the owner, operator, or lessee of the computer or
   12  the owner of information stored in the protected computer if the
   13  third-party agent, contractor, consultant, or employee is
   14  granted access to the protected computer by the owner, operator,
   15  or lessee of the protected computer or by the owner of
   16  information stored in such protected computer in the form of a
   17  technological access barrier.
   18  
   19  If the owner, operator, or lessee of the computer or the owner
   20  of information stored in the protected computer provides a
   21  third-party agent, contractor, consultant, or employee with a
   22  technological access barrier within the scope of his or her
   23  employment, the owner, operator, or lessee of the computer or
   24  the owner of information stored in the protected computer gives
   25  explicit permission to the third-party agent, contractor,
   26  consultant, or employee to use the technological access barrier
   27  and establishes the third-party agent, contractor, consultant,
   28  or employee as an authorized user. Such permission, however, is
   29  terminated upon cessation of his or her employment.
   30         (2) “Business” means any trade or business regardless of
   31  its for-profit or not-for-profit status.
   32         (3)“Computer” means an electronic, magnetic, optical,
   33  electrochemical, or other high-speed data processing device that
   34  performs logical, arithmetic, or storage functions and includes
   35  any data storage facility, data storage device, or
   36  communications facility directly related to, or operating in
   37  conjunction with, the device.
   38         (4)“Harm” means any impairment to the integrity, access,
   39  or availability of data, programs, systems, or information.
   40         (5)“Loss” means any of the following:
   41         (a)Any reasonable cost incurred by the owner, operator, or
   42  lessee of a protected computer or the owner of stored
   43  information, including the reasonable cost of conducting a
   44  damage assessment for harm associated with the violation and the
   45  reasonable cost for remediation efforts, such as restoring the
   46  data, programs, systems, or information to the condition it was
   47  in before the violation.
   48         (b)Economic damages.
   49         (c)Lost profits.
   50         (d)Consequential damages, including the interruption of
   51  service.
   52         (e)Profits earned by a violator as a result of the
   53  violation.
   54         (6)“Protected computer” means a computer that is used in
   55  connection with the operation of a business and stores
   56  information, programs, or code in connection with the operation
   57  of the business in which the stored information, programs, or
   58  code can be accessed only by employing a technological access
   59  barrier.
   60         (7) “Technological access barrier” means a password,
   61  security code, token, key fob, access device, or similar
   62  measure.
   63         (8)“Traffic” means to sell, purchase, or deliver.
   64         (9)“Without authorization” means access to a protected
   65  computer by a person who:
   66         (a) Is not an authorized user;
   67         (b) Has stolen a technological access barrier of an
   68  authorized user; or
   69         (c)Circumvents a technological access barrier on a
   70  protected computer without the express or implied permission of
   71  the owner, operator, or lessee of the computer or the express or
   72  implied permission of the owner of information stored in the
   73  protected computer. The term does not include circumventing a
   74  technological measure that does not effectively control access
   75  to the protected computer or the information stored in the
   76  protected computer.
   77         Section 2. Section 668.803, Florida Statutes, is created to
   78  read:
   79         668.803 Prohibited acts.—A person who knowingly and with
   80  intent to cause harm or loss:
   81         (1) Obtains information from a protected computer without
   82  authorization and, as a result, causes harm or loss;
   83         (2)Causes the transmission of a program, code, or command
   84  to a protected computer without authorization and, as a result