<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H6C38B7B009A24CCD87F38BDB696006A3" public-private="public" key="G" bill-type="olc" star-print="first-star-print"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>104 HR 1816 IH: To require the Federal Trade Commission to promulgate regulations related to sensitive personal information, and for other purposes.</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-03-11</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 1816</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210311">March 11, 2021</action-date><action-desc><sponsor name-id="D000617">Ms. DelBene</sponsor> (for herself, <cosponsor name-id="K000381">Mr. Kilmer</cosponsor>, <cosponsor name-id="S001159">Ms. Strickland</cosponsor>, <cosponsor name-id="H001085">Ms. Houlahan</cosponsor>, <cosponsor name-id="B000574">Mr. Blumenauer</cosponsor>, <cosponsor name-id="H001047">Mr. Himes</cosponsor>, <cosponsor name-id="C001111">Mr. Crist</cosponsor>, <cosponsor name-id="L000557">Mr. Larson of Connecticut</cosponsor>, <cosponsor name-id="W000826">Ms. Wild</cosponsor>, <cosponsor name-id="P000593">Mr. Perlmutter</cosponsor>, <cosponsor name-id="C001090">Mr. Cartwright</cosponsor>, <cosponsor name-id="H001066">Mr. Horsford</cosponsor>, <cosponsor name-id="C001055">Mr. Case</cosponsor>, <cosponsor name-id="R000577">Mr. Ryan</cosponsor>, <cosponsor name-id="S001208">Ms. Slotkin</cosponsor>, <cosponsor name-id="S001216">Ms. Schrier</cosponsor>, <cosponsor name-id="B001292">Mr. Beyer</cosponsor>, <cosponsor name-id="L000560">Mr. Larsen of Washington</cosponsor>, and <cosponsor name-id="C001059">Mr. Costa</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To require the Federal Trade Commission to promulgate regulations related to sensitive personal information, and for other purposes.</official-title></form><legis-body id="HDF6E558D62CD4ECDAB94881CE47A0416" style="OLC"><section id="HC582500D468E4213A64E88831F89F070" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Information Transparency &amp; Personal Data Control Act</short-title></quote>.</text></section><section id="H664EA44E73814FBA8067AEE08F8AA966"><enum>2.</enum><header>Sense of Congress</header><text display-inline="no-display-inline">It is the Sense of Congress that—</text><paragraph id="H76CAD8B8BCFD4164A20651F57ED49D0E"><enum>(1)</enum><text>the United States must develop a balanced, high-standard digital privacy framework that complements global standards;</text></paragraph><paragraph id="H06529FCF383A45CF948A7D662400061E"><enum>(2)</enum><text>a key element of this framework is a strong national standard that combats anti-consumer practices;</text></paragraph><paragraph id="HC3019F8572244B26B78572CC57AB08CA"><enum>(3)</enum><text>it is critical that the Federal Government provide guidance on the collection, processing, disclosure, transmission and storage of sensitive data;</text></paragraph><paragraph id="H5BB8E08ACD0A41BBB7F371866B31D136"><enum>(4)</enum><text>it is important to provide the Nation with fair and thoughtful digital consumer rights with respect to such data;</text></paragraph><paragraph id="HC4F9C93E3A86426A931D2F30D2808622"><enum>(5)</enum><text>it is important to ensure that enforcement authorities have the resources needed to protect consumers from unlawful and deceptive acts of practices in the data privacy and security space; and</text></paragraph><paragraph id="H50F4DF3A43EB4939BB4F2C69376B84EB"><enum>(6)</enum><text>individuals have a right to—</text><subparagraph id="HBF72EED3A55C4B6CA83ED4FAE5820661"><enum>(A)</enum><text>exercise control over the personal data companies collect from them and how they use it;</text></subparagraph><subparagraph id="H92EB362A7B08467B948BA3C720D7177B"><enum>(B)</enum><text>easily understandable and accessible information about privacy and security practices;</text></subparagraph><subparagraph id="HCED062E09597449BAB10CA80C14C2321"><enum>(C)</enum><text>expect that companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data;</text></subparagraph><subparagraph id="HA20E14117876441798BA4C49A8BA4B4A"><enum>(D)</enum><text>secure and responsible handling of sensitive personal information;</text></subparagraph><subparagraph id="H046EEF86CDD64320B5ECCEC5CA3CEC61"><enum>(E)</enum><text>access and correct persona data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data is inaccurate; and</text></subparagraph><subparagraph id="H01331112F7164B868F4C60DE62A519AC"><enum>(F)</enum><text>reasonable limits on the personal data that companies collect and retain.</text></subparagraph></paragraph></section><section id="HF6B21197F1274C9F9A57EEAAC7A199FC"><enum>3.</enum><header>Requirements for sensitive personal information</header><subsection id="H5140218C49A244B898C2B0EA7AD96E48"><enum>(a)</enum><header>Regulations</header><text>Not later than 18 months after the date of enactment of this Act, the Federal Trade Commission shall promulgate regulations under section 553 of title 5, United States Code, to require, except as provided in subsection (b), controllers, processors, and third parties to make available to the public involving the collection, transmission, storage, processing, sale, sharing of sensitive personal information, or other use of sensitive personal information from persons operating in or persons located in the United States when the sensitive personal information is collected, transmitted, stored, processed, sold or shared to meet the following requirements:</text><paragraph id="HC185E6A685E04C4DA879549D01CF565F"><enum>(1)</enum><header>Affirmative, express, and opt-in consent</header><subparagraph id="HFC9478EDD5A943A48F203A31641053F4"><enum>(A)</enum><text>Any controller shall provide users whose personal information is collected, transmitted, stored, process, sold, or otherwise shared with notice through a privacy and data use policy of a specific request to collect, transmit, sell, share or otherwise disclose their sensitive personal information and require that users provide affirmative, express consent to any functionality that involves the sale, sharing, or other disclosure of sensitive personal information, including sharing sensitive personal information with third parties, if the sensitive personal information is to be used by the third party for purposes other than the purposes outlined in the notice.