I 119THCONGRESS 1 STSESSION H. R. 1623 To require certain interactive computer services to adopt and operate tech- nology verification measures to ensure that users of the platform are not minors, and for other purposes. IN THE HOUSE OF REPRESENTATIVES FEBRUARY26, 2025 Mrs. M ILLERof Illinois (for herself, Mr. VANDREW, Mr. BRECHEEN, Mr. L AMALFA, Mr. AUSTINSCOTTof Georgia, Mr. KENNEDYof Utah, Mr. C RANE, Mr. ADERHOLT, Mr. BABIN, and Mr. ROSE) introduced the fol- lowing bill; which was referred to the Committee on Energy and Com- merce A BILL To require certain interactive computer services to adopt and operate technology verification measures to ensure that users of the platform are not minors, and for other purposes. Be it enacted by the Senate and House of Representa-1 tives of the United States of America in Congress assembled, 2 SECTION 1. SHORT TITLE. 3 This Act may be cited as the ‘‘Shielding Children’s 4 Retinas from Egregious Exposure on the Net Act’’ or the 5 ‘‘SCREEN Act’’. 6 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 2 •HR 1623 IH SEC. 2. FINDINGS; SENSE OF CONGRESS. 1 (a) F INDINGS.—Congress finds the following: 2 (1) Over the 3 decades preceding the date of 3 enactment of this Act, Congress has passed several 4 bills to protect minors from access to online porno-5 graphic content, including title V of the Tele-6 communications Act of 1996 (Public Law 104–104) 7 (commonly known as the ‘‘Communications Decency 8 Act’’), section 231 of the Communications Act of 9 1934 (47 U.S.C. 231) (commonly known as the 10 ‘‘Child Online Protection Act’’), and the Children’s 11 Internet Protection Act (title XVII of division B of 12 Public Law 106–554). 13 (2) With the exception of the Children’s Inter-14 net Protection Act (title XVII of division B of Public 15 Law 106–554), the Supreme Court of the United 16 States has struck down the previous efforts of Con-17 gress to shield children from pornographic content, 18 finding that such legislation constituted a ‘‘compel-19 ling government interest’’ but that it was not the 20 least restrictive means to achieve such interest. In 21 Ashcroft v. ACLU, 542 U.S. 656 (2004), the Court 22 even suggested at the time that ‘‘blocking and fil-23 tering software’’ could conceivably be a ‘‘primary al-24 ternative’’ to the requirements passed by Congress. 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 3 •HR 1623 IH (3) In the nearly 2 decades since the Supreme 1 Court of the United States suggested the use of 2 ‘‘blocking and filtering software’’, such technology 3 has proven to be ineffective in protecting minors 4 from accessing online pornographic content. The 5 Kaiser Family Foundation has found that filters do 6 not work on 1 in 10 pornography sites accessed in-7 tentionally and 1 in 3 pornography sites that are 8 accessed unintentionally. Further, it has been proven 9 that children are able to bypass ‘‘blocking and fil-10 tering’’ software by employing strategic searches or 11 measures to bypass the software completely. 12 (4) Additionally, Pew Research has revealed 13 studies showing that only 39 percent of parents use 14 blocking or filtering software for their minor’s online 15 activities, meaning that 61 percent of children only 16 have restrictions on their internet access when they 17 are at school or at a library. 18 (5) 17 States have now recognized pornography 19 as a public health hazard that leads to a broad 20 range of individual harms, societal harms, and pub-21 lic health impacts. 22 (6) It is estimated that 80 percent of minors 23 between the ages of 12 to 17 have been exposed to 24 pornography, with 54 percent of teenagers seeking it 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 4 •HR 1623 IH out. The internet is the most common source for mi-1 nors to access pornography with pornographic 2 websites receiving more web traffic in the United 3 States than Twitter, Netflix, Pinterest, and 4 LinkedIn combined. 5 (7) Exposure to online pornography has created 6 unique psychological effects for minors, including 7 anxiety, addiction, low self-esteem, body image dis-8 orders, an increase in problematic sexual activity at 9 younger ages, and an increased desire among minors 10 to engage in risky sexual behavior. 11 (8) The Supreme Court of the United States 12 has recognized on multiple occasions that Congress 13 has a ‘‘compelling government interest’’ to protect 14 the physical and psychological well-being of minors, 15 which includes shielding them from ‘‘indecent’’ con-16 tent that may not necessarily be considered ‘‘ob-17 scene’’ by adult standards. 