[Congressional Record Volume 164, Number 62 (Tuesday, April 17, 2018)]
[House]
[Pages H3377-H3381]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]




              PROTECTING CHILDREN FROM IDENTITY THEFT ACT

  Mr. CURBELO of Florida. Mr. Speaker, pursuant to House Resolution 
830, I call up the bill (H.R. 5192) to authorize the Commissioner of 
Social Security to provide confirmation of fraud protection data to 
certain permitted entities, and for other purposes, and ask for its 
immediate consideration in the House.
  The Clerk read the title of the bill.
  The SPEAKER pro tempore (Mr. Stewart). Pursuant to House Resolution 
830, in lieu of the amendment in the nature of a substitute recommended 
by the Committee on Ways and Means printed in the bill, an amendment in 
the nature of a substitute consisting of the text of Rules Committee 
Print 115-68 is adopted, and the bill, as amended, is considered read.
  The text of the bill, as amended, is as follows:

                               H.R. 5192

       Be it enacted by the Senate and House of Representatives of 
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE.

       This Act may be cited as the ``Protecting Children from 
     Identity Theft Act''.

     SEC. 2. REDUCING IDENTITY FRAUD.

       (a) Purpose.--The purpose of this section is to reduce the 
     prevalence of synthetic identity fraud, which 
     disproportionally affects vulnerable populations, such as 
     minors and recent immigrants, by facilitating the validation 
     by permitted entities of fraud protection data, pursuant to 
     electronically received consumer consent, through use of a 
     database maintained by the Commissioner.
       (b) Definitions.--In this section:
       (1) Commissioner.--The term ``Commissioner'' means the 
     Commissioner of the Social Security Administration.
       (2) Financial institution.--The term ``financial 
     institution'' has the meaning given the term in section 509 
     of the Gramm-Leach-Bliley Act (15 U.S.C. 6809).
       (3) Fraud protection data.--The term ``fraud protection 
     data'' means a combination of the following information with 
     respect to an individual:
       (A) The name of the individual (including the first name 
     and any family forename or surname of the individual).
       (B) The Social Security account number of the individual.
       (C) The date of birth (including the month, day, and year) 
     of the individual.
       (4) Permitted entity.--The term ``permitted entity'' means 
     a financial institution or a service provider, subsidiary, 
     affiliate, agent, contractor, or assignee of a financial 
     institution.
       (c) Efficiency.--
       (1) Reliance on existing methods.--The Commissioner shall 
     evaluate the feasibility of making modifications to any 
     database that is in existence as of the date of enactment of 
     this Act or a similar resource such that the database or 
     resource--
       (A) is reasonably designed to effectuate the purpose of 
     this section; and
       (B) meets the requirements of subsection (d).
       (2) Execution.--The Commissioner shall establish a system 
     to carry out subsection (a), in accordance with section 1106 
     of the Social Security Act. In doing so, the Commissioner 
     shall make the modifications necessary to any database that 
     is in existence as of the date of enactment of this Act or 
     similar resource, or develop a database or similar resource.
       (d) Protection of Vulnerable Consumers.--The database or 
     similar resource described in subsection (c) shall--
       (1) compare fraud protection data provided in an inquiry by 
     a permitted entity against such information maintained by the 
     Commissioner in order to confirm (or not confirm) the 
     validity of the information provided, and in such a manner as 
     to deter fraudulent use of the database or similar resource;
       (2) be scalable and accommodate reasonably anticipated 
     volumes of verification requests from permitted entities with 
     commercially reasonable uptime and availability; and
       (3) allow permitted entities to submit--
       (A) one or more individual requests electronically for 
     real-time machine-to-machine (or similar functionality) 
     accurate responses; and
       (B) multiple requests electronically, such as those 
     provided in a batch format, for accurate electronic responses 
     within a reasonable period of time from submission, not to 
     exceed 24 hours.
       (e) Certification Required.--Before providing confirmation 
     of fraud protection data to a permitted entity, the 
     Commissioner shall ensure that the Commissioner has a 
     certification from the permitted entity that is dated not 
     more than 2 years before the date on which that confirmation 
     is provided that includes the following declarations:
       (1) The entity is a permitted entity.
       (2) The entity is in compliance with this section.