</text></subparagraph><subparagraph id="HA0157B71F7DC4D04B331895FF93FE5B9"><enum>(B)</enum><text display-inline="yes-display-inline">The documented instruction from a controller to a processor or third party shall adhere to the limits of the consent granted in subparagraph (A), and processors and third parties shall not use or disclose the sensitive personal information for any other purposes or in any way that exceeds the limits of the consent granted in subparagraph (A).</text></subparagraph><subparagraph id="H792E0484E0E945BFA902084C010E3BE8"><enum>(C)</enum><text>Controllers and processors shall not be liable for the failure of another processor or third party to adhere to the limits of an opt-in consent granted under subparagraph (A).</text></subparagraph></paragraph><paragraph id="HBDDE4A633B5F4BD2865862C13301A203"><enum>(2)</enum><header>Privacy and data use policy</header><text>Controllers, processors, and third parties shall publicly maintain an up-to-date, transparent privacy, security, and data use policy that meets general requirements, including that such policy, presented in the context where it applies—</text><subparagraph id="HE93AFBBC84074A65A00BFBA2BBABF217"><enum>(A)</enum><text>is concise, intelligible, and uses plain language;</text></subparagraph><subparagraph id="HEB42B1E6016A4CFFA8EC7D16FF3E16F3" commented="no"><enum>(B)</enum><text>is clear and conspicuous consistent with the guidelines of the Federal Trade Commission;</text></subparagraph><subparagraph id="HBB1415FBD70940E0B4A468F52369322E"><enum>(C)</enum><text>uses visualizations, where appropriate to make complex information understandable by the ordinary user; and</text></subparagraph><subparagraph id="H273F6129240941B4BF6EE6A8F41D0478"><enum>(D)</enum><text>is provided free of charge.</text></subparagraph></paragraph><paragraph id="H8F77BC8CD43B47818EC09FD37DBFEE29"><enum>(3)</enum><header>Additional requirements for privacy and data use policy</header><text>The privacy, security, and data use policy required under paragraph (2) shall include the following:</text><subparagraph id="HAF4CF3BDA93047D582A51F253B28FC78"><enum>(A)</enum><text>Identity and contact information of the entity collecting or processing the sensitive personal information.</text></subparagraph><subparagraph id="HC44897387F214E55B2ADAA5C7A07E37B"><enum>(B)</enum><text>The purpose or use for collecting, storing, processing, selling, sharing, or otherwise using the sensitive personal information.</text></subparagraph><subparagraph id="H38D1460BD48D41B78A45E5A5ADBA1E5E"><enum>(C)</enum><text>Categories of third parties with whom the sensitive personal information will be shared and for what general purposes.</text></subparagraph><subparagraph id="HB2C34E88F6E74497940F463963EA01B4" commented="no"><enum>(D)</enum><text>The process by which individuals may withdraw consent to the collecting, storing, processing, selling, sharing, or other use of the sensitive personal information, including sharing with third parties.</text></subparagraph><subparagraph id="H6E7D0D3FF4744CA6A635A3F33287DF8B"><enum>(E)</enum><text>How a user, controller, or processor can view or obtain the sensitive personal information that they have received or provided to a controller or processor, including whether it can be exported to other web-based platforms.</text></subparagraph><subparagraph id="H09A0D412EF214A6FA158A06B6CD0A194"><enum>(F)</enum><text>The categories of sensitive personal information that is collected by the controller or processor and shared with processors or third parties.</text></subparagraph><subparagraph id="H4A71C0F5204346D78D820F742833C29B"><enum>(G)</enum><text>How sensitive personal information is protected from unauthorized access or acquisition.</text></subparagraph></paragraph><paragraph id="HDCD5B451316645BDACB6C145E8335360"><enum>(4)</enum><header>Opt-out consent</header><subparagraph id="HE1A1E1E1F322482C8B7453ADBD708189" commented="no"><enum>(A)</enum><text>For any collection, transmission, storage, processing, selling, sharing, or other use of non-sensitive personal information, including sharing with third parties, controllers shall provide users with the ability to opt out at any time.</text></subparagraph><subparagraph id="HADCA6A2C0AA54C71BC664AB109BC234F"><enum>(B)</enum><text display-inline="yes-display-inline">Controllers shall honor an opt out request from a user under subparagraph (A) to the extent of its role in any collection, transmission, storage, processing, selling, sharing, or other use of non-sensitive personal information and shall communicate an opt-out request to the relevant processor or third party with which the controller has shared information regarding that user.</text></subparagraph><subparagraph id="H973E762A8CDD42C8990CD193E03BB41C"><enum>(C)</enum><text display-inline="yes-display-inline">Processors or third parties receiving an opt out pursuant to subparagraph (A) and (B) shall comply with such opt out to the extent of their role in any collection, transmission, storage, processing, selling, sharing, or other use of non-sensitive personal information.</text></subparagraph><subparagraph id="H2DA72C5B7BA44DDBBC29E44ED9911EE7"><enum>(D)</enum><text>Any controller that communicates an opt out from a user as required by subparagraph (B) shall not be liable for the failure of a service provider or third party to comply with such opt out.