<?xml version="1.0" encoding="UTF-16"?>
<leg xml:space="preserve" billnum="HB0276" sponsor="Ariel Defay" designation="HB" otherSponsor="" otherHouse="Senate" sess="2026GS" fileno="2026FL0849" date="1/16/2026 13:01:250" printDate="01-16 13:39" subVer="0" minVer="0" office="LEGISLATIVE GENERAL COUNSEL" actionDate="" impact="code"><info><nextbuid>51</nextbuid><aminfo anum="0" effdate="05/06/2026"><seclist><sect action="E" src="code" buid="1" uid="C13-72b-S101_2026050620260506" sort="13 72b01010020260506" mtype="section" effdate="05/06/2026">13-72b-101</sect><sect action="E" src="code" buid="2" uid="C13-72b-S102_2026050620260506" sort="13 72b01020020260506" mtype="section" effdate="05/06/2026">13-72b-102</sect><sect action="E" src="code" buid="3" uid="C13-72b-S103_2026050620260506" sort="13 72b01030020260506" mtype="section" effdate="05/06/2026">13-72b-103</sect><sect action="E" src="code" buid="4" uid="C13-72b-S104_2026050620260506" sort="13 72b01040020260506" mtype="section" effdate="05/06/2026">13-72b-104</sect><sect action="E" src="code" buid="5" uid="C13-72b-S105_2026050620260506" sort="13 72b01050020260506" mtype="section" effdate="05/06/2026">13-72b-105</sect><sect action="E" src="code" buid="7" uid="C13-72b-S106_2026050620260506" sort="13 72b01060020260506" mtype="section" effdate="05/06/2026">13-72b-106</sect><sect action="E" src="code" buid="9" uid="C13-72b-S107_2026050620260506" sort="13 72b01070020260506" mtype="section" effdate="05/06/2026">13-72b-107</sect><sect action="E" src="code" buid="11" uid="C13-72c-S101_2026050620260506" sort="13 72c01010020260506" mtype="section" effdate="05/06/2026">13-72c-101</sect><sect action="E" src="code" buid="31" uid="C13-72c-S201_2026050620260506" sort="13 72c02010020260506" mtype="section" effdate="05/06/2026">13-72c-201</sect><sect action="E" src="code" buid="29" uid="C13-72c-S202_2026050620260506" sort="13 72c02020020260506" mtype="section" effdate="05/06/2026">13-72c-202</sect><sect action="E" src="code" buid="39" uid="C13-72c-S203_2026050620260506" sort="13 72c02030020260506" mtype="section" effdate="05/06/2026">13-72c-203</sect><sect action="E" src="code" buid="35" uid="C13-72c-S301_2026050620260506" sort="13 72c03010020260506" mtype="section" effdate="05/06/2026">13-72c-301</sect><sect action="E" src="code" buid="48" uid="C63A-16-S215_2026050620260506" sort="63A16 02150020260506" mtype="section" effdate="05/06/2026">63A-16-215</sect><sect src="uncod" untype="effdate" buid="50" uid="EF0000" sort="UZEFF" mtype="uncod" effdate="05/06/2026"/></seclist></aminfo></info><tbox><sinfo><nextpairid>0</nextpairid></sinfo><st numlevel="1" lineno="1" slineno="0-1">Artificial Intelligence Modifications</st><sessionhead>2026 GENERAL SESSION</sessionhead><statehead>STATE OF UTAH</statehead><sponsorhead>Chief Sponsor: Ariel Defay</sponsorhead><otherSponsorhead>Senate Sponsor: </otherSponsorhead></tbox><lt numlevel="1" lineno="2" slineno="0-2"><lthead lineno="3">LONG TITLE</lthead><gdhead lineno="4">General Description:</gdhead><gd numlevel="1" lineno="5" slineno="0-5">This bill enacts provisions related to counterfeit intimate images and digital content <ln numlevel="1" lineno="6" slineno="0-6"/>provenance standards.</gd><hphead lineno="7">Highlighted Provisions:</hphead><hp numlevel="1" lineno="8" slineno="0-8">This bill:<hl numlevel="1" lineno="9" slineno="0-9" level="1">defines terms;</hl><hl numlevel="1" lineno="10" slineno="0-10" level="1">creates the Digital Voyeurism Prevention Act to address non-consensual generation and <ln numlevel="1" lineno="11" slineno="0-11"/>distribution of counterfeit intimate images;</hl><hl numlevel="1" lineno="12" slineno="0-12" level="1">prohibits generation services and platforms from distributing counterfeit intimate images <ln numlevel="1" lineno="13" slineno="0-13"/>without obtaining and verifying consent from the depicted individual;</hl><hl numlevel="1" lineno="14" slineno="0-14" level="1">establishes civil liability with statutory damages, actual damages, punitive damages, <ln numlevel="1" lineno="15" slineno="0-15"/>attorney fees, and injunctive relief;</hl><hl numlevel="1" lineno="16" slineno="0-16" level="1">requires platforms to implement notice and takedown procedures and disclosure <ln numlevel="1" lineno="17" slineno="0-17"/>requirements;</hl><hl numlevel="1" lineno="18" slineno="0-18" level="1">requires large online platforms to detect, disclose, and preserve provenance data in <ln numlevel="1" lineno="19" slineno="0-19"/>distributed content;</hl><hl numlevel="1" lineno="20" slineno="0-20" level="1">establishes requirements for capture device manufacturers regarding latent disclosures in <ln numlevel="1" lineno="21" slineno="0-21"/>captured content; </hl><hl numlevel="1" lineno="22" slineno="0-22" level="1">requires covered providers to include disclosures in AI-generated content;</hl><hl numlevel="1" lineno="23" slineno="0-23" level="1">establishes requirements for licensing generative artificial intelligence systems to third <ln numlevel="1" lineno="24" slineno="0-24"/>parties;</hl><hl numlevel="1" lineno="25" slineno="0-25" level="1">provides exemptions for certain products and services; and</hl><hl numlevel="1" lineno="26" slineno="0-26" level="1">provides for enforcement by the Division of Consumer Protection.</hl></hp><moni numlevel="1" lineno="27" slineno="0-27" display="none">Money Appropriated in this Bill:</moni><moniNone lineno="28">None</moniNone><oc numlevel="1" lineno="29" slineno="0-29">Other Special Clauses:</oc><ocNone lineno="30">None</ocNone><sa numlevel="1" lineno="31" slineno="0-31">Utah Code Sections Affected:<saent numlevel="1" lineno="32" slineno="0-32"><snhead>ENACTS:</snhead><sn num="13-72b-101" src="code" uid="C13-72b-S101_2026050620260506" buid="1" sort="13 72b01010020260506" numlevel="1" lineno="33" slineno="0-33"><bold>13-72b-101</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-102" src="code" uid="C13-72b-S102_2026050620260506" buid="2" sort="13 72b01020020260506" numlevel="1" lineno="34" slineno="0-34"><bold>13-72b-102</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-103" src="code" uid="C13-72b-S103_2026050620260506" buid="3" sort="13 72b01030020260506" numlevel="1" lineno="35" slineno="0-35"><bold>13-72b-103</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-104" src="code" uid="C13-72b-S104_2026050620260506" buid="4" sort="13 72b01040020260506" numlevel="1" lineno="36" slineno="0-36"><bold>13-72b-104</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-105" src="code" uid="C13-72b-S105_2026050620260506" buid="5" sort="13 72b01050020260506" numlevel="1" lineno="37" slineno="0-37"><bold>13-72b-105</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-106" src="code" uid="C13-72b-S106_2026050620260506" buid="7" sort="13 72b01060020260506" numlevel="1" lineno="38" slineno="0-38"><bold>13-72b-106</bold>, Utah Code Annotated 1953</sn><sn num="13-72b-107" src="code" uid="C13-72b-S107_2026050620260506" buid="9" sort="13 72b01070020260506" numlevel="1" lineno="39" slineno="0-39"><bold>13-72b-107</bold>, Utah Code Annotated 1953</sn><sn num="13-72c-101" src="code" uid="C13-72c-S101_2026050620260506" buid="11" sort="13 72c01010020260506" numlevel="1" lineno="40" slineno="0-40"><bold>13-72c-101</bold>, Utah Code Annotated 1953</sn><sn num="13-72c-201" src="code" uid="C13-72c-S201_2026050620260506" buid="31" sort="13 72c02010020260506" numlevel="1" lineno="41" slineno="0-41"><bold>13-72c-201</bold>, Utah Code Annotated 1953</sn><sn num="13-72c-202" src="code" uid="C13-72c-S202_2026050620260506" buid="29" sort="13 72c02020020260506" numlevel="1" lineno="42" slineno="0-42"><bold>13-72c-202</bold>, Utah Code Annotated 1953</sn><sn num="13-72c-203" src="code" uid="C13-72c-S203_2026050620260506" buid="39" sort="13 72c02030020260506" numlevel="1" lineno="43" slineno="0-43"><bold>13-72c-203</bold>, Utah Code Annotated 1953</sn><sn num="13-72c-301" src="code" uid="C13-72c-S301_2026050620260506" buid="35" sort="13 72c03010020260506" numlevel="1" lineno="44" slineno="0-44"><bold>13-72c-301</bold>, Utah Code Annotated 1953</sn><sn num="63A-16-215" src="code" uid="C63A-16-S215_2026050620260506" buid="48" sort="63A16 02150020260506" numlevel="1" lineno="45" slineno="0-45"><bold>63A-16-215</bold>, Utah Code Annotated 1953</sn></saent></sa></lt><enacthead lineno="46"/><enact numlevel="1" lineno="47" slineno="0-47">Be it enacted by the Legislature of the state of Utah:</enact><bdy><bsec buid="1" num="13-72b-101" type="enact" src="code" uid="C13-72b-S101_2026050620260506" sort="13 72b01010020260506" numlevel="1" lineno="48" slineno="1-1" sn="1"><section numlevel="1" lineno="50" slineno="1-3" number="13-72b-101" type="enact"><secline lineno="48">Section 1. Section <bold>13-72b-101</bold> is enacted to read:</secline><headchap number="13-72b" numlevel="1" lineno="49" slineno="1-2">72b. Digital Voyeurism Prevention Act </headchap><catline lineno="50"><bold>13-72b-101<parens/>. Definitions.</bold></catline><sectionText lineno="51"><para/><amend anum="0" ea="amend" pairid="186" groupid="147" style="1" owner="jchristopherson" level="1" amendtag="both">As used in this chapter:</amend></sectionText><subsection ssid="1-38" dnum="_-o:1-i" numlevel="1" lineno="52" slineno="1-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1000" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="184" groupid="145" style="1" owner="jchristopherson" level="1" amendtag="end">"Artificial intelligence technology" means the same as that term is defined in Section <xref depth="3" refnumber="13-72-101"><ln numlevel="1" lineno="53" slineno="1-6"/>13-72-101</xref>.</amend></subsection><subsection ssid="1-2" dnum="_-o:2-i" numlevel="1" lineno="54" slineno="1-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1001" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">"Consent" means express permission, freely and voluntarily given by an identifiable <ln numlevel="1" lineno="55" slineno="1-8"/>individual, with full knowledge of the nature and purpose of the generation of an <ln numlevel="1" lineno="56" slineno="1-9"/>intimate image depicting the individual, where the consent:</amend><subsection ssid="1-3" dnum="_-o:a-i" numlevel="1" lineno="57" slineno="1-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1002" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">is specific to the particular intimate image being generated;</amend></subsection><subsection ssid="1-4" dnum="_-o:b-i" numlevel="1" lineno="58" slineno="1-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1003" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">is obtained before the generation of the intimate image; and</amend></subsection><subsection ssid="1-5" dnum="_-o:c-i" numlevel="1" lineno="59" slineno="1-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1004" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">may be revoked at any time.</amend></subsection></subsection><subsection ssid="1-6" dnum="_-o:3-i" numlevel="1" lineno="60" slineno="1-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1005" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">"Counterfeit intimate image" means an intimate image that has been created or <ln numlevel="1" lineno="61" slineno="1-14"/>generated through the use of artificial intelligence technology, machine learning, digital <ln numlevel="1" lineno="62" slineno="1-15"/>editing tools, or other technological means to depict the likeness of an identifiable <ln numlevel="1" lineno="63" slineno="1-16"/>individual.</amend></subsection><subsection ssid="1-7" dnum="_-o:4-i" numlevel="1" lineno="64" slineno="1-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1006" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><subsection ssid="1-9" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1007" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">"Distribute" means to sell, exhibit, display, publish, provide, give, provide access <ln numlevel="1" lineno="65" slineno="1-18"/>to, or otherwise transfer a counterfeit intimate image, with or without consideration.