<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H370CD87DA0E84B9D8F3493B032CD14F4" public-private="public" bill-type="olc"> 
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>109 HR 744 IH: Internet Spyware (I-SPY) Prevention Act of 2005</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2005-02-10</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form> 
<distribution-code display="yes">I</distribution-code> 
<congress>109th CONGRESS</congress>
<session>1st Session</session>
<legis-num>H. R. 744</legis-num> 
<current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber> 
<action> 
<action-date date="20050210">February 10, 2005</action-date> 
<action-desc><sponsor name-id="G000289">Mr. Goodlatte</sponsor> (for himself, <cosponsor name-id="L000397">Ms. Zoe Lofgren of California</cosponsor>, <cosponsor name-id="S000583">Mr. Smith of Texas</cosponsor>, <cosponsor name-id="J000082">Mr. Jenkins</cosponsor>, <cosponsor name-id="H000807">Mr. Hostettler</cosponsor>, <cosponsor name-id="S001156">Ms. Linda T. Sánchez of California</cosponsor>, <cosponsor name-id="N000002">Mr. Nadler</cosponsor>, <cosponsor name-id="F000445">Mr. Forbes</cosponsor>, <cosponsor name-id="H000067">Mr. Hall</cosponsor>, and <cosponsor name-id="W000672">Mr. Wolf</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HJU00">Committee on the Judiciary</committee-name></action-desc>
</action> 
<legis-type>A BILL</legis-type> 
<official-title>To amend title 18, United States Code, to discourage spyware, and for other purposes.</official-title> 
</form> 
<legis-body id="HF214C0FFA6C542E1A8BD007DA4BB22E9" style="OLC"> 
<section id="H683DD1B2330F424EA91241B938237235" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Internet Spyware (I-SPY) Prevention Act of 2005</short-title></quote>.</text></section> 
<section id="H87166A43948843079C431093F103FE3C"><enum>2.</enum><header>Penalties for certain unauthorized activities relating to computers</header> 
<subsection id="H90E1B5A2CFD84691B8F6F54EC8451E0"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">Chapter 47</external-xref> of title 18, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030</external-xref> the following:</text> 
<quoted-block id="HBFEC18ACEB9B42639C73064E944605CE" style="USC"> 
<section id="H902B2411C4364711B6F5449DFE42CA77"><enum>1030A.</enum><header>Illicit indirect use of protected computers</header> 
<subsection id="H40D828F11156486E98213FCE006600CF"><enum>(a)</enum><text>Whoever intentionally accesses a protected computer without authorization, or exceeds authorized access to a protected computer, by causing a computer program or code to be copied onto the protected computer, and intentionally uses that program or code in furtherance of another Federal criminal offense shall be fined under this title or imprisoned not more than 5 years, or both.</text></subsection> 
<subsection id="H03097B9A12FE478099146329B67CD2BC"><enum>(b)</enum><text>Whoever intentionally accesses a protected computer without authorization, or exceeds authorized access to a protected computer, by causing a computer program or code to be copied onto the protected computer, and by means of that program or code—</text> 
<paragraph id="H220DB38EB34B48E0897B5DA6180043AD"><enum>(1)</enum><text>intentionally obtains, or transmits to another, personal information with the intent to defraud or injure a person or cause damage to a protected computer; or</text></paragraph> 
<paragraph id="HCA47BDE1C85C4BE39C608C1347305F83"><enum>(2)</enum><text>intentionally impairs the security protection of the protected computer;</text></paragraph><continuation-text continuation-text-level="subsection">shall be fined under this title or imprisoned not more than 2 years, or both.</continuation-text></subsection> 
<subsection id="H13A1B18B79FB43E9AA2540E444C9EEF"><enum>(c)</enum><text>No person may bring a civil action under the law of any State if such action is premised in whole or in part upon the defendant’s violating this section. For the purposes of this subsection, the term <quote>State</quote> includes the District of Columbia, Puerto Rico, and any other territory or possession of the United States.</text></subsection> 
<subsection id="HD853BFDF44534BFC00E30048CB6F28CF"><enum>(d)</enum><text>As used in this section—</text> 
