<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 114–153—MAY 11, 2016?>


<?I97 130 STAT. ?>
<?I98 130 STAT. ?>
<?I99 130 STAT. ?>
<?I50 PUBLIC LAW 114–153—MAY 11, 2016?>
<?I51 PUBLIC LAW 114–153—MAY 11, 2016?>
<?I52 PUBLIC LAW 114–153—MAY 11, 2016?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 114–153: To amend chapter 90 of title 18, United States Code, to provide Federal jurisdiction for the theft of trade secrets, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>153</docNumber>
<citableAs>Public Law 114–153</citableAs><citableAs>130 Stat. 376</citableAs>
<approvedDate>2016-05-11</approvedDate>
<dc:date>2016-05-11</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>114</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?375</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 114–153—MAY 11, 2016</centerRunningHead>
<coverTitle>DEFEND TRADE SECRETS ACT OF 2016</coverTitle>
</note>
<page identifier="/us/stat/130/376">130 STAT. 376</page>
<dc:type>Public Law</dc:type><docNumber>114–153</docNumber>
<congress value="114">114th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To amend chapter 90 of title 18, United States Code, to provide Federal jurisdiction for the theft of trade secrets, and for other purposes.<sidenote><p class="centered fontsize8" id="xde7baa30-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2016-05-11">May 11, 2016</approvedDate></p><p class="centered fontsize8" id="xde7baa31-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/114/s/1890">S. 1890</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7baa32-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Defend Trade Secrets Act of 2016.</p><p class="leftAlign firstIndent0 fontsize8" id="xde7baa33-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1">18 USC 1 note</ref>.</p></sidenote>
<section id="d338839e102" identifier="/us/pl/114/153/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Defend Trade Secrets Act of 2016</shortTitle>”.</content></section>
<section id="d338839e112" identifier="/us/pl/114/153/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>FEDERAL JURISDICTION FOR THEFT OF TRADE SECRETS.</heading><subsection class="firstIndent0 fontsize10" id="yde7ce2b4-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content><ref href="/us/usc/t18/s1836">Section 1836 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> subsection (b) and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="yde7e1b35-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Private Civil Actions</inline>.—</heading><paragraph class="fontsize10" id="yde7e1b36-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>An owner of a trade secret that is misappropriated may bring a civil action under this subsection if the trade secret is related to a product or service used in, or intended for use in, interstate or foreign commerce.</content></paragraph>
<paragraph class="fontsize10" id="yde7e1b37-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Civil seizure</inline>.—</heading><subparagraph class="fontsize10" id="yde7e1b38-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><clause class="fontsize10" id="yde7e1b39-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><heading class="fontsize10"><inline class="smallCaps">Application</inline>.—</heading><content>Based on an affidavit or verified complaint satisfying the requirements of this paragraph, the court may, upon ex parte application but only in extraordinary circumstances, issue an order providing for the seizure of property necessary to prevent the propagation or dissemination of the trade secret that is the subject of the action.</content></clause>
<clause class="fontsize10" id="yde7e1b3a-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><heading class="fontsize10"><inline class="smallCaps">Requirements for issuing order</inline>.—</heading><chapeau>The court may not grant an application under clause (i) unless the court finds that it clearly appears from specific facts that—</chapeau><subclause class="fontsize10" id="yde7e1b3b-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>an order issued pursuant to Rule 65 of the Federal Rules of Civil Procedure or another form of equitable relief would be inadequate to achieve the purpose of this paragraph because the party to which the order would be issued would evade, avoid, or otherwise not comply with such an order;</content></subclause>
<subclause class="fontsize10" id="yde7e1b3c-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>an immediate and irreparable injury will occur if such seizure is not ordered;</content></subclause>
<subclause class="fontsize10" id="yde7e1b3d-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">“(III) </num><content>the harm to the applicant of denying the application outweighs the harm to the legitimate interests of the person against whom seizure would be ordered of granting the application and <page identifier="/us/stat/130/377">130 STAT. 377</page>
substantially outweighs the harm to any third parties who may be harmed by such seizure;</content></subclause>
<subclause class="fontsize10" id="yde7e1b3e-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">“(IV) </num><chapeau>the applicant is likely to succeed in showing that—</chapeau><item class="fontsize10" id="yde7e1b3f-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">“(aa) </num><content>the information is a trade secret; and</content></item>
<item class="fontsize10" id="yde7e1b40-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">“(bb) </num><chapeau>the person against whom seizure would be ordered—</chapeau><subitem class="fontsize10" id="yde7e1b41-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658131"><num class="fontsize10" style="-uslm-lc:emspace2" value="AA">“(AA) </num><content>misappropriated the trade secret of the applicant by improper means; or</content></subitem>
<subitem class="fontsize10" id="yde7e1b42-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658131"><num class="fontsize10" style="-uslm-lc:emspace2" value="BB">“(BB) </num><content>conspired to use improper means to misappropriate the trade secret of the applicant;</content></subitem>
</item>
</subclause>
<subclause class="fontsize10" id="yde7e1b43-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="V">“(V) </num><chapeau>the person against whom seizure would be ordered has actual possession of—</chapeau><item class="fontsize10" id="yde7e1b44-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">“(aa) </num><content>the trade secret; and</content></item>
