<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H94A034D980194EFB8C620A7D5B2E5698" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 3280 IH: Ending Forced Arbitration for Victims of Data Breaches Act of 2021</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-05-17</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3280</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210517">May 17, 2021</action-date><action-desc><sponsor name-id="L000582">Mr. Lieu</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To prohibit entities from requiring individuals to submit to arbitration for disputes arising from a security breach, and for other purposes.</official-title></form><legis-body id="HD0A208E4958C47DC9DA8C07348C018C4" style="OLC"><section id="HAC05E98A43C840FB8EBF413B7CD5B36E" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Ending Forced Arbitration for Victims of Data Breaches Act of 2021</short-title></quote>.</text></section><section id="H0456CF46EBFF45B0B0CEC0CFC9E1B1C2"><enum>2.</enum><header>Protection of data security breach victims</header><text display-inline="no-display-inline">An entity may not require, as part of a customer or other similar agreement, an individual to agree to submit any dispute related to a security breach, including any dispute related to identity theft, to arbitration.</text></section><section id="H9E4E6395829443D3B8F221F361565B32"><enum>3.</enum><header>Applicability</header><text display-inline="no-display-inline">A provision of an agreement entered into prior to the date of the enactment of this Act, that violates section 2, is void.</text></section><section id="H55BA178EF96A40179D4092C654364E65"><enum>4.</enum><header>Enforcement by the Federal Trade Commission</header><subsection id="HB00D377BF6444391AAB1C96A53AA19BA"><enum>(a)</enum><header>Unfair or deceptive acts or practices</header><text>A violation of section 2 shall be treated as an unfair and deceptive act or practice in violation of a regulation under section 18(a)(1)(B) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a(a)(1)(B)</external-xref>) regarding unfair or deceptive acts or practices.</text></subsection><subsection id="H1E44CE259CDF48228F2281D5F8B8AE50"><enum>(b)</enum><header>Powers of commission</header><text>The Commission shall enforce this Act in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated into and made a part of this Act. Any person who violates section 2 shall be subject to the penalties and entitled to the privileges and immunities provided in that Act.</text></subsection><subsection id="HA9326D8E784D417082FBDD02E750B696"><enum>(c)</enum><header>Rules</header><text display-inline="yes-display-inline">The Commission shall promulgate, under section 553 of title 5, United States Code, such rules as may be necessary to carry out the provisions of this Act.</text></subsection></section><section id="H12D9EC6CC8EC4B4583857E5C5C2DC2C8"><enum>5.</enum><header>Enforcement by States</header><subsection id="HE4F37C113859486194A89372577A5DD3"><enum>(a)</enum><header>In general</header><text>If the attorney general of a State has reason to believe that an interest of the residents of the State has been or is being threatened or adversely affected by a practice that violates section 2, the attorney general of the State may, as parens patriae, bring a civil action on behalf of the residents of the State in an appropriate district court of the United States to obtain appropriate relief.</text></subsection><subsection id="HB78DABC84D5F4DCEBEE40E578712B12B"><enum>(b)</enum><header>Rights of Federal Trade Commission</header><paragraph id="HB3C5BE7401274B6F8D2980655BA5C878"><enum>(1)</enum><header>Notice to Federal Trade Commission</header><subparagraph id="H7EEBA51C8E39498D84AFC13B53F82821"><enum>(A)</enum><header>In general</header><text>Except as provided in clause (iii), the attorney general of a State, before initiating a civil action under paragraph (1), shall provide written notification to the Federal Trade Commission that the attorney general intends to bring such civil action.</text></subparagraph><subparagraph id="H4DE326CC640744FA95DA28342E2F0C54"><enum>(B)</enum><header>Contents</header><text>The notification required under clause (i) shall include a copy of the complaint to be filed to initiate the civil action.</text></subparagraph><subparagraph id="H5129245F0D274702807A0194C5F8144E"><enum>(C)</enum><header>Exception</header><text>If it is not feasible for the attorney general of a State to provide the notification required under clause (i) before initiating a civil action under paragraph (1), the attorney general shall notify the Commission immediately upon instituting the civil action.