<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 134 STAT. ?>
<?I98 134 STAT. ?>
<?I99 134 STAT. ?>
<?I50 PUBLIC LAW 116–251—DEC. 22, 2020?>
<?I51 PUBLIC LAW 116–251—DEC. 22, 2020?>
<?I52 PUBLIC LAW 116–251—DEC. 22, 2020?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 116–251: To explicitly make unauthorized access to Department of Education information technology systems and the misuse of identification devices issued by the Department of Education a criminal act.</dc:title>
<dc:type>Public Law</dc:type><docNumber>251</docNumber>
<citableAs>Public Law 116–251</citableAs><citableAs>134 Stat. 1129</citableAs>
<approvedDate>2020-12-22</approvedDate>
<dc:date>2020-12-22</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>116</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 116–251—DEC. 22, 2020</centerRunningHead>
<page identifier="/us/stat/134/1129">134 STAT. 1129</page>
<dc:type>Public Law</dc:type><docNumber>116–251</docNumber>
<congress value="116">116th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To explicitly make unauthorized access to Department of Education information technology systems and the misuse of identification devices issued by the Department of Education a criminal act.<sidenote><p class="centered fontsize8" id="x52f2b6a9-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2020-12-22">Dec. 22, 2020</approvedDate></p><p class="centered fontsize8" id="x52f2b6aa-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/116/s/1153">S. 1153</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f2b6ab-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Stop Student Debt Relief Scams Act</p><p class="leftAlign firstIndent0 fontsize8" id="x52f2b6ac-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">of 2019.</p><p class="leftAlign firstIndent0 fontsize8" id="x52f2b6ad-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t20/s1001">20 USC 1001 note</ref>.</p></sidenote>
<section id="d223764e94" identifier="/us/pl/116/251/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Stop Student Debt Relief Scams Act of 2019</shortTitle>”.</content></section>
<section id="d223764e104" identifier="/us/pl/116/251/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>CRIMINAL PENALTIES.</heading><subsection class="firstIndent0 fontsize10" id="y52f304ce-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s2/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Section 490 of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1097">20 U.S.C. 1097</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subsection class="firstIndent0 fontsize10" id="y52f304cf-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">“(e) </num><heading class="fontsize10"><inline class="smallCaps">Access to Department of Education Information Technology Systems for Fraud, Commercial Advantage, or Private Financial Gain</inline>.—</heading><content>Any person who knowingly uses an access device, as defined in <ref href="/us/usc/t18/s1029/e/1">section 1029(e)(1) of title 18, United States Code</ref>, issued to another person or obtained by fraud or false statement to access Department information technology systems for purposes of obtaining commercial advantage or private financial gain, or in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State, shall be fined not more than $20,000, imprisoned for not more than 5 years, or both.”</content></subsection>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y52f304d0-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f304d1-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t20/s1097">20 USC 1097 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Guidance</inline>.—</heading><content>The Secretary shall issue guidance regarding the use of access devices in a manner that complies with this Act, and the amendments made by this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y52f304d2-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s2/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f304d3-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t20/s1097">20 USC 1097 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Effective Date of Penalties</inline>.—</heading><content>Notwithstanding section 6, the penalties described in section 490(e) of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1097">20 U.S.C. 1097</ref>), as added by subsection (a), shall take effect the day after the date on which the Secretary issues guidance regarding the use of access devices, as described in subsection (b).</content></subsection>
</section>
<section id="d223764e175" identifier="/us/pl/116/251/s3" role="instruction" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>LOAN COUNSELING.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x52f32ae4-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 485(b) of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1092/b">20 U.S.C. 1092(b)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y52f32ae5-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s3/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in clause (viii), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” after the semicolon; and</content></paragraph>
<paragraph class="fontsize10" id="y52f32ae6-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s3/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><clause class="indentUp2 fontsize10" id="y52f351f7-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="x">“(x) </num><chapeau>an explanation that—<page identifier="/us/stat/134/1130">134 STAT. 1130</page></chapeau><subclause class="fontsize10" id="y52f351f8-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>the borrower may be contacted during the repayment period by third-party student debt relief companies;</content></subclause>
