North Carolina 2025-2026 Regular Session

North Carolina Senate Bill S735 Compare Versions

OldNewDifferences
11 GENERAL ASSEMBLY OF NORTH CAROLINA
22 SESSION 2025
3-S 1
4-SENATE BILL 735
3+S D
4+SENATE BILL DRS35250-MCa-139A
5+
56
67
78 Short Title: AI Innovation Trust Fund. (Public)
89 Sponsors: Senators Salvador, Garrett, and Murdock (Primary Sponsors).
9-Referred to: Rules and Operations of the Senate
10-March 26, 2025
11-*S735 -v-1*
10+Referred to:
11+
12+*DRS35250 -MCa-139A*
1213 A BILL TO BE ENTITLED 1
1314 AN ACT TO ENACT THE ARTIFICIAL INTELLIGENCE INNOVATION TRUST FUND . 2
1415 Whereas, recognizing the rapidly evolving nature of artificial intelligence and the 3
1516 importance of responsible innovation, the General Assembly intends this Act to establish an 4
1617 exploratory, iterative approach to AI governance, inviting stakeholder input and encouraging 5
1718 collaborative development of appropriate and proportionate AI regulations; Now, therefore, 6
1819 The General Assembly of North Carolina enacts: 7
1920 SECTION 1. Article 10 of Chapter 143B of the General Statutes is amended by 8
2021 adding a new Part to read: 9
2122 "Part 18A. Artificial Intelligence Innovation. 10
2223 "§ 143B-472.83A. Artificial Intelligence Innovation Trust Fund. 11
2324 (a) Fund. – There is established a special, nonreverting fund to be known as the North 12
2425 Carolina Artificial Intelligence Innovation Trust Fund. The Secretary of Commerce shall be the 13
2526 trustee of the fund and shall expend money from the fund to (i) provide grants or other financial 14
2627 assistance to companies developing or deploying artificial intelligence models in key industry 15
2728 sectors or (ii) establish or promote artificial intelligence entrepreneurship programs, which may 16
2829 include partnerships with research institutions in the State or other entrepreneur support 17
2930 organizations. The fund shall consist of appropriations to the Department of Commerce to be 18
3031 allocated to the fund, interest earned on money in the fund, and any other grants, premiums, gifts, 19
3132 reimbursements or other contributions received by the State from any source for or in support of 20
3233 the purposes described in this subsection. Funds in the fund are hereby appropriated to the 21
3334 Department for the purposes set forth in this section, and, except as otherwise expressly provided, 22
3435 the provisions of this section apply to persons receiving a grant or assistance from the fund. Funds 23
3536 provided under this Part shall not support projects involving artificial intelligence intended for 24
3637 mass surveillance infringing constitutional rights, unlawful social scoring, discriminatory 25
3738 profiling based on protected characteristics, or generating deceptive digital content intended for 26
3839 fraudulent or electoral interference purposes. 27
3940 (b) Definitions. – The following definitions apply in this section: 28
4041 (1) Advanced persistent threat. – An adversary with sophisticated levels of 29
4142 expertise and significant resources that allow it, through the use of multiple 30
4243 different attack vectors including, but not limited to, cyber, physical or 31
4344 deception, to generate opportunities to achieve objectives including, but not 32
4445 limited to, (i) establishing or extending its presence within the information 33
4546 technology infrastructure of an organization for the purpose of exfiltrating 34
46-information; (ii) undermining or impeding critical aspects of a mission, 35 General Assembly Of North Carolina Session 2025
47-Page 2 Senate Bill 735-First Edition
47+information; (ii) undermining or impeding critical aspects of a mission, 35
48+FILED SENATE
49+Mar 25, 2025
50+S.B. 735
51+PRINCIPAL CLERK General Assembly Of North Carolina Session 2025
52+Page 2 DRS35250-MCa-139A
4853 program or organization; or (iii) placing itself in a position to do so in the 1
4954 future. 2
5055 (2) Artificial intelligence. – An engineered or machine-based system that varies 3
5156 in its level of autonomy and which may, for explicit or implicit objectives, 4
5257 infer from the input it receives how to generate outputs that may influence 5
5358 physical or virtual environments. 6
5459 (3) Artificial intelligence safety incident. – An incident that demonstrably 7
5560 increases the risk of a critical harm occurring by means of any of the 8
5661 following: 9
5762 a. A covered model or covered model derivative autonomously engaging 10
5863 in behavior other than at the request of a user. 11
5964 b. Theft, misappropriation, malicious use, inadvertent release, 12
6065 unauthorized access or escape of the model weights of a covered 13
6166 model or covered model derivative. 14
6267 c. The critical failure of technical or administrative controls, including 15
6368 controls limiting the ability to modify a covered model or covered 16
6469 model derivative. 17
6570 d. Unauthorized use of a covered model or covered model derivative to 18
6671 cause or materially enable critical harm. 19
6772 (4) Computing cluster. – A set of machines transitively connected by data center 20
6873 networking of over 100 gigabits per second that has a theoretical maximum 21
6974 computing capacity of at least 10
7075
7176 to the power of 20 integer or floating-point 22
7277 operations per second and can be used for training artificial intelligence. 23
7378 (4a) Covered entity. – The legally responsible organization, corporation, or entity 24
7479 that directly oversees and controls the development, deployment, and ongoing 25
7580 operations of a covered model or covered model derivative, including 26
7681 responsibility for compliance with obligations under this Part 27
