<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 116–105—DEC. 30, 2019?>


<?I97 133 STAT. ?>
<?I98 133 STAT. ?>
<?I99 133 STAT. ?>
<?I50 PUBLIC LAW 116–105—DEC. 30, 2019?>
<?I51 PUBLIC LAW 116–105—DEC. 30, 2019?>
<?I52 PUBLIC LAW 116–105—DEC. 30, 2019?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 116–105: To deter criminal robocall violations and improve enforcement of section 227(b) of the Communications Act of 1934, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>105</docNumber>
<citableAs>Public Law 116–105</citableAs><citableAs>133 Stat. 3274</citableAs>
<approvedDate>2019-12-30</approvedDate>
<dc:date>2019-12-30</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>116</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?3273</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 116–105—DEC. 30, 2019</centerRunningHead>
<coverTitle>PALLONE-THUNE TELEPHONE ROBOCALL ABUSE CRIMINAL ENFORCEMENT AND DETERRENCE ACT</coverTitle>
</note>
<page identifier="/us/stat/133/3274">133 STAT. 3274</page>
<dc:type>Public Law</dc:type><docNumber>116–105</docNumber>
<congress value="116">116th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To deter criminal robocall violations and improve enforcement of section 227(b) of the Communications Act of 1934, and for other purposes.<sidenote><p class="centered fontsize8" id="x188f568c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2019-12-30">Dec. 30, 2019</approvedDate></p><p class="centered fontsize8" id="x188f568d-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/116/s/151">S. 151</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x188f7d9e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act</p><p class="leftAlign firstIndent0 fontsize8" id="x188f7d9f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s609">47 USC 609 note</ref>.</p></sidenote>
<section id="d236954e102" identifier="/us/pl/116/105/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act</shortTitle>” or the “<shortTitle role="act">Pallone-Thune TRACED Act</shortTitle>”.</content></section>
<section id="d236954e115" identifier="/us/pl/116/105/s2" role="definitions" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x188f7da0-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading>COMMISSION DEFINED.</heading><content style="-uslm-lc:I658120">  In this Act, the term “<term>Commission</term>” means the Federal Communications Commission.</content></section>
<section id="d236954e127" identifier="/us/pl/116/105/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>FORFEITURE.</heading><subsection class="firstIndent0 fontsize10" id="y189019e1-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y189019e2-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in subsection (b), by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="indentUp0 fontsize10" id="y189040f3-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Civil forfeiture</inline>.—</heading><subparagraph class="fontsize10" id="y189040f4-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Any person that is determined by the Commission, in accordance with paragraph (3) or (4) of section 503(b), to have violated this subsection shall be liable to the United States for a forfeiture penalty pursuant to section 503(b)(1). Paragraph (5) of section 503(b) shall not apply in the case of a violation of this subsection. A forfeiture penalty under this subparagraph shall be in addition to any other penalty provided for by this Act. The amount of the forfeiture<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x189040f5-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote> penalty determined under this subparagraph shall be determined in accordance with subparagraphs (A) through (F) of section 503(b)(2).</content></subparagraph>
<subparagraph class="fontsize10" id="y189040f6-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Violation with intent</inline>.—</heading><content>Any person that is determined by the Commission, in accordance with paragraph (3) or (4) of section 503(b), to have violated this subsection with the intent to cause such violation shall be liable to the United States for a forfeiture penalty pursuant to section 503(b)(1). Paragraph (5) of section 503(b) shall not apply in the case of a violation of this subsection. A forfeiture penalty under this subparagraph shall be in addition to any other penalty provided for by this Act. The amount of the forfeiture penalty determined under this subparagraph shall be equal to an amount determined in accordance with subparagraphs (A) through (F) of section 503(b)(2) plus an additional penalty not to exceed $10,000.<page identifier="/us/stat/133/3275">133 STAT. 3275</page></content></subparagraph>
<subparagraph class="fontsize10" id="y189040f7-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Recovery</inline>.—</heading><content>Any forfeiture penalty determined under subparagraph (A) or (B) shall be recoverable under section 504(a).</content></subparagraph>
<subparagraph class="fontsize10" id="y189040f8-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><heading class="fontsize10"><inline class="smallCaps">Procedure</inline>.—</heading><content>No forfeiture liability shall be determined under subparagraph (A) or (B) against any person unless such person receives the notice required by section 503(b)(3) or section 503(b)(4).</content></subparagraph>
<subparagraph class="fontsize10" id="y189040f9-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><heading class="fontsize10"><inline class="smallCaps">Statute of limitations</inline>.—</heading><chapeau>Notwithstanding paragraph (6) of section 503(b), no forfeiture penalty shall be determined or imposed against any person—</chapeau><clause class="fontsize10" id="y189040fa-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>under subparagraph (A) if the violation charged occurred more than 1 year prior to the date of issuance of the required notice or notice of apparent liability; or</content></clause>
<clause class="fontsize10" id="y189040fb-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>under subparagraph (B) if the violation charged occurred more than 4 years prior to the date of issuance of the required notice or notice of apparent liability.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y189040fc-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><heading class="fontsize10"><inline class="smallCaps">Rule of construction</inline>.—</heading><content>Notwithstanding any law to the contrary, the Commission may not determine or impose a forfeiture penalty on a person under both subparagraphs (A) and (B) based on the same conduct.”</content></subparagraph>
</paragraph>
</quotedContent>;</content></paragraph>
<paragraph class="fontsize10" id="y189040fd-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (e)(5)(A)—</chapeau><subparagraph class="fontsize10" id="y189040fe-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in clause (ii), by <amendingAction type="add">adding</amendingAction> at the end the following: “<quotedText>Paragraph (5) of section 503(b) shall not apply in the case of a violation of this subsection.</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="y189040ff-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in clause (iv)—</chapeau><clause class="fontsize10" id="y18906810-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in the heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">2-year</headingText></quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText><headingText class="smallCaps">4-year</headingText></quotedText>”; and</content></clause>
<clause class="fontsize10" id="y18906811-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>2 years</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>4 years</quotedText>”; and</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y18906812-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="delete">striking</amendingAction> subsection (h) and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="y1890b633-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="h">“(h) </num><heading class="fontsize10"><inline class="smallCaps">Annual Report to Congress on Robocalls and Transmission of Misleading or Inaccurate Caller Identification Information</inline>.—</heading><paragraph class="fontsize10" id="y1890b634-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Report required</inline>.—</heading><content>Not later than 1 year after the date of the enactment of this subsection, and annually thereafter, the Commission, after consultation with the Federal Trade Commission, shall submit to Congress a report regarding enforcement by the Commission of subsections (b), (c), (d), and (e) during the preceding calendar year.</content></paragraph>
<paragraph class="fontsize10" id="y1890b635-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b636-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time periods.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Matters for inclusion</inline>.—</heading><chapeau>Each report required by paragraph (1) shall include the following:</chapeau><subparagraph class="fontsize10" id="y1890b637-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>The number of complaints received by the Commission during each of the preceding 5 calendar years, for each of the following categories:</chapeau><clause class="fontsize10" id="y1890b638-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>Complaints alleging that a consumer received a call in violation of subsection (b) or (c).</content></clause>
<clause class="fontsize10" id="y1890b639-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>Complaints alleging that a consumer received a call in violation of the standards prescribed under subsection (d).</content></clause>
<clause class="fontsize10" id="y1890b63a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>Complaints alleging that a consumer received a call in connection with which misleading or inaccurate caller identification information was transmitted in violation of subsection (e).</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y1890b63b-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>The number of citations issued by the Commission pursuant to section 503(b) during the preceding calendar <page identifier="/us/stat/133/3276">133 STAT. 3276</page>
year to enforce subsection (d), and details of each such citation.</content></subparagraph>
<subparagraph class="fontsize10" id="y1890b63c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>The number of notices of apparent liability issued by the Commission pursuant to section 503(b) during the preceding calendar year to enforce subsections (b), (c), (d), and (e), and details of each such notice including any proposed forfeiture amount.</content></subparagraph>
<subparagraph class="fontsize10" id="y1890b63d-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>The number of final orders imposing forfeiture penalties issued pursuant to section 503(b) during the preceding calendar year to enforce such subsections, and details of each such order including the forfeiture imposed.</content></subparagraph>