<subclause class="fontsize10" id="y52f351f9-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>the borrower should use caution when dealing with those companies; and</content></subclause>
<subclause class="fontsize10" id="y52f351fa-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">“(III) </num><content>the services that those companies typically provide are already offered to borrowers free of charge through the Department or the borrower’s servicer; and”</content></subclause>
</clause>
</quotedContent>.</content></paragraph>
</section>
<section id="d223764e232" identifier="/us/pl/116/251/s4" role="instruction" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>PREVENTION OF IMPROPER ACCESS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x52f3c72b-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 485B of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1092b">20 U.S.C. 1092b</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y52f3c72c-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsections (e) through (h) as subsections (f) through (i), respectively;</content></paragraph>
<paragraph class="fontsize10" id="y52f3c72d-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in subsection (d)—</chapeau><subparagraph class="fontsize10" id="y52f3c72e-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (5)(C), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” after the semicolon;</content></subparagraph>
<subparagraph class="fontsize10" id="y52f3c72f-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in paragraph (6)(C), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="y52f3c730-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><paragraph class="indentDown1 fontsize10" id="y52f3c731-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>preventing access to the data system and any other system used to administer a program under this title by any person or entity for the purpose of assisting a student in managing loan repayment or applying for any repayment plan, consolidation loan, or other benefit authorized by this title, unless such access meets the requirements described in subsection (e).”</content></paragraph>
</quotedContent>;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y52f3c732-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subsection (d) the following:<quotedContent><subsection class="indentDown1 firstIndent0 fontsize10" id="y52f41553-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">“(e) </num><heading class="fontsize10"><inline class="smallCaps">Requirements for Third-Party Data System Access</inline>.—</heading><paragraph class="fontsize10" id="y52f41554-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>As provided in paragraph (7) of subsection (d), an authorized person or entity described in paragraph (2) may access the data system and any other system used to administer a program under this title if that access—</chapeau><subparagraph class="fontsize10" id="y52f41555-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f41556-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Federal Register, publication.</p></sidenote><content>is in compliance with terms of service, information security standards, and a code of conduct which shall be established by the Secretary and published in the Federal Register;</content></subparagraph>
<subparagraph class="fontsize10" id="y52f41557-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>is obtained using an access device (as defined in <ref href="/us/usc/t18/s1029/e/1">section 1029(e)(1) of title 18, United States Code</ref>) issued by the Secretary to the authorized person or entity; and</content></subparagraph>
<subparagraph class="fontsize10" id="y52f41558-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>is obtained without using any access device (as defined in <ref href="/us/usc/t18/s1029/e/1">section 1029(e)(1) of title 18, United States Code</ref>) issued by the Secretary to a student, borrower, or parent.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y52f41559-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f4155a-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Definition.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Authorized person or entity</inline>.—</heading><chapeau>An authorized person or entity described in this paragraph means—</chapeau><subparagraph class="fontsize10" id="y52f4155b-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>a guaranty agency, eligible lender, or eligible institution, or a third-party organization acting on behalf of a guaranty agency, eligible lender, or eligible institution, that is in compliance with applicable Federal law (including regulations and guidance); or</content></subparagraph>
<subparagraph class="fontsize10" id="y52f4155c-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f4155d-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determinations.</p></sidenote><chapeau>a licensed attorney representing a student, borrower, or parent, or another individual who works for a Federal, State, local, or Tribal government or agency, or for a nonprofit organization, providing financial or student loan repayment counseling to a student, borrower, or parent, if—</chapeau><page identifier="/us/stat/134/1131">134 STAT. 1131</page>
<clause class="fontsize10" id="y52f4155e-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>that attorney or other individual has never engaged in unfair, deceptive, or abusive practices, as determined by the Secretary;</content></clause>
<clause class="fontsize10" id="y52f4155f-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>that attorney or other individual does not work for an entity that has engaged in unfair, deceptive, or abusive practices (including an entity that is owned or operated by a person or entity that engaged in such practices), as determined by the Secretary;</content></clause>
