<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-SIL21792-N97-H8-4WC"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>104 S2340 IS: Daniel Anderl Judicial Security and Privacy Act of 2021</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-07-14</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 2340</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210714">July 14, 2021</action-date><action-desc><sponsor name-id="S306">Mr. Menendez</sponsor> (for himself, <cosponsor name-id="S370">Mr. Booker</cosponsor>, <cosponsor name-id="S293">Mr. Graham</cosponsor>, <cosponsor name-id="S253">Mr. Durbin</cosponsor>, <cosponsor name-id="S389">Mr. Kennedy</cosponsor>, and <cosponsor name-id="S221">Mrs. Feinstein</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSJU00">Committee on the Judiciary</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To improve the safety and security of the Federal judiciary.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause" id="HB02027B1171A4CED94660DAC01113395"><section section-type="section-one" id="idead840ba26514d309db687d85909262f"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Daniel Anderl Judicial Security and Privacy Act of 2021</short-title></quote>.</text></section><section id="id23ac8ad0b2b04517b2eb3f4cf6ccdc35"><enum>2.</enum><header>Purpose; rules of construction</header><subsection id="ide58c65185c0744df9e4f77a9e54d6066"><enum>(a)</enum><header>Purpose</header><text>The purpose of this Act is to improve the safety and security of Federal judges, including senior, recalled, or retired Federal judges, and their immediate family, to ensure Federal judges are able to administer justice fairly without fear of personal reprisal from individuals affected by the decisions they make in the course of carrying out their public duties.</text></subsection><subsection id="id3569ae827b7642f9ab1fb75dfacddb5a"><enum>(b)</enum><header>Rules of construction</header><paragraph id="id2eb439fc50ce4ab4856d00fa6d545d86"><enum>(1)</enum><header>In general</header><text>Nothing in this Act shall be construed—</text><subparagraph id="ide02a865ee25c4dc2a7e7c11067de4aa1"><enum>(A)</enum><text>to prohibit, restrain, or limit—</text><clause id="id52cf1e0b666e4e66831290208e1bb86b"><enum>(i)</enum><text>the lawful investigation or reporting by the press of any unlawful activity or misconduct alleged to have been committed by an at-risk individual or their immediate family; or</text></clause><clause id="id706b03c34e7a45e6936a3bff373caa0d"><enum>(ii)</enum><text>the reporting on an at-risk individual or their immediate family regarding matters of public concern;</text></clause></subparagraph><subparagraph id="id5cdfa355e6f644468fa46869f9919e2e"><enum>(B)</enum><text>to impair access to decisions and opinions from a Federal judge in the course of carrying out their public functions; or</text></subparagraph><subparagraph id="idf740333b301a470fb3df7086aa265359"><enum>(C)</enum><text>to limit the publication or transfer of personally identifiable information that the at-risk individual or their immediate family member voluntarily publishes on the internet after the date of enactment of this Act.</text></subparagraph></paragraph><paragraph id="id39ea23e21a974fcc8be89bd072feac7b"><enum>(2)</enum><header>Protection of personally identifiable information</header><text>This Act shall be broadly construed to favor the protection of the personally identifiable information of at-risk individuals and their immediate family.</text></paragraph></subsection></section><section id="idc5e6e4cc549f402aa5bd7fcbead79398"><enum>3.</enum><header>Findings</header><text display-inline="no-display-inline">Congress finds the following:</text><paragraph id="idde1a5253064b4145b933133ddf90a559"><enum>(1)</enum><text>Members of the Federal judiciary perform the important function of interpreting our Constitution and administering justice in a fair and impartial manner.</text></paragraph><paragraph id="id9bd7d745bd35430aaf62b099b12f0448"><enum>(2)</enum><text>In recent years, partially as a result of the rise in the use of social media and online access to information, members of the Federal judiciary have been exposed to an increased number of personal threats in connection to their role. The ease of access to free or inexpensive sources of personally identifiable information has considerably lowered the effort required for malicious actors to discover where individuals live, where they spend leisure hours, and to find information about their family members. Such threats have included calling a judge a traitor with references to mass shootings and serial killings, calling for an <quote>angry mob</quote> to gather outside a judge’s home and, in reference to a United States courts of appeals judge, stating how easy it would be to <quote>get them.