<subparagraph class="fontsize10" id="y1890b63e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><content>The amount of forfeiture penalties or criminal fines collected, during the preceding calendar year, by the Commission or the Attorney General for violations of such subsections, and details of each case in which such a forfeiture penalty or criminal fine was collected.</content></subparagraph>
<subparagraph class="fontsize10" id="y1890b63f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b640-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Proposal.</p></sidenote><content>Proposals for reducing the number of calls made in violation of such subsections.</content></subparagraph>
<subparagraph class="fontsize10" id="y1890b641-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">“(G) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b642-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Analysis.</p><p class="leftAlign firstIndent0 fontsize8" id="x1890b643-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x1890b644-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">tions.</p></sidenote><content>An analysis of the contribution by providers of interconnected VoIP service and non-interconnected VoIP service that discount high-volume, unlawful, short-duration calls to the total number of calls made in violation of such subsections, and recommendations on how to address such contribution in order to decrease the total number of calls made in violation of such subsections.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1890b645-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">No additional reporting required</inline>.—</heading><content>The Commission shall prepare the report required by paragraph (1) without requiring the provision of additional information from providers of telecommunications service or voice service (as defined in section 4(a) of the Pallone-Thune TRACED Act).”</content></paragraph>
</subsection>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1890b646-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b647-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Applicability</inline>.—</heading><content>The amendments made by this section shall not affect any action or proceeding commenced before and pending on the date of the enactment of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1890b648-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s3/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b649-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Deadline for Regulations</inline>.—</heading><content>The Commission shall prescribe regulations to implement the amendments made by this section not later than 270 days after the date of the enactment of this Act.</content></subsection>
</section>
<section id="d236954e435" identifier="/us/pl/116/105/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1890b64a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227b">47 USC 227b</ref>.</p></sidenote><heading>CALL AUTHENTICATION.</heading><subsection class="firstIndent0 fontsize10" id="y1892d92b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y1892d92c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">STIR/SHAKEN authentication framework</inline>.—</heading><content>The term “<term>STIR/SHAKEN authentication framework</term>” means the secure telephone identity revisited and signature-based handling of asserted information using tokens standards proposed by the information and communications technology industry.</content></paragraph>
<paragraph class="fontsize10" id="y1892d92d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Voice service</inline>.—</heading><chapeau>The term “<term>voice service</term>”—</chapeau><subparagraph class="fontsize10" id="y1892d92e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>means any service that is interconnected with the public switched telephone network and that furnishes voice communications to an end user using resources from the North American Numbering Plan or any successor to the North American Numbering Plan adopted by the Commission under section 251(e)(1) of the Communications Act of 1934 (<ref href="/us/usc/t47/s251/e/1">47 U.S.C. 251(e)(1)</ref>); and</content></subparagraph>
<subparagraph class="fontsize10" id="y1892d92f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>includes—</chapeau><clause class="fontsize10" id="y1892d930-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>transmissions from a telephone facsimile machine, computer, or other device to a telephone facsimile machine; and<page identifier="/us/stat/133/3277">133 STAT. 3277</page></content></clause>
<clause class="fontsize10" id="y1892d931-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/a/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>without limitation, any service that enables real-time, two-way voice communications, including any service that requires internet protocol-compatible customer premises equipment (commonly known as “CPE”) and permits out-bound calling, whether or not the service is one-way or two-way voice over internet protocol.</content></clause>
</subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1892d932-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Authentication Frameworks</inline>.—</heading><paragraph class="fontsize10" id="y1892d933-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1892d934-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x1892d935-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Requirements.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Subject to paragraphs (2) and (3), and in accordance with paragraph (6), not later than 18 months after the date of the enactment of this Act, the Commission shall—</chapeau><subparagraph class="fontsize10" id="y1892d936-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>require a provider of voice service to implement the STIR/SHAKEN authentication framework in the internet protocol networks of the provider of voice service; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1892d937-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>require a provider of voice service to take reasonable measures to implement an effective call authentication framework in the non-internet protocol networks of the provider of voice service.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1892d938-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1892d939-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p><p class="leftAlign firstIndent0 fontsize8" id="x1892d93a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Implementation</inline>.—</heading><chapeau>The Commission shall not take the action described in paragraph (1) with respect to a provider of voice service if the Commission determines, not later than 12 months after the date of the enactment of this Act, that such provider of voice service—</chapeau><subparagraph class="fontsize10" id="y1892d93b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in internet protocol networks—</chapeau><clause class="fontsize10" id="y1892d93c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>has adopted the STIR/SHAKEN authentication framework for calls on the internet protocol networks of the provider of voice service;</content></clause>
<clause class="fontsize10" id="y1892d93d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>has agreed voluntarily to participate with other providers of voice service in the STIR/SHAKEN authentication framework;</content></clause>
<clause class="fontsize10" id="y1892d93e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>has begun to implement the STIR/SHAKEN authentication framework; and</content></clause>
<clause class="fontsize10" id="y1892d93f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930050-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><content>will be capable of fully implementing the STIR/SHAKEN authentication framework not later than 18 months after the date of the enactment of this Act; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y18930051-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in non-internet protocol networks—</chapeau><clause class="fontsize10" id="y18930052-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>has taken reasonable measures to implement an effective call authentication framework; and</content></clause>
<clause class="fontsize10" id="y18930053-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>will be capable of fully implementing an effective call authentication framework not later than 18 months after the date of the enactment of this Act.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y18930054-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Implementation report</inline>.—</heading><chapeau>Not later than 12 months after the date of the enactment of this Act, the Commission shall submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report on the determination required under paragraph (2), which shall include—</chapeau><subparagraph class="fontsize10" id="y18930055-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930056-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Analysis.</p></sidenote><content>an analysis of the extent to which providers of voice service have implemented the call authentication frameworks described in subparagraphs (A) and (B) of paragraph (1), including whether the availability of necessary equipment and equipment upgrades has impacted such implementation; and<page identifier="/us/stat/133/3278">133 STAT. 3278</page></content></subparagraph>
<subparagraph class="fontsize10" id="y18930057-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930058-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>an assessment of the efficacy of the call authentication frameworks described in subparagraphs (A) and (B) of paragraph (1) in addressing all aspects of call authentication.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y18930059-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893005a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x1893005b-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p><p class="leftAlign firstIndent0 fontsize8" id="x1893005c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Review and revision or replacement</inline>.—</heading><chapeau>Not later than 3 years after the date of the enactment of this Act, and every 3 years thereafter, the Commission, after public notice and an opportunity for comment, shall—</chapeau><subparagraph class="fontsize10" id="y1893005d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893005e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>assess the efficacy of the technologies used for call authentication frameworks implemented under this section;</content></subparagraph>