<item class="fontsize10" id="yde7e1b45-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">“(bb) </num><content>any property to be seized;</content></item>
</subclause>
<subclause class="fontsize10" id="yde7e1b46-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="VI">“(VI) </num><content>the application describes with reasonable particularity the matter to be seized and, to the extent reasonable under the circumstances, identifies the location where the matter is to be seized;</content></subclause>
<subclause class="fontsize10" id="yde7e1b47-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="VII">“(VII) </num><content>the person against whom seizure would be ordered, or persons acting in concert with such person, would destroy, move, hide, or otherwise make such matter inaccessible to the court, if the applicant were to proceed on notice to such person; and</content></subclause>
<subclause class="fontsize10" id="yde7e1b48-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="VIII">“(VIII) </num><content>the applicant has not publicized the requested seizure.</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e1b49-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Elements of order</inline>.—</heading><chapeau>If an order is issued under subparagraph (A), it shall—</chapeau><clause class="fontsize10" id="yde7e1b4a-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>set forth findings of fact and conclusions of law required for the order;</content></clause>
<clause class="fontsize10" id="yde7e1b4b-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>provide for the narrowest seizure of property necessary to achieve the purpose of this paragraph and direct that the seizure be conducted in a manner that minimizes any interruption of the business operations of third parties and, to the extent possible, does not interrupt the legitimate business operations of the person accused of misappropriating the trade secret;</content></clause>
<clause class="fontsize10" id="yde7e1b4c-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii)</num><subclause class="inline" id="yde7e1b4d-e866-11f0-bc57-ad3ac4b1618c"><num value="I">(I) </num><content>be accompanied by an order protecting the seized property from disclosure by prohibiting access by the applicant or the person against whom the order is directed, and prohibiting any copies, in whole or in part, of the seized property, to prevent undue damage to the party against whom the order has issued or others, until such parties have an opportunity to be heard in court; and</content></subclause>
<subclause class="indentUp0 fontsize10" id="yde7e1b4e-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>provide that if access is granted by the court to the applicant or the person against whom the order is directed, the access shall be consistent with subparagraph (D);</content></subclause>
</clause>
<clause class="fontsize10" id="yde7e1b4f-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><chapeau>provide guidance to the law enforcement officials executing the seizure that clearly delineates the scope of the authority of the officials, including—<page identifier="/us/stat/130/378">130 STAT. 378</page></chapeau><subclause class="fontsize10" id="yde7e1b50-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>the hours during which the seizure may be executed; and</content></subclause>
<subclause class="fontsize10" id="yde7e1b51-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>whether force may be used to access locked areas;</content></subclause>
</clause>
<clause class="fontsize10" id="yde7e1b52-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">“(v) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e1b53-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xde7e4264-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Notification.</p></sidenote><content>set a date for a hearing described in subparagraph (F) at the earliest possible time, and not later than 7 days after the order has issued, unless the party against whom the order is directed and others harmed by the order consent to another date for the hearing, except that a party against whom the order has issued or any person harmed by the order may move the court at any time to dissolve or modify the order after giving notice to the applicant who obtained the order; and</content></clause>
<clause class="fontsize10" id="yde7e4265-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">“(vi) </num><content>require the person obtaining the order to provide the security determined adequate by the court for the payment of the damages that any person may be entitled to recover as a result of a wrongful or excessive seizure or wrongful or excessive attempted seizure under this paragraph.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e4266-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e4267-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Courts.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Protection from publicity</inline>.—</heading><content>The court shall take appropriate action to protect the person against whom an order under this paragraph is directed from publicity, by or at the behest of the person obtaining the order, about such order and any seizure under such order.</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e4268-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><heading class="fontsize10"><inline class="smallCaps">Materials in custody of court</inline>.—</heading><clause class="fontsize10" id="yde7e4269-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Any materials seized under this paragraph shall be taken into the custody of the court. The court shall secure the seized material from physical and electronic access during the seizure and while in the custody of the court.</content></clause>
<clause class="fontsize10" id="yde7e426a-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><heading class="fontsize10"><inline class="smallCaps">Storage medium</inline>.—</heading><content>If the seized material includes a storage medium, or if the seized material is stored on a storage medium, the court shall prohibit the medium from being connected to a network or the Internet without the consent of both parties, until the hearing required under subparagraph (B)(v) and described in subparagraph (F).</content></clause>