</amend></subsection><subsection ssid="1-10" dnum="_-o:b-i" numlevel="1" lineno="66" slineno="1-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1008" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="49" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">"Distribute" includes the generation of a counterfeit intimate image by a generation <ln numlevel="1" lineno="67" slineno="1-20"/>service and the subsequent provision of that counterfeit intimate image to the user.</amend></subsection></subsection><subsection ssid="1-8" dnum="_-o:5-i" numlevel="1" lineno="68" slineno="1-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1009" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">"Generate" means to create, produce, compose, materially edit, or facilitate the creation <ln numlevel="1" lineno="69" slineno="1-22"/>of an intimate image through the use of artificial intelligence technology, digital editing <ln numlevel="1" lineno="70" slineno="1-23"/>tools, or other technological means.</amend></subsection><subsection ssid="1-11" dnum="_-o:6-i" numlevel="1" lineno="71" slineno="1-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1010" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="54" groupid="41" style="1" owner="jchristopherson" level="1" amendtag="end">"Generation service" means a person that operates, maintains, or provides an interactive <ln numlevel="1" lineno="72" slineno="1-25"/>computer service that:</amend><subsection ssid="1-12" dnum="_-o:a-i" numlevel="1" lineno="73" slineno="1-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1011" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="59" groupid="45" style="1" owner="jchristopherson" level="1" amendtag="end">enables users to generate intimate images;</amend></subsection><subsection ssid="1-13" dnum="_-o:b-i" numlevel="1" lineno="74" slineno="1-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1012" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="64" groupid="49" style="1" owner="jchristopherson" level="1" amendtag="end">processes user image generation requests through servers, computer systems, or <ln numlevel="1" lineno="75" slineno="1-28"/>computing resources controlled by the service operator rather than solely on the <ln numlevel="1" lineno="76" slineno="1-29"/>user's local device; and</amend></subsection><subsection ssid="1-14" dnum="_-o:c-i" numlevel="1" lineno="77" slineno="1-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1013" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="69" groupid="53" style="1" owner="jchristopherson" level="1" amendtag="end">distributes generated intimate images to users through the service.</amend></subsection></subsection><subsection ssid="1-15" dnum="_-o:7-i" numlevel="1" lineno="78" slineno="1-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1014" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="74" groupid="57" style="1" owner="jchristopherson" level="1" amendtag="end">"Identifiable individual" means an individual who is recognizable as an actual human <ln numlevel="1" lineno="79" slineno="1-32"/>individual by the human individual's face, likeness, or other distinguishing <ln numlevel="1" lineno="80" slineno="1-33"/>characteristic, including a unique physical feature or other recognizable attribute.</amend></subsection><subsection ssid="1-39" dnum="_-o:8-i" numlevel="1" lineno="81" slineno="1-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1015" style="1" owner="i" level="1" amendtag="start">(8)</amend></display><amend anum="0" ea="amend" pairid="192" groupid="152" style="1" owner="jchristopherson" level="1" amendtag="end">"Interactive computer service" means the same as that term is defined in 47 U.S.C. Sec. <ln numlevel="1" lineno="82" slineno="1-35"/>230(f)(2).</amend></subsection><subsection ssid="1-16" dnum="_-o:9-i" numlevel="1" lineno="83" slineno="1-36" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1016" style="1" owner="i" level="1" amendtag="start">(9)</amend></display><amend anum="0" ea="amend" pairid="79" groupid="61" style="1" owner="jchristopherson" level="1" amendtag="end">"Intimate image" means any visual depiction, photograph, film, video, recording, <ln numlevel="1" lineno="84" slineno="1-37"/>picture, or computer or computer-generated image, picture, or video, whether made or <ln numlevel="1" lineno="85" slineno="1-38"/>produced by electronic, mechanical, or other means, that depicts:</amend><subsection ssid="1-17" dnum="_-o:a-i" numlevel="1" lineno="86" slineno="1-39" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1017" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="84" groupid="65" style="1" owner="jchristopherson" level="1" amendtag="end">exposed human male or female genitals, anus, or pubic area, with less than an opaque <ln numlevel="1" lineno="87" slineno="1-40"/>covering;</amend></subsection><subsection ssid="1-18" dnum="_-o:b-i" numlevel="1" lineno="88" slineno="1-41" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1018" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="89" groupid="69" style="1" owner="jchristopherson" level="1" amendtag="end">a female breast with less than an opaque covering, or any portion of the female <ln numlevel="1" lineno="89" slineno="1-42"/>breast below the top of the areola; or</amend></subsection><subsection ssid="1-19" dnum="_-o:c-i" numlevel="1" lineno="90" slineno="1-43" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1019" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="94" groupid="73" style="1" owner="jchristopherson" level="1" amendtag="end">an individual engaged in sexually explicit conduct.</amend></subsection></subsection><subsection ssid="1-20" dnum="_-o:10-i" numlevel="1" lineno="91" slineno="1-44" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1020" style="1" owner="i" level="1" amendtag="start">(10)</amend></display><amend anum="0" ea="amend" pairid="99" groupid="77" style="1" owner="jchristopherson" level="1" amendtag="end">"Platform" means a person that operates, maintains, or provides an interactive <ln numlevel="1" lineno="92" slineno="1-45"/>computer service that:</amend><subsection ssid="1-21" dnum="_-o:a-i" numlevel="1" lineno="93" slineno="1-46" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1021" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="188" groupid="149" style="1" owner="jchristopherson" level="1" amendtag="end">hosts, distributes, or makes accessible content; and</amend></subsection><subsection ssid="1-23" dnum="_-o:b-i" numlevel="1" lineno="94" slineno="1-47" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1022" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="114" groupid="89" style="1" owner="jchristopherson" level="1" amendtag="end">enables a user to interact with content provided by the platform or another user.</amend></subsection></subsection><subsection ssid="1-24" dnum="_-o:11-i" numlevel="1" lineno="95" slineno="1-48" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1023" style="1" owner="i" level="1" amendtag="start">(11)</amend></display><amend anum="0" ea="amend" pairid="119" groupid="93" style="1" owner="jchristopherson" level="1" amendtag="end">"Reasonable expectation of privacy" means an individual's expectation that:</amend><subsection ssid="1-25" dnum="_-o:a-i" numlevel="1" lineno="96" slineno="1-49" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1024" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="124" groupid="97" style="1" owner="jchristopherson" level="1" amendtag="end">the individual's body will not be viewed, recorded, or depicted in an intimate image <ln numlevel="1" lineno="97" slineno="1-50"/>without the individual's knowledge and<marker pairid="193"> consent;</marker> and</amend></subsection><subsection ssid="1-26" dnum="_-o:b-i" numlevel="1" lineno="98" slineno="1-51" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1025" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="129" groupid="101" style="1" owner="jchristopherson" level="1" amendtag="end">an intimate image of the individual will not be generated, created, distributed, or <ln numlevel="1" lineno="99" slineno="1-52"/>manipulated without the individual's knowledge and consent.</amend></subsection></subsection><subsection ssid="1-28" dnum="_-o:12-i" numlevel="1" lineno="100" slineno="1-53" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1026" style="1" owner="i" level="1" amendtag="start">(12)</amend></display><amend anum="0" ea="amend" pairid="139" groupid="109" style="1" owner="jchristopherson" level="1" amendtag="end">"Sexually explicit conduct" means actual or simulated:</amend><subsection ssid="1-29" dnum="_-o:a-i" numlevel="1" lineno="101" slineno="1-54" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1027" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="144" groupid="113" style="1" owner="jchristopherson" level="1" amendtag="end">sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, <ln numlevel="1" lineno="102" slineno="1-55"/>whether between individuals of the same or opposite sex;</amend></subsection><subsection ssid="1-30" dnum="_-o:b-i" numlevel="1" lineno="103" slineno="1-56" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1028" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="149" groupid="117" style="1" owner="jchristopherson" level="1" amendtag="end">masturbation;</amend></subsection><subsection ssid="1-31" dnum="_-o:c-i" numlevel="1" lineno="104" slineno="1-57" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1029" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="154" groupid="121" style="1" owner="jchristopherson" level="1" amendtag="end">bestiality;</amend></subsection><subsection ssid="1-32" dnum="_-o:d-i" numlevel="1" lineno="105" slineno="1-58" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1030" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="159" groupid="125" style="1" owner="jchristopherson" level="1" amendtag="end">sadistic or masochistic activities;</amend></subsection><subsection ssid="1-33" dnum="_-o:e-i" numlevel="1" lineno="106" slineno="1-59" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1031" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="164" groupid="129" style="1" owner="jchristopherson" level="1" amendtag="end">exhibition of the genitals, pubic region, buttocks, or female breast of any individual;</amend></subsection><subsection ssid="1-34" dnum="_-o:f-i" numlevel="1" lineno="107" slineno="1-60" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1032" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="169" groupid="133" style="1" owner="jchristopherson" level="1" amendtag="end">visual depiction of nudity or partial nudity;</amend></subsection><subsection ssid="1-35" dnum="_-o:g-i" numlevel="1" lineno="108" slineno="1-61" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1033" style="1" owner="i" level="1" amendtag="start">(g)</amend></display><amend anum="0" ea="amend" pairid="174" groupid="137" style="1" owner="jchristopherson" level="1" amendtag="end">fondling or touching of the genitals, pubic region, buttocks, or female breast; or</amend></subsection><subsection ssid="1-36" dnum="_-o:h-i" numlevel="1" lineno="109" slineno="1-62" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1034" style="1" owner="i" level="1" amendtag="start">(h)</amend></display><amend anum="0" ea="amend" pairid="179" groupid="141" style="1" owner="jchristopherson" level="1" amendtag="end">visual depiction of defecation or urination for the purpose of causing sexual arousal <ln numlevel="1" lineno="110" slineno="1-63"/>of any individual.</amend></subsection></subsection></section></bsec><bsec buid="2" num="13-72b-102" type="enact" src="code" uid="C13-72b-S102_2026050620260506" sort="13 72b01020020260506" numlevel="1" lineno="111" slineno="2-1" sn="2"><section numlevel="1" lineno="112" slineno="2-2" number="13-72b-102" type="enact"><secline lineno="111">Section 2. Section <bold>13-72b-102</bold> is enacted to read:</secline><catline lineno="112"><bold>13-72b-102<parens/>. Unlawful distribution of non-consensual counterfeit intimate images.