<subparagraph class="fontsize10" id="y1893005f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930060-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><content>based on the assessment under subparagraph (A), revise or replace the call authentication frameworks under this section if the Commission determines it is in the public interest to do so; and</content></subparagraph>
<subparagraph class="fontsize10" id="y18930061-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/4/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930062-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Reports.</p></sidenote><content>submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report on the findings of the assessment under subparagraph (A) and on any actions to revise or replace the call authentication frameworks under subparagraph (B).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y18930063-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Extension of implementation deadline</inline>.—</heading><subparagraph class="fontsize10" id="y18930064-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><heading class="fontsize10"><inline class="smallCaps">Burdens and barriers to implementation</inline>.—</heading><chapeau>Not later than 12 months after the date of the enactment of this Act, and as appropriate thereafter, the Commission—</chapeau><clause class="fontsize10" id="y18930065-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930066-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><chapeau>shall assess any burdens or barriers to the implementation required by paragraph (1), including—</chapeau><subclause class="fontsize10" id="y18930067-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>for providers of voice service to the extent the networks of such providers use time-division multiplexing;</content></subclause>
<subclause class="fontsize10" id="y18930068-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>for small providers of voice service and those in rural areas; and</content></subclause>
<subclause class="fontsize10" id="y18930069-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A/i/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>the inability to purchase or upgrade equipment to support the call authentication frameworks under this section, or lack of availability of such equipment; and</content></subclause>
</clause>
<clause class="fontsize10" id="y1893006a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in connection with an assessment under clause (i), may, upon a public finding of undue hardship, delay required compliance with the 18-month time period described in paragraph (1), for a reasonable period of time, for a provider or class of providers of voice service, or type of voice calls, as necessary for that provider or class of providers or type of calls to participate in the implementation in order to address the identified burdens and barriers.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y1893006b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><heading class="fontsize10"><inline class="smallCaps">Delay of compliance required for certain non-internet protocol networks</inline>.—</heading><content>Subject to subparagraphs (C) through (F), for any provider or class of providers of voice service, or type of voice calls, only to the extent that such a provider or class of providers of voice service, or type of voice calls, materially relies on a non-internet protocol network for the provision of such service or calls, the Commission shall grant a delay of required compliance under subparagraph (A)(ii) until a call authentication protocol has been developed for calls delivered over non-internet protocol networks and is reasonably available.<page identifier="/us/stat/133/3279">133 STAT. 3279</page></content></subparagraph>
<subparagraph class="fontsize10" id="y1893006c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><heading class="fontsize10"><inline class="smallCaps">Robocall mitigation program</inline>.—</heading><clause class="fontsize10" id="y1893006d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><heading class="fontsize10"><inline class="smallCaps">Program required</inline>.—</heading><content>During the time of a delay of compliance granted under subparagraph (A)(ii), the Commission shall require, pursuant to the authority of the Commission, that any provider subject to such delay shall implement an appropriate robocall mitigation program to prevent unlawful robocalls from originating on the network of the provider.</content></clause>
<clause class="fontsize10" id="y1893006e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><heading class="fontsize10"><inline class="smallCaps">Additional requirements</inline>.—</heading><content>If the consortium registered under section 13(d) identifies a provider of voice service that is subject to a delay of compliance granted under subparagraph (A)(ii) as repeatedly originating large-scale unlawful robocall campaigns, the Commission shall require such provider to take action to ensure that such provider does not continue to originate such calls.</content></clause>
<clause class="fontsize10" id="y1893006f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><heading class="fontsize10"><inline class="smallCaps">Minimization of burden</inline>.—</heading><content>The Commission shall make reasonable efforts to minimize the burden of any robocall mitigation required pursuant to clause (ii), which may include prescribing certain specific robocall mitigation practices for providers of voice service that have repeatedly originated large-scale unlawful robocall campaigns.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y18930070-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><heading class="fontsize10"><inline class="smallCaps">Full participation</inline>.—</heading><content>The Commission shall take reasonable measures to address any issues in an assessment under subparagraph (A)(i) and enable as promptly as reasonable full participation of all classes of providers of voice service and types of voice calls to receive the highest level of trust. <sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930071-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote>Such measures shall include, without limitation, as appropriate, limiting or terminating a delay of compliance granted to a provider under subparagraph (B) if the Commission determines in such assessment that the provider is not making reasonable efforts to develop the call authentication protocol described in such subparagraph.</content></subparagraph>
<subparagraph class="fontsize10" id="y18930072-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930073-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Alternative methodologies</inline>.—</heading><content>The Commission shall identify, in consultation with small providers of voice service and those in rural areas, alternative effective methodologies to protect customers from unauthenticated calls during any delay of compliance granted under subparagraph (A)(ii).</content></subparagraph>
<subparagraph class="fontsize10" id="y18930074-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930075-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Revision of delay of compliance</inline>.—</heading><chapeau>Not less frequently than annually after the first delay of compliance is granted under subparagraph (A)(ii), the Commission—</chapeau><clause class="fontsize10" id="y18930076-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>shall consider revising or extending any delay of compliance granted under subparagraph (A)(ii);</content></clause>
<clause class="fontsize10" id="y18930077-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>may revise such delay of compliance; and</content></clause>
<clause class="fontsize10" id="y18930078-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930079-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p></sidenote><chapeau>shall issue a public notice with regard to whether such delay of compliance remains necessary, including—</chapeau><subclause class="fontsize10" id="y1893007a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F/iii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>why such delay of compliance remains necessary; and</content></subclause>
<subclause class="fontsize10" id="y1893007b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/5/F/iii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>when the Commission expects to achieve the goal of full participation as described in subparagraph (D).</content></subclause>
</clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1893007c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/6" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><heading class="fontsize10"><inline class="smallCaps">No additional cost to consumers or small business customers</inline>.—</heading><content>The Commission shall prohibit providers of voice <page identifier="/us/stat/133/3280">133 STAT. 3280</page>
service from <amendingAction type="add">adding</amendingAction> any additional line item charges to consumer or small business customer subscribers for the effective call authentication technology required under paragraph (1).</content></paragraph>
<paragraph class="fontsize10" id="y1893007d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/b/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893007e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Accurate identification</inline>.—</heading><content>Not later than 12 months after the date of the enactment of this Act, the Commission shall issue best practices that providers of voice service may use as part of the implementation of effective call authentication frameworks under paragraph (1) to take steps to ensure the calling party is accurately identified.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1893007f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Safe Harbor and Other Regulations</inline>.—</heading><paragraph class="fontsize10" id="y18930080-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18930081-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Consistent with the regulations prescribed under subsection (j) of section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>), as added by section 10, the Commission shall, not later than 1 year after the date of the enactment of this Act, promulgate rules—</chapeau><subparagraph class="fontsize10" id="y18930082-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>establishing when a provider of voice service may block a voice call based, in whole or in part, on information provided by the call authentication frameworks under subsection (b), with no additional line item charge;</content></subparagraph>
<subparagraph class="fontsize10" id="y18930083-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>establishing a safe harbor for a provider of voice service from liability for unintended or inadvertent blocking of calls or for the unintended or inadvertent misidentification of the level of trust for individual calls based, in whole or in part, on information provided by the call authentication frameworks under subsection (b);</content></subparagraph>