<clause class="fontsize10" id="yde7e426b-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><heading class="fontsize10"><inline class="smallCaps">Protection of confidentiality</inline>.—</heading><content>The court shall take appropriate measures to protect the confidentiality of seized materials that are unrelated to the trade secret information ordered seized pursuant to this paragraph unless the person against whom the order is entered consents to disclosure of the material.</content></clause>
<clause class="fontsize10" id="yde7e426c-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><heading class="fontsize10"><inline class="smallCaps">Appointment of special master</inline>.—</heading><content>The court may appoint a special master to locate and isolate all misappropriated trade secret information and to facilitate the return of unrelated property and data to the person from whom the property was seized. The special master appointed by the court shall agree to be bound by a non-disclosure agreement approved by the court.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e426d-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><heading class="fontsize10"><inline class="smallCaps">Service of order</inline>.—</heading><content>The court shall order that service of a copy of the order under this paragraph, and the submissions of the applicant to obtain the order, shall be made by a Federal law enforcement officer who, upon <page identifier="/us/stat/130/379">130 STAT. 379</page>
making service, shall carry out the seizure under the order. The court may allow State or local law enforcement officials to participate, but may not permit the applicant or any agent of the applicant to participate in the seizure. <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e426e-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote>At the request of law enforcement officials, the court may allow a technical expert who is unaffiliated with the applicant and who is bound by a court-approved non-disclosure agreement to participate in the seizure if the court determines that the participation of the expert will aid the efficient execution of and minimize the burden of the seizure.</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e426f-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><heading class="fontsize10"><inline class="smallCaps">Seizure hearing</inline>.—</heading><clause class="fontsize10" id="yde7e4270-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><heading class="fontsize10"><inline class="smallCaps">Date</inline>.—</heading><content>A court that issues a seizure order shall hold a hearing on the date set by the court under subparagraph (B)(v).</content></clause>
<clause class="fontsize10" id="yde7e4271-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><heading class="fontsize10"><inline class="smallCaps">Burden of proof</inline>.—</heading><content>At a hearing held under this subparagraph, the party who obtained the order under subparagraph (A) shall have the burden to prove the facts supporting the findings of fact and conclusions of law necessary to support the order. If the party fails to meet that burden, the seizure order shall be dissolved or modified appropriately.</content></clause>
<clause class="fontsize10" id="yde7e4272-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><heading class="fontsize10"><inline class="smallCaps">Dissolution or modification of order</inline>.—</heading><content>A party against whom the order has been issued or any person harmed by the order may move the court at any time to dissolve or modify the order after giving notice to the party who obtained the order.</content></clause>
<clause class="fontsize10" id="yde7e4273-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><heading class="fontsize10"><inline class="smallCaps">Discovery time limits</inline>.—</heading><content>The court may make such orders modifying the time limits for discovery under the Federal Rules of Civil Procedure as may be necessary to prevent the frustration of the purposes of a hearing under this subparagraph.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e4274-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">“(G) </num><heading class="fontsize10"><inline class="smallCaps">Action for damage caused by wrongful seizure</inline>.—</heading><content>A person who suffers damage by reason of a wrongful or excessive seizure under this paragraph has a cause of action against the applicant for the order under which such seizure was made, and shall be entitled to the same relief as is provided under section 34(d)(11) of the Trademark Act of 1946 (<ref href="/us/usc/t15/s1116/d/11">15 U.S.C. 1116(d)(11)</ref>). The security posted with the court under subparagraph (B)(vi) shall not limit the recovery of third parties for damages.</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e4275-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">“(H) </num><heading class="fontsize10"><inline class="smallCaps">Motion for encryption</inline>.—</heading><content>A party or a person who claims to have an interest in the subject matter seized may make a motion at any time, which may be heard ex parte, to encrypt any material seized or to be seized under this paragraph that is stored on a storage medium. The motion shall include, when possible, the desired encryption method.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yde7e4276-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Remedies</inline>.—</heading><chapeau>In a civil action brought under this subsection with respect to the misappropriation of a trade secret, a court may—</chapeau><subparagraph class="fontsize10" id="yde7e4277-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>grant an injunction—</chapeau><clause class="fontsize10" id="yde7e4278-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><chapeau>to prevent any actual or threatened misappropriation described in paragraph (1) on such terms as the court deems reasonable, provided the order does not—<page identifier="/us/stat/130/380">130 STAT. 380</page></chapeau><subclause class="fontsize10" id="yde7e4279-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>prevent a person from entering into an employment relationship, and that conditions placed on such employment shall be based on evidence of threatened misappropriation and not merely on the information the person knows; or</content></subclause>
