State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-40 > 13-40-301

13-40-301. Prohibition on the use of software.
A person who is not an owner or operator of a computer may not cause computersoftware to be copied on the computer knowingly, with conscious avoidance of actualknowledge, or willfully, if the software is used to:
(1) modify, through intentionally deceptive means, settings of a computer controlling:
(a) the webpage that appears when an owner or operator launches an Internet browser orsimilar computer software used to access and navigate the Internet;
(b) the default provider or web proxy that an owner or operator uses to access or searchthe Internet; or
(c) an owner's or an operator's list of bookmarks used to access webpages;
(2) collect, through intentionally deceptive means, personally identifiable information:
(a) through the use of a keystroke-logging function that records all or substantially allkeystrokes made by an owner or operator of a computer and transfers that information from thecomputer to another person;
(b) in a manner that correlates personally identifiable information with data concerningall or substantially all of the webpages visited by an owner or operator, other than webpagesoperated by the person providing the software, if the computer software was installed in a mannerdesigned to conceal from all authorized users of the computer the fact that the software is beinginstalled; or
(c) by extracting from the hard drive of an owner's or an operator's computer, an owner'sor an operator's Social Security number, tax identification number, driver license number,passport number, any other government-issued identification number, an account balance, oroverdraft history for a purpose unrelated to any of the purposes of the software or servicedescribed to an authorized user;
(3) prevent, through intentionally deceptive means, an owner's or an operator'sreasonable efforts to block or disable the installation or execution of computer software bycausing computer software that the owner or operator has properly removed or disabled toautomatically reinstall or reactivate on the computer without the authorization of an authorizeduser;
(4) intentionally misrepresent that computer software will be uninstalled or disabled byan owner's or an operator's action;
(5) through intentionally deceptive means, remove, disable, or render inoperativesecurity, antispyware, or antivirus computer software installed on an owner's or an operator'scomputer;
(6) enable use of an owner's or an operator's computer to:
(a) access or use a modem or Internet service for the purpose of causing damage to anowner's or an operator's computer or causing an owner or operator, or a third party affected bythat conduct, to incur financial charges for a service that the owner or operator did not authorize;
(b) open multiple, sequential, stand-alone messages in an owner's or an operator'scomputer without the authorization of an owner or operator and with knowledge that areasonable computer user could not close the messages without turning off the computer orclosing the software application in which the messages appear, unless the communicationoriginated from the computer's operating system, a software application the user activated, or aservice provider that the user chose to use, or was presented for any of the purposes described inSection 13-40-303; or


(c) transmit or relay commercial electronic mail or a computer virus from the computer,if the transmission or relay is initiated by a person other than the authorized user without theauthorization of an authorized user;
(7) modify, without the authorization of an owner or operator, any of the followingsettings related the computer's access to, or use of, the Internet:
(a) settings that protect information about an owner or operator for the purpose of takingpersonally identifiable information of the owner or operator;
(b) security settings, for the purpose of causing damage to a computer; or
(c) settings that protect the computer from the uses identified in Subsection (6); or
(8) prevent, without the authorization of an owner or operator, an owner's or anoperator's reasonable efforts to block the installation of, or to disable, computer software by:
(a) presenting the owner or operator with an option to decline installation of computersoftware with knowledge that, when the option is selected by the authorized user, the installationnevertheless proceeds;
(b) falsely representing that computer software has been disabled;
(c) requiring in an intentionally deceptive manner the user to access the Internet toremove the software with knowledge or reckless disregard of the fact that the software frequentlyoperates in a manner that prevents the user from accessing the Internet;
(d) changing the name, location, or other designation information of the software for thepurpose of preventing an authorized user from locating the software to remove it;
(e) using randomized or intentionally deceptive filenames, directory folders, formats, orregistry entries for the purpose of avoiding detection and removal of the software by anauthorized user;
(f) causing the installation of software in a particular computer directory or in computermemory for the purpose of evading an authorized user's attempt to remove the software from thecomputer; or
(g) requiring, without the authority of the owner of the computer, that an authorized userobtain a special code or download software from a third party to uninstall the software.

