|
|
|
HB1311 |
- 2 - |
LRB096 04832 MJR 14897 b |
|
|
1 |
| child pornography by a nationwide law enforcement agency. |
2 |
| "Hash value" means the unique digital signature assigned to |
3 |
| a digital file that can be recognized no matter what the file |
4 |
| is named. |
5 |
| "Internet service provider" or "ISP" means a person or |
6 |
| company that provides a service that combines computer |
7 |
| processing, information storage, protocol conversion, and |
8 |
| routing with transmission to enable a consumer to access |
9 |
| Internet content and services. |
10 |
| (220 ILCS 5/23-110 new) |
11 |
| Sec. 23-110. Regulation of internet service providers by |
12 |
| Commission; establishment of digital clearinghouse. |
13 |
| (a) The Commission shall require that all internet service |
14 |
| providers that provide service to customers in this State shall |
15 |
| comply with this Article concerning the prevention of |
16 |
| transmission of child pornography. |
17 |
| (b) The Commission shall select a nationwide law |
18 |
| enforcement agency to serve as a clearinghouse and compile a |
19 |
| continuously updated list of files known to contain child |
20 |
| pornography. The selected law enforcement agency shall inspect |
21 |
| the files and makes a judgment that the files are illegal in |
22 |
| their jurisdiction before adding them to the registry according |
23 |
| to their hash value. |
24 |
| (c) The Commission shall require that internet service |
25 |
| providers create and implement software that complies with the |
|
|
|
HB1311 |
- 3 - |
LRB096 04832 MJR 14897 b |
|
|
1 |
| following: |
2 |
| (1) Whenever a customer searches the Internet through |
3 |
| the World Wide Web, attaches a file to an e-mail, or |
4 |
| examines a menu of files using file-sharing software on a |
5 |
| peer-to-peer network, the software would compare the hash |
6 |
| values of those files against the file registry. The |
7 |
| software must not examine the content of the file, but it |
8 |
| would determine whether a file, through comparison of the |
9 |
| hash value, is digitally identical to a file on the |
10 |
| registry. |
11 |
| (2) If the file does not match a file on the registry, |
12 |
| then the file would be provided to the customer who |
13 |
| requested it. |
14 |
| (3) If the file did match a file on the registry, then |
15 |
| transmission of the file would be blocked by the software. |
16 |
| The software shall provide the customer another image, |
17 |
| movie, or document that contains or provides only a warning |
18 |
| screen explaining that the requested file violates this |
19 |
| Article. |
20 |
| (220 ILCS 5/23-115 new) |
21 |
| Sec. 23-115. Immunity from liability for internet service |
22 |
| providers. An internet service provider that make a good-faith |
23 |
| effort to comply with this Article shall be immune from |
24 |
| liability under this Article. |