[[Page H3378]]

       (3) The entity is, and will remain, in compliance with its 
     privacy and data security requirements, as described in title 
     V of the Gramm-Leach-Bliley Act (15 U.S.C. 6801 et seq.) and 
     as required by the Commissioner, with respect to information 
     the entity receives from the Commissioner pursuant to this 
     section.
       (4) The entity will retain sufficient records to 
     demonstrate its compliance with its certification and this 
     section for a period of not less than 2 years.
       (f) Consumer Consent.--
       (1) In general.--Notwithstanding any other provision of law 
     or regulation, a permitted entity may submit a request to the 
     database or similar resource described in subsection (c) 
     only--
       (A) pursuant to the written, including electronic, consent 
     received by a permitted entity from the individual who is the 
     subject of the request; and
       (B) in connection with any circumstance described in 
     section 604 of the Fair Credit Reporting Act (15 U.S.C. 
     1681b).
       (2) Electronic consent requirements.--For a permitted 
     entity to use the consent of an individual received 
     electronically pursuant to paragraph (1)(A), the permitted 
     entity must obtain the individual's electronic signature, as 
     defined in section 106 of the Electronic Signatures in Global 
     and National Commerce Act (15 U.S.C. 7006). Permitted 
     entities must develop and use an electronic signature process 
     in accordance with all Federal laws and requirements as 
     designated by the Commissioner.
       (3) Effectuating electronic consent.--No provision of law 
     or requirement, including section 552a of title 5, United 
     States Code, shall prevent the use of electronic consent for 
     purposes of this subsection or for use in any other consent 
     based verification under the discretion of the Commissioner.
       (g) Compliance and Enforcement.--
       (1) Audits and monitoring.--
       (A) In general.--The Commissioner--
       (i) shall conduct audits and monitoring to--

       (I) ensure proper use by permitted entities of the database 
     or similar resource described in subsection (c); and
       (II) deter fraud and misuse by permitted entities with 
     respect to the database or similar resource described in 
     subsection (c); and

       (ii) may terminate services for any permitted entity that 
     prevents or refuses to allow the Commissioner to carry out 
     the activities described in clause (i) and may terminate or 
     suspend services for any permitted entity as necessary to 
     enforce any violation of this section or of any certification 
     made under this section.
       (2) Enforcement.--
       (A) In general.--Notwithstanding any other provision of 
     law, including the matter preceding paragraph (1) of section 
     505(a) of the Gramm-Leach-Bliley Act (15 U.S.C. 6805(a)), any 
     violation of this section and any certification made under 
     this section shall be enforced in accordance with paragraphs 
     (1) through (7) of such section 505(a) by the agencies 
     described in those paragraphs.
       (B) Relevant information.--Upon discovery by the 
     Commissioner of any violation of this section or any 
     certification made under this section, the Commissioner shall 
     forward any relevant information pertaining to that violation 
     to the appropriate agency described in subparagraph (A) for 
     evaluation by the agency for purposes of enforcing this 
     section.
       (h) Recovery of Costs.--
       (1) In general.--
       (A) In general.--Amounts obligated to carry out this 
     section shall be fully recovered from the users of the 
     database or verification system by way of advances, 
     reimbursements, user fees, or other recoveries as determined 
     by the Commissioner. The funds recovered under this paragraph 
     shall be deposited as an offsetting collection to the account 
     providing appropriations for the Social Security 
     Administration, to be used for the administration of this 
     section without fiscal year limitation.
       (B) Prices fixed by commissioner.--The Commissioner shall 
     establish the amount to be paid by the users under this 
     paragraph, including the costs of any services or work 
     performed, such as any appropriate upgrades, maintenance, and 
     associated direct and indirect administrative costs, in 
     support of carrying out the purposes described in this 
     section, by reimbursement or in advance as determined by the 
     Commissioner. The amount of such prices shall be periodically 
     adjusted by the Commissioner to ensure that amounts collected 
     are sufficient to fully offset the cost of the administration 
     of this section.
       (2) Initial development.--The Commissioner shall not begin 
     development of a verification system to carry out this 
     section until the Commissioner determines that amounts equal 
     to at least 50 percent of program start-up costs have been 
     collected under paragraph (1).
       (3) Existing resources.--The Commissioner of Social 
     Security may use funds designated for information technology 
     modernization to carry out this section, but in all cases 
     shall be fully reimbursed under paragraph (1)(A).
       (4) Annual report.--The Commissioner of Social Security 
     shall annually submit to the Committee on Ways and Means of 
     the House of Representatives and the Committee on Finance of 
     the Senate a report on the amount of indirect costs to the 
     Social Security Administration arising as a result of the 
     implementation of this section.