7782 (5) Covered model. – An artificial intelligence model that, due to its scale, 28
7883 application domain, or potential impact, is identified by the Secretary as 29
7984 warranting proportionate regulatory oversight. Factors considered may 30
8085 include, but are not limited to, computing power utilized, model training cost, 31
8186 anticipated scope of application, and foreseeable risks to public safety or 32
8287 individual rights. The Secretary may establish multiple tiers of covered 33
8388 models with corresponding compliance frameworks scaled proportionately to 34
8489 identified risk levels. 35
8590 (6) Covered model derivative. – A copy of a covered model that: (i) is 36
8691 unmodified; (ii) has been subjected to post-training modifications related to 37
8792 fine-tuning; (iii) has been fine-tuned using a quantity of computing power not 38
8893 exceeding 3 times 10
8994
9095 to the power of 25 or floating point operations, the cost 39
9196 of which, as reasonably assessed by the developer, exceeds $10,000,000 if 40
9297 calculated using the average market price of cloud compute at the start of 41
9398 fine-tuning; or (iv) has been combined with other software. 42
9499 (7) Critical harm. – A harm caused or materially enabled by a covered model or 43
95100 covered model derivative including: (i) the creation or use in a manner that 44
96101 results in mass casualties of a chemical, biological, radiological or nuclear 45
97102 weapon; (ii) mass casualties or at least $500,000,000 of damage resulting from 46
98103 cyberattacks on critical infrastructure by a model conducting, or providing 47
99104 precise instructions for conducting, a cyberattack or series of cyberattacks on 48
100105 critical infrastructure; (iii) mass casualties or at least $500,000,000 of damage 49
101106 resulting from an artificial intelligence model engaging in conduct that acts 50
102107 with limited human oversight, intervention or supervision and results in death, 51 General Assembly Of North Carolina Session 2025
103-Senate Bill 735-First Edition Page 3
108+DRS35250-MCa-139A Page 3
104109 great bodily injury, property damage or property loss, and would, if committed 1
105110 by a human, constitute a crime specified in any general or special law that 2
106111 requires intent, recklessness or gross negligence, or the solicitation or aiding 3
107112 and abetting of such a crime; or (iv) other grave harms to public safety that 4
108113 are of comparable severity to the harms described herein as determined by the 5
109114 attorney general. 6
110115 The term does not include harms caused or materially enabled by information 7
111116 that a covered model or covered model derivative outputs if the information 8
112117 is otherwise reasonably publicly accessible by an ordinary person from 9
113118 sources other than a covered model or covered model derivative; (ii) harms 10
114119 caused or materially enabled by a covered model combined with other 11
115120 software, including other models, if the covered model did not materially 12
116121 contribute to the other software's ability to cause or materially enable the 13
117122 harm; or (iii) harms that are not caused or materially enabled by the 14
118123 developer's creation, storage, use or release of a covered model or covered 15
119124 model derivative; provided further, that monetary harm thresholds established 16
120125 pursuant to this section shall be adjusted for inflation annually, not later than 17
121126 January 31, by the growth rate of the inflation index over the preceding 12 18
122127 months; and provided further, that the inflation index shall consist of the per 19
123128 cent change in inflation as measured by the per cent change in the consumer 20
124129 price index for all urban consumers for the Raleigh metropolitan area as 21
125130 determined by the bureau of labor statistics of the United States Department 22
126131 of Labor. 23
127132 (8) Critical infrastructure. – Assets, systems and networks, whether physical or 24
128133 virtual, the incapacitation or destruction of which would have a debilitating 25
129134 effect on physical security, economic security, public health or safety in the 26
130135 State. 27
131136 (8a) Department. – The Department of Commerce. 28
132137 (9) Developer. – A person that performs the initial training of a covered model 29
133138 by: (i) training a model using a sufficient quantity of computing power and 30
134139 cost; or (ii) fine-tuning an existing covered model or covered model derivative 31
135140 using a quantity of computing power and cost sufficient to qualify as a covered 32
136141 model. 33
137142 (10) Fine-tuning. – Adjusting the model weights of a trained covered model or 34
138143 covered model derivative by exposing such model to additional data. 35
139144 (11) Full shutdown. – The cessation of operation of: (i) the training of a covered 36
140145 model; (ii) a covered model controlled by a developer; and (iii) all covered 37
141146 model derivatives controlled by a developer. 38
142147 (11a) Fund. – The Artificial Intelligence Innovation Trust Fund, as established in 39
143148 this section. 40
144149 (12) Model weight. – A numerical parameter in an artificial intelligence model that 41
145150 is adjusted through training and that helps determine how inputs are 42
146151 transformed into outputs. 43
147152 (13) Person. – An individual, proprietorship, firm, partnership, joint venture, 44
148153 syndicate, business trust, company, corporation, limited liability company, 45
149154 association, committee or any other nongovernmental organization or group 46
150155 of persons acting in concert. 47
