<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-RIL26166-HHC-Y1-R10"><form><distribution-code display="yes">II</distribution-code><congress>119th CONGRESS</congress><session>2d Session</session><legis-num>S. 3982</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20260304">March 4, 2026</action-date><action-desc><sponsor name-id="S435">Mr. Sheehy</sponsor> (for himself and <cosponsor name-id="S430">Ms. Blunt Rochester</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To establish protections against digital impersonation fraud, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>AI Fraud Accountability  Act of 2026</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="id8f9a5e6fe1164c9cb9f5c20872dac3ab"><enum>2.</enum><header>Criminal prohibition on use of digital impersonations to commit fraud</header><subsection commented="no" display-inline="no-display-inline" id="id4aac79ec9e44431a80abed9a335633e7"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Section 223 of the Communications Act of 1934 (47 U.S.C. 223) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idbb4db44c41b942c0a8998a7ee6ca1956"><enum>(1)</enum><text>by redesignating subsection (i) as subsection (j); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2ff807d9095f4601a8e5abf412a5993f"><enum>(2)</enum><text>by inserting after subsection (h) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6f54def375e545c8990720f31f354b1d"><subsection id="id696c9f78688a426dbed86d31b11cbd6a">
              <enum>(i)</enum>
              <header>Use of digital impersonations To commit fraud</header>
              <paragraph commented="no" display-inline="no-display-inline"
                id="id1cd1eb16c0654344819941e1d185e268">
                <enum>(1)</enum>
                <header>Definitions</header>
                <text>In this subsection:</text>
                <subparagraph id="idfcdd53ddb2634d27b71b99d8ffdb3275">
                  <enum>(A)</enum>
                  <header>Digital impersonation</header>
                  <text>The term <term>digital impersonation</term> means any visual or audio
                    depiction of—</text>
                  <clause commented="no" display-inline="no-display-inline"
                    id="ideea206352c0b4135993060d318064761">
                    <enum>(i)</enum>
                    <text display-inline="yes-display-inline">an identifiable individual created
                      through the use of software, machine learning, artificial intelligence, or any
                      other computer-generated or technological means, including by adapting,
                      modifying, manipulating, or altering an authentic visual or audio depiction,
                      that, when viewed or listened to as a whole by a reasonable person, is
                      indistinguishable from an authentic visual or audio depiction of the
                      individual; or</text>
                  </clause>
                  <clause id="idee4a96149ab746779dcca57fda4fd3e3">
                    <enum>(ii)</enum>
                    <text>an imaginary individual created through the use of software, machine
                      learning, artificial intelligence, or any other computer-generated or
                      technological means, including by adapting, modifying, manipulating, or
                      altering an authentic visual or audio depiction of an imaginary individual,
                      that, when viewed or listened to as a whole by a reasonable person, is
                      indistinguishable from a visual or audio depiction of a real
                      individual.</text>
                  </clause>
                </subparagraph>
                <subparagraph id="ida4d125b9749540b5bc772efb6d5e1a80">
                  <enum>(B)</enum>
                  <header>Identifiable individual</header>
                  <text>The term <term>identifiable individual</term> means an individual—</text>
                  <clause id="id21bf504f79fa4c13afd39d6c45359681">
                    <enum>(i)</enum>
                    <text>who appears in whole or in part, or is heard, in a digital impersonation;
                      and</text>
                  </clause>
                  <clause id="id6b181537943443f699661f880cda7510">
                    <enum>(ii)</enum>
                    <text>whose face, likeness, voice, or other distinguishing characteristic
                      (including a unique birthmark or other recognizable feature) is displayed or
                      heard in connection with such digital impersonation.</text>
                  </clause>
                </subparagraph>
              </paragraph>
              <paragraph id="idec39d8ce319a43098f9293a4c0c633ad">
                <enum>(2)</enum>
                <header>Offense</header>
                <subparagraph id="id7eb492434bea4f2c88d33f62a00f0ef3">
                  <enum>(A)</enum>
                  <header>In general</header>
                  <text>Subject to subparagraph (B), it shall be unlawful for a person, in
                    interstate or foreign communications, to falsely pose as an identifiable
                    individual or imaginary individual, in a manner intended to be taken as genuine,
                    in a digital impersonation, with intent to defraud a person of any money, paper,
                    document, or thing of value.</text>
