<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-LIP22750-C7S-SL-FCN"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S5279 IS: Tech Safety for Victims of Domestic Violence, Dating Violence, Sexual Assault, and Stalking Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2022-12-15</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>2d Session</session><legis-num>S. 5279</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20221215">December 15, 2022</action-date><action-desc><sponsor name-id="S247">Mr. Wyden</sponsor> introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSJU00">Committee on the Judiciary</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To establish a pilot program to address technology-related abuse in domestic violence cases.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Tech Safety for Victims of Domestic Violence, Dating Violence, Sexual Assault, and Stalking Act</short-title></quote>.</text></section><section id="id25F288E1DB66447FAC2E3A917CEF19F1"><enum>2.</enum><header>Findings</header><text display-inline="no-display-inline">Congress finds the following:</text><paragraph id="idea374be49adc48f3a13e1116e36cd7ee"><enum>(1)</enum><text>In the United States, 27 percent of women and 11 percent of men experience some form of physical violence or stalking by an intimate partner.</text></paragraph><paragraph id="id06db7b8df94344bb99e856a77b13b22f"><enum>(2)</enum><text>Many victims of intimate partner violence also experience nonphysical forms of abuse.</text></paragraph><paragraph id="idB575331E3DA04F5BAD37C92162D42DA1"><enum>(3)</enum><text>With the proliferation of digital technology, technological abuse has become increasingly prevalent and pervasive among victims of intimate partner violence.</text></paragraph><paragraph id="id1a1809509ad047f58126547859f73c39"><enum>(4)</enum><text>According to a 2021 study by the National Network to End Domestic Violence, 97 percent of the programs providing support to victims of intimate partner violence have indicated that abusers are making use of technology to stalk, harass, or control victims.</text></paragraph><paragraph id="idD6BA9B289DAB404B9669B5E9528EB58D"><enum>(5)</enum><text>In the United States, 1 in 3 women under the age of 35 report being sexually harassed online, and over half of LGBTQ+ individuals report being the target of online abuse based on their sexual orientation or gender.</text></paragraph><paragraph id="idFE2EE11D83784A018BC6EE9CF968B6F9"><enum>(6)</enum><text>Of victims who are stalked using technology—</text><subparagraph id="idD01590FFDB6F4731AC71F8913EB67377"><enum>(A)</enum><text>67 percent received unwanted phone calls, voice messages, or text messages;</text></subparagraph><subparagraph id="id7B073DDCFE804D4A8FE2B1D0715780EC"><enum>(B)</enum><text>50 percent received unwanted emails or messages via the internet;</text></subparagraph><subparagraph id="idB537A72CD8F94D1080D5872B29CADD41"><enum>(C)</enum><text>about 35 percent said their activities were monitored using social media;</text></subparagraph><subparagraph id="idC9192EC6096F4EE6BD7C4F35555EABC9"><enum>(D)</enum><text>27 percent experienced the offender posting or threatening to post inappropriate, unwanted, or personal information about them on the internet; and</text></subparagraph><subparagraph id="idEDCB4412851A4D27B1D47A46D081EDED"><enum>(E)</enum><text>19 percent said the offender spied on them or monitored their activities using technologies such as listening devices, cameras, or computer or cellphone monitoring software.</text></subparagraph></paragraph><paragraph id="idef4e4c857ee94d3bb65f7f46e938ba43"><enum>(7)</enum><text>Technological abuse runs the gamut of technical sophistication, from the most basic social media platforms and phone-based apps to specialty stalkerware apps, demonstrating that technological abuse does not require huge financial resources or complex knowledge of technology.</text></paragraph><paragraph id="id14d241c6f61b433eaa003d26b1ea3487"><enum>(8)</enum><text>Rapid advances in the technology and methods for technological abuse present challenges for advocates seeking to advise victims and prevent technological abuse.</text></paragraph><paragraph id="id64ae12f1f3af4d70a8d2243326210213"><enum>(9)</enum><text>The integration of trained technology experts into survivor support networks has been successful in preventing and shielding survivors from technological abuse.</text></paragraph></section><section id="id3BC266649DBD48EAAD2CE672556E83DD"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="idDBB7A5B030AC4389ACFD242D032DE4C1"><enum>(1)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Office on Violence Against Women.