<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 114–278—DEC. 16, 2016?>


<?I97 130 STAT. ?>
<?I98 130 STAT. ?>
<?I99 130 STAT. ?>
<?I50 PUBLIC LAW 114–278—DEC. 16, 2016?>
<?I51 PUBLIC LAW 114–278—DEC. 16, 2016?>
<?I52 PUBLIC LAW 114–278—DEC. 16, 2016?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 114–278: To require the Secretary of Homeland Security to prepare a comprehensive security assessment of the transportation security card program, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>278</docNumber>
<citableAs>Public Law 114–278</citableAs><citableAs>130 Stat. 1410</citableAs>
<approvedDate>2016-12-16</approvedDate>
<dc:date>2016-12-16</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>114</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?1409</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 114–278—DEC. 16, 2016</centerRunningHead>
<coverTitle>TRANSPORTATION SECURITY CARD <br/>PROGRAM ASSESSMENT</coverTitle>
</note>
<page identifier="/us/stat/130/1410">130 STAT. 1410</page>
<dc:type>Public Law</dc:type><docNumber>114–278</docNumber>
<congress value="114">114th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Secretary of Homeland Security to prepare a comprehensive security assessment of the transportation security card program, and for other purposes.<sidenote><p class="centered fontsize8" id="x0f71a10f-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2016-12-16">Dec. 16, 2016</approvedDate></p><p class="centered fontsize8" id="x0f71a110-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/114/hr/710">H.R. 710</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula>
<section id="d226096e95" identifier="/us/pl/114/278/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f71a111-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="x0f71a112-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t46/s70105">46 USC 70105 note</ref>.</p></sidenote><heading>TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL SECURITY CARD PROGRAM IMPROVEMENTS AND ASSESSMENT.</heading><subsection class="firstIndent0 fontsize10" id="y0f7327b3-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Credential Improvements</inline>.—</heading><paragraph class="fontsize10" id="y0f7327b4-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 60 days after the date of enactment of this Act, the Administrator of the Transportation Security Administration shall commence actions, consistent with <ref href="/us/usc/t46/s70105">section 70105 of title 46, United States Code</ref>, to improve the Transportation Security Administration’s process for vetting individuals with access to secure areas of vessels and maritime facilities.</content></paragraph>
<paragraph class="fontsize10" id="y0f7327b5-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Required actions</inline>.—</heading><chapeau>The actions described under paragraph (1) shall include—</chapeau><subparagraph class="fontsize10" id="y0f7327b6-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327b7-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Analysis.</p></sidenote><chapeau>conducting a comprehensive risk analysis of security threat assessment procedures, including—</chapeau><clause class="fontsize10" id="y0f7327b8-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>identifying those procedures that need additional internal controls; and</content></clause>
<clause class="fontsize10" id="y0f7327b9-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>identifying best practices for quality assurance at every stage of the security threat assessment;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y0f7327ba-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>implementing the additional internal controls and best practices identified under subparagraph (A);</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327bb-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>improving fraud detection techniques, such as—</chapeau><clause class="fontsize10" id="y0f7327bc-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by establishing benchmarks and a process for electronic document validation;</content></clause>
<clause class="fontsize10" id="y0f7327bd-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by requiring annual training for Trusted Agents; and</content></clause>
<clause class="fontsize10" id="y0f7327be-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327bf-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Review.</p></sidenote><content>by reviewing any security threat assessment-related information provided by Trusted Agents and incorporating any new threat information into updated guidance under subparagraph (D);</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y0f7327c0-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327c1-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Update.</p></sidenote><content>updating the guidance provided to Trusted Agents regarding the vetting process and related regulations;</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327c2-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>finalizing a manual for Trusted Agents and adjudicators on the vetting process; and</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327c3-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>establishing quality controls to ensure consistent procedures to review adjudication decisions and terrorism vetting decisions.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y0f7327c4-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 2 years after the date of enactment of this Act, the Inspector General of the Department <page identifier="/us/stat/130/1411">130 STAT. 1411</page>
of Homeland Security shall submit a report to Congress that evaluates the implementation of the actions described in paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y0f7327c5-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Comprehensive Security Assessment of the Transportation Security Card Program</inline>.—</heading><paragraph class="fontsize10" id="y0f7327c6-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 60 days after the date of enactment of this Act, the Secretary of Homeland Security shall commission an assessment of the effectiveness of the transportation security card program (referred to in this section as “Program”) required under <ref href="/us/usc/t46/s70105">section 70105 of title 46, United States Code</ref>, at enhancing security and reducing security risks for facilities and vessels regulated under chapter 701 of that title.</content></paragraph>
<paragraph class="fontsize10" id="y0f7327c7-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Location</inline>.—</heading><chapeau>The assessment commissioned under paragraph (1) shall be conducted by a research organization with significant experience in port or maritime security, such as—</chapeau><subparagraph class="fontsize10" id="y0f7327c8-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a national laboratory;</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327c9-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>a university-based center within the Science and Technology Directorate’s centers of excellence network; or</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327ca-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>a qualified federally-funded research and development center.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y0f7327cb-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327cc-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reviews.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The assessment commissioned under paragraph (1) shall—</chapeau><subparagraph class="fontsize10" id="y0f7327cd-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>review the credentialing process by determining—</chapeau><clause class="fontsize10" id="y0f7327ce-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>the appropriateness of vetting standards;</content></clause>