  The SPEAKER pro tempore. The bill, as amended, shall be debatable for 
1 hour equally divided and controlled by the chair and ranking minority 
member of the Committee on Ways and Means.
  The gentleman from Florida (Mr. Curbelo) and the gentleman from 
Illinois (Mr. Danny K. Davis) each will control 30 minutes.
  The Chair recognizes the gentleman from Florida.


                             General Leave

  Mr. CURBELO of Florida. Mr. Speaker, I ask unanimous consent that all 
Members may have 5 legislative days within which to revise and extend 
their remarks and include extraneous material on H.R. 5192, currently 
under consideration.
  The SPEAKER pro tempore. Is there objection to the request of the 
gentleman from Florida?
  There was no objection.
  Mr. CURBELO of Florida. Mr. Speaker, I yield myself such time as I 
may consume.
  Mr. Speaker, I rise today in strong support of H.R. 5192, the 
Protecting Children from Identity Theft Act, and I am grateful that it 
is being brought before the House today.
  This bill aims to combat synthetic identity fraud by directing the 
Social Security Administration to accept electronic signatures when 
financial institutions want to verify their customers' information.
  Synthetic identity fraud accounts for 80 percent of all credit card 
fraud losses today. It has been reported that a record $355 million in 
outstanding credit card balances was owed by people who it suspects 
didn't exist in 2017, up more than eightfold from 2012.
  The Government Accountability Office describes this type of fraud as 
involving the creation of a fictitious identity using a combination of 
real data, like a Social Security number or date of birth, from 
multiple individuals, along with fabricated information.
  H.R. 5192 is an important step in reducing fraud, while also ensuring 
that the Social Security Administration is able to continue providing 
important services and benefits.
  The SSA Commissioner is not allowed to begin development of the new 
verification system until the Commissioner determines that at least 50 
percent of the program's startup costs have been covered by users. 
After initial development, users of the verification system are 
obligated to pay for the ongoing costs associated with this new 
workload by way of advances, reimbursements, user fees, or other 
recoveries, as determined by the Commissioner.
  My south Florida district is far too familiar with fraudulent 
activity affecting the community, and sadly, children and immigrants 
are particularly vulnerable to these schemes. Over 1 million children 
have their identity stolen annually, and they are 50 times more likely 
than adults to be victims of identity theft.
  I am proud to partner with Representatives Sinema, Hultgren, and 
Marchant on this important effort. I would also like to thank Chairman 
Brady and subcommittee Chairman Johnson for their leadership and hard 
work, as well as the staff of the Social Security Subcommittee and the 
rest of the House Committee on Ways and Means staff who have worked on 
this legislation.
  I encourage all my colleagues to vote in favor of H.R. 5192, the 
Protecting Children from Identity Theft Act, to help modernize identity 
protections for our children.
  Mr. Speaker, I reserve the balance of my time.
  Mr. DANNY K. DAVIS of Illinois. Mr. Speaker, I yield myself such time 
as I may consume.
  Mr. Speaker, I am pleased to rise in support of H.R. 5192, the 
Protecting Children from Identity Theft Act, which was introduced by 
Representatives Carlos Curbelo of Florida and Kyrsten Sinema of 
Arizona.
  Our Nation is facing a growing epidemic of so-called synthetic 
identity theft. This is a sophisticated form of fraud where the 
fraudster manufactures a fake identity using a legitimate Social 
Security number but combining it with a made-up name. Numbers that 
belong to children are especially valuable for these fraudsters. This 
is because children typically do not yet have a credit record. If they 
did, the credit record would reveal that the name and number do not 
match, making the number useless to the synthetic identity fraudster.
  Under this bill, banks and other certified users could verify the 
customer's name, Social Security number, and date of birth with Social 
Security's

