Page:United States Statutes at Large Volume 122.djvu/4272

From Wikisource
Jump to navigation Jump to search
This page needs to be proofread.

12 2 STA T .4 24 9PUBLIC LA W 11 0– 401 —O CT. 1 3, 200 8namer e gist rar ,o ra d ire c tor, o f ficer, em pl o y ee, or agent of t h at electronic comm u nication ser v ice provider, remote computing service provider, or domain name registrar —‘ ‘ (1) engaged in intentional misconduct

or ‘‘( 2 ) acted, or failed to act— ‘‘( A ) w ith actual malice; ‘‘( B ) with rec k less disregard to a su b stantial risk of causing physical in j ury without legal justification; or ‘‘( C ) for a purpose unrelated to the performance of any responsibility or function under this section, sections 22 58 A, 2258C, 2 70 2, or 270 3. ‘‘(c) MIN I M I Z IN G A C C ES S.—An electronic communication service provider, a remote computing service provider, and domain name registrar shall— ‘‘(1) minimi z e the number of employees that are provided access to any image provided under section 2258A or 2258C; and ‘‘(2) ensure that any such image is permanently destroyed, upon a re q uest from a law enforcement agency to destroy the image. ‘ ‘ SEC.2 2 58 C. U SE TO CO MBA TC HILDP O RN O G RAPH Y O F TECHNICAL ELEMENTS RELATING TO IMAGES REPORTED TO THE CYBERTIPLINE. ‘‘(a) EL EMEN T S.— ‘‘(1) I N GENE RA L.— T he N ational Center for Missing and E x ploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote com - puting service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further trans- mission of images. ‘‘(2) INCL U SI O NS.—The elements authorized under para- graph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography. ‘‘(3) E X CLUSION.—The elements authorized under para- graph (1) may not include the actual images. ‘‘(b) U SE BY ELECTRONIC COMMUNICATION S ER V ICE P ROVI D ERS AND R EMOTE COM P UTING SERVICE PROVIDERS.—Any electronic communication service provider or remote computing service pro- vider that receives elements relating to any apparent child pornog- raphy image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A. ‘‘(c) L IMITATIONS.—Nothing in subsections (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images. 18USC2 2 5 8C .