                </subparagraph>
                <subparagraph id="id7654925f7c2f421a84caf992ab706ba0">
                  <enum>(B)</enum>
                  <header>Exceptions</header>
                  <text>Subparagraph (A) shall not apply to a lawfully authorized investigative,
                    protective, or intelligence activity of—</text>
                  <clause id="id05ef6b2dc750402098d26d4ccbf3f22a">
                    <enum>(i)</enum>
                    <text>a law enforcement agency of the United States, a State, or a political
                      subdivision of a State; or</text>
                  </clause>
                  <clause id="id6044c76ad1f442e2aade69c5d1b9ffe7">
                    <enum>(ii)</enum>
                    <text>an intelligence agency of the United States;</text>
                  </clause>
                </subparagraph>
              </paragraph>
              <paragraph id="id54c1bcf4cbf849e4a2b3593177255ffa">
                <enum>(3)</enum>
                <header>Penalties</header>
                <text>Any person who violates paragraph (2) shall be fined under title 18, United
                  States Code, imprisoned not more than 3 years, or both.</text>
              </paragraph>
              <paragraph id="id3dd2f5689f434e408e4e400c3e689ffe">
                <enum>(4)</enum>
                <header>Threats</header>
                <text>Any person who intentionally threatens to commit the offense under paragraph
                  (2) for the purpose of intimidation, coercion, extortion, or to create mental
                  distress shall be punished as provided in paragraph (3).</text>
              </paragraph>
              <paragraph id="id36297cfe906047dcbf8a53a965d8812a">
                <enum>(5)</enum>
                <header>Forfeiture</header>
                <subparagraph commented="no" display-inline="no-display-inline"
                  id="id69322360950d45379c786aec26120562">
                  <enum>(A)</enum>
                  <header display-inline="yes-display-inline">In general</header>
                  <text display-inline="yes-display-inline">The court, in imposing a sentence on any
                    person convicted of a violation of paragraph (2), shall order, in addition to
                    any other sentence imposed and irrespective of any other sentence imposed and
                    irrespective of any provision of State law, that the person forfeit to the
                    United States—</text>
                  <clause id="id226e66970eca45c68442109a65932ebc">
                    <enum>(i)</enum>
                    <text>the person’s interest in property, real or personal, constituting or
                      derived from any gross proceeds of the violation, or any property traceable to
                      such property, obtained or retained directly or indirectly as a result of the
                      violation; and</text>
                  </clause>
                  <clause id="id863f513dc35e4096a6065d16ad172477">
                    <enum>(ii)</enum>
                    <text>any personal property of the person used, or intended to be used, in any
                      manner or part, to commit or to facilitate the commission of the
                      violation.</text>
                  </clause>
                </subparagraph>
                <subparagraph id="id3513efd8cc3142c18a1f54017bd24d8d">
                  <enum>(B)</enum>
                  <header>Procedures</header>
                  <text>Section 413 of the Controlled Substances Act (21 U.S.C. 853), with the
                    exception of subsections (a) and (d), shall apply to the criminal forfeiture of
                    property under subparagraph (A).</text>
                </subparagraph>
              </paragraph>
              <paragraph id="id6610f892f0c5415b86738cbb0182a89c">
                <enum>(6)</enum>
                <header>Extraterritorial jurisdiction</header>
                <text>There is extraterritorial Federal jurisdiction over an offense under paragraph
                  (2).</text>
              </paragraph>
            </subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="ida99603a560994c8da8455764217a5c4d" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Defenses</header><text>Section 223(e)(1) of the Communications Act of 1934 (47 U.S.C. 223(e)(1)) is amended by striking <quote>or (h)</quote> and inserting <quote>(h), or (i)</quote>.</text></subsection></section><section id="id6bd3638bae50496b9d3477ebb3d88ba3"><enum>3.</enum><header>Protection against digital impersonation fraud</header><subsection commented="no" display-inline="no-display-inline" id="ida7191e4baa0440cd9c3fd694422ebb6f"><enum>(a)</enum><header display-inline="yes-display-inline">Prohibition</header><paragraph id="id6457cace3ae9449ca91059664e76da4c"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (2), it shall be unlawful for a person, in interstate or foreign commerce, to falsely pose as an identifiable or imaginary individual in a manner intended to be taken as genuine, in a digital impersonation, with intent to defraud a person of any money, paper, document, or thing of value.