<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H6B30BB0CE19C4F32A07E0017AC01EC6F" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>118 HR 9187 IH: Intimate Privacy Protection Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2024-07-30</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">118th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 9187</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20240730">July 30, 2024</action-date><action-desc><sponsor name-id="A000148">Mr. Auchincloss</sponsor> (for himself and <cosponsor name-id="H001091">Mrs. Hinson</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend section 230 of the Communications Act of 1934 to combat cyberstalking, intimate privacy violations, and digital forgeries, and for other purposes.</official-title></form><legis-body id="H0613B8B7FA2744E59077A9306A80E8A3" style="OLC"><section id="H55BCD7D540894028B63225490BF0FDA3" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Intimate Privacy Protection Act</short-title></quote>.</text></section><section id="HE3A7CBE348A940C8B7D7372D1E469112"><enum>2.</enum><header>Cyberstalking, intimate privacy violations, and digital forgeries</header><subsection id="H297AAC55148846B8803213B9F85AE69C"><enum>(a)</enum><header>Duty of care</header><text display-inline="yes-display-inline">Section 230(c)(1) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(c)(1)</external-xref>) is amended—</text><paragraph id="HBEB8E490434B4ED5B64BFDE33E2EC87F"><enum>(1)</enum><text>by striking <quote>No provider</quote> and inserting the following:</text><quoted-block style="OLC" id="H6CB04C406E304DD88052A677EB100BC0" display-inline="no-display-inline"><subparagraph id="HD719AEFC9A4142DAB989C2152C2CA5EB"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Except as provided in subparagraph (B), no provider</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="H9F865813346D4640A6E9437DD8B6B5D0"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" id="HAD891358D2B1452EA406D558D8A6583F" display-inline="no-display-inline"><subparagraph id="HE843AA686F2C4EAB927D109CBE45451B"><enum>(B)</enum><header>Cyberstalking, intimate privacy violations, and digital forgeries</header><clause id="H613A5D61A69E47698EDF2AE2BC6F9E43"><enum>(i)</enum><header>Duty of care</header><text>Subparagraph (A) only applies to a provider of an interactive computer service if such provider is implementing, with respect to the interactive computer service of the provider, a reasonable process for addressing cyberstalking, intimate privacy violations, and digital forgeries that includes, at a minimum, the following:</text><subclause id="H4BB33CAB0BBB4612891B5DF03E96C852"><enum>(I)</enum><text>A process to prevent, to the extent practicable, cyberstalking, intimate privacy violations, and digital forgeries.</text></subclause><subclause id="HB32A7687C76C4427ABF02515B02A3EA0"><enum>(II)</enum><text display-inline="yes-display-inline">A clear and accessible process to report cyberstalking, intimate privacy violations, and digital forgeries.</text></subclause><subclause id="H7B86226E1DC64798B07C9B46031CE8E0"><enum>(III)</enum><text>A process for investigating each report of cyberstalking, an intimate privacy violation, or a digital forgery.</text></subclause><subclause id="H6594093BE6F2440DA985AE92ABC25420"><enum>(IV)</enum><text>A process to remove (or otherwise make unavailable), within 24 hours, information the provider knows, or has reason to know, is cyberstalking, an intimate privacy violation, or a digital forgery.</text></subclause><subclause id="H19645CBF65D8439593AADBC307F4ED27"><enum>(V)</enum><text>Minimum data logging requirements that—</text><item id="H0519F8D1B34B4CB19564B560E05B9F3E"><enum>(aa)</enum><text>preserve data necessary for legal proceedings related to cyberstalking, an intimate privacy violation, or a digital forgery; and</text></item><item id="H6FD42DAB87C44C6CA9ECCACB0589F595"><enum>(bb)</enum><text display-inline="yes-display-inline">ensure that preserved data is not transferred or otherwise used for a purpose other than a legal proceeding related to cyberstalking, an intimate privacy violation, or a digital forgery.</text></item></subclause><subclause id="HF26355FC6DA74754A6435AB1E8133457"><enum>(VI)</enum><text display-inline="yes-display-inline">A process to remove or block content that has been determined unlawful by a court.