Computer Spyware and Malware Charges in Iowa

Iowa Code Section 715 provides various definitions and charges that relate to computer spyware and malware.  This law imposes criminal penalties upon certain actions relating to spyware and malware.  The relevant sections of the Iowa code are discussed below:

Definitions in the Iowa Computer Spyware and Malware Protection Law

Iowa Code Section 715.3 – Definitions.

For purposes of this chapter, unless the context otherwise requires:

1. “Advertisement” means a communication, the primary purpose of which is the commercial promotion of a commercial product or service, including content on an internet site operated for a commercial purpose.

2. “Computer software” means a sequence of instructions written in any programming language that is executed on a computer. “Computer software” does not include computer software that is an internet site or data components of an internet site that are not executable independently of the internet site.

3. “Damage” means any significant impairment to the integrity or availability of data, software, a system, or information.

4. “Execute”, when used with respect to computer software, means the performance of the functions or the carrying out of the instructions of the computer software.

5. “Intentionally deceptive” means any of the following:

a. An intentionally and materially false or fraudulent statement.

b. A statement or description that intentionally omits or misrepresents material information in order to deceive an owner or operator of a computer.

c. An intentional and material failure to provide a notice to an owner or operator regarding the installation or execution of computer software for the purpose of deceiving the owner or operator.

6. “Internet” means the same as defined in section 4.1.

7. “Owner or operator” means the owner or lessee of a computer, or a person using such computer with the owner or lessee’s authorization, but does not include a person who owned a computer prior to the first retail sale of the computer.

8. “Person” means the same as defined in section 4.1.

9. “Personally identifiable information” means any of the following information with respect to the owner or operator of a computer:

a. The first name or first initial in combination with the last name.

b. A home or other physical address including street name.

See also  Criminal Mischief Charges in Iowa

c. An electronic mail address.

d. Credit or debit card number, bank account number, or any password or access code associated with a credit or debit card or bank account.

e. Social security number, tax identification number, driver’s license number, passport number, or any other government-issued identification number.

f. Account balance, overdraft history, or payment history that personally identifies an owner or operator of a computer.

10. “Transmit” means to transfer, send, or make available computer software using the internet or any other medium, including local area networks of computers other than a wireless transmission, and a disc or other data storage device. “Transmit” does not include an action by a person providing any of the following:

a. An internet connection, telephone connection, or other means of transmission capability such as a compact disc or digital video disc through which the computer software was made available.

b. The storage or hosting of the computer software program or an internet site through which the software was made available.

c. An information location tool, such as a directory, index, reference, pointer, or hypertext link, through which the user of the computer located the computer software, unless the person transmitting receives a direct economic benefit from the execution of such software on the computer.

Prohibitions in the Iowa Computer Spyware and Malware Protection Law

Iowa Code Section 715.4 – Prohibitions — transmission and use of software.

It is unlawful for a person who is not an owner or operator of a computer to transmit computer software to such computer knowingly or with conscious avoidance of actual knowledge, and to use such software to do any of the following:

1. Modify, through intentionally deceptive means, settings of a computer that control any of the following:

a. The internet site that appears when an owner or operator launches an internet browser or similar computer software used to access and navigate the internet.

b. The default provider or internet proxy that an owner or operator uses to access or search the internet.

c. An owner’s or an operator’s list of bookmarks used to access internet sites.

2. Collect, through intentionally deceptive means, personally identifiable information through any of the following means:

See also  Lascivious Acts with a Child Charges in Iowa

a. The use of a keystroke-logging function that records keystrokes made by an owner or operator of a computer and transfers that information from the computer to another person.

b. In a manner that correlates personally identifiable information with data respecting all or substantially all of the internet sites visited by an owner or operator, other than internet sites operated by the person collecting such information.

c. By extracting from the hard drive of an owner’s or an operator’s computer, an owner’s or an operator’s social security number, tax identification number, driver’s license number, passport number, any other government-issued identification number, account balances, or overdraft history.

3. Prevent, through intentionally deceptive means, an owner’s or an operator’s reasonable efforts to block the installation of, or to disable, computer software by causing computer software that the owner or operator has properly removed or disabled to automatically reinstall or reactivate on the computer.

4. Intentionally misrepresent that computer software will be uninstalled or disabled by an owner’s or an operator’s action.

5. Through intentionally deceptive means, remove, disable, or render inoperative security, antispyware, or antivirus computer software installed on an owner’s or an operator’s computer.

6. Take control of an owner’s or an operator’s computer by doing any of the following:

a. Accessing or using a modem or internet service for the purpose of causing damage to an owner’s or an operator’s computer or causing an owner or operator to incur financial charges for a service that the owner or operator did not authorize.

b. Opening multiple, sequential, stand-alone advertisements in an owner’s or an operator’s internet browser without the authorization of an owner or operator and which a reasonable computer user could not close without turning off the computer or closing the internet browser.

7. Modify any of the following settings related to an owner’s or an operator’s computer access to, or use of, the internet:

a. Settings that protect information about an owner or operator for the purpose of taking personally identifiable information of the owner or operator.

b. Security settings for the purpose of causing damage to a computer.

8. Prevent an owner’s or an operator’s reasonable efforts to block the installation of, or to disable, computer software by doing any of the following:

See also  Consumption or Intoxication in Public Places (Public Intox) Charges in Iowa

a. Presenting the owner or operator with an option to decline installation of computer software with knowledge that, when the option is selected by the authorized user, the installation nevertheless proceeds.

b. Falsely representing that computer software has been disabled.

Other Prohibitions in the Iowa Computer Spyware and Malware Protection Law

Iowa Code Section 715.5 – Other prohibitions.

It is unlawful for a person who is not an owner or operator of a computer to do any of the following with regard to the computer:

1. Induce an owner or operator to install a computer software component onto the owner’s or the operator’s computer by intentionally misrepresenting that installing computer software is necessary for security or privacy reasons or in order to open, view, or play a particular type of content.

2. Using intentionally deceptive means to cause the execution of a computer software component with the intent of causing an owner or operator to use such component in a manner that violates any other provision of this chapter.

Criminal Penalties in Iowa for Spyware and Malware violations

Section 715.7 – Criminal penalties

1. A person who commits an unlawful act under this chapter is guilty of an aggravated misdemeanor.

2. A person who commits an unlawful act under this chapter and who causes pecuniary losses exceeding one thousand dollars to a victim of the unlawful act is guilty of a class “D” felony.

The aggravated misdemeanor version of this crime can result in 2 years in prison in Iowa, while the D felony version carries a 5 year prison term.

Interplay with other causes of action in Iowa

Those accused of improper action concerning malware or spyware may find themselves facing a civil lawsuit in Iowa as well.  That lawsuit could relate to invasion of privacy, trespass to chattels (trespass to the computer/smartphone/other personal property), or a related action.

For those convicted of spyware or malware violations in Iowa where the violation relates so spying on a current or former significant other in a divorce or child custody case, there can also be significant ramifications in that case.