<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-EHF25028-1VY-DL-FJ6"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 S69 IS: Curtailing Online Limitations that Lead Unconstitutionally to Democracy's Erosion Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2025-01-09</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>119th CONGRESS</congress><session>1st Session</session><legis-num>S. 69</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20250109">January 9, 2025</action-date><action-desc><sponsor name-id="S420">Mr. Schmitt</sponsor> introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Communications Act of 1934 to address governmental interference in content moderation decisions by providers of interactive computer services, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Curtailing Online Limitations that Lead Unconstitutionally to Democracy's Erosion Act</short-title></quote> or the <quote><short-title>COLLUDE Act</short-title></quote>.</text></section><section id="idFD6F1CC7E6DE42778BDB472FBC4E1163"><enum>2.</enum><header>Content moderation, creation and development, and distribution</header><text display-inline="no-display-inline">Section 230 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id46b11a9e51084f40bd4e70f449272f2c"><enum>(1)</enum><text>in subsection (c)—</text><subparagraph commented="no" display-inline="no-display-inline" id="idbfa7a7bbca3e4a49830fbe8ea7114f01"><enum>(A)</enum><text>in paragraph (1)—</text><clause commented="no" display-inline="no-display-inline" id="id678fe48c7e32485f9869ef24462c55a7"><enum>(i)</enum><text display-inline="yes-display-inline">by striking <quote>No provider</quote> and inserting the following:</text><quoted-block style="OLC" id="id0F96A02ABB8B4E62ADFC97CEB95288AC" act-name=""><subparagraph id="id7B1766E8F7664179A2AE92EE782A397D"><enum>(A)</enum><header>In general</header><text>Subject to subparagraph (B), no provider</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause><clause commented="no" display-inline="no-display-inline" id="id6f1dbd4c0e894a208fea081d56455358"><enum>(ii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id690AD93DC74C4BD89460EDA03C932472"><subparagraph id="idE66F481935EF4A9F80C370601EE29DD6"><enum>(B)</enum><header>Affirmative defense</header><text>In a criminal or civil action against a provider or user of an interactive computer service that treats the provider or user as the publisher or speaker of any information, the provider or user shall bear the burden of proving that the provider or user is not an information content provider with respect to that information for purposes of subparagraph (A).</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4bf65382878346d78ee9e522fae33e8f"><enum>(B)</enum><text display-inline="yes-display-inline">in paragraph (2)(B), by striking <quote>paragraph (1)</quote> and inserting <quote>subparagraph (A)</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfcd28f158849480690c8c5fee13e691f"><enum>(C)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idEBA37FFF15E944D18B9DC3A750251F93"><paragraph id="id506E2D0F2E334BB0A5C425223A66BA16"><enum>(3)</enum><header>Loss of protection in cases of governmental censorship</header><subparagraph commented="no" display-inline="no-display-inline" id="idc60d1f257c964b3682c2ed75843d8407"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text>Except as provided in subparagraph (B), this subsection shall not apply to a provider of an interactive computer service that restricts access to or availability of material—</text><clause commented="no" display-inline="no-display-inline" id="id630929b231064782895d2c98dd1cf945"><enum>(i)</enum><text display-inline="yes-display-inline">in a manner that reasonably appears to express, promote, limit the visibility of, or suppress legitimate political speech, including a discernible viewpoint; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ide579fb3394dd4cc49b88f32a66f5b3f8"><enum>(ii)</enum><text display-inline="yes-display-inline">as a result of a communication that—</text><subclause commented="no" display-inline="no-display-inline" id="idd5ae8aea46394f82b6a6502bc43ba586"><enum>(I)</enum><text display-inline="yes-display-inline">is sent to the provider by— </text><item commented="no" display-inline="no-display-inline" id="id3437d10b66124527b3a17ffd96a510e3"><enum>(aa)</enum><text display-inline="yes-display-inline">a governmental entity; or</text></item><item commented="no" display-inline="no-display-inline" id="id0e7fe7e7babf4ccfbd40f3381cfc6ebb"><enum>(bb)</enum><text>a non-governmental entity that is acting at the request or behest of a governmental entity; and</text></item></subclause><subclause commented="no" display-inline="no-display-inline" id="ida21299f3a46f45bebb053a8539f4a7fe"><enum>(II)</enum><text>the applicable entity under subclause (I) sends only to the provider and not to any other entity.</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3e9d1c19cd304197880d535535d6b49b"><enum>(B)</enum><header>Exception</header><text display-inline="yes-display-inline">A communication that is for a legitimate law enforcement purpose or a national security purpose shall not be considered to be a communication that is described in subparagraph (A)(ii).</text></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id76b0c08d682b43deb81ffb264cf195ed"><enum>(2)</enum><text>in subsection (f), by adding at the end the following:</text><quoted-block style="OLC" id="id2ED5CEF38D4642BF9053471AB60BBAA0" act-name=""><paragraph id="id5B2F26ACE54C4F968F6FBB61357A873C"><enum>(5)</enum><header>Legitimate law enforcement purpose</header><text>The term <term>legitimate law enforcement purpose</term> means, with respect to a communication, that the purpose of the communication is so that a law enforcement agency can, within the lawful authority of that agency, investigate a criminal offense.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3957d54d588e497997946dc0ca5bc166"><enum>(6)</enum><header>National security purpose</header><text display-inline="yes-display-inline">The term <term>national security purpose</term> means, with respect to a communication, that the purpose of the communication relates to—</text><subparagraph commented="no" display-inline="no-display-inline" id="id95a8d0a56e6e433899185234551fe3e1"><enum>(A)</enum><text display-inline="yes-display-inline">intelligence activities;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="iddabfd36edd3d4ab5893a32f530080f86"><enum>(B)</enum><text display-inline="yes-display-inline">cryptologic activities that relate to the national security of the United States;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9bdefcbaf2f94fa8b95febdb8ac5619a"><enum>(C)</enum><text display-inline="yes-display-inline">command and control of the Armed Forces;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id88e0cdf9bf154c32bbc910f99d11cfa4"><enum>(D)</enum><text display-inline="yes-display-inline">equipment that is an integral part of a weapon or a weapons system; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9b84b651a2544f58be6e3c3760a739bd"><enum>(E)</enum><text display-inline="yes-display-inline">the direct fulfillment of a military or intelligence mission.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section></legis-body></bill> 