</text></paragraph><paragraph id="id407C0250889740E6936DC269961626B3"><enum>(2)</enum><header>Eligible consortium</header><text>The term <term>eligible consortium</term> means an association—</text><subparagraph id="id587514b02587416c884cdaf8c902c053"><enum>(A)</enum><text>between—</text><clause id="idB680B33285974DE88080110E915C1E34"><enum>(i)</enum><subclause commented="no" display-inline="yes-display-inline" id="idb095f8d0ddc24ae0aeab4addf75245d8"><enum>(I)</enum><text>1 or more institutions of higher education that offers a masters, doctoral, or vocational program in information technology, cybersecurity, computer science, or other similar technological discipline; or</text></subclause><subclause id="idEA2C35B9CDA64702B163EA91C435562E" indent="up1" commented="no"><enum>(II)</enum><text>1 or more private or public sector partners in the community with a technical workforce and a plan for recruiting technologists or volunteers to work alongside a victim service provider (as defined in section 40002(a) of the Violence Against Women Act of 1994 (<external-xref legal-doc="usc" parsable-cite="usc/34/12291">34 U.S.C. 12291(a)</external-xref>)); and </text></subclause></clause><clause id="id886c34a0428146d8ab9a977f113f92be"><enum>(ii)</enum><text>1 or more public or private domestic violence or sexual violence centers; and</text></clause></subparagraph><subparagraph id="id2a3f5eb1fa2a413cbdba4a7ac70ae3a1" commented="no" display-inline="no-display-inline"><enum>(B)</enum><text>which has a letter of support from the local, State, Tribal, or territorial government with jurisdiction over the area in which the activities to combat technological abuse will be implemented. </text></subparagraph></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id047878193662421FBD5469051D24F123"><enum>(3)</enum><header>Institution of higher education</header><text>The term <term>institution of higher education</term> has the meaning given that term in section 101 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001</external-xref>).</text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id0102499B0E5447C189CFB0D67E674050"><enum>(4)</enum><header>Pilot program</header><text>The term <term>pilot program</term> means the pilot program established under section 4(a)(1).</text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id948534317A21417395E95E1075F61EE0"><enum>(5)</enum><header>Technological abuse</header><text>The term <term>technological abuse</term> has the meaning given the term in section 40002(a)(40) of the Violence Against Women Act of 1994 (<external-xref legal-doc="usc" parsable-cite="usc/34/12291">34 U.S.C. 12291(a)(40)</external-xref>).</text></paragraph></section><section display-inline="no-display-inline" commented="no" id="id204C6D4C72B04D318EB38A6D65E7823A"><enum>4.</enum><header>Pilot program to combat technological abuse</header><subsection id="idBBA9B36C6A8C4E5281F4063CAD391AA0"><enum>(a)</enum><header>Pilot program authorized</header><paragraph id="id34BB4635DAF44E2CB0CFB5865A607618"><enum>(1)</enum><header>In general</header><text>The Director, in accordance with paragraph (2), shall establish a pilot program under which the Director may award grants to eligible consortia to combat technological abuse.</text></paragraph><paragraph id="idDE29AC3C778044B5BC62338AA36B5D1E"><enum>(2)</enum><header>Consultation</header><text>In preparing to establish the pilot program—</text><subparagraph id="id56AE9034C3184898891687852C1FDD2D"><enum>(A)</enum><text>the Director shall consult with—</text><clause id="idB9B12929809041178804A868C8C3AADF"><enum>(i)</enum><text>the Secretary of Health and Human Services; </text></clause><clause id="id9EDD8481425E40B4A6030D48A26227BB"><enum>(ii)</enum><text>the Secretary of Education; and</text></clause><clause id="idE56374DD29924EB88D98F063483B3DDA"><enum>(iii)</enum><text>the Chairman of the Federal Communications Commission; and</text></clause></subparagraph><subparagraph id="id3E96779B5B2A43F1B0AC443381977D8B"><enum>(B)</enum><text>the Director and the officers described in subparagraph (A) shall consult with relevant stakeholders, including—</text><clause id="id739358D48C7949FC9006F03AD8EB9ECA"><enum>(i)</enum><text>groups that work on reducing technological abuse; and</text></clause><clause id="id45A6E3EA924F43F3820E87A2F54C5016"><enum>(ii)</enum><text>population specific and culturally specific victim service providers.</text></clause></subparagraph></paragraph><paragraph id="id15103FADE8FE4EEE9286A0EB540C0B40"><enum>(3)</enum><header>Application</header><text>An eligible consortium desiring a grant under this section shall submit to the Director an application at such time, in such manner, and containing or accompanied by such information, as the Director may reasonably require.</text></paragraph><paragraph id="id84e8846e1f584b55a055b3a891966333"><enum>(4)</enum><header>Grant limits</header><subparagraph id="idA5F9F9941D1C49B7B6355D04491BAFDD"><enum>(A)</enum><header>Award amount</header><text>A grant awarded under the pilot program shall be in an amount that is not more than $2,000,000.