2013 US Code
Title 18 - Crimes and Criminal Procedure
Part I - CRIMES (§§ 1 - 2725)
Chapter 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN (§§ 2251 - 2260A)
Section 2258C - Use to combat child pornography of technical elements relating to images reported to the CyberTipline

View Metadata
Metadata
Publication TitleUnited States Code, 2012 Edition, Supplement 1, Title 18 - CRIMES AND CRIMINAL PROCEDURE
CategoryBills and Statutes
CollectionUnited States Code
SuDoc Class NumberY 1.2/5:
Contained WithinTitle 18 - CRIMES AND CRIMINAL PROCEDURE
PART I - CRIMES
CHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN
Sec. 2258C - Use to combat child pornography of technical elements relating to images reported to the CyberTipline
Containssection 2258C
Date2013
Laws in Effect as of DateJanuary 16, 2014
Positive LawYes
Dispositionstandard
Source CreditAdded Pub. L. 110-401, title V, §501(a), Oct. 13, 2008, 122 Stat. 4249.
Statutes at Large Reference122 Stat. 4249
Public Law ReferencePublic Law 110-401

Download PDF


Use to combat child pornography of technical elements relating to images reported to the CyberTipline - 18 U.S.C. § 2258C (2013)
§2258C. Use to combat child pornography of technical elements relating to images reported to the CyberTipline

(a) Elements.—

(1) In general.—The National Center for Missing and Exploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote computing service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further transmission of images.

(2) Inclusions.—The elements authorized under paragraph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography.

(3) Exclusion.—The elements authorized under paragraph (1) may not include the actual images.


(b) Use by Electronic Communication Service Providers and Remote Computing Service Providers.—Any electronic communication service provider or remote computing service provider that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A.

(c) Limitations.—Nothing in subsections 1 (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images.

(d) Provision of Elements to Law Enforcement.—The National Center for Missing and Exploited Children shall make available to Federal, State, and local law enforcement involved in the investigation of child pornography crimes elements, including hash values, relating to any apparent child pornography image of an identified child reported to the National Center for Missing and Exploited Children.

(e) Use by Law Enforcement.—Any Federal, State, or local law enforcement agency that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under section 1 (d) may use such elements only in the performance of the official duties of that agency to investigate child pornography crimes.

(Added Pub. L. 110–401, title V, §501(a), Oct. 13, 2008, 122 Stat. 4249.)

1 So in original. Probably should be "subsection".

Disclaimer: These codes may not be the most recent version. The United States Government Printing Office may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the US site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.