</text></subparagraph></paragraph><paragraph id="H6DAC1BC1BD5A40C593FB5DCF1219C1B1"><enum>(5)</enum><header>Relationship Between Controller and Processor</header><subparagraph id="HDD7761AFC07C49C7B7166C1186A9C315"><enum>(A)</enum><text>Processing by a processor must be governed by a contract between the controller and the processor that is binding on both parties and that sets the processor to processes the personal data only on documented instructions from the controller.</text></subparagraph><subparagraph id="HAB851C07BE474CB48111C3C0CEE4FB63"><enum>(B)</enum><text>Processors shall share sensitive personal information with a subcontractor only for purposes of providing services and only after first providing the controller with an opportunity to object.</text></subparagraph><subparagraph id="H770BD81236A4448FB721F1EC73693318"><enum>(C)</enum><text>In no event may any contract or documented instructions relieve a controller or a processor from the obligations and liabilities imposed on them by this Act.</text></subparagraph></paragraph><paragraph id="H41149858D0AE4621A7CA92532699934E"><enum>(6)</enum><header>Privacy audits</header><subparagraph id="HF57B2B1EDD8B4D53B866E740CF0AEFE9"><enum>(A)</enum><header>In general</header><text>Except as provided in subparagraphs (C) and (D), at least once every 2 years, each controller, processor, or third party that has collected, transmitted, stored, processed, selling, shared, or otherwise used sensitive personal information shall—</text><clause id="H16E139D2910944C28832C27E18A7FA60"><enum>(i)</enum><text>obtain a privacy audit from a qualified, objective, independent third-party; and</text></clause><clause id="HEF5DABAE1DEF406798F0E29976724E8F"><enum>(ii)</enum><text>shall make publicly available whether or not the privacy audit found the controller, processor, or third party compliant.</text></clause></subparagraph><subparagraph id="H1ABF59D98B174A2EB57D6176DD334904"><enum>(B)</enum><header>Audit requirements</header><text>Each such audit shall—</text><clause id="H692D07D6E4844CF0A901725089495F43"><enum>(i)</enum><text>set forth the privacy, security, and data use controls that the controller, processor, or third party has implemented and maintained during the reporting period;</text></clause><clause id="H2DB9BF92B63D4602A94BB81906AD2743"><enum>(ii)</enum><text>describe whether such controls are appropriate to the size and complexity of the controller, processor, or third party, the nature and scope of the activities of the controller, processor, or third party, and the nature of the sensitive personal information or behavioral data collected by the controller, processor, or third party;</text></clause><clause id="H09A0E3312E78453892D411B6431A2042"><enum>(iii)</enum><text>certify whether the privacy and security controls operate with sufficient effectiveness to provide reasonable assurance to protect the privacy and security of sensitive personal information or behavioral data, including with respect to data shared with third parties, and that the controls have so operated throughout the reporting period;</text></clause><clause id="H4201400D994541EDA58C34F00333D131"><enum>(iv)</enum><text>be prepared and completed within 60 days after a substantial change to the controller’s privacy and data use policy described in paragraph (2); and</text></clause><clause id="H5950864F3A65435A933127099A3B1FD5"><enum>(v)</enum><text>be provided—</text><subclause id="HCE9AC3A8B7CE4179A6C16CEAAB97618C"><enum>(I)</enum><text>to the Federal Trade Commission; and</text></subclause><subclause id="H2B0AD35C76B546EC883F2A245A77E1FA"><enum>(II)</enum><text>to any attorney general of a State, or other authorized State officer, within 10 days of receiving written request by the such attorney general, or other authorized State officer where such officer has presented to the controller, processor, or third party allegations that a violation of this Act or any regulation issued under this Act has been committed by the controller, processor, or third party.</text></subclause></clause></subparagraph><subparagraph id="H0031B17000264722B702E0990E972772"><enum>(C)</enum><header>Small business audit exemption</header><text>The audit requirements described in this paragraph shall not apply to controllers who collect, store, process, sell, share, or otherwise use sensitive personal information relating to 250,000 or fewer individuals per year.</text></subparagraph><subparagraph id="H47094393DF4147138A895E598750A459"><enum>(D)</enum><header>Non-sensitive personal information exemption</header><text>The audit requirements set forth above shall not apply to controllers, processors or third parties who do not collect, store, process, sell, share, or otherwise use sensitive personal information.</text></subparagraph><subparagraph id="HBDCAD800992441F0828285D35663A628"><enum>(E)</enum><header>Rules that do not incentivize selling information</header><text>The Commission shall promulgate rules regarding qualifications and requirements of third-party auditors such as a duty to conduct an independent assessment that does not incentivize the auditor to sell under the guise of a potential violation by the controller products or services when there is not a violation of the Act.</text></subparagraph></paragraph></subsection><subsection id="HC411DF16D3D94E1881543446C1758DC3"><enum>(b)</enum><header>Exemptions</header><paragraph id="H1B13651DFE314324BB08CBC95804D4E3"><enum>(1)</enum><header>Necessary operations and security purposes</header><text>Subsection (a) shall not apply to the processing, transmission, collecting, storing, sharing, selling of sensitive and non-sensitive personal information for the following purposes:</text><subparagraph id="H3527CBC599594A49B4E19CD2E7835B4C"><enum>(A)</enum><text>Preventing or detecting fraud, identity theft, unauthorized transactions, theft, shoplifting, or criminal activity including financial crimes and money laundering.