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5b9c603e534d485499516810478d84f4"><enum>(2)</enum><header>Exception</header><text>The prohibition described in paragraph (1) shall not apply to a lawfully authorized investigative, protective, or intelligence activity of—</text><subparagraph id="id706ec5298af14842a6f64660f46520be"><enum>(A)</enum><text>a law enforcement agency of the United States, a State, or a political subdivision of a State; or</text></subparagraph><subparagraph id="id7dce1ba05fb74b4399b1740adc7f1cb1"><enum>(B)</enum><text>an intelligence agency of the United States.</text></subparagraph></paragraph></subsection><subsection id="id1f8aa45c518946aaa7174afd92c84b6d"><enum>(b)</enum><header>Enforcement by the Commission</header><paragraph id="idfb849e92eb784d0a93f66a70e1aceea8"><enum>(1)</enum><header>Unfair or deceptive acts or practices</header><text>A violation of subsection (a) shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (15 U.S.C. 57a(a)(1)(B)).</text></paragraph><paragraph id="id59db6e8623b94dcf9aeb1e8cf78109c7"><enum>(2)</enum><header>Powers of the Commission</header><subparagraph id="id00c7de6b92c14c6aacc4f3629657e461"><enum>(A)</enum><header>In general</header><text>The Commission shall enforce this section in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (15 U.S.C. 41 et seq.) were incorporated into and made a part of this section.</text></subparagraph><subparagraph id="idebc0846af84f4996afa37690676aa0e3"><enum>(B)</enum><header>Privileges and immunities</header><text>Any person who violates subsection (a) shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act (15 U.S.C. 41 et seq.).</text></subparagraph><subparagraph id="id21d4442640e448ef82744d6739043696"><enum>(C)</enum><header>Authority preserved</header><text>Nothing in this Act shall be construed to limit the authority of the Commission under any other provision of law.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id56478cc3b6134d759689106fe45350dd"><enum>(c)</enum><header>Definitions</header><text>For purposes of this section:</text><paragraph id="id5a393618384443679400a15fc7c0515e"><enum>(1)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id80c2899d83a749a88f624f8749e6ecf4"><enum>(2)</enum><header>Digital impersonation; identifiable individual</header><text>The terms <term>digital impersonation</term> and <term>identifiable individual</term> have the meaning given such terms in section 223(i) of the Communications Act of 1934 (47 U.S.C. 223(i)), as added by section 2 of this Act.</text></paragraph></subsection></section><section id="id96cd0c4cf8614e53a9623822c0d953a8"><enum>4.</enum><header>Working group on digital impersonation fraud</header><subsection commented="no" display-inline="no-display-inline" id="id7de43e69d4d040af89f299974d5453b8"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id61ca0d14065b485eb4bc484932027494"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="id946d17f069b545c7b31b077d7e9fc30e"><enum>(A)</enum><text display-inline="yes-display-inline">the Committee on Commerce, Science, and Transportation of the Senate; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4301a3b69e334cf99f0f03ffb7c3c404"><enum>(B)</enum><text>the Committee on Science, Space, and Technology of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id46df97023e7e45f981e84e01c1ce67a7"><enum>(2)</enum><header>Digital forensics</header><text>The term <term>digital forensics</term> means scientific or technical practices used to recognize, collect, analyze, or interpret digital evidence for the purposes of investigating crimes or other incidents, including the use of digital impersonation to commit fraud.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idfcc3219229a347ec80c9c924b52d8e62"><enum>(3)</enum><header>Digital impersonation</header><text>The term <term>digital impersonation</term> has the meaning given that term in section 223(i) of the Communications Act of 1934 (47 U.S.C. 223(i)), as added by section 2 of this Act.</text></paragraph><paragraph id="id401aa5f4129944c3b8199d552133ce30"><enum>(4)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the National Institute of Standards and Technology.</text></paragraph></subsection><subsection id="id0ff352386ab84ee3b0578912740a1a62"><enum>(b)</enum><header>Establishment of Working Group</header><paragraph commented="no" display-inline="no-display-inline" id="id45a51a8c4755475d8b0addb5b6ce5dd3"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 30 days after the date of the enactment of this Act, the Secretary of Commerce, acting through the Director, shall convene a working group (referred to in this section as the <quote>Working Group</quote>) to engage in technical discussions and research for the development of best practices and recommendations for the recognition, detection, prevention, and tracing of digital impersonations used in violation of section 223(i) of the Communications Act of 1934 (47 U.S.C. 223(i)), as amended by section 2 of this Act, and section 3(a) of this Act.