<subclause class="fontsize10" id="yde7e427a-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>otherwise conflict with an applicable State law prohibiting restraints on the practice of a lawful profession, trade, or business;</content></subclause>
</clause>
<clause class="fontsize10" id="yde7e427b-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>if determined appropriate by the court, requiring affirmative actions to be taken to protect the trade secret; and</content></clause>
<clause class="fontsize10" id="yde7e427c-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>in exceptional circumstances that render an injunction inequitable, that conditions future use of the trade secret upon payment of a reasonable royalty for no longer than the period of time for which such use could have been prohibited;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e427d-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><chapeau>award—</chapeau><clause class="fontsize10" id="yde7e427e-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i)</num><subclause class="inline" id="yde7e427f-e866-11f0-bc57-ad3ac4b1618c"><num value="I">(I) </num><content>damages for actual loss caused by the misappropriation of the trade secret; and</content></subclause>
<subclause class="indentUp0 fontsize10" id="yde7e4280-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>damages for any unjust enrichment caused by the misappropriation of the trade secret that is not addressed in computing damages for actual loss; or</content></subclause>
</clause>
<clause class="fontsize10" id="yde7e4281-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>in lieu of damages measured by any other methods, the damages caused by the misappropriation measured by imposition of liability for a reasonable royalty for the misappropriator’s unauthorized disclosure or use of the trade secret;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde7e4282-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>if the trade secret is willfully and maliciously misappropriated, award exemplary damages in an amount not more than 2 times the amount of the damages awarded under subparagraph (B); and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e4283-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>if a claim of the misappropriation is made in bad faith, which may be established by circumstantial evidence, a motion to terminate an injunction is made or opposed in bad faith, or the trade secret was willfully and maliciously misappropriated, award reasonable attorney’s fees to the prevailing party.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e4284-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Jurisdiction</inline>.—</heading><content>The district courts of the United States shall have original jurisdiction of civil actions brought under this section.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e4285-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Period of Limitations</inline>.—</heading><content>A civil action under subsection (b) may not be commenced later than 3 years after the date on which the misappropriation with respect to which the action would relate is discovered or by the exercise of reasonable diligence should have been discovered. For purposes of this subsection, a continuing misappropriation constitutes a single claim of misappropriation.”</content></subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e4286-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau><ref href="/us/usc/t18/s1839">Section 1839 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yde7e4287-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>in paragraph (3)—</chapeau><subparagraph class="fontsize10" id="yde7e4288-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in subparagraph (B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the public</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>another person who can obtain economic value from the disclosure or use of the information</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e4289-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yde7e428a-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in paragraph (4), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> a semicolon; and</content></paragraph>
<paragraph class="fontsize10" id="yde7e428b-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<page identifier="/us/stat/130/381">130 STAT. 381</page>
<quotedContent><paragraph class="indentUp0 fontsize10" id="yde7e90ac-e866-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><chapeau>the term ‘<term>misappropriation</term>’ means—</chapeau><subparagraph class="fontsize10" id="yde7e90ad-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e90ae-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><chapeau>disclosure or use of a trade secret of another without express or implied consent by a person who—</chapeau><clause class="fontsize10" id="yde7e90af-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>used improper means to acquire knowledge of the trade secret;</content></clause>
<clause class="fontsize10" id="yde7e90b0-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><chapeau>at the time of disclosure or use, knew or had reason to know that the knowledge of the trade secret was—</chapeau><subclause class="fontsize10" id="yde7e90b1-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>derived from or through a person who had used improper means to acquire the trade secret;</content></subclause>
<subclause class="fontsize10" id="yde7e90b2-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>acquired under circumstances giving rise to a duty to maintain the secrecy of the trade secret or limit the use of the trade secret; or</content></subclause>
<subclause class="fontsize10" id="yde7e90b3-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">“(III) </num><content>derived from or through a person who owed a duty to the person seeking relief to maintain the secrecy of the trade secret or limit the use of the trade secret; or</content></subclause>
</clause>
<clause class="fontsize10" id="yde7e90b4-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><chapeau>before a material change of the position of the person, knew or had reason to know that—</chapeau><subclause class="fontsize10" id="yde7e90b5-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>the trade secret was a trade secret; and</content></subclause>