</text></subparagraph><subparagraph id="H1962515EE3EC49BEA7D07117CA5895DF"><enum>(B)</enum><text>The use of such information to identify errors that impair functionality or otherwise enhancing or maintaining the availability of the services or information systems of the controller for authorized access and use.</text></subparagraph><subparagraph id="H4104AA041BB6456AB1C59F5FCC60CEC9"><enum>(C)</enum><text>Protecting the vital interests of the consumer or another natural person.</text></subparagraph><subparagraph id="H4B785D69B4134EE99C377A06936F3DCC"><enum>(D)</enum><text>Responding in good faith to valid legal process or providing information as otherwise required or authorized by law.</text></subparagraph><subparagraph id="H68034A5F317749E9858AB6C9D2619301"><enum>(E)</enum><text>Monitoring or enforcing agreements between the Controller, processor, or third party and an individual, including but not limited to, terms of service, terms of use, user agreements, or agreements concerning monitoring criminal activity.</text></subparagraph><subparagraph id="HCC18DDA6A0104E3682EA94FD25E0FD3E"><enum>(F)</enum><text>Protecting the property, services, or information systems of the controller, processor, or third party against unauthorized access or use.</text></subparagraph><subparagraph id="H55200A228886473FB18D1EAF07ED6E24"><enum>(G)</enum><text>Advancing a substantial public interest, including archival purposes, scientific or historical research, and public health, if such processing does not create a significant risk of harm to consumers.</text></subparagraph><subparagraph id="H3D556A0F12AE485980E6AE22440A320C"><enum>(H)</enum><text>Uses authorized by the Fair Credit Reporting Act or used by a commercial credit reporting agency.</text></subparagraph><subparagraph id="H1E8373CD51E641E6936804E1A6CC0850"><enum>(I)</enum><text>Completing the transaction for which the personal information was collected, provide a good or service requested by the consumer that is reasonably anticipated within the context of a business’ ongoing relationship with the consumer, bill or collect for such good or service or otherwise perform a contract between the controller and a consumer.</text></subparagraph><subparagraph id="H726293F1369B4D008F1C7B1AB378C74C" commented="no"><enum>(J)</enum><text>Complying with other Federal, State, and local law.</text></subparagraph><subparagraph id="H51EDEAC4B3844E09B825CB206CD94606"><enum>(K)</enum><text>Conducting product recalls and servicing warranties.</text></subparagraph></paragraph><paragraph id="H9467C2166BB84DF08DF22AAC706E7A39"><enum>(2)</enum><header>Reasonable expectation of users</header><text>The regulations promulgated pursuant to subsection (a) with respect to the requirement to provide opt-in consent shall not apply to the processing, transmission, storage, selling, sharing, or collection of sensitive personal information in which such processing does not deviate from purposes consistent with a controller’s relationship with users as understood by the reasonable use, including but not limited to—</text><subparagraph id="H1BE5B033D82F47DF8E30E028C97017FF"><enum>(A)</enum><text>carrying out the term of a contract or service agreement, including elements of a customer loyalty program, with a user;</text></subparagraph><subparagraph id="H576C1A14E13245DD9537E5896D3C5436"><enum>(B)</enum><text>accepting and processing a payment from a user;</text></subparagraph><subparagraph id="H9A38768E888B4554A3CAF9FE19238A69"><enum>(C)</enum><text>completing a transaction with a user such as through delivering a good or service even if such delivery is made by a processor or third party;</text></subparagraph><subparagraph id="H042415564922409B8BFB674D896794DB"><enum>(D)</enum><text>marking goods or services to a user as long as the user is provided with the ability to opt out of such marketing;</text></subparagraph><subparagraph id="H86B912AC67DD4202A28F609B33592A8D"><enum>(E)</enum><text>taking steps to continue or extend an existing business relationship with a user, or inviting a new user to participate in a customer promotion, benefit or loyalty program, as long as the user is provided with the ability to opt out;</text></subparagraph><subparagraph id="H729EC7E9928C46169BCCD26D66AA35EF"><enum>(F)</enum><text>conduct internal research to improve, repair, or develop products, services, or technology; or</text></subparagraph><subparagraph id="HCA27766E6B6E4BA89EBA1314A3EC0495"><enum>(G)</enum><text>municipal governments.</text></subparagraph></paragraph></subsection></section><section id="HA1E226F91B9048128022538E9120C4EA"><enum>4.</enum><header>Application and enforcement by the Federal Trade Commission</header><subsection id="H82CC4968FFE14BC59AEB2D03D74C3BD6"><enum>(a)</enum><header>Common carriers</header><text>Notwithstanding the limitations in the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41</external-xref> et seq.) on Commission authority with respect to common carriers, this Act applies, according to its terms, to common carriers subject to the Communications Act of (<external-xref legal-doc="usc" parsable-cite="usc/47/151">47 U.S.C. 151</external-xref> et seq.) and all Acts amendatory thereof and supplementary thereto. The Federal Trade Commission shall be the only Federal agency with authority to enforce such common carriers’ privacy practices.</text></subsection><subsection id="HF591CD11268142BC92DAC9487CEFC100"><enum>(b)</enum><header>Enforcement</header><paragraph id="H69216DE8EF5F4B22B4CEDB3A10D94F71"><enum>(1)</enum><header>Unfair or deceptive acts or practices</header><text>A violation of this Act or a regulation promulgated under this Act shall be treated as a violation section 18(a)(1)(B) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/57">15 U.S.C. 57(a)(1)(B)</external-xref>) regarding unfair or deceptive acts or practices.