</bold></catline><subsection ssid="2-1" dnum="_-o:1-i" numlevel="1" lineno="113" slineno="2-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1035" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">The distribution of a counterfeit intimate image without the consent of the identifiable <ln numlevel="1" lineno="114" slineno="2-4"/>individual depicted in the image is a violation of the individual's reasonable expectation <ln numlevel="1" lineno="115" slineno="2-5"/>of privacy.</amend></subsection><subsection ssid="2-2" dnum="_-o:2-i" numlevel="1" lineno="116" slineno="2-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1036" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">A generation service may not distribute a counterfeit intimate image without first <ln numlevel="1" lineno="117" slineno="2-7"/>obtaining and verifying consent from the identifiable individual depicted in the <ln numlevel="1" lineno="118" slineno="2-8"/>counterfeit intimate image.</amend></subsection><subsection ssid="2-3" dnum="_-o:3-i" numlevel="1" lineno="119" slineno="2-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1037" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">To obtain and verify consent sufficient to meet the requirements of Subsection <xref depth="4" refnumber="13-72b-102(2)">(2)</xref>, a <ln numlevel="1" lineno="120" slineno="2-10"/>generation service shall implement and maintain a consent verification system that:</amend><subsection ssid="2-4" dnum="_-o:a-i" numlevel="1" lineno="121" slineno="2-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1038" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">requires the identifiable individual depicted in the counterfeit intimate image to <ln numlevel="1" lineno="122" slineno="2-12"/>affirmatively provide consent before the counterfeit intimate image is distributed;</amend></subsection><subsection ssid="2-6" dnum="_-o:b-i" numlevel="1" lineno="123" slineno="2-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1039" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">verifies the identity of the individual providing consent with reasonable accuracy; and</amend></subsection><subsection ssid="2-7" dnum="_-o:c-i" numlevel="1" lineno="124" slineno="2-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1040" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">maintains a record of the consent verification for a period of not less than seven years.</amend></subsection></subsection><subsection ssid="2-5" dnum="_-o:4-i" numlevel="1" lineno="125" slineno="2-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1041" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">A generation service may not require an individual to disclose personally identifiable <ln numlevel="1" lineno="126" slineno="2-16"/>information beyond what is reasonably necessary to verify the individual's identity and <ln numlevel="1" lineno="127" slineno="2-17"/>obtain valid consent.</amend></subsection></section></bsec><bsec buid="3" num="13-72b-103" type="enact" src="code" uid="C13-72b-S103_2026050620260506" sort="13 72b01030020260506" numlevel="1" lineno="128" slineno="3-1" sn="3"><section numlevel="1" lineno="129" slineno="3-2" number="13-72b-103" type="enact"><secline lineno="128">Section 3. Section <bold>13-72b-103</bold> is enacted to read:</secline><catline lineno="129"><bold>13-72b-103<parens/>. Civil liability for generation services.</bold></catline><subsection ssid="3-1" dnum="_-o:1-i" numlevel="1" lineno="130" slineno="3-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1042" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">A person, or the heirs of a deceased person, who has been injured by a violation <ln numlevel="1" lineno="131" slineno="3-4"/>recognized in Section <xref depth="3" refnumber="13-72b-102">13-72b-102</xref> may bring a civil action against the generation service <ln numlevel="1" lineno="132" slineno="3-5"/>that committed the violation.</amend></subsection><subsection ssid="3-2" dnum="_-o:2-i" numlevel="1" lineno="133" slineno="3-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1043" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">If in an action described in Subsection <xref depth="4" refnumber="13-72b-103(1)">(1)</xref> the court finds the defendant is violating or <ln numlevel="1" lineno="134" slineno="3-7"/>has violated any provision of Section <xref depth="3" refnumber="13-72b-102">13-72b-102</xref>, the court shall:</amend><subsection ssid="3-3" dnum="_-o:a-i" numlevel="1" lineno="135" slineno="3-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1044" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">enjoin the defendant from continuing the violation; and</amend></subsection><subsection ssid="3-4" dnum="_-o:b-i" numlevel="1" lineno="136" slineno="3-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1045" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">order the defendant to remove or destroy any counterfeit intimate image distributed <ln numlevel="1" lineno="137" slineno="3-10"/>in violation of Section <xref depth="3" refnumber="13-72b-102">13-72b-102</xref> and all copies of the counterfeit intimate image <ln numlevel="1" lineno="138" slineno="3-11"/>within the defendant's possession or control.</amend></subsection></subsection><subsection ssid="3-5" dnum="_-o:3-i" numlevel="1" lineno="139" slineno="3-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1046" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">It is not necessary that actual damages to the plaintiff be alleged or proved in an action <ln numlevel="1" lineno="140" slineno="3-13"/>under this section.</amend></subsection><subsection ssid="3-6" dnum="_-o:4-i" numlevel="1" lineno="141" slineno="3-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1047" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">A plaintiff in an action under this section is entitled to recover:</amend><subsection ssid="3-7" dnum="_-o:a-i" numlevel="1" lineno="142" slineno="3-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1048" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">actual damages sustained, if any, including damages for emotional distress;</amend></subsection><subsection ssid="3-8" dnum="_-o:b-i" numlevel="1" lineno="143" slineno="3-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1049" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">statutory damages in an amount not less than $10,000 and not more than $100,000 <ln numlevel="1" lineno="144" slineno="3-17"/>for each violation;</amend></subsection><subsection ssid="3-9" dnum="_-o:c-i" numlevel="1" lineno="145" slineno="3-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1050" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="47" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">punitive damages, if the violation is found to be willful, reckless, or malicious; and</amend></subsection><subsection ssid="3-10" dnum="_-o:d-i" numlevel="1" lineno="146" slineno="3-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1051" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="52" groupid="41" style="1" owner="jchristopherson" level="1" amendtag="end">reasonable attorney fees and costs.</amend></subsection></subsection><subsection ssid="3-11" dnum="_-o:5-i" numlevel="1" lineno="147" slineno="3-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1052" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="57" groupid="45" style="1" owner="jchristopherson" level="1" amendtag="end">In determining the amount of statutory damages under Subsection <xref depth="4" refnumber="13-72b-103(4)(b)">(4)(b)</xref>, the court shall <ln numlevel="1" lineno="148" slineno="3-21"/>consider:</amend><subsection ssid="3-12" dnum="_-o:a-i" numlevel="1" lineno="149" slineno="3-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1053" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="62" groupid="49" style="1" owner="jchristopherson" level="1" amendtag="end">the nature and scope of the violation;</amend></subsection><subsection ssid="3-13" dnum="_-o:b-i" numlevel="1" lineno="150" slineno="3-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1054" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="67" groupid="53" style="1" owner="jchristopherson" level="1" amendtag="end">the number of counterfeit intimate images distributed;</amend></subsection><subsection ssid="3-14" dnum="_-o:c-i" numlevel="1" lineno="151" slineno="3-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1055" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="72" groupid="57" style="1" owner="jchristopherson" level="1" amendtag="end">whether the defendant implemented any consent verification procedures;</amend></subsection><subsection ssid="3-15" dnum="_-o:d-i" numlevel="1" lineno="152" slineno="3-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1056" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="77" groupid="61" style="1" owner="jchristopherson" level="1" amendtag="end">the defendant's revenue derived from the generation service;</amend></subsection><subsection ssid="3-16" dnum="_-o:e-i" numlevel="1" lineno="153" slineno="3-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1057" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="82" groupid="65" style="1" owner="jchristopherson" level="1" amendtag="end">whether the defendant took reasonable steps to prevent violations after receiving <ln numlevel="1" lineno="154" slineno="3-27"/>notice; and</amend></subsection><subsection ssid="3-17" dnum="_-o:f-i" numlevel="1" lineno="155" slineno="3-28" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1058" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="87" groupid="69" style="1" owner="jchristopherson" level="1" amendtag="end">any other factors the court deems relevant.</amend></subsection></subsection><subsection ssid="3-18" dnum="_-o:6-i" numlevel="1" lineno="156" slineno="3-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1059" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="92" groupid="73" style="1" owner="jchristopherson" level="1" amendtag="end">Each distribution of a counterfeit intimate image depicting an identifiable individual <ln numlevel="1" lineno="157" slineno="3-30"/>without consent constitutes a separate violation.</amend></subsection><subsection ssid="3-19" dnum="_-o:7-i" numlevel="1" lineno="158" slineno="3-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1060" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="97" groupid="77" style="1" owner="jchristopherson" level="1" amendtag="end">The statute of limitations for a civil action under this section is the later of:</amend><subsection ssid="3-20" dnum="_-o:a-i" numlevel="1" lineno="159" slineno="3-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1061" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="102" groupid="81" style="1" owner="jchristopherson" level="1" amendtag="end">three years from the date the plaintiff discovered or reasonably should have <ln numlevel="1" lineno="160" slineno="3-33"/>discovered the violation; or</amend></subsection><subsection ssid="3-21" dnum="_-o:b-i" numlevel="1" lineno="161" slineno="3-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1062" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="107" groupid="85" style="1" owner="jchristopherson" level="1" amendtag="end">10 years from the date of the violation.</amend></subsection></subsection></section></bsec><bsec buid="4" num="13-72b-104" type="enact" src="code" uid="C13-72b-S104_2026050620260506" sort="13 72b01040020260506" numlevel="1" lineno="162" slineno="4-1" sn="4"><section numlevel="1" lineno="163" slineno="4-2" number="13-72b-104" type="enact"><secline lineno="162">Section 4. Section <bold>13-72b-104</bold> is enacted to read:</secline><catline lineno="163"><bold>13-72b-104<parens/>. Unlawful distribution of non-consensual counterfeit intimate images <ln numlevel="1" lineno="164" slineno="4-3"/>on platforms.</bold></catline><subsection ssid="4-2" dnum="_-o:1-i" numlevel="1" lineno="165" slineno="4-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1063" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">A platform may not knowingly allow the distribution of a counterfeit intimate image <ln numlevel="1" lineno="166" slineno="4-5"/>without consent from the identifiable individual depicted in the counterfeit intimate <ln numlevel="1" lineno="167" slineno="4-6"/>image.