</quote></text></paragraph><paragraph id="id86ced2fb06cd444eb1c12fb9a68ebd01"><enum>(3)</enum><text>Between 2015 and 2019, threats and other inappropriate communications against Federal judges and other judiciary personnel increased from 926 in 2015 to approximately 4,449 in 2019.</text></paragraph><paragraph id="id77a9def004984c0f9054da3358bc30c2"><enum>(4)</enum><text>Over the past decade, several members of the Federal judiciary have experienced acts of violence against themselves or a family member in connection to their Federal judiciary role, including the murder of the family of United States District Judge for the Northern District of Illinois Joan Lefkow in 2005.</text></paragraph><paragraph id="id6dc44613e1e04e249f9256e99a56c48a"><enum>(5)</enum><text>On Sunday July 19, 2020, an assailant went to the home of Esther Salas, a judge for the United States District Court for the District of New Jersey, impersonating a package delivery driver, opening fire upon arrival, and killing Daniel Anderl, the 20-year-old only son of Judge Salas, and seriously wounding Mark Anderl, her husband.</text></paragraph><paragraph id="id54b4b83a211946ed903b95f6a150a20e"><enum>(6)</enum><text>In the aftermath of the recent tragedy that occurred to Judge Salas and in response to the continuous rise of threats against members of the Federal judiciary, there is an immediate need for enhanced security procedures and increased availability of tools to protect Federal judges and their families.</text></paragraph></section><section id="iddc7db1b5d10d4e9f9c228b0ec41c65e3"><enum>4.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="idae2395633d8c453db368ad0e8806bea5"><enum>(1)</enum><header>At-risk individual</header><text>The term <term>at-risk individual</term> means—</text><subparagraph id="idc199490d111348d4b5d34faaff7d5c36"><enum>(A)</enum><text>a Federal judge; or</text></subparagraph><subparagraph id="id5d767566781b4525a77aeb14ce423c4e"><enum>(B)</enum><text>a senior, recalled, or retired Federal judge</text></subparagraph></paragraph><paragraph id="id52677ace3bb141bfa79b500a4a6e46bd"><enum>(2)</enum><header>Data broker</header><subparagraph id="id8dfa73ab57404a7d83210b41601f84e3"><enum>(A)</enum><header>In general</header><text>The term <term>data broker</term> means a business or commercial entity when it is engaged in collecting, assembling, or maintaining personal information concerning an individual who is not a customer, client, or an employee of that entity in order to sell the information or otherwise profit from providing third party access to the information.</text></subparagraph><subparagraph id="id4748cb8270b04eb3a1754494fb6cd6ec"><enum>(B)</enum><header>Exclusion</header><text>The following activities conducted by a business or commercial entity, and the collection and sale or licensing of personally identifiable information incidental to conducting these activities do not qualify the entity as a data broker:</text><clause id="id8625c25256cc45e4b0b7270a304fe6c1"><enum>(i)</enum><text>Engaging in reporting, news­ga­ther­ing, speaking, or other activities intended to inform the public on matters of public interest or public concern.</text></clause><clause id="id500ff2acd8d341aea8dd71b528de96ca"><enum>(ii)</enum><text>Providing 411 directory assistance or directory information services, including name, address, and telephone number, on behalf of or as a function of a telecommunications carrier.</text></clause><clause id="idff2203e6a1fd43db84fb5a2f4b9fd30f"><enum>(iii)</enum><text>Utilizing personal information internally, providing access to businesses under common ownership or affiliated by corporate control, or selling or providing data for a transaction or service requested by or concerning the individual whose personal information is being transferred.</text></clause><clause id="id18ffc179c8d14e28bc19c7fd0f0cb134"><enum>(iv)</enum><text>Providing publicly available information via real-time or near-real-time alert services for health or safety purposes.</text></clause><clause id="ida97fad8b3bb2400baa757b574088b7a1"><enum>(v)</enum><text>A consumer reporting agency to the extent that it is covered by the Federal Fair Credit Reporting Act (<external-xref legal-doc="usc" parsable-cite="usc/15/1681">15 U.S.C. 1681 et seq.</external-xref>).</text></clause><clause id="id3a4a28ac4e20422982b396c4f5a8f4e2"><enum>(vi)</enum><text>A financial institution to the extent that it is covered by the Gramm-Leach-Bliley Act (<external-xref legal-doc="public-law" parsable-cite="pl/106/102">Public Law 106–102</external-xref>) and implementing regulations.