<subparagraph class="fontsize10" id="y18930084-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>establishing a process to permit a calling party adversely affected by the information provided by the call authentication frameworks under subsection (b) to verify the authenticity of the calling party’s calls; and</content></subparagraph>
<subparagraph class="fontsize10" id="y18930085-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>ensuring that calls originating from a provider of voice service in an area where the provider is subject to a delay of compliance with the time period described in subsection (b)(1) are not unreasonably blocked because the calls are not able to be authenticated.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y18930086-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Considerations</inline>.—</heading><chapeau>In establishing the safe harbor under paragraph (1), consistent with the regulations prescribed under subsection (j) of section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>), as added by section 10, the Commission shall consider limiting the liability of a provider of voice service based on the extent to which the provider of voice service—</chapeau><subparagraph class="fontsize10" id="y18930087-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>blocks or identifies calls based, in whole or in part, on the information provided by the call authentication frameworks under subsection (b);</content></subparagraph>
<subparagraph class="fontsize10" id="y18930088-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>implemented procedures based, in whole or in part, on the information provided by the call authentication frameworks under subsection (b); and</content></subparagraph>
<subparagraph class="fontsize10" id="y18930089-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/c/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>used reasonable care, including making all reasonable efforts to avoid blocking emergency public safety calls.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1893008a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s4/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in this section shall preclude the Commission from initiating a rulemaking pursuant to its existing statutory authority.</content></subsection>
</section>
<section id="d236954e925" identifier="/us/pl/116/105/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>INTERAGENCY WORKING GROUP.</heading><subsection class="firstIndent0 fontsize10" id="y1893eaeb-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893eaec-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="x1893eaed-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Study.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The Attorney General, in consultation with the Chairman of the Commission, shall convene an interagency working group to study Government prosecution of violations of section 227(b) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b">47 U.S.C. 227(b)</ref>).<page identifier="/us/stat/133/3281">133 STAT. 3281</page></content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1893eaee-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Duties</inline>.—</heading><chapeau>In carrying out the study under subsection (a), the interagency working group shall—</chapeau><paragraph class="fontsize10" id="y1893eaef-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>determine whether, and if so how, any Federal laws, including regulations, policies, and practices, or budgetary or jurisdictional constraints inhibit the prosecution of such violations;</content></paragraph>
<paragraph class="fontsize10" id="y1893eaf0-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>identify existing and potential Federal policies and programs that encourage and improve coordination among Federal departments and agencies and States, and between States, in the prevention and prosecution of such violations;</content></paragraph>
<paragraph class="fontsize10" id="y1893eaf1-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>identify existing and potential international policies and programs that encourage and improve coordination between countries in the prevention and prosecution of such violations; and</content></paragraph>
<paragraph class="fontsize10" id="y1893eaf2-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>consider—</chapeau><subparagraph class="fontsize10" id="y1893eaf3-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the benefit and potential sources of additional resources for the Federal prevention and prosecution of criminal violations of that section;</content></subparagraph>
<subparagraph class="fontsize10" id="y1893eaf4-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>whether to establish memoranda of understanding regarding the prevention and prosecution of such violations between—</chapeau><clause class="fontsize10" id="y1893eaf5-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>the States;</content></clause>
<clause class="fontsize10" id="y1893eaf6-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>the States and the Federal Government; and</content></clause>
<clause class="fontsize10" id="y1893eaf7-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>the Federal Government and a foreign government;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y1893eaf8-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>whether to establish a process to allow States to request Federal subpoenas from the Commission;</content></subparagraph>
<subparagraph class="fontsize10" id="y1893eaf9-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>whether extending civil enforcement authority to the States would assist in the successful prevention and prosecution of such violations;</content></subparagraph>
<subparagraph class="fontsize10" id="y1893eafa-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>whether increased forfeiture and imprisonment penalties are appropriate, such as extending imprisonment for such a violation to a term longer than 2 years;</content></subparagraph>
<subparagraph class="fontsize10" id="y1893eafb-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>whether regulation of any entity that enters into a business arrangement with a common carrier regulated under title II of the Communications Act of 1934 (<ref href="/us/usc/t47/s201/etseq">47 U.S.C. 201 et seq.</ref>) for the specific purpose of carrying, routing, or transmitting a call that constitutes such a violation would assist in the successful prevention and prosecution of such violations; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1893eafc-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/b/4/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>the extent to which, if any, Department of Justice policies to pursue the prosecution of violations causing economic harm, physical danger, or erosion of an inhabitant’s peace of mind and sense of security inhibit the prevention or prosecution of such violations.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1893eafd-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Members</inline>.—</heading><chapeau>The interagency working group shall be composed of such representatives of Federal departments and agencies as the Attorney General considers appropriate, such as—</chapeau><paragraph class="fontsize10" id="y1893eafe-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the Department of Commerce;</content></paragraph>
<paragraph class="fontsize10" id="y1893eaff-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Department of State;</content></paragraph>
<paragraph class="fontsize10" id="y1893eb00-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the Department of Homeland Security;</content></paragraph>
<paragraph class="fontsize10" id="y1893eb01-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the Commission;</content></paragraph>
<paragraph class="fontsize10" id="y1893eb02-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>the Federal Trade Commission; and</content></paragraph>
<paragraph class="fontsize10" id="y1893eb03-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/c/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>the Bureau of Consumer Financial Protection.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1893eb04-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893eb05-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="x1893eb06-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Non-Federal Stakeholders</inline>.—</heading><content>In carrying out the study under subsection (a), the interagency working group shall consult <page identifier="/us/stat/133/3282">133 STAT. 3282</page>
with such non-Federal stakeholders as the Attorney General determines have the relevant expertise, including the National Association of Attorneys General.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1893eb07-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><chapeau>Not later than 270 days after the date of the enactment of this Act, the interagency working group shall submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report on the findings of the study under subsection (a), including—</chapeau><paragraph class="fontsize10" id="y1893eb08-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/e/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1893eb09-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x1893eb0a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">tions.</p></sidenote>any recommendations regarding the prevention and prosecution of such violations; and</content></paragraph>
<paragraph class="fontsize10" id="y1893eb0b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s5/e/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>a description of what progress, if any, relevant Federal departments and agencies have made in implementing the recommendations under paragraph (1).</content></paragraph>
</subsection>
</section>
<section id="d236954e1117" identifier="/us/pl/116/105/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1894111c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227b–1">47 USC 227b–1</ref>.</p></sidenote><heading>ACCESS TO NUMBER RESOURCES.</heading><subsection class="firstIndent0 fontsize10" id="y1894382d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s6/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><paragraph class="fontsize10" id="y1894382e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s6/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1894382f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x18943830-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Examination of fcc policies</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Commission shall commence a proceeding to determine how Commission policies regarding access to number resources, including number resources for toll-free and non-toll-free telephone numbers, could be modified, including by establishing registration and compliance obligations, and requirements that providers of voice service given access to number resources take sufficient steps to know the identity of the customers of such providers, to help reduce access to numbers by potential perpetrators of violations of section 227(b) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b">47 U.S.C. 227(b)</ref>).</content></paragraph>