</amend></subsection><subsection ssid="4-3" dnum="_-o:2-i" numlevel="1" lineno="168" slineno="4-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1064" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">A platform knowingly allows the distribution of a counterfeit intimate image without <ln numlevel="1" lineno="169" slineno="4-8"/>consent if:</amend><subsection ssid="4-4" dnum="_-o:a-i" numlevel="1" lineno="170" slineno="4-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" space="false"><display><amend anum="0" ea="amend" pairid="1065" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><subsection ssid="4-8" dnum="_-o:i-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" placement="sameline"><display><amend anum="0" ea="amend" pairid="1066" style="1" owner="i" level="1">(i)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">the platform receives notice under Section <xref depth="3" refnumber="13-72b-106">13-72b-106</xref> that a counterfeit <ln numlevel="1" lineno="171" slineno="4-10"/>intimate image has been distributed without consent; and</amend></subsection><subsection ssid="4-7" dnum="_-o:ii-i" numlevel="1" lineno="172" slineno="4-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1067" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">fails to comply with the takedown requirements in Section <xref depth="3" refnumber="13-72b-106">13-72b-106</xref>; or</amend></subsection></subsection><subsection ssid="4-5" dnum="_-o:b-i" numlevel="1" lineno="173" slineno="4-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1068" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">the platform otherwise has actual knowledge that a counterfeit intimate image is <ln numlevel="1" lineno="174" slineno="4-13"/>being distributed without consent on the platform.</amend></subsection></subsection><subsection ssid="4-6" dnum="_-o:3-i" numlevel="1" lineno="175" slineno="4-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1069" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">A platform's failure to comply with Section <xref depth="3" refnumber="13-72b-106">13-72b-106</xref> after receiving notice creates a <ln numlevel="1" lineno="176" slineno="4-15"/>rebuttable presumption that the platform knowingly allowed continued distribution.</amend></subsection></section></bsec><bsec buid="5" num="13-72b-105" type="enact" src="code" uid="C13-72b-S105_2026050620260506" sort="13 72b01050020260506" numlevel="1" lineno="177" slineno="5-1" sn="5"><section numlevel="1" lineno="178" slineno="5-2" number="13-72b-105" type="enact"><secline lineno="177">Section 5. Section <bold>13-72b-105</bold> is enacted to read:</secline><catline lineno="178"><bold>13-72b-105<parens/>. Civil liability for platforms.</bold></catline><subsection ssid="5-1" dnum="_-o:1-i" numlevel="1" lineno="179" slineno="5-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1070" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="3" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">A person, or the heirs of a deceased person, who has been injured by a violation of <ln numlevel="1" lineno="180" slineno="5-4"/>Section <xref depth="3" refnumber="13-72b-104">13-72b-104</xref> may bring a civil action against the platform that committed the <ln numlevel="1" lineno="181" slineno="5-5"/>violation.</amend></subsection><subsection ssid="5-2" dnum="_-o:2-i" numlevel="1" lineno="182" slineno="5-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1071" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="8" style="1" owner="jchristopherson" level="1" amendtag="end">If in an action described in Subsection <xref depth="4" refnumber="13-72b-105(1)">(1)</xref> the court finds the defendant is violating or <ln numlevel="1" lineno="183" slineno="5-7"/>has violated any provision of Section <xref depth="3" refnumber="13-72b-104">13-72b-104</xref>, the court shall:</amend><subsection ssid="5-3" dnum="_-o:a-i" numlevel="1" lineno="184" slineno="5-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1072" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">enjoin the defendant from continued violation; and</amend></subsection><subsection ssid="5-4" dnum="_-o:b-i" numlevel="1" lineno="185" slineno="5-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1073" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">order the defendant to remove or destroy any counterfeit intimate image distributed <ln numlevel="1" lineno="186" slineno="5-10"/>in violation of Section <xref depth="3" refnumber="13-72b-104">13-72b-104</xref> and all copies of the counterfeit intimate image <ln numlevel="1" lineno="187" slineno="5-11"/>within the defendant's possession or control.</amend></subsection></subsection><subsection ssid="5-5" dnum="_-o:3-i" numlevel="1" lineno="188" slineno="5-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1074" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">It is not necessary that actual damages to the plaintiff be alleged or proved in an action <ln numlevel="1" lineno="189" slineno="5-13"/>under this section.</amend></subsection><subsection ssid="5-6" dnum="_-o:4-i" numlevel="1" lineno="190" slineno="5-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1075" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">A plaintiff in an action under this section is entitled to recover:</amend><subsection ssid="5-7" dnum="_-o:a-i" numlevel="1" lineno="191" slineno="5-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1076" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">actual damages sustained, if any, including damages for emotional distress;</amend></subsection><subsection ssid="5-8" dnum="_-o:b-i" numlevel="1" lineno="192" slineno="5-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1077" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="41" groupid="32" style="1" owner="jchristopherson" level="1" amendtag="end">statutory damages in an amount not less than $5,000 and not more than $50,000 for <ln numlevel="1" lineno="193" slineno="5-17"/>each violation;</amend></subsection><subsection ssid="5-9" dnum="_-o:c-i" numlevel="1" lineno="194" slineno="5-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1078" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="46" groupid="36" style="1" owner="jchristopherson" level="1" amendtag="end">punitive damages, if the violation is found to be willful, reckless, or malicious; and</amend></subsection><subsection ssid="5-10" dnum="_-o:d-i" numlevel="1" lineno="195" slineno="5-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1079" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="51" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="end">reasonable attorney fees and costs.</amend></subsection></subsection><subsection ssid="5-11" dnum="_-o:5-i" numlevel="1" lineno="196" slineno="5-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1080" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="56" groupid="44" style="1" owner="jchristopherson" level="1" amendtag="end">In determining the amount of statutory damages under Subsection <xref depth="4" refnumber="13-72b-105(4)(b)">(4)(b)</xref>, the court shall <ln numlevel="1" lineno="197" slineno="5-21"/>consider:</amend><subsection ssid="5-12" dnum="_-o:a-i" numlevel="1" lineno="198" slineno="5-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1081" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="61" groupid="48" style="1" owner="jchristopherson" level="1" amendtag="end">the nature and scope of the violation;</amend></subsection><subsection ssid="5-13" dnum="_-o:b-i" numlevel="1" lineno="199" slineno="5-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1082" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="66" groupid="52" style="1" owner="jchristopherson" level="1" amendtag="end">the extent of distribution or accessibility of the counterfeit intimate image;</amend></subsection><subsection ssid="5-14" dnum="_-o:c-i" numlevel="1" lineno="200" slineno="5-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1083" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="71" groupid="56" style="1" owner="jchristopherson" level="1" amendtag="end">the defendant's willingness to comply with removal requests;</amend></subsection><subsection ssid="5-15" dnum="_-o:d-i" numlevel="1" lineno="201" slineno="5-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1084" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="76" groupid="60" style="1" owner="jchristopherson" level="1" amendtag="end">whether the defendant took reasonable steps to prevent violations after receiving <ln numlevel="1" lineno="202" slineno="5-26"/>notice; and</amend></subsection><subsection ssid="5-16" dnum="_-o:e-i" numlevel="1" lineno="203" slineno="5-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1085" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="81" groupid="64" style="1" owner="jchristopherson" level="1" amendtag="end">any other factors the court deems relevant.</amend></subsection></subsection><subsection ssid="5-17" dnum="_-o:6-i" numlevel="1" lineno="204" slineno="5-28" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1086" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="86" groupid="68" style="1" owner="jchristopherson" level="1" amendtag="end">Each failure to remove a counterfeit intimate image after receiving notice under Section <xref depth="3" refnumber="13-72b-106"><ln numlevel="1" lineno="205" slineno="5-29"/>13-72b-106</xref> constitutes a separate violation of this chapter.</amend></subsection><subsection ssid="5-18" dnum="_-o:7-i" numlevel="1" lineno="206" slineno="5-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1087" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="91" groupid="72" style="1" owner="jchristopherson" level="1" amendtag="end">The statute of limitations for a civil action under this section is the later of:</amend><subsection ssid="5-19" dnum="_-o:a-i" numlevel="1" lineno="207" slineno="5-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1088" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="96" groupid="76" style="1" owner="jchristopherson" level="1" amendtag="end">three years from the date the plaintiff discovered or reasonably should have <ln numlevel="1" lineno="208" slineno="5-32"/>discovered the violation; or</amend></subsection><subsection ssid="5-20" dnum="_-o:b-i" numlevel="1" lineno="209" slineno="5-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1089" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="101" groupid="80" style="1" owner="jchristopherson" level="1" amendtag="end">10 years from the date of the violation.</amend></subsection></subsection></section></bsec><bsec buid="7" num="13-72b-106" type="enact" src="code" uid="C13-72b-S106_2026050620260506" sort="13 72b01060020260506" numlevel="1" lineno="210" slineno="6-1" sn="6"><section numlevel="1" lineno="211" slineno="6-2" number="13-72b-106" type="enact"><secline lineno="210">Section 6. Section <bold>13-72b-106</bold> is enacted to read:</secline><catline lineno="211"><bold>13-72b-106<parens/>. Duty to remove -- Notice and takedown procedures.