<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HF6B8E214D40D483F8D1C7470DF74C45A" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 HR 7786 IH: AI Fraud Accountability Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2026-03-04</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">119th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 7786</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20260304">March 4, 2026</action-date><action-desc><sponsor name-id="B001260">Mr. Buchanan</sponsor> (for himself and <cosponsor name-id="S001200">Mr. Soto</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name>, and in addition to the Committees on <committee-name committee-id="HJU00">the Judiciary</committee-name>, <committee-name committee-id="HSY00">Science, Space, and Technology</committee-name>, and <committee-name committee-id="HFA00">Foreign Affairs</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned</action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To establish protections against digital impersonation fraud, and for other purposes.</official-title></form><legis-body id="HDC983E9BED5A467AA3BA32E3D1F4648D" style="OLC"><section section-type="section-one" id="HE6CB2DDECBBA4B518D7CFA2409A4A402"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>AI Fraud Accountability Act</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="HB754F20E2F604754A0C09834C1FC042E"><enum>2.</enum><header>Criminal prohibition on use of digital impersonations to commit fraud</header><subsection commented="no" display-inline="no-display-inline" id="HA4F2B7E2B50B46C890AAC18092057BB2"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Section 223 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/223">47 U.S.C. 223</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="HBD2FF48E4E074560A1B33240821408AF"><enum>(1)</enum><text>by redesignating subsection (i) as subsection (j); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H5AAC141DC0894A2C8AA154525D4FF584"><enum>(2)</enum><text>by inserting after subsection (h) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="HA5AE033D11DF418C8A42C1F88D144469"><subsection id="H3B17894EF91D4B889803E8422294E889"><enum>(i)</enum><header>Use of digital impersonations To commit fraud</header><paragraph commented="no" display-inline="no-display-inline" id="H6C6569E767C941558E5720158611A8D2"><enum>(1)</enum><header>Definitions</header><text>In this subsection:</text><subparagraph id="H7A0652F7CA084E2EAA1708610B53F12E"><enum>(A)</enum><header>Digital impersonation</header><text>The term <term>digital impersonation</term> means any visual or audio depiction of—</text><clause commented="no" display-inline="no-display-inline" id="HFA95AFAFBEC845468840F58F464A52A4"><enum>(i)</enum><text display-inline="yes-display-inline">an identifiable individual created through the use of software, machine learning, artificial intelligence, or any other computer-generated or technological means, including by adapting, modifying, manipulating, or altering an authentic visual or audio depiction, that, when viewed or listened to as a whole by a reasonable person, is indistinguishable from an authentic visual or audio depiction of the individual; or</text></clause><clause id="HEC5895431C6444138DB1E6F4C62B5FE7"><enum>(ii)</enum><text>an imaginary individual created through the use of software, machine learning, artificial intelligence, or any other computer-generated or technological means, including by adapting, modifying, manipulating, or altering an authentic visual or audio depiction of an imaginary individual, that, when viewed or listened to as a whole by a reasonable person, is indistinguishable from a visual or audio depiction of a real individual.</text></clause></subparagraph><subparagraph id="H4F547833817D48469A8B6C309F8ED5D7"><enum>(B)</enum><header>Identifiable individual</header><text>The term <term>identifiable individual</term> means an individual—</text><clause id="H6D0FFAF8B7834839AC2DD6BB51A3D651"><enum>(i)</enum><text>who appears in whole or in part, or is heard, in a digital impersonation; and</text></clause><clause id="H2AA0D5ED931C4270B8AA9DE54C7E33E7"><enum>(ii)</enum><text>whose face, likeness, voice, or other distinguishing characteristic (including a unique birthmark or other recognizable feature) is displayed or heard in connection with such digital impersonation.</text></clause></subparagraph></paragraph><paragraph id="H015A82783DB04E11B21F49C9949BB288"><enum>(2)</enum><header>Offense</header><subparagraph id="H535476C1B7854354802D028EA15BF481"><enum>(A)</enum><header>In general</header><text>Subject to subparagraph (B), it shall be unlawful for a person, in interstate or foreign communications, to falsely pose as an identifiable individual or imaginary individual, in a manner intended to be taken as genuine, in a digital impersonation, with intent to defraud a person of any money, paper, document, or thing of value.