<paragraph class="fontsize10" id="y18943831-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s6/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Regulations</inline>.—</heading><content>If the Commission determines under paragraph (1) that modifying the policies described in that paragraph could help achieve the goal described in that paragraph, the Commission shall prescribe regulations to implement those policy modifications.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y18943832-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s6/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18943833-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Penalties.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Authority</inline>.—</heading><content>Any person who knowingly, through an employee, agent, officer, or otherwise, directly or indirectly, by or through any means or device whatsoever, is a party to obtaining number resources, including number resources for toll-free and non-toll-free telephone numbers, from a common carrier regulated under title II of the Communications Act of 1934 (<ref href="/us/usc/t47/s201/etseq">47 U.S.C. 201 et seq.</ref>), in violation of a regulation prescribed under subsection (a), shall, notwithstanding section 503(b)(5) of the Communications Act of 1934 (<ref href="/us/usc/t47/s503/b/5">47 U.S.C. 503(b)(5)</ref>), be subject to a forfeiture penalty under section 503(b) of that Act (<ref href="/us/usc/t47/s503/b">47 U.S.C. 503(b)</ref>). A forfeiture penalty under this subsection shall be in addition to any other penalty provided for by law.</content></subsection>
</section>
<section id="d236954e1184" identifier="/us/pl/116/105/s7" style="-uslm-lc:I658141"><num class="fontsize12" value="7">SEC. 7. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18943834-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading>PROTECTIONS FROM SPOOFED CALLS.</heading><subsection class="firstIndent0 fontsize10" id="y18948655-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18948656-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x18948657-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Regulations.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 1 year after the date of the enactment of this Act, and consistent with the call authentication frameworks under section 4, the Commission shall initiate a rulemaking to help protect a subscriber from receiving unwanted calls or text messages from a caller using an unauthenticated number.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y18948658-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Considerations</inline>.—</heading><chapeau>In promulgating rules under subsection (a), the Commission shall consider—</chapeau><paragraph class="fontsize10" id="y18948659-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the Government Accountability Office report on combating the fraudulent provision of misleading or inaccurate caller identification information required by section 503(c) of <page identifier="/us/stat/133/3283">133 STAT. 3283</page>
division P of the Consolidated Appropriations Act, 2018 (<ref href="/us/pl/115/141">Public Law 115–141</ref>);</content></paragraph>
<paragraph class="fontsize10" id="y1894865a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the best means of ensuring that a subscriber or provider has the ability to block calls from a caller using an unauthenticated North American Numbering Plan number;</content></paragraph>
<paragraph class="fontsize10" id="y1894865b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the impact on the privacy of a subscriber from unauthenticated calls;</content></paragraph>
<paragraph class="fontsize10" id="y1894865c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the effectiveness in verifying the accuracy of caller identification information; and</content></paragraph>
<paragraph class="fontsize10" id="y1894865d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s7/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>the availability and cost of providing protection from the unwanted calls or text messages described in subsection (a).</content></paragraph>
</subsection>
</section>
<section id="d236954e1250" identifier="/us/pl/116/105/s8" style="-uslm-lc:I658141"><num class="fontsize12" value="8">SEC. 8. </num><heading>CONSUMER PROTECTIONS FOR EXEMPTIONS.</heading><subsection class="firstIndent0 fontsize10" id="y1894ad6e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s8/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Section 227(b)(2) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b/2">47 U.S.C. 227(b)(2)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y1894ad6f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s8/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in subparagraph (G)(ii), by <amendingAction type="delete">striking</amendingAction> “<quotedText>; and</quotedText>” and <amendingAction type="insert">inserting</amendingAction> a semicolon;</content></paragraph>
<paragraph class="fontsize10" id="y1894ad70-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s8/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>in subparagraph (H), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”; and</content></paragraph>
<paragraph class="fontsize10" id="y1894ad71-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s8/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subparagraph class="fontsize10" id="y1894d482-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><chapeau>shall ensure that any exemption under subparagraph (B) or (C) contains requirements for calls made in reliance on the exemption with respect to—</chapeau><clause class="fontsize10" id="y1894d483-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the classes of parties that may make such calls;</content></clause>
<clause class="fontsize10" id="y1894d484-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the classes of parties that may be called; and</content></clause>
<clause class="fontsize10" id="y1894d485-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>the number of such calls that a calling party may make to a particular called party.”</content></clause>
</subparagraph>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1894d486-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s8/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1894d487-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><inline class="smallCaps">Deadline for Regulations</inline>.—</heading><content>In the case of any exemption issued under subparagraph (B) or (C) of section 227(b)(2) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b/2">47 U.S.C. 227(b)(2)</ref>) before the date of the enactment of this Act, the Commission shall, not later than 1 year after such date of enactment, prescribe such regulations, or amend such existing regulations, as necessary to ensure that such exemption contains each requirement described in subparagraph (I) of such section, as added by subsection (a). To the extent such an exemption contains such a requirement before such date of enactment, nothing in this section or the amendments made by this section shall be construed to require the Commission to prescribe or amend regulations relating to such requirement.</content></subsection>
</section>
<section id="d236954e1344" identifier="/us/pl/116/105/s9" style="-uslm-lc:I658141"><num class="fontsize12" value="9">SEC. 9. </num><heading>REPORT ON REASSIGNED NUMBER DATABASE.</heading><subsection class="firstIndent0 fontsize10" id="y189522a8-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s9/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x189522a9-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p><p class="leftAlign firstIndent0 fontsize8" id="x189522aa-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><content>Not later than 1 year after the date of the enactment of this Act, the Commission shall submit to Congress, and make publicly available on the website of the Commission, a report on the status of the efforts of the Commission pursuant to the Second Report and Order in the matter of Advanced Methods to Target and Eliminate Unlawful Robocalls (CG Docket No. 17–59; FCC 18–177; adopted on December 12, 2018).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y189522ab-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s9/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The report required by subsection (a) shall describe the efforts of the Commission, as described in such Second Report and Order, to ensure—</chapeau><paragraph class="fontsize10" id="y189522ac-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s9/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the establishment of a database of telephone numbers that have been disconnected, in order to provide a person making calls subject to section 227(b) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b">47 U.S.C. 227(b)</ref>) with comprehensive and timely information to enable such person to avoid making calls without <page identifier="/us/stat/133/3284">133 STAT. 3284</page>
the prior express consent of the called party because the number called has been reassigned;</content></paragraph>
<paragraph class="fontsize10" id="y189522ad-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s9/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>that a person who wishes to use any safe harbor provided pursuant to such Second Report and Order with respect to making calls must demonstrate that, before making the call, the person appropriately checked the most recent update of the database and the database reported that the number had not been disconnected; and</content></paragraph>
<paragraph class="fontsize10" id="y189522ae-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s9/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>that if the person makes the demonstration described in paragraph (2), the person will be shielded from liability under section 227(b) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/b">47 U.S.C. 227(b)</ref>) should the database return an inaccurate result.</content></paragraph>
</subsection>
</section>