</text></subparagraph></paragraph><paragraph id="H7BA95EB62AEE4EF490DD08E3F400C850"><enum>(2)</enum><header>Intervention by Federal Trade Commission</header><text>The Commission may—</text><subparagraph id="H8D8A532FD1BD4013A725D459FEF2D657"><enum>(A)</enum><text>intervene in any civil action brought by the attorney general of a State under paragraph (1); and</text></subparagraph><subparagraph id="H45B6BC1F4082425BAA5E643D6C83E693"><enum>(B)</enum><text>upon intervening—</text><clause id="H0664BA275D5B4311AF2A71E7C279AEBA"><enum>(i)</enum><text>be heard on all matters arising in the civil action; and</text></clause><clause id="H684BF0017E6D431095EF8CABC21CCE7F"><enum>(ii)</enum><text>file petitions for appeal of a decision in the civil action.</text></clause></subparagraph></paragraph></subsection><subsection id="H6DF78B13AEFA4B7AB7D106C79B876E20"><enum>(c)</enum><header>Investigatory powers</header><text>Nothing in this subsection may be construed to prevent the attorney general of a State from exercising the powers conferred on the attorney general by the laws of the State to conduct investigations, to administer oaths or affirmations, or to compel the attendance of witnesses or the production of documentary or other evidence.</text></subsection><subsection id="H848E122B4DC64D81B53F2A05033E60CF"><enum>(d)</enum><header>Preemptive action by Federal Trade Commission</header><text>If the Federal Trade Commission institutes a civil action or an administrative action with respect to a violation of section 2, the attorney general of a State may not, during the pendency of such action, bring a civil action under paragraph (1) against any defendant named in the complaint of the Commission for the violation with respect to which the Commission instituted such action.</text></subsection><subsection id="HC991EB5B9E304C66A3AB27D9B8050E99"><enum>(e)</enum><header>Venue; service of process</header><paragraph id="H312A8F3646B64EB7A8ACC74E83D8F93C"><enum>(1)</enum><header>Venue</header><text>Any action brought under paragraph (1) may be brought in—</text><subparagraph id="HA16142729F824E068A1694B96D64D976"><enum>(A)</enum><text>the district court of the United States that meets applicable requirements relating to venue under section 1391 of title 28, United States Code; or</text></subparagraph><subparagraph id="H12E987D7C9E445C1AF4EFFD7AAEFC6C2"><enum>(B)</enum><text>another court of competent jurisdiction.</text></subparagraph></paragraph><paragraph id="HF1CF41CD3FB841588B62AEA2AB28B83C"><enum>(2)</enum><header>Service of process</header><text>In an action brought under paragraph (1), process may be served in any district in which—</text><subparagraph id="H70A97846636D44D98A8473BC6313D891"><enum>(A)</enum><text>the defendant is an inhabitant, may be found, or transacts business; or</text></subparagraph><subparagraph id="HC199EDA52197463EB1727B268FECF875"><enum>(B)</enum><text>venue is proper under section 1391 of title 28, United States Code.</text></subparagraph></paragraph></subsection></section><section id="HDF3C5C80C63D443B9F90EF46145DD788"><enum>6.</enum><header>Private right of action</header><subsection id="H86FE51EC5AF7449F8A0C8CF203EC5FAA"><enum>(a)</enum><header>In general</header><text>An individual who is injured by a violation of section 2 may bring a private right of action in any court of appropriate jurisdiction for rescission and restitution, as well as for all damages and may be awarded injunctive relief against a violation of such section. The individual shall also be entitled to recover its costs of litigation and reasonable attorney’s fees and expert witness fees, against any entity or person found to be liable for such violation.</text></subsection><subsection id="H444EE51CAC8440468025F4E2D14B9B43"><enum>(b)</enum><header>Liability</header><text>Every person who directly or indirectly controls a person liable under subsection (a), every partner in a firm so liable, every principal executive officer or director of a corporation so liable, every person occupying a similar status or performing similar functions and every employee of a person so liable who materially aids in the act or transaction constituting the violation is also liable jointly and severally with and to the same extent as such person, unless the person who would otherwise be liable hereunder had no knowledge of or reasonable grounds to know of the existence of the facts by reason of which the liability is alleged to exist.</text></subsection><subsection id="H52734A68F7A54F91A02F547FF9FF0C8C"><enum>(c)</enum><header>Statute of limitations</header><text>No action may be commenced pursuant to this section more than the later of—</text><paragraph id="HF0A56DEB314C4B9180F9134633974503"><enum>(1)</enum><text>2 years after the date on which the violation occurs; or</text></paragraph><paragraph id="HA04BB4F63EF04D6C8180201ED803B59C"><enum>(2)</enum><text>2 years after the date on which the violation is discovered or should have been discovered through exercise of reasonable diligence.