</text></clause><clause id="id3a7a1da950154554a80d645b370b6ac9"><enum>(vii)</enum><text>An entity to the extent that it is covered by the Health Insurance Portability and Accountability Act (<external-xref legal-doc="public-law" parsable-cite="pl/104/191">Public Law 104–191</external-xref>).</text></clause></subparagraph></paragraph><paragraph id="id53656f132a1a48afaaceda9699c0121d"><enum>(3)</enum><header>Federal judge</header><text>The term <term>Federal judge</term> means—</text><subparagraph id="id80964203a92e4b38b4feb2c198b89df8"><enum>(A)</enum><text>a justice or judge of the United States, as those terms are defined in section 451 of title 28, United States Code;</text></subparagraph><subparagraph id="idf6afc5acaf8b440494e86a0b30c531df"><enum>(B)</enum><text>a bankruptcy judge appointed under section 152 of title 28, United States Code;</text></subparagraph><subparagraph id="id9029bda7814946a68cae8804fbe0af58"><enum>(C)</enum><text>a United States magistrate judge appointed under section 631 of title 28, United States Code;</text></subparagraph><subparagraph id="idcfe7c0ece720403dba835a8ae2040964"><enum>(D)</enum><text>a judge confirmed by the United States Senate and empowered by statute in any commonwealth, territory, or possession to perform the duties of a Federal judge; and</text></subparagraph><subparagraph id="ida7bfe6ef38fb4e11b3b4fe3ad0164f6f"><enum>(E)</enum><text>a judge of the United States Court of Federal Claims appointed under section 171 of title 28, United States Code.</text></subparagraph></paragraph><paragraph id="idac0749bff0ed4a5f8d79387a8db60948"><enum>(4)</enum><header>Government agency</header><text>The term <term>Government agency</term> means any department enumerated in section 1 of title 5 of the United States Code, independent establishment, commission, administration, authority, board or bureau of the United States or any corporation in which the United States has a proprietary interest. The term includes all such institutions, offices, and any other bodies politic and corporate of the United States Government created by the constitution or statute, whether in the executive, judicial, or legislative branch; all units and corporate outgrowths created by Executive order of the President or any constitutional officer, by the Supreme Court of the United States, or by resolution of the United States Congress.</text></paragraph><paragraph id="id6c01423c2e474b86bada30026f0e9de5"><enum>(5)</enum><header>Immediate family</header><text>The term <term>immediate family</term> means a spouse, child, parent, or any other familial relative of an at-risk individual whose permanent residence is the same as the at-risk individual.</text></paragraph><paragraph id="idd60b4678a2f643f989802372aae2c0ac"><enum>(6)</enum><header>Personally identifiable information</header><text>The term <term>personally identifiable information</term> means—</text><subparagraph id="idd9c0d50f1d3a4b0094ba24c57c5fe8ba"><enum>(A)</enum><text>a home address, including primary residence or secondary residences;</text></subparagraph><subparagraph id="idc8c287d7f05c4dcaa4d3da834229cc43"><enum>(B)</enum><text>a home or personal mobile telephone number, or the direct telephone number of a Government-issued cell phone or private extension in the chambers of an at-risk individual;</text></subparagraph><subparagraph id="id67928b6f4cd94830a7f0433d0f1798b0"><enum>(C)</enum><text>a personal email address;</text></subparagraph><subparagraph id="id096f08c0857a4352bfa8b67c648fc464"><enum>(D)</enum><text>the social security number, driver’s license number, or home address displayed on voter registration information;</text></subparagraph><subparagraph id="idf1c71fb5220c4cfea5793c3b27a92037"><enum>(E)</enum><text>a bank account or credit or debit card information;</text></subparagraph><subparagraph id="id1d672b49e6e8497fbd02c76b55e73a72"><enum>(F)</enum><text>home or other address displayed on property tax records or held by a Federal, State, or local government agency of an at-risk individual, including a secondary residence and any investment property at which an at-risk individual resides for part of a year;</text></subparagraph><subparagraph id="ida3307c1d6364436b85140bef37335691"><enum>(G)</enum><text>license plate number or home address displayed on vehicle registration information;</text></subparagraph><subparagraph id="ide17bf94ef6114097856e2ad415825a6f"><enum>(H)</enum><text>identification of children of an at-risk individual under the age of 18;</text></subparagraph><subparagraph id="idd31140c76bee43f4b1a55df7f2865f0b"><enum>(I)</enum><text>full date of birth;</text></subparagraph><subparagraph id="id87a7414bd0964095a0a13582d3fc660d"><enum>(J)</enum><text>a photograph of any vehicle that legibly displays the license plate or a photograph of a residence that legibly displays the residence address;</text></subparagraph><subparagraph id="id1b8bef9078184db3b06471c3940dccbe"><enum>(K)</enum><text>the name and address of a school or day care facility attended by immediate family; or</text></subparagraph><subparagraph id="id777ca9f6e99e42b6b64107271399186e"><enum>(L)</enum><text>the name and address of an employer of immediate family.