<clause class="fontsize10" id="y0f7327cf-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>whether the fee structure adequately reflects the current costs of vetting;</content></clause>
<clause class="fontsize10" id="y0f7327d0-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>whether there is unnecessary redundancy or duplication with other Federal- or State-issued transportation security credentials; and</content></clause>
<clause class="fontsize10" id="y0f7327d1-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>the appropriateness of having varied Federal and State threat assessments and access controls;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y0f7327d2-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>review the process for renewing applications for Transportation Worker Identification Credentials, including the number of days it takes to review application, appeal, and waiver requests for additional information; and</content></subparagraph>
<subparagraph class="fontsize10" id="y0f7327d3-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327d4-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Evaluation.</p></sidenote><chapeau>review the security value of the Program by—</chapeau><clause class="fontsize10" id="y0f7327d5-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>evaluating the extent to which the Program, as implemented, addresses known or likely security risks in the maritime and port environments;</content></clause>
<clause class="fontsize10" id="y0f7327d6-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>evaluating the potential for a non-biometric credential alternative;</content></clause>
<clause class="fontsize10" id="y0f7327d7-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>identifying the technology, business process, and operational impacts of the use of the transportation security card and transportation security card readers in the maritime and port environments;</content></clause>
<clause class="fontsize10" id="y0f7327d8-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>assessing the costs and benefits of the Program, as implemented; and</content></clause>
<clause class="fontsize10" id="y0f7327d9-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/3/C/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>evaluating the extent to which the Secretary of Homeland Security has addressed the deficiencies in the Program identified by the Government Accountability Office and the Inspector General of the Department of Homeland Security before the date of enactment of this Act.<page identifier="/us/stat/130/1412">130 STAT. 1412</page></content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y0f7327da-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Deadlines</inline>.—</heading><content>The assessment commissioned under paragraph (1) shall be completed not later than 1 year after the date on which the assessment is commissioned.</content></paragraph>
<paragraph class="fontsize10" id="y0f7327db-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327dc-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Submission to congress</inline>.—</heading><content>Not later than 60 days after the date that the assessment is completed, the Secretary of Homeland Security shall submit to the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security and the Committee on Transportation and Infrastructure of the House of Representatives the results of the assessment commissioned under this subsection.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y0f7327dd-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327de-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Corrective Action Plan; Program Reforms</inline>.—</heading><chapeau>If the assessment commissioned under subsection (b) identifies a deficiency in the effectiveness of the Program, the Secretary of Homeland Security, not later than 60 days after the date on which the assessment is completed, shall submit a corrective action plan to the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Homeland Security and the Committee on Transportation and Infrastructure of the House of Representatives that—</chapeau><paragraph class="fontsize10" id="y0f7327df-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>responds to findings of the assessment;</content></paragraph>
<paragraph class="fontsize10" id="y0f7327e0-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>includes an implementation plan with benchmarks;</content></paragraph>
<paragraph class="fontsize10" id="y0f7327e1-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>may include programmatic reforms, revisions to regulations, or proposals for legislation; and</content></paragraph>
<paragraph class="fontsize10" id="y0f7327e2-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/c/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>shall be considered in any rulemaking by the Department of Homeland Security relating to the Program.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y0f7327e3-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327e4-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Inspector General Review</inline>.—</heading><chapeau>If a corrective action plan is submitted under subsection (c), the Inspector General of the Department of Homeland Security shall—</chapeau><paragraph class="fontsize10" id="y0f7327e5-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>not later than 120 days after the date of such submission, review the extent to which such plan implements the requirements under subsection (c); and</content></paragraph>
<paragraph class="fontsize10" id="y0f7327e6-e853-11f0-a1e4-69761a48a15a" identifier="/us/pl/114/278/s1/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x0f7327e7-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time period.</p><p class="leftAlign firstIndent0 fontsize8" id="x0f7327e8-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote><content>not later than 18 months after the date of such submission, and annually thereafter for 3 years, submit a report to the congressional committees set forth in subsection (c) that describes the progress of the implementation of such plan.</content></paragraph>
</subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2016-12-16">December 16, 2016</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/114/hr/710">H.R. 710</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/114/244">114–244</ref> (<committee>Comm. on Commerce, Science, and                            Transportation</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 161 (2015):</subheading>
<p class="indentUp2 firstIndent-1" id="x0f7327e9-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Feb. 10, considered and passed House.</p><subheading style="-uslm-lc:I658033">Vol. 162 (2016):</subheading>
<p class="indentUp2 firstIndent-1" id="x0f734efa-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 9, considered and passed Senate, amended.</p><p class="indentUp2 firstIndent-1" id="x0f734efb-e853-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 13, House concurred in Senate amendment.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>