151156 (14) Post-training modification. – Modifying the capabilities of a covered model 48
152157 or covered model derivative by any means including, but not limited to, 49
153158 fine-tuning, providing such model with access to tools or data, removing 50 General Assembly Of North Carolina Session 2025
154-Page 4 Senate Bill 735-First Edition
159+Page 4 DRS35250-MCa-139A
155160 safeguards against hazardous misuse or misbehavior of such model or 1
156161 combining such model with, or integrating such model into, other software. 2
157162 (15) Safety and security protocol. – Documented, technical, and organizational 3
158163 protocols that: (i) are used to manage the risks of developing and operating 4
159164 covered models or covered model derivatives across their life cycle, including 5
160165 risks posed by causing or enabling or potentially causing or enabling the 6
161166 creation of covered model derivatives; and (ii) specify that compliance with 7
162167 such protocols is required in order to train, operate, possess or provide external 8
163168 access to the developer's covered model or covered model derivatives. 9
164169 (16) Secretary. – The Secretary of Commerce. 10
165170 (c) Oversight. – The Secretary may convene an AI Innovation and Safety Advisory Panel 11
166171 composed of representatives from industry, academia, civil liberties and consumer advocacy 12
167172 groups, and relevant state agencies. This Panel may provide recommendations, best practices, 13
168173 and advice regarding AI technologies, compliance proportionality, and ethical AI-human 14
169174 collaboration. Recommendations of this Panel shall be publicly accessible and may inform future 15
170175 regulatory proposals. 16
171176 (d) Standards. – The Secretary may consider relevant provisions, guidelines, frameworks, 17
172177 and standards established by the U.S. National Institute of Standards and Technology (NIST), 18
173178 and comparable frameworks, such as the EU AI Act, when developing proposals and 19
174179 recommendations pursuant to this Part. 20
175180 "§ 143B-472.83B. Requirements for developers of covered models. 21
176181 (a) Reserved. 22
177182 (b) Reserved. 23
178183 (c) Before beginning to train a covered model, a developer shall do all of the following: 24
179184 (1) Implement reasonable administrative, technical and physical cybersecurity 25
180185 protections to prevent unauthorized access to, misuse of or unsafe 26
181186 post-training modifications of the covered model and all covered model 27
182187 derivatives controlled by the developer that are appropriate in light of the risks 28
183188 associated with the covered model, including from advanced persistent threats 29
184189 or other sophisticated actors. 30
185190 (2) Implement the capability to promptly enact a full shutdown. 31
186191 (3) Implement a written and separate safety and security protocol that: (i) 32
187192 specifies protections and procedures that, if successfully implemented, would 33
188193 comply with the developer's duty to take reasonable care to avoid producing 34
189194 a covered model or covered model derivative that poses an unreasonable risk 35
190195 of causing or materially enabling a critical harm; (ii) states compliance 36
191196 requirements in an objective manner and with sufficient detail and specificity 37
192197 to allow the developer or a third party to readily ascertain whether the 38
193198 requirements of the safety and security protocol have been followed; (iii) 39
194199 identifies a testing procedure which takes safeguards into account as 40
195200 appropriate to reasonably evaluate if a covered model poses a substantial risk 41
196201 of causing or enabling a critical harm and if any covered model derivatives 42
197202 pose a substantial risk of causing or enabling a critical harm; (iv) describes in 43
198203 detail how the testing procedure assesses the risks associated with 44
199204 post-training modifications; (v) describes in detail how the testing procedure 45
200205 addresses the possibility that a covered model or covered model derivative 46
201206 may be used to make post-training modifications or create another covered 47
202207 model in a manner that may cause or materially enable a critical harm; (vi) 48
203208 describes in detail how the developer will fulfill their obligations under this 49
204209 chapter; (vii) describes in detail how the developer intends to implement any 50
205210 safeguards and requirements referenced in this section; (viii) describes in 51 General Assembly Of North Carolina Session 2025
206-Senate Bill 735-First Edition Page 5
211+DRS35250-MCa-139A Page 5
207212 detail the conditions under which a developer would enact a full shutdown 1
208213 account for, as appropriate, the risk that a shutdown of the covered model, or 2
209214 particular covered model derivatives, may cause disruptions to critical 3
210215 infrastructure; and (ix) describes in detail the procedure by which the safety 4
211216 and security protocol may be modified. 5
212217 (4) Ensure that the safety and security protocol is implemented as written, 6
213218 including by designating senior personnel to be responsible for ensuring 7
214219 compliance by employees and contractors working on a covered model or any 8
215220 covered model derivatives controlled by the developer, monitoring and 9
216221 reporting on implementation. 10
217222 (5) Retain an unredacted copy of the safety and security protocol for not less than 11
218223 five years after the covered model is no longer made available for commercial, 12
219224 public or foreseeably public use,, including records and dates of any updates 13
220225 or revisions. 14
