<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Referred-in-Senate" bill-type="olc" dms-id="H92104C202F5E49FAB4D1769840843C49" public-private="public" star-print="first-star-print"> 
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>110 HR 964 : Securely Protect Yourself Against Cyber Trespass Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2007-06-07</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form> 
<distribution-code display="yes">IIB</distribution-code> 
<congress>110th CONGRESS</congress> <session>1st Session</session> 
<legis-num>H. R. 964</legis-num> 
<current-chamber display="yes">IN THE SENATE OF THE UNITED STATES</current-chamber> 
<action> 
<action-date date="20070607">June 7, 2007</action-date> 
<action-desc> Received; read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc> 
</action> 
<legis-type>AN ACT</legis-type> 
<official-title display="yes">To protect users of the Internet from unknowing transmission of their personally identifiable information through spyware programs, and for other purposes.</official-title> 
</form> 
<legis-body id="H0565CD9AED6643159BF42DFD4FDA4F60" style="OLC"> 
<section display-inline="no-display-inline" id="H9ABEE4C5EF934317B2000057A24DF233" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Securely Protect Yourself Against Cyber Trespass Act</short-title></quote> or the <quote><short-title>Spy Act</short-title></quote>.</text> </section>
<section id="H5A593F3AE4094A34A1AE2361B7F563C7"><enum>2.</enum><header>Prohibition of unfair or deceptive acts or practices relating to spyware</header> 
<subsection id="H702B1F4496EB4EB68DD199300CCBD83"><enum>(a)</enum><header>Prohibition</header><text>It is unlawful for any person, who is not the owner or authorized user of a protected computer, to engage in unfair or deceptive acts or practices that involve any of the following conduct with respect to the protected computer:</text> 
<paragraph id="H7673F754D3B741DDAD1BD42FD1F6ACEB"><enum>(1)</enum><text>Taking control of the computer by—</text> 
<subparagraph id="HC524D453401A48E9BB7D8744A2EB69DD"><enum>(A)</enum><text>utilizing such computer to send unsolicited information or material from the computer to others;</text> </subparagraph>
<subparagraph id="H9DFE14C91D67491B9C216902D0555697"><enum>(B)</enum><text>diverting the Internet browser of the computer, or similar program of the computer used to access and navigate the Internet—</text> 
<clause id="H1BF2B3128C65466B8C7ED93DB2FCDA00"><enum>(i)</enum><text>without authorization of the owner or authorized user of the computer; and</text> </clause>
<clause id="H3517D10BF1414E4989DDA51C8635B4EE"><enum>(ii)</enum><text>away from the site the user intended to view, to one or more other Web pages, such that the user is prevented from viewing the content at the intended Web page, unless such diverting is otherwise authorized;</text> </clause></subparagraph>
<subparagraph id="H9D0F4B74BF2A45448D8F5648A0CF67C3"><enum>(C)</enum><text>accessing, hijacking, or otherwise using the modem, or Internet connection or service, for the computer and thereby causing damage to the computer or causing the owner or authorized user or a third party defrauded by such conduct to incur charges or other costs for a service that is not authorized by such owner or authorized user;</text> </subparagraph>
<subparagraph id="H532BC77D9E544A7D90F02474136EFE4D"><enum>(D)</enum><text>using the computer as part of an activity performed by a group of computers that causes damage to another computer; or</text> </subparagraph>
<subparagraph id="H66841603A0C54C62BC00B8722100D7EB"><enum>(E)</enum><text>delivering advertisements or a series of advertisements that a user of the computer cannot close or terminate without undue effort or knowledge by the user or without turning off the computer or closing all sessions of the Internet browser for the computer.</text> </subparagraph></paragraph>
<paragraph id="H3C30F1AA112444C1B4FECA597EBFF35"><enum>(2)</enum><text>Modifying settings related to use of the computer or to the computer’s access to or use of the Internet by altering—</text> 
<subparagraph id="H7E15E93EADB5409B8C4647BB942DBB"><enum>(A)</enum><text>the Web page that appears when the owner or authorized user launches an Internet browser or similar program used to access and navigate the Internet;</text> </subparagraph>
<subparagraph id="H622111D64DDB4EEDB8A1BAAB6E95BAB9"><enum>(B)</enum><text>the default provider used to access or search the Internet, or other existing Internet connections settings;</text> </subparagraph>
<subparagraph id="H45B8DE6050EB437AA178175B5016E6BE"><enum>(C)</enum><text>a list of bookmarks used by the computer to access Web pages; or</text> </subparagraph>
<subparagraph id="H10B0774E85704DC989414863029160E8"><enum>(D)</enum><text>security or other settings of the computer that protect information about the owner or authorized user for the purposes of causing damage or harm to the computer or owner or user.</text> </subparagraph></paragraph>
<paragraph id="H1014EFDC705943069D8B19A8E5922CEF"><enum>(3)</enum><text>Collecting personally identifiable information through the use of a keystroke logging function.</text> </paragraph>
<paragraph id="H8E81A7E5D4634407A58F5CF83BA366B0"><enum>(4)</enum><text>Inducing the owner or authorized user of the computer to disclose personally identifiable information by means of a Web page that—</text> 
<subparagraph id="HE4B4501A334344FC9F173C433041D88B"><enum>(A)</enum><text>is substantially similar to a Web page established or provided by another person; and</text> </subparagraph>
<subparagraph id="H15A8660698AB46D0971D3C90AF300724"><enum>(B)</enum><text>misleads the owner or authorized user that such Web page is provided by such other person.</text> </subparagraph></paragraph>
<paragraph id="H8A4F7FCED754413489B9E2D2F1B6DCA5"><enum>(5)</enum><text>Inducing the owner or authorized user to install a component of computer software onto the computer, or preventing reasonable efforts to block the installation or execution of, or to disable, a component of computer software by—</text> 
<subparagraph id="HAA9B76A4980C43F2A9609B4E997B2C56"><enum>(A)</enum><text>presenting the owner or authorized user with an option to decline installation of such a component such that, when the option is selected by the owner or authorized user or when the owner or authorized user reasonably attempts to decline the installation, the installation nevertheless proceeds; or</text> </subparagraph>
<subparagraph id="H965E3C91737C4F22BC28D670FB5EBC19"><enum>(B)</enum><text>causing such a component that the owner or authorized user has properly removed or disabled to automatically reinstall or reactivate on the computer.</text> </subparagraph></paragraph>
<paragraph id="H6845463E45544B7A80C3BC547700FDD0"><enum>(6)</enum><text>Misrepresenting that installing a separate component of computer software or providing log-in and password information is necessary for security or privacy reasons, or that installing a separate component of computer software is necessary to open, view, or play a particular type of content.</text> </paragraph>