<section id="d236954e1399" identifier="/us/pl/116/105/s10" style="-uslm-lc:I658142"><num class="fontsize12" value="10">SEC. 10. </num><heading>STOP ROBOCALLS.</heading><subsection class="firstIndent0 fontsize10" id="y189597df-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Information Sharing Regarding Robocall and Spoofing Violations</inline>.—</heading><content>Section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="y1895bef0-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><heading class="fontsize10"><inline class="smallCaps">Information Sharing</inline>.—</heading><paragraph class="fontsize10" id="y1895bef1-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1895bef2-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x1895bef3-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Regulations.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Not later than 18 months after the date of the enactment of this subsection, the Commission shall prescribe regulations to establish a process that streamlines the ways in which a private entity may voluntarily share with the Commission information relating to—</chapeau><subparagraph class="fontsize10" id="y1895bef4-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>a call made or a text message sent in violation of subsection (b); or</content></subparagraph>
<subparagraph class="fontsize10" id="y1895bef5-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>a call or text message for which misleading or inaccurate caller identification information was caused to be transmitted in violation of subsection (e).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1895bef6-e82b-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Text message defined</inline>.—</heading><content>In this subsection, the term ‘<term>text message</term>’ has the meaning given such term in subsection (e)(8).”</content></paragraph>
</subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1895bef7-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Robocall Blocking Service</inline>.—</heading><content>Section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>), as amended by subsection (a), is further amended by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="y1895e608-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="j">“(j) </num><heading class="fontsize10"><inline class="smallCaps">Robocall Blocking Service</inline>.—</heading><paragraph class="fontsize10" id="y1895e609-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1895e60a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Not later than 1 year after the date of the enactment of this subsection, the Commission shall take a final agency action to ensure the robocall blocking services provided on an opt-out or opt-in basis pursuant to the Declaratory Ruling of the Commission in the matter of Advanced Methods to Target and Eliminate Unlawful Robocalls (CG Docket No. 17–59; FCC 19–51; adopted on June 6, 2019)—</chapeau><subparagraph class="fontsize10" id="y1895e60b-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>are provided with transparency and effective redress options for both—</chapeau><clause class="fontsize10" id="y1895e60c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>consumers; and</content></clause>
<clause class="fontsize10" id="y1895e60d-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>callers; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y1895e60e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>are provided with no additional line item charge to consumers and no additional charge to callers for resolving complaints related to erroneously blocked calls; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1895e60f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>make all reasonable efforts to avoid blocking emergency public safety calls.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1895e610-e82b-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Text message defined</inline>.—</heading><content>In this subsection, the term ‘<term>text message</term>’ has the meaning given such term in subsection (e)(8).”</content></paragraph>
</subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1895e611-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Study on Information Requirements for Certain VoIP Service Providers</inline>.—</heading><page identifier="/us/stat/133/3285">133 STAT. 3285</page>
<paragraph class="fontsize10" id="y1895e612-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>The Commission shall conduct a study regarding whether to require a provider of covered VoIP service to—</chapeau><subparagraph class="fontsize10" id="y1895e613-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>provide to the Commission contact information for such provider and keep such information current; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1895e614-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>retain records relating to each call transmitted over the covered VoIP service of such provider that are sufficient to trace such call back to the source of such call.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1895e615-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Report to congress</inline>.—</heading><content>Not later than 18 months after the date of the enactment of this Act, the Commission shall submit to Congress a report on the results of the study conducted under paragraph (1).</content></paragraph>
<paragraph class="fontsize10" id="y1895e616-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Covered voip service defined</inline>.—</heading><chapeau>In this subsection, the term “<term>covered VoIP service</term>” means a service that—</chapeau><subparagraph class="fontsize10" id="y1895e617-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>is an interconnected VoIP service (as defined in section 3 of the Communications Act of 1934 (<ref href="/us/usc/t47/s153">47 U.S.C. 153</ref>)); or</content></subparagraph>
<subparagraph class="fontsize10" id="y1895e618-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/c/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>would be an interconnected VoIP service (as so defined) except that the service permits users to terminate calls to the public switched telephone network but does not permit users to receive calls that originate on the public switched telephone network.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1895e619-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s10/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1895e61a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p><p class="leftAlign firstIndent0 fontsize8" id="x18960d2b-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Transitional Rule Regarding Definition of Text Message</inline>.—</heading><content>Paragraph (2) of subsection (i) of section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>), as added by subsection (a) of this section, and paragraph (2) of subsection (j) of such section 227, as added by subsection (b) of this section, shall apply before the effective date of the amendment made to subsection (e)(8) of such section 227 by subparagraph (C) of section 503(a)(2) of division P of the Consolidated Appropriations Act, 2018 (<ref href="/us/pl/115/141">Public Law 115–141</ref>) as if such amendment was already in effect.</content></subsection>
</section>
<section id="d236954e1623" identifier="/us/pl/116/105/s11" style="-uslm-lc:I658142"><num class="fontsize12" value="11">SEC. 11. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18960d2c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227b–2">47 USC 227b–2</ref>.</p></sidenote><heading>PROVISION OF EVIDENCE OF CERTAIN ROBOCALL VIOLATIONS TO ATTORNEY GENERAL.</heading><subsection class="firstIndent0 fontsize10" id="y18965b4d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>If the Chief of the Enforcement Bureau of the Commission obtains evidence that suggests a willful, knowing, and repeated robocall violation with an intent to defraud, cause harm, or wrongfully obtain anything of value, the Chief of the Enforcement Bureau shall provide such evidence to the Attorney General.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y18965b4e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18965b4f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><chapeau>Not later than 1 year after the date of the enactment of this Act, and annually thereafter, the Commission shall publish on its website and submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report that—</chapeau><paragraph class="fontsize10" id="y18965b50-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>states the number of instances during the preceding year in which the Chief of the Enforcement Bureau provided the evidence described in subsection (a) to the Attorney General; and</content></paragraph>
<paragraph class="fontsize10" id="y18965b51-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>contains a general summary of the types of robocall violations to which such evidence relates.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y18965b52-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Rules of Construction</inline>.—</heading><chapeau>Nothing in this section shall be construed to affect the ability of the Commission or the Chief of the Enforcement Bureau under other law—</chapeau><paragraph class="fontsize10" id="y18965b53-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>to refer a matter to the Attorney General; or<page identifier="/us/stat/133/3286">133 STAT. 3286</page></content></paragraph>
<paragraph class="fontsize10" id="y18965b54-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>to pursue or continue pursuit of an enforcement action in a matter with respect to which the Chief of the Enforcement Bureau provided the evidence described in subsection (a) to the Attorney General.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y18965b55-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s11/d" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Robocall Violation Defined</inline>.—</heading><content>In this section, the term “<term>robocall violation</term>” means a violation of subsection (b) or (e) of section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>).</content></subsection>
</section>
<section id="d236954e1699" identifier="/us/pl/116/105/s12" style="-uslm-lc:I658142"><num class="fontsize12" value="12">SEC. 12. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x18965b56-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading>PROTECTION FROM ONE-RING SCAMS.</heading><subsection class="firstIndent0 fontsize10" id="y1896d087-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1896d088-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Initiation of Proceeding</inline>.—</heading><content>Not later than 120 days after the date of the enactment of this Act, the Commission shall initiate a proceeding to protect called parties from one-ring scams.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1896d089-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Matters To Be Considered</inline>.—</heading><chapeau>As part of the proceeding required by subsection (a), the Commission shall consider how the Commission can—</chapeau><paragraph class="fontsize10" id="y1896d08a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>work with Federal and State law enforcement agencies to address one-ring scams;</content></paragraph>