221226 (6) Conduct an annual review of the safety and security protocol to account for 15
222227 any changes to the capabilities of the covered model and industry best 16
223228 practices and, if necessary, make modifications to such policy. 17
224229 (7) Conspicuously publish a redacted copy of the safety and security protocol and 18
225230 transmit a copy of said redacted safety and security protocol to the attorney 19
226231 general; provided, however, that (i) a redaction in the safety and security 20
227232 protocol may be made only if the redaction is reasonably necessary to protect 21
228233 public safety, trade secrets, or confidential information pursuant to any 22
229234 general, special, or federal law; (ii) the developer shall grant to the attorney 23
230235 general access to the unredacted safety and security protocol upon request; 24
231236 (iii) a safety and security protocol disclosed to the attorney general shall not 25
232237 be a public record; and (iv) if the safety and security protocol is materially 26
233238 modified, the developer shall conspicuously publish and transmit to the 27
234239 attorney general an updated redacted copy of such protocol within 30 days of 28
235240 the modification. 29
236241 (8) Take reasonable care to implement other appropriate measures to prevent 30
237242 covered models and covered model derivatives from posing unreasonable 31
238243 risks of causing or materially enabling critical harms. 32
239244 (d) Before using a covered model or covered model derivative for a purpose not 33
240245 exclusively related to the training or reasonable evaluation of the covered model for compliance 34
241246 with State or federal law or before making a covered model or covered model derivative available 35
242247 for commercial, public or foreseeably public use, the developer of a covered model shall do all 36
243248 of the following: 37
244249 (1) Assess whether the covered model is reasonably capable of causing or 38
245250 materially enabling a critical harm. 39
246251 (2) Record, as and when reasonably possible, and retain for not less than five 40
247252 years after the covered model is no longer made available for commercial, 41
248253 public or foreseeably public use, information on any specific tests and test 42
249254 results used in said assessment which provides sufficient detail for third 43
250255 parties to replicate the testing procedure. 44
251256 (3) Take reasonable care to implement appropriate safeguards to prevent the 45
252257 covered model and covered model derivatives from causing or materially 46
253258 enabling a critical harm. 47
254259 (4) Take reasonable care to ensure, to the extent reasonably possible, that the 48
255260 covered model's actions and the actions of covered model derivatives, as well 49
256261 as critical harms resulting from their actions, may be accurately and reliably 50
257262 attributed to such model or model derivative. 51 General Assembly Of North Carolina Session 2025
258-Page 6 Senate Bill 735-First Edition
263+Page 6 DRS35250-MCa-139A
259264 (e) A developer shall not use a covered model or covered model derivative for a purpose 1
260265 not exclusively related to the training or reasonable evaluation of the covered model for 2
261266 compliance with State or federal law or make a covered model or a covered model derivative 3
262267 available for commercial, public or foreseeably public use if there is an unreasonable risk that 4
263268 the covered model or covered model derivative will cause or materially enable a critical harm. 5
264269 (f) A developer of a covered model shall annually reevaluate the procedures, policies, 6
265270 protections, capabilities and safeguards implemented pursuant to this section. 7
266271 (g) A developer of a covered model shall annually retain a third-party that conducts 8
267272 investigations consistent with best practices for investigators to perform an independent 9
268273 investigation of compliance with the requirements of this section. 10
269274 (1) The investigator shall conduct investigations consistent with regulations 11
270275 issued by the Secretary. The investigator shall be granted access to unredacted 12
271276 materials as necessary to comply with the investigator's obligations contained 13
272277 herein. The investigator shall produce an investigation report including, but 14
273278 not limited to: (i) a detailed assessment of the developer's steps to comply with 15
274279 the requirements of this section; (ii) if applicable, any identified instances of 16
275280 noncompliance with the requirements of this section and any 17
276281 recommendations for how the developer can improve its policies and 18
277282 processes for ensuring compliance with the requirements of this section; (iii) 19
278283 a detailed assessment of the developer's internal controls, including 20
279284 designation and empowerment of senior personnel responsible for ensuring 21
280285 compliance by the developer and any employees or contractors thereof; and 22
281286 (iv) the signature of the lead investigator certifying the results contained 23
282287 within the investigation report; and provided further, that the investigator shall 24
283288 not knowingly make a material misrepresentation in said report. 25
284289 (2) Covered entities shall transmit to the Attorney General a confidential copy of 26
285290 any independent investigator's report conducted under this section. An 27
286291 executive summary outlining compliance status and risk mitigation actions 28
287292 shall be made publicly available, with proprietary, sensitive, or 29
288293 security-related information redacted as necessary. 30