[[Page H3379]]

own records. This would allow the bank to detect attempted synthetic 
identity theft. As under current law, banks would be required to get 
the consent of their customer in order to have the SSA verify 
information.
  Social Security would not provide any identity information back to 
the bank other than, yes, this is a match or, no, this does not match. 
This matching could occur more quickly than it does under current law, 
to reflect the way commerce is conducted today.
  I am pleased that we were able to work in a bipartisan way to develop 
this legislation and to strengthen it as it moved through the committee 
process. We did so in several ways.
  First, we made sure that users of the system paid the full cost of 
developing it and conducting the verifications. We did not want to 
detract from the main mission of Social Security, which is to make sure 
Americans receive their earned Social Security benefits on time and in 
full.
  Second, we strengthened the security of the system to make it not 
subject to misuse. Americans' personal information must be kept secure, 
and Social Security must only conduct the matching when the individual 
has given consent.
  I am pleased to say that Social Security's track record on this is 
strong, and I expect they will carry on with their protectiveness of 
Americans' private data as they design a new system. I urge my 
colleagues to support this bipartisan legislation to protect children 
and fight identity theft.
  Mr. Speaker, I reserve the balance of my time.
  Mr. CURBELO of Florida. Mr. Speaker, it is my pleasure to yield 3 
minutes to the gentleman from Texas (Mr. Sam Johnson), the 
distinguished chairman of the Social Security Subcommittee.

  Mr. SAM JOHNSON of Texas. Mr. Speaker, I thank Mr. Curbelo for 
yielding and for introducing this commonsense and much-needed bill.
  Mr. Speaker, synthetic identity fraud is a real problem with real 
costs to the victims. One million children have their identity stolen 
each year, and they deserve to be protected. This legislation will also 
help stop criminals from stealing $1 billion a year by ensuring that we 
can verify a person is who he or she claims to be when applying for a 
credit card.
  Synthetic identity fraud is a growing problem. Social Security must 
quickly take steps to get this important fraud-fighting tool up and 
running. As chairman of the Social Security Subcommittee, I intend to 
make sure Social Security doesn't hold this up in any way.
  While Social Security will provide this service, the users pay the 
full cost so Social Security's budget won't be impacted.
  Social Security has an important job: to make sure those who are 
eligible get the benefits they deserve. I am committed to doing 
everything I can to protect all Americans from identity theft.
  H.R. 5192, the Protecting Children from Identity Theft Act, is the 
best way to stop synthetic identity fraud, and I urge you all to 
support it. The American people deserve nothing less.
  Mr. DANNY K. DAVIS of Illinois. Mr. Speaker, I am pleased to yield 5 
minutes to the gentlewoman from Arizona (Ms. Sinema), the lead 
Democratic cosponsor of this legislation.