<paragraph class="fontsize10" id="y1896d08b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>work with the governments of foreign countries to address one-ring scams;</content></paragraph>
<paragraph class="fontsize10" id="y1896d08c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1896d08d-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>in consultation with the Federal Trade Commission, better educate consumers about how to avoid one-ring scams;</content></paragraph>
<paragraph class="fontsize10" id="y1896d08e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/4" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>incentivize voice service providers to stop calls made to perpetrate one-ring scams from being received by called parties, including consideration of <amendingAction type="add">adding</amendingAction> identified one-ring scam type numbers to the Commission’s existing list of permissible categories for carrier-initiated blocking;</content></paragraph>
<paragraph class="fontsize10" id="y1896d08f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>work with entities that provide call-blocking services to address one-ring scams; and</content></paragraph>
<paragraph class="fontsize10" id="y1896d090-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/b/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>establish obligations on international gateway providers that are the first point of entry for these calls into the United States, including potential requirements that such providers verify with the foreign originator the nature or purpose of calls before initiating service.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1896d091-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1896d092-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report to Congress</inline>.—</heading><content>Not later than 1 year after the date of the enactment of this Act, the Commission shall publish on its website and submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate a report on the status of the proceeding required by subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1896d093-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y1896d094-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/d/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">One-ring scam</inline>.—</heading><content>The term “<term>one-ring scam</term>” means a scam in which a caller makes a call and allows the call to ring the called party for a short duration, in order to prompt the called party to return the call, thereby subjecting the called party to charges.</content></paragraph>
<paragraph class="fontsize10" id="y1896d095-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/d/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">State</inline>.—</heading><content>The term “<term>State</term>” has the meaning given such term in section 3 of the Communications Act of 1934 (<ref href="/us/usc/t47/s153">47 U.S.C. 153</ref>).</content></paragraph>
<paragraph class="fontsize10" id="y1896d096-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s12/d/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Voice service</inline>.—</heading><content>The term “<term>voice service</term>” has the meaning given such term in section 227(e)(8) of the Communications Act of 1934 (<ref href="/us/usc/t47/s227/e/8">47 U.S.C. 227(e)(8)</ref>). <sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1896d097-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p></sidenote>This paragraph shall apply before the effective date of the amendment made to such section by subparagraph (C) of section 503(a)(2) of division P of the Consolidated Appropriations Act, 2018 (<ref href="/us/pl/115/141">Public Law 115–141</ref>) as if such amendment was already in effect.<page identifier="/us/stat/133/3287">133 STAT. 3287</page></content></paragraph>
</subsection>
</section>
<section id="d236954e1833" identifier="/us/pl/116/105/s13" style="-uslm-lc:I658142"><num class="fontsize12" value="13">SEC. 13. </num><heading>ANNUAL ROBOCALL REPORT.</heading><subsection class="firstIndent0 fontsize10" id="y1897e208-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e209-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p><p class="leftAlign firstIndent0 fontsize8" id="x1897e20a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 1 year after the date of the enactment of this Act, and annually thereafter, the Commission shall make publicly available on the website of the Commission, and submit to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate, a report on the status of private-led efforts to trace back the origin of suspected unlawful robocalls by the registered consortium and the participation of voice service providers in such efforts.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1897e20b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Contents of Report</inline>.—</heading><chapeau>The report required under subsection (a) shall include, at minimum, the following:</chapeau><paragraph class="fontsize10" id="y1897e20c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>A description of private-led efforts to trace back the origin of suspected unlawful robocalls by the registered consortium and the actions taken by the registered consortium to coordinate with the Commission.</content></paragraph>
<paragraph class="fontsize10" id="y1897e20d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e20e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Lists.</p></sidenote><content>A list of voice service providers identified by the registered consortium that participated in private-led efforts to trace back the origin of suspected unlawful robocalls through the registered consortium.</content></paragraph>
<paragraph class="fontsize10" id="y1897e20f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e210-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Lists.</p></sidenote><content>A list of each voice service provider that received a request from the registered consortium to participate in private-led efforts to trace back the origin of suspected unlawful robocalls and refused to participate, as identified by the registered consortium.</content></paragraph>
<paragraph class="fontsize10" id="y1897e211-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>The reason, if any, each voice service provider identified by the registered consortium provided for not participating in private-led efforts to trace back the origin of suspected unlawful robocalls.</content></paragraph>
<paragraph class="fontsize10" id="y1897e212-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/b/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>A description of how the Commission may use the information provided to the Commission by voice service providers or the registered consortium that have participated in private-led efforts to trace back the origin of suspected unlawful robocalls in the enforcement efforts by the Commission.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1897e213-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e214-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Additional Information</inline>.—</heading><content>Not later than 210 days after the date of the enactment of this Act, and annually thereafter, the Commission shall issue a notice to the public seeking additional information from voice service providers and the registered consortium of private-led efforts to trace back the origin of suspected unlawful robocalls necessary for the report by the Commission required under subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1897e215-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Registration of Consortium of Private-Led Efforts To Trace Back the Origin of Suspected Unlawful Robocalls</inline>.—</heading><paragraph class="fontsize10" id="y1897e216-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Not later than 90 days after the date of the enactment of this Act, the Commission shall issue rules to establish a registration process for the registration of a single consortium that conducts private-led efforts to trace back the origin of suspected unlawful robocalls. <sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e217-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Requirements.</p></sidenote>The consortium shall meet the following requirements:</chapeau><subparagraph class="fontsize10" id="y1897e218-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>Be a neutral third party competent to manage the private-led effort to trace back the origin of suspected unlawful robocalls in the judgement of the Commission.</content></subparagraph>
<subparagraph class="fontsize10" id="y1897e219-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Maintain a set of written best practices about the management of such efforts and regarding providers of voice services’ participation in private-led efforts to trace back the origin of suspected unlawful robocalls.<page identifier="/us/stat/133/3288">133 STAT. 3288</page></content></subparagraph>
<subparagraph class="fontsize10" id="y1897e21a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Consistent with section 222(d)(2) of the Communications Act of 1934 (<ref href="/us/usc/t47/s222/d/2">47 U.S.C. 222(d)(2)</ref>), any private-led efforts to trace back the origin of suspected unlawful robocalls conducted by the third party focus on “fraudulent, abusive, or unlawful” traffic.</content></subparagraph>
<subparagraph class="fontsize10" id="y1897e21b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e21c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Notice.</p></sidenote><content>File a notice with the Commission that the consortium intends to conduct private-led efforts to trace back in advance of such registration.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1897e21d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Annual notice by the commission seeking registrations</inline>.—</heading><content>Not <sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e21e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x1897e21f-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Public information.</p></sidenote>later than 120 days after the date of the enactment of this Act, and annually thereafter, the Commission shall issue a notice to the public seeking the registration described in paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1897e220-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">List of Voice Service Providers</inline>.—</heading><content>The Commission may publish a list of voice service providers and take appropriate enforcement action based on information obtained from the consortium about voice service providers that refuse to participate in private-led efforts to trace back the origin of suspected unlawful robocalls, and other information the Commission may collect about voice service providers that are found to originate or transmit substantial amounts of unlawful robocalls.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1897e221-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y1897e222-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Private-led effort to trace back</inline>.—</heading><content>The term “<term>private-led effort to trace back</term>” means an effort made by the registered consortium of voice service providers to establish a methodology for determining the origin of a suspected unlawful robocall.</content></paragraph>