18 (9) Because ‘‘blocking and filtering software’’ 19 has not produced the results envisioned nearly 2 dec-20 ades ago, it is necessary for Congress to pursue al-21 ternative policies to enable the protection of the 22 physical and psychological well-being of minors. 23 (10) The evolution of our technology has now 24 enabled the use of age verification technology that is 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 5 •HR 1623 IH cost efficient, not unduly burdensome, and can be 1 operated narrowly in a manner that ensures only 2 adults have access to a website’s online pornographic 3 content. 4 (b) S ENSE OFCONGRESS.—It is the sense of Con-5 gress that— 6 (1) shielding minors from access to online por-7 nographic content is a compelling government inter-8 est that protects the physical and psychological well- 9 being of minors; and 10 (2) requiring interactive computer services that 11 are in the business of creating, hosting, or making 12 available pornographic content to enact technological 13 measures that shield minors from accessing porno-14 graphic content on their platforms is the least re-15 strictive means for Congress to achieve its compel-16 ling government interest. 17 SEC. 3. DEFINITIONS. 18 In this Act: 19 (1) C HILD PORNOGRAPHY ; MINOR.—The terms 20 ‘‘child pornography’’ and ‘‘minor’’ have the mean-21 ings given those terms in section 2256 of title 18, 22 United States Code. 23 (2) C OMMISSION.—The term ‘‘Commission’’ 24 means the Federal Trade Commission. 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 6 •HR 1623 IH (3) COVERED PLATFORM .—The term ‘‘covered 1 platform’’— 2 (A) means an entity— 3 (i) that is an interactive computer 4 service; 5 (ii) that— 6 (I) is engaged in interstate or 7 foreign commerce; or 8 (II) purposefully avails itself of 9 the United States market or a portion 10 thereof; and 11 (iii) for which it is in the regular 12 course of the trade or business of the enti-13 ty to create, host, or make available con-14 tent that meets the definition of harmful to 15 minors under paragraph (4) and that is 16 provided by the entity, a user, or other in-17 formation content provider, with the objec-18 tive of earning a profit; and 19 (B) includes an entity described in sub-20 paragraph (A) regardless of whether— 21 (i) the entity earns a profit on the ac-22 tivities described in subparagraph (A)(iii); 23 or 24 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 7 •HR 1623 IH (ii) creating, hosting, or making avail-1 able content that meets the definition of 2 harmful to minors under paragraph (4) is 3 the sole source of income or principal busi-4 ness of the entity. 5 (4) H ARMFUL TO MINORS.—The term ‘‘harmful 6 to minors’’, with respect to a picture, image, graphic 7 image file, film, videotape, or other visual depiction, 8 means that the picture, image, graphic image file, 9 film, videotape, or other depiction— 10 (A)(i) taken as a whole and with respect to 11 minors, appeals to the prurient interest in nu-12 dity, sex, or excretion; 13 (ii) depicts, describes, or represents, in a 14 patently offensive way with respect to what is 15 suitable for minors, an actual or simulated sex-16 ual act or sexual contact, actual or simulated 17 normal or perverted sexual acts, or lewd exhi-18 bition of the genitals; and 19 (iii) taken as a whole, lacks serious, lit-20 erary, artistic, political, or scientific value as to 21 minors; 22 (B) is obscene; or 23 (C) is child pornography. 24 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 8 •HR 1623 IH (5) INFORMATION CONTENT PROVIDER ; INTER-1 ACTIVE COMPUTER SERVICE .—The terms ‘‘informa-2 tion content provider’’ and ‘‘interactive computer 3 service’’ have the meanings given those terms in sec-4 tion 230(f) of the Communications Act of 1934 (47 5 U.S.C. 230(f)). 6 (6) S EXUAL ACT; SEXUAL CONTACT .—The 7 terms ‘‘sexual act’’ and ‘‘sexual contact’’ have the 8 meanings given those terms in section 2246 of title 9 18, United States Code. 10 (7) T ECHNOLOGY VERIFICATION MEASURE .— 11 The term ‘‘technology verification measure’’ means 12 technology that— 13 (A) employs a system or process to deter-14 mine whether it is more likely than not that a 15 user of a covered platform is a minor; and 16 (B) prevents access by minors to any con-17 tent on a covered platform. 18 (8) T ECHNOLOGY VERIFICATION MEASURE 19 DATA.—The term ‘‘technology verification measure 20 data’’ means information that— 21 (A) identifies, is linked to, or is reasonably 22 linkable to an individual or a device that identi-23 fies, is linked to, or is reasonably linkable to an 24 individual; 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 9 •HR 1623 IH (B) is collected or processed for the pur-1 pose of fulfilling a request by an individual to 2 access any content on a covered platform; and 3 (C) is collected and processed solely for the 4 purpose of utilizing a technology verification 5 measure and meeting the obligations imposed 6 under this Act. 7 SEC. 4. TECHNOLOGY VERIFICATION MEASURES. 