Susan Combs
Texas Comptroller of Public Accounts


 


SECTION 1. TITLE 7, CHAPTER 33. COMPUTER CRIMES
UNDER THIS ACT IT IS A CRIME TO:
1. USE THE COMPUTER WITHOUT PROPER AUTHORIZATION.
2. GAIN ACCESS TO DATA STORED ON THE SYSTEM WITHOUT PROPER AUTHORIZATION.
3. INTENTIONALLY OR KNOWINGLY GIVE OUT PASSWORDS OR OTHER CONFIDENTIAL INFORMATION CONCERNING THE COMPUTER SECURITY SYSTEM WITHOUT PROPER AUTHORIZATION.
4. INTENTIONALLY OR KNOWINGLY INTERFERE WITH THE PROPER OPERATION OF THE SYSTEM OR ALTER OR DESTROY DATA WITHOUT PROPER AUTHORIZATION.
OFFENSES UNDER THE ACT RANGE IN SEVERITY FROM A CLASS B MISDEMEANOR TO A FELONY OF THE THIRD DEGREE.
Click here to return