                              {time}  1645

  Ms. SINEMA. Mr. Speaker, I rise in support of H.R. 5192, the 
Protecting Children from Identity Theft Act.
  Mr. Speaker, most of us assume our children are safe from identity 
theft. Most children don't have credit cards, and many don't have bank 
accounts, so why would they be targeted? Unfortunately, there is a new 
type of crime on the rise known as synthetic identity theft. This crime 
targets children and accounts for billions of dollars in credit card 
fraud.
  Synthetic identity theft is happening right now, and it is hurting 
real people. In Arizona, a 17-year-old girl discovered she had 
accumulated over $275,000 in debt because her Social Security number 
was linked to eight scammers and 42 accounts, including mortgages, auto 
loans, and credit cards.
  To pull off this fraud, criminals obtain a Social Security number 
with no prior credit history, and they use it to apply for a credit 
card under a fake name. While the first fraudulent credit card 
application is usually denied, the failed attempt creates a ``synthetic 
identity'' with credit bureaus. This allows thieves to apply for credit 
cards, other lines of credit, cell phones, and other activities that 
require a credit check. Over time, thieves are able to rack up 
mountains of debt and ruin kids' credit before they have a chance to 
build their futures.
  Every day, Arizona families shouldn't have to worry about their kids 
being targets of financial fraud and identity theft. Because financial 
criminals constantly use new tricks to steal children's identities, we 
must modernize and strengthen ID verification for everyday financial 
activities.
  Our bill, the Protecting Children from Identity Theft Act, fights 
back and gives Arizonans peace of mind. By directing the Social 
Security Administration to modernize its ID verification system to 
allow for more transactions to be screened and verified, we are taking 
a commonsense step to ensure people are who they say they are. Our 
commonsense bill closes a key security gap, helping to stop synthetic 
identity theft in its tracks.
  Thank you to Chairman Brady and special thanks to the gentleman from 
Florida (Mr. Curbelo), my friend, for working together to protect our 
children and crack down on fraudsters. Arizonans value their privacy, 
and they want us to work together to protect it. I am happy to work 
across the aisle to bring financial criminals to justice and help 
hardworking Arizona families get ahead.
  Mr. CURBELO of Florida. Mr. Speaker, first, let me thank my 
colleague, Ms. Sinema. It is a pleasure to work with her and to team 
up, in a bipartisan manner, to fight fraud and to help the most 
vulnerable, in this case, the children. I am very grateful to her, for 
all her work on this legislation.
  Mr. Speaker, I yield 3 minutes to the gentleman from Illinois (Mr. 
Hultgren).
  Mr. HULTGREN. Mr. Speaker, I rise today to speak in support of the 
Protecting Children from Identity Theft Act.
  I would also like to begin by thanking Leader McCarthy and my 
colleagues on the Ways and Means Committee, especially Carlos Curbelo, 
for his support in bringing this legislation to the House floor.
  H.R. 5192 will bring the Social Security Administration into the 21st 
century to assist the private sector in combating identity fraud. 
Identity theft affects thousands, if not millions, of children and 
families a year. A report by Carnegie Mellon CyLab examined more than 
40,000 cases of identity theft and found that 10 percent of children in 
the study had someone else using their Social Security number. Among 
other things, children's identities were used to purchase homes and 
open credit card accounts.
  According to the information recently published by the Algonquin 
Patch, Illinois ranks number seven in the United States for identity 
theft. The median loss for fraud is nearly $500. Credit card fraud is 
the most common type of fraud.
  For example, in Wilmette, Illinois, the Social Security number of a 
13-year-old was used by a fraudster to open a credit card with a plan 
to use it to pay for plastic surgery. Imagine when these children go to 
get their first legitimate extension of credit, maybe a car loan or a 
student loan, only to find out that criminals have stolen their 
identities and wrecked their financial standing.
  The Protecting Children from Identity Theft will strengthen the 
relationship between the public and private sectors in order to combat 
identity theft. Specifically, it will bring the Social Security 
Administration into the 21st century by allowing companies who meet 
strict regulatory standards to electronically confirm whether a name, 
date of birth, and Social Security number match.
  This will make it much easier for companies, such as credit card 
issuers, to ensure that they are only providing credit to legitimate 
applicants. This will prevent millions of dollars in fraud costs, not 
to mention preventing all of the headaches for my constituents whose 
identities will be at risk unless this bill is signed into law.
  Again, I want to encourage all of my colleagues to vote in support of 
the