</bold></catline><subsection ssid="7-2" dnum="_-o:1-i" numlevel="1" lineno="212" slineno="6-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1090" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="4" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="end">Upon receiving notice from an identifiable individual or the individual's authorized <ln numlevel="1" lineno="213" slineno="6-4"/>representative that a counterfeit intimate image depicting the individual has been <ln numlevel="1" lineno="214" slineno="6-5"/>distributed without consent on a platform, the platform shall:</amend><subsection ssid="7-3" dnum="_-o:a-i" numlevel="1" lineno="215" slineno="6-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1091" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">within 48 hours of receiving notice, temporarily disable access to the counterfeit <ln numlevel="1" lineno="216" slineno="6-7"/>intimate image pending investigation;</amend></subsection><subsection ssid="7-4" dnum="_-o:b-i" numlevel="1" lineno="217" slineno="6-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1092" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">within seven days of receiving notice, conduct a reasonable investigation to <ln numlevel="1" lineno="218" slineno="6-9"/>determine whether the counterfeit intimate image was distributed without consent; <ln numlevel="1" lineno="219" slineno="6-10"/>and</amend></subsection><subsection ssid="7-5" dnum="_-o:c-i" numlevel="1" lineno="220" slineno="6-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1093" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">if the platform determines the counterfeit intimate image was distributed without <ln numlevel="1" lineno="221" slineno="6-12"/>consent, permanently remove the counterfeit intimate image and prevent the <ln numlevel="1" lineno="222" slineno="6-13"/>reposting of substantially similar images depicting the same identifiable individual.</amend></subsection></subsection><subsection ssid="7-6" dnum="_-o:2-i" numlevel="1" lineno="223" slineno="6-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1094" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">Notice under Subsection <xref depth="4" refnumber="13-72b-106(1)">(1)</xref> shall include:</amend><subsection ssid="7-7" dnum="_-o:a-i" numlevel="1" lineno="224" slineno="6-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1095" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">identification of the identifiable individual depicted in the counterfeit intimate image;</amend></subsection><subsection ssid="7-8" dnum="_-o:b-i" numlevel="1" lineno="225" slineno="6-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1096" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">identification or description of the counterfeit intimate image sufficient for the <ln numlevel="1" lineno="226" slineno="6-17"/>platform to locate the image, including a URL or other locator if available;</amend></subsection><subsection ssid="7-9" dnum="_-o:c-i" numlevel="1" lineno="227" slineno="6-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1097" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">a statement that the identifiable individual did not consent to the creation or <ln numlevel="1" lineno="228" slineno="6-19"/>distribution of the counterfeit intimate image; and</amend></subsection><subsection ssid="7-10" dnum="_-o:d-i" numlevel="1" lineno="229" slineno="6-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1098" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="47" groupid="37" style="1" owner="jchristopherson" level="1" amendtag="end">contact information for the individual providing notice.</amend></subsection></subsection><subsection ssid="7-12" dnum="_-o:3-i" numlevel="1" lineno="230" slineno="6-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1099" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="57" groupid="45" style="1" owner="jchristopherson" level="1" amendtag="end">A platform that complies in good faith with the notice and takedown procedures in this <ln numlevel="1" lineno="231" slineno="6-22"/>section is not liable under this chapter for actions taken in accordance with this section <ln numlevel="1" lineno="232" slineno="6-23"/>before receiving notice.</amend></subsection></section></bsec><bsec buid="9" num="13-72b-107" type="enact" src="code" uid="C13-72b-S107_2026050620260506" sort="13 72b01070020260506" numlevel="1" lineno="233" slineno="7-1" sn="7"><section numlevel="1" lineno="234" slineno="7-2" number="13-72b-107" type="enact"><secline lineno="233">Section 7. Section <bold>13-72b-107</bold> is enacted to read:</secline><catline lineno="234"><bold>13-72b-107<parens/>. Transparency and reporting requirements.</bold></catline><subsection ssid="9-1" dnum="_-o:1-i" numlevel="1" lineno="235" slineno="7-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1100" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="3" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">Before processing a user's request to generate a counterfeit intimate image, a generation <ln numlevel="1" lineno="236" slineno="7-4"/>service shall clearly and conspicuously disclose to the user:</amend><subsection ssid="9-3" dnum="_-o:a-i" numlevel="1" lineno="237" slineno="7-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1101" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">that distribution of non-consensual counterfeit intimate images is prohibited;</amend></subsection><subsection ssid="9-4" dnum="_-o:b-i" numlevel="1" lineno="238" slineno="7-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1102" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">the consent verification requirements under this chapter;</amend></subsection><subsection ssid="9-5" dnum="_-o:c-i" numlevel="1" lineno="239" slineno="7-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1103" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">the civil penalties for violations of this chapter; and</amend></subsection><subsection ssid="9-6" dnum="_-o:d-i" numlevel="1" lineno="240" slineno="7-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1104" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">procedures for a user to report a violation to the generation service.</amend></subsection></subsection><subsection ssid="9-13" dnum="_-o:2-i" numlevel="1" lineno="241" slineno="7-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1105" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="66" groupid="52" style="1" owner="jchristopherson" level="1" amendtag="end">A platform shall clearly and conspicuously provide to users procedures for reporting <ln numlevel="1" lineno="242" slineno="7-10"/>and requesting removal of non-consensual counterfeit intimate images.</amend></subsection></section></bsec><bsec buid="11" num="13-72c-101" type="enact" src="code" uid="C13-72c-S101_2026050620260506" sort="13 72c01010020260506" numlevel="1" lineno="243" slineno="8-1" sn="8"><section numlevel="1" lineno="246" slineno="8-4" number="13-72c-101" type="enact"><secline lineno="243">Section 8. Section <bold>13-72c-101</bold> is enacted to read:</secline><headchap number="13-72c" numlevel="1" lineno="244" slineno="8-2">72c. Digital Content Provenance Standards Act</headchap><headpart number="13-72c-1" numlevel="1" lineno="245" slineno="8-3">1. General Provisions</headpart><catline lineno="246"><bold>13-72c-101<parens/>. Definitions.</bold></catline><sectionText lineno="247"><para/><amend anum="0" ea="amend" pairid="2" groupid="2" style="1" owner="jchristopherson" level="1" amendtag="both">As used in this chapter:</amend></sectionText><subsection ssid="11-1" dnum="_-o:1-i" numlevel="1" lineno="248" slineno="8-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1106" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">"Artificial intelligence" means a machine-based system that makes predictions, <ln numlevel="1" lineno="249" slineno="8-7"/>recommendations, or decisions influencing real or virtual environments.</amend></subsection><subsection ssid="11-58" dnum="_-o:2-i" numlevel="1" lineno="250" slineno="8-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1107" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="157" groupid="123" style="1" owner="jchristopherson" level="1" amendtag="end">"Capture device" means a device that can record photographs, audio, or video content, <ln numlevel="1" lineno="251" slineno="8-9"/>including a video camera, a still photography camera, a mobile phone with a built-in <ln numlevel="1" lineno="252" slineno="8-10"/>camera or microphone, or a voice recorder.</amend></subsection><subsection ssid="11-29" dnum="_-o:3-i" numlevel="1" lineno="253" slineno="8-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1108" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><subsection ssid="11-30" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1109" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end"> "Capture device manufacturer" means a person who produces a capture device for <ln numlevel="1" lineno="254" slineno="8-12"/>sale in the state.</amend></subsection><subsection ssid="11-31" dnum="_-o:b-i" numlevel="1" lineno="255" slineno="8-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1110" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">"Capture device manufacturer" does not include a person exclusively engaged in the <ln numlevel="1" lineno="256" slineno="8-14"/>assembly of a capture device.</amend></subsection></subsection><subsection ssid="11-60" dnum="_-o:4-i" numlevel="1" lineno="257" slineno="8-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1111" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="170" groupid="133" style="1" owner="jchristopherson" level="1" amendtag="end">"Compliant system provenance data" means system provenance data that is compliant <ln numlevel="1" lineno="258" slineno="8-16"/>with widely adopted specifications of an established standards-setting body.</amend></subsection><subsection ssid="11-32" dnum="_-o:5-i" numlevel="1" lineno="259" slineno="8-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1112" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">"Covered provider" means a person that creates, codes, or otherwise produces a <ln numlevel="1" lineno="260" slineno="8-18"/>generative artificial intelligence system that:</amend><subsection ssid="11-33" dnum="_-o:a-i" numlevel="1" lineno="261" slineno="8-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1113" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">has over 1,000,000 monthly visitors or users; and</amend></subsection><subsection ssid="11-34" dnum="_-o:b-i" numlevel="1" lineno="262" slineno="8-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1114" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">is publicly accessible within the geographic boundaries of the state.</amend></subsection></subsection><subsection ssid="11-35" dnum="_-o:6-i" numlevel="1" lineno="263" slineno="8-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1115" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="41" groupid="32" style="1" owner="jchristopherson" level="1" amendtag="end">"Digital signature" means a cryptography-based method that identifies the user or entity <ln numlevel="1" lineno="264" slineno="8-22"/>that attests to the information provided in the signed section.</amend></subsection><subsection ssid="11-37" dnum="_-o:7-i" numlevel="1" lineno="265" slineno="8-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1116" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="51" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="end">"Generative artificial intelligence system" means an artificial intelligence system that <ln numlevel="1" lineno="266" slineno="8-24"/>can generate derived synthetic content, including text, images, video, or audio, that <ln numlevel="1" lineno="267" slineno="8-25"/>emulates the structure and characteristics of the system's training data.</amend></subsection><subsection ssid="11-38" dnum="_-o:8-i" numlevel="1" lineno="268" slineno="8-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1117" style="1" owner="i" level="1" amendtag="start">(8)</amend></display><subsection ssid="11-39" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1118" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="61" groupid="48" style="1" owner="jchristopherson" level="1" amendtag="end">"Large online platform" means a public-facing social media platform, file-sharing <ln numlevel="1" lineno="269" slineno="8-27"/>platform, mass messaging platform, or stand-alone search engine that distributes <ln numlevel="1" lineno="270" slineno="8-28"/>content to users who did not create or collaborate in creating the content and that <ln numlevel="1" lineno="271" slineno="8-29"/>exceeded 2,000,000 unique monthly users during the preceding 12 months.