<paragraph id="H6D0196BCBD0A4D05B2A93E42E8D9D45"><enum>(7)</enum><text>Inducing the owner or authorized user to install or execute computer software by misrepresenting the identity or authority of the person or entity providing the computer software to the owner or user.</text> </paragraph>
<paragraph id="HE2603124A80F484AB56FDFA5AD67CE9E"><enum>(8)</enum><text>Inducing the owner or authorized user to provide personally identifiable, password, or account information to another person—</text> 
<subparagraph id="H6208EF40BF224D7F9752C8E03C553F44"><enum>(A)</enum><text>by misrepresenting the identity of the person seeking the information; or</text> </subparagraph>
<subparagraph id="HE01E59A52A2B4D448521FC813BA8797C"><enum>(B)</enum><text>without the authority of the intended recipient of the information.</text> </subparagraph></paragraph>
<paragraph id="H44AD6330484B49B6BA6F4B9B223770D4"><enum>(9)</enum><text>Removing, disabling, or rendering inoperative a security, anti-spyware, or anti-virus technology installed on the computer.</text> </paragraph>
<paragraph id="H0E321DF9EE6F43AC9600AD4C6DBDE87"><enum>(10)</enum><text>Installing or executing on the computer one or more additional components of computer software with the intent of causing a person to use such components in a way that violates any other provision of this section.</text> </paragraph></subsection>
<subsection id="H1BC0ED6D2C2642AE96066213E2B13F48"><enum>(b)</enum><header>Guidance</header><text>The Commission shall issue guidance regarding compliance with and violations of this section. This subsection shall take effect upon the date of the enactment of this Act.</text> </subsection>
<subsection id="H7DD1BB5E92614517B038BE6770D3AA39"><enum>(c)</enum><header>Effective Date</header><text>Except as provided in subsection (b), this section shall take effect upon the expiration of the 6-month period that begins on the date of the enactment of this Act.</text> </subsection></section>
<section id="HF7C3E53F13D74A2C87B369723180018"><enum>3.</enum><header>Prohibition of collection of certain information without notice and consent</header> 
<subsection id="HEEE8F767B7C34E15A4BEA5077EB18B"><enum>(a)</enum><header>Opt-in Requirement</header><text>Except as provided in subsection (e), it is unlawful for any person—</text> 
<paragraph id="HA46C208949ED4D338BE3B12D10E651C7"><enum>(1)</enum><text>to transmit to a protected computer, which is not owned by such person and for which such person is not an authorized user, any information collection program, unless—</text> 
<subparagraph id="H8A7A4635D58F4FD88798373939B337E2"><enum>(A)</enum><text>such information collection program provides notice in accordance with subsection (c) before <italic></italic>downloading or installing any of the information collection program; and</text> </subparagraph>
<subparagraph id="H79E1909CAE9F4F3C819EC0C0D66E2817"><enum>(B)</enum><text>such information collection program includes the functions required under subsection (d); or</text> </subparagraph></paragraph>
<paragraph id="H64F801ED42C649899100DC44103BA7E3"><enum>(2)</enum><text>to execute any information collection program installed on such a protected computer unless—</text> 
<subparagraph id="HF680ABC3C56C4AADBDEA976F60D512F2"><enum>(A)</enum><text>before execution of any of the information collection functions of the program, the owner or an authorized user of the protected computer has consented to such execution pursuant to notice in accordance with subsection (c); and</text> </subparagraph>
<subparagraph id="H8F7FBCF3C0B04219B9694B2350B57F65"><enum>(B)</enum><text>such information collection program includes the functions required under subsection (d).</text> </subparagraph></paragraph></subsection>
<subsection id="HBB400C5B67B44465AFB5B45E00F242D1"><enum>(b)</enum><header>Information Collection Program</header> 
<paragraph id="H297CDC8BFD6B449E94F5A32F05F4FE80"><enum>(1)</enum><header>In general</header><text>For purposes of this section, the term <term>information collection program</term> means computer software that performs either of the following functions:</text> 
<subparagraph id="HCD02DE0873494252B697C8EA9E010106"><enum>(A)</enum><header>Collection of personally identifiable information</header><text>The computer software—</text> 
<clause id="HF0A79B7D37D3489DB8E18CF3439045C3"><enum>(i)</enum><text>collects personally identifiable information; and</text> </clause>
<clause id="H4227754A3D514353A601B5A97331F49B"><enum>(ii)</enum>
<subclause commented="no" display-inline="yes-display-inline" id="H96461B2F6B1B43EFA9976092166E5646"><enum>(I)</enum><text>sends such information to a person other than the owner or authorized user of the computer, or</text> </subclause>
<subclause id="HCF2A7426E3C54D199DC3A957777394BC" indent="up1"><enum>(II)</enum><text>uses such information to deliver advertising to, or display advertising on, the computer.</text> </subclause></clause></subparagraph>
<subparagraph id="H1AEA3F5EDE7D43A2BF8EF6003B073DB7"><enum>(B)</enum><header>Collection of information regarding internet activity to deliver advertising</header><text>The computer software—</text> 
<clause id="H465DC1611CE3480B899CEF669E93B04E"><enum>(i)</enum><text>collects information regarding the user’s Internet activity using the computer; and</text> </clause>
<clause id="HD28513B9E29C490AADF193E793BE5B4D"><enum>(ii)</enum><text>uses such information to deliver advertising to, or display advertising on, the computer.</text> </clause></subparagraph></paragraph>
<paragraph id="HBBA77BC6259440B998E2F576D8F535A3"><enum>(2)</enum><header>Exception for software collecting information regarding internet activity within a particular web site</header><text>Computer software that otherwise would be considered an information collection program by reason of paragraph (1)(B) shall not be considered such a program if—</text> 
<subparagraph id="H263829EE9B6B448ABE21A03054080E"><enum>(A)</enum><text>the only information collected by the software regarding the user’s internet activity, and used to deliver advertising to, or display advertising on, the protected computer, is—</text> 
<clause id="H7523E65595294D0AA1236E4EB7D24DA3"><enum>(i)</enum><text>information regarding Web pages within a particular Web site; or</text> </clause>
<clause commented="no" id="H7D46762483DA40AE99F8B5E6768197CE"><enum>(ii)</enum><text display-inline="yes-display-inline">in the case of any Internet-based search function, user-supplied search terms necessary to complete the search and return results to the user;</text> </clause></subparagraph>
<subparagraph id="H25B51E9A6DA34BAF97EF186566060561"><enum>(B)</enum><text>such information collected is not sent to a person other than—</text> 
<clause id="H17168F482613453000166D8D1915F21B"><enum>(i)</enum><text>the provider of the Web site accessed or Internet-based search function; or</text> </clause>
