H.R.1319 - Informed P2P User Act111th Congress (2009-2010)
|Sponsor:||Rep. Bono Mack, Mary [R-CA-45] (Introduced 03/05/2009)|
|Committees:||House - Energy and Commerce | Senate - Commerce, Science, and Transportation|
|Committee Reports:||H. Rept. 111-361|
|Latest Action:||Senate - 12/09/2009 Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions)|
This bill has the status Passed House
Here are the steps for Status of Legislation:
- Passed House
Text: H.R.1319 — 111th Congress (2009-2010)All Information (Except Text)
Text available as:
Referred in Senate (12/09/2009)
Received; read twice and referred to the Committee on Commerce, Science, and Transportation
To prevent the inadvertent disclosure of information on a computer through certain “peer-to-peer” file sharing programs without first providing notice and obtaining consent from an owner or authorized user of the computer.
This Act may be cited as the “Informed P2P User Act”.
(1) NOTICE AND CONSENT REQUIRED PRIOR TO INSTALLATION.—It is unlawful for any covered entity to install on a protected computer or offer or make available for installation or download on a protected computer a covered file-sharing program unless such program—
(i) provides clear and conspicuous notice that such program allows files on the protected computer to be made available for searching by and copying to one or more other computers; and
(ii) obtains the informed consent to the installation of such program from an owner or authorized user of the protected computer; and
(i) provides clear and conspicuous notice of which files on the protected computer are to be made available for searching by and copying to another computer; and
(ii) obtains the informed consent from an owner or authorized user of the protected computer for such files to be made available for searching and copying to another computer.
(2) NON-APPLICATION TO PRE-INSTALLED SOFTWARE.—Nothing in paragraph (1)(A) shall apply to the installation of a covered file-sharing program on a computer prior to the first sale of such computer to an end user, provided that notice is provided to the end user who first purchases the computer that such a program has been installed on the computer.
(3) NON-APPLICATION TO SOFTWARE UPGRADES.—Once the notice and consent requirements of paragraphs (1)(A) and (1)(B) have been satisfied with respect to the installation or initial activation of a covered file-sharing program on a protected computer after the effective date of this Act, the notice and consent requirements of paragraphs (1)(A) and (1)(B) do not apply to the installation or initial activation of software modifications or upgrades to a covered file-sharing program installed on that protected computer at the time of the software modifications or upgrades so long as those software modifications or upgrades do not—
(A) make files on the protected computer available for searching by and copying to one or more other computers that were not already made available by the covered file-sharing program for searching by and copying to one or more other computers; or
(B) add to the types or locations of files that can be made available by the covered file-sharing program for searching by and copying to one or more other computers.
(1) to prevent the reasonable efforts of an owner or authorized user of a protected computer from blocking the installation of a covered file-sharing program or file-sharing function thereof; or
(A) disable from the protected computer any covered file-sharing program; or
(B) remove from the protected computer any covered file-sharing program that the covered entity caused to be installed on that computer or induced another individual to install.
(a) Unfair and Deceptive Acts and Practices.—A violation of section 2 shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (15 U.S.C. 57a(a)(1)(B)).
(b) Federal Trade Commission Enforcement.—The Federal Trade Commission shall enforce this Act in the same manner, by the same means, and with the same jurisdiction as though all applicable terms and provisions of the Federal Trade Commission Act were incorporated into and made a part of this Act.
(c) Preservation of Federal and State Authority.—Nothing in this Act shall be construed to limit or supersede any other Federal or State law.
As used in this Act—
(1) the term “commercial entity” means an entity engaged in acts or practices in or affecting commerce, as such term is defined in section 4 of the Federal Trade Commission Act (15 U.S.C. 44);
(A) a commercial entity that develops a covered file-sharing program; and
(B) a commercial entity that disseminates or distributes a covered file-sharing program and is owned or operated by the commercial entity that developed the covered file-sharing program;
(3) the term “protected computer” has the meaning given such term in section 1030(e)(2) of title 18, United States Code; and
(i) a file or files on the protected computer on which such program is installed to be designated as available for searching by and copying to one or more other computers owned by another person;
(I) at the initiative of such other computer and without requiring any action by an owner or authorized user of the protected computer on which such program is installed; and
(II) without requiring an owner or authorized user of the protected computer on which such program is installed to have selected or designated a computer owned by another person as the recipient of any such file; and
(iii) the protected computer on which such program is installed to search files on one or more other computers owned by another person using the same or a compatible program, application, or software, and to copy files from the other computer to such protected computer; and
(i) operate as a server that is accessible over the Internet using the Internet Domain Name system;
(ii) transmit or receive email messages, instant messaging, real-time audio or video communications, or real-time voice communications; or
(iii) provide network or computer security, network management, hosting and backup services, maintenance, diagnostics, technical support or repair, or to detect or prevent fraudulent activities; and
(A) the first time the file sharing function of a covered file-sharing program is activated on a protected computer; and
(B) does not include subsequent uses of the program on that protected computer.
The Federal Trade Commission may promulgate regulations under section 553 of title 5, United States Code to accomplish the purposes of this Act. In promulgating rules under this Act, the Federal Trade Commission shall not require the deployment or use of any specific products or technologies.
The prohibition in section 2 of this Act shall not apply to the Federal Government or any instrumentality of the Federal Government, nor to any State government or government of a subdivision of a State.
Passed the House of Representatives December 8, 2009.
|Attest:||lorraine c. miller,|