</text></subparagraph></paragraph><paragraph id="id0f51d41c066d4b948b2ccc68e0f82414"><enum>(7)</enum><header>Social media</header><text>The term <term>social media</term> means any online electronic medium, a live-chat system, or an electronic dating service—</text><subparagraph id="id4c8c481f96c24c3195c79a949a5c787d"><enum>(A)</enum><text>that primarily serves as a medium for users to interact with content generated by other third-party users of the medium;</text></subparagraph><subparagraph id="id75272fb504854e8a9f5d5aeae1423df2"><enum>(B)</enum><text>that enables users to create accounts or profiles specific to the medium or to import profiles from another medium; and</text></subparagraph><subparagraph id="id561e73ca45a341a3a1bfe48a76ad7f03"><enum>(C)</enum><text>that enables one or more users to generate content that can be viewed by other third-party users of the medium.</text></subparagraph></paragraph><paragraph id="idc37dce6d41eb4e07b9f8eb64e4c14d46"><enum>(8)</enum><header>Transfer</header><text>The term <term>transfer</term> means to sell, license, trade, or exchange for consideration the personally identifiable information of an at-risk individual or immediate family.</text></paragraph></section><section id="ide508f420e9044fefb80f3b88767f7144"><enum>5.</enum><header>Protecting personally identifiable information in public records</header><subsection id="id599f3c943cc54605b5b7ec7c22bb9b51"><enum>(a)</enum><header>Government agencies</header><paragraph id="idf5b102b698d34707803d30eddaab300f"><enum>(1)</enum><header>In general</header><text>Each at-risk individual may—</text><subparagraph id="id90a22542080f481f860110b7abddbf6a"><enum>(A)</enum><text>file written notice of the status of the individual as an at-risk individual, for themselves and immediate family, to each Government agency; and</text></subparagraph><subparagraph id="id46ce688e63154c5796fff802acfbd5f7"><enum>(B)</enum><text>ask each Government agency described in subparagraph (A) to mark as private their personally identifiable information and that of their immediate family.</text></subparagraph></paragraph><paragraph id="id8c8143d1f62943a9bba9f17dd9eb5249"><enum>(2)</enum><header>No public posting</header><text>Government agencies shall not publicly post or display publicly available content that includes personally identifiable information of an at-risk individual or immediate family. Government agencies, upon receipt of a written request in accordance with subsection (a)(1)(A) of this section, shall remove the personally identifiable information of the at-risk individual or immediate family from publicly available content within 72 hours.</text></paragraph><paragraph id="id8a8d8cee3cad492db365b69f662786ce"><enum>(3)</enum><header>Exceptions</header><text>Nothing in this section shall prohibit a Government agency from providing access to records containing judges’ personally identifiable information to a third party if the third party possesses a signed release from the judge or a court order, the entity is already subject to the requirements of title V of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801 et seq.</external-xref>), or the third party executes a confidentiality agreement with the Government agency.</text></paragraph></subsection><subsection id="id847bdee012444b148cfe709f942e46fd"><enum>(b)</enum><header>State and local governments</header><paragraph id="id75785a11aadd46bf842264c5f48f9574"><enum>(1)</enum><header>Grant program to prevent disclosure of personal information of at-risk individuals or immediate family</header><subparagraph id="id86a92b05cbd74bba82710622f782ca8e"><enum>(A)</enum><header>Authorization</header><text>The Attorney General shall make grants to prevent the release of personally identifiable information of at-risk individuals and immediate family (in this subsection referred to as <quote>judges’ personally identifiable information</quote>) to the detriment of such individuals or their families to an entity that—</text><clause