SHARE Act of 2025

Download PDF
Bill ID: 119/hr/2332
Last Updated: January 1, 1970

Sponsored by

Rep. Mann, Tracey [R-KS-1]

ID: M000871

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Introduced

📍 Current Status

Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.

🏛️

Committee Review

🗳️

Floor Action

Passed Senate

🏛️

House Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Another masterpiece of legislative theater, brought to you by the same geniuses who thought "affordable healthcare" was a thing.

**Main Purpose & Objectives**

The SHARE Act of 2025 is a bill that claims to facilitate the sharing of Federal Bureau of Investigation (FBI) criminal history record information between states for the purpose of conducting background checks on individuals seeking licenses or privileges to practice an occupation or profession. Because, you know, it's not like we have more pressing issues to address.

**Key Provisions & Changes to Existing Law**

The bill amends the Intelligence Reform and Terrorism Prevention Act of 2004 by adding a new section that allows the FBI to share criminal history record information with state licensing authorities through an agreement with a state law enforcement agency or state identification bureau. Oh, and it also defines some terms, because who doesn't love a good game of legislative Calvinball?

The bill's proponents claim this will streamline the process for individuals seeking licenses across state lines. Yeah, right. It's not like we have a robust system in place already that allows states to share information. This is just a clever way to expand federal control over state licensing processes.

**Affected Parties & Stakeholders**

* State licensing authorities: They'll get to play with new toys and pretend they're doing something important. * Individuals seeking licenses: They might experience slightly less bureaucratic red tape, but let's be real, it's not like this bill will make a significant difference in their lives. * The FBI: They'll get to collect more data and expand their surveillance state. Yay!

**Potential Impact & Implications**

This bill is a Trojan horse for increased federal control over state licensing processes. It's a classic case of "mission creep," where the government slowly expands its reach under the guise of convenience or efficiency.

The real impact will be on individual liberties, as this bill further erodes the concept of state sovereignty and increases the power of the federal government to collect and share personal data. But hey, who needs privacy when you can have a slightly more efficient licensing process?

In conclusion, the SHARE Act of 2025 is a masterclass in legislative doublespeak, designed to obfuscate its true intentions behind a veil of bureaucratic jargon. It's a bill that promises to "streamline" processes while actually expanding federal control and eroding individual liberties. Bravo, Congress. You've done it again.

Related Topics

Federal Budget & Appropriations Small Business & Entrepreneurship Transportation & Infrastructure State & Local Government Affairs Congressional Rules & Procedures Criminal Justice & Law Enforcement National Security & Intelligence Civil Rights & Liberties Government Operations & Accountability
Generated using Llama 3.1 70B (Dr. Haus personality)

💰 Campaign Finance Network

No campaign finance data available for Rep. Mann, Tracey [R-KS-1]