<clause class="fontsize10" id="y52f41560-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>system access is provided only through a separate point of entry; and</content></clause>
<clause class="fontsize10" id="y52f41561-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><content>the attorney or other individual has consent from the relevant student, borrower, or parent to access the system.”</content></clause>
</subparagraph>
</paragraph>
</subsection>
</quotedContent>; and</content></paragraph>
<paragraph class="fontsize10" id="y52f41562-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>in subsection (f)(1), as redesignated by paragraph (1)—</chapeau><subparagraph class="fontsize10" id="y52f41563-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>student and parent</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>student, borrower, and parent</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y52f41564-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subparagraphs (C) and (D) as subparagraphs (D) and (E), respectively;</content></subparagraph>
<subparagraph class="fontsize10" id="y52f41565-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/4/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>by <amendingAction type="insert">inserting</amendingAction> after subparagraph (B) the following:<quotedContent><subparagraph class="indentUp0 fontsize10" id="y52f41566-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>the reduction in improper data system access as described in subsection (d)(7);”</content></subparagraph>
</quotedContent>; and</content></subparagraph>
<subparagraph class="fontsize10" id="y52f41567-e824-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/251/s4/4/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>by <amendingAction type="delete">striking</amendingAction> subparagraph (E), as redesignated by subparagraph (B), and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><subparagraph class="indentUp0 fontsize10" id="y52f41568-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><content>any protocols, codes of conduct, terms of service, or information security standards developed under paragraphs (6) or (7) of subsection (d) during the preceding fiscal year.”</content></subparagraph>
</quotedContent>.</content></subparagraph>
</paragraph>
</section>
<section id="d223764e460" identifier="/us/pl/116/251/s5" role="instruction" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>AGENCY PREVENTION AND DETECTION.</heading><content class="firstIndent0 fontsize10" id="x52f43c79-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Section 141(b)(2) of the Higher Education Act of 1965 (<ref href="/us/usc/t20/s1018/b/2">20 U.S.C. 1018(b)(2)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><subparagraph class="indentUp2 fontsize10" id="y52f4638a-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><chapeau>Taking action to prevent and address the improper use of access devices, as described in section 485B(d)(7), including by—</chapeau><clause class="fontsize10" id="y52f4638b-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>detecting common patterns of improper use of any system that processes payments on Federal Direct Loans or other Department information technology systems;</content></clause>
<clause class="fontsize10" id="y52f4638c-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>maintaining a reporting system for contractors involved in the processing of payments on Federal Direct Loans in order to allow those contractors to alert the Secretary of potentially improper use of Department information technology systems;</content></clause>
<clause class="fontsize10" id="y52f4638d-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>proactively contacting Federal student loan borrowers whose Federal student loan accounts demonstrate a likelihood of improper use in order to warn those borrowers of suspicious activity or potential fraud regarding their Federal student loan accounts; and</content></clause>
<clause class="fontsize10" id="y52f4638e-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><content>providing clear and simple disclosures in communications with borrowers who are applying for or requesting assistance with Federal Direct Loan programs (including assistance or applications regarding income-driven repayment, forbearance, deferment, consolidation, rehabilitation, cancellation, and forgiveness) to ensure that borrowers are aware that the Department will never require borrowers to pay for such assistance or applications.”</content></clause>
</subparagraph>
</quotedContent>.<page identifier="/us/stat/134/1132">134 STAT. 1132</page></content></section>
<section id="d223764e506" identifier="/us/pl/116/251/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x52f4638f-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t20/s1018">20 USC 1018 note</ref>.</p></sidenote><heading>EFFECTIVE DATE.</heading><content style="-uslm-lc:I658120">  This Act, and the amendments made by this Act, shall take effect on the date that is 180 days after the date of enactment of this Act.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2020-12-22">December 22, 2020</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/116/s/1153">S. 1153</ref>:</heading>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 166 (2020):</heading>
<p class="indentUp4 firstIndent-1" id="x52f46390-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 1, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="x52f46391-e824-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 7, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>