<subclause class="fontsize10" id="yde7e90b6-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>knowledge of the trade secret had been acquired by accident or mistake;</content></subclause>
</clause>
</subparagraph>
</paragraph>
<paragraph class="indentUp0 fontsize10" id="yde7e90b7-e866-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><chapeau>the term ‘<term>improper means</term>’—</chapeau><subparagraph class="fontsize10" id="yde7e90b8-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7e90b9-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>does not include reverse engineering, independent derivation, or any other lawful means of acquisition; and</content></subparagraph>
</paragraph>
<paragraph class="indentUp0 fontsize10" id="yde7e90ba-e866-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>the term ‘<term>Trademark Act of 1946</term>’ means the Act entitled ‘An Act to provide for the registration and protection of trademarks used in commerce, to carry out the provisions of certain international conventions, and for other purposes, approved July 5, 1946 (<ref href="/us/usc/t15/s1051/etseq">15 U.S.C. 1051 et seq.</ref>) (commonly referred to as the “Trademark Act of 1946” or the “Lanham Act”)’.”</content></paragraph>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e90bb-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/c" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Exceptions to Prohibition</inline>.—</heading><content><ref href="/us/usc/t18/s1833">Section 1833 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction>, in the matter preceding paragraph (1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>or create a private right of action for</quotedText>” after “<quotedText>prohibit</quotedText>”.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e90bc-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Conforming Amendments</inline>.—</heading><paragraph class="fontsize10" id="yde7e90bd-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/d/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The section heading for <ref href="/us/usc/t18/s1836">section 1836 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction> to read as follows:<quotedContent><section class="centered fontsize12" id="yde7e90be-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658164"><num class="fontsize12" value="1836">“§ 1836.</num><heading class="fontsize12"> Civil proceedings”</heading></section>
</quotedContent>.</content></paragraph>
<paragraph class="fontsize10" id="yde7e90bf-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/d/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The table of sections for <ref href="/us/usc/t18/ch90">chapter 90 of title 18, United States Code</ref>, <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e90c0-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1831">18 USC 1831</ref> prec.<?GPOvSpace 04?></p></sidenote><amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> the item relating to section 1836 and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“1836. </designator>
<label>Civil proceedings.”.<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e90c1-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e90c2-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p><p class="leftAlign firstIndent0 fontsize8" id="xde7e90c3-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1833">18 USC 1833 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Effective Date</inline>.—</heading><content>The amendments made by this section shall apply with respect to any misappropriation of a trade secret (as defined in <ref href="/us/usc/t18/s1839">section 1839 of title 18, United States Code</ref>, as <page identifier="/us/stat/130/382">130 STAT. 382</page>
amended by this section) for which any act occurs on or after the date of the enactment of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e90c4-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e90c5-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1833">18 USC 1833 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in the amendments made by this section shall be construed to modify the rule of construction under <ref href="/us/usc/t18/s1838">section 1838 of title 18, United States Code</ref>, or to preempt any other provision of law.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde7e90c6-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s2/g" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">(g) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7e90c7-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1833">18 USC 1833 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Applicability to Other Laws</inline>.—</heading><content>This section and the amendments made by this section shall not be construed to be a law pertaining to intellectual property for purposes of any other Act of Congress.</content></subsection>
</section>
<section id="d338839e850" identifier="/us/pl/114/153/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>TRADE SECRET THEFT ENFORCEMENT.</heading><subsection class="firstIndent0 fontsize10" id="yde7edee8-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau><ref href="/us/usc/t18/ch90">Chapter 90 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yde7edee9-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in section 1832(b), by <amendingAction type="delete">striking</amendingAction> “<quotedText>$5,000,000</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the greater of $5,000,000 or 3 times the value of the stolen trade secret to the organization, including expenses for research and design and other costs of reproducing the trade secret that the organization has thereby avoided</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yde7edeea-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in section 1835—</chapeau><subparagraph class="fontsize10" id="yde7edeeb-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>In any prosecution</quotedText>” and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><subsection class="indentDown2 firstIndent0 fontsize10" id="yde7edeec-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>In any prosecution”</content></subsection>