289294 (h) A developer of a covered model shall annually, until such time that the covered model 31
290295 and any covered model derivatives controlled by the developer cease to be in or available for 32
291296 commercial or public use, submit to the attorney general a statement of compliance signed by the 33
292297 developer's chief technology officer, or a more senior corporate officer, that shall specify or 34
293298 provide, at a minimum: (i) an assessment of the nature and magnitude of critical harms that the 35
294299 covered model or covered model derivatives may reasonably cause or materially enable and the 36
295300 outcome of the assessment required by this section; (ii) an assessment of the risk that compliance 37
296301 with the safety and security protocol may be insufficient to prevent the covered model or covered 38
297302 model derivatives from causing or materially enabling critical harms; and (iii) a description of 39
298303 the process used by the signing officer to verify compliance with the requirements of this section, 40
299304 including a description of the materials reviewed by the signing officer, a description of testing 41
300305 or other evaluation performed to support the statement and the contact information of any third 42
301306 parties relied upon to validate compliance. 43
302307 A developer shall submit such statement to the attorney general not later than 30 days after 44
303308 using a covered model or covered model derivative for a purpose not exclusively related to the 45
304309 training or reasonable evaluation of the covered model for compliance with State or federal law 46
305310 or making a covered model or covered model derivative available for commercial, public or 47
306311 foreseeably public use; provided, however, that no such initial statement shall be required for a 48
307312 covered model derivative if the developer submitted a compliant initial statement and any 49
308313 applicable annual statements for the covered model from which the covered model derivative is 50
309314 derived. 51 General Assembly Of North Carolina Session 2025
310-Senate Bill 735-First Edition Page 7
315+DRS35250-MCa-139A Page 7
311316 (i) A developer of a covered model shall report each artificial intelligence safety incident 1
312317 affecting the covered model or any covered model derivatives controlled by the developer to the 2
313318 attorney general within 72 hours of the developer learning of the artificial intelligence safety 3
314319 incident or facts sufficient to establish a reasonable belief that an artificial intelligence safety 4
315320 incident has occurred. 5
316321 (j) This section shall apply to the development, use or commercial or public release of a 6
317322 covered model or covered model derivative for any use that is not the subject of a contract with 7
318323 a federal government entity, even if that covered model or covered model derivative was 8
319324 developed, trained or used by a federal government entity; provided, however, that this section 9
320325 shall not apply to a product or service to the extent that compliance would strictly conflict with 10
321326 the terms of a contract between a federal government entity and the developer of a covered model. 11
322327 (k) The Secretary may develop and propose a tiered compliance framework 12
323328 differentiating obligations based on computing scale, intended applications, societal impact, and 13
324329 organizational size. This framework shall be developed through stakeholder consultations and 14
325330 presented to the General Assembly with recommendations for potential adoption. 15
326331 (l) A developer or covered entity may remain responsible for foreseeable critical harms 16
327332 arising from misuse or unintended use of a covered model or derivative, irrespective of whether 17
328333 such misuse involved fine-tuning. Covered entities may conduct and document pre-deployment 18
329334 risk assessments to identify and reasonably mitigate foreseeable misuse risks. 19
330335 (m) Covered entities funded under this Act developing AI systems that significantly 20
331336 impact individuals' rights or access to critical services such as employment, housing, education, 21
332337 or financial products may conduct exploratory algorithmic fairness assessments to detect and 22
333338 mitigate potential bias. These assessments may be shared with stakeholders and the Department 23
334339 to inform future policy development. 24
335340 (n) Covered entities may voluntarily explore methods for disclosing to end-users when 25
336341 they are interacting with an artificial intelligence system, particularly where the nature of 26
337342 interaction is not immediately obvious. Such entities may also explore labeling content generated 27
338343 by funded AI systems where there is potential for it to be mistaken for human-generated content. 28
339344 Findings from these explorations may be reported to the Department to inform future 29
340345 transparency guidelines. 30
341346 "§ 143B-472.83C. Requirements for computer resource operators training covered models. 31
342347 (a) A person that operates a computing cluster shall implement written policies and 32
343348 procedures to do all of the following when a customer utilizes computer resources which would 33
344349 be sufficient to train a covered model: 34
345350 (1) Obtain the prospective customer's basic identifying information and business 35
346351 purpose for utilizing the computing cluster including, but not limited to: (i) 36
347352 the identity of the prospective customer; (ii) the means and source of payment, 37
348353 including any associated financial institution, credit card number, account 38