</text></paragraph><paragraph id="H15698D0F03CA40ABA6507900CB0BBD77"><enum>(2)</enum><header>Powers of commission</header><text>Except as provided in subsection (a), the Federal Trade Commission shall enforce this Act and the regulations promulgated under this Act in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41</external-xref> et seq.) were incorporated into and made a part of this Act. Any person who violates this Act or a regulation promulgated under this Act shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act.</text></paragraph></subsection><subsection id="HA52123C16165411E8C121FDA0CB37FFD"><enum>(c)</enum><header>Construction</header><text>Nothing in this Act shall be construed to limit the authority of the Federal Trade Commission under any other provision of law.</text></subsection><subsection id="HECA7C003715041DD97A4FBD6CF179A2C"><enum>(d)</enum><header>Opportunity to Comply</header><text>The Commission shall notify a controller of alleged violations and provide them with 30 days to cure a non-wilful violations of this Act before the Commission shall commence and enforcement action.</text></subsection></section><section id="HB848959115014B35B2C73CBDEAE126D8"><enum>5.</enum><header>Enforcement by State attorneys general</header><subsection id="H1659B80571374A698294BCF1EC16365B"><enum>(a)</enum><header>Right of action</header><text>Except as provided in subsection (e), the attorney general of a State, alleging a violation of this Act or any regulation issued under this Act that affects or may affect such State or its residents may bring an action on behalf of the residents of the State in any United States district court for the district in which the defendant is found, resides, or transacts business, or wherever venue is proper under section 1391 of title 28, United States Code, to obtain appropriate injunctive relief.</text></subsection><subsection id="HDAB5D35D5D024DFB8986AD1DB65B69D5"><enum>(b)</enum><header>Notice to commission required</header><text>A State shall provide prior written notice to the Federal Trade Commission of any civil action under subsection (a) together with a copy of its complaint, except that if it is not feasible for the State to provide such prior notice, the State shall provide such notice immediately upon instituting such action.</text></subsection><subsection id="H392733875FCB44FB8B77E6A63DFB8E6F"><enum>(c)</enum><header>Intervention by the commission</header><text>The Commission may intervene in such civil action and upon intervening—</text><paragraph id="H9FE8742DC10B4F4BB90155D07EEB7CE1"><enum>(1)</enum><text>be heard on all matters arising in such civil action; and</text></paragraph><paragraph id="HE2EFEF5342E74BE1839E54476FB10E3C"><enum>(2)</enum><text>file petitions for appeal of a decision in such civil action.</text></paragraph></subsection><subsection id="H782B811BA04845F3B37FC9BE03736C54"><enum>(d)</enum><header>Construction</header><text>Nothing in this section shall be construed—</text><paragraph id="H6F486E82E82C403C90139F393F4D3F5D"><enum>(1)</enum><text>to prevent the attorney general of a State, or other authorized State officer, from exercising the powers conferred on the attorney general, or other authorized State officer, by the laws of such State; or</text></paragraph><paragraph id="H69ACE5C3DFB84CC08117AA98D87BB88D"><enum>(2)</enum><text>to prohibit the attorney general of a State, or other authorized State officer, from proceeding in State or Federal court on the basis of an alleged violation of any civil or criminal statute of that State.</text></paragraph></subsection><subsection id="HC5C0D4D43B5745CE8B83192964D8078C"><enum>(e)</enum><header>Limitation</header><paragraph id="HDB173D5433624D828AB1AB3A87A2275C"><enum>(1)</enum><header>No separate action</header><text>An action may not be brought under subsection (a) if the same alleged violation is the subject of a pending action by the Commission or the United States.</text></paragraph><paragraph id="H73F96C9EBDA1403BA97EA9B6006E33CB"><enum>(2)</enum><header>Exclusive period to act by commission</header><text>An action—</text><subparagraph id="H8670D34DFD96440892E7A2C5B65A69DF"><enum>(A)</enum><text>may not be brought under subsection (a) until the expiration of the 60-day period that begins on the date on which a violation is discovered by the Commission or the date on which the Commission is notified of the violation; and</text></subparagraph><subparagraph id="H3326D872CB6C4E56A33B0F24A5207CA7"><enum>(B)</enum><text>may only be brought under subsection (a) if the Commission does not bring an action related to the violation during such period.</text></subparagraph></paragraph></subsection><subsection id="H7EE66F6D4FE140648D80F77FFFDD8F5C"><enum>(f)</enum><header>Opportunity to Comply</header><text>Prior to bringing any action under this section, the state attorney general shall notify a controller of alleged violations and provide them with 30 days to cure a non-wilful violations of this Act before commencing an enforcement action.</text></subsection></section><section id="HBD480E3D33B1418897E6609A6834FF18"><enum>6.</enum><header>Privacy and data security employees and funding for the Commission</header><subsection id="H0AD6E035DD4A4FD3B6FE1B58DE8EDDEE"><enum>(a)</enum><header>Employment authority</header><text>The Commission shall hire 500 new full-time employees to focus on privacy and data security, 50 of which shall have technology expertise.</text></subsection><subsection id="H4D710E35E3474963A5D7418ABB1D0AFA"><enum>(b)</enum><header>Additional funding for privacy and data security</header><text>There is authorized to be appropriated to the Commission $350,000,000 for issues related to privacy and data security.