</text></paragraph><paragraph id="id5f6e255c113749c2b9f11025dc0308c7"><enum>(2)</enum><header>Composition</header><text>The Working Group shall consist of—</text><subparagraph commented="no" display-inline="no-display-inline" id="idd035fe21984949b28d733a6800d52ab6"><enum>(A)</enum><text display-inline="yes-display-inline">representatives from—</text><clause commented="no" display-inline="no-display-inline" id="id1be250fc82e94cc794c6a0e0191f47a1"><enum>(i)</enum><text display-inline="yes-display-inline">the Department of Justice;</text></clause><clause commented="no" display-inline="no-display-inline" id="id9a5277da07694925af73e71cef67cf40"><enum>(ii)</enum><text>the Federal Trade Commission;</text></clause><clause commented="no" display-inline="no-display-inline" id="id484f88db9de94907bdaf3c4b2e51933a"><enum>(iii)</enum><text>Federal, State, and local government law enforcement agencies; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id584af4316a2948d68b0f22bd8836fb97"><enum>(iv)</enum><text>private sector industries, including—</text><subclause commented="no" display-inline="no-display-inline" id="id81d1fd06e55e496d92b3f0d3657c9476"><enum>(I)</enum><text>financial services;</text></subclause><subclause id="idc81907bd92b84eac8489a8e8539bdbb5"><enum>(II)</enum><text>health care;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id306b84a91c9d4d3f83e06c0a29f2b1ac"><enum>(III)</enum><text>retail and e-commerce;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id7fc3e943b7ef4e93b471d75511369636"><enum>(IV)</enum><text display-inline="yes-display-inline">telecommunications; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idb91d886c4bc647358b932cb24cdcec9b"><enum>(V)</enum><text display-inline="yes-display-inline">digital platforms, including social media platforms; and</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3bcf74748ed0430c8df5be0633b42f11"><enum>(B)</enum><text display-inline="yes-display-inline">scientists and engineers with expertise in—</text><clause commented="no" display-inline="no-display-inline" id="id3a90dbbcec514b20927f8bc73f2f746a"><enum>(i)</enum><text display-inline="yes-display-inline">digital forensics; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idda6ce5ba1adf425b8c49964111515774"><enum>(ii)</enum><text>artificial intelligence, including the generation or detection of digital impersonations.</text></clause></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="iddab94a2530b8458ba5cc357d5b2f8b07"><enum>(c)</enum><header>Public workshop</header><text>The Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id006f95fcd98b4415bbfdb45db61e5f01"><enum>(1)</enum><text display-inline="yes-display-inline">convene not less than 1 public workshop to solicit input from stakeholders on the best practices and recommendations developed under subsection (b)(1); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idadd9ca53e2d64881906663d211dab315"><enum>(2)</enum><text>incorporate such input into the best practices and recommendations as the Director considers appropriate.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id0ad0d1bfad7249389f4cfe64aa23dddb"><enum>(d)</enum><header>Publication of best practices and recommendations</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Director shall publish on a publicly accessible website of the National Institute of Standards and Technology a report that contains the best practices and recommendations developed pursuant to subsection (b)(1) and modified under subsection (c)(2).</text></subsection><subsection id="idaea1ee81d9f54b17854682bc57469e10"><enum>(e)</enum><header>Annual review and updates</header><text>Not later than 2 years after the date of the enactment of this Act, and not less frequently than once each year thereafter, the Director shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id3286e1767c1c43fabb68b23f7dc57b07"><enum>(1)</enum><text display-inline="yes-display-inline">review the best practices and recommendations developed under this section; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id45d8d9d7795743b8abbc6075e15dc652"><enum>(2)</enum><text>update the best practices and recommendations published under subsection (d) as the Director considers appropriate pursuant to the most recent review conducted pursuant to paragraph (1) of this subsection.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ide3e1f02d35b74613a1eb3ad31c9ec929"><enum>(f)</enum><header>Report to Congress</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, and annually thereafter, the Director shall submit to the appropriate committees of Congress a report that summarizes—</text><paragraph commented="no" display-inline="no-display-inline" id="ided263da8243c48cd9da601d287568f42"><enum>(1)</enum><text display-inline="yes-display-inline">the meetings and collaboration of the Working Group during the year preceding the submission of the report; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id27e8318798804e3fa24dc4a9477b2593"><enum>(2)</enum><text>the work planned by the Working Group for the year following the submission of the report.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ida212612d03ce46e7bf47700c36949319"><enum>(g)</enum><header>Sunset</header><text>The requirements of this section shall terminate on the date that is 10 years after the date of the enactment of this Act.</text></subsection></section><section id="iddd5d7c2091084b719d0c27008528f01b"><enum>5.</enum><header>Cooperation with foreign law enforcement agencies</header><subsection commented="no" display-inline="no-display-inline" id="id82f122050b684abf8a05b3b1787e0316"><enum>(a)</enum><header>List of countries with highest occurrence of violations</header><text>Not later than 90 days after the date of enactment of this section, the Federal Trade Commission (in this section referred to as the <quote>Commission</quote>), in consultation with the Attorney General and the Secretary of State, shall identify a list of the top 10 foreign countries where the highest occurrence of violations of section 2 or 3 originate and harm individuals located in the United States or a territory thereof.