Port Crane Security and Inspection Act of 2025 This bill limits the operation of foreign cranes at U.S. ports. In general, foreign cranes are those that have information technology and operational technology components that (1) were manufactured by companies that are subject to the ownership, control, or influence of a country designated as a foreign adversary; and (2) connect to ports' cyber infrastructure.Foreign cranes that are contracted for on or after the date of the bill's enactment may not operate at a U.S. port. Also, beginning five years after this bill is enacted, foreign cranes operating at U.S. ports may not use software or other technology manufactured by a company owned by a country designated as a foreign adversary.Additionally, the Cybersecurity and Infrastructure Security Agency (CISA) must (1) inspect foreign cranes for potential security risks or threats before they are placed into operation, (2) assess the threat posed by security risks or threats of existing or newly constructed foreign cranes, and (3) take any crane that poses a security risk or threat offline until the crane can be certified as no longer being a risk or threat.CISA must also report to Congress about security risks or threats posed by foreign cranes at U.S. ports.
American Sovereignty and Species Protection Act This bill limits the protection of endangered or threatened species to species that are native to the United States. In addition, the bill prohibits certain funding for endangered or threatened species from being used to acquire lands, waters, or other interests in foreign countries.
To amend the Internal Revenue Code of 1986 to provide that certain payments to foreign related parties subject to sufficient foreign tax are not treated as base erosion payments.
Protecting Personal Data from Foreign Adversaries Act This bill authorizes sanctions and other prohibitions relating to software that engages in user data theft on behalf of certain foreign countries or entities. The President may regulate or prohibit transactions using software that engages in the theft or unauthorized transmission of user data and provides access to such data to (1) a communist country, (2) the Chinese Communist Party (CCP), (3) a foreign adversary, or (4) a state sponsor of terrorism. The President may also impose visa- and property-blocking sanctions on developers and owners of software that makes unauthorized transmissions of user data to servers located in China that are accessible by China's government or the CCP. The Department of State shall report to Congress a determination regarding whether WeChat or TikTok fall within certain regulations and prohibitions, including those provided under this bill. (WeChat and TikTok are software programs developed by China-based companies.)