</text></subsection></section><section id="H54C23C442CF74CBE83C8099FB036E2AB"><enum>7.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act the following definitions apply:</text><paragraph id="HF1E4785105B549DCA4FA3D699A2494F6"><enum>(1)</enum><header>Call detail record</header><text>The term <term>call detail record</term>—</text><subparagraph id="H2AA36DBA3846405B9818AA59C4283720"><enum>(A)</enum><text>means session-identifying information (including an originating or terminating telephone number, an International Mobile Subscriber Identity number, or an International Mobile Station Equipment Identity number), a telephone calling card number, or the time or duration of a call;</text></subparagraph><subparagraph id="H05FA846791CD4677A598E74CC5866759"><enum>(B)</enum><text>does not include—</text><clause id="HAA31D36918194091A0BA5288CB1EC87F"><enum>(i)</enum><text>the contents (as defined in section (8) of title 18, United States Code) of any communication;</text></clause><clause id="HF8BE6EC941B847FE9C2ADF0AD045BB00"><enum>(ii)</enum><text>the name, address, or financial information of a subscriber or customer;</text></clause><clause id="H4BA877283BEE44E5A36C5A69BA59BE9C"><enum>(iii)</enum><text>cell site location or global positioning system information; or</text></clause><clause id="H50514CB153E84191AA028581B7F49F24"><enum>(iv)</enum><text>business customers.</text></clause></subparagraph></paragraph><paragraph id="HEF1B0560291A4CDC868CF41C2C5921C2"><enum>(2)</enum><header>Clear and prominent</header><text>The term <term>clear and prominent</term> means in any communication medium, the required disclosure is—</text><subparagraph id="H08DAB8A1579341B59F123ED804CC5C43"><enum>(A)</enum><text>of a type, size, and location sufficiently noticeable for an ordinary consumer to read and comprehend the communication;</text></subparagraph><subparagraph id="H0ABF63CE0D0745ED8BE2D7568F1B89F0"><enum>(B)</enum><text>provided in a manner such that an ordinary consumer is able to read and comprehend the communication;</text></subparagraph><subparagraph id="HB2710A36EE804277B9430D1CB7700DB1"><enum>(C)</enum><text>is presented in an understandable language and syntax;</text></subparagraph><subparagraph id="HCC21EA10036D4156914460B66A6C8509"><enum>(D)</enum><text>includes nothing contrary to, inconsistent with, or that mitigates any statement contained within the disclosure or within any document linked to or referenced therein; and</text></subparagraph><subparagraph id="H0E9D31360C2940C79218C4D04D85B973"><enum>(E)</enum><text>includes an option that is compliant with applicable obligations of the controller under title III of the Americans with Disabilities Act of 1990 (<external-xref legal-doc="usc" parsable-cite="usc/42/12181">42 U.S.C. 12181</external-xref> et seq.).</text></subparagraph></paragraph><paragraph id="H84520DB042774E12A14AB92863D540D5"><enum>(3)</enum><header>Collection</header><text>The term <term>collection</term> means buying, renting, gathering, obtaining, receiving, or accessing any sensitive data of an individual by any means.</text></paragraph><paragraph id="HFBF742F7706C4387B50FFB0315A57A25"><enum>(4)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph id="HCE4B78CA7D4C4BEFBE3CC58368F12601"><enum>(5)</enum><header>Controller</header><text>The term <term>controller</term> means a person that, on its own or jointly with other entities, determines the purposes and means of processing sensitive personal information.</text></paragraph><paragraph id="H9E7730F21F264681879BB965B1099AC7"><enum>(6)</enum><header>De-Identified Data</header><text>The term <term>de-identified data</term> means information held that—</text><subparagraph id="H6E7BDEB7BC1B42D9B2B85C714B070902"><enum>(A)</enum><text>does not identify, and is not linked or reasonably linkable to, and individual or device;</text></subparagraph><subparagraph id="HA292EF0FD76242E6B199FBE471BB78ED"><enum>(B)</enum><text>does not contain a persistent identifier or other information that could readily be used to de-identify the individual to whom, or the device to which, the identifier or information pertains;</text></subparagraph><subparagraph id="H722BED90849E406A89BA5060D54D8A81"><enum>(C)</enum><text>is subject to a public commitment by the entity;</text></subparagraph><subparagraph id="HABB7849A7EA048B7B26E425CF63E6DBC"><enum>(D)</enum><text>to refrain from attempting to use such information to identify any individual or device;</text></subparagraph><subparagraph id="H110AE103BF5B4E589F10B955786EE273"><enum>(E)</enum><text>to adopt technical and organizational measures to ensure that such information is not linked to any individual or device; and</text></subparagraph><subparagraph id="HA3FF1773F81F46B6A01F64BEB9A50388"><enum>(F)</enum><text>is not disclosed by the covered entity to any other party unless the disclosure is subject to a contractually or other legally binding requirement.</text></subparagraph></paragraph><paragraph id="H62E1BD70D3A24A79B163375F8A7FF8FA"><enum>(7)</enum><header>Employee data</header><text>The term <term>employee data</term> means—</text><subparagraph id="H01B6C42E20B24B22891B0D90E61DA9B8"><enum>(A)</enum><text>information relating to an individual collected in the course of the individual acting as a job applicant to, or employee (regardless of whether such employee is paid of unpaid, or employed on a temporary basis), owner, director, officer, staff member, trainee, vendor, visitor, volunteer, intern, or contractor;</text></subparagraph><subparagraph id="H5A46693575904DDE9DA01AFC17D6297E"><enum>(B)</enum><text>business contact information of an individual, including the individual’s name, position or title, business telephone number, business address, business email address, qualifications, and other similar information that is provided by an individual who is acting in a professional capacity, provided that such information is collected, processed, or transferred solely for purposes related to such individuals’ professional activities; or</text></subparagraph><subparagraph id="H4362877EB4464F9E80DBB18189562E97"><enum>(C)</enum><text>emergency contact information collected by a covered entity that relates to an individual who is acting in a role described in subparagraph (A).