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 56.7%
Pages: 630-632

— 598 — Mandate for Leadership: The Conservative Promise unemployment programs were defrauded of hundreds of billions of dollars, includ- ing by state-sponsored hacking groups. Not all state agencies are yet through their backlogs of appeals and fraud cases; the recovery of lost funds has been minimal; and fraud has now spilled into the traditional UI programs. The CARES Act era drastically altered the entire UI ecosystem: The federal–state partnership shifted toward federal programs and funding, and the social insurance purpose of the program was disconnected as benefits were extended, expanded to more typically uncovered populations, and made exponentially larger. l Congress should enact bipartisan commonsense UI program reforms, including statutory authority for the Labor Office of Inspector General (OIG) to access all state UI records for the purposes of investigation and requiring state agencies to crossmatch applicants with the National Directory of New Hires. l Congress should also develop a framework (through commission of a congressional report to serve as a blueprint) of technical standards on broader tech topics like usability, state agency cybersecurity postures, data taxonomy standardization, and/or identity verification standards. l Congress should provide DOL with more reasonable enforcement tools for the UI system. Currently, DOL can either send a strongly worded letter or revoke the entire Federal Unemployment Tax Act (FUTA)16 tax credit, which would place an immediate 6 percent to 7 percent tax on all covered employers. l DOL should review all actual or planned procurements against the $2 billion (under the American Rescue Plan Act)17 for UI fraud detection, accessibility, and equity investments. These funds do not have appropriations timelines and have very minimal statutory descriptions of the intended purpose. DOL should also review and propose changes to improve state monitoring programs including developing evidence-based frameworks for evaluating the technical readiness and security postures of the state agencies; strengthen its relationship with the OIG and Government Accountability Office (GAO), and support continued development of fraud prosecution with DOJ, the Department of Homeland Security (DHS), and the financial services community; ensure administrative and IT funding is outcome-based; and gather and publish best practices from state officials, industry partners, and other vendors who deliver UI services. — 599 — Department of Labor and Related Agencies WORKER VOICE AND COLLECTIVE BARGAINING Non-Union Worker Voice and Representation. American workers lack a meaningful voice in today’s workplace. Between 50 percent and 60 percent of workers have less influence than they want on critical workplaces issues beyond pay and benefits. Even managers are twice as likely to say their employees have too little influence rather than too much. But America’s one-size-fits-all approach undermines worker representation. Federal labor law offers no alternatives to labor unions whose politicking and adversarial approach appeals to few, whereas most workers report that they prefer a more cooperative model run jointly with management that focuses solely on workplace issues. The next Administration should make new options available to workers and push Congress to pass labor reforms that create non-union “employee involvement organizations” as well as a mechanism for worker representation on corporate boards. l Congress should reintroduce and pass the Teamwork for Employees and Managers (TEAM) Act of 2022.18 The TEAM Act: 1. Reforms the National Labor Relations Act’s (NLRA) Section 8(a)(2) prohibition on formal worker–management cooperative organizations like works councils. 2. Creates an “Employee Involvement Organization” (EIO) to facilitate voluntary cooperation on critical issues like working conditions, benefits, and productivity. 3. Amends labor law to allow EIOs at large, publicly traded corporations to elect a non-voting, supervisory member of their company’s board of directors. Alternative View. While some conservatives lament that workers lack sufficient voice in today’s workplace, others interpret the rise in independent and flexible work opportunities, significant expansion in family-friendly policies like paid family leave, and the decline in private sector unionization as indicators of workers’ increasing competency and control. Another way to help expand workers’ freedom and voices in traditional workplaces is by allowing them to choose who represents them in negotiations with their employer. The Worker’s Choice Act19 would accom- plish this by ending exclusive representation so that unions in right-to-work states are no longer forced to represent workers who do not want to join them. Union Transparency. Private-sector unions must file detailed financial infor- mation with DOL—on matters including union spending, income, loans, assets, membership information, and employee salary—but unions composed entirely