</text></subclause><subclause id="HAA3F4305D75F4E1794C2B8621C86A3D3"><enum>(VII)</enum><text display-inline="yes-display-inline">Any other process or requirement determined necessary by the Commission to address cyberstalking, intimate privacy violations, and digital forgeries.</text></subclause></clause><clause id="H088ED45B65D448D19DFBC6B736F8D8ED"><enum>(ii)</enum><header>Definitions</header><text>In this subparagraph:</text><subclause id="HD286B1BE08394BBF97130C14DF518798"><enum>(I)</enum><header>Cyberstalking</header><text display-inline="yes-display-inline">The term <term>cyberstalking</term> means a course of conduct—</text><item id="HAC547A0339494357BA4B6D6701425097"><enum>(aa)</enum><text>directed at a specific individual; and</text></item><item id="H14F8B99F606E4FB682E2CDBD67A30F9A"><enum>(bb)</enum><text>that causes the individual, or would cause a reasonable individual, to suffer substantial emotional distress or the fear of bodily harm.</text></item></subclause><subclause id="H69BD9BC326B74F76810D01F59F9A3652"><enum>(II)</enum><header>Digital forgery</header><text display-inline="yes-display-inline">The term <term>digital forgery</term> means digital audiovisual material—</text><item id="H4915C253F1F142C9AB0E83F51E0852B2"><enum>(aa)</enum><text display-inline="yes-display-inline">created, manipulated, or altered to be virtually indistinguishable from an authentic record of the speech, conduct, or appearance of an individual despite not being an authentic record of such speech, conduct, or appearance; and</text></item><item id="HF04930BB4B4B4DB3AE64B058BB8B4D04"><enum>(bb)</enum><text>that is reasonably likely to cause harm.</text></item></subclause><subclause id="HA0AC72A1DDFD4D618C7B628326D222FE"><enum>(III)</enum><header>Intimate visual depiction</header><text display-inline="yes-display-inline">The term <term>intimate visual depiction</term> has the meaning given that term in section 1309(a) of division W of the Consolidated Appropriations Act, 2022 (<external-xref legal-doc="usc" parsable-cite="usc/15/6851">15 U.S.C. 6851(a)</external-xref>).</text></subclause><subclause id="H3220D2C839B8483B80F249F79DE5E869"><enum>(IV)</enum><header>Intimate privacy violation</header><text>The term <term>intimate privacy violation</term> means the following:</text><item id="H1CA502CDD3514F84BD195739F55AFF9E"><enum>(aa)</enum><text display-inline="yes-display-inline">An intimate visual depiction obtained or shared without the consent of an individual portrayed in the depiction.</text></item><item id="HDD4B1D09C2234DD28E593B7ADDEF6AAC"><enum>(bb)</enum><text display-inline="yes-display-inline">A digital forgery of an intimate visual depiction made or shared without the consent of an individual portrayed in the depiction.</text></item></subclause></clause></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="H1671544466B540F2B426E9C1D6120ACC"><enum>(b)</enum><header>Information content provider defined</header><text display-inline="yes-display-inline">Section 230(f)(3) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(f)(3)</external-xref>) is amended by striking <quote>creation or development</quote> and inserting <quote>creation or development (including through solicitation or encouragement)</quote>. </text></subsection><subsection id="HCD7FBBCC651E43CB87747125E83909C7"><enum>(c)</enum><header>Regulations</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Federal Trade Commission, in consultation with the Federal Communications Commission, shall promulgate regulations under section 553 of title 5, United States Code, to implement the amendments made by this Act.</text></subsection><subsection id="HFD53C73FDE114A48877602780CAC2988"><enum>(d)</enum><header>Applicability</header><text display-inline="yes-display-inline">The amendments made by this Act shall apply to information made available on an interactive computer service on or after the date of the enactment of this Act.</text></subsection><subsection id="HA0869C36671749F48A299CFAA5A4A587"><enum>(e)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">The amendments made by this Act may not be construed to infringe upon any right protected under the First Amendment to the Constitution.</text></subsection></section></legis-body></bill> 