[[Page H3380]]

Protecting Children from Identity Theft Act.
  Mr. DANNY K. DAVIS of Illinois. Mr. Speaker, I yield myself such time 
as I may consume. I have no further requests for time, so I am going to 
move ahead and close.
  Mr. Speaker, I think we have seen much agreement on the floor today, 
pleasantly so. I really don't know when I have seen as much agreement 
on a group of bills and legislation as I have seen on this day. And I 
guess it really means that all of us agree that we need to do 
everything that we can to protect ourselves from identity theft, that 
we need to look after the interest of children and protect them.
  I want to thank all of the staff from both sides of the aisle, even 
those who worked for subcommittees, as well as for the primary staff, 
for the tremendous amount of work that they have done.

  Again, it is a pleasure working with Mr. Curbelo, and I guess if we 
don't agree on everything, we do agree that all of us have a 
responsibility to file and pay income taxes in order to keep our 
government moving.
  It has been a pleasant day, not just for us, but I think all of our 
constituents, who have watched the proceedings, probably are saying to 
themselves that they would love to see more days like this, and I 
would, too. So I urge passage of this bill and the others that we have 
had before us.
  Mr. Speaker, I yield back the balance of my time.
  Mr. CURBELO of Florida. Mr. Speaker, I yield myself such time as I 
may consume.
  Mr. Speaker, I appreciate the comments of my colleague, Mr. Davis, 
and I agree with him. This is certainly something to celebrate. The 
American people oftentimes see us arguing. It is less often that they 
see us collaborating, working together to advance policies that will 
improve quality of life in our country.
  That is why I want to again urge all of my colleagues to support H.R. 
5192, the Protecting Children from Identity Theft Act. We need to do 
everything we can to safeguard our communities from these fraud 
schemes. This problem has worsened significantly over the past few 
years and is leaving families with debt they did not accrue and a 
weaker credit history.
  H.R. 5192 will help root out synthetic identity fraud through 
modernized verification of customer information, and I hope my 
colleagues will join me in voting to help protect individuals across 
the country from this illegal activity.
  Once again, Mr. Speaker, my appreciation to Chairman Brady, to 
Ranking Member Neal, to Mr. Davis, to Mr. Hultgren, to Ms. Sinema, and 
to everyone who has been a part of making this happen, so that, after 
we pass this legislation, children in our country won't have to worry 
about having their identities stolen at such a young age.
  This kind of fraud can really ruin people's lives, and today, we are 
working together, as one united House, Republicans and Democrats, to 
fight fraud and to protect children, some of the most vulnerable people 
in our society.
  Mr. Speaker, I urge a ``yes'' vote, and I yield back the balance of 
my time.
  The SPEAKER pro tempore. All time for debate has expired.
  Pursuant to House Resolution 830, the previous question is ordered on 
the bill, as amended.
  The question is on the engrossment and third reading of the bill.
  The bill was ordered to be engrossed and read a third time, and was 
read the third time.
  The SPEAKER pro tempore. The question is on the passage of the bill.
  The question was taken; and the Speaker pro tempore announced that 
the ayes appeared to have it.
  Mr. CURBELO of Florida. Mr. Speaker, on that I demand the yeas and 
nays.
  The yeas and nays were ordered.
  The vote was taken by electronic device, and there were--yeas 420, 
nays 1, not voting 8, as follows:

                             [Roll No. 142]

