<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-OLL23073-NLF-96-PG2"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>118 S147 IS: See Something, Say Something Online Act of 2023</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2023-01-30</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>118th CONGRESS</congress><session>1st Session</session><legis-num>S. 147</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20230130">January 30, 2023</action-date><action-desc><sponsor name-id="S338">Mr. Manchin</sponsor> (for himself and <cosponsor name-id="S287">Mr. Cornyn</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To require reporting of suspicious transmissions in order to assist in criminal investigations and counterintelligence activities relating to international terrorism, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>See Something, Say Something Online Act of 2023</short-title></quote>.</text></section><section id="id15c26d8b0c0d43a088255a30261d0650"><enum>2.</enum><header>Sense of Congress</header><text display-inline="no-display-inline">It is the sense of Congress that—</text><paragraph id="idf2e057f04c9d4143afa725b1cbf477d3"><enum>(1)</enum><text>section 230 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230</external-xref>) (commonly known as the <quote>Communications Decency Act of 1996</quote>) was never intended to provide legal protection for websites or interactive computer service providers that do nothing after becoming aware of instances of individuals or groups planning, committing, promoting, and facilitating terrorism, serious drug offenses, and violent crimes;</text></paragraph><paragraph id="ide3446401897c4266a00b5459966455fd"><enum>(2)</enum><text>it is not the intent of this Act to remove or strip all liability protection from websites or interactive computer service providers that are proactively working to resolve these issues; and</text></paragraph><paragraph commented="no" id="id39f2356d4751416888c0c7ebe74f26c2"><enum>(3)</enum><text>should websites or interactive computer service providers fail to exercise due care in the implementation, filing of the suspicious transmission activity reports, and reporting of major crimes, Congress intends to look at removing liability protections under the Communications Decency Act of 1996 in its entirety. </text></paragraph></section><section id="idBC7289C3B5AC4BEAB7104BC2A472FC37"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="idCF1B5C4ED82343068A6DF42641380A22"><enum>(1)</enum><header>Department</header><text>The term <term>Department</term> means the Department of Justice.</text></paragraph><paragraph id="id9C81020AF9C6474CA06D65FCF3AA6D7F"><enum>(2)</enum><header>Interactive computer service</header><text>The term <term>interactive computer service</term> has the meaning given the term in section 230 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230</external-xref>). </text></paragraph><paragraph id="id770a12430a384caf915347c2d5fc23e4"><enum>(3)</enum><header>Known suspicious transmission</header><text>The term <term>known suspicious transmission</term> means any suspicious transmission that a provider of an interactive computer service—</text><subparagraph id="idEE3041ADD9784E86BE9F1EE749E5CDDD"><enum>(A)</enum><text>should have reasonably known to have occurred; or</text></subparagraph><subparagraph id="id9FC82B9763DA4F33B35A1A6422C85125"><enum>(B)</enum><text>was notified of by a director, officer, employee, agent, interactive computer service user, or State or Federal law enforcement agency. </text></subparagraph></paragraph><paragraph id="idF92B9CC316874016AC2858EE9BECB9A2"><enum>(4)</enum><header>Major crime</header><text>The term <term>major crime</term> means a Federal criminal offense—</text><subparagraph id="id22FFB0B8AAE9457CA1E770DC1B412074"><enum>(A)</enum><text>that is a crime of violence (as defined in section 16 of title 18, United States Code); </text></subparagraph><subparagraph id="id316A744F883F4301A7D23F00520F89EF"><enum>(B)</enum><text>relating to domestic or international terrorism (as those terms are defined in section 2331 of title 18, United States Code); or</text></subparagraph><subparagraph id="id69F78BA8AB8D4E7DBE54A67EEF77EFB7"><enum>(C)</enum><text>that is a serious drug offense (as defined in section 924(e) of title 18, United States Code). </text></subparagraph></paragraph><paragraph id="idF0EBAB74771E4CEB875D1CF1A9F8913C"><enum>(5)</enum><header>STAR</header><text>The term <term>STAR</term> means a suspicious transmission activity report required to be submitted under section 3.