349354 number, customer identifier, transaction identifiers or virtual currency wallet 39
350355 or wallet address identifier; and (iii) the email address and telephone number 40
351356 used to verify the prospective customer's identity. 41
352357 (2) Assess whether the prospective customer intends to utilize the computing 42
353358 cluster to train a covered model. 43
354359 (3) Maintain logs of significant access and administrative actions consistent with 44
355360 commercially reasonable cybersecurity practices. 45
356361 (4) Maintain for not less than seven years, and provide to the attorney general 46
357362 upon request, appropriate records of actions taken under this section, 47
358363 including policies and procedures put into effect. 48
359364 (5) Implement the capability to promptly enact a full shutdown of any resources 49
360365 being used to train or operate a covered model under the customer's control. 50 General Assembly Of North Carolina Session 2025
361-Page 8 Senate Bill 735-First Edition
366+Page 8 DRS35250-MCa-139A
362367 If a customer repeatedly utilizes computer resources that would be sufficient to train a 1
363368 covered model, the operator of the computer cluster shall validate said basic identifying 2
364369 information and assess whether such customer intends to utilize the computing cluster to train a 3
365370 covered model prior to each utilization. 4
366371 (b) A person that operates a computing cluster shall consider industry best practices and 5
367372 applicable guidance from the National Institute of Standards and Technology, including the 6
368373 United States Artificial Intelligence Safety Institute, and other reputable standard-setting 7
369374 organizations. 8
370375 (c) In complying with the requirements of this section, a person that operates a computing 9
371376 cluster may impose reasonable requirements on customers to prevent the collection or retention 10
372377 of personal information that the person operating such computing cluster would not otherwise 11
373378 collect or retain, including a requirement that a corporate customer submit corporate contact 12
374379 information rather than information that would identify a specific individual. 13
375380 "§ 143B-472.83D. Enforcement. 14
376381 (a) The attorney general shall have the authority to enforce the provisions of this Part. 15
377382 Except as specifically provided in this Part, nothing in this Part shall be construed as creating a 16
378383 new private right of action or serving as the basis for a private right of action that would not 17
379384 otherwise have had a basis under any other law but for the enactment of this Part. This Part 18
380385 neither relieves any party from any duties or obligations imposed nor alters any independent 19
381386 rights that individuals have under State or federal laws, the North Carolina Constitution or the 20
382387 United States Constitution. 21
383388 The attorney general may initiate a civil action in the superior court against an entity in the 22
384389 name of the State or on behalf of individuals for a violation of this chapter. The attorney general 23
385390 may seek: 24
386391 (1) Against a developer of a covered model or covered model derivative for a 25
387392 violation that causes death or bodily harm to another human, harm to property, 26
388393 theft or misappropriation of property, or that constitutes an imminent risk or 27
389394 threat to public safety that occurs on or after January 1, 2026, a civil penalty 28
390395 in an amount not exceeding (i) for a first violation, five percent (5%) of the 29
391396 cost of the quantity of computing power used to train the covered model to be 30
392397 calculated using the average market prices of cloud compute at the time of 31
393398 training or (ii) for any subsequent violation, 15 percent (15%) of the cost of 32
394399 the quantity of computing power used to train the covered model as calculated 33
395400 herein. 34
396401 (2) Against an investigator for a violation of this Part, including an investigator 35
397402 who intentionally or with reckless disregard violates any of such investigator's 36
398403 responsibilities , or for a person that operates a computing cluster in violation 37
399404 of this Part, a civil penalty in an amount not exceeding (i) twenty-five 38
400405 thousand dollars ($25,000) for a first offense; (ii) fifty thousand dollars 39
401406 ($50,000) for any subsequent violation; and (iii) five million dollars 40
402407 ($5,000,000) in the aggregate for related violations. 41
403408 (3) Injunctive or declaratory relief. 42
404409 (4) Such monetary or punitive damages as the court may allow. 43
405410 (5) Attorney's fees and costs. 44
406411 (6) Any other relief that the court deems appropriate. 45
407412 (b) In determining whether a developer exercised reasonable care in the creation, use, or 46
408413 deployment of a covered model or covered model derivative, the attorney general shall consider 47
409414 all of the following: 48
410415 (1) The quality of such developer's safety and security protocol. 49
411416 (2) The extent to which the developer faithfully implemented and followed its 50
412417 safety and security protocol. 51 General Assembly Of North Carolina Session 2025
413-Senate Bill 735-First Edition Page 9
418+DRS35250-MCa-139A Page 9
414419 (3) Whether, in quality and implementation, the developer's safety and security 1
415420 protocol was comparable to those of developers of models trained using a 2
416421 comparable amount of compute resources. 3
417422 (4) The quality and rigor of the developer's investigation, documentation, 4
418423 evaluation and management of risks of critical harm posed by its model. 5