<clause id="HD34D8AC15743495DB71B97ACD301260"><enum>(ii)</enum><text>a party authorized to facilitate the display or functionality of Web pages within the Web site accessed; and</text> </clause></subparagraph>
<subparagraph id="H2845D126975D4751952209B71EFB12B2"><enum>(C)</enum><text>the only advertising delivered to or displayed on the computer using such information is advertising on Web pages within that particular Web site.</text> </subparagraph></paragraph></subsection>
<subsection id="H1FA4FF3DA13747A8BCACFF741DD6C293"><enum>(c)</enum><header>Notice and Consent</header> 
<paragraph id="H169228805E1E44C38D51001060B1C89C"><enum>(1)</enum><header>In general</header><text>Notice in accordance with this subsection with respect to an information collection program is clear and conspicuous notice in plain language, set forth as the Commission shall provide, that meets all of the following requirements:</text> 
<subparagraph id="H6311B2F2068B4516B19E38C3A8538EE6"><enum>(A)</enum><text>The notice clearly distinguishes a statement required under subparagraph (B) from any other information visually presented contemporaneously on the computer.</text> </subparagraph>
<subparagraph id="H00F259FE56164C3D93EFE57C3C9DC364"><enum>(B)</enum><text>The notice contains one of the following statements, as applicable, or a substantially similar statement:</text> 
<clause id="HF1E8050C4022472AA04EB1EEB3F13254"><enum>(i)</enum><text>With respect to an information collection program described in subsection (b)(1)(A): <quote>This program will collect and transmit information about you. Do you accept?</quote>.</text> </clause>
<clause id="H21268866694449409FBA08B36E271EF"><enum>(ii)</enum><text>With respect to an information collection program described in subsection (b)(1)(B): <quote>This program will collect information about Web pages you access and will use that information to display advertising on your computer. Do you accept?</quote>.</text> </clause>
<clause id="H9BA56A6CB7154C0A8575F24CBA263687"><enum>(iii)</enum><text>With respect to an information collection program that performs the actions described in both subparagraphs (A) and (B) of subsection (b)(1): <quote>This program will collect and transmit information about you and will collect information about Web pages you access and use that information to display advertising on your computer. Do you accept?</quote>.</text> </clause></subparagraph>
<subparagraph id="HEBCD6365875D40B9ADEE71C556955604"><enum>(C)</enum><text>The notice provides for the user—</text> 
<clause id="HA070010D799842188E681120C7CD0054"><enum>(i)</enum><text>to grant or deny consent referred to in subsection (a) by selecting an option to grant or deny such consent; and</text> </clause>
<clause id="HA532D6D090A54EC4A9EF85BAF93B22C"><enum>(ii)</enum><text>to abandon or cancel the transmission or execution referred to in subsection (a) without granting or denying such consent.</text> </clause></subparagraph>
<subparagraph id="H81A658ECA54F44489425815719BDCBFB"><enum>(D)</enum><text>The notice provides an option for the user to select to display on the computer, before granting or denying consent using the option required under subparagraph (C), a clear description of—</text> 
<clause id="HDAE086C6D18E42989033EB4158705521"><enum>(i)</enum><text>the types of information to be collected and sent (if any) by the information collection program;</text> </clause>
<clause id="HFFA30D9D26F3445FAB00ABF7321EBD3C"><enum>(ii)</enum><text>the purpose for which such information is to be collected and sent; and</text> </clause>
<clause id="HBE334218AE5541ABA4072DC7D0A64B66"><enum>(iii)</enum><text>in the case of an information collection program that first executes any of the information collection functions of the program together with the first execution of other computer software, the identity of any such software that is an information collection program.</text> </clause></subparagraph>
<subparagraph id="HC14656DBC2EF4C75B222F2D401B300EC"><enum>(E)</enum><text>The notice provides for concurrent display of the information required under subparagraphs (B) and (C) and the option required under subparagraph (D) until the user—</text> 
<clause id="H44DE13EF24AB4609A529BC5E5337D7A5"><enum>(i)</enum><text>grants or denies consent using the option required under subparagraph (C)(i);</text> </clause>
<clause id="H2160B3C1230140FCBAB93712EDEBA5C1"><enum>(ii)</enum><text>abandons or cancels the transmission or execution pursuant to subparagraph (C)(ii); or</text> </clause>
<clause id="HDEB58AB28433444FBE144B9037BDEF5D"><enum>(iii)</enum><text>selects the option required under subparagraph (D).</text> </clause></subparagraph></paragraph>
<paragraph id="H8BA1BA93F3E94743B6CF5DF5444C561"><enum>(2)</enum><header>Single notice</header><text>The Commission shall provide that, in the case in which multiple information collection programs are provided to the protected computer together, or as part of a suite of functionally related software, the notice requirements of paragraphs (1)(A) and (2)(A) of subsection (a) may be met by providing, before execution of any of the information collection functions of the programs, clear and conspicuous notice in plain language in accordance with paragraph (1) of this subsection by means of a single notice that applies to all such information collection programs, except that such notice shall provide the option under subparagraph (D) of paragraph (1) of this subsection with respect to each such information collection program.</text> </paragraph>
<paragraph id="H3FCB71E54048481D8D71ED7869DD200"><enum>(3)</enum><header>Change in information collection</header><text>If an owner or authorized user has granted consent to execution of an information collection program pursuant to a notice in accordance with this subsection:</text> 
<subparagraph id="H6FC7AFFEF3C64C2300E8B6F3DF86AB38"><enum>(A)</enum><header>In general</header><text>No subsequent such notice is required, except as provided in subparagraph (B).</text> </subparagraph>
<subparagraph id="H5C2AADA4F5714FAC9738525795008DB5"><enum>(B)</enum><header>Subsequent notice</header><text>The person who transmitted the program shall provide another notice in accordance with this subsection and obtain consent before such program may be used to collect or send information of a type or for a purpose that is materially different from, and outside the scope of, the type or purpose set forth in the initial or any previous notice.</text> </subparagraph></paragraph>
<paragraph id="H34D262CA76F34D22BA41999D40890790"><enum>(4)</enum><header>Regulations</header><text>The Commission shall issue regulations to carry out this subsection.</text> </paragraph></subsection>
<subsection id="H39111735FACC432FBCB9C04965B92200"><enum>(d)</enum><header>Required Functions</header><text>The functions required under this subsection to be included in an information collection program that executes any information collection functions with respect to a protected computer are as follows:</text> 