</text></paragraph><paragraph id="id65eada76c2284f9db4e24b0bdd99c5ce"><enum>(6)</enum><header>Suspicious transmission</header><text>The term <term>suspicious transmission</term> means any public or private post, message, comment, tag, transaction, or any other user-generated content or transmission that commits, facilitates, incites, promotes, or otherwise assists the commission of a major crime.</text></paragraph></section><section id="id2CFF9B55CA5A4D9C914C4961FB81966B"><enum>4.</enum><header>Reporting of suspicious activity</header><subsection id="idA9DEC55D5111493C83C2FE6E4303D9A4"><enum>(a)</enum><header>Mandatory reporting of suspicious transmissions</header><paragraph id="id7c0194cb748945119a6966edea9b2bcf"><enum>(1)</enum><header>In general</header><text>If a provider of an interactive computer service detects a suspicious transmission, the provider, including any director, officer, employee, agent, or representative of the provider, shall submit to the Department a STAR describing the suspicious transmission in accordance with this section.</text></paragraph><paragraph id="idBB83B51276154B70993B11311ADE604F"><enum>(2)</enum><header>Requirements</header><subparagraph id="idDB9800C915B043F9B6D7C8F24366D2B4"><enum>(A)</enum><header>In general</header><text>Except as provided in subparagraph (C), a STAR required to be submitted under paragraph (1) shall be submitted not later than 30 days after the date on which the provider of an interactive computer service—</text><clause id="id5846A5E28C2641CA9B1747588DA6AF53"><enum>(i)</enum><text>initially detects the suspicious transmission; or</text></clause><clause id="idC73E8A268A2A4611B4D27B3A5CC94E49"><enum>(ii)</enum><text>is alerted to the suspicious transmission on the platform of such service.</text></clause></subparagraph><subparagraph id="idA595CDF4EF374895AFB56BD09E18887B"><enum>(B)</enum><header>Immediate notification</header><text>In the case of a suspicious transmission that requires immediate attention, such as an active sale or solicitation of sale of drugs or a threat of terrorist activity, the provider of an interactive computer service shall—</text><clause id="id3E41EAA512444286B9FD2854100C2F5C"><enum>(i)</enum><text>immediately notify, by telephone, an appropriate law enforcement authority; and</text></clause><clause id="id0D34CBA39B014DB3A05A69B042717FCF"><enum>(ii)</enum><text>file a STAR in accordance with this section. </text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idE68F42A7B1A440F5B063271D76C175EA"><enum>(C)</enum><header>Delay of submission</header><text>The 30-day period described in subparagraph (A) may be extended by 30 days if the provider of an interactive computer service provides a valid reason to the agency designated or established under subsection (b)(2).</text></subparagraph></paragraph></subsection><subsection id="id84731EF25BAB46DD9B732963E36E7D65"><enum>(b)</enum><header>Reporting process</header><paragraph id="id21C7F3B0288B4F1F8452C81237E75E1D"><enum>(1)</enum><header>In general</header><text>The Attorney General shall establish a process by which a provider of an interactive computer service may submit STARs under this section. </text></paragraph><paragraph id="id74E5C05982D24260B1246C911A018531"><enum>(2)</enum><header>Designated agency</header><subparagraph id="id4D6A075F0D2C47D4BBE33B98735359DB"><enum>(A)</enum><header>In general</header><text>In carrying out this section, the Attorney General shall designate an agency within the Department, or, if the Attorney General determines appropriate, establish a new agency within the Department, to which STARs should be submitted under subsection (a).