Introduction

Low 53.0%
Pages: 254-256

— 222 — Mandate for Leadership: The Conservative Promise forward-leaning in sharing cyber threat intelligence with private-sector partners and the public, emphasizing that the protective nature of such information is of value only if put into the right hands at the right time. Since critical infrastructure and services are overwhelmingly owned, managed, and defended by the private sector in the United States, there has been an increasing emphasis on declassify- ing intelligence and sharing actionable information with private-sector partners, often through industry-specific Information Sharing and Analysis Centers (ISACs); regional meetings of government and private-sector experts called InfraGard, run by the FBI; direct public notification from the Department of Homeland Security, the FBI, and (increasingly) the NSA; and more discreet one-on-one engagements led by the collecting agencies. These programs properly recognize the private sector’s role in providing cyber- security for Americans; in practice, however, the intelligence shared by the U.S. government through these venues is too often already known or no longer relevant by the time it makes its way through the downgrade process for sharing. In addition, government-shared information often needs to take advantage of the opportunity to provide contexts, such as attribution, trends, and size of the observed cyber problem. As warranted, additional context should be provided to the private sector as a matter of routine. To continue improving the U.S. government’s ability to defend the country’s most vital networks, the IC must adopt an “obligation to share” policy process, including the capacity for “write to release” intelligence products whereby newly discovered technical indicators, targeting, and other intelligence relevant to cyber defense are automatically provided either to the public or to targeted entities within 48 hours of their collection—which is how counterterrorism intel- ligence has been managed for years when it comes to a “duty to warn.” Under this policy, agency heads should still have the flexibility to withhold intelligence for operational or counterintelligence reasons but would need to report regularly to Congress on the number of and justification for exceptions. This policy would make sharing intelligence and defending networks the default, as it already is in the rest of the cybersecurity community outside the IC, to improve the quantity, relevance, and timeliness of defensive information while ensuring accountability for top leaders when they must withhold this information. One of the most significant challenges within the IC is presented by the need to share information promptly among the 18 elements of the intelligence enterprise. The only long-term solution to the understandable tension between the need to share information and the need to protect intelligence sources and methods is a robust real-time auditing capability that electronically flags unauthorized access. Under an identity management system with real-time audit, even the most sensi- tive information acquired by America’s intelligence agencies can be shared, and the access to and use of that information are appropriately monitored. Establishing — 223 — Intelligence Community a real-time auditing capability is essential to decreasing the risk for the heads of intelligence agencies in meeting their statutory requirements to ensure that they protect sources and methods associated with the classified information their agen- cies collect. Overclassification. There is broad consensus across the U.S. government and among stakeholders that the system for classifying, declassifying, and otherwise marking and handling sensitive information is at a crossroads. Exorbitant amounts of classified data are created daily, and agency personnel often mistakenly choose classification as the default selection to ensure national security. At the same time, the effectiveness of downgraded and carefully declassified information to support foreign policy efforts has been borne out in, for example, alerting the broader world of Russia’s buildup and likely plans for its invasion of Ukraine. Two executive orders principally govern how the U.S. government handles clas- sified and sensitive information. l Executive Order 13526, “Classified National Security Information,” issued in 2009,38 prescribes the classification levels and procedures for declassification. l Executive Order 13556, “Controlled Unclassified Information,” issued in 2010,39 aimed to establish a uniform program for managing all unclassified information that requires safeguarding or dissemination controls. The current system for declassifying classified national security information (CNSI) is extraordinarily analog, requiring experts’ review of individual records. Declassification policies are based on human review of paper and need to con- template and handle the proliferation and volume of digital records created by agencies. The U.S. government will soon reach the point at which manual review is impossible. The declassification of CNSI should support key U.S. national security objectives, reflect mission priorities, and not serve solely as a necessary procedural function. Reforms should include: l Tighter definitions and greater specificity for categories of information requiring protection. l More stringent policies to effect significant reductions in the number of Original Classification Authorities (OCAs). l Stricter accountability measures at the OCA level and more detailed security classification guides.