</text></subparagraph><subparagraph id="H46C5317B5671419BBF893322E6331F92"><enum>(B)</enum><header>Exceptions</header><text>Subparagraph (A) shall not apply to a lawfully authorized investigative, protective, or intelligence activity of—</text><clause id="H64CD3F168E5540B0A033801D281F2594"><enum>(i)</enum><text>a law enforcement agency of the United States, a State, or a political subdivision of a State; or</text></clause><clause id="HA0B4776C411849C58345523418676651"><enum>(ii)</enum><text>an intelligence agency of the United States;</text></clause></subparagraph></paragraph><paragraph id="H83D447BFFE5A479980131EB8FDEDA80F"><enum>(3)</enum><header>Penalties</header><text>Any person who violates paragraph (2) shall be fined under title 18, United States Code, imprisoned not more than 3 years, or both.</text></paragraph><paragraph id="H22AC57D3821F42708D33BC354194AC75"><enum>(4)</enum><header>Threats</header><text>Any person who intentionally threatens to commit the offense under paragraph (2) for the purpose of intimidation, coercion, extortion, or to create mental distress shall be punished as provided in paragraph (3).</text></paragraph><paragraph id="HB954D9D7E4FB4C55A50A1AFE71949EBD"><enum>(5)</enum><header>Forfeiture</header><subparagraph commented="no" display-inline="no-display-inline" id="HC4B6690FC3DF4A90AFF5CB0AF12A9219"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The court, in imposing a sentence on any person convicted of a violation of paragraph (2), shall order, in addition to any other sentence imposed and irrespective of any other sentence imposed and irrespective of any provision of State law, that the person forfeit to the United States—</text><clause id="H856E5442B6E64281A3A8BFACF5F1A39E"><enum>(i)</enum><text>the person’s interest in property, real or personal, constituting or derived from any gross proceeds of the violation, or any property traceable to such property, obtained or retained directly or indirectly as a result of the violation; and</text></clause><clause id="H58BF5945C5BE462191912617035500E7"><enum>(ii)</enum><text>any personal property of the person used, or intended to be used, in any manner or part, to commit or to facilitate the commission of the violation.</text></clause></subparagraph><subparagraph id="HBD8F6DC0B7C44F8680C38911704DC9A9"><enum>(B)</enum><header>Procedures</header><text>Section 413 of the Controlled Substances Act (<external-xref legal-doc="usc" parsable-cite="usc/21/853">21 U.S.C. 853</external-xref>), with the exception of subsections (a) and (d), shall apply to the criminal forfeiture of property under subparagraph (A).</text></subparagraph></paragraph><paragraph id="H544CA1C7EC3E40B0BCD7D44B86812A02"><enum>(6)</enum><header>Extraterritorial jurisdiction</header><text>There is extraterritorial Federal jurisdiction over an offense under paragraph (2).</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="HEC7B9A3A1A2F436D89DFCE3D472C1D5C" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Defenses</header><text>Section 223(e)(1) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/223">47 U.S.C. 223(e)(1)</external-xref>) is amended by striking <quote>or (h)</quote> and inserting <quote>(h), or (i)</quote>.</text></subsection></section><section id="H483782CF6F014844ADCB3BFFF0229B9B"><enum>3.</enum><header>Protection against digital impersonation fraud</header><subsection commented="no" display-inline="no-display-inline" id="H7A8FE7BE9A294AFBBF23257A45D9F1C9"><enum>(a)</enum><header display-inline="yes-display-inline">Prohibition</header><paragraph id="H08C870EF1C014BFEA849A698CE49C30C"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (2), it shall be unlawful for a person, in interstate or foreign commerce, to falsely pose as an identifiable or imaginary individual in a manner intended to be taken as genuine, in a digital impersonation, with intent to defraud a person of any money, paper, document, or thing of value.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H62CE573B842045F6B22BEF213B5F328D"><enum>(2)</enum><header>Exception</header><text>The prohibition described in paragraph (1) shall not apply to a lawfully authorized investigative, protective, or intelligence activity of—</text><subparagraph id="HFBFB2ADBA6814A87915B9BFFE4507EEB"><enum>(A)</enum><text>a law enforcement agency of the United States, a State, or a political subdivision of a State; or</text></subparagraph><subparagraph id="H5C0C9D6709984105BC97AA3C8F963B84"><enum>(B)</enum><text>an intelligence agency of the United States.</text></subparagraph></paragraph></subsection><subsection id="HADE6ADFDCB6B4D7EB8D46FA2B3C80B2C"><enum>(b)</enum><header>Enforcement by the Commission</header><paragraph id="H52D6A34653364C39986DC37DE68DC8C7"><enum>(1)</enum><header>Unfair or deceptive acts or practices</header><text>A violation of subsection (a) shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a(a)(1)(B)</external-xref>).</text></paragraph><paragraph id="H0BEB11D65CCC4D30B88BEFE13A1AC570"><enum>(2)</enum><header>Powers of the Commission</header><subparagraph id="HB3CE7BA7F75841729E4DCFA36A8DA8A9"><enum>(A)</enum><header>In general</header><text>The Commission shall enforce this section in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated into and made a part of this section.