<paragraph id="H7EDCF1DA58E342509978CBBF8517F047"><enum>(1)</enum><header>Disabling function</header><text>With respect to any information collection program, a function of the program that allows a user of the program to remove the program or disable operation of the program with respect to such protected computer by a function that—</text> 
<subparagraph id="H2A510CBFCE39403A8CDAD8A0AD99D067"><enum>(A)</enum><text>is easily identifiable to a user of the computer; and</text> </subparagraph>
<subparagraph id="HD91E50C9802C40E4BC6242E7E234712F"><enum>(B)</enum><text>can be performed without undue effort or knowledge by the user of the protected computer.</text> </subparagraph></paragraph>
<paragraph id="HFDD4D5D6ABD041B09F788D9BDADF0C6"><enum>(2)</enum><header>Identity function</header> 
<subparagraph id="H4C4507CB59C547C3BED7FADB7F7EC9B4"><enum>(A)</enum><header>In general</header><text>With respect only to an information collection program that uses information collected in the manner described in subparagraph (A)(ii)(II) or (B)(ii) of subsection (b)(1) and subject to subparagraph (B) of this paragraph, a function of the program that provides that each display of an advertisement directed or displayed using such information, when the owner or authorized user is accessing a Web page or online location other than of the provider of the computer software, is accompanied by the name of the information collection program, a logogram or trademark used for the exclusive purpose of identifying the program, or a statement or other information sufficient to clearly identify the program.</text> </subparagraph>
<subparagraph id="HA5B0276B36784C8BBA1591CF8105A7EF"><enum>(B)</enum><header>Exemption for embedded advertisements</header><text>The Commission shall, by regulation, exempt from the applicability of subparagraph (A) the embedded display of any advertisement on a Web page that contemporaneously displays other information.</text> </subparagraph></paragraph>
<paragraph id="HED5EE2F9DF5C4160BDFD826C3F5C32D3"><enum>(3)</enum><header>Rulemaking</header><text>The Commission may issue regulations to carry out this subsection.</text> </paragraph></subsection>
<subsection id="H57E2810686EA4A10BFAE6262EDBAD7AC"><enum>(e)</enum><header>Limitation on Liability</header><text>A telecommunications carrier, a provider of information service or interactive computer service, a cable operator, or a provider of transmission capability shall not be liable under this section to the extent that the carrier, operator, or provider—</text> 
<paragraph id="H147D003142F94487008B3F6BEBBF6877"><enum>(1)</enum><text>transmits, routes, hosts, stores, or provides connections for an information collection program through a system or network controlled or operated by or for the carrier, operator, or provider; or</text> </paragraph>
<paragraph id="H59614CFFAB8E43FF00098E20B80089DB"><enum>(2)</enum><text>provides an information location tool, such as a directory, index, reference, pointer, or hypertext link, through which the owner or user of a protected computer locates an information collection program.</text> </paragraph></subsection>
<subsection commented="no" id="H635DBE80CE4A497597EA4301C87DD691"><enum>(f)</enum><header>Study and additional exemption</header> 
<paragraph commented="no" id="H39B9D9472C764134B03137A1D07197EE"><enum>(1)</enum><header>Study and report</header><text display-inline="yes-display-inline">The Commission shall conduct a study to determine the applicability of the information collection prohibitions of this section to information that is input directly by users in a field provided on a website. The study shall examine—</text> 
<subparagraph commented="no" id="HA04A0466A22B454B9BBED4EBC67BB43"><enum>(A)</enum><text>the nature of such fields for user input;</text> </subparagraph>
<subparagraph commented="no" id="HD1C3EC47CFAB49B2003CC889DB00D0D5"><enum>(B)</enum><text>the use of a user’s information once input and whether such information is sent to a person other than the provider of the Web site;</text> </subparagraph>
<subparagraph commented="no" id="H82BFAA93CD874641B0C8279D9D5D2CFF"><enum>(C)</enum><text>whether such information is used to deliver advertisements to the user’s computer; and</text> </subparagraph>
<subparagraph commented="no" id="H1F35116E542D46D6A3B5CAD8EA356EDA"><enum>(D)</enum><text>the extent of any notice provided to the user prior to such input.</text> </subparagraph></paragraph>
<paragraph commented="no" id="HB38B7EEB53FD44958C66F41F2F01EAFF"><enum>(2)</enum><header>Report</header><text>The Commission shall transmit a report on such study to the Committee on Energy and Commerce of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate not later than the expiration of the 6-month period that begins on the date on which final regulations are issued under section 9. The requirements of subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, shall not apply to the report required under this subsection.</text> </paragraph>
<paragraph commented="no" id="HFFE53D22ECDF47C1802E6724B03EB9"><enum>(3)</enum><header>Regulation</header><text>If the Commission finds that users have adequate notice regarding the uses of any information input directly by the user in a field provided on a website, such that an exemption from the requirements of this section, or a modification of the notice required by this section is appropriate for such information, and that such an exemption or modification is consistent with the public interest, the protection of consumers, and the purposes of this Act, the Commission may prescribe such an exemption or modification by regulation.</text> </paragraph></subsection></section>
<section id="H8839F24B74DE499493CA563016B13DE1"><enum>4.</enum><header>Enforcement</header> 
<subsection id="H190C81E1C6AC4570AE656BDAFEB8B35"><enum>(a)</enum><header>Unfair or Deceptive Act or Practice</header><text>This Act shall be enforced by the Commission under the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>). A violation of any provision of this Act or of a regulation issued under this Act shall be treated as an unfair or deceptive act or practice violating a rule promulgated under section 18 of the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a</external-xref>).</text> </subsection>
<subsection id="HDA488A537AD547F1A520A2F1C3CF473B"><enum>(b)</enum><header>Penalty for Pattern or Practice Violations</header> 
<paragraph id="HB8986F9BDB2A40349191C9816109CC65"><enum>(1)</enum><header>In general</header><text>Notwithstanding subsection (a) and the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name>, in the case of a person who engages in a pattern or practice that violates section 2 or 3, the Commission may, in its discretion, seek a civil penalty for such pattern or practice of violations in an amount, as determined by the Commission, of not more than—</text> 