<paragraph class="fontsize10" id="y1897e223-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Registered consortium</inline>.—</heading><content>The term “<term>registered consortium</term>” means the consortium registered under subsection (d).</content></paragraph>
<paragraph class="fontsize10" id="y1897e224-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Suspected unlawful robocall</inline>.—</heading><content>The term “<term>suspected unlawful robocall</term>” means a call that the Commission or a voice service provider reasonably believes was made in violation of subsection (b) or (e) of section 227 of the Communications Act of 1934 (<ref href="/us/usc/t47/s227">47 U.S.C. 227</ref>).</content></paragraph>
<paragraph class="fontsize10" id="y1897e225-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Voice service</inline>.—</heading><chapeau>The term “<term>voice service</term>”—</chapeau><subparagraph class="fontsize10" id="y1897e226-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>means any service that is interconnected with the public switched telephone network and that furnishes voice communications to an end user using resources from the North American Numbering Plan or any successor to the North American Numbering Plan adopted by the Commission under section 251(e)(1) of the Communications Act of 1934 (<ref href="/us/usc/t47/s251/e/1">47 U.S.C. 251(e)(1)</ref>); and</content></subparagraph>
<subparagraph class="fontsize10" id="y1897e227-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>includes—</chapeau><clause class="fontsize10" id="y1897e228-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/4/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>transmissions from a telephone facsimile machine, computer, or other device to a telephone facsimile machine; and</content></clause>
<clause class="fontsize10" id="y1897e229-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s13/f/4/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>without limitation, any service that enables real-time, two-way voice communications, including any service that requires internet protocol-compatible customer premises equipment (commonly known as “CPE”) and permits out-bound calling, whether or not the service is one-way or two-way voice over internet protocol.</content></clause>
</subparagraph>
</paragraph>
</subsection>
</section>
<section id="d236954e2056" identifier="/us/pl/116/105/s14" style="-uslm-lc:I658142"><num class="fontsize12" value="14">SEC. 14. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1897e22a-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t47/s227">47 USC 227 note</ref>.</p></sidenote><heading>HOSPITAL ROBOCALL PROTECTION GROUP.</heading><subsection class="firstIndent0 fontsize10" id="y1898a57b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1898a57c-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Establishment</inline>.—</heading><content>Not later than 180 days after the date of the enactment of this Act, the Commission shall establish an <page identifier="/us/stat/133/3289">133 STAT. 3289</page>
advisory committee to be known as the “Hospital Robocall Protection Group”.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1898a57d-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Membership</inline>.—</heading><chapeau>The Group shall be composed only of the following members:</chapeau><paragraph class="fontsize10" id="y1898a57e-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>An equal number of representatives from each of the following:</chapeau><subparagraph class="fontsize10" id="y1898a57f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>Voice service providers that serve hospitals.</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a580-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Companies that focus on mitigating unlawful robocalls.</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a581-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Consumer advocacy organizations.</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a582-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>Providers of one-way voice over internet protocol services described in subsection (e)(3)(B)(ii).</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a583-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>Hospitals.</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a584-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/1/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>State government officials focused on combating unlawful robocalls.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1898a585-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>One representative of the Commission.</content></paragraph>
<paragraph class="fontsize10" id="y1898a586-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>One representative of the Federal Trade Commission.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1898a587-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1898a588-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Issuance of Best Practices</inline>.—</heading><chapeau>Not later than 180 days after the date on which the Group is established under subsection (a), the Group shall issue best practices regarding the following:</chapeau><paragraph class="fontsize10" id="y1898a589-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>How voice service providers can better combat unlawful robocalls made to hospitals.</content></paragraph>
<paragraph class="fontsize10" id="y1898a58a-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>How hospitals can better protect themselves from such calls, including by using unlawful robocall mitigation techniques.</content></paragraph>
<paragraph class="fontsize10" id="y1898a58b-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>How the Federal Government and State governments can help combat such calls.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1898a58c-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1898a58d-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x1898a58e-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Assessment.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Proceeding by FCC</inline>.—</heading><content>Not later than 180 days after the date on which the best practices are issued by the Group under subsection (c), the Commission shall conclude a proceeding to assess the extent to which the voluntary adoption of such best practices can be facilitated to protect hospitals and other institutions.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y1898a58f-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="y1898a590-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Group</inline>.—</heading><content>The term “<term>Group</term>” means the Hospital Robocall Protection Group established under subsection (a).</content></paragraph>
<paragraph class="fontsize10" id="y1898a591-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">State</inline>.—</heading><content>The term “<term>State</term>” has the meaning given such term in section 3 of the Communications Act of 1934 (<ref href="/us/usc/t47/s153">47 U.S.C. 153</ref>).</content></paragraph>
<paragraph class="fontsize10" id="y1898a592-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Voice service</inline>.—</heading><chapeau>The term “<term>voice service</term>”—</chapeau><subparagraph class="fontsize10" id="y1898a593-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>means any service that is interconnected with the public switched telephone network and that furnishes voice communications to an end user using resources from the North American Numbering Plan or any successor to the North American Numbering Plan adopted by the Commission under section 251(e)(1) of the Communications Act of 1934 (<ref href="/us/usc/t47/s251/e/1">47 U.S.C. 251(e)(1)</ref>); and</content></subparagraph>
<subparagraph class="fontsize10" id="y1898a594-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>includes—</chapeau><clause class="fontsize10" id="y1898a595-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/3/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>transmissions from a telephone facsimile machine, computer, or other device to a telephone facsimile machine; and</content></clause>
<clause class="fontsize10" id="y1898a596-e82b-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/105/s14/e/3/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>without limitation, any service that enables real-time, two-way voice communications, including any service that requires internet protocol-compatible customer premises equipment (commonly known as “CPE”) and permits out-bound calling, whether or not the service is one-way or two-way voice over internet protocol.<page identifier="/us/stat/133/3290">133 STAT. 3290</page></content></clause>
</subparagraph>
</paragraph>
</subsection>
</section>
<section id="d236954e2246" identifier="/us/pl/116/105/s15" style="-uslm-lc:I658142"><num class="fontsize12" value="15">SEC. 15. </num><heading>SEPARABILITY CLAUSE.</heading><content style="-uslm-lc:I658120">  If any provision of this Act, the amendments made by this Act, or the application thereof to any person or circumstance is held invalid, the remainder of this Act, the amendments made by this Act, and the application of such provision to other persons or circumstances shall not be affected thereby.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2019-12-30">December 30, 2019</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/116/s/151">S. 151</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/116/41">116–41</ref> (<committee>Comm. on Commerce, Science, and Transportation</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 165 (2019):</heading>
<p class="indentUp4 firstIndent-1" id="x1898cca7-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">May 23, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="x1898cca8-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 4, considered and passed House, amended.</p><p class="indentUp4 firstIndent-1" id="x1898cca9-e82b-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 19, Senate concurred in House amendment.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>