</quotedContent>; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7edeed-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="indentDown2 firstIndent0 fontsize10" id="yde7f05fe-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Rights of Trade Secret Owners</inline>.—</heading><content>The court may not authorize or direct the disclosure of any information the owner asserts to be a trade secret unless the court allows the owner the opportunity to file a submission under seal that describes the interest of the owner in keeping the information confidential. No submission under seal made under this subsection may be used in a prosecution under this chapter for any purpose other than those set forth in this section, or otherwise required by law. The provision of information relating to a trade secret to the United States or the court in connection with a prosecution under this chapter shall not constitute a waiver of trade secret protection, and the disclosure of information relating to a trade secret in connection with a prosecution under this chapter shall not constitute a waiver of trade secret protection unless the trade secret owner expressly consents to such waiver.”</content></subsection>
</quotedContent>.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde7f05ff-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s3/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">RICO Predicate Offenses</inline>.—</heading><content><ref href="/us/usc/t18/s1961/1">Section 1961(1) of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> “<quotedText>sections 1831 and 1832 (relating to economic espionage and theft of trade secrets),</quotedText>” before “<quotedText>section 1951</quotedText>”.</content></subsection>
</section>
<section id="d338839e949" identifier="/us/pl/114/153/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7f0600-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t18/s1832">18 USC 1832 note</ref>.</p></sidenote><heading>REPORT ON THEFT OF TRADE SECRETS OCCURRING ABROAD.</heading><subsection class="firstIndent0 fontsize10" id="yde7fa241-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yde7fa242-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/a/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Director</inline>.—</heading><content>The term “<term>Director</term>” means the Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa243-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Foreign instrumentality, etc</inline>.—</heading><content>The terms “foreign instrumentality”, “foreign agent”, and “trade secret” have the meanings given those terms in <ref href="/us/usc/t18/s1839">section 1839 of title 18, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa244-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/a/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">State</inline>.—</heading><content>The term “<term>State</term>” includes the District of Columbia and any commonwealth, territory, or possession of the United States.<page identifier="/us/stat/130/383">130 STAT. 383</page></content></paragraph>
<paragraph class="fontsize10" id="yde7fa245-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/a/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">United states company</inline>.—</heading><content>The term “<term>United States company</term>” means an organization organized under the laws of the United States or a State or political subdivision thereof.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde7fa246-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7fa247-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="xde7fa248-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p><p class="leftAlign firstIndent0 fontsize8" id="xde7fa249-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Reports</inline>.—</heading><chapeau>Not later than 1 year after the date of enactment of this Act, and biannually thereafter, the Attorney General, in consultation with the Intellectual Property Enforcement Coordinator, the Director, and the heads of other appropriate agencies, shall submit to the Committees on the Judiciary of the House of Representatives and the Senate, and make publicly available on the Web site of the Department of Justice and disseminate to the public through such other means as the Attorney General may identify, a report on the following:</chapeau><paragraph class="fontsize10" id="yde7fa24a-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The scope and breadth of the theft of the trade secrets of United States companies occurring outside of the United States.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa24b-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The extent to which theft of trade secrets occurring outside of the United States is sponsored by foreign governments, foreign instrumentalities, or foreign agents.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa24c-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The threat posed by theft of trade secrets occurring outside of the United States.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa24d-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The ability and limitations of trade secret owners to prevent the misappropriation of trade secrets outside of the United States, to enforce any judgment against foreign entities for theft of trade secrets, and to prevent imports based on theft of trade secrets overseas.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa24e-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>A breakdown of the trade secret protections afforded United States companies by each country that is a trading partner of the United States and enforcement efforts available and undertaken in each such country, including a list identifying specific countries where trade secret theft, laws, or enforcement is a significant problem for United States companies.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa24f-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>Instances of the Federal Government working with foreign countries to investigate, arrest, and prosecute entities and individuals involved in the theft of trade secrets outside of the United States.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa250-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>Specific progress made under trade agreements and treaties, including any new remedies enacted by foreign countries, to protect against theft of trade secrets of United States companies outside of the United States.</content></paragraph>