id="id582cc1fb3ca34fc9b9cb62b832e86025"><enum>(i)</enum><text>is—</text><subclause id="idd66fd19b40894ad9ad880f890d12ea13"><enum>(I)</enum><text>a State or unit of local government (as such terms are defined in section 901 of the Omnibus Crime Control and Safe Streets Act of 1968 (<external-xref legal-doc="usc" parsable-cite="usc/34/10251">34 U.S.C. 10251</external-xref>)); or</text></subclause><subclause id="idfb1362ce9a484bfaa50538062884c885"><enum>(II)</enum><text>an agency of a State or unit of local government; and</text></subclause></clause><clause id="id5f8742e082b84189b2e447c3095d6151"><enum>(ii)</enum><text>operates a State or local database or registry that contains personally identifiable information.</text></clause></subparagraph><subparagraph id="ide0eab6b6f48448c294dffdd737cb6bca"><enum>(B)</enum><header>Application</header><text>An eligible entity seeking a grant under this section shall submit to the Attorney General an application at such time, in such manner, and containing such information as the Attorney General may reasonably require.</text></subparagraph></paragraph><paragraph id="id719f9dc67eb7484ba47ec681021410fe"><enum>(2)</enum><header>Authorization of appropriations</header><text>There is authorized to be appropriated such sums as may be necessary to provide grants to entities described in paragraph (1) to create or expand programs designed to protect judges’ personally identifiable information, including through—</text><subparagraph id="id544d8e0b7fe9438e802edd8c238ed7e6"><enum>(A)</enum><text>the creation of programs to redact or remove judges’ personally identifiable information, upon the request of an at-risk individual, from public records in state agencies; these efforts may include but are not limited to hiring a third party to redact or remove judges’ personally identifiable information from public records;</text></subparagraph><subparagraph id="id393487bbd83c44c9880a2a35780bbe40"><enum>(B)</enum><text>the expansion of existing programs that the State may have enacted in an effort to protect judges’ personally identifiable information;</text></subparagraph><subparagraph id="idab4cfa511f8e456481dbff0389eef126"><enum>(C)</enum><text>the development or improvement of protocols, procedures, and policies to prevent the release of judges’ personally identifiable information;</text></subparagraph><subparagraph id="id6516fabc2c314739b955b537aa502a6b"><enum>(D)</enum><text>the defrayment of costs of modifying or improving existing databases and registries to ensure that judges’ personally identifiable information is protected from release; and</text></subparagraph><subparagraph id="id6a816e8c966f42e39d7eaab1d3577aab"><enum>(E)</enum><text>the development of confidential opt out systems that will enable at-risk individuals to make a single request to keep judges’ personally identifiable information out of multiple databases or registries.</text></subparagraph></paragraph><paragraph id="id0d6b4bd5931f40f79328c47cdaa6147f"><enum>(3)</enum><header>Report</header><subparagraph id="id1bb0ca1962fa4035ad7029bdedc31592"><enum>(A)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act, and biennially thereafter, the Comptroller General of the United States, shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives an annual report that includes—</text><clause id="id4db9dd7739e14443869334d8edeac65c"><enum>(i)</enum><text>a detailed amount spent by States and local governments on protection of judges’ personally identifiable information; and</text></clause><clause id="id02290d60cd1e442db07f397bb2c65050"><enum>(ii)</enum><text>where the judges’ personally identifiable information was found.</text></clause></subparagraph><subparagraph id="id51b6f14ccda44706935dcbb3770025bb"><enum>(B)</enum><header>States and local governments</header><text>States and local governments that receive funds under this section shall submit to the Comptroller General a report on data described in clauses (i) and (ii) of subparagraph (A) to be included in the report required under that subparagraph.</text></subparagraph></paragraph></subsection><subsection id="idc6210f11cf2c4b6881ba20507d0a20e5"><enum>(c)</enum><header>Data brokers and other businesses</header><paragraph id="id9592fb5e6f7441ffba32ce273ab58f2d"><enum>(1)</enum><header>Prohibition</header><subparagraph id="id9930930845bd4441a00ae5c92f6c8d70"><enum>(A)</enum><header>Data brokers</header><text>It shall be unlawful for a data broker to knowingly sell, license, trade for consideration, or purchase personally identifiable information of an at-risk individual or immediate family.</text></subparagraph><subparagraph id="idd2241b7c862542e6ae643bf5a61c4e14"><enum>(B)</enum><header>Other businesses</header><text>No person, business, or association shall publicly post or publicly display on the internet personally identifiable information of an at-risk individual or immediate family if the at-risk individual has made a written request of that person, business, or association to not disclose the personally identifiable information of the at-risk individual or immediate family.</text></subparagraph><subparagraph id="ide97d952a0dc342f0adf956a40c813f3e"><enum>(C)</enum><header>Exceptions</header><text>The restriction in subparagraph (B) shall not apply to—</text><clause id="id27f24fae841b4170ab128a6b3e01be4c"><enum>(i)</enum><text>the display on the internet of the personally identifiable information of an at-risk individual or immediate family if the information is relevant to and displayed as part of a news story, commentary, editorial, or other speech on a matter of public concern;</text></clause><clause id="idaae636612d8147f2bd34936c73a870d3"><enum>(ii)</enum><text>personally identifiable information that the at-risk individual voluntarily publishes on the internet after the date of enactment of this Act; or</text></clause><clause id="id9cf8577b4323436bb767410ecb856585"><enum>(iii)</enum><text>personally identifiable information received from a Federal Government source (or from an employee or agent of the Federal Government). </text></clause></subparagraph></paragraph><paragraph id="id4bdd9c4f5c3846b8b1757cc97f5c2191"><enum>(2)</enum><header>Required conduct</header><subparagraph id="iddfa6b1d12b734d088dbbad353b53020d"><enum>(A)</enum><header>In general</header><text>After a person, business, or association has received a written request from an at-risk individual to protect personally identifiable information of the at-risk individual or immediate family, that person, business, or association shall—</text><clause id="id5AEA6FC5B1624C57AB1B4361C7C3A8A2"><enum>(i)</enum><text>remove within 72 hours the personally identifiable information from the internet and ensure that the information is not made available on any website or subsidiary website controlled by that person, business, or association; and</text></clause><clause id="id2CC13E9E5F1548AA9A43395E1CFFEF35"><enum>(ii)</enum><text>ensure that the personally identifiable information of the at-risk individual or immediate family is not made available on any website or subsidiary website controlled by that person, business, or association. </text></clause></subparagraph><subparagraph id="idd1806c2ceca245b5897ab198e482739d"><enum>(B)</enum><header>Transfer</header><text>After receiving an at-risk individual’s written request, no person, business, or association shall transfer the personally identifiable information of the at-risk individual or immediate family to any other person, business, or association through any medium, except where the at-risk individual’s or immediate family member’s personally identifiable information is relevant to and displayed as part of a news story, commentary, editorial, or other speech on a matter of public concern. The restriction on transfer shall also not apply to personally identifiable information that the at-risk individual or immediate family voluntarily publishes on the internet after the date of enactment of this Act.</text></subparagraph></paragraph></subsection><subsection id="id7e0236dd69d44c0aba0bb1fed201b2fd"><enum>(d)</enum><header>Delegation of authority</header><paragraph id="id00be633757fb44ce98b31d6a0052b6b6"><enum>(1)</enum><header>In general</header><text>Upon written request of the at-risk individual, the Director of the Administrative Office of the United States Courts is authorized to make any notice or request required or authorized by this section on behalf of the at-risk individual. The Director may delegate this authority under section 602(d) of title 28, United States Code. Any notice or request made under this subsection shall be deemed to have been made by the at-risk individual and compliant with the notice and request requirements of this section.</text></paragraph><paragraph id="idf38098a6f58445a7a16de9ffbdcec683"><enum>(2)</enum><header>List</header><text>In lieu of individual notices or requests, the Director may provide Government agencies, State and local governments, data brokers, persons, businesses, or associations with a list of at-risk individuals and their immediate family for the purpose of maintaining compliance with this section. Such list shall be deemed to comply with individual notice and request requirements of this section.