Florida Senate - 2015 COMMITTEE AMENDMENT
Bill No. CS for SB 222
Ì807090ÊÎ807090
LEGISLATIVE ACTION
Senate . House
Comm: RCS .
03/10/2015 .
.
.
.
—————————————————————————————————————————————————————————————————
—————————————————————————————————————————————————————————————————
The Committee on Communications, Energy, and Public Utilities
(Hukill) recommended the following:
1 Senate Amendment
2
3 Delete lines 41 - 90
4 and insert:
5 (1) “Authorized user” means, with respect to a protected
6 computer:
7 (a) A director, officer, or employee of the owner,
8 operator, or lessee of the computer or the owner of information
9 stored in the protected computer.
10 (b) A third-party agent, contractor, consultant, or
11 employee of the owner, operator, or lessee of the computer or
12 the owner of information stored in the protected computer if the
13 third-party agent, contractor, consultant, or employee is
14 granted access to the protected computer by the owner, operator,
15 or lessee of the protected computer or by the owner of
16 information stored in such protected computer in the form of a
17 technological access barrier.
18
19 If the owner, operator, or lessee of the computer or the owner
20 of information stored in the protected computer provides a
21 third-party agent, contractor, consultant, or employee with a
22 technological access barrier within the scope of his or her
23 employment, the owner, operator, or lessee of the computer or
24 the owner of information stored in the protected computer gives
25 explicit permission to the third-party agent, contractor,
26 consultant, or employee to use the technological access barrier
27 and establishes the third-party agent, contractor, consultant,
28 or employee as an authorized user. Such permission, however, is
29 terminated upon cessation of his or her employment.
30 (2) “Business” means any trade or business regardless of
31 its for-profit or not-for-profit status.
32 (3) “Computer” means an electronic, magnetic, optical,
33 electrochemical, or other high-speed data processing device that
34 performs logical, arithmetic, or storage functions and includes
35 any data storage facility, data storage device, or
36 communications facility directly related to, or operating in
37 conjunction with, the device.
38 (4) “Harm” means any impairment to the integrity, access,
39 or availability of data, programs, systems, or information.
40 (5) “Loss” means any of the following:
41 (a) Any reasonable cost incurred by the owner, operator, or
42 lessee of a protected computer or the owner of stored
43 information, including the reasonable cost of conducting a
44 damage assessment for harm associated with the violation and the
45 reasonable cost for remediation efforts, such as restoring the
46 data, programs, systems, or information to the condition it was
47 in before the violation.
48 (b) Economic damages.
49 (c) Lost profits.
50 (d) Consequential damages, including the interruption of
51 service.
52 (e) Profits earned by a violator as a result of the
53 violation.
54 (6) “Protected computer” means a computer that is used in
55 connection with the operation of a business and stores
56 information, programs, or code in connection with the operation
57 of the business in which the stored information, programs, or
58 code can be accessed only by employing a technological access
59 barrier.
60 (7) “Technological access barrier” means a password,
61 security code, token, key fob, access device, or similar
62 measure.
63 (8) “Traffic” means to sell, purchase, or deliver.
64 (9) “Without authorization” means access to a protected
65 computer by a person who:
66 (a) Is not an authorized user;
67 (b) Has stolen a technological access barrier of an
68 authorized user; or
69 (c) Circumvents a technological access barrier on a
70 protected computer without the express or implied permission of
71 the owner, operator, or lessee of the computer or the express or
72 implied permission of the owner of information stored in the
73 protected computer. The term does not include circumventing a
74 technological measure that does not effectively control access
75 to the protected computer or the information stored in the
76 protected computer.
77 Section 2. Section 668.803, Florida Statutes, is created to
78 read:
79 668.803 Prohibited acts.—A person who knowingly and with
80 intent to cause harm or loss:
81 (1) Obtains information from a protected computer without
82 authorization and, as a result, causes harm or loss;
83 (2) Causes the transmission of a program, code, or command
84 to a protected computer without authorization and, as a result