</text></subparagraph><subparagraph id="H232FB23EC5DD4C1B92EA84DF503B3B8B"><enum>(B)</enum><header>Privileges and immunities</header><text>Any person who violates subsection (a) shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>).</text></subparagraph><subparagraph id="H399A1327E488498084404369CBF450C8"><enum>(C)</enum><header>Authority preserved</header><text>Nothing in this Act shall be construed to limit the authority of the Commission under any other provision of law.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H087CE1E2899045E3A5D15FF522D30ABD"><enum>(c)</enum><header>Definitions</header><text>For purposes of this section:</text><paragraph id="HF25AB2C67ABC4E03ADC62DFB8220DE23"><enum>(1)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HF2556D98FCAD43E4B9596B6FD1869BFD"><enum>(2)</enum><header>Digital impersonation; identifiable individual</header><text>The terms <term>digital impersonation</term> and <term>identifiable individual</term> have the meaning given such terms in section 223(i) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/223">47 U.S.C. 223(i)</external-xref>), as added by section 2 of this Act.</text></paragraph></subsection></section><section id="HF28F18FCA49D45F98FD6C139B4B2DE10"><enum>4.</enum><header>Working group on digital impersonation fraud</header><subsection commented="no" display-inline="no-display-inline" id="H21CAEC7177424B70B22080867DACB817"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="H45B3737631264CB9B5A81F20FD8B2DE6"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="HA24514A3084F468881317F95F02BB123"><enum>(A)</enum><text display-inline="yes-display-inline">the Committee on Commerce, Science, and Transportation of the Senate; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H97160A7DAD024C26B9613C76924737F6"><enum>(B)</enum><text>the Committee on Science, Space, and Technology of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H35E5C80E8F754EB4A063805121AD3F8D"><enum>(2)</enum><header>Digital forensics</header><text>The term <term>digital forensics</term> means scientific or technical practices used to recognize, collect, analyze, or interpret digital evidence for the purposes of investigating crimes or other incidents, including the use of digital impersonation to commit fraud.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HA8BA2D261D3C4217B9E6C06C9FC5FD77"><enum>(3)</enum><header>Digital impersonation</header><text>The term <term>digital impersonation</term> has the meaning given that term in section 223(i) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/223">47 U.S.C. 223(i)</external-xref>), as added by section 2 of this Act.</text></paragraph><paragraph id="HF37D19DD0E124B2683505BE89FB352FE"><enum>(4)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the National Institute of Standards and Technology.</text></paragraph></subsection><subsection id="HB1A641DEBD7C403AAB41DFDDE95CB455"><enum>(b)</enum><header>Establishment of Working Group</header><paragraph commented="no" display-inline="no-display-inline" id="HBC580DEDAD324E2DA76B5EA7CE0B3303"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 30 days after the date of the enactment of this Act, the Secretary of Commerce, acting through the Director, shall convene a working group (referred to in this section as the <quote>Working Group</quote>) to engage in technical discussions and research for the development of best practices and recommendations for the recognition, detection, prevention, and tracing of digital impersonations used in violation of section 223(i) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/223">47 U.S.C. 223(i)</external-xref>), as amended by section 2 of this Act, and section 3(a) of this Act.</text></paragraph><paragraph id="H7AA8F86279624712B8BAFBB61ADC36C2"><enum>(2)</enum><header>Composition</header><text>The Working Group shall consist of—</text><subparagraph commented="no" display-inline="no-display-inline" id="H0BCE22D10BAD412D8714773E5606D5F0"><enum>(A)</enum><text display-inline="yes-display-inline">representatives from—</text><clause commented="no" display-inline="no-display-inline" id="H0CA819B0E8814FBDBE7E75998CC971C7"><enum>(i)</enum><text display-inline="yes-display-inline">the Department of Justice;</text></clause><clause commented="no" display-inline="no-display-inline" id="HF262BAF9F3564CBD9B0F28B3BFDEA04E"><enum>(ii)</enum><text>the Federal Trade Commission;</text></clause><clause commented="no" display-inline="no-display-inline" id="H7CE627237FB2421DBDC3D8642F13291A"><enum>(iii)</enum><text>Federal, State, and local government law enforcement agencies; and</text></clause><clause commented="no" display-inline="no-display-inline" id="H9C776B4A816943F5A024307A8623E301"><enum>(iv)</enum><text>private sector industries, including—</text><subclause commented="no" display-inline="no-display-inline" id="H7B627518B5DB4030BFFE61E363E6EA30"><enum>(I)</enum><text>financial services;</text></subclause><subclause id="H19F64D2E7E4E4A2E907BB3857A791FDC"><enum>(II)</enum><text>health