<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-BAG26447-S0T-9L-3VP"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 S4230 IS: Protecting Stolen Encrypted Data Act of 2026</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2026-03-26</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>119th CONGRESS</congress><session>2d Session</session><legis-num>S. 4230</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20260326">March 26, 2026</action-date><action-desc><sponsor name-id="S388">Ms. Hassan</sponsor> (for herself and <cosponsor name-id="S396">Mrs. Blackburn</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SLIN00">Select Committee on Intelligence</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To require the Federal Government to identify and address stolen sensitive data and classified information, and for other purposes.</official-title></form><legis-body><section id="id79a0a3cd28314c779d5d974cbf3dd631" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Protecting Stolen Encrypted Data Act of 2026</short-title></quote>.</text></section><section section-type="subsequent-section" id="id9453f86d466f47bd9eefcb6b3fcbd9f8"><enum>2.</enum><header>Addressing stolen sensitive data</header><subsection commented="no" display-inline="no-display-inline" id="id945ba8b896284d34942ee1886cc51202"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="idd7e44aa65e0e4a67a86da05b28edf08b"><enum>(1)</enum><header>Classified information</header><text>The term <term>classified information</term> has the meaning given such term in section 805 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3164">50 U.S.C. 3164</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd3ea176d8dd241198142f1385f85175f"><enum>(2)</enum><header>Covered data</header><text>The term <term>covered data</term> means includes the following:</text><subparagraph commented="no" display-inline="no-display-inline" id="id350f13610daf4dd28ec8352fe47e3f3b"><enum>(A)</enum><text display-inline="yes-display-inline">Financial, medical, and biometric data of United States persons.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1493715435604cf58a769441b1874b72"><enum>(B)</enum><text display-inline="yes-display-inline">Intellectual property of United States persons.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id891d3785353f4c819452bc47aec528a2"><enum>(C)</enum><text>Trade secrets of United States persons.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc853022376df41c5a24486dbdb32a52c"><enum>(3)</enum><header>United States person</header><text>The term <term>United States person</term> has the meaning given such term in section 101 of the Foreign Intelligence Surveillance Act of 1978 (<external-xref legal-doc="usc" parsable-cite="usc/50/1801">50 U.S.C. 1801</external-xref>).</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id0161031ce18e4cff8b1c51ed9d35f95f"><enum>(b)</enum><header>Addressing stolen sensitive data</header><paragraph commented="no" display-inline="no-display-inline" id="id4035affed20d4d54a0d45bb568a5d089"><enum>(1)</enum><header display-inline="yes-display-inline">Strategies to identify</header><text>The President shall, acting through the Secretary of Defense and the Director of National Intelligence, develop strategies to identify—</text><subparagraph commented="no" display-inline="no-display-inline" id="id3fb342edadc640918d6ba128ac5239c9"><enum>(A)</enum><text display-inline="yes-display-inline">covered data and classified information unlawfully held by foreign entities;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id4e30e8961897487c8740064e759bc3a7"><enum>(B)</enum><text display-inline="yes-display-inline">whether such data and information were encrypted; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id769780de51f240339294592c80c4893f"><enum>(C)</enum><text display-inline="yes-display-inline">whether such data and information have been decrypted by such foreign entities.</text></subparagraph></paragraph><paragraph id="id065652271fcd4d7696b15f186e5d5f0d"><enum>(2)</enum><header>Strategies to address</header><text>The President shall, acting through the Secretary of Defense and the Director of National Intelligence, develop strategies regarding how to address stolen covered data and classified information.</text></paragraph><paragraph id="id6f3fef5c77ab4dc5985c859770f37cfe"><enum>(3)</enum><header>Destruction, manipulation, or recovery</header><subparagraph commented="no" display-inline="no-display-inline" id="id7f05696af5884adf91c0c117632038a1"><enum>(A)</enum><header>Determination of economic and national security interest</header><text display-inline="yes-display-inline">The Secretary and the Director shall jointly determine whether the destruction, manipulation, or recovery of covered data and classified information identified pursuant to the strategies developed under paragraph (1) would be in the economic and national security interest of the United States.</text></subparagraph><subparagraph id="id013d5fe6f1a445559864ab69c1e45552"><enum>(B)</enum><header>Destruction, manipulation, or recovery</header><text>In a case in which the Secretary and the Director jointly determine under subparagraph (A) that destroying, manipulating, or recovering covered data or classified information is in the economic and national security interested of the United States, the Secretary and the Director may jointly—</text><clause id="ide10da1613d3b43c0a056e88899bfcc51"><enum>(i)</enum><text>pursuant to strategies required by paragraph (1), identify encrypted covered data and classified information that is unlawfully held by a foreign entity that has not been decrypted by the foreign entity;</text></clause><clause id="id756b3b8d52d84a7b8e2b25d682df28f3"><enum>(ii)</enum><text>pursuant to the strategies required by paragraph (2), attempt to destroy, manipulate, or recover the data and information identified pursuant to clause (i); and</text></clause><clause id="idf2d0fa5acfd348f29885035632a69a2c"><enum>(iii)</enum><text>when practicable, inform the lawful owners of covered data or classified information—</text><subclause commented="no" display-inline="no-display-inline" id="id59c5e60bacd9421ea475539f6cbed2af"><enum>(I)</enum><text display-inline="yes-display-inline">of the intent of the Secretary or the Director, as the case may be, to destroy, manipulate, or recover the covered data or classified information; and</text></subclause><subclause id="idd784a6e605a24d109657f12e6b6229fb"><enum>(II)</enum><text>upon successful destruction, manipulation, or recovery of the covered data or classified information.</text></subclause></clause></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id618e37f7673f4639985651021c1c1a1d"><enum>(c)</enum><header>Report</header><paragraph commented="no" display-inline="no-display-inline" id="id1ed68faf8c7c44529ea66e6fa02c0b08"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 1 year after the date of the enactment of this Act, the Secretary and the Director shall jointly submit to Congress a report on the strategies developed under paragraphs (1) and (2) of subsection (c) and the actions taken under paragraph (3) of such subsection.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc35486d127744b1fb91144204752261e"><enum>(2)</enum><header>Recommendations</header><text display-inline="yes-display-inline">The report submitted pursuant to paragraph (1) shall include such recommendations as the Secretary and the Director may have for legislative or administrative action to carry out subsection (c).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0497a6643f3949369a3f09199840a280"><enum>(3)</enum><header>Form</header><text display-inline="yes-display-inline">The report submitted pursuant to paragraph (1) shall be submitted in unclassified form, but may include a classified annex.</text></paragraph></subsection></section></legis-body></bill>