419424 (c) A provision within a contract or agreement that seeks to waive, preclude, or burden 6
420425 the enforcement of liability arising from a violation of this Part, or to shift such liability to any 7
421426 person or entity in exchange for their use or access of, or right to use or access, a developer's 8
422427 product or services, including by means of a contract or adhesion, shall be deemed to be against 9
423428 public policy and void. 10
424429 Notwithstanding any corporate formalities, the court shall impose joint and several liability 11
425430 on affiliated entities for purposes of effectuating the intent of this section to the maximum extent 12
426431 permitted by law if the court concludes all of the following: 13
427432 (1) The affiliated entities, in the development of the corporate structure among 14
428433 such affiliated entities, took steps to purposely and unreasonably limit or avoid 15
429434 liability. 16
430435 (2) As a result of any such steps, the corporate structure of the developer or 17
431436 affiliated entities would frustrate recovery of penalties, damages, or injunctive 18
432437 relief under this section. 19
433438 (d) Penalties collected pursuant to this section by the attorney general shall be deposited 20
434439 into the General Fund and subject to appropriation. 21
435440 "§ 143B-472.83E. Cooperation with Attorney General. 22
436441 (a) For purposes of this section, the following definitions apply: 23
437442 (1) Contractor or subcontractor. – A firm, corporation, partnership or association 24
438443 and its responsible managing officer, as well as any supervisors, managers or 25
439444 officers found by the attorney general or director to be personally and 26
440445 substantially responsible for the rights and responsibilities of employees under 27
441446 this section. 28
442447 (2) Employee. – Any person who performs services for wages or salary under a 29
443448 contract of employment, express or implied, for an employer, including: 30
444449 a. Contractors or subcontractors and unpaid advisors involved with 31
445450 assessing, managing or addressing the risk of critical harm from 32
446451 covered models or covered model derivatives. 33
447452 b. Corporate officers. 34
448453 (b) A developer of a covered model or a contractor or subcontractor of the developer shall 35
449454 not: 36
450455 (1) Prevent an employee from disclosing information to the attorney general or 37
451456 any other public body, including through terms and conditions of employment 38
452457 or seeking to enforce terms and conditions of employment, if the employee 39
453458 has reasonable cause to believe the information indicates that (i) the developer 40
454459 is out of compliance with the requirements of this section or (ii) an artificial 41
455460 intelligence model, including a model that is not a covered model or a covered 42
456461 model derivative, poses an unreasonable risk of causing or materially enabling 43
457462 critical harm, even if the employer is not out of compliance with any State or 44
458463 federal law. 45
459464 (2) Retaliate against an employee for disclosing such information to the attorney 46
460465 general or any other public body. 47
461466 (3) Make false or materially misleading statements related to its safety and 48
462467 security protocol in any manner that would constitute an unfair or deceptive 49
463468 trade practice. 50 General Assembly Of North Carolina Session 2025
464-Page 10 Senate Bill 735-First Edition
469+Page 10 DRS35250-MCa-139A
465470 (c) An employee harmed by a violation of this section may petition the court for 1
466471 appropriate relief. 2
467472 (d) The attorney general may publicly release any complaint, or a summary of such 3
468473 complaint, filed pursuant to this section if the attorney general concludes that doing so will serve 4
469474 the public interest; provided, however, that any information that is confidential, qualifies as a 5
470475 trade secret, or is determined by the attorney general to likely pose an unreasonable risk to public 6
471476 safety if disclosed shall be redacted from the complaint prior to disclosure. 7
472477 (e) A developer shall provide a clear notice to all employees working on covered models 8
473478 and covered model derivatives of their rights and responsibilities under this section, including 9
474479 the rights of employees of contractors and subcontractors to utilize the developer's internal 10
475480 process for making protected disclosures pursuant to subsection (f). A developer is presumed to 11
476481 be in compliance with the requirements of this subsection if the developer: 12
477482 (1) At all times posts and displays within all workplaces maintained by the 13
478483 developer a notice to all employees of their rights and responsibilities under 14
479484 this section, ensures that all new employees receive equivalent notice and 15
480485 ensures that employees who work remotely periodically receive an equivalent 16
481486 notice; or 17
482487 (2) At least annually, provides written notice to all employees of their rights and 18
483488 responsibilities under this section and ensures that such notice is received and 19
484489 acknowledged by all of those employees. 20
485490 (f) A developer shall provide a reasonable internal process through which an employee, 21
486491 contractor, subcontractor or employee of a contractor or subcontractor working on a covered 22
487492 model or covered model derivative may anonymously disclose information to the developer if 23
488493 the employee believes, in good faith, that the developer has violated any provision of this chapter 24