care;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="H5116CD0D0D8A4D069213A96A5CEB89C4"><enum>(III)</enum><text>retail and e-commerce;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="H632754906A51465CBAE1BE17275AC57D"><enum>(IV)</enum><text display-inline="yes-display-inline">telecommunications; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="H99F72C5C7F5D4BE4BE4EABB141547F44"><enum>(V)</enum><text display-inline="yes-display-inline">digital platforms, including social media platforms; and</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H3DCACCB76B82451EAE8CE979670E8CD2"><enum>(B)</enum><text display-inline="yes-display-inline">scientists and engineers with expertise in—</text><clause commented="no" display-inline="no-display-inline" id="HF8E37DD90DF74740B970F026DE4714B0"><enum>(i)</enum><text display-inline="yes-display-inline">digital forensics; and</text></clause><clause commented="no" display-inline="no-display-inline" id="H6FEFD2BF5AF4424F88010F98E5999002"><enum>(ii)</enum><text>artificial intelligence, including the generation or detection of digital impersonations.</text></clause></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H9E62BDB641C1457EA0B090CABB582EE9"><enum>(c)</enum><header>Public workshop</header><text>The Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="HB9D733EDA6D2401FAFE3D3491B504099"><enum>(1)</enum><text display-inline="yes-display-inline">convene not less than 1 public workshop to solicit input from stakeholders on the best practices and recommendations developed under subsection (b)(1); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H220B007EA9844438A88A6AECAE539E86"><enum>(2)</enum><text>incorporate such input into the best practices and recommendations as the Director considers appropriate.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="HBE60FE3CB4484CE19B28E8CCD77F1F4D"><enum>(d)</enum><header>Publication of best practices and recommendations</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Director shall publish on a publicly accessible website of the National Institute of Standards and Technology a report that contains the best practices and recommendations developed pursuant to subsection (b)(1) and modified under subsection (c)(2).</text></subsection><subsection id="H0F3CB72970FB4BAF988E7FB4152690FC"><enum>(e)</enum><header>Annual review and updates</header><text>Not later than 2 years after the date of the enactment of this Act, and not less frequently than once each year thereafter, the Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="HB5D307B84A4A4843B6D7FD91F19F332E"><enum>(1)</enum><text display-inline="yes-display-inline">review the best practices and recommendations developed under this section; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H29D0A53B1D524CC589FC361CC2FEA67C"><enum>(2)</enum><text>update the best practices and recommendations published under subsection (d) as the Director considers appropriate pursuant to the most recent review conducted pursuant to paragraph (1) of this subsection.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H4361261692D44A189ED8A5C347ED9CD0"><enum>(f)</enum><header>Report to Congress</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, and annually thereafter, the Director shall submit to the appropriate committees of Congress a report that summarizes—</text><paragraph commented="no" display-inline="no-display-inline" id="H50563AFE87634685B4E121FC560C2231"><enum>(1)</enum><text display-inline="yes-display-inline">the meetings and collaboration of the Working Group during the year preceding the submission of the report; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H7EBECDBA328946F1A8E7BEC72B78734A"><enum>(2)</enum><text>the work planned by the Working Group for the year following the submission of the report.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="HC2487DB30AC34FBB874BE53849CA51C3"><enum>(g)</enum><header>Sunset</header><text>The requirements of this section shall terminate on the date that is 10 years after the date of the enactment of this Act.</text></subsection></section><section id="H225EEC9882394BED8F8816E0E3410149"><enum>5.</enum><header>Cooperation with foreign law enforcement agencies</header><subsection commented="no" display-inline="no-display-inline" id="HC9EFDD35C45A4A2F838CD0CD82B29B5B"><enum>(a)</enum><header>List of countries with highest occurrence of violations</header><text>Not later than 90 days after the date of enactment of this section, the Federal Trade Commission (in this section referred to as the <quote>Commission</quote>), in consultation with the Attorney General and the Secretary of State, shall identify a list of the top 10 foreign countries where the highest occurrence of violations of section 2 or 3 originate and harm individuals located in the United States or a territory thereof.