If the information isn't stored, they can't seize it.
Now this legislation might get Libs in an uproar for a change. This legislation can only be setup for one real reason - to punish dissenters and intimidate them into silence; a fear underhanded cowardly backdoor attempt to attack the 1st Amendment. You give them this power and then only the state operated media will feed you your new sand tell the weak minded public what their opinion should be. Not only should this legislation be defeated but the authors of this horrendous bill be investigated to determine what their incentive and intent was and who directed them.
Danger Will Robinson!
Note source:
http://www.burntorangereport.com/user/Ben%20Sherman
Bio:
Ben Sherman is a proud progressive and has been a BOR staff writer since 2011. A current undergraduate at the University of Texas, Ben has worked as the Communications Coordinator of the Bill White gubernatorial campaign and interned for ThinkProgress.
—
I don’t know about the content of the Bill, but he is no conservative if he promotes ThinkProgress.
And being an UT undergraduate also makes him deeply suspect. UT is the buckle of the Austin leftie conclave in Texas.
ComDem City.
A BILL TO BE ENTITLED AN ACT relating to search warrants issued in this state and other states for certain customer data, communications, and other information held in electronic storage in this state and other states by providers of electronic communications services and remote computing services. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS: SECTION 1. Article 18.02, Code of Criminal Procedure, is amended to read as follows: Art. 18.02. GROUNDS FOR ISSUANCE. (a) A search warrant may be issued to search for and seize: (1) property acquired by theft or in any other manner which makes its acquisition a penal offense; (2) property specially designed, made, or adapted for or commonly used in the commission of an offense; (3) arms and munitions kept or prepared for the purposes of insurrection or riot; (4) weapons prohibited by the Penal Code; (5) gambling devices or equipment, altered gambling equipment, or gambling paraphernalia; (6) obscene materials kept or prepared for commercial distribution or exhibition, subject to the additional rules set forth by law; (7) a drug, controlled substance, immediate precursor, chemical precursor, or other controlled substance property, including an apparatus or paraphernalia kept, prepared, or manufactured in violation of the laws of this state; (8) any property the possession of which is prohibited by law; (9) implements or instruments used in the commission of a crime; (10) property or items, except the personal writings by the accused, constituting evidence of an offense or constituting evidence tending to show that a particular person committed an offense; (11) persons; [or] (12) contraband subject to forfeiture under Chapter 59 of this code; or (13) electronic customer data held in electronic storage or the contents of and records and other information related to a wire communication or electronic communication held in electronic storage. (b) For purposes of Subsection (a)(13), "electronic communication," "electronic storage," and "wire communication" have the meanings assigned by Article 18.20, and "electronic customer data" has the meaning assigned by Article 18.21. end snip
So...which state will get all those Texas IT jobs?
Who wants to do business in a state that will force you to spend time and money to turn over info... when another state won’t
I think Alabama just won the lottery
watch for offshore internet servers....
As a rule of thumb, there really is no justification for government controlling or monitoring of the Internet that cannot immediately be turned into either a police-state power, abused for political gain, or be used to force ordinary people to pay exorbitant amounts of money for products or services currently free, or just worth a fraction of that amount, from a single provider.
In other words, just say no.
As far as the “child porn and human trafficking” excuse, it is typically used by scoundrels to get what they want. For example, the National Security Agency wanted backdoor access to all civilian encryption, because the ability to hide information from them “would be used by child pornographers!” Even though child porn has nothing to do with National Security, and the NSA typically ignores it when they find it. Not their job.