</text></subparagraph><subparagraph id="idA7D2E51E8B724B51BAEC09952D2E4E29"><enum>(B)</enum><header>Consumer reporting</header><text>The agency designated or established under subparagraph (A) shall establish a centralized online resource, which may be used by individual members of the public to report suspicious activity related to major crimes for investigation by the appropriate law enforcement or regulatory agency. </text></subparagraph><subparagraph id="idA4B61320B2E643DCA0614BDD9073EAE2"><enum>(C)</enum><header>Cooperation with industry</header><text>The agency designated or established under subparagraph (A)—</text><clause id="id5C7477806F9F4017AC319353D157A77B"><enum>(i)</enum><text>may conduct training for enforcement agencies and for providers of interactive computer services on how to cooperate in reporting suspicious activity;</text></clause><clause id="id311B40E28B4B4E6790129E84030E5754"><enum>(ii)</enum><text>may develop relationships for promotion of reporting mechanisms and resources available on the centralized online resource required to be established under subparagraph (B); and</text></clause><clause id="id45E4D5F059FD4367BAA06450C67CD987"><enum>(iii)</enum><text>shall coordinate with the National White Collar Crime Center to convene experts to design training programs for State and local law enforcement agencies, which may include using social media, online ads, paid placements, and partnering with expert non-profit organizations to promote awareness and engage with the public. </text></clause></subparagraph></paragraph></subsection><subsection id="id93243F8B76714A7E96F076F69101287A"><enum>(c)</enum><header>Contents</header><text>Each STAR submitted under this section shall contain, at a minimum—</text><paragraph id="id9C624EB19011491988FC1F412B747FA9"><enum>(1)</enum><text>the name, location, and other such identification information as submitted by the user to the provider of the interactive computer service;</text></paragraph><paragraph id="iddf1232c36dae44cc9e85f1635bc595d6"><enum>(2)</enum><text>the date and nature of the post, message, comment, tag, transaction, or other user-generated content or transmission detected for suspicious activity such as time, origin, and destination; and</text></paragraph><paragraph id="id90ba5f2c521246bf899ed197246bb03d"><enum>(3)</enum><text>any relevant text, information, and metadata related to the suspicious transmission. </text></paragraph></subsection><subsection id="id0AC15F63910B4C77892B7F03ADADA4CC"><enum>(d)</enum><header>Retention of records and nondisclosure</header><paragraph id="idCE466A12EF3B4F18A573D89015189629"><enum>(1)</enum><header>Retention of records</header><text>Each provider of an interactive computer service shall—</text><subparagraph id="idC6C8C435847C4FC49ABB34DE504D83E2"><enum>(A)</enum><text>maintain a copy of any STAR submitted under this section and the original record equivalent of any supporting documentation for the 5-year period beginning on the date on which the STAR was submitted; </text></subparagraph><subparagraph id="id807B46BC0A294D4BB493223703E93EA8"><enum>(B)</enum><text>make all supporting documentation available to the Department and any appropriate law enforcement agencies upon request; and</text></subparagraph><subparagraph id="id8E153507FE464710B960B603C12D8BBA"><enum>(C)</enum><text>not later than 30 days after the date on which the provider submits a STAR under this section, take action against the website or account reported unless the provider receives a notification from a law enforcement agency that the website or account should remain open. </text></subparagraph></paragraph><paragraph id="id88698F22744F45C49BD3DE9653F72E20"><enum>(2)</enum><header>Nondisclosure</header><text>Except as otherwise prescribed by the Attorney General, no provider of an interactive computer service, or officer, director, employee, or agent of such a provider, subject to an order under subsection (a) may disclose the existence of, or terms of, the order to any person.</text></paragraph></subsection><subsection id="idF090260E56AE40A2924ADA6007EB5011"><enum>(e)</enum><header>Disclosure to other agencies</header><paragraph id="id57BADA65BF2E42F7A1698F2587ABB966"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (2), the Attorney General shall—</text><subparagraph id="id675495E1ED114408B201F2687782FA63"><enum>(A)</enum><text>ensure that STARs submitted under this section and reports from the public submitted under subsection (b)(2)(B) are referred as necessary to the appropriate Federal, State, or local law enforcement or regulatory agency; </text></subparagraph><subparagraph id="id89C17DF6F64241628ACB8263AA73B991"><enum>(B)</enum><text>make information in a STAR submitted under this section available to an agency, including any State financial institutions supervisory agency or United States intelligence agency, upon request of the head of the agency; and</text></subparagraph><subparagraph id="idD0ECDF9BD25345F0BE4A671A18836087"><enum>(C)</enum><text>develop a strategy to disseminate relevant information in a STAR submitted under this section in a timely manner to other law enforcement and government agencies, as appropriate, and coordinate with relevant nongovernmental entities, such as the National Center for Missing and Exploited Children.