<subparagraph id="H2FD09A4CAE8C47109564B17263D0F562"><enum>(A)</enum><text>$3,000,000 for each violation of section 2; and</text> </subparagraph>
<subparagraph id="H54C4C9CFB2714B94A60030BCC0D864BA"><enum>(B)</enum><text>$1,000,000 for each violation of section 3.</text> </subparagraph></paragraph>
<paragraph id="H232BE88B71364242B107FAFEC49C8065"><enum>(2)</enum><header>Treatment of single action or conduct</header><text>In applying paragraph (1)—</text> 
<subparagraph id="HCED4010DB6BE4CFF90F62F7808E4FFE2"><enum>(A)</enum><text>any single action or conduct that violates section 2 or 3 with respect to multiple protected computers shall be treated as a single violation; and</text> </subparagraph>
<subparagraph id="H91A517E1C1934D5DA5FC0079A2FB6497"><enum>(B)</enum><text>any single action or conduct that violates more than one paragraph of section 2(a) shall be considered multiple violations, based on the number of such paragraphs violated.</text> </subparagraph></paragraph></subsection>
<subsection id="HF4E899B9F55E43EF917FDE6E592DA5ED"><enum>(c)</enum><header>Required Scienter</header><text>Civil penalties sought under this section for any action may not be granted by the Commission or any court unless the Commission or court, respectively, establishes that the action was committed with actual knowledge or knowledge fairly implied on the basis of objective circumstances that such act is unfair or deceptive or violates this Act.</text> </subsection>
<subsection id="H22050089B2DA45D2BB76595C3EA73B10"><enum>(d)</enum><header>Factors in Amount of Penalty</header><text>In determining the amount of any penalty pursuant to subsection (a) or (b), the court shall take into account the degree of culpability, any history of prior such conduct, ability to pay, effect on ability to continue to do business, and such other matters as justice may require.</text> </subsection>
<subsection id="H2B9B4EB38FD04CC680E09361EEB7EFDB"><enum>(e)</enum><header>Exclusiveness of Remedies</header><text>The remedies in this section (<italic></italic>and other remedies available to the Commission <italic></italic>in an enforcement action against unfair and deceptive acts and practices) are the exclusive remedies for violations of this Act.</text> </subsection>
<subsection id="H763C412EBD9741E0ADA796C8412DE27C"><enum>(f)</enum><header>Effective Date</header><text>To the extent only that this section applies to violations of section 2(a), this section shall take effect upon the expiration of the 6-month period that begins on the date of the enactment of this Act.</text> </subsection></section>
<section id="H2165E0C9EA594E9DB9BB534F674F7C2"><enum>5.</enum><header>Limitations</header> 
<subsection id="H9D75589D62A4446AB995FCF468A3E8B5"><enum>(a)</enum><header>Law Enforcement Authority</header><text>Sections 2 and 3 shall not apply to—</text> 
<paragraph id="H27C7A9F41CC841C1B28631A5F035559B"><enum>(1)</enum><text>any act taken by a law enforcement agent in the performance of official duties; or</text> </paragraph>
<paragraph id="H248E7AE5254B42EC8FEE8EE45F55E0"><enum>(2)</enum><text>the transmission or execution of an information collection program in compliance with a law enforcement, investigatory, national security, or regulatory agency or department of the United States or any State in response to a request or demand made under authority granted to that agency or department, including a warrant issued under the Federal Rules of Criminal Procedure, an equivalent State warrant, a court order, or other lawful process.</text> </paragraph></subsection>
<subsection id="HEFF27A04CF7B4C82A5FD439E58AFAAE5"><enum>(b)</enum><header>Exception Relating to Security</header><text>Nothing in this Act shall apply to—</text> 
<paragraph id="H19D7E059EF6C4269B435E331133C34C4"><enum>(1)</enum><text>any monitoring of, or interaction with, a protected computer—</text> 
<subparagraph commented="no" id="H46411B5A8DB74D5F8B1BCF4ED024612"><enum>(A)</enum><text>in connection with the provision of a network access service or other service or product with respect to which the user of the protected computer is an actual or prospective customer, subscriber, registered user, or account holder;</text> </subparagraph>
<subparagraph commented="no" id="H8341EA3551754B70BE41957157167541"><enum>(B)</enum><text>by the provider of that service or product or with such provider’s authorization; and</text> </subparagraph>
<subparagraph commented="no" id="HDA49A0C43CA14968AEDAB962071C41FA"><enum>(C)</enum><text>that involves or enables the collection of information about the user’s activities only with respect to the user’s relationship with or use of such service or product,</text> </subparagraph><continuation-text continuation-text-level="paragraph">to the extent that such monitoring or interaction is for the purpose of network security, computer security, diagnostics, technical support or repair, network management, authorized updates of software, or for the detection or prevention of fraudulent activities; or</continuation-text></paragraph>
<paragraph id="H827E3A0F1CD445DD94E245202B21161C"><enum>(2)</enum><text>a discrete interaction with a protected computer by a provider of computer software solely to determine whether the user of the computer is authorized to use such software, that occurs upon—</text> 
<subparagraph id="H505E021B55ED41C48D9C279CF86405D"><enum>(A)</enum><text>initialization of the software; or</text> </subparagraph>
<subparagraph id="H06BBD9D311994BE2B39C93BA79156633"><enum>(B)</enum><text>an affirmative request by the owner or authorized user for an update of, addition to, or technical service for, the software.</text> </subparagraph></paragraph></subsection>
<subsection id="H1F7FD1EAF77547909E8624EB35734B29"><enum>(c)</enum><header>Good Samaritan Protection</header> 
<paragraph id="HAAF256A9AE6C4ADD9EE85391171DF01E"><enum>(1)</enum><header>In general</header><text>No provider of computer software or of interactive computer service may be held liable under this Act on account of any action voluntarily taken, or service provided, in good faith to remove or disable a program used to violate section 2 or 3 that is installed on a computer of a customer of such provider, if such provider notifies the customer and obtains the consent of the customer before undertaking such action or providing such service.</text> </paragraph>
<paragraph commented="no" id="HD2EA5161181543DDBFF4755BD0CCD340"><enum>(2)</enum><header>Construction</header><text>Nothing in this subsection shall be construed to limit the liability of a provider of computer software or of an interactive computer service for any anti-competitive act otherwise prohibited by law.</text> </paragraph></subsection>
<subsection id="HD1B1035D9F6840BDA17208782DC1721D"><enum>(d)</enum><header>Limitation on Liability</header><text>A manufacturer or retailer of computer equipment shall not be liable under this Act to the extent that the manufacturer or retailer is providing third party branded computer software that is installed on the equipment the manufacturer or retailer is manufacturing or selling.</text> </subsection>