8 (a) C OVEREDPLATFORMREQUIREMENTS.—Begin-9 ning on the date that is 1 year after the date of enactment 10 of this Act, a covered platform shall adopt and utilize tech-11 nology verification measures on the platform to ensure 12 that— 13 (1) users of the covered platform are not mi-14 nors; and 15 (2) minors are prevented from accessing any 16 content on the covered platform that is harmful to 17 minors. 18 (b) R EQUIREMENTS FOR AGEVERIFICATIONMEAS-19 URES.—In order to comply with the requirement of sub-20 section (a), the technology verification measures adopted 21 and utilized by a covered platform shall do the following: 22 (1) Use a technology verification measure in 23 order to verify a user’s age. 24 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 10 •HR 1623 IH (2) Provide that requiring a user to confirm 1 that the user is not a minor shall not be sufficient 2 to satisfy the requirement of subsection (a). 3 (3) Make publicly available the verification 4 process that the covered platform is employing to 5 comply with the requirements under this Act. 6 (4) Subject the Internet Protocol (IP) address-7 es, including known virtual proxy network IP ad-8 dresses, of all users of a covered platform to the 9 technology verification measure described in para-10 graph (1) unless the covered platform determines 11 based on available technology that a user is not lo-12 cated within the United States. 13 (c) C HOICE OFVERIFICATIONMEASURES.—A cov-14 ered platform may choose the specific technology 15 verification measures to employ for purposes of complying 16 with subsection (a), provided that the technology 17 verification measure employed by the covered platform 18 meets the requirements of subsection (b) and prohibits a 19 minor from accessing the platform or any information on 20 the platform that is obscene, child pornography, or harm-21 ful to minors. 22 (d) U SE OFTHIRDPARTIES.—A covered platform 23 may contract with a third party to employ technology 24 verification measures for purposes of complying with sub-25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00010 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 11 •HR 1623 IH section (a) but the use of such a third party shall not re-1 lieve the covered platform of its obligations under this Act 2 or from liability under this Act. 3 (e) R ULE OFCONSTRUCTION.—Nothing in this sec-4 tion shall be construed to require a covered platform to 5 submit to the Commission any information that identifies, 6 is linked to, or is reasonably linkable to a user of the cov-7 ered platform or a device that identifies, is linked to, or 8 is reasonably linkable to a user of the covered platform. 9 (f) T ECHNOLOGYVERIFICATIONMEASUREDATASE-10 CURITY.—A covered platform shall— 11 (1) establish, implement, and maintain reason-12 able data security to— 13 (A) protect the confidentiality, integrity, 14 and accessibility of technology verification 15 measure data collected by the covered platform 16 or a third party employed by the covered plat-17 form; and 18 (B) protect such technology verification 19 measure data against unauthorized access; and 20 (2) retain the technology verification measure 21 data for no longer than is reasonably necessary to 22 utilize a technology verification measure or what is 23 minimally necessary to demonstrate compliance with 24 the obligations under this Act. 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00011 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 12 •HR 1623 IH SEC. 5. CONSULTATION REQUIREMENTS. 1 In enforcing the requirements under section 4, the 2 Commission shall consult with the following individuals, 3 including with respect to the applicable standards and 4 metrics for making a determination on whether a user of 5 a covered platform is not a minor: 6 (1) Individuals with experience in computer 7 science and software engineering. 8 (2) Individuals with experience in— 9 (A) advocating for online child safety; or 10 (B) providing services to minors who have 11 been victimized by online child exploitation. 12 (3) Individuals with experience in consumer 13 protection and online privacy. 14 (4) Individuals who supply technology 15 verification measure products or have expertise in 16 technology verification measure solutions. 