1. Definition of Covered Products: For the purposes of this Act, "Covered Products" includes any consumer electronic device, computer hardware, operating system, software application, or digital service designed to store or transmit data, regardless of whether it is provided for a fee or free of charge.
2. Prohibition on Mandated Weaknesses: No federal or state agency shall mandate, coerce, or request that a manufacturer or developer of Covered Products design or alter the security functions of its product to allow third-party surveillance (commonly known as "backdoors").
3. Right to End-to-End Encryption (E2EE): The provision of E2EE services, where the provider does not possess the decryption keys, is explicitly protected. It is prohibited to compel a provider to implement "Key Escrow" or any mechanism that would grant third-party access to private keys.
4. Vulnerability Equities Process:
a) A Vulnerability Review Board (VRB) is hereby established under the oversight of the Cybersecurity and Infrastructure Security Agency (CISA).
b) Composition & Appointment: The VRB shall consist of 5 members: 1 representative from the Intelligence Community (as defined in 50 U.S.C. § 3003(4)), 1 from Law Enforcement, and 3 independent civilian experts in cryptography appointed jointly by the Speaker of the House and the Senate Majority Leader. To prevent conflicts of interest, civilian members must not have held employment or financial ties with government defense contractors for at least 5 years prior to appointment.
c) Mandate: Government agencies discovering non-public vulnerabilities ("Zero-Days") must submit them to the VRB. The VRB shall presume a bias towards immediate disclosure to the vendor. Withholding a vulnerability requires a unanimous vote.