                               YEAS--420

     Abraham
     Adams
     Aderholt
     Aguilar
     Allen
     Amash
     Amodei
     Arrington
     Babin
     Bacon
     Banks (IN)
     Barletta
     Barr
     Barragan
     Barton
     Bass
     Beatty
     Bera
     Bergman
     Beyer
     Biggs
     Bilirakis
     Bishop (GA)
     Bishop (MI)
     Bishop (UT)
     Blackburn
     Blum
     Blumenauer
     Blunt Rochester
     Bonamici
     Bost
     Boyle, Brendan F.
     Brady (PA)
     Brady (TX)
     Brat
     Brooks (AL)
     Brooks (IN)
     Brown (MD)
     Brownley (CA)
     Buchanan
     Buck
     Bucshon
     Budd
     Burgess
     Bustos
     Butterfield
     Byrne
     Calvert
     Capuano
     Carbajal
     Cardenas
     Carson (IN)
     Carter (GA)
     Carter (TX)
     Cartwright
     Castor (FL)
     Castro (TX)
     Chabot
     Cheney
     Chu, Judy
     Cicilline
     Clark (MA)
     Clarke (NY)
     Clay
     Cleaver
     Clyburn
     Coffman
     Cohen
     Cole
     Collins (GA)
     Collins (NY)
     Comer
     Comstock
     Conaway
     Connolly
     Cook
     Cooper
     Correa
     Costa
     Costello (PA)
     Courtney
     Cramer
     Crawford
     Crist
     Crowley
     Cuellar
     Culberson
     Cummings
     Curbelo (FL)
     Curtis
     Davidson
     Davis (CA)
     Davis, Danny
     Davis, Rodney
     DeFazio
     DeGette
     Delaney
     DelBene
     Demings
     Denham
     Dent
     DeSantis
     DeSaulnier
     DesJarlais
     Deutch
     Diaz-Balart
     Dingell
     Doggett
     Donovan
     Doyle, Michael F.
     Duffy
     Duncan (SC)
     Duncan (TN)
     Dunn
     Ellison
     Emmer
     Engel
     Eshoo
     Espaillat
     Estes (KS)
     Esty (CT)
     Evans
     Faso
     Ferguson
     Fitzpatrick
     Fleischmann
     Flores
     Fortenberry
     Foster
     Foxx
     Frankel (FL)
     Frelinghuysen
     Fudge
     Gabbard
     Gaetz
     Gallagher
     Gallego
     Garamendi
     Garrett
     Gianforte
     Gibbs
     Gohmert
     Gomez
     Gonzalez (TX)
     Goodlatte
     Gosar
     Gottheimer
     Gowdy
     Granger
     Graves (GA)
     Graves (LA)
     Graves (MO)
     Green, Al
     Green, Gene
     Griffith
     Grijalva
     Grothman
     Guthrie
     Gutierrez
     Hanabusa
     Handel
     Harper
     Harris
     Hartzler
     Hastings
     Heck
     Hensarling
     Herrera Beutler
     Hice, Jody B.
     Higgins (LA)
     Higgins (NY)
     Hill
     Himes
     Holding
     Hollingsworth
     Hoyer
     Hudson
     Huffman
     Huizenga
     Hultgren
     Hunter
     Hurd
     Issa
     Jackson Lee
     Jayapal
     Jeffries
     Jenkins (KS)
     Johnson (GA)
     Johnson (LA)
     Johnson (OH)
     Johnson, E. B.
     Johnson, Sam
     Jones
     Jordan
     Joyce (OH)
     Kaptur
     Katko
     Keating
     Kelly (IL)
     Kelly (MS)
     Kelly (PA)
     Kennedy
     Khanna
     Kihuen
     Kildee
     Kilmer
     Kind
     King (IA)
     King (NY)
     Kinzinger
     Knight
     Krishnamoorthi
     Kuster (NH)
     Kustoff (TN)
     Labrador
     LaHood
     LaMalfa
     Lamb
     Lamborn
     Lance
     Langevin
     Larsen (WA)
     Larson (CT)
     Latta
     Lawrence
     Lawson (FL)
     Lee
     Levin
     Lewis (GA)
     Lewis (MN)
     Lieu, Ted
     Lipinski
     LoBiondo
     Loebsack