</text></subparagraph></paragraph><paragraph id="id8FC59044BE664349A6CE2794625F0D69"><enum>(2)</enum><header>Limitation</header><text>The Attorney General may only make a STAR available under paragraph (1) for law enforcement purposes.</text></paragraph></subsection><subsection id="iddb0955d344f740449a3cf3721cacb415"><enum>(f)</enum><header>Compliance</header><text>Any provider of an interactive computer service that fails to report a known suspicious transmission shall not be immune from civil or criminal liability for such transmission under section 230(c) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(c)</external-xref>). </text></subsection><subsection id="id3D8017330552490CB9A77B5A749EB8F8"><enum>(g)</enum><header>Application of FOIA</header><text>Any STAR submitted under this section, and any information therein or record thereof, shall be exempt from disclosure under section 552 of title 5, United States Code, or any similar State, local, Tribal, or territorial law. </text></subsection><subsection id="id45c4137167694161859fda70bba75730"><enum>(h)</enum><header>Rulemaking authority</header><text>Not later than 180 days after the date of enactment of this Act, the Attorney General shall promulgate regulations to carry out this section. </text></subsection><subsection id="id0a18ac745a324ad1b6420cc78cb32f2a"><enum>(i)</enum><header>Report</header><text>Not later than 180 days after the date of enactment of this Act, the Attorney General shall submit to Congress a report describing the plan of the Department for implementation of this Act, including a breakdown of the costs associated with implementation.</text></subsection><subsection id="ida547a442ab774585abdfa36710421031"><enum>(j)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated to the Attorney General such sums as may be necessary to carry out this Act. </text></subsection></section><section id="idac6b6fc173124cb682a91e3a139ba76f"><enum>5.</enum><header>Amendment to Communications Decency Act</header><text display-inline="no-display-inline">Section 230(e) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(e)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id648504A36B6E47E8A11F4B5A09D3BEE9"><paragraph id="id3abb8e9f249148218856ab22e42b3ba2"><enum>(6)</enum><header>Loss of liability protection for failure to submit suspicious transmission activity report</header><subparagraph id="idad030778b8204b39bf2e00a2e024a564"><enum>(A)</enum><header>Definitions</header><text>In this paragraph, the terms <term>known suspicious transmission</term> and <term>suspicious transmission</term> have the meanings given those terms in section 3 of the <short-title>See Something, Say Something Online Act of 2023</short-title>.</text></subparagraph><subparagraph id="id8749c4c6184447fb8b60a2ddd20b460d"><enum>(B)</enum><header>Requirement</header><text>Any provider of an interactive computer service shall take reasonable steps to prevent or address unlawful users of the service through the reporting of suspicious transmissions.</text></subparagraph><subparagraph id="ided74ad5a3d784579989280f75432d0f2"><enum>(C)</enum><header>Failure to comply</header><text>Any provider of an interactive computer service that fails to report a known suspicious transmission may be held liable as a publisher for the related suspicious transmission.</text></subparagraph><subparagraph id="id6cd3efca0b3c4284a6a698f40b968d37"><enum>(D)</enum><header>Rule of construction</header><text>Nothing in this paragraph shall be construed to impair or limit any claim or cause of action arising from the failure of a provider of an interactive computer service to report a suspicious transmission.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></section></legis-body></bill> 

