|
| | HB3280 | - 2 - | LRB097 08248 ASK 48374 b |
|
|
1 | | child pornography by a nationwide law enforcement agency. |
2 | | "Hash value" means the unique digital signature assigned to |
3 | | a digital file that can be recognized no matter what the file |
4 | | is named. |
5 | | "Internet service provider" or "ISP" means a person or |
6 | | company that provides a service that combines computer |
7 | | processing, information storage, protocol conversion, and |
8 | | routing with transmission to enable a consumer to access |
9 | | Internet content and services. |
10 | | (220 ILCS 5/23-110 new) |
11 | | Sec. 23-110. Regulation of internet service providers by |
12 | | Commission; establishment of digital clearinghouse. |
13 | | (a) The Commission shall require that all internet service |
14 | | providers that provide service to customers in this State shall |
15 | | comply with this Article concerning the prevention of |
16 | | transmission of child pornography. |
17 | | (b) The Commission shall select a nationwide law |
18 | | enforcement agency to serve as a clearinghouse and compile a |
19 | | continuously updated list of files known to contain child |
20 | | pornography. The selected law enforcement agency shall inspect |
21 | | the files and makes a judgment that the files are illegal in |
22 | | their jurisdiction before adding them to the registry according |
23 | | to their hash value. |
24 | | (c) The Commission shall require that internet service |
25 | | providers create and implement software that complies with the |
|
| | HB3280 | - 3 - | LRB097 08248 ASK 48374 b |
|
|
1 | | following: |
2 | | (1) Whenever a customer searches the Internet through |
3 | | the World Wide Web, attaches a file to an e-mail, or |
4 | | examines a menu of files using file-sharing software on a |
5 | | peer-to-peer network, the software would compare the hash |
6 | | values of those files against the file registry. The |
7 | | software must not examine the content of the file, but it |
8 | | would determine whether a file, through comparison of the |
9 | | hash value, is digitally identical to a file on the |
10 | | registry. |
11 | | (2) If the file does not match a file on the registry, |
12 | | then the file would be provided to the customer who |
13 | | requested it. |
14 | | (3) If the file did match a file on the registry, then |
15 | | transmission of the file would be blocked by the software. |
16 | | The software shall provide the customer another image, |
17 | | movie, or document that contains or provides only a warning |
18 | | screen explaining that the requested file violates this |
19 | | Article. |
20 | | (220 ILCS 5/23-115 new) |
21 | | Sec. 23-115. Immunity from liability for internet service |
22 | | providers. An internet service provider that make a good-faith |
23 | | effort to comply with this Article shall be immune from |
24 | | liability under this Article. |