</amend></subsection><subsection ssid="11-40" dnum="_-o:b-i" numlevel="1" lineno="272" slineno="8-30" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1119" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="66" groupid="52" style="1" owner="jchristopherson" level="1" amendtag="end">"Large online platform" does not include:</amend><subsection ssid="11-41" dnum="_-o:i-i" numlevel="1" lineno="273" slineno="8-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1120" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="71" groupid="56" style="1" owner="jchristopherson" level="1" amendtag="end">a broadband internet access service, as defined in 47 C.F.R. Sec. 8.1(b); or</amend></subsection><subsection ssid="11-42" dnum="_-o:ii-i" numlevel="1" lineno="274" slineno="8-32" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1121" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="76" groupid="60" style="1" owner="jchristopherson" level="1" amendtag="end">a telecommunications service, as defined in 47 U.S.C. Sec. 153.</amend></subsection></subsection></subsection><subsection ssid="11-43" dnum="_-o:9-i" numlevel="1" lineno="275" slineno="8-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1122" style="1" owner="i" level="1" amendtag="start">(9)</amend></display><amend anum="0" ea="amend" pairid="81" groupid="64" style="1" owner="jchristopherson" level="1" amendtag="end">"Latent" means present but not manifest.</amend></subsection><subsection ssid="11-44" dnum="_-o:10-i" numlevel="1" lineno="276" slineno="8-34" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1123" style="1" owner="i" level="1" amendtag="start">(10)</amend></display><amend anum="0" ea="amend" pairid="86" groupid="68" style="1" owner="jchristopherson" level="1" amendtag="end">"Manifest" means easily perceived, understood, or recognized by a natural person.</amend></subsection><subsection ssid="11-45" dnum="_-o:11-i" numlevel="1" lineno="277" slineno="8-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1124" style="1" owner="i" level="1" amendtag="start">(11)</amend></display><amend anum="0" ea="amend" pairid="91" groupid="72" style="1" owner="jchristopherson" level="1" amendtag="end">"Mass messaging platform" means a direct messaging platform that allows users to <ln numlevel="1" lineno="278" slineno="8-36"/>distribute content to more than 100 users simultaneously.</amend></subsection><subsection ssid="11-46" dnum="_-o:12-i" numlevel="1" lineno="279" slineno="8-37" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1125" style="1" owner="i" level="1" amendtag="start">(12)</amend></display><amend anum="0" ea="amend" pairid="96" groupid="76" style="1" owner="jchristopherson" level="1" amendtag="end">"Metadata" means structural or descriptive information about data.</amend></subsection><subsection ssid="11-47" dnum="_-o:13-i" numlevel="1" lineno="280" slineno="8-38" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1126" style="1" owner="i" level="1" amendtag="start">(13)</amend></display><amend anum="0" ea="amend" pairid="101" groupid="80" style="1" owner="jchristopherson" level="1" amendtag="end">"Personal information" means the same as that term is defined in Section <xref depth="3" refnumber="13-61-101">13-61-101</xref>.</amend></subsection><subsection ssid="11-53" dnum="_-o:14-i" numlevel="1" lineno="281" slineno="8-39" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1127" style="1" owner="i" level="1" amendtag="start">(14)</amend></display><amend anum="0" ea="amend" pairid="131" groupid="104" style="1" owner="jchristopherson" level="1" amendtag="end">"Provenance data" means data that is embedded into digital content, or that is included <ln numlevel="1" lineno="282" slineno="8-40"/>in the digital content's metadata, for the purpose of verifying the digital content's <ln numlevel="1" lineno="283" slineno="8-41"/>authenticity, origin, or history of modification.</amend></subsection><subsection ssid="11-54" dnum="_-o:15-i" numlevel="1" lineno="284" slineno="8-42" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1128" style="1" owner="i" level="1" amendtag="start">(15)</amend></display><amend anum="0" ea="amend" pairid="136" groupid="108" style="1" owner="jchristopherson" level="1" amendtag="end">"System provenance data" means provenance data that is not reasonably capable of <ln numlevel="1" lineno="285" slineno="8-43"/>being associated with a particular user and that contains:</amend><subsection ssid="11-55" dnum="_-o:a-i" numlevel="1" lineno="286" slineno="8-44" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1129" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="141" groupid="112" style="1" owner="jchristopherson" level="1" amendtag="end">information regarding the type of device, system, or service that was used to generate <ln numlevel="1" lineno="287" slineno="8-45"/>a piece of digital content; or</amend></subsection><subsection ssid="11-56" dnum="_-o:b-i" numlevel="1" lineno="288" slineno="8-46" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1130" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="146" groupid="116" style="1" owner="jchristopherson" level="1" amendtag="end">information related to content authenticity.</amend></subsection></subsection><subsection ssid="11-57" dnum="_-o:16-i" numlevel="1" lineno="289" slineno="8-47" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1131" style="1" owner="i" level="1" amendtag="start">(16)</amend></display><amend anum="0" ea="amend" pairid="165" groupid="130" style="1" owner="jchristopherson" level="1" amendtag="end">"User" means a Utah resident who accesses, interacts with, or uses an interactive <ln numlevel="1" lineno="290" slineno="8-48"/>computer service, platform, generation service, generative artificial intelligence system, <ln numlevel="1" lineno="291" slineno="8-49"/>or capture device.</amend></subsection><subsection ssid="11-61" dnum="_-o:17-i" numlevel="1" lineno="292" slineno="8-50" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1132" style="1" owner="i" level="1" amendtag="start">(17)</amend></display><amend anum="0" ea="amend" pairid="174" groupid="136" style="1" owner="jchristopherson" level="1" amendtag="end">"User interface" means the method by which an individual interacts with, controls, or <ln numlevel="1" lineno="293" slineno="8-51"/>receives information from a computer, software application, website, or electronic <ln numlevel="1" lineno="294" slineno="8-52"/>device.</amend></subsection></section></bsec><bsec buid="31" num="13-72c-201" type="enact" src="code" uid="C13-72c-S201_2026050620260506" sort="13 72c02010020260506" numlevel="1" lineno="295" slineno="9-1" sn="9"><section numlevel="1" lineno="297" slineno="9-3" number="13-72c-201" type="enact"><secline lineno="295">Section 9. Section <bold>13-72c-201</bold> is enacted to read:</secline><headpart number="13-72c-2" numlevel="1" lineno="296" slineno="9-2">2. Content Provenance Standards and Requirements</headpart><catline lineno="297"><bold>13-72c-201<parens/>. Requirements for large online platforms.</bold></catline><subsection ssid="31-1" dnum="_-o:1-i" numlevel="1" lineno="298" slineno="9-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1133" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="3" groupid="3" style="1" owner="jchristopherson" level="1" amendtag="end">A large online platform shall:</amend><subsection ssid="31-2" dnum="_-o:a-i" numlevel="1" lineno="299" slineno="9-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1134" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="11" groupid="8" style="1" owner="jchristopherson" level="1" amendtag="end">detect whether compliant system provenance data is embedded into or attached to <ln numlevel="1" lineno="300" slineno="9-6"/>content distributed on the large online platform;</amend></subsection><subsection ssid="31-3" dnum="_-o:b-i" numlevel="1" lineno="301" slineno="9-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1135" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="16" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">provide a user interface to disclose the availability of system provenance data; and</amend></subsection><subsection ssid="31-4" dnum="_-o:c-i" numlevel="1" lineno="302" slineno="9-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1136" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="21" groupid="16" style="1" owner="jchristopherson" level="1" amendtag="end">allow a user to inspect all available compliant system provenance data in an easily <ln numlevel="1" lineno="303" slineno="9-9"/>accessible manner:</amend><subsection ssid="31-5" dnum="_-o:i-i" numlevel="1" lineno="304" slineno="9-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1137" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="26" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">directly through the large online platform's user interface described in Subsection <xref depth="4" refnumber="13-72c-201(1)(b)"><ln numlevel="1" lineno="305" slineno="9-11"/>(1)(b)</xref>;</amend></subsection><subsection ssid="31-6" dnum="_-o:ii-i" numlevel="1" lineno="306" slineno="9-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1138" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="31" groupid="24" style="1" owner="jchristopherson" level="1" amendtag="end">by allowing the user to download a version of the content with the content's <ln numlevel="1" lineno="307" slineno="9-13"/>attached system provenance data; or</amend></subsection><subsection ssid="31-7" dnum="_-o:iii-i" numlevel="1" lineno="308" slineno="9-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1139" style="1" owner="i" level="1" amendtag="start">(iii)</amend></display><amend anum="0" ea="amend" pairid="36" groupid="28" style="1" owner="jchristopherson" level="1" amendtag="end">by providing a link to the content's system provenance data displayed on an <ln numlevel="1" lineno="309" slineno="9-15"/>internet website or in another application provided either by the large online <ln numlevel="1" lineno="310" slineno="9-16"/>platform or a third party.</amend></subsection></subsection></subsection><subsection ssid="31-12" dnum="_-o:2-i" numlevel="1" lineno="311" slineno="9-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1140" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="61" groupid="48" style="1" owner="jchristopherson" level="1" amendtag="end">A large online platform may not, to the extent technically feasible, knowingly strip any <ln numlevel="1" lineno="312" slineno="9-18"/>system provenance data or digital signature that is compliant with widely adopted <ln numlevel="1" lineno="313" slineno="9-19"/>specifications adopted by an established standards-setting body from content uploaded <ln numlevel="1" lineno="314" slineno="9-20"/>or distributed on the large online platform.</amend></subsection></section></bsec><bsec buid="29" num="13-72c-202" type="enact" src="code" uid="C13-72c-S202_2026050620260506" sort="13 72c02020020260506" numlevel="1" lineno="315" slineno="10-1" sn="10"><section numlevel="1" lineno="316" slineno="10-2" number="13-72c-202" type="enact"><secline lineno="315">Section 10. Section <bold>13-72c-202</bold> is enacted to read:</secline><catline lineno="316"><bold>13-72c-202<parens/>. Requirements for capture devices.</bold></catline><subsection ssid="29-20" dnum="_-o:1-i" numlevel="1" lineno="317" slineno="10-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1141" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="5" groupid="4" style="1" owner="jchristopherson" level="1" amendtag="end">A capture device manufacturer shall include a latent disclosure in content captured by <ln numlevel="1" lineno="318" slineno="10-4"/>the capture device that conveys:</amend><subsection ssid="29-24" dnum="_-o:a-i" numlevel="1" lineno="319" slineno="10-5" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" space="false"><display><amend anum="0" ea="amend" pairid="1142" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><subsection ssid="29-29" dnum="_-o:i-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="3" placement="sameline"><display><amend anum="0" ea="amend" pairid="1143" style="1" owner="i" level="1">(i)</amend></display><amend anum="0" ea="amend" pairid="45" groupid="36" style="1" owner="jchristopherson" level="1" amendtag="end">the name of the capture device manufacturer; or</amend></subsection><subsection ssid="29-23" dnum="_-o:ii-i" numlevel="1" lineno="320" slineno="10-6" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1144" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="15" groupid="12" style="1" owner="jchristopherson" level="1" amendtag="end">digital signatures sufficient to prove whether the content was created using a type <ln numlevel="1" lineno="321" slineno="10-7"/>of capture device; and</amend></subsection></subsection><subsection ssid="29-25" dnum="_-o:b-i" numlevel="1" lineno="322" slineno="10-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1145" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="25" groupid="20" style="1" owner="jchristopherson" level="1" amendtag="end">the time and date of the content's creation or alteration.