<paragraph class="fontsize10" id="yde7fa251-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7fa252-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="xde7fa253-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">tions.</p></sidenote><chapeau>Recommendations of legislative and executive branch actions that may be undertaken to—</chapeau><subparagraph class="fontsize10" id="yde7fa254-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/8/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>reduce the threat of and economic impact caused by the theft of the trade secrets of United States companies occurring outside of the United States;</content></subparagraph>
<subparagraph class="fontsize10" id="yde7fa255-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/8/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>educate United States companies regarding the threats to their trade secrets when taken outside of the United States;</content></subparagraph>
<subparagraph class="fontsize10" id="yde7fa256-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/8/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>provide assistance to United States companies to reduce the risk of loss of their trade secrets when taken outside of the United States; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7fa257-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s4/b/8/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>provide a mechanism for United States companies to confidentially or anonymously report the theft of trade secrets occurring outside of the United States.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d338839e1093" identifier="/us/pl/114/153/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>SENSE OF CONGRESS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xde7ff078-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  It is the sense of Congress that—<page identifier="/us/stat/130/384">130 STAT. 384</page></chapeau><paragraph class="fontsize10" id="yde7ff079-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>trade secret theft occurs in the United States and around the world;</content></paragraph>
<paragraph class="fontsize10" id="yde7ff07a-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>trade secret theft, wherever it occurs, harms the companies that own the trade secrets and the employees of the companies;</content></paragraph>
<paragraph class="fontsize10" id="yde7ff07b-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content><ref href="/us/usc/t18/ch90">chapter 90 of title 18, United States Code</ref> (commonly known as the “Economic Espionage Act of 1996”), applies broadly to protect trade secrets from theft; and</content></paragraph>
<paragraph class="fontsize10" id="yde7ff07c-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>it is important when seizing information to balance the need to prevent or remedy misappropriation with the need to avoid interrupting the—</chapeau><subparagraph class="fontsize10" id="yde7ff07d-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>business of third parties; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde7ff07e-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s5/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>legitimate interests of the party accused of wrongdoing.</content></subparagraph>
</paragraph>
</section>
<section id="d338839e1135" identifier="/us/pl/114/153/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde7ff07f-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t28/s620">28 USC 620 note</ref>.</p></sidenote><heading>BEST PRACTICES.</heading><subsection class="firstIndent0 fontsize10" id="yde801790-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde801791-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Not later than 2 years after the date of enactment of this Act, the Federal Judicial Center, using existing resources, shall develop recommended best practices for—</chapeau><paragraph class="fontsize10" id="yde801792-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the seizure of information and media storing the information; and</content></paragraph>
<paragraph class="fontsize10" id="yde803ea3-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the securing of the information and media once seized.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde803ea4-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Updates</inline>.—</heading><content>The Federal Judicial Center shall update the recommended best practices developed under subsection (a) from time to time.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yde803ea5-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde803ea6-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Records.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Congressional Submissions</inline>.—</heading><chapeau>The Federal Judicial Center shall provide a copy of the recommendations developed under subsection (a), and any updates made under subsection (b), to the—</chapeau><paragraph class="fontsize10" id="yde803ea7-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Committee on the Judiciary of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="yde803ea8-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s6/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>Committee on the Judiciary of the House of Representatives.</content></paragraph>
</subsection>
</section>
<section id="d338839e1198" identifier="/us/pl/114/153/s7" style="-uslm-lc:I658141"><num class="fontsize12" value="7">SEC. 7. </num><heading>IMMUNITY FROM LIABILITY FOR CONFIDENTIAL DISCLOSURE OF A TRADE SECRET TO THE GOVERNMENT OR IN A COURT FILING.</heading><subsection class="firstIndent0 fontsize10" id="yde808cc9-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s7/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Amendment</inline>.—</heading><chapeau><ref href="/us/usc/t18/s1833">Section 1833 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="yde808cca-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s7/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>This chapter</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>(a) <headingText class="smallCaps">In General</headingText>.—This chapter</quotedText>”;</content></paragraph>
