2017 US Code
Title 18 - Crimes and Criminal Procedure
Part I - Crimes
Chapter 110 - Sexual Exploitation and Other Abuse of Children
Sec. 2258C - Use to combat child pornography of technical elements relating to images reported to the CyberTipline

Download PDF
Citation 18 U.S.C. § 2258C (2017)
Section Name §2258C. Use to combat child pornography of technical elements relating to images reported to the CyberTipline
Section Text

(a) Elements.—

(1) In general.—The National Center for Missing and Exploited Children may provide elements relating to any apparent child pornography image of an identified child to an electronic communication service provider or a remote computing service provider for the sole and exclusive purpose of permitting that electronic communication service provider or remote computing service provider to stop the further transmission of images.

(2) Inclusions.—The elements authorized under paragraph (1) may include hash values or other unique identifiers associated with a specific image, Internet location of images, and other technological elements that can be used to identify and stop the transmission of child pornography.

(3) Exclusion.—The elements authorized under paragraph (1) may not include the actual images.


(b) Use by Electronic Communication Service Providers and Remote Computing Service Providers.—Any electronic communication service provider or remote computing service provider that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under this section may use such information only for the purposes described in this section, provided that such use shall not relieve that electronic communication service provider or remote computing service provider from its reporting obligations under section 2258A.

(c) Limitations.—Nothing in subsections 1 (a) or (b) requires electronic communication service providers or remote computing service providers receiving elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children to use the elements to stop the further transmission of the images.

(d) Provision of Elements to Law Enforcement.—The National Center for Missing and Exploited Children shall make available to Federal, State, and local law enforcement involved in the investigation of child pornography crimes elements, including hash values, relating to any apparent child pornography image of an identified child reported to the National Center for Missing and Exploited Children.

(e) Use by Law Enforcement.—Any Federal, State, or local law enforcement agency that receives elements relating to any apparent child pornography image of an identified child from the National Center for Missing and Exploited Children under section 1 (d) may use such elements only in the performance of the official duties of that agency to investigate child pornography crimes.

Source Credit

(Added Pub. L. 110–401, title V, §501(a), Oct. 13, 2008, 122 Stat. 4249.)

Footnotes

1 So in original. Probably should be "subsection".

Publication Title United States Code, 2012 Edition, Supplement 5, Title 18 - CRIMES AND CRIMINAL PROCEDURE
Category Bills and Statutes
Collection United States Code
SuDoc Class Number Y 1.2/5:
Contained Within Title 18 - CRIMES AND CRIMINAL PROCEDURE
PART I - CRIMES
CHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN
Sec. 2258C - Use to combat child pornography of technical elements relating to images reported to the CyberTipline
Contains section 2258C
Date 2017
Laws In Effect As Of Date January 12, 2018
Positive Law Yes
Disposition standard
Statutes at Large References 122 Stat. 4249
Public Law References Public Law 110-401
Disclaimer: These codes may not be the most recent version. United States may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.