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="H00D5359B69304B47A5CEAEAE51116C65"><enum>(b)</enum><header>FTC international agreements</header><paragraph commented="no" display-inline="no-display-inline" id="H42CC2EA2230A44899D0A5FBC13AFA384"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Using the list of foreign countries identified under subsection (a), the Commission, in coordination with the Secretary of State, may enter into agreements with such foreign countries to ensure the cooperation of any foreign law enforcement agency in the Commission's enforcement of this Act.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H31C4BBA384364244BFB54C44BA80CC8E"><enum>(2)</enum><header>Requirements</header><text>Any agreement entered into by the Commission under paragraph (1) shall be subject to the requirements described in section 6(j)(4) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/46">15 U.S.C. 46(j)(4)</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H3AD96E11DF044C3695836B4BFB1EECF9"><enum>(3)</enum><header>Report to Congress</header><text>Not later than 1 year after the date of enactment of this section, and annually thereafter, the Commission shall submit to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Energy and Commerce of the House of Representatives a report on the implementation of this subsection during the reporting period, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="H282ABCBE14C04F24ABB35A0B45BBECF7"><enum>(A)</enum><text display-inline="yes-display-inline">any new agreements with foreign countries (as described in paragraph (1)) entered into during such period;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H7654660DC9EC400998B1F54EC9A853F0"><enum>(B)</enum><text>any negotiations regarding new agreements or modifications to agreements with foreign countries during such period;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H6C473EFB9D824834A69CC6AC3AC6E380"><enum>(C)</enum><text>a description of the Commission's coordination with foreign law enforcement agencies to enforce alleged violations of section 3; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H44A58830CA414008AD3851A7C99396FB"><enum>(D)</enum><text>any challenges with cooperation of foreign law enforcement agencies (including with respect to foreign countries without an agreement under paragraph (1)) in the enforcement of section 3.</text></subparagraph></paragraph></subsection><subsection id="H249B56304875461C815154B0DAE38063"><enum>(c)</enum><header>DOJ review of international law enforcement agency agreements</header><paragraph commented="no" display-inline="no-display-inline" id="H8928C901533E419A822DF78AB78B8527"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 1 year after the date of enactment of this section, and not less frequently than every 5 years thereafter, the Attorney General shall review and, as necessary and consistent with authorities under applicable law, modify international agreements with foreign law enforcement agencies in foreign countries identified under subsection (a) to encourage assistance with the enforcement of violations of section 223(i) of the Communications Act of 1934, as added by section 2 of this Act, that originate outside the United States.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HBAA6DEC709AA4BD9A168B4E3A3A88123"><enum>(2)</enum><header>Report</header><text>Not later than 1 year after the date of enactment of this section, and every 5 years thereafter, the Attorney General shall submit to the Committee on Commerce, Science, and Transportation of the Senate, the Committee on the Judiciary of the Senate, the Committee on Energy and Commerce of the House of Representatives, and the Committee on the Judiciary of the House of Representatives a report that includes—</text><subparagraph commented="no" display-inline="no-display-inline" id="H1E5459417AF6471D8AACC06A5D5474A2"><enum>(A)</enum><text display-inline="yes-display-inline">an analysis of the review conducted under paragraph (1);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H4AC632A3157A437A8C6F4EA9BE195BC5"><enum>(B)</enum><text>a description of any modifications to international agreements described in paragraph (1) pursued by the Attorney General; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HD90455A0544A4BB6A5F1D409B84F411B"><enum>(C)</enum><text>recommendations to strengthen the enforcement of violations of section 223(i) of the Communications Act of 1934, as added by section 2 of this Act, that—</text><clause commented="no" display-inline="no-display-inline" id="H8D625AA0014B403C9BD24AB6AF69C981"><enum>(i)</enum><text display-inline="yes-display-inline">originate outside the United States; and</text></clause><clause commented="no" display-inline="no-display-inline" id="H8D47A4506D274E54B5431279596830A8"><enum>(ii)</enum><text>harm United States persons located in the United States.</text></clause></subparagraph></paragraph></subsection></section><section id="HFA01949325AB449E816D1668D4844523"><enum>6.</enum><header>Savings clause</header><text display-inline="no-display-inline">Nothing in this Act shall be construed to restrict parody, satire, journalism, or any other rights, privileges, or immunities protected by the First Amendment to the Constitution of the United States.</text></section></legis-body></bill> 