17 (5) Individuals with experience in data security 18 and cryptography. 19 SEC. 6. COMMISSION REQUIREMENTS. 20 (a) I NGENERAL.—The Commission shall— 21 (1) conduct regular audits of covered platforms 22 to ensure compliance with the requirements of sec-23 tion 4; 24 (2) make public the terms and processes for the 25 audits conducted under paragraph (1), including the 26 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00012 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 13 •HR 1623 IH processes for any third party conducting an audit on 1 behalf of the Commission; 2 (3) establish a process for each covered plat-3 form to submit only such documents or other mate-4 rials as are necessary for the Commission to ensure 5 full compliance with the requirements of section 4 6 when conducting audits under this section; and 7 (4) prescribe the appropriate documents, mate-8 rials, or other measures required to demonstrate full 9 compliance with the requirements of section 4. 10 (b) G UIDANCE.— 11 (1) I N GENERAL.—Not later than 180 days 12 after the date of enactment of this Act, the Commis-13 sion shall issue guidance to assist covered platforms 14 in complying with the requirements of section 4. 15 (2) L IMITATIONS ON GUIDANCE .—No guidance 16 issued by the Commission with respect to this Act 17 shall confer any rights on any person, State, or lo-18 cality, nor shall operate to bind the Commission or 19 any person to the approach recommended in such 20 guidance. In any enforcement action brought pursu-21 ant to this Act, the Commission shall allege a spe-22 cific violation of a provision of this Act. The Com-23 mission may not base an enforcement action on, or 24 execute a consent order based on, practices that are 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00013 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 14 •HR 1623 IH alleged to be inconsistent with any such guidelines, 1 unless the practices allegedly violate a provision of 2 this Act. 3 SEC. 7. ENFORCEMENT. 4 (a) U NFAIR ORDECEPTIVEACT ORPRACTICE.—A 5 violation of section 4 shall be treated as a violation of a 6 rule defining an unfair or deceptive act or practice under 7 section 18(a)(1)(B) of the Federal Trade Commission Act 8 (15 U.S.C. 57a(a)(1)(B)). 9 (b) P OWERS OF THECOMMISSION.— 10 (1) I N GENERAL.—The Commission shall en-11 force section 4 in the same manner, by the same 12 means, and with the same jurisdiction, powers, and 13 duties as though all applicable terms and provisions 14 of the Federal Trade Commission Act (15 U.S.C. 41 15 et seq.) were incorporated into and made a part of 16 this title. 17 (2) P RIVILEGES AND IMMUNITIES .—Any person 18 who violates section 4 shall be subject to the pen-19 alties and entitled to the privileges and immunities 20 provided in the Federal Trade Commission Act (15 21 U.S.C. 41 et seq.). 22 (3) A UTHORITY PRESERVED .—Nothing in this 23 Act shall be construed to limit the authority of the 24 Commission under any other provision of law. 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00014 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 15 •HR 1623 IH SEC. 8. GAO REPORT. 1 Not later than 2 years after the date on which cov-2 ered platforms are required to comply with the require-3 ment of section 4(a), the Comptroller General of the 4 United States shall submit to Congress a report that in-5 cludes— 6 (1) an analysis of the effectiveness of the tech-7 nology verification measures required under such 8 section; 9 (2) an analysis of rates of compliance with such 10 section among covered platforms; 11 (3) an analysis of the data security measures 12 used by covered platforms in the age verification 13 process; 14 (4) an analysis of the behavioral, economic, psy-15 chological, and societal effects of implementing tech-16 nology verification measures; 17 (5) recommendations to the Commission on im-18 proving enforcement of section 4(a), if any; and 19 (6) recommendations to Congress on potential 20 legislative improvements to this Act, if any. 21 SEC. 9. SEVERABILITY CLAUSE. 22 If any provision of this Act, or the application of such 23 a provision to any person or circumstance, is held to be 24 unconstitutional, the remaining provisions of this Act, and 25 VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00015 Fmt 6652 Sfmt 6201 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB 16 •HR 1623 IH the application of such provisions to any other person or 1 circumstance, shall not be affected thereby. 2 Æ VerDate Sep 11 2014 04:54 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00016 Fmt 6652 Sfmt 6301 E:\BILLS\H1623.IH H1623 kjohnson on DSK7ZCZBW3PROD with $$_JOB