489494 or any other general or special law, has made false or materially misleading statements related to 25
490495 its safety and security protocol or has failed to disclose known risks to employees. The developer 26
491496 shall conduct an investigation related to any information disclosed through such process and 27
492497 provide, at a minimum, a monthly update to the person who made the disclosure regarding the 28
493498 status of the developer's investigation of the disclosure and the actions taken by the developer in 29
494499 response to the disclosure. 30
495500 Any disclosure and response created pursuant to this subsection shall be maintained for not 31
496501 less than seven years from the date when the disclosure or response is created. Each disclosure 32
497502 and response shall be shared with officers and directors of the developer whose acts or omissions 33
498503 are not implicated by the disclosure or response not less than once per quarter. In the case of a 34
499504 report or disclosure regarding alleged misconduct by a contractor or subcontractor, the developer 35
500505 shall notify the officers and directors of the contractor or subcontractor whose acts or omissions 36
501506 are not implicated by the disclosure or response about the status of their investigation not less 37
502507 than once per quarter. 38
503508 "§ 143B-472.83. Reporting and regulation. 39
504509 The Secretary shall file an annual report not later than January 31 with the General Assembly 40
505510 containing: (i) statistical information on the current workforce population in the business of the 41
506511 development of artificial intelligence and in adjacent technology sectors; (ii) any known 42
507512 workforce shortages in the development or deployment of artificial intelligence; (iii) summary 43
508513 information related to the efficacy of existing workforce development programs in artificial 44
509514 intelligence and related sectors, if any; (iv) summary information related to the availability of 45
510515 relevant training programs available in the State, including any known gaps in such programs 46
511516 generally available to members of the public; and (iv) any plans, including recommendations for 47
512517 legislation, if any, to remedy any such known workforce shortages. 48
513518 The Secretary shall promulgate regulations for the implementation, administration and 49
514519 enforcement of this Part; provided, however, that the Secretary may convene an advisory board 50
515520 for the purposes of: (i) studying the impact of artificial intelligence on the State, including with 51 General Assembly Of North Carolina Session 2025
516-Senate Bill 735-First Edition Page 11
521+DRS35250-MCa-139A Page 11
517522 respect to its employees, constituents, private business and higher education institutions; (ii) 1
518523 conducting outreach and collecting input from stakeholders and experts; (iii) studying current 2
519524 and emerging capability for critical harms made possible by artificial intelligence developed or 3
520525 deployed in the State; or (iv) advising the Governor and General Assembly on recommended 4
521526 legislation or regulations related to the growth of the artificial intelligence industry and 5
522527 prevention of critical harms. 6
523528 Not less than annually, the Secretary shall do all of the following: 7
524529 (1) Update, by regulation, the initial compute threshold and the fine-tuning 8
525530 compute threshold that an artificial intelligence model shall meet to be 9
526531 considered a covered model, taking into account: (i) the quantity of computing 10
527532 power used to train models that have been identified as being reasonably likely 11
528533 to cause or materially enable a critical harm; (ii) similar thresholds used in 12
529534 federal law, guidance or regulations for the management of artificial 13
530535 intelligence models with reasonable risks of causing or enabling critical 14
531536 harms; and (iii) input from stakeholders, including academics, industry, the 15
532537 open-source community and government entities. 16
533538 (2) Update, by regulation, binding investigation requirements applicable to 17
534539 investigations conducted pursuant to this Part to ensure the integrity, 18
535540 independence, efficiency and effectiveness of the investigation process, taking 19
536541 into account: (i) relevant standards or requirements imposed under federal or 20
537542 State law or through self-regulatory or standards-setting bodies; (ii) input from 21
538543 stakeholders, including academic, industry and government entities, including 22
539544 from the open-source community; and (iii) consistency with guidance issued 23
540545 by the National Institute of Standards and Technology, including the United 24
541546 States Artificial Intelligence Safety Institute. 25
542547 (3) Issue guidance for preventing unreasonable risks of covered models and 26
543548 covered model derivatives causing or materially enabling critical harms, 27
544549 including, but not limited to, more specific components of, or requirements 28
545550 under, the duties required under this Part. Such guidance shall be consistent 29
546551 with guidance issued by the National Institute of Standards and Technology, 30
547552 including the United States Artificial Intelligence Safety Institute." 31
548553 SECTION 2. There is appropriated from the General Fund to the Department of 32
549554 Commerce the nonrecurring sum of seven hundred fifty thousand dollars ($750,000) for the 33
550555 2025-2026 fiscal year to accomplish the purposes of this act. 34
551556 SECTION 3. This act becomes effective July 1, 2025. 35