<subsection id="H8AB2CFC49EE343B39EFE8FB34EF2231"><enum>(e)</enum><header>Services Provided by Cable Operators and Satellite Carriers</header><text>It shall not be a violation of section 3 for a satellite carrier (as such term is defined in section 338(k) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/338">47 U.S.C. 338(k)</external-xref>) or cable operator (as such term is defined in section 631(a)(2) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/47/551">47 U.S.C. 551(a)(2)</external-xref>)) to—</text> 
<paragraph id="H2E389CFA88784FFB919B83C9D730E1BA"><enum>(1)</enum><text>utilize a navigation device (as such term is defined in the rules of the Federal Communications Commission);</text> </paragraph>
<paragraph id="H0B129A848FFE4931A734F08642E03DCF"><enum>(2)</enum><text>interact with such a navigation device; or</text> </paragraph>
<paragraph id="H7A8AF1683D2C495DAE53932DF813E451"><enum>(3)</enum><text>transmit software to or execute software installed on such a navigation device to provide service or collect or disclose subscriber information,</text> </paragraph><continuation-text continuation-text-level="subsection">if the provision of such service, the utilization of or the interaction with such device, or the collection of or disclosure of such information, is subject to section 338(i) or section 631 of the Communications Act of 1934.</continuation-text></subsection></section>
<section id="HFAE915DFF2054B3FA800F32C4BBBB6AE"><enum>6.</enum><header>Effect on other laws</header> 
<subsection id="H08CC786F67A44DEABC6100D0F3815DAA"><enum>(a)</enum><header>Preemption of State Law</header> 
<paragraph id="H3013EA4D7A8E4F539F63D93B78307014"><enum>(1)</enum><header>Preemption of spyware laws</header><text>This Act supersedes any provision of a statute, regulation, or rule of a State or political subdivision of a State that expressly regulates—</text> 
<subparagraph id="H95D8045B2B10480A898D38AD748C9F"><enum>(A)</enum><text>unfair or deceptive conduct with respect to computers similar to that described in section 2(a);</text> </subparagraph>
<subparagraph id="H6CABC5873D38493B89992766E4E265CE"><enum>(B)</enum><text>the transmission or execution of a computer program similar to that described in section 3; or</text> </subparagraph>
<subparagraph id="HC1B3D46EFB244341A874BCB53FDA408C"><enum>(C)</enum><text>the use of computer software that displays advertising content based on the Web pages accessed using a computer.</text> </subparagraph></paragraph>
<paragraph id="HC688D52ED2904DF6A0105C4FCAEE35B7"><enum>(2)</enum><header>Additional preemption</header> 
<subparagraph id="H9B0102B357304C09A5440142A8FCED6"><enum>(A)</enum><header>In general</header><text>No person other than the Attorney General of a State may bring a civil action under the law of any State if such action is premised in whole or in part upon the defendant violating any provision of this Act.</text> </subparagraph>
<subparagraph id="HBE75165DF36D49F49C45B5DBB647B6A3"><enum>(B)</enum><header>Protection of consumer protection laws</header><text>This paragraph shall not be construed to limit the enforcement of any State consumer protection law by an Attorney General of a State.</text> </subparagraph></paragraph>
<paragraph id="HCE44FA903AE04FE6935167009BA81181"><enum>(3)</enum><header>Protection of certain state laws</header><text>This Act shall not be construed to preempt the applicability of—</text> 
<subparagraph id="HDDDCA2C0054744B799E8305CE27044C"><enum>(A)</enum><text>State trespass, contract, or tort law; or</text> </subparagraph>
<subparagraph id="H48480E84492047D2AA4E5102647B8C09"><enum>(B)</enum><text>other State laws to the extent that those laws relate to acts of fraud.</text> </subparagraph></paragraph>
<paragraph commented="no" id="HB57F28C02FBA460B9329C200E48875C6"><enum>(4)</enum><header>Effective date</header><text>The preemption provided for under this subsection shall take effect, with respect to specific provisions of this Act, on the effective date for such provisions.</text> </paragraph></subsection>
<subsection id="HD62D54BE2EDB413EAA52EF03BCA88BFF"><enum>(b)</enum><header>Preservation of FTC Authority</header><text>Nothing in this Act may be construed in any way to limit or affect the Commission’s authority under any other provision of law, including the authority to issue advisory opinions (under part 1 of volume 16 of the Code of Federal Regulations), policy statements, or guidance regarding this Act.</text> </subsection></section>
<section id="H5CEAB35FBFCB4E868C3402DD71A05C6E"><enum>7.</enum><header>FTC report on cookies</header> 
<subsection id="H433F8F68B79C4E9BAB622E77B500725F"><enum>(a)</enum><header>In General</header><text>Not later than the expiration of the 6-month period that begins on the date on which final regulations are issued under section 9, the Commission shall submit a report to the Congress regarding the use of cookies in the delivery or display of advertising to the owners and users of computers. The report shall examine the extent to which cookies are or may be used to transmit to a third party personally identifiable information of a computer owner or user, information regarding Web pages accessed by the owner or user, or information regarding advertisements previously delivered to a computer, for the purpose of—</text> 
<paragraph commented="no" id="HB1AC24CAE59543B19513B66B53AB3C84"><enum>(1)</enum><text display-inline="yes-display-inline">delivering or displaying advertising to the owner or user; or</text> </paragraph>
<paragraph commented="no" id="HDF4F0CDC9DDA4424B1910222B19CB5D1"><enum>(2)</enum><text>assisting the intended recipient to deliver or display advertising to the owner, user, or others.</text> </paragraph><continuation-text continuation-text-level="subsection">The report shall examine and describe the methods by which cookies and the Web sites that place them on computers function separately and together, and shall compare the use of cookies with the use of information collection programs (as such term is defined in section 3) to determine the extent to which such uses are similar or different. The report may include such recommendations as the Commission considers necessary and appropriate, including treatment of cookies under this Act or other laws.</continuation-text></subsection>
<subsection id="HDE7FF6F3A9E34E88A6EB59BB8500F2CC"><enum>(b)</enum><header>Effective Date</header><text>This section shall take effect on the date of the enactment of this Act.</text> </subsection>
<subsection commented="no" id="HD2D2BFF7261D450682A6760023D291FA"><enum>(c)</enum><header>Paperwork reduction requirements</header><text>The requirements of subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, shall not apply to the report required under this section.</text> </subsection></section>