<paragraph class="fontsize10" id="yde808ccb-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s7/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in subsection (a)(2), as designated by paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the reporting of a suspected violation of law to any governmental entity of the United States, a State, or a political subdivision of a State, if such entity has lawful authority with respect to that violation</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the disclosure of a trade secret in accordance with subsection (b)</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="yde808ccc-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s7/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="yde80daed-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Immunity From Liability for Confidential Disclosure of a Trade Secret to the Government or in a Court Filing</inline>.—</heading><paragraph class="fontsize10" id="yde80daee-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Immunity</inline>.—</heading><chapeau>An individual shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of a trade secret that—</chapeau><subparagraph class="fontsize10" id="yde80daef-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>is made—</chapeau><clause class="fontsize10" id="yde80daf0-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>in confidence to a Federal, State, or local government official, either directly or indirectly, or to an attorney; and</content></clause>
<clause class="fontsize10" id="yde80daf1-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>solely for the purpose of reporting or investigating a suspected violation of law; or<page identifier="/us/stat/130/385">130 STAT. 385</page></content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yde80daf2-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yde80daf3-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Use of trade secret information in anti-retaliation lawsuit</inline>.—</heading><chapeau>An individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the attorney of the individual and use the trade secret information in the court proceeding, if the individual—</chapeau><subparagraph class="fontsize10" id="yde80daf4-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>files any document containing the trade secret under seal; and</content></subparagraph>
<subparagraph class="fontsize10" id="yde80daf5-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>does not disclose the trade secret, except pursuant to court order.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yde80daf6-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Notice</inline>.—</heading><subparagraph class="fontsize10" id="yde80daf7-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde80daf8-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Contracts.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>An employer shall provide notice of the immunity set forth in this subsection in any contract or agreement with an employee that governs the use of a trade secret or other confidential information.</content></subparagraph>
<subparagraph class="fontsize10" id="yde80daf9-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Policy document</inline>.—</heading><content>An employer shall be considered to be in compliance with the notice requirement in subparagraph (A) if the employer provides a cross-reference to a policy document provided to the employee that sets forth the employer’s reporting policy for a suspected violation of law.</content></subparagraph>
<subparagraph class="fontsize10" id="yde80dafa-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Non-compliance</inline>.—</heading><content>If an employer does not comply with the notice requirement in subparagraph (A), the employer may not be awarded exemplary damages or attorney fees under subparagraph (C) or (D) of section 1836(b)(3) in an action against an employee to whom notice was not provided.</content></subparagraph>
<subparagraph class="fontsize10" id="yde80dafb-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xde80dafc-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Contracts.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Applicability</inline>.—</heading><content>This paragraph shall apply to contracts and agreements that are entered into or updated after the date of enactment of this subsection.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yde80dafd-e866-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Employee defined</inline>.—</heading><content>For purposes of this subsection, the term ‘<term>employee</term>’ includes any individual performing work as a contractor or consultant for an employer.</content></paragraph>
<paragraph class="fontsize10" id="yde80dafe-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><heading class="fontsize10"><inline class="smallCaps">Rule of construction</inline>.—</heading><content>Except as expressly provided for under this subsection, nothing in this subsection shall be construed to authorize, or limit liability for, an act that is otherwise prohibited by law, such as the unlawful access of material by unauthorized means.”</content></paragraph>
</subsection>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yde80daff-e866-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/114/153/s7/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Technical and Conforming Amendment</inline>.—</heading><content><ref href="/us/usc/t18/s1838">Section 1838 of title 18, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> “<quotedText>This<page identifier="/us/stat/130/386">130 STAT. 386</page>
 chapter</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Except as provided in section 1833(b), this chapter</quotedText>”.</content></subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2016-05-11">May 11, 2016</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/114/s/1890">S. 1890</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/114/529">114–529</ref> (<committee>Comm. on the Judiciary</committee>).
</note>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/114/220">114–220</ref> (<committee>Comm. on the Judiciary</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 162 (2016):</heading>
<p class="indentUp4 firstIndent-1" id="xde810210-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Apr. 4, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="xde810211-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Apr. 27, considered and passed House.</p></note>
<note>
<heading style="-uslm-lc:I658032">DAILY COMPILATION OF PRESIDENTIAL DOCUMENTS (2016):</heading>
<p class="indentUp4 firstIndent-1" id="xde810212-e866-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">May 11, Presidential remarks.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>