</text></paragraph></subsection><subsection id="HBE35A74211044F578B8DCFC3457434E1"><enum>(d)</enum><header>Venue</header><text display-inline="yes-display-inline">An action under this section may be brought in—</text><paragraph id="H8B30D10342F74704A11FC631399721ED"><enum>(1)</enum><text>the district court of the United States that meets applicable requirements relating to venue under section 1391 of title 28, United States Code; or</text></paragraph><paragraph id="HDA272EA03DE4451DBA0D9A8427EB9C86"><enum>(2)</enum><text>another court of competent jurisdiction.</text></paragraph></subsection><subsection id="HDA27CFB3D6F94B85B338F8B3B6DF2875"><enum>(e)</enum><header>Cumulative right</header><text>The private rights provided for in this section are in addition to and not in lieu of other rights or remedies created by Federal or State law.</text></subsection></section><section id="H4F3BE2983E644BABB6AA6B1F715D48ED"><enum>7.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act—</text><paragraph id="H329C82420167478CAD74C767E77CF2EC"><enum>(1)</enum><text display-inline="yes-display-inline">the term <term>security breach</term>—</text><subparagraph id="HB8DC9B194EFA46D69FEC39219DFF3973"><enum>(A)</enum><text>means a compromise of the security, confidentiality, or integrity of, or the loss of, computerized data that results in, or there is a reasonable basis to conclude has resulted in—</text><clause id="HB85511C5184546F080322076F42F6EAF"><enum>(i)</enum><text>the unauthorized acquisition of sensitive personally identifiable information; or</text></clause><clause id="HEE6E9780DE9E47AFAA19DB1E080010B0"><enum>(ii)</enum><text>access to sensitive personally identifiable information that is for an unauthorized purpose, or in excess of authorization;</text></clause></subparagraph><subparagraph id="H0F727661F57543E9ABEE14E74C60107E"><enum>(B)</enum><text display-inline="yes-display-inline">does not include any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an element of the intelligence community; and</text></subparagraph></paragraph><paragraph id="HC093AEF47D0F4C66B97AB0E7BE206E9F"><enum>(2)</enum><text display-inline="yes-display-inline">the term <term>sensitive personally identifiable information</term> means any information or compilation of information, in electronic or digital form that includes one or more of the following:</text><subparagraph id="H6546E239090046DB961BDDE6A5353AC1"><enum>(A)</enum><text display-inline="yes-display-inline">An individual’s first and last name or first initial and last name in combination with any two of the following data elements:</text><clause id="HEEC9971692A244549B561E45062DA140"><enum>(i)</enum><text>Home address or telephone number.</text></clause><clause id="HE05B164F4C0F46ACAAB4425635EAA26F"><enum>(ii)</enum><text>Mother’s maiden name.</text></clause><clause id="H0830645F08AA4BA0B1308A5D1D3C7642"><enum>(iii)</enum><text>Month, day, and year of birth.</text></clause></subparagraph><subparagraph id="H06BAEBCF481C4A1FA61C456F17F3BED2"><enum>(B)</enum><text>A Social Security number (but not including only the last four digits of a Social Security number), driver’s license number, passport number, or alien registration number or other Government-issued unique identification number.</text></subparagraph><subparagraph id="H333DC84944224137B4FF21D2FB947698"><enum>(C)</enum><text>Unique biometric data such as a finger print, voice print, a retina or iris image, or any other unique physical representation.</text></subparagraph><subparagraph id="HF6002F6337664EE895B4D8C126C8DBCB"><enum>(D)</enum><text>A unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code.</text></subparagraph><subparagraph id="H70C0B3BA8835470F858D897693E50B2F"><enum>(E)</enum><text>A user name or electronic mail address, in combination with a password or security question and answer that would permit access to an online account.</text></subparagraph><subparagraph id="HD9EA01F26BB446A8806B01C3CC8F107D"><enum>(F)</enum><text>Any combination of the following data elements:</text><clause id="H3E989FE8C55A439CBF4EABBE7ACBE39D"><enum>(i)</enum><text>An individual’s first and last name or first initial and last name.</text></clause><clause id="HE2437FACAEC94F7BB6A2D3DBB277BDC9"><enum>(ii)</enum><text>A unique account identifier, including a financial account number or credit or debit card number, electronic identification number, user name, or routing code.</text></clause><clause id="H4DDF0EE353DD45ED9CFCA47DDDDF4F04"><enum>(iii)</enum><text>Any security code, access code, or password, or source code that could be used to generate such codes or passwords.</text></clause></subparagraph></paragraph></section></legis-body></bill> 