Repealed and Re-enacted by Chapter 200, 2010 General Session

State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-40 > 13-40-301

13-40-301. Prohibition on the use of software.
A person who is not an owner or operator of a computer may not cause computersoftware to be copied on the computer knowingly, with conscious avoidance of actualknowledge, or willfully, if the software is used to:
(1) modify, through intentionally deceptive means, settings of a computer controlling:
(a) the webpage that appears when an owner or operator launches an Internet browser orsimilar computer software used to access and navigate the Internet;
(b) the default provider or web proxy that an owner or operator uses to access or searchthe Internet; or
(c) an owner's or an operator's list of bookmarks used to access webpages;
(2) collect, through intentionally deceptive means, personally identifiable information:
(a) through the use of a keystroke-logging function that records all or substantially allkeystrokes made by an owner or operator of a computer and transfers that information from thecomputer to another person;
(b) in a manner that correlates personally identifiable information with data concerningall or substantially all of the webpages visited by an owner or operator, other than webpagesoperated by the person providing the software, if the computer software was installed in a mannerdesigned to conceal from all authorized users of the computer the fact that the software is beinginstalled; or
(c) by extracting from the hard drive of an owner's or an operator's computer, an owner'sor an operator's Social Security number, tax identification number, driver license number,passport number, any other government-issued identification number, an account balance, oroverdraft history for a purpose unrelated to any of the purposes of the software or servicedescribed to an authorized user;
(3) prevent, through intentionally deceptive means, an owner's or an operator'sreasonable efforts to block or disable the installation or execution of computer software bycausing computer software that the owner or operator has properly removed or disabled toautomatically reinstall or reactivate on the computer without the authorization of an authorizeduser;
(4) intentionally misrepresent that computer software will be uninstalled or disabled byan owner's or an operator's action;
(5) through intentionally deceptive means, remove, disable, or render inoperativesecurity, antispyware, or antivirus computer software installed on an owner's or an operator'scomputer;
(6) enable use of an owner's or an operator's computer to:
(a) access or use a modem or Internet service for the purpose of causing damage to anowner's or an operator's computer or causing an owner or operator, or a third party affected bythat conduct, to incur financial charges for a service that the owner or operator did not authorize;
(b) open multiple, sequential, stand-alone messages in an owner's or an operator'scomputer without the authorization of an owner or operator and with knowledge that areasonable computer user could not close the messages without turning off the computer orclosing the software application in which the messages appear, unless the communicationoriginated from the computer's operating system, a software application the user activated, or aservice provider that the user chose to use, or was presented for any of the purposes described inSection 13-40-303; or


(c) transmit or relay commercial electronic mail or a computer virus from the computer,if the transmission or relay is initiated by a person other than the authorized user without theauthorization of an authorized user;
(7) modify, without the authorization of an owner or operator, any of the followingsettings related the computer's access to, or use of, the Internet:
(a) settings that protect information about an owner or operator for the purpose of takingpersonally identifiable information of the owner or operator;
(b) security settings, for the purpose of causing damage to a computer; or
(c) settings that protect the computer from the uses identified in Subsection (6); or
(8) prevent, without the authorization of an owner or operator, an owner's or anoperator's reasonable efforts to block the installation of, or to disable, computer software by:
(a) presenting the owner or operator with an option to decline installation of computersoftware with knowledge that, when the option is selected by the authorized user, the installationnevertheless proceeds;
(b) falsely representing that computer software has been disabled;
(c) requiring in an intentionally deceptive manner the user to access the Internet toremove the software with knowledge or reckless disregard of the fact that the software frequentlyoperates in a manner that prevents the user from accessing the Internet;
(d) changing the name, location, or other designation information of the software for thepurpose of preventing an authorized user from locating the software to remove it;
(e) using randomized or intentionally deceptive filenames, directory folders, formats, orregistry entries for the purpose of avoiding detection and removal of the software by anauthorized user;
(f) causing the installation of software in a particular computer directory or in computermemory for the purpose of evading an authorized user's attempt to remove the software from thecomputer; or
(g) requiring, without the authority of the owner of the computer, that an authorized userobtain a special code or download software from a third party to uninstall the software.