     Lofgren
     Long
     Loudermilk
     Love
     Lowenthal
     Lowey
     Lucas
     Luetkemeyer
     Lujan Grisham, M.
     Lujan, Ben Ray
     Lynch
     MacArthur
     Maloney, Carolyn B.
     Maloney, Sean
     Marchant
     Marino
     Marshall
     Mast
     Matsui
     McCarthy
     McCaul
     McClintock
     McCollum
     McEachin
     McGovern
     McHenry
     McKinley
     McMorris Rodgers
     McNerney
     McSally
     Meadows
     Meehan
     Meeks
     Meng
     Messer
     Mitchell
     Moolenaar
     Mooney (WV)
     Moore
     Moulton
     Mullin
     Murphy (FL)
     Nadler
     Napolitano
     Neal
     Newhouse
     Noem
     Nolan
     Norcross
     Norman
     Nunes
     O'Halleran
     O'Rourke
     Olson
     Palazzo
     Pallone
     Palmer
     Panetta
     Pascrell
     Paulsen
     Payne
     Pearce
     Pelosi
     Perlmutter
     Perry
     Peters
     Peterson
     Pingree
     Pittenger
     Pocan
     Poe (TX)
     Poliquin
     Polis
     Posey
     Price (NC)
     Quigley
     Raskin
     Ratcliffe
     Reed
     Reichert
     Renacci
     Rice (NY)
     Rice (SC)
     Richmond
     Roby
     Roe (TN)
     Rogers (AL)
     Rogers (KY)
     Rohrabacher
     Rokita
     Rooney, Francis
     Rooney, Thomas J.
     Ros-Lehtinen
     Rosen
     Roskam
     Ross
     Rothfus
     Rouzer
     Roybal-Allard
     Royce (CA)
     Ruiz
     Ruppersberger
     Rush
     Russell
     Rutherford
     Ryan (OH)
     Sanchez
     Sanford
     Sarbanes
     Schakowsky
     Schiff
     Schneider
     Schrader
     Schweikert
     Scott (VA)
     Scott, Austin
     Scott, David
     Sensenbrenner
     Serrano
     Sessions
     Sewell (AL)
     Shea-Porter
     Sherman
     Shimkus
     Shuster
     Simpson
     Sinema
     Sires
     Smith (MO)
     Smith (NE)
     Smith (NJ)
     Smith (TX)
     Smucker
     Soto
     Speier
     Stefanik
     Stewart
     Stivers
     Suozzi
     Swalwell (CA)
     Takano
     Taylor
     Tenney
     Thompson (CA)
     Thompson (PA)
     Thornberry
     Tipton
     Titus
     Tonko
     Torres
     Trott
     Tsongas
     Turner
     Upton
     Valadao
     Vargas
     Veasey
     Vela
     Velazquez
     Visclosky
     Wagner
     Walberg
     Walden
     Walker
     Walorski
     Walters, Mimi
     Walz
     Wasserman Schultz
     Waters, Maxine
     Watson Coleman
     Webster (FL)
     Welch
     Wenstrup
     Westerman
     Williams
     Wilson (FL)
     Wilson (SC)
     Wittman
     Womack
     Woodall
     Yarmuth
     Yoder
     Yoho
     Young (AK)
     Young (IA)
     Zeldin

                                NAYS--1

       
     Massie
       

                             NOT VOTING--8

     Black
     Bridenstine
     DeLauro
     Jenkins (WV)
     Scalise
     Smith (WA)
     Thompson (MS)
     Weber (TX)

[[Page H3381]]


  


                              {time}  1720

  Ms. McCOLLUM and Mr. RODNEY DAVIS of Illinois changed their vote from 
``nay'' to ``yea.''
  So the bill was passed.
  The result of the vote was announced as above recorded.
  A motion to reconsider was laid on the table.
  Stated for:
  Mr. SCALISE. Mr. Speaker, I was unavoidably detained. Had I been 
present, I would have voted ``yea'' on rollcall No. 142.

                          ____________________