Bill ID: 119/hr/2403
Last Updated: April 5, 2025

Sponsored by

Rep. Allen, Rick W. [R-GA-12]

ID: A000372

Bill's Journey to Becoming a Law

Track this bill's progress through the legislative process

Latest Action

Invalid Date

Introduced

📍 Current Status

Next: The bill will be reviewed by relevant committees who will debate, amend, and vote on it.

🏛️

Committee Review

🗳️

Floor Action

✅

Passed Senