<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MUR21195-FDY-TY-PSH"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S3065 IS: Digital Accountability and Transparency to Advance Privacy Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-10-26</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 3065</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20211026">October 26, 2021</action-date><action-desc><sponsor name-id="S385">Ms. Cortez Masto</sponsor> introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To establish national data privacy standards in the United States, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="id3F64C14386E84AD1BD58C01E0790ED6B"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Digital Accountability and Transparency to Advance Privacy Act</short-title></quote> or the <quote><short-title>DATA Privacy Act</short-title></quote>.</text></section><section id="id987552233a2844899bb7e5725dc6eb4d"><enum>2.</enum><header>Definitions</header><subsection id="id30cb37bfce7545b4924160e3757ec9a1"><enum>(a)</enum><header>In general</header><text>In this Act:</text><paragraph id="id5734c1226445427c83480fb9e73dcb2a"><enum>(1)</enum><header>Collect</header><text>The term <term>collect</term> means taking any operation or set of operations to obtain covered data, including by automated means, including purchasing, leasing, assembling, recording, gathering, acquiring, or procuring.</text></paragraph><paragraph id="idf112d203c8e446fd804afb1b50f68120"><enum>(2)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph id="id9580ebf43fff488eb1528da8ec5c9a4c"><enum>(3)</enum><header>Covered data</header><text>The term <term>covered data</term>—</text><subparagraph id="id18916f3e91274462abf36bc23c0193ad"><enum>(A)</enum><text>means any information that is—</text><clause id="id83ece602303541fd8ead9fb6bd250497"><enum>(i)</enum><text>collected, processed, stored, or disclosed by a covered entity;</text></clause><clause id="ida6b71926f96342349653d64b6c88c96e"><enum>(ii)</enum><text>collected over the internet or other digital network; and</text></clause><clause id="idb72dade2127542a98190ce0f3fa9d257"><enum>(iii)</enum><subclause commented="no" display-inline="yes-display-inline" id="id9AB06F51CBA44A29AD5B9EC5FA7F165B"><enum>(I)</enum><text>linked to an individual or device associated with an individual; or</text></subclause><subclause id="id39333591E1484EBFAFE1BF2C8E3CD736" indent="up1"><enum>(II)</enum><text>practicably linkable to an individual or device associated with an individual, including by combination with separate information, by the covered entity or any potential recipient of the data; and</text></subclause></clause></subparagraph><subparagraph id="idDCBC9F8B78FD4DB4A7B3B200038DEF09"><enum>(B)</enum><text>does not include data that is—</text><clause id="id05bfb29f91614b1a9e2203fd42a6edb5"><enum>(i)</enum><text>collected, processed, stored, or disclosed solely for the purpose of employment of an individual; or</text></clause><clause id="id5e21d03f829145f0a99ea8b4004875a2"><enum>(ii)</enum><text>lawfully made available to the public from Federal, State, or local government records.</text></clause></subparagraph></paragraph><paragraph id="id7df5896d31874a1da4cb8ab9214b77e5"><enum>(4)</enum><header>Covered entity</header><text>The term <term>covered entity</term>—</text><subparagraph id="id6aa21fccb1d44b14bdb04fffcd5f3a17"><enum>(A)</enum><text>means any entity that collects, processes, stores, or discloses covered data; and</text></subparagraph><subparagraph id="id1e7e1450453e4321bb5feda6bd426f7a"><enum>(B)</enum><text>does not include any entity that collects, processes, stores, or discloses covered data relating to fewer than 50,000 individuals and devices during any 12-month period.</text></subparagraph></paragraph><paragraph id="id84507e368d0f47c28dfa7f986263d4f0"><enum>(5)</enum><header>Disclose</header><text>The term <term>disclose</term> means taking any action with respect to covered data, including by automated means, to sell, share, provide, or otherwise transfer covered data to another entity, person, or the general public.</text></paragraph><paragraph id="id43fde61f2df24f9b8b09acc4df13e69a"><enum>(6)</enum><header>Privacy enhancing technology</header><text>The term <term>privacy enhancing technology</term>—</text><subparagraph id="ida48472d6328f48cbb5c84032fae80bc4"><enum>(A)</enum><text>means any software solution, technical processes, or other technological means of enhancing the privacy and confidentiality of an individual’s covered data in data or sets of data; and</text></subparagraph><subparagraph id="idc824926f9f964e1ebae3481e5a4dae3b"><enum>(B)</enum><text>includes anonymization and pseu­do­ny­mi­za­tion techniques, filtering tools, anti-tracking technology, differential privacy tools, synthetic data, and secure multi-party computation. </text></subparagraph></paragraph><paragraph id="id18c4521983844296abed026ad760738b"><enum>(7)</enum><header>Privacy risk</header><text>The term <term>privacy risk</term> means potential harm to an individual resulting from the collection, processing, storage, or disclosure of covered data, including—</text><subparagraph id="id8cf9fa1962974b54b2c66b202472412e"><enum>(A)</enum><text>direct or indirect financial loss;</text></subparagraph><subparagraph id="id8708a452beab4e56a6992c021a3c34d2"><enum>(B)</enum><text>stigmatization or reputational harm;</text></subparagraph><subparagraph id="idcfbcb6cdcd6c4068bcac4731faeef4a0"><enum>(C)</enum><text>anxiety, embarrassment, fear, and other severe emotional trauma;</text></subparagraph><subparagraph id="idb0e1aa554f2e465c927d8bc22f330fcd"><enum>(D)</enum><text>loss of economic opportunity; or</text></subparagraph><subparagraph id="id88520f999ae64ee090b21d874078fbb2"><enum>(E)</enum><text>physical harm.</text></subparagraph></paragraph><paragraph id="id18868657afce4653871169949d542cb3"><enum>(8)</enum><header>Process</header><text>The term <term>process</term> means any operation or set of operations that is performed on covered data or on sets of covered data, including by automated means, including organizing, combining, adapting, altering, using, or transforming.</text></paragraph><paragraph id="idb3548709b7dc4a59a0ad7d7b3cfa0a9a"><enum>(9)</enum><header>Protected characteristic</header><text>The term <term>protected characteristic</term> means an individual’s race, sex, gender, sexual orientation, nationality, religious belief, age, or disability status.</text></paragraph><paragraph id="id7510ea70932d453481df3567ae02686d"><enum>(10)</enum><header>Pseudonymous data</header><text>The term <term>pseudonymous data</term> means covered data that may only be linked to the identity of an individual or the identity of a device associated with an individual if combined with separate information.</text></paragraph><paragraph id="idc4e73fa171974020aedbe42cbaca575d"><enum>(11)</enum><header>Reasonable interest</header><text>The term <term>reasonable interest</term> means—</text><subparagraph id="idB2DFBFA117924B9B939D33B0962BF74A"><enum>(A)</enum><text>a compelling business, operational, administrative, legal, or educational justification for the collection, processing, storage, or disclosure of covered data exists; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8C08B4239D4C471580B7B3283C9F30C5"><enum>(B)</enum><text>the interest does not subject the individual linked to the covered data to an unreasonable privacy risk.</text></subparagraph></paragraph><paragraph id="id41f7bef84a904c03b8fcae113bee52f1"><enum>(12)</enum><header>Sensitive data</header><text>The term <term>sensitive data</term> means any covered data relating to—</text><subparagraph id="id0c85092d62dc45c39aeedeec9c6fe783"><enum>(A)</enum><text>the health, biologic, physiologic, biometric, sexual life, or genetic information of an individual; or</text></subparagraph><subparagraph id="idebab82a0cf1a4ccf95efb1d841b49f79"><enum>(B)</enum><text>the precise geolocation information of a device associated with an individual.</text></subparagraph></paragraph><paragraph id="id99FCCDB746134A54BB97EB61015169C7"><enum>(13)</enum><header>Store</header><text>The term <term>store</term> means any operation or set of operations to continue possession of covered data, including by automated means.</text></paragraph><paragraph id="idcd649b06e18846ebbaa1f5cae5b0cc32"><enum>(14)</enum><header>Third party service provider</header><text>The term <term>third party service provider</term> means any covered entity that collects, processes, stores, or discloses covered data at the direction of, and for the sole benefit of, another covered entity under a contract.</text></paragraph></subsection><subsection id="id94e6a270746b44a9996c616ecfa5916f"><enum>(b)</enum><header>Modified definition by rulemaking</header><text>If the Commission determines that a term defined in paragraph (10) or (12) is not sufficient to protect an individual’s data privacy, the Commission may promulgate regulations under section 553 of title 5, United States Code, to modify the definition as the Commission considers appropriate.</text></subsection></section><section id="id4c5a7f40a79348a3a3ed64f7017eb6ef"><enum>3.</enum><header>Required privacy notice</header><subsection id="idbf50f506138b4d47bd66dcde42fd165d"><enum>(a)</enum><header>Privacy notice</header><text>Each covered entity shall post in an accessible location a notice that is concise, in context, in easily understandable language, accurate, clear, timely, updated, uses visualizations where appropriate, conspicuous, and free of charge regarding the covered entity’s privacy practices.</text></subsection><subsection id="id5decb19e781a4d8baba995f6b08205de"><enum>(b)</enum><header>Contents of notice</header><text>The notice required by subsection (a) shall include—</text><paragraph id="id9aa3e58452d84a09afeef6863064b0a3"><enum>(1)</enum><text>a description of the covered data that the entity collects, processes, stores, and discloses, including the sources that provided the covered data if the covered entity did not collect the covered data from the individual;</text></paragraph><paragraph id="idb6d13ba86a824c3b81f9d1ccec5c6dfe"><enum>(2)</enum><text>the purposes for and means by which the entity collects, processes, and stores the covered data;</text></paragraph><paragraph id="idce038d54342c45e7b2ae17b93893c0f4"><enum>(3)</enum><text>the persons and entities to whom, and purposes for which, the covered entity discloses the covered data; and</text></paragraph><paragraph id="id186c0ba7f61e42f38366c70ec074c1f0"><enum>(4)</enum><text>a conspicuous, clear, and understandable means for individuals to access the methods necessary to exercise their rights under sections 4 and 5.</text></paragraph></subsection></section><section id="id60AD7B501BFF4421A82D1ED67D212D88"><enum>4.</enum><header>Required data practices</header><subsection id="id53ba01d8eec249c5803a872c497ceafe"><enum>(a)</enum><header>Regulations</header><text>Not later than 1 year after the date of the enactment of this Act, the Commission shall promulgate regulations under section 553 of title 5, United States Code, that require covered entities to implement, practice, and maintain certain data procedures and processes that meet the following requirements:</text><paragraph id="ide5e1fdcdf1b8442d84f9a786957ef41e"><enum>(1)</enum><header>Minimum data processing requirements</header><text>Except as provided in subsection (b), require covered entities to meet all of the following requirements regarding the means by and purposes for which covered data is collected, processed, stored, and disclosed:</text><subparagraph id="id02f38d4660d9492391e621880e5b3b04"><enum>(A)</enum><header>Reasonable</header><clause id="id2AFE68F94CF24FB095DC98C53DA71A6A"><enum>(i)</enum><header>In general</header><text>Except as provided in paragraph (3), covered data collection, processing, storage, and disclosure practices must meet a reasonable interest of the covered entity, including—</text><subclause id="idc719c26f604c49cfbbb8fd21e38fafd0"><enum>(I)</enum><text>business, educational, and administrative operations that are relevant and appropriate to the context of the relationship between the covered entity and the individual linked to the covered data;</text></subclause><subclause id="idc3cd838c150d47eda6dacfca334db8eb"><enum>(II)</enum><text>relevant and appropriate product and service development and enhancement;</text></subclause><subclause id="idb4c2b5b3a2c0424080ea2c187b5cbb6c"><enum>(III)</enum><text>preventing and detecting abuse, fraud, and other criminal activity;</text></subclause><subclause id="id3b8f1d8bb65a489d88cf5bcd39261f43"><enum>(IV)</enum><text>reasonable communications and marketing practices that follow best practices, rules, and ethical standards;</text></subclause><subclause id="id046cbb4f3d7f4483a9a0c3f2c3c4aa5d"><enum>(V)</enum><text>engaging in scientific, medical, or statistical research that follows commonly accepted ethical standards; or</text></subclause><subclause id="idd7af598aeba2485ca8480f19718de139"><enum>(VI)</enum><text>any other purpose for which the Commission considers to be reasonable.</text></subclause></clause><clause id="idFCCAE9D369774541970C0AD29CF407CE"><enum>(ii)</enum><header>Considerations</header><text>In promulgating regulations in accordance with this subparagraph, the Commission shall consider—</text><subclause id="id8102DFF7137D4C318DAD8635812D6ACD"><enum>(I)</enum><text>the role of impact assessments in determining the privacy risk for high-risk processing;</text></subclause><subclause id="idB4EDA702746646308796516F5C928B99"><enum>(II)</enum><text>the sensitivity of the covered data; and</text></subclause><subclause id="id293FC3B710414389B646C25CA28F3B5D"><enum>(III)</enum><text>the impact of such regulations on small business.</text></subclause></clause></subparagraph><subparagraph id="id365db66c14a74f1db53ba3a3e4f20029"><enum>(B)</enum><header>Equitable</header><clause id="id1A77A4C687FA4F3BBF00661A7826365E"><enum>(i)</enum><header>In general</header><text>Covered data collection, processing, storage, and disclosure practices may not be for purposes that result in discrimination against a protected characteristic, including—</text><subclause id="id6CA4AD23049D4ABFB531AC81053593A4"><enum>(I)</enum><text>discriminatory targeted advertising practices;</text></subclause><subclause id="ide708347ecf1b480ea6ca70663535275f"><enum>(II)</enum><text>price, service, or employment opportunity discrimination; or</text></subclause><subclause id="id7cabc1add9ab429aa8b463438502831b"><enum>(III)</enum><text>any other practice the Commission considers likely to result in discrimination against a protected characteristic.</text></subclause></clause><clause id="id6A90E5181BF2482AAB0D3B5E43EE864B"><enum>(ii)</enum><header>Considerations</header><text>In promulgating regulations in accordance with this subparagraph, the Commission shall consider—</text><subclause id="id300DCBD088A5420B8ABC80717D64EE7A"><enum>(I)</enum><text>established civil rights laws, common law, and existing relevant consent decrees;</text></subclause><subclause id="id927824D37463450D87F605C497FBB857"><enum>(II)</enum><text>the existing economic models and technology available in the digital advertising system;</text></subclause><subclause id="idA229D55BAC97409393F1E82D98D33527"><enum>(III)</enum><text>the role of algorithms and impact assessments; and</text></subclause><subclause id="idD481E54311824C61BC3500C5D4A6F7D6"><enum>(IV)</enum><text>the impact of such regulations on small businesses.</text></subclause></clause></subparagraph><subparagraph id="id188f1e10ca0346fdb02c624c43609577"><enum>(C)</enum><header>Forthright</header><clause id="id6DE3E96B70F8423EBBFF72C387FF81C6"><enum>(i)</enum><header>In general</header><text>Covered data collection, processing, storage, and disclosure practices may not be accomplished with means or for purposes that are deceptive, including—</text><subclause id="id056f6cf9d4a04796a1d763e35e26af35"><enum>(I)</enum><text>the use of inconspicuous recording or tracking devices and methods;</text></subclause><subclause id="id092c668e88a949d98d818b00a26b30af"><enum>(II)</enum><text>the disclosure of covered data that a reasonable individual believes to be the content of a private communication with another party or parties;</text></subclause><subclause id="id3dc782178c784d2285a52b775292dc68"><enum>(III)</enum><text>notices, interfaces, or other representations likely to mislead consumers; or</text></subclause><subclause id="id7788a63032c843e39fd61501c97764b5"><enum>(IV)</enum><text>any other practice that the Commission considers likely to mislead individuals regarding the purposes for and means by which covered data is collected, processed, stored, or disclosed.</text></subclause></clause><clause id="id34B55D43C9FC40B59E585628559B782A"><enum>(ii)</enum><header>Considerations</header><text>In promulgating regulations in accordance with this subparagraph, the Commission shall consider—</text><subclause id="id349D83BFE24D4727BBBE597D0E7089A1"><enum>(I)</enum><text>existing relevant consent decrees;</text></subclause><subclause id="idECA5092EEB1841DF8E9A9326238F3779"><enum>(II)</enum><text>the reasonable expectations of consumers;</text></subclause><subclause id="id92710EF3BD724AFE9D73A48594F00A14"><enum>(III)</enum><text>research on deceptive practices;</text></subclause><subclause id="id432BF66A59124F6D94A698CF76468D8B"><enum>(IV)</enum><text>the role of deceptive user interfaces; and </text></subclause><subclause id="id90647AD56AFA4B0B92E579734C4D7CE1"><enum>(V)</enum><text>the impact of such regulations on small businesses. </text></subclause></clause></subparagraph></paragraph><paragraph id="idd44a0a6d4f5342e78efacada2e2f501e"><enum>(2)</enum><header>Requirements for opt-out consent</header><text>Except as provided in subsection (b), require covered entities to provide individuals with conspicuous access to a method that is in easily understandable language, concise, accurate, clear, to opt-out of any collection, processing, storage, or disclosure of covered data linked to the individual.</text></paragraph><paragraph id="id59ceaca400fc483d87a83fdef60d1060"><enum>(3)</enum><header>Requirements for affirmative consent</header><text>Except as provided in subsection (b), require covered entities to provide individuals with a notice that is concise, in easily understandable language, accurate, clear, timely, and conspicuous to express affirmative, opt in consent—</text><subparagraph id="id467796336bb64098b73d38fc208b6e14"><enum>(A)</enum><text>before the covered entity collects or discloses sensitive data linked to the individual; or</text></subparagraph><subparagraph id="idb3d8c0528f414e19b1e0e8c7e61f59b9"><enum>(B)</enum><text>before the covered entity collects, processes, stores, or discloses data for purposes which are outside the context of the relationship of the covered entity with the individual linked to the data, including—</text><clause id="id9c9e7af9de8c43e8af5769a9c4bbab11"><enum>(i)</enum><text>the use of covered data beyond what is necessary to provide, improve, or market a good or service that the individual requests;</text></clause><clause id="id76c19c0ef2c04c098310fc9ab7270375"><enum>(ii)</enum><text>the processing or disclosure of covered data differs in material ways from the purposes described in the privacy policy that was in effect when the data was collected; and</text></clause><clause id="id440a445e95c34deea91eb2d82bdcf71a"><enum>(iii)</enum><text>any other purpose that Commission considers outside of context.</text></clause></subparagraph></paragraph><paragraph id="id122e744051404335b4b922529d56e175"><enum>(4)</enum><header>Data minimization requirements</header><text>Except as provided in subsection (b), require covered entities to—</text><subparagraph id="id6a786405663247a894485b285013ce43"><enum>(A)</enum><text>take reasonable measures to limit the collection, processing, storage, and disclosure of covered data to the amount that is necessary to carry out the purposes for which the data is collected; and</text></subparagraph><subparagraph id="id45ca74c3e9654e0d8020bd79f84c299e"><enum>(B)</enum><text>store covered data only as long as is reasonably necessary to carry out the purposes for which the data was collected.</text></subparagraph></paragraph></subsection><subsection id="id792feb6219a044b08cb1d121ad0dfa73"><enum>(b)</enum><header>Exemptions</header><text>Subsection (a) shall not apply if the limitations on the collection, processing, storage, or disclosure of covered data would—</text><paragraph id="id3cea8bbbbb6348d3803507f8a28301bd"><enum>(1)</enum><text>inhibit detection or prevention of a security risk or incident;</text></paragraph><paragraph id="id22f0235763c047ffa2d0492b7e504d33"><enum>(2)</enum><text>risk the health, safety, or property of the covered entity or individual; or</text></paragraph><paragraph id="id32b5de84fb7547e892823157acc4c6db"><enum>(3)</enum><text>prevent compliance with an applicable law (including regulations) or legal process.</text></paragraph></subsection></section><section id="id27acb33ba06c4f9c8181a41d96665190"><enum>5.</enum><header>Individual control over data use</header><subsection id="id1a79e960b08246ca98205608220790f9"><enum>(a)</enum><header>Regulations</header><text>Not later than 1 year after the date of the enactment of this Act, the Commission shall promulgate regulations under section 553 of title 5, United States Code, to require covered entities to provide conspicuous, understandable, clear, and free of charge method to—</text><paragraph id="id66014fc068084bea818a0757b5ee5eb1"><enum>(1)</enum><text>upon the request of an individual, provide the individual with access to, or an accurate representation of, covered data linked to with the individual or the individual’s device stored by the covered entity;</text></paragraph><paragraph id="id01e4885a6a8d40a0a8d1bd0c679dded9"><enum>(2)</enum><text>upon the request of an individual, provide the individual with a means to dispute and resolve the accuracy or completeness of the covered data linked to the individual or the individual’s device stored by the entity;</text></paragraph><paragraph id="id6630ddfaa7f248b7a4e1607b448a77b6"><enum>(3)</enum><text>upon the request of an individual, delete any covered data that the covered entity stores linked to the individual or the individual’s device; and</text></paragraph><paragraph id="idf8b8c21e54654afe95f2dccf141b88d2"><enum>(4)</enum><text>when technically feasible, upon the request of an individual, allow the individual to transmit or transfer covered data linked to the individual or the individual’s device that is maintained by the entity to the individual in a format that is standardized and interoperable.</text></paragraph></subsection><subsection id="id28a8e99aff47477eab8e1595e5147de3"><enum>(b)</enum><header>Pseudonymous data</header><text>If the covered data that an individual has requested processed under subsection (a) is pseudonymous data, a covered entity may decline the request if processing the request is not technically feasible.</text></subsection><subsection id="id273b39ec3eb94b67804e267ff8041c6d"><enum>(c)</enum><header>Timeliness of requests</header><text>In fulfilling any requests made by the individual under subsection (a) the covered entity shall act in as timely a manner as is reasonably possible.</text></subsection><subsection id="id002da921c04e4350aaa478f1c4b31107"><enum>(d)</enum><header>Access to same service</header><text>A covered entity shall not discriminate against an individual because of any action the individual took under their rights described in subsection (a), including—</text><paragraph id="id4d298cdb01b64188b7db859de12823a4"><enum>(1)</enum><text>denying goods or services to the individual;</text></paragraph><paragraph id="id08b0041da7f248f285eb2a8f860a18f2"><enum>(2)</enum><text>charging, or advertising, different prices or rates for goods or services; or</text></paragraph><paragraph id="ida89cac9a18fa491681e652e499e39b86"><enum>(3)</enum><text>providing different quality of goods or services.</text></paragraph></subsection><subsection id="id128c3dff429f49fa80c839fe483eb663"><enum>(e)</enum><header>Consideration</header><text>The Commission shall allow a covered entity, by contract, to provide relevant obligations to the individual under subsection (a) on behalf of a third party service provider that collects, processes, stores, or discloses covered data only on behalf of the covered entity.</text></subsection></section><section id="id00d634ee4fe14cd988bbd8bb80fd06dc"><enum>6.</enum><header>Information security standards</header><subsection id="id1412918aaa4044c4bc4b59a779cf1e84"><enum>(a)</enum><header>Required data security practices</header><paragraph id="id0427d68b888340dca9862c80bfcc5af4"><enum>(1)</enum><header>Regulations</header><text>Not later than 1 year after the date of enactment of this Act, the Commission shall promulgate regulations under section 553 of title 5, United States Code, to require covered entities to establish and implement policies and procedures regarding information security practices for the treatment and protection of covered data taking into consideration—</text><subparagraph id="idd3ce6001d83f42449e537da1c00b972e"><enum>(A)</enum><text>the level of identifiability of the covered data and the associated privacy risk;</text></subparagraph><subparagraph id="id8e4b0b1959bf459e9d1129b21aab9673"><enum>(B)</enum><text>the sensitivity of the covered data collected, processed, and stored and the associated privacy risk;</text></subparagraph><subparagraph id="id5fc9b14b57cd446abacc7495818fa9ab"><enum>(C)</enum><text>the currently available and widely accepted technological, administrative, and physical means to protect covered data under the control of the covered entity;</text></subparagraph><subparagraph id="idca2f79ada34d4400b66b3ad961e420c8"><enum>(D)</enum><text>the cost associated with implementing, maintaining, and regularly reviewing the safeguards; and</text></subparagraph><subparagraph id="id997129231ba34294aafb6faa9e13f807"><enum>(E)</enum><text>the impact of these requirements on small- and medium-sized businesses.</text></subparagraph></paragraph><paragraph id="id663408acccde473e8f71ccd7bf1e43ba"><enum>(2)</enum><header>Limitations</header><text>In promulgating the regulations required under this section, the Commission shall consider a covered entity who is in compliance with existing information security laws that the Commission determines are sufficiently rigorous to be in compliance with this section with respect to particular types of covered data to the extent those types of covered data are covered by such law, including the following:</text><subparagraph id="id679f0048775d445a88704141de64d611"><enum>(A)</enum><text>Title V of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801 et seq.</external-xref>).</text></subparagraph><subparagraph id="id49c2e445b85d4b76b355c1b3f6a9972c"><enum>(B)</enum><text>The Health Information Technology for Economic and Clinical Health Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17931">42 U.S.C. 17931</external-xref>).</text></subparagraph><subparagraph id="idbfec131574b44c26a597c24049c3e860"><enum>(C)</enum><text>The Health Insurance Portability and Accountability Act of 1996 Security Rule (45 CFR 160.103 and part 164).</text></subparagraph><subparagraph id="id4f3a83dbe4aa4464a33d880907e2c3d6"><enum>(D)</enum><text>Any other existing law requiring a covered entity to implement and maintain information security practices and procedures that the Commission determines to be sufficiently rigorous.</text></subparagraph></paragraph></subsection></section><section id="ida3fc84524cb9406e9b8a7c062454f311"><enum>7.</enum><header>Privacy protection officers</header><subsection id="id62257dee5eb84d61a68994b10d6e6d05"><enum>(a)</enum><header>Appointment of a privacy protection officer</header><text>Each covered entity with annual revenue in excess of $50,000,000 the prior year shall designate at least 1 appropriately qualified employee as a privacy protection officer who shall—</text><paragraph id="id8f76e174c38749fdb0c2465b2098b91c"><enum>(1)</enum><text>educate employees about compliance requirements;</text></paragraph><paragraph id="idb93439ee1d584aef9b3f0793510510a7"><enum>(2)</enum><text>train employees involved in data processing;</text></paragraph><paragraph id="ide7e29e2bd44e4e76a3a87b43ed562852"><enum>(3)</enum><text>conduct regular, comprehensive audits to ensure compliance and make records of the audits available to enforcement authorities upon request;</text></paragraph><paragraph id="id0ac1662c19374249b8b72187ec2ae421"><enum>(4)</enum><text>maintain updated, clear, and understandable records of all data security practices undertaken by the covered entity;</text></paragraph><paragraph id="id9974b3d8c4884b8f84965a66dbcc67eb"><enum>(5)</enum><text>serve as the point of contact between the covered entity and enforcement authorities; and</text></paragraph><paragraph id="id8c739adeaf444ece90465ab921d0131c"><enum>(6)</enum><text>advocate for policies and practices within the covered entity that promote individual privacy.</text></paragraph></subsection><subsection id="id5eef92a0637344858000c690df00ad84"><enum>(b)</enum><header>Protections</header><text>The privacy protection officer shall not be dismissed or otherwise penalized by the covered entity for performing any of the tasks assigned to the person under this section.</text></subsection></section><section id="id33583656a3ca4afe8e18c28f0eebd6b8"><enum>8.</enum><header>Research into privacy enhancing technology</header><subsection id="id1192B5A5151D4255A939D97585EC7EB2"><enum>(a)</enum><header>National Science Foundation support of research on privacy enhancing technology</header><text>The Director of the National Science Foundation, in consultation with other relevant Federal agencies (as determined by the Director), shall support merit-reviewed and competitively awarded research on privacy enhancing technologies, which may include—</text><paragraph id="ide91531dfe614498da503c401704f04e3"><enum>(1)</enum><text>fundamental research on technologies for de-identification, pseudonymization, anonymization, or obfuscation of covered data in data sets while maintaining fairness, accuracy, and efficiency;</text></paragraph><paragraph id="id5f1794830a4a4adf887b727ea0d9b937"><enum>(2)</enum><text>fundamental research on algorithms and other similar mathematical tools used to protect individual privacy when collecting, storing, sharing, or aggregating data;</text></paragraph><paragraph id="id3347967fba7d4daf95951e12b9c52b00"><enum>(3)</enum><text>fundamental research on technologies that promote data minimization principles in data collection, sharing, and analytics; and</text></paragraph><paragraph id="id5330ccad17724a5dafbf97e79536ba89"><enum>(4)</enum><text>research awards on privacy enhancing technologies coordinated with other relevant Federal agencies and programs. </text></paragraph></subsection><subsection id="id5F16D819D1384B86861AC15676DE426C"><enum>(b)</enum><header>Integration into the computer and network security program</header><text>Subparagraph (D) of section 4(a)(1) of the Cyber Security Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C. 7403(a)(1)(D)</external-xref>) is amended to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9b8db3e4b5bb41fab3b5d65793fca6fc"><subparagraph id="idda7a20d2dfbe4235a483bd8ba109a6a0"><enum>(D)</enum><text>privacy enhancing technologies and confidentiality;</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id303CC7FCC05A4896BF6880BF8D05A22B"><enum>(c)</enum><header>Coordination with the National Institute of Standards and Technology and other stakeholders</header><paragraph id="ida4d919dd086a481e9198df406a1fc117"><enum>(1)</enum><header>In general</header><text>The Director of the Office of Science and Technology Policy, acting through the Networking and Information Technology Research and Development Program, shall coordinate with the Director of the National Science Foundation, the Director of the National Institute of Standards and Technology, and the Commission to accelerate the development and use of privacy enhancing technologies.</text></paragraph><paragraph id="idf8a005c89a3c40a7beefc2b64447b011"><enum>(2)</enum><header>Outreach</header><text>The Director of the National Institute of Standards and Technology shall conduct outreach to—</text><subparagraph id="id02c8f50a9036496e8be0a1d28cafe542"><enum>(A)</enum><text>receive input from private, public, and academic stakeholders, including the National Institutes of Health and the Centers for Disease Control and Prevention, for the purpose of facilitating public health research, on the development of privacy enhancing technologies; and</text></subparagraph><subparagraph id="id6f979991a4a0402290a09f0ddd07ebfa"><enum>(B)</enum><text>develop ongoing public and private sector engagement to create and disseminate voluntary, consensus-based resources to increase the integration of privacy enhancing technologies in data collection, sharing, and analytics by the public and private sectors.</text></subparagraph></paragraph></subsection><subsection id="id3F0F36675A1C48C082C3DC13528E16AE"><enum>(d)</enum><header>Report on research and standards development</header><text>Not later than 2 years after the date of enactment of this Act, the Director of the Office of Science and Technology Policy, acting through the Networking and Information Technology Research and Development Program, shall, in coordination with the Director of the National Science Foundation and the Director of the National Institute of Standards and Technology, submit to the Committee on Commerce, Science, and Transportation of the Senate, the Subcommittee on Commerce, Justice, Science, and Related Agencies of the Committee on Appropriations of the Senate, the Committee on Science, Space, and Technology of the House of Representatives, and the Subcommittee on Commerce, Justice, Science, and Related Agencies of the Committee on Appropriations of the House of Representatives, a report containing—</text><paragraph id="id03305f0e6f80461ca647848f2c869215"><enum>(1)</enum><text>the progress of research on privacy enhancing technologies;</text></paragraph><paragraph id="idbbf8cd213f16403face3c6c5bba0b53f"><enum>(2)</enum><text>the progress of the development of voluntary resources described under subsection (c)(2)(B); and</text></paragraph><paragraph id="idd040b64a322b438ba25ccbd646d1ffb3"><enum>(3)</enum><text>any policy recommendations of the Directors that could facilitate and improve communication and coordination between the private sector, the National Science Foundation, and relevant Federal agencies through the implementation of privacy enhancing technologies.</text></paragraph></subsection></section><section id="id4d39281dd080436982ea9ab21db09793"><enum>9.</enum><header>Enforcement</header><subsection id="id37db8574f4b445a99885f3d6cd55ed28"><enum>(a)</enum><header>Enforcement by the Commission</header><paragraph id="ide59978793da545a4a82c490231d3fdd1"><enum>(1)</enum><header>In general</header><text>This Act and the regulations prescribed under this Act, other than the provisions of and amendments made by section 8, shall be enforced by the Commission under the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>).</text></paragraph><paragraph id="idf003d858837846f79529625039d31d05"><enum>(2)</enum><header>Unfair or deceptive acts or practices</header><text>A violation of this Act or a regulation prescribed under this Act shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a(a)(1)(B)</external-xref>).</text></paragraph><paragraph id="id47f65b2f536b43ae845923ebd633df71"><enum>(3)</enum><header>Actions by the Commission</header><text>Subject to paragraph (4), the Commission shall prevent any person from violating this Act or a regulation prescribed under this Act in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated into and made a part of this Act, and any person who violates this Act or such regulation shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>).</text></paragraph><paragraph id="id8d8c52070055440f86e3d1543d28e726"><enum>(4)</enum><header>Common carriers</header><text>Notwithstanding section 4, 5(a)(2), or 6 of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/44">15 U.S.C. 44</external-xref>, 45(a)(2), and 46) or any jurisdictional limitation of the Commission, the Commission shall also enforce this Act, in the same manner provided in paragraphs (1), (2), and (3) with respect to common carriers subject to the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/151">47 U.S.C. 151 et seq.</external-xref>) and Acts amendatory thereof and supplementary thereto.</text></paragraph></subsection><subsection id="id057f76b6ac0349d2aab7eae32e4d1d0a"><enum>(b)</enum><header>Enforcement by State attorneys general</header><paragraph id="idce0ccc3d04704a868ceb18db812ae1e0"><enum>(1)</enum><header>In general</header><subparagraph id="id9aedddd0e16042929ad251bc89d0e997"><enum>(A)</enum><header>Civil actions</header><text>In any case in which the attorney general of a State has reason to believe that an interest of the residents of that State has been or is threatened or adversely affected by the engagement of any person in a practice that violates this Act or a regulation prescribed under this Act, the State, as parens patriae, may bring a civil action on behalf of the residents of the State in a district court of the United States of appropriate jurisdiction to—</text><clause id="id25b88f54d7e94d6f88158ba054d3e53e"><enum>(i)</enum><text>enjoin that practice;</text></clause><clause id="id27bde58989e247a4861545705f6e870a"><enum>(ii)</enum><text>enforce compliance with this Act or such regulation;</text></clause><clause id="idc63285c7fcb9436e9b4e2c94c1b6cd91"><enum>(iii)</enum><text>obtain damages, restitution, or other compensation on behalf of residents of the State;</text></clause><clause id="id6ce077e9a3354c46ac664e8fd778ee46"><enum>(iv)</enum><text>impose a civil penalty in an amount that is not greater than the product of the number of individuals whose information was affected by a violation and $40,000; or</text></clause><clause id="id2fa700f1ab224b6594a6a2776271a9dc"><enum>(v)</enum><text>obtain such other relief as the court may consider to be appropriate.</text></clause></subparagraph><subparagraph id="id79edcb2c8dfb4e9ead0bab632d842c43"><enum>(B)</enum><header>Adjustment for inflation</header><text>Beginning on the date that the Consumer Price Index is first published by the Bureau of Labor Statistics that is after 1 year after the date of enactment of this Act, and each year thereafter, the amounts specified in subparagraph (A)(iv) shall be increased by the percentage increase in the Consumer Price Index published on that date from the Consumer Price Index published the previous year.</text></subparagraph><subparagraph id="id398f4c4c6b95414d87192086c6f884fa"><enum>(C)</enum><header>Notice</header><clause id="id3a6d633ea7774aee92227d43b34b9759"><enum>(i)</enum><header>In general</header><text>Before filing an action under subparagraph (A), the attorney general of the State involved shall provide to the Commission—</text><subclause id="idff9eafdabaaa42cf9270665753745fce"><enum>(I)</enum><text>written notice of that action; and</text></subclause><subclause id="id5f0517ad92db448eb9b8deb8b0d463bf"><enum>(II)</enum><text>a copy of the complaint for that action.</text></subclause></clause><clause id="id843e6ca1c5c74403a053d5044675f607"><enum>(ii)</enum><header>Exemption</header><subclause id="id579959edfdf14b7285173167634d0c84"><enum>(I)</enum><header>In general</header><text>Clause (i) shall not apply with respect to the filing of an action by an attorney general of a State under this paragraph if the attorney general determines that it is not feasible to provide the notice described in that clause before the filing of the action.</text></subclause><subclause id="idee16a872add44ab4b8928c5a3d0b27f7"><enum>(II)</enum><header>Notification</header><text>In an action described in subclause (I), the attorney general of a State shall provide notice and a copy of the complaint to the Commission at the same time as the attorney general files the action.</text></subclause></clause></subparagraph></paragraph></subsection><subsection id="id2b95cb18f8e443c09b1142cbd862aa2f"><enum>(c)</enum><header>Rights of the Commission</header><paragraph id="idb8de3dc517114d34b74a965017c36f9c"><enum>(1)</enum><header>Intervention by the Commission</header><text>The Commission may intervene in any civil action brought by the attorney general of a State under subsection (b) and upon intervening—</text><subparagraph id="ida37b4b9e5ed94a9e882594591081aa2f"><enum>(A)</enum><text>be heard on all matters arising in the civil action; and</text></subparagraph><subparagraph id="id4b5df80f5c374ed2b5e3505a31b9441e"><enum>(B)</enum><text>file petitions for appeal of a decision in the civil action.</text></subparagraph></paragraph><paragraph id="id877b0dc73aae4c989a9ad1bef143b11c"><enum>(2)</enum><header>Powers</header><text>Nothing in this subsection may be construed to prevent the attorney general of a State from exercising the powers conferred on the attorney general by the laws of the State to conduct investigations, to administer oaths or affirmations, or to compel the attendance of witnesses or the production of documentary or other evidence.</text></paragraph><paragraph id="id4e1f01808e074bf6910249ff83426fe2"><enum>(3)</enum><header>Action by the Commission</header><text>If the Commission institutes a civil action for violation of this title or a regulation promulgated under this title, no attorney general of a State may bring a civil action under subsection (b) against any defendant named in the complaint of the Commission for violation of this Act or a regulation promulgated under this Act that is alleged in the complaint.</text></paragraph></subsection><subsection id="ida7f3286e65b34bc28782de9427aaaa5c"><enum>(d)</enum><header>Venue and service of process</header><paragraph id="id24f294d2d75f4861b834e12f2a8e3aad"><enum>(1)</enum><header>Venue</header><text>Any action brought under subsection (b) may be brought in—</text><subparagraph id="id48d51b6a62674566bf5a74a106efd5d2"><enum>(A)</enum><text>the district court of the United States that meets applicable requirements relating to venue under section 1391 of title 28, United States Code; or</text></subparagraph><subparagraph id="id19f196c2cbf44545831ba2fdebbc5454"><enum>(B)</enum><text>another court of competent jurisdiction.</text></subparagraph></paragraph><paragraph id="id991ddba34fd94abeb8454ad7c2ed883c"><enum>(2)</enum><header>Service of process</header><text>In an action brought under subsection (b), process may be served in any district in which the defendant—</text><subparagraph id="id1a454d0671f24890970738cf1a1365d1"><enum>(A)</enum><text>is an inhabitant; or</text></subparagraph><subparagraph id="id7a2c9c08a4f548ffb1c15a3aae99e193"><enum>(B)</enum><text>may be found.</text></subparagraph></paragraph></subsection><subsection id="id855b440d8f7f447d8b0b1006a998a26a"><enum>(e)</enum><header>Action of other State officials</header><paragraph id="id01401c751a544775af7de222e5cb6bfd"><enum>(1)</enum><header>In general</header><text>In addition to civil actions brought by attorneys general under subsection (b), any other officer of a State who is authorized by the State to do so may bring a civil action under subsection (b), subject to the same requirements and limitations that apply under this subsection to civil actions brought by attorneys general.</text></paragraph><paragraph id="id31d6ded046234fc087159c3fa22670c0"><enum>(2)</enum><header>Savings provision</header><text>Nothing in this subsection may be construed to prohibit an authorized official of a State from initiating or continuing any proceeding in a court of the State for a violation of any civil or criminal law of the State.</text></paragraph></subsection><subsection id="id98ecb852219940be83a472f9f68828f0"><enum>(f)</enum><header>Preservation of authority</header><text>Nothing in this Act shall be construed to limit the authority of the Federal Trade Commission under any other provision of law.</text></subsection></section><section id="id9a5205ca798246a0b89511cd15ee2126"><enum>10.</enum><header>Additional enforcement resources</header><subsection id="id3ad68933893d47c4ae21387247564a9a"><enum>(a)</enum><header>In general</header><text>Notwithstanding any other provision of law the Commission may, without regard to the civil service laws (including regulations), appoint not more than 300 additional personnel for the purposes of enforcing privacy and data security laws and regulations.</text></subsection><subsection id="idfe5c598ff45f4f53a588ecc0774a70b4"><enum>(b)</enum><header>Authorization of appropriations</header><text>There is authorized to be appropriated to the Commission such sums as may be necessary to carry out this section.</text></subsection></section></legis-body></bill>