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idd6d336af457d4b98b8223d072bbb9c01"><enum>(b)</enum><header>FTC international agreements</header><paragraph commented="no" display-inline="no-display-inline" id="ide6c1c4da3b1f4b13b03deaedf180dfec"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Using the list of foreign countries identified under subsection (a), the Commission, in coordination with the Secretary of State, may enter into agreements with such foreign countries to ensure the cooperation of any foreign law enforcement agency in the Commission's enforcement of this Act.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbf1bf7da1af1425eb5fa7892e074562f"><enum>(2)</enum><header>Requirements</header><text>Any agreement entered into by the Commission under paragraph (1) shall be subject to the requirements described in section 6(j)(4) of the Federal Trade Commission Act (15 U.S.C. 46(j)(4)).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc5ef9561af20463495c356cca6c6361b"><enum>(3)</enum><header>Report to Congress</header><text>Not later than 1 year after the date of enactment of this section, and annually thereafter, the Commission shall submit to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Energy and Commerce of the House of Representatives a report on the implementation of this subsection during the reporting period, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="idd8e6cf7e688d48929e640cbdf4522ed2"><enum>(A)</enum><text display-inline="yes-display-inline">any new agreements with foreign countries (as described in paragraph (1)) entered into during such period;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3bf8fdb8cd1b4aa6af5e25c73f002cfc"><enum>(B)</enum><text>any negotiations regarding new agreements or modifications to agreements with foreign countries during such period;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4f018fc51f0d430fafe790f49819dcfe"><enum>(C)</enum><text>a description of the Commission's coordination with foreign law enforcement agencies to enforce alleged violations of section 3; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc43e9176be7c4cb996cd2e33792261d9"><enum>(D)</enum><text>any challenges with cooperation of foreign law enforcement agencies (including with respect to foreign countries without an agreement under paragraph (1)) in the enforcement of section 3.</text></subparagraph></paragraph></subsection><subsection id="ide26ce6aebf3643918b8308ca9aa03b02"><enum>(c)</enum><header>DOJ review of international law enforcement agency agreements</header><paragraph commented="no" display-inline="no-display-inline" id="id0ee9a1e0a0df4da1a35e2588d3c7b9ea"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 1 year after the date of enactment of this section, and not less frequently than every 5 years thereafter, the Attorney General shall review and, as necessary and consistent with authorities under applicable law, modify international agreements with foreign law enforcement agencies in foreign countries identified under subsection (a) to encourage assistance with the enforcement of violations of section 223(i) of the Communications Act of 1934, as added by section 2 of this Act, that originate outside the United States.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idbf874623fcc34d7f9fe4c8b683b6ba42"><enum>(2)</enum><header>Report</header><text>Not later than 1 year after the date of enactment of this section, and every 5 years thereafter, the Attorney General shall submit to the Committee on Commerce, Science, and Transportation of the Senate, the Committee on the Judiciary of the Senate, the Committee on Energy and Commerce of the House of Representatives, and the Committee on the Judiciary of the House of Representatives a report that includes—</text><subparagraph commented="no" display-inline="no-display-inline" id="idea20ebc65c1d44cd89b60ee2b29d649a"><enum>(A)</enum><text display-inline="yes-display-inline">an analysis of the review conducted under paragraph (1);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idc4c1555ab1fb4bf7b04059de07917567"><enum>(B)</enum><text>a description of any modifications to international agreements described in paragraph (1) pursued by the Attorney General; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id124c818f9d76475a8c4e8c1658f5ceb4"><enum>(C)</enum><text>recommendations to strengthen the enforcement of violations of section 223(i) of the Communications Act of 1934, as added by section 2 of this Act, that—</text><clause commented="no" display-inline="no-display-inline" id="id6335ef98d5054bf68a69d57a703de22b"><enum>(i)</enum><text display-inline="yes-display-inline">originate outside the United States; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idb7c082dfebe9462686bd2ef86fbbf481"><enum>(ii)</enum><text>harm United States persons located in the United States.</text></clause></subparagraph></paragraph></subsection></section><section id="id90cc913f70104222b61ee52e2a85d30c"><enum>6.</enum><header>Savings clause</header><text display-inline="no-display-inline">Nothing in this Act shall be construed to restrict parody, satire, journalism, or any other rights, privileges, or immunities protected by the First Amendment to the Constitution of the United States.</text></section></legis-body></bill>