</text></subparagraph></paragraph><paragraph id="H6441330DA4EE4F1E9B6ACF345566D381"><enum>(8)</enum><header>Processor</header><text display-inline="yes-display-inline">The term <term>processor</term> means a person that processes data on behalf of a controller or another processor according to and for the purposes set forth in the documented instructions. If a person processes data on its own behalf or for its own purposes, then that person is not a processor with respect to that data but is instead a controller. Determining whether a person is acting as a controller or processor with respect to a specific processing of data is a fact-based determination that depends upon the controller’s documented instructions and the context in which personal data is to be processed. A processor shall only remain a processor to the extent that it continues to process data for the sole purposes set forth in the documented instructions of the controller and adheres to those instructions and the limitations in the controller’s privacy policy as communicated to the processor with respect to a specific processing of personal information.</text></paragraph><paragraph id="H88231CB10D0E45EF9B4300A21AB4B8D9"><enum>(9)</enum><header>Sensitive personal information</header><subparagraph id="H2D07FEA9E886459BA6465EB64078435D"><enum>(A)</enum><text>The term <term>sensitive personal information</term> means information relating to an identified or identifiable individual that is—</text><clause id="H54CB8FBF34E24919B82609256D83556F"><enum>(i)</enum><text>financial account numbers;</text></clause><clause id="HA48FF41CC3AC4FA78C00B1808BEDB7B8"><enum>(ii)</enum><text>health information;</text></clause><clause id="H6D6EE25847954720A7D17838437FD3E1"><enum>(iii)</enum><text>genetic data;</text></clause><clause id="HB8A597CEDA524067A4E376126233C35D"><enum>(iv)</enum><text>any information pertaining to children under 13 years of age;</text></clause><clause id="HE293AC3AA39644898C0DF8588B7FFEC4"><enum>(v)</enum><text>Social Security numbers;</text></clause><clause id="H04393F5951C84766A2BD64A72F460C57"><enum>(vi)</enum><text>unique government-issued identifiers;</text></clause><clause id="H3067DC04D46E43398AEC9896BCD772B5"><enum>(vii)</enum><text>authentication credentials for a financial account, such as a username and password;</text></clause><clause id="H3D852B865AB6463C90F740A8E87588AA"><enum>(viii)</enum><text>precise geolocation information;</text></clause><clause id="H4E9C69EAB5EB414CA78F8127D77D2848"><enum>(ix)</enum><text>content of a personal wire communication, oral communication, or electronic communication such as e-mail or direct messaging with respect to any entity that is not the intended recipient of the communication;</text></clause><clause id="H8FA21BBFA10A4A63B557DD8EB751856F"><enum>(x)</enum><text>call detail records for calls conducted in a personal and not a business capacity;</text></clause><clause id="H4ADEB17797C84F8AA3646585DABE5AA9"><enum>(xi)</enum><text>biometric information;</text></clause><clause id="H9665B684048F4BC0A4AE75B6D760EEB9"><enum>(xii)</enum><text display-inline="yes-display-inline">sexual orientation, gender identity, or intersex status;</text></clause><clause id="HE468A478F7D742D7AE2E4B43E28C4628"><enum>(xiii)</enum><text display-inline="yes-display-inline">citizenship or immigration status;</text></clause><clause id="H2B9CA7AD236C475492D0372AC483EF0C"><enum>(xiv)</enum><text>mental or physical health diagnosis;</text></clause><clause id="H7012630572BC43688284DF54128E3AF2"><enum>(xv)</enum><text>religious beliefs; or</text></clause><clause id="H52C1FAA2EB5A413CBAC1945B447256CF" commented="no"><enum>(xvi)</enum><text>web browsing history, application usage history, and the functional equivalent of either that is data described in this subparagraph that is not aggregated data.</text></clause></subparagraph><subparagraph id="H5F66FFB9CB9D424CA38387E653247557"><enum>(B)</enum><text>The term <term>sensitive personal information</term> does not include—</text><clause id="HF15386AD51DF479AAA37B3639BDCF000"><enum>(i)</enum><text>de-identified information (or the measurement, analysis or process utilized to transforming personal data so that it is not directly relatable to an identified or identifiable consumer);</text></clause><clause id="HE34BADFF1ADD4B539AC6A4EE55F00F6A"><enum>(ii)</enum><text>information related to employment, including any employee data;</text></clause><clause id="H037833C2CC064A3A87DD315C0393FC9D"><enum>(iii)</enum><text>personal information reflecting a written or verbal communication or a transaction between a controller and the user, where the user is a natural person who is acting as an employee, owner, director, officer, or contractor of a company, partnership, sole proprietorship, non-profit, or government agency and whose communications or transaction with the controller occur solely within the context of the controller conducting due diligence regarding, or providing or receiving a product or service to or from such company, partnership, sole proprietorship, non-profit, or government agency; or</text></clause><clause id="HB60CC0F4B9ED4001A2F4387ECD052030"><enum>(iv)</enum><text>publicly available information.