<paragraph id="HE391159D496448D4A22CA76B94C3B241"><enum>(1)</enum><text>the terms <quote>protected computer</quote> and <quote>exceeds authorized access</quote> have, respectively, the meanings given those terms in section 1030; and</text></paragraph> 
<paragraph id="HCEE6D8E4285644FD9200A9DBA1936990"><enum>(2)</enum><text>the term <quote>personal information</quote> means—</text> 
<subparagraph id="H671313F04ABF4219001564003F19ECE0"><enum>(A)</enum><text>a first and last name;</text></subparagraph> 
<subparagraph id="HB95677F28F1B442A9FD43EDD2D70B416"><enum>(B)</enum><text>a home or other physical address, including street name;</text></subparagraph> 
<subparagraph id="HD0D477D6099045E3A67D9FA073EFD25D"><enum>(C)</enum><text>an electronic mail address;</text></subparagraph> 
<subparagraph id="H42B513DA2DCC4945AA7415528CF29915"><enum>(D)</enum><text>a telephone number;</text></subparagraph> 
<subparagraph id="H9C1359FAD58D480CA3E0F190FB1C4CB6"><enum>(E)</enum><text>a Social Security number, tax identification number, drivers license number, passport number, or any other government-issued identification number; or</text></subparagraph> 
<subparagraph id="H636B5ADC846B488FB62958C69482A400"><enum>(F)</enum><text>a credit card or bank account number or any password or access code associated with a credit card or bank account.</text></subparagraph></paragraph></subsection> 
<subsection id="H67FC4C12A65B4657A86554D43030F55B"><enum>(e)</enum><text>This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection> 
<subsection id="HF48BDF17327F4AC6A1B8345306D899F"><enum>(b)</enum><header>Conforming Amendment</header><text>The table of sections at the beginning of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/47">chapter 47</external-xref> of title 18, United States Code, is amended by inserting after the item relating to <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030</external-xref> the following new item:</text> 
<quoted-block id="H10538BE26D8945EE962485BCD85ECF5" style="USC"> 
<toc regeneration="no-regeneration"> 
<toc-entry level="section">1030A. Illicit indirect use of protected computers</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section> 
<section id="H733887FB50DA4E709300B9AF149DE3AE"><enum>3.</enum><header>Authorization of appropriations</header><text display-inline="no-display-inline">In addition to any other sums otherwise authorized to be appropriated for this purpose, there are authorized to be appropriated for each of fiscal years 2006 through 2009, the sum of $10,000,000 to the Attorney General for prosecutions needed to discourage the use of spyware and the practice commonly called phishing.</text></section> 
<section id="H8C7B08445BC0437DA00035C00096BB43"><enum>4.</enum><header>Findings and sense of Congress concerning the enforcement of certain cybercrimes</header> 
<subsection id="H7C8F751AC59640059F255577004CFF8"><enum>(a)</enum><header>Findings</header><text>Congress makes the following findings:</text> 
<paragraph id="H28D1ED83B9054720A675C4BC7FFC9B21"><enum>(1)</enum><text>Software and electronic communications are increasingly being used by criminals to invade individuals’ and businesses’ computers without authorization.</text></paragraph> 
<paragraph id="H9DA2550ADE57461593E4AB3CB663D372"><enum>(2)</enum><text>Two particularly egregious types of such schemes are the use of spyware and phishing scams.</text></paragraph> 
<paragraph id="HD7B75760988F4BA0BE28176E07EA61B9"><enum>(3)</enum><text>These schemes are often used to obtain personal information, such as bank account and credit card numbers, which can then be used as a means to commit other types of theft.</text></paragraph> 
<paragraph id="H373720CFF6114CDC84DA0097D9565C7C"><enum>(4)</enum><text>In addition to the devastating damage that these heinous activities can inflict on individuals and businesses, they also undermine the confidence that citizens have in using the Internet.</text></paragraph></subsection> 
<subsection id="H6A402C7101EB455BA931783B763B6D7D"><enum>(b)</enum><header>Sense of Congress</header><text>Because of the serious nature of these offenses, and the Internet’s unique importance in the daily lives of citizens and in interstate commerce, it is the sense of Congress that the Department of Justice should use the amendments made by this Act, and all other available tools, vigorously to prosecute those who use spyware to commit crimes and those that conduct phishing scams.</text></subsection></section> 
</legis-body> 
</bill> 