</text></paragraph></subsection><subsection id="id1ab0960ad30b4dc69598af3b0d31f876"><enum>(e)</enum><header>Redress and penalties</header><paragraph id="id9b74409765524a69ba79e2d84cb74b8e"><enum>(1)</enum><header>In general</header><text>An at-risk individual or immediate family member whose personally identifiable information is made public as a result of a violation of this Act may bring an action seeking injunctive or declaratory relief in any court of competent jurisdiction. If the court grants injunctive or declaratory relief, the person, business, or association responsible for the violation shall be required to pay the at-risk individual’s or immediate family member’s costs and reasonable attorney’s fees.</text></paragraph><paragraph id="idecb27219fa5947cfa7fc91815866b3a5"><enum>(2)</enum><header>Penalties and damages</header><text>Upon a knowing and willful violation of any order granting injunctive or declarative relief obtained pursuant to this subsection, the court issuing such order may—</text><subparagraph id="id3166E09B315B4F4D83415D45BAA9CAF2"><enum>(A)</enum><text>if the violator is a public entity, impose a fine not exceeding $4,000 and require the payment of court costs and reasonable attorney's fees;</text></subparagraph><subparagraph id="idA191300B7DF24E49B184EDF55350F4DE"><enum>(B)</enum><text>if the violator is a person, business, association, or private agency, award damages to the affected at-risk individual or immediate family in an amount up to a maximum of 3 times the actual damages, but not less than $10,000, and require the payment of court costs and reasonable attorney's fees.</text></subparagraph></paragraph></subsection></section><section id="id411cc1b8a7f74db2b83a90d6d51fbdeb"><enum>6.</enum><header>Training and education</header><text display-inline="no-display-inline">There is authorized to be appropriated to the Federal judiciary such sums as may be necessary for biannual judicial security training for active, senior, or recalled Federal judges and their immediate family, including—</text><paragraph id="idf1e857c495094333b50f84c761a4163d"><enum>(1)</enum><text>best practices for using social media and other forms of online engagement and for maintaining online privacy;</text></paragraph><paragraph id="id62232e7cf23a4cf59a0f1c710601176b"><enum>(2)</enum><text>home security program and maintenance;</text></paragraph><paragraph id="id6559a698976e448691d3ca443ee8dce5"><enum>(3)</enum><text>understanding removal programs and requirements for personally identifiable information;</text></paragraph><paragraph id="idcc272e1e14224357a37c42d81e4e688a"><enum>(4)</enum><text>any other judicial security training that the United States Marshals Services and the Administrative Office of the United States Courts determines is relevant.</text></paragraph></section><section id="id260d738536374d4bbd6d607a2b22036d"><enum>7.</enum><header>Vulnerability management capability</header><subsection id="id2c2bbba5c44f48219f7e04038bf261f6"><enum>(a)</enum><header>Authorization</header><paragraph id="id71af4ba9fe634f508d1751e3931ba6bf"><enum>(1)</enum><header>Vulnerability management capability</header><text>The Federal judiciary is authorized to perform all necessary functions consistent with the provisions of this Act, and to support existing threat management capabilities within the United States Marshals Service and other relevant Federal law enforcement and security agencies. Such functions may include—</text><subparagraph id="id170b74205c2342619b1d59410a23636d"><enum>(A)</enum><text>monitor the protection of at-risk individuals and judiciary assets;</text></subparagraph><subparagraph id="id3c695b9c1afd44fb82dab3358d81749b"><enum>(B)</enum><text>manage the monitoring of websites for personally identifiable information of at-risk individuals or immediate family and remove or limit the publication of such information; and </text></subparagraph><subparagraph id="id86dc0639e7de462da9ec169525e24d8b"><enum>(C)</enum><text>receive, review, and analyze complaints by at-risk individuals of threats, whether direct or indirect, and report to law enforcement partners.