Repealed and Re-enacted by Chapter 200, 2010 General Session


State Codes and Statutes

State Codes and Statutes

Statutes > Utah > Title-13 > Chapter-40 > 13-40-301

13-40-301. Prohibition on the use of software.
A person who is not an owner or operator of a computer may not cause computersoftware to be copied on the computer knowingly, with conscious avoidance of actualknowledge, or willfully, if the software is used to:
(1) modify, through intentionally deceptive means, settings of a computer controlling:
(a) the webpage that appears when an owner or operator launches an Internet browser orsimilar computer software used to access and navigate the Internet;
(b) the default provider or web proxy that an owner or operator uses to access or searchthe Internet; or
(c) an owner's or an operator's list of bookmarks used to access webpages;
(2) collect, through intentionally deceptive means, personally identifiable information:
(a) through the use of a keystroke-logging function that records all or substantially allkeystrokes made by an owner or operator of a computer and transfers that information from thecomputer to another person;
(b) in a manner that correlates personally identifiable information with data concerningall or substantially all of the webpages visited by an owner or operator, other than webpagesoperated by the person providing the software, if the computer software was installed in a mannerdesigned to conceal from all authorized users of the computer the fact that the software is beinginstalled; or
(c) by extracting from the hard drive of an owner's or an operator's computer, an owner'sor an operator's Social Security number, tax identification number, driver license number,passport number, any other government-issued identification number, an account balance, oroverdraft history for a purpose unrelated to any of the purposes of the software or servicedescribed to an authorized user;
(3) prevent, through intentionally deceptive means, an owner's or an operator'sreasonable efforts to block or disable the installation or execution of computer software bycausing computer software that the owner or operator has properly removed or disabled toautomatically reinstall or reactivate on the computer without the authorization of an authorizeduser;
(4) intentionally misrepresent that computer software will be uninstalled or disabled byan owner's or an operator's action;
(5) through intentionally deceptive means, remove, disable, or render inoperativesecurity, antispyware, or antivirus computer software installed on an owner's or an operator'scomputer;
(6) enable use of an owner's or an operator's computer to:
(a) access or use a modem or Internet service for the purpose of causing damage to anowner's or an operator's computer or causing an owner or operator, or a third party affected bythat conduct, to incur financial charges for a service that the owner or operator did not authorize;
(b) open multiple, sequential, stand-alone messages in an owner's or an operator'scomputer without the authorization of an owner or operator and with knowledge that areasonable computer user could not close the messages without turning off the computer orclosing the software application in which the messages appear, unless the communicationoriginated from the computer's operating system, a software application the user activated, or aservice provider that the user chose to use, or was presented for any of the purposes described inSection 13-40-303; or


(c) transmit or relay commercial electronic mail or a computer virus from the computer,if the transmission or relay is initiated by a person other than the authorized user without theauthorization of an authorized user;
(7) modify, without the authorization of an owner or operator, any of the followingsettings related the computer's access to, or use of, the Internet:
(a) settings that protect information about an owner or operator for the purpose of takingpersonally identifiable information of the owner or operator;
(b) security settings, for the purpose of causing damage to a computer; or
(c) settings that protect the computer from the uses identified in Subsection (6); or
(8) prevent, without the authorization of an owner or operator, an owner's or anoperator's reasonable efforts to block the installation of, or to disable, computer software by:
(a) presenting the owner or operator with an option to decline installation of computersoftware with knowledge that, when the option is selected by the authorized user, the installationnevertheless proceeds;
(b) falsely representing that computer software has been disabled;
(c) requiring in an intentionally deceptive manner the user to access the Internet toremove the software with knowledge or reckless disregard of the fact that the software frequentlyoperates in a manner that prevents the user from accessing the Internet;
(d) changing the name, location, or other designation information of the software for thepurpose of preventing an authorized user from locating the software to remove it;
(e) using randomized or intentionally deceptive filenames, directory folders, formats, orregistry entries for the purpose of avoiding detection and removal of the software by anauthorized user;
(f) causing the installation of software in a particular computer directory or in computermemory for the purpose of evading an authorized user's attempt to remove the software from thecomputer; or
(g) requiring, without the authority of the owner of the computer, that an authorized userobtain a special code or download software from a third party to uninstall the software.

Repealed and Re-enacted by Chapter 200, 2010 General Session