</amend></subsection></subsection><subsection ssid="29-27" dnum="_-o:2-i" numlevel="1" lineno="323" slineno="10-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1146" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="51" groupid="41" style="1" owner="jchristopherson" level="1" amendtag="end">A capture device manufacturer may provide a user with the option to disable the latent <ln numlevel="1" lineno="324" slineno="10-10"/>disclosure on a capture device required in Subsection <xref depth="4" refnumber="13-72c-202(1)">(1)</xref>.</amend></subsection><subsection ssid="29-30" dnum="_-o:3-i" numlevel="1" lineno="325" slineno="10-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1147" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="50" groupid="40" style="1" owner="jchristopherson" level="1" amendtag="end">A capture device manufacturer shall comply with this section only to the extent <ln numlevel="1" lineno="326" slineno="10-12"/>technically feasible and compliant with widely adopted specifications adopted by an <ln numlevel="1" lineno="327" slineno="10-13"/>established standards-setting body.</amend></subsection><subsection ssid="29-28" dnum="_-o:4-i" numlevel="1" lineno="328" slineno="10-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1148" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="40" groupid="32" style="1" owner="jchristopherson" level="1" amendtag="end">This section applies to any capture device a capture device manufacturer produces for <ln numlevel="1" lineno="329" slineno="10-15"/>sale in the state on or after January 1, 2028.</amend></subsection></section></bsec><bsec buid="39" num="13-72c-203" type="enact" src="code" uid="C13-72c-S203_2026050620260506" sort="13 72c02030020260506" numlevel="1" lineno="330" slineno="11-1" sn="11"><section numlevel="1" lineno="331" slineno="11-2" number="13-72c-203" type="enact"><secline lineno="330">Section 11. Section <bold>13-72c-203</bold> is enacted to read:</secline><catline lineno="331"><bold>13-72c-203<parens/>. User disclosures.</bold></catline><subsection ssid="39-5" dnum="_-o:1-i" numlevel="1" lineno="332" slineno="11-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1149" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="105" groupid="82" style="1" owner="jchristopherson" level="1" amendtag="end">A covered provider shall include a latent disclosure in image, video, or audio content, or <ln numlevel="1" lineno="333" slineno="11-4"/>content that is any combination of image, video, or audio, created or substantially <ln numlevel="1" lineno="334" slineno="11-5"/>modified by the covered provider's generative artificial intelligence system that meets <ln numlevel="1" lineno="335" slineno="11-6"/>the following criteria:</amend><subsection ssid="39-21" dnum="_-o:a-i" numlevel="1" lineno="336" slineno="11-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1150" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="110" groupid="86" style="1" owner="jchristopherson" level="1" amendtag="end">to the extent that it is technically feasible and reasonable, the disclosure conveys the <ln numlevel="1" lineno="337" slineno="11-8"/>following information, either directly or through a link to a permanent internet <ln numlevel="1" lineno="338" slineno="11-9"/>website:</amend><subsection ssid="39-22" dnum="_-o:i-i" numlevel="1" lineno="339" slineno="11-10" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1151" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="115" groupid="90" style="1" owner="jchristopherson" level="1" amendtag="end">the time and date of the content's creation or alteration; and</amend></subsection><subsection ssid="39-23" dnum="_-o:ii-i" numlevel="1" lineno="340" slineno="11-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1152" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="120" groupid="94" style="1" owner="jchristopherson" level="1" amendtag="end">either:</amend><subsection ssid="39-24" dnum="_-o:A-i" numlevel="1" lineno="341" slineno="11-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1153" style="1" owner="i" level="1" amendtag="start">(A)</amend></display><amend anum="0" ea="amend" pairid="125" groupid="98" style="1" owner="jchristopherson" level="1" amendtag="end">the name of the capture device manufacturer; or</amend></subsection><subsection ssid="39-25" dnum="_-o:B-i" numlevel="1" lineno="342" slineno="11-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="4"><display><amend anum="0" ea="amend" pairid="1154" style="1" owner="i" level="1" amendtag="start">(B)</amend></display><amend anum="0" ea="amend" pairid="130" groupid="102" style="1" owner="jchristopherson" level="1" amendtag="end">digital signatures sufficient to prove whether the content was created or <ln numlevel="1" lineno="343" slineno="11-14"/>substantially altered using a generative artificial intelligence system; and</amend></subsection></subsection></subsection><subsection ssid="39-26" dnum="_-o:b-i" numlevel="1" lineno="344" slineno="11-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1155" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="135" groupid="106" style="1" owner="jchristopherson" level="1" amendtag="end">the disclosure is consistent with widely accepted industry standards.</amend></subsection></subsection><subsection ssid="39-13" dnum="_-o:2-i" numlevel="1" lineno="345" slineno="11-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" space="false"><display><amend anum="0" ea="amend" pairid="1156" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><subsection ssid="39-14" dnum="_-o:a-i" ea="amend" anum="0" owner="jchristopherson" style="1" level="2" placement="sameline"><display><amend anum="0" ea="amend" pairid="1157" style="1" owner="i" level="1">(a)</amend></display><amend anum="0" ea="amend" pairid="72" groupid="57" style="1" owner="jchristopherson" level="1" amendtag="end">If a covered provider licenses the covered provider's generative artificial <ln numlevel="1" lineno="346" slineno="11-17"/>intelligence system to a third party, the covered provider shall require by contract that <ln numlevel="1" lineno="347" slineno="11-18"/>the licensee maintain the system's capability to include a disclosure required by <ln numlevel="1" lineno="348" slineno="11-19"/>Subsection <xref depth="4" refnumber="13-72c-203(1)">(1)</xref> in content the system creates or alters.</amend></subsection><subsection ssid="39-15" dnum="_-o:b-i" numlevel="1" lineno="349" slineno="11-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1158" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="77" groupid="61" style="1" owner="jchristopherson" level="1" amendtag="end">If a covered provider knows that a third-party licensee modified a licensed generative <ln numlevel="1" lineno="350" slineno="11-21"/>artificial intelligence system such that the system is no longer capable of including a <ln numlevel="1" lineno="351" slineno="11-22"/>disclosure required by Subsection <xref depth="4" refnumber="13-72c-203(1)">(1)</xref> in content the system creates or alters, the <ln numlevel="1" lineno="352" slineno="11-23"/>covered provider shall revoke the license within 96 hours after the day on which the <ln numlevel="1" lineno="353" slineno="11-24"/>covered provider discovers the licensee's action.</amend></subsection><subsection ssid="39-16" dnum="_-o:c-i" numlevel="1" lineno="354" slineno="11-25" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1159" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="82" groupid="65" style="1" owner="jchristopherson" level="1" amendtag="end">A third-party licensee shall cease using a licensed generative artificial intelligence <ln numlevel="1" lineno="355" slineno="11-26"/>system after the license for the system has been revoked by the covered provider in <ln numlevel="1" lineno="356" slineno="11-27"/>accordance with Subsection <xref depth="4" refnumber="13-72c-203(2)(b)">(2)(b)</xref>.</amend></subsection></subsection></section></bsec><bsec buid="35" num="13-72c-301" type="enact" src="code" uid="C13-72c-S301_2026050620260506" sort="13 72c03010020260506" numlevel="1" lineno="357" slineno="12-1" sn="12"><section numlevel="1" lineno="359" slineno="12-3" number="13-72c-301" type="enact"><secline lineno="357">Section 12. Section <bold>13-72c-301</bold> is enacted to read:</secline><headpart number="13-72c-3" numlevel="1" lineno="358" slineno="12-2">3. Enforcement</headpart><catline lineno="359"><bold>13-72c-301<parens/>. Enforcement -- Civil liability.</bold></catline><subsection ssid="35-25-90" dnum="_-o:1-i" numlevel="1" lineno="360" slineno="12-4" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1160" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="175" groupid="137" style="1" owner="jchristopherson" level="1" amendtag="end">The Division of Consumer Protection shall administer and enforce the provisions of Part <ln numlevel="1" lineno="361" slineno="12-5"/>2, Content Provenance Standards and Requirements in accordance with Chapter 2, <ln numlevel="1" lineno="362" slineno="12-6"/>Division of Consumer Protection.</amend></subsection><subsection ssid="35-117" dnum="_-o:2-i" numlevel="1" lineno="363" slineno="12-7" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1161" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="180" groupid="141" style="1" owner="jchristopherson" level="1" amendtag="end">The attorney general shall:</amend><subsection ssid="35-118" dnum="_-o:a-i" numlevel="1" lineno="364" slineno="12-8" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1162" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="185" groupid="145" style="1" owner="jchristopherson" level="1" amendtag="end">upon request, give legal advice to the division; and</amend></subsection><subsection ssid="35-119" dnum="_-o:b-i" numlevel="1" lineno="365" slineno="12-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1163" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="190" groupid="149" style="1" owner="jchristopherson" level="1" amendtag="end">act as counsel for the division in the exercise of the division's responsibilities under <ln numlevel="1" lineno="366" slineno="12-10"/>this chapter.</amend></subsection></subsection><subsection ssid="35-120" dnum="_-o:3-i" numlevel="1" lineno="367" slineno="12-11" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1164" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="195" groupid="153" style="1" owner="jchristopherson" level="1" amendtag="end">In addition to the division's enforcement powers under Chapter 2, Division of Consumer <ln numlevel="1" lineno="368" slineno="12-12"/>Protection:</amend><subsection ssid="35-121" dnum="_-o:a-i" numlevel="1" lineno="369" slineno="12-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1165" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="200" groupid="157" style="1" owner="jchristopherson" level="1" amendtag="end">the division director may impose an administrative fine of up to $2,500 for each <ln numlevel="1" lineno="370" slineno="12-14"/>violation of this chapter; and</amend></subsection><subsection ssid="35-123" dnum="_-o:b-i" numlevel="1" lineno="371" slineno="12-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1166" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="210" groupid="165" style="1" owner="jchristopherson" level="1" amendtag="end">the division may bring an action in a court of competent jurisdiction to enforce a <ln numlevel="1" lineno="372" slineno="12-16"/>provision of this chapter.