</text></subparagraph><subparagraph id="id1A85BAF5EC434B8199CD81533500C8E5"><enum>(B)</enum><header>Number of recipients</header><text>Not more than 15 grants may be awarded under the pilot program.</text></subparagraph></paragraph><paragraph id="idD6C0BB885F6340B09B0920F3BD6D055C"><enum>(5)</enum><header>Duration of pilot program</header><text>The pilot program shall terminate on the date that is 5 years after the date of the first award under the pilot program.</text></paragraph></subsection><subsection id="id4209ABA103B141F392B9E4FB907A4258"><enum>(b)</enum><header>Use of grant funds</header><text>A recipient of a grant under this section may use the amounts received under the grant to combat technological abuse, including for—</text><paragraph id="id90C413047E5742C9A47A75D3DA10B2E6"><enum>(1)</enum><text> the purchase of new technological devices for victims and survivors of technological abuse; and</text></paragraph><paragraph id="id2C27E03D952A440B8F52B593FC800058"><enum>(2)</enum><text> any other use, including the provision of victim services, that will reduce technological abuse or assist victims and survivors of technological abuse.</text></paragraph></subsection><subsection id="id3ef6d2f35f504e2f9647d36a628b1c4d"><enum>(c)</enum><header>Pilot program review</header><paragraph id="id1AB89C1742044053B0A2DAA83FAC85DC"><enum>(1)</enum><header>During pilot program</header><text>Not later than 3 years after the date of the first award under the pilot program, the Director shall submit to each committee of Congress with jurisdiction of the activities carried out under the pilot program a report—</text><subparagraph id="idEA4843E40562469D93AB51819A7170D4"><enum>(A)</enum><text>reviewing the efficacy of the pilot program;</text></subparagraph><subparagraph id="id4A28F43B52D249C7B91B8570D59FED8F"><enum>(B)</enum><text>indicating challenges to implementation and possible solutions; and</text></subparagraph><subparagraph id="id713A2A6D180247758BC97001F976767A"><enum>(C)</enum><text>including a recommendation relating to whether the pilot program should be turned into a permanent program.</text></subparagraph></paragraph><paragraph id="id757845470C534C149A4558EE1809A216"><enum>(2)</enum><header>After pilot program termination</header><text>Not later than 1 year after the date on which the pilot program terminates under subsection (a)(5), the Director shall submit to each committee of Congress with jurisdiction of the activities carried out under the pilot program a report reviewing the efficacy of the pilot program, including best practices and improvements needed to combat technological abuse.</text></paragraph></subsection><subsection id="id1D791EEB8ED24E8297B9931705124269"><enum>(d)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated such sums as are necessary to carry out this section.</text></subsection></section><section id="id0DE33096E13243F1BAA6D89B84470339"><enum>5.</enum><header>Grant program to provide education on technological abuse</header><subsection id="id5AD679C445364A44A6C2715F71D6324C"><enum>(a)</enum><header>Grant program authorized</header><text>The Director in consultation with the Secretary of Education and the Secretary of Health and Human Services shall establish a program under which the Director may award grants to nonprofit organizations and institutions of higher education to develop and implement training and educational programs and technical assistance for organizations and individuals who provide support for victims of technological abuse.</text></subsection><subsection id="idFDF13DDBECEB4DBBB100125F68884A5D"><enum>(b)</enum><header>Multiple grants</header><text>A recipient of a grant under section 4 is not barred from receiving a grant under this section. </text></subsection><subsection id="idB7FC8396C21E477F8E3F6E612F022991"><enum>(c)</enum><header>Use of grant funds</header><text>A nonprofit organization or institution of higher education shall use the amounts received under a grant under this section to develop tools, curricula, and other materials.</text></subsection><subsection id="id6B977F63361B48D4A67E8E81A750D3DE"><enum>(d)</enum><header>Grant program limits</header><paragraph id="idF6067C3D630E4C489EFC89D7F337250B"><enum>(1)</enum><header>Maximum amount</header><text>The Director may award a total of not more than $20,000,000 in grants under this section.</text></paragraph><paragraph id="id77289B3C542D43B8A17E7F71364C6F0E" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Period of grants</header><text>The Director shall award grants under this section for a period of 5 years.</text></paragraph></subsection><subsection display-inline="no-display-inline" commented="no" id="id306D59210ECA450FB6A4BC3AC711887A"><enum>(e)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated such sums as are necessary to carry out this section.</text></subsection></section></legis-body></bill> 