<section id="H50128E77CA1D41348F225EF2606884CE"><enum>8.</enum><header>FTC report on information collection programs installed before effective date</header><text display-inline="no-display-inline">Not later than the expiration of the 6-month period that begins on the date on which final regulations are issued under section 9, the Commission shall submit a report to the Congress on the extent to which there are installed on protected computers information collection programs that, but for installation prior to the effective date under section 11(a), would be subject to the requirements of section 3. The report shall include recommendations regarding the means of affording computer users affected by such information collection programs the protections of section 3, including recommendations regarding requiring a one-time notice and consent by the owner or authorized user of a computer to the continued collection of information by such a program so installed on the computer. The requirements of subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, shall not apply to the report required under this section.</text> </section>
<section id="H50AC2FA7A19D4E61AB01AE533682539B"><enum>9.</enum><header>Regulations</header> 
<subsection id="H05D9D3352B5842379B8D3500D8A2BD1C"><enum>(a)</enum><header>In General</header><text>The Commission shall issue the regulations required by this Act not later than the expiration of the 9-month period beginning on the date of the enactment of this Act. In exercising its authority to issue any regulation under this Act, the Commission shall determine that the regulation is consistent with the public interest and the purposes of this Act. Any regulations issued pursuant to this Act shall be issued in accordance with <external-xref legal-doc="usc" parsable-cite="usc/5/553">section 553</external-xref> of title 5, United States Code.</text> </subsection>
<subsection id="H897F8FFE8D6A4A788C5F7942D31173C"><enum>(b)</enum><header>Effective Date</header><text>This section shall take effect on the date of the enactment of this Act.</text> </subsection></section>
<section id="HB11C8F36F13542F7ADCA3FC6100658D"><enum>10.</enum><header>Definitions</header><text display-inline="no-display-inline">For purposes of this Act:</text> 
<paragraph id="HBD05F021C09E4D1EA1EC6733317E700"><enum>(1)</enum><header>Cable operator</header><text>The term <term>cable operator</term> has the meaning given such term in section 602 of the <act-name parsable-cite="CA34">Communications Act of 1934</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/47/522">47 U.S.C. 522</external-xref>).</text> </paragraph>
<paragraph id="HBF832FA9DFDB489B82867D952430AF4F"><enum>(2)</enum><header>Collect</header><text>The term <term>collect</term>, when used with respect to information and for purposes only of section 3(b)(1)(A), does not include obtaining of the information by a party who is intended by the owner or authorized user of a protected computer to receive the information or by a third party authorized by such intended recipient to receive the information, pursuant to the owner or authorized user—</text> 
<subparagraph id="H3667498438014BA487F1159962917C3C"><enum>(A)</enum><text>transferring the information to such intended recipient using the protected computer; or</text> </subparagraph>
<subparagraph id="H42B7C5C0BFA542CF920092873FFB8223"><enum>(B)</enum><text>storing the information on the protected computer in a manner so that it is accessible by such intended recipient.</text> </subparagraph></paragraph>
<paragraph id="HEF81AA4D27344B1EB48B4FC57FC11CB7"><enum>(3)</enum><header>Computer; protected computer</header><text>The terms <term>computer</term> and <term>protected computer</term> have the meanings given such terms in <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030(e)</external-xref> of title 18, United States Code.</text> </paragraph>
<paragraph id="H4AB1D3BB862147B886FAC225E3DFE87"><enum>(4)</enum><header>Computer software</header> 
<subparagraph id="H594025491C244E86B29D5BBCA494576"><enum>(A)</enum><header>In general</header><text>Except as provided in subparagraph (B), the term <term>computer software</term> means a set of statements or instructions that can be installed and executed on a computer for the purpose of bringing about a certain result.</text> </subparagraph>
<subparagraph id="HA37A923726244AE189A8649E4EA1638F"><enum>(B)</enum><header>Exceptions</header><text>Such term does not include—</text> 
<clause id="H12471F9030D340AE8458614E8214A82"><enum>(i)</enum><text>computer software that is placed on the computer system of a user by an Internet service provider, interactive computer service, or Internet Web site solely to enable the user subsequently to use such provider or service or to access such Web site;</text> </clause>
<clause id="H10E2A9B58CEB48E69F00FB7E1B40FBCF"><enum>(ii)</enum><text>a cookie; or</text> </clause>
<clause id="HD34201A1EC6E4B52A3D07E70EA4652C3"><enum>(iii)</enum><text>any other type of text or data file that solely may be read or transferred by a computer.</text> </clause></subparagraph></paragraph>
<paragraph id="H2B53B114204A4807BF435CAA875F02ED"><enum>(5)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text> </paragraph>
<paragraph id="H17DBFBFEB0C643CDB2756E8BEF73BEA3"><enum>(6)</enum><header>Damage</header><text>The term <term>damage</term> has the meaning given such term in <external-xref legal-doc="usc" parsable-cite="usc/18/1030">section 1030(e)</external-xref> of title 18, United States Code.</text> </paragraph>
<paragraph id="HD836EDC5B8764BE3A3086BF5419B00"><enum>(7)</enum><header>Unfair or deceptive acts or practices</header><text>The term <term>unfair or deceptive acts or practices</term> has the meaning applicable to such term for purposes of section 5 of the <act-name parsable-cite="FTCA">Federal Trade Commission Act</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/15/45">15 U.S.C. 45</external-xref>).</text> </paragraph>
<paragraph id="HD42FD8A9BB8341F88E59FBED44414DFB"><enum>(8)</enum><header>Disable</header><text>The term <term>disable</term> means, with respect to an information collection program, to permanently prevent such program from executing any of the functions described in section 3(b)(1) that such program is otherwise capable of executing (including by removing, deleting, or disabling the program), unless the owner or operator of a protected computer takes a subsequent affirmative action to enable the execution of such functions.</text> </paragraph>
<paragraph id="H6D7A6C8800084C91B6032426C30800FB"><enum>(9)</enum><header>Information collection functions</header><text>The term <term>information collection functions</term> means, with respect to an information collection program, the functions of the program described in subsection (b)(1) of section 3.</text> </paragraph>
<paragraph id="H9A5780050ABB4BF6B67CCD3415E09E13"><enum>(10)</enum><header>Information service</header><text>The term <term>information service</term> has the meaning given such term in section 3 of the <act-name parsable-cite="CA34">Communications Act of 1934</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/47/153">47 U.S.C. 153</external-xref>).</text> </paragraph>