</amend></subsection></subsection><subsection ssid="35-122" dnum="_-o:4-i" numlevel="1" lineno="373" slineno="12-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1167" style="1" owner="i" level="1" amendtag="start">(4)</amend></display><amend anum="0" ea="amend" pairid="205" groupid="161" style="1" owner="jchristopherson" level="1" amendtag="end">In a court action by the division to enforce a provision of this chapter, the court may:</amend><subsection ssid="35-124" dnum="_-o:a-i" numlevel="1" lineno="374" slineno="12-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1168" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="215" groupid="169" style="1" owner="jchristopherson" level="1" amendtag="end">declare that an act or practice violates a provision of this chapter;</amend></subsection><subsection ssid="35-125" dnum="_-o:b-i" numlevel="1" lineno="375" slineno="12-19" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1169" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="220" groupid="173" style="1" owner="jchristopherson" level="1" amendtag="end">issue an injunction for a violation of this chapter;</amend></subsection><subsection ssid="35-126" dnum="_-o:c-i" numlevel="1" lineno="376" slineno="12-20" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1170" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="225" groupid="177" style="1" owner="jchristopherson" level="1" amendtag="end">order disgorgement of money received in violation of this chapter;</amend></subsection><subsection ssid="35-127" dnum="_-o:d-i" numlevel="1" lineno="377" slineno="12-21" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1171" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="230" groupid="181" style="1" owner="jchristopherson" level="1" amendtag="end">order payment of disgorged money to an injured purchaser or consumer;</amend></subsection><subsection ssid="35-128" dnum="_-o:e-i" numlevel="1" lineno="378" slineno="12-22" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1172" style="1" owner="i" level="1" amendtag="start">(e)</amend></display><amend anum="0" ea="amend" pairid="235" groupid="185" style="1" owner="jchristopherson" level="1" amendtag="end">impose a fine of up to $2,500 for each violation of this chapter; or</amend></subsection><subsection ssid="35-129" dnum="_-o:f-i" numlevel="1" lineno="379" slineno="12-23" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1173" style="1" owner="i" level="1" amendtag="start">(f)</amend></display><amend anum="0" ea="amend" pairid="240" groupid="189" style="1" owner="jchristopherson" level="1" amendtag="end">award other relief that the court determines reasonable and necessary.</amend></subsection></subsection><subsection ssid="35-131" dnum="_-o:5-i" numlevel="1" lineno="380" slineno="12-24" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1174" style="1" owner="i" level="1" amendtag="start">(5)</amend></display><amend anum="0" ea="amend" pairid="250" groupid="193" style="1" owner="jchristopherson" level="1" amendtag="end">If a court awards judgment or injunctive relief to the division, the court shall award the <ln numlevel="1" lineno="381" slineno="12-25"/>division:</amend><subsection ssid="35-132" dnum="_-o:a-i" numlevel="1" lineno="382" slineno="12-26" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1175" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="255" groupid="197" style="1" owner="jchristopherson" level="1" amendtag="end">reasonable attorney fees;</amend></subsection><subsection ssid="35-134" dnum="_-o:b-i" numlevel="1" lineno="383" slineno="12-27" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1176" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="260" groupid="201" style="1" owner="jchristopherson" level="1" amendtag="end">court costs; and</amend></subsection><subsection ssid="35-135" dnum="_-o:c-i" numlevel="1" lineno="384" slineno="12-28" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1177" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="265" groupid="205" style="1" owner="jchristopherson" level="1" amendtag="end">investigative fees.</amend></subsection></subsection><subsection ssid="35-136" dnum="_-o:6-i" numlevel="1" lineno="385" slineno="12-29" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1178" style="1" owner="i" level="1" amendtag="start">(6)</amend></display><amend anum="0" ea="amend" pairid="270" groupid="209" style="1" owner="jchristopherson" level="1" amendtag="end">A court may impose a civil penalty of no more than $5,000 for each violation of an <ln numlevel="1" lineno="386" slineno="12-30"/>administrative or court order issued for a violation of this chapter.</amend></subsection><subsection ssid="35-137" dnum="_-o:7-i" numlevel="1" lineno="387" slineno="12-31" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1179" style="1" owner="i" level="1" amendtag="start">(7)</amend></display><amend anum="0" ea="amend" pairid="275" groupid="213" style="1" owner="jchristopherson" level="1" amendtag="end">The attorney general may bring a civil action on behalf of the division to collect a civil <ln numlevel="1" lineno="388" slineno="12-32"/>penalty imposed under this section.</amend></subsection><subsection ssid="35-138" dnum="_-o:8-i" numlevel="1" lineno="389" slineno="12-33" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1180" style="1" owner="i" level="1" amendtag="start">(8)</amend></display><amend anum="0" ea="amend" pairid="280" groupid="217" style="1" owner="jchristopherson" level="1" amendtag="end">The division shall deposit all fines and civil penalties collected under this section into <ln numlevel="1" lineno="390" slineno="12-34"/>the Consumer Protection Education and Training Fund created in Section <xref depth="3" refnumber="13-2-8">13-2-8</xref>.</amend></subsection><subsection ssid="35-139" dnum="_-o:9-i" numlevel="1" lineno="391" slineno="12-35" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1181" style="1" owner="i" level="1" amendtag="start">(9)</amend></display><amend anum="0" ea="amend" pairid="284" groupid="220" style="1" owner="jchristopherson" level="1" amendtag="end">Nothing in this chapter shall displace any other available remedies or rights authorized <ln numlevel="1" lineno="392" slineno="12-36"/>under the laws of this state or the United States.</amend></subsection></section></bsec><bsec buid="48" num="63A-16-215" type="enact" src="code" uid="C63A-16-S215_2026050620260506" sort="63A16 02150020260506" numlevel="1" lineno="393" slineno="13-1" sn="13"><section numlevel="1" lineno="394" slineno="13-2" number="63A-16-215" type="enact"><secline lineno="393">Section 13. Section <bold>63A-16-215</bold> is enacted to read:</secline><catline lineno="394"><bold>63A-16-215<parens/>. Government websites and applications.</bold></catline><subsection ssid="48-1" dnum="_-o:1-i" numlevel="1" lineno="395" slineno="13-3" ea="amend" anum="0" owner="jchristopherson" style="1" level="1" placement="noreturn"><display><amend anum="0" ea="amend" pairid="1182" style="1" owner="i" level="1" amendtag="start">(1)</amend></display><amend anum="0" ea="amend" pairid="7" groupid="5" style="1" owner="jchristopherson" level="1" amendtag="end">The chief information officer shall make rules, in accordance with Title 63G, Chapter 3, <ln numlevel="1" lineno="396" slineno="13-4"/>Utah Administrative Rulemaking Act, establishing standards for digital content on a <ln numlevel="1" lineno="397" slineno="13-5"/>webpage of a state agency that the public can access to facilitate a transaction or obtain a <ln numlevel="1" lineno="398" slineno="13-6"/>service if the chief information officer determines there is a substantial risk that <ln numlevel="1" lineno="399" slineno="13-7"/>fraudulent or misleading media could cause harm to a resident of the state interacting <ln numlevel="1" lineno="400" slineno="13-8"/>with the state agency.</amend></subsection><subsection ssid="48-2" dnum="_-o:2-i" numlevel="1" lineno="401" slineno="13-9" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1183" style="1" owner="i" level="1" amendtag="start">(2)</amend></display><amend anum="0" ea="amend" pairid="12" groupid="9" style="1" owner="jchristopherson" level="1" amendtag="end">The standards required by Subsection <xref depth="4" refnumber="63A-16-215(1)">(1)</xref> shall require a digitally accessible provenance <ln numlevel="1" lineno="402" slineno="13-10"/>record containing provenance information for digital content captured, created, or edited <ln numlevel="1" lineno="403" slineno="13-11"/>that includes:</amend><subsection ssid="48-3" dnum="_-o:a-i" numlevel="1" lineno="404" slineno="13-12" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1184" style="1" owner="i" level="1" amendtag="start">(a)</amend></display><amend anum="0" ea="amend" pairid="17" groupid="13" style="1" owner="jchristopherson" level="1" amendtag="end">the identification of:</amend><subsection ssid="48-4" dnum="_-o:i-i" numlevel="1" lineno="405" slineno="13-13" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1185" style="1" owner="i" level="1" amendtag="start">(i)</amend></display><amend anum="0" ea="amend" pairid="22" groupid="17" style="1" owner="jchristopherson" level="1" amendtag="end">the type of software or tool used; or</amend></subsection><subsection ssid="48-5" dnum="_-o:ii-i" numlevel="1" lineno="406" slineno="13-14" ea="amend" anum="0" owner="jchristopherson" style="1" level="3"><display><amend anum="0" ea="amend" pairid="1186" style="1" owner="i" level="1" amendtag="start">(ii)</amend></display><amend anum="0" ea="amend" pairid="27" groupid="21" style="1" owner="jchristopherson" level="1" amendtag="end">the specific tool used;</amend></subsection></subsection><subsection ssid="48-6" dnum="_-o:b-i" numlevel="1" lineno="407" slineno="13-15" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1187" style="1" owner="i" level="1" amendtag="start">(b)</amend></display><amend anum="0" ea="amend" pairid="32" groupid="25" style="1" owner="jchristopherson" level="1" amendtag="end">the date of creation;</amend></subsection><subsection ssid="48-7" dnum="_-o:c-i" numlevel="1" lineno="408" slineno="13-16" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1188" style="1" owner="i" level="1" amendtag="start">(c)</amend></display><amend anum="0" ea="amend" pairid="37" groupid="29" style="1" owner="jchristopherson" level="1" amendtag="end">a content identifier; and</amend></subsection><subsection ssid="48-8" dnum="_-o:d-i" numlevel="1" lineno="409" slineno="13-17" ea="amend" anum="0" owner="jchristopherson" style="1" level="2"><display><amend anum="0" ea="amend" pairid="1189" style="1" owner="i" level="1" amendtag="start">(d)</amend></display><amend anum="0" ea="amend" pairid="42" groupid="33" style="1" owner="jchristopherson" level="1" amendtag="end">the previous content identifiers, if applicable.</amend></subsection></subsection><subsection ssid="48-9" dnum="_-o:3-i" numlevel="1" lineno="410" slineno="13-18" ea="amend" anum="0" owner="jchristopherson" style="1" level="1"><display><amend anum="0" ea="amend" pairid="1190" style="1" owner="i" level="1" amendtag="start">(3)</amend></display><amend anum="0" ea="amend" pairid="46" groupid="36" style="1" owner="jchristopherson" level="1" amendtag="end">This section does not apply to digital content created before May 6, 2026.</amend></subsection></section></bsec><bsec buid="50" type="uncod" untype="effdate" src="uncod" uid="EF0000" sort="UZEFF" langlock="true" numlevel="1" lineno="411" slineno="14-1" sn="14"><section type="uncod" untype="effdate" display="false" src="uncod"><secline lineno="411">Section 14.  <bold>Effective Date.</bold></secline><sectionText lineno="412"><amend anum="0" ea="amend" pairid="1" groupid="1" style="1" owner="jchristopherson" level="1" amendtag="both">This bill takes effect on <effdate uid="code" date="5/6/2026">May 6, 2026</effdate>.</amend></sectionText></section></bsec></bdy><foot><rev><tm>1-16-26 1:39 PM</tm></rev></foot></leg>