Introduction

Low 52.3%
Pages: 530-532

— 497 — Department of Health and Human Services l OCR should withdraw its Health Insurance Portability and Accountability Act (HIPAA)86 guidance on abortion. OCR should withdraw its June 2022 guidance87 that purports to address patient privacy concerns following the Dobbs decision but is actually a politicized statement in favor of abortion and against Dobbs. HIPAA covers patients in the womb, but this guidance treats them as nonpersons contrary to law. The guidance is unnecessary and contributes to ideologically motivated fearmongering about abortion after Dobbs. AUTHOR’S NOTE: The preparation of this chapter was a collective enterprise of selfless individuals involved in the 2025 Presidential Transition Project. All contributors to this chapter are listed at the front of this volume and include former officials in the U.S. Department of Health and Human Services and other agencies, as well as academics, attorneys, and experts in the health care and insurance fields. — 498 — Mandate for Leadership: The Conservative Promise ENDNOTES 1. U.S. Department of Health and Human Services, Strategic Plan, FY 2018–2022, p. 50, https://aspe.hhs.gov/ sites/default/files/documents/feac346aca967bfadc446398679e14ec/hhs-strategic-plan-fy-2018-2022.pdf (accessed February 7, 2023). 2. “Strategic Goal 1: Protect and Strengthen Equitable Access to High Quality and Affordable Healthcare” in ibid. “In the context of HHS, this Strategic Plan adopts the definition of underserved communities listed in Executive Order 13985: Advancing Racial Equity and Support for Underserved Communities through the Federal Government to refer to ‘populations sharing a particular characteristic, as well as geographic communities, who have been systematically denied a full opportunity to participate in aspects of economic, social, and civic life’; this definition includes individuals who belong to underserved communities that have been denied such treatment, such as Black, Latino, and Indigenous and Native American persons, Asian Americans and Pacific Islanders and other persons of color; members of religious minorities; lesbian, gay, bisexual, transgender, and queer (LGBTQ+) persons; persons with disabilities; persons who live in rural areas; and persons otherwise adversely affected by persistent poverty or inequality. Individuals may belong to more than one underserved community and face intersecting barriers. This definition applies to the terms underserved communities and underserved populations throughout this Strategic Plan.” Ibid. Emphasis in original. 3. Karen Weintraub, “Americans’ Life Expectancy Continues to Fall, Erasing Health Gains of the Last Quarter Century,” USA Today, December 22, 2022, https://www.usatoday.com/story/news/health/2022/12/22/us-life- expectancy-continues-fall-erasing-25-years-health-gains/10937418002/ (accessed February 6, 2023). 4. Apoorva Mandavilli, “The C.D.C. Isn’t Publishing Large Portions of the Data It Collects,” The New York Times, updated February 22, 2022, https://www.congress.gov/117/meeting/house/114450/documents/HHRG-117- IF02-20220302-SD004.pdf (accessed March 22, 2023). 5. Zachary B. Sluzala and Edmund F. Haislmaier, “Lessons from COVID-19: How Policymakers Should Reform the Regulation of Clinical Testing,” Heritage Foundation Backgrounder No. 3696, March 28, 2022, https://www. heritage.org/public-health/report/lessons-covid-19-how-policymakers-should-reform-the-regulation-clinical. 6. U.S. Department of Health and Human Services, Centers for Disease Control and Prevention, “Centers for Disease Control and Prevention (C),” https://www.cdc.gov/maso/pdf/cdcmiss.pdf (March 16, 2023). 7. Judith Garber, “CDC ‘Disclaimers’ Hide Financial Conflicts of Interest,” Lown Institute Accountability Blog, November 6, 2019, https://lowninstitute.org/cdc-disclaimers-hide-financial-conflicts-of-interest/ (accessed February 6, 2023). See also U.S. Department of Health and Human Services, Centers for Disease Control and Prevention, “CDC Foundation Active Programs (October 1, 2014–September 30, 2015),” https://www. cdcfoundation.org/sites/default/files/upload/pdf/CDCFoundation-ActivePrograms-FY2015.pdf (accessed February 7, 2023); “CDC Active Programs (October 1, 2015–September 30, 2016),” https://www.cdcfoundation. org/sites/default/files/upload/pdf/CDCFoundation-ActivePrograms-FY2016.pdf (accessed February 7, 2023); “CDC Foundation Active Programs (October 1, 2016–September 30, 2017),” https://www.cdcfoundation.org/ sites/default/files/upload/pdf/CDCFoundation-ActivePrograms-FY2017.pdf (accessed February 7, 2023); “CDC Foundation Active Programs (October 1, 2017–September 30, 2018),” https://www.cdcfoundation.org/sites/default/ files/upload/pdf/CDCFoundation-ActivePrograms-FY2018.pdf (accessed February 7, 2023); “CDC Foundation Active Programs, October 1, 2018–September 30, 2019,” https://www.cdcfoundation.org/sites/default/files/upload/ pdf/CDCFoundation-ActivePrograms-FY2019.pdf (accessed February 7, 2023); “CDC Foundation Active Programs, October 1, 2029–September 30, 2020,” https://www.cdcfoundation.org/CDCF-ActivePrograms-CDC-FY20?inline (accessed February 7, 2023); and “CDC Foundation Active Programs, October 1, 2020–September 30, 2021,” https://www.cdcfoundation.org/CDCF-ActivePrograms-CDC-FY21?inline (accessed February 7, 2023). 8. Joel White and Doug Badger, “In Order to Defeat COVID-19, the Federal Government Must Modernize Its Public Health Data,” Heritage Foundation Backgrounder No. 3527, September 3, 2020, https://www.heritage. org/sites/default/files/2020-09/BG3527_0.pdf. 9. S. 15, Ensuring Accurate and Complete Abortion Data Reporting Act of 2023, 118th Congress, introduced January 23, 2023, https://www.congress.gov/118/bills/s15/BILLS-118s15is.pdf (accessed March 22, 2023), and H.R. 632, Ensuring Accurate and Complete Abortion Data Reporting Act of 2023, 118th Congress, introduced January 30, 2023, https://www.congress.gov/118/bills/hr632/BILLS-118hr632ih.pdf (accessed March 22, 2023). 10. Doug Badger, “How Congress Can Make Real Progress on Drug Prices,” Heritage Foundation Issue Brief No. 5016, December 9, 2019, https://www.heritage.org/sites/default/files/2019-12/IB5016_1.pdf.

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.