1 | 1 | | I |
---|
2 | 2 | | 119THCONGRESS |
---|
3 | 3 | | 1 |
---|
4 | 4 | | STSESSION H. R. 2508 |
---|
5 | 5 | | To preempt State data security vulnerability mandates and decryption |
---|
6 | 6 | | requirements. |
---|
7 | 7 | | IN THE HOUSE OF REPRESENTATIVES |
---|
8 | 8 | | MARCH31, 2025 |
---|
9 | 9 | | Mr. L |
---|
10 | 10 | | IEU(for himself and Ms. DELBENE) introduced the following bill; which |
---|
11 | 11 | | was referred to the Committee on the Judiciary, and in addition to the |
---|
12 | 12 | | Committee on Energy and Commerce, for a period to be subsequently de- |
---|
13 | 13 | | termined by the Speaker, in each case for consideration of such provisions |
---|
14 | 14 | | as fall within the jurisdiction of the committee concerned |
---|
15 | 15 | | A BILL |
---|
16 | 16 | | To preempt State data security vulnerability mandates and |
---|
17 | 17 | | decryption requirements. |
---|
18 | 18 | | Be it enacted by the Senate and House of Representa-1 |
---|
19 | 19 | | tives of the United States of America in Congress assembled, 2 |
---|
20 | 20 | | SECTION 1. SHORT TITLE. 3 |
---|
21 | 21 | | This Act may be cited as the ‘‘Ensuring National 4 |
---|
22 | 22 | | Constitutional Rights for Your Private Telecommuni-5 |
---|
23 | 23 | | cations Act of 2025’’ or the ‘‘ENCRYPT Act of 2025’’. 6 |
---|
24 | 24 | | VerDate Sep 11 2014 04:33 Apr 04, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H2508.IH H2508 |
---|
25 | 25 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 2 |
---|
26 | 26 | | •HR 2508 IH |
---|
27 | 27 | | SEC. 2. PREEMPTION OF STATE DATA SECURITY VULNER-1 |
---|
28 | 28 | | ABILITY MANDATES AND DECRYPTION RE-2 |
---|
29 | 29 | | QUIREMENTS. 3 |
---|
30 | 30 | | (a) I |
---|
31 | 31 | | NGENERAL.—A State or political subdivision of 4 |
---|
32 | 32 | | a State may not— 5 |
---|
33 | 33 | | (1) mandate or request that a manufacturer, 6 |
---|
34 | 34 | | developer, seller, or provider of covered products or 7 |
---|
35 | 35 | | services— 8 |
---|
36 | 36 | | (A) design or alter the security functions 9 |
---|
37 | 37 | | in its product or service to allow the surveil-10 |
---|
38 | 38 | | lance of any user of such product or service, or 11 |
---|
39 | 39 | | to allow the physical search of such product, by 12 |
---|
40 | 40 | | any agency or instrumentality of a State, a po-13 |
---|
41 | 41 | | litical subdivision of a State, or the United 14 |
---|
42 | 42 | | States; or 15 |
---|
43 | 43 | | (B) have the ability to decrypt or otherwise 16 |
---|
44 | 44 | | render intelligible information that is encrypted 17 |
---|
45 | 45 | | or otherwise rendered unintelligible using its 18 |
---|
46 | 46 | | product or service; or 19 |
---|
47 | 47 | | (2) prohibit the manufacture, sale or lease, of-20 |
---|
48 | 48 | | fering for sale or lease, or provision to the general 21 |
---|
49 | 49 | | public of a covered product or service because such 22 |
---|
50 | 50 | | product or service uses encryption or a similar secu-23 |
---|
51 | 51 | | rity function. 24 |
---|
52 | 52 | | (b) D |
---|
53 | 53 | | EFINITIONS.—In this section: 25 |
---|
54 | 54 | | VerDate Sep 11 2014 04:33 Apr 04, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H2508.IH H2508 |
---|
55 | 55 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 3 |
---|
56 | 56 | | •HR 2508 IH |
---|
57 | 57 | | (1) COVERED PRODUCT OR SERVICE .—The 1 |
---|
58 | 58 | | term ‘‘covered product or service’’ means any com-2 |
---|
59 | 59 | | puter hardware, computer software, electronic de-3 |
---|
60 | 60 | | vice, or online service that— 4 |
---|
61 | 61 | | (A) has traveled in interstate or foreign 5 |
---|
62 | 62 | | commerce or otherwise affects interstate or for-6 |
---|
63 | 63 | | eign commerce; and 7 |
---|
64 | 64 | | (B) is made available to the general public. 8 |
---|
65 | 65 | | (2) O |
---|
66 | 66 | | NLINE SERVICE.—The term ‘‘online serv-9 |
---|
67 | 67 | | ice’’ means a service provided over the internet that 10 |
---|
68 | 68 | | makes available to users— 11 |
---|
69 | 69 | | (A) the ability to send or receive commu-12 |
---|
70 | 70 | | nications, such as emails, text messages, 13 |
---|
71 | 71 | | photos, and audio and video communications; 14 |
---|
72 | 72 | | (B) the ability to share data files with 15 |
---|
73 | 73 | | other users; or 16 |
---|
74 | 74 | | (C) remote computer processing or storage. 17 |
---|
75 | 75 | | (3) S |
---|
76 | 76 | | TATE.—The term ‘‘State’’ means each of 18 |
---|
77 | 77 | | the several States, the District of Columbia, each 19 |
---|
78 | 78 | | commonwealth, territory, or possession of the United 20 |
---|
79 | 79 | | States, and each federally recognized Indian Tribe. 21 |
---|
80 | 80 | | Æ |
---|
81 | 81 | | VerDate Sep 11 2014 04:33 Apr 04, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6301 E:\BILLS\H2508.IH H2508 |
---|
82 | 82 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB |
---|