</text></clause></subparagraph></paragraph><paragraph id="H10157353E4A7456E84EF2464493BFAEE"><enum>(10)</enum><header>State</header><text>The term <term>State</term> means each State of the United States, the District of Columbia, and each commonwealth, territory, or possession of the United States.</text></paragraph><paragraph id="H8CDD29A73FFF41E89CC008B25995DFD8"><enum>(11)</enum><header>Third party</header><text>The term <term>third party</term> means an individual or entity that uses or receives sensitive personal information obtained by or on behalf of a controller, other than—</text><subparagraph id="HF347E384FD9F45A293CA26C61663F1B4"><enum>(A)</enum><text>a service provider of a controller to whom the controller discloses the consumer’s sensitive personal information for an operational purpose subject to section 3(a)(1)(B) of this Act; and</text></subparagraph><subparagraph id="H9D0EA9BF3E70487DA99417F21E1D4F8B"><enum>(B)</enum><text>any entity that uses sensitive personal information only as reasonably necessary—</text><clause id="H0707FCC565DD4580921B222F94DA80EA"><enum>(i)</enum><text>to comply with applicable law, regulation, or legal process;</text></clause><clause id="HCA253F752225466998CA4EA9F1776C85"><enum>(ii)</enum><text>to enforce the terms of use of a controller;</text></clause><clause id="HBAFD363E42E741ABABA609F2D7718109"><enum>(iii)</enum><text>to detect, prevent, or mitigate fraud or security vulnerabilities; or</text></clause><clause id="HD9D2D18847264344885522C4B3BE9310"><enum>(iv)</enum><text>does not determine the purposes and means of processing sensitive personal information.</text></clause></subparagraph></paragraph><paragraph id="HC2875A7EF0A34E2AAA643559544111FE"><enum>(12)</enum><header>Transfer</header><text>The term <term>transfer</term> means to disclose, release, share, disseminate, make available, or license in writing, electronically or by any other means, for consideration of any kind for a commercial purpose.</text></paragraph></section><section id="H7DAA82BDABB34DDE9CDB3AE40932998D"><enum>8.</enum><header>Rules of construction</header><subsection id="H85C19BB6576C433C9575789EAF43F525"><enum>(a)</enum><header>Federal acquisition</header><text display-inline="yes-display-inline">Nothing in this Act may be construed to preclude the acquisition by the Federal Government of—</text><paragraph id="H369EF316D1DC43D290A58964B2094271"><enum>(1)</enum><text>the contents of a wire or electronic communication pursuant to other lawful authorities, including the authorities under <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/119">chapter 119</external-xref> of title 18, United States Code (commonly known as the <quote>Wiretap Act</quote>), the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref> et seq.), or any other provision of Federal law not specifically amended by this Act; or</text></paragraph><paragraph id="H8E04E26517AB467CA73B260B408879A6"><enum>(2)</enum><text>records or other information relating to a subscriber or customer of any electronic communication service or remote computing service (not including the content of such communications) pursuant to the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref> et seq.), <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/18/119">chapter 119</external-xref> of title 18, United States Code (commonly known as the <quote>Wiretap Act</quote>), or any other provision of Federal law not specifically amended by this Act.</text></paragraph></subsection><subsection id="HB9958A7359234EB5BF40732FD1D80D3E"><enum>(b)</enum><header>Effect on other laws</header><text display-inline="yes-display-inline">Nothing in this Act shall be construed to limit or substitute for the requirements under title V of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801</external-xref> et seq.), section 264(c) of the Health Insurance Portability and Accountability Act of 1996 (<external-xref legal-doc="public-law" parsable-cite="pl/104/191">Public Law 104–191</external-xref>), section 444 of the General Education Provisions Act (commonly known as the Family Educational Rights and Privacy Act of 1974) (<external-xref legal-doc="usc" parsable-cite="usc/20/1232g">20 U.S.C. 1232g</external-xref>), the Fair Credit Reporting Act (<external-xref legal-doc="usc" parsable-cite="usc/15/1681">15 U.S.C. 1681</external-xref> et seq.).</text></subsection></section><section id="H4B7F9340A08C4E1E92AFD19ED976AC76"><enum>9.</enum><header>National standard</header><subsection id="H3D74BFECD3B44B4DB631047E9F05BF12"><enum>(a)</enum><header>Relationship to state law</header><text>No State or political subdivision of a State may adopt, maintain, enforce, or continue in effect any law, regulation, rule, requirement, or standard related to the data privacy or associated activities of covered entities.</text></subsection><subsection id="H9F765B1E423C4005A18B6CA041BE7864"><enum>(b)</enum><header>Nonpreemption</header><text>Subsection (a) shall not be construed to—</text><paragraph id="HF58B05CF5F444552A841A7BB3F680CBE"><enum>(1)</enum><text>preempt State laws that directly establish requirements for the notification of consumers in the event of a data breach;</text></paragraph><paragraph id="H773C51EC3EFB445B8352ACEABA87A886"><enum>(2)</enum><text>preempt State laws that directly establish requirements regarding biometric laws;</text></paragraph><paragraph id="H975A7DBEF04E4BA9B24B81E3EC53D00D"><enum>(3)</enum><text>preempt State laws regarding wiretapping laws; or</text></paragraph><paragraph id="HB2781FA3077745F0B6D6C32E098B2D63"><enum>(4)</enum><text>preempt State laws like the Public Records Act.</text></paragraph></subsection></section><section id="HA0D9472BDF6642A78B9F58BC892C4523"><enum>10.</enum><header>Effective Date</header><text display-inline="no-display-inline"> This Act shall take effect 180 days after the date of the enactment of this Act.</text></section></legis-body></bill> 