</text></subparagraph></paragraph><paragraph id="id5f47d6f8a50b412b9f33d2c5cf96f8be"><enum>(2)</enum><header>Technical and conforming amendment</header><text>Section 604(a) of title 28, United States Code is amended—</text><subparagraph id="idEE82C5F7BEB54081B759EF09DD885C27"><enum>(A)</enum><text>in paragraph (23), by striking <quote>and</quote> at the end;</text></subparagraph><subparagraph id="id9074FAA0DB5C40239F2AF3FA05BE7A1E"><enum>(B)</enum><text>by redesignating paragraph (24) as paragraph (25);</text></subparagraph><subparagraph id="id84861D7CFB96442A805E3FD4D2F2246B"><enum>(C)</enum><text>by inserting after paragraph 23 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id97CACFD73BF4471EAF8DA36174B01083"><paragraph id="idBFAE63F3E18849BA8A9331C5A5CCECAB"><enum>(24)</enum><text>Establish and administer a vulnerability management program in the judicial branch; and</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="idc79b64dfe6d248a2afbb0dffe99bd3e2"><enum>(b)</enum><header>Expansion of capabilities of office of protective intelligence</header><text>There is authorized to be appropriated such sums as may be necessary to the United States Marshals Service to expand the current capabilities of the Office of Protective Intelligence of the Judicial Security Division to increase the workforce of the Office of Protective Intelligence to include additional intelligence analysts, United States deputy marshals, and any other relevant personnel to ensure that the Office of Protective Intelligence is ready and able to perform all necessary functions, consistent with the provisions of this Act, in order to anticipate and deter threats to the judiciary, including—</text><paragraph id="idd3d4d73902a84627a24f2959ed00f856"><enum>(1)</enum><text>assigning personnel to State and major urban area fusion and intelligence centers for the specific purpose of identifying potential threats against the judiciary, and coordination of responses to potential threats.</text></paragraph><paragraph id="id72f1e5803a5940a3b39791fd9063e70c"><enum>(2)</enum><text>expanding the use of investigative analysts, physical security specialists, and intelligence analysts at the 94 judicial districts and territories to enhance the management of local and distant threats and investigations; and</text></paragraph><paragraph id="id0979d3ec2a88469c83de0febd5f9e20b"><enum>(3)</enum><text>increasing the number of United States Marshal Service personnel for the protection of the judicial function and assigned to protective operations and details for the judiciary.</text></paragraph></subsection><subsection id="idb64cdeb93f72449581a4c8a670188c8f"><enum>(c)</enum><header>Report</header><paragraph id="id0adf3853c9dd463dac8f9e0d198a0058"><enum>(1)</enum><header>In general</header><text>Not later than one year after the date of enactment of this Act, the Department of Justice, in consultation with the Administrative Office of the United States Courts, shall submit to the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives a report on the security of Federal judges arising from the Federal prosecutions and civil litigation.</text></paragraph><paragraph id="iddc2ea3659cfa4307a3c4fd992d966aa8"><enum>(2)</enum><header>Description</header><text>The report required under paragraph (1) shall describe—</text><subparagraph id="id44173a64c32a4ab98665bf90992ea4e4"><enum>(A)</enum><text>the number and nature of threats and assaults against at-risk individuals handling prosecutions and other matters described in paragraph (1) and the reporting requirements and methods;</text></subparagraph><subparagraph id="id6da568b66f3d4c319e37c2080c1ebe00"><enum>(B)</enum><text>the security measures that are in place to protect the at-risk individuals handling prosecutions described in paragraph (1), including threat assessments, response procedures, availability of security systems and other devices, firearms licensing such as deputations, and other measures designed to protect the at-risk individuals and immediate family of an at-risk individual; and</text></subparagraph><subparagraph id="idd9d8de5812ee41c5bc61d28ba24a8948"><enum>(C)</enum><text>for each requirement, measure, or policy described in subparagraphs (A) and (B), when the requirement, measure, or policy was developed and who was responsible for developing and implementing the requirement, measure, or policy.</text></subparagraph></paragraph></subsection></section><section id="id76fcb99f3ca749d9bd8b5bc2134c2c36"><enum>8.</enum><header>Severability</header><text display-inline="no-display-inline">If any provision of this Act or the application of such provision to any person or circumstance is held to be unconstitutional, the remainder of this Act and the application of such provision to any person or circumstance shall not be affected thereby.</text></section><section id="id3255a46e2343401e934599549f218272"><enum>9.</enum><header>Effective date</header><text display-inline="no-display-inline">This Act shall take effect upon the date of enactment of this Act, except for subsections (b)(1), (c), and (e) of section 5, which shall take effect on the date that is 120 days after the date of enactment of this Act.</text></section></legis-body></bill> 