<paragraph id="HAA43D02E5612480FA4A2718133BAE3A8"><enum>(11)</enum><header>Interactive computer service</header><text>The term <term>interactive computer service</term> has the meaning given such term in section 230(f) of the <act-name parsable-cite="CA34">Communications Act of 1934</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(f)</external-xref>).</text> </paragraph>
<paragraph id="HA0DFBC65D1A040078B72F91455B55FD5"><enum>(12)</enum><header>Internet</header><text>The term <term>Internet</term> means collectively the myriad of computer and telecommunications facilities, including equipment and operating software, which comprise the interconnected world-wide network of networks that employ the Transmission Control Protocol/Internet Protocol, or any predecessor or successor protocols to such protocol, to communicate information of all kinds by wire or radio.</text> </paragraph>
<paragraph id="HF9E03E89AC3640B090BF67CDEC83EBA3"><enum>(13)</enum><header>Personally identifiable information</header> 
<subparagraph id="HA2B27EDEDE8A487CA7F3F533009B7262"><enum>(A)</enum><header>In general</header><text>The term <term>personally identifiable information</term> means the following information, to the extent only that such information allows a living individual to be identified from that information:</text> 
<clause id="HD4906E07C59F44788C6571A3EB4EEB00"><enum>(i)</enum><text>First and last name of an individual.</text> </clause>
<clause id="H90B0182486CC4072A542C80003F009E"><enum>(ii)</enum><text>A home or other physical address of an individual, including street name, name of a city or town, and zip code.</text> </clause>
<clause id="H45D070AA16464F31BF83B330523B7600"><enum>(iii)</enum><text>An electronic mail address.</text> </clause>
<clause id="HBFBB8C2FC91E49B4B7E600A45B9D5F15"><enum>(iv)</enum><text>A telephone number.</text> </clause>
<clause id="HAC5E82CB5B81471994A45E0984E3F478"><enum>(v)</enum><text>A social security number, tax identification number, passport number, driver’s license number, or any other government-issued identification number.</text> </clause>
<clause id="H63D5DC3F82C6490BBA767CB83E97B636"><enum>(vi)</enum><text>A credit card number.</text> </clause>
<clause id="HBAD65820956C4511907253A500BF09EA"><enum>(vii)</enum><text>Any access code, password, or account number, other than an access code or password transmitted by an owner or authorized user of a protected computer to the intended recipient to register for, or log onto, a Web page or other Internet service or a network connection or service of a subscriber that is protected by an access code or password.</text> </clause>
<clause id="HD95E8A74CD4944FD83D7DD25E183BB44"><enum>(viii)</enum><text>Date of birth, birth certificate number, or place of birth of an individual, except in the case of a date of birth transmitted or collected for the purpose of compliance with the law.</text> </clause></subparagraph>
<subparagraph id="H62C8E8DB54BA43CEBC8804009731D1E4"><enum>(B)</enum><header>Rulemaking</header><text>The Commission may, by regulation, add to the types of information described in subparagraph (A) that shall be considered personally identifiable information for purposes of this Act, except that such additional types of information shall be considered personally identifiable information only to the extent that such information allows living individuals, particular computers, particular users of computers, or particular email addresses or other locations of computers to be identified from that information.</text> </subparagraph></paragraph>
<paragraph id="HBB65EC2925734617BAAF16F5018121F"><enum>(14)</enum><header>Suite of functionally related software</header><text>The term suite of <term>functionally related software</term> means a group of computer software programs distributed to an end user by a single provider, which programs <italic></italic>enable features or functionalities of an integrated service offered by the provider.</text> </paragraph>
<paragraph id="HAF34D9F9CAB8490B9C045E7959D54561"><enum>(15)</enum><header>Telecommunications carrier</header><text>The term <term>telecommunications carrier</term> has the meaning given such term in section 3 of the <act-name parsable-cite="CA34">Communications Act of 1934</act-name> (<external-xref legal-doc="usc" parsable-cite="usc/47/153">47 U.S.C. 153</external-xref>).</text> </paragraph>
<paragraph id="HF2562D0DAA2743608C4B502EEA3C5909"><enum>(16)</enum><header>Transmit</header><text>The term <term>transmit</term> means, with respect to an information collection program, transmission by any means.</text> </paragraph>
<paragraph id="H8C745DFB482D4D149877C31F5E60B400"><enum>(17)</enum><header>Web page</header><text>The term <term>Web page</term> means a location, with respect to the World Wide Web, that has a single Uniform Resource Locator or another single location with respect to the Internet, as the Federal Trade Commission may prescribe.</text> </paragraph>
<paragraph id="HFFFB343597A140BBA496B3DFA6BA1B25"><enum>(18)</enum><header>Web site</header><text>The term <term>web site</term> means a collection of Web pages that are presented and made available by means of the World Wide Web as a single Web site (or a single Web page so presented and made available), which Web pages have any of the following characteristics:</text> 
<subparagraph id="HDB1890C9ACBC4FD38C2FFFBFD085005D"><enum>(A)</enum><text>A common domain name.</text> </subparagraph>
<subparagraph id="HA6BB5156C7D7468EB3A555EBF9C6C741"><enum>(B)</enum><text>Common ownership, management, or registration.</text> </subparagraph></paragraph></section>
<section id="HA291530A741E4DA8BE35266D01F85900"><enum>11.</enum><header>Applicability and sunset</header> 
<subsection id="H169537808220456A967365C700A90779"><enum>(a)</enum><header>Effective Date</header><text>Except as specifically provided otherwise in this Act, this Act shall take effect upon the expiration of the 12-month period that begins on the date of the enactment of this Act.</text> </subsection>
<subsection id="H7055A181BC4B4426AB24D6AC2CE90467"><enum>(b)</enum><header>Applicability</header><text>Section 3 shall not apply to an information collection program installed on a protected computer before the effective date under subsection (a) of this section.</text> </subsection>
<subsection id="H1185E104643244B6A500FB38B5CC41FB"><enum>(c)</enum><header>Sunset</header><text>This Act shall not apply after December 31, 2013.</text> </subsection></section>
</legis-body> <attestation> <attestation-group> <attestation-date>Passed the House of Representatives June 6, 2007.</attestation-date> <attestor>Lorraine C. Miller,</attestor> <role>Clerk.</role><proxy>Deborah M. Spriggs,</proxy> <role>Deputy Clerk.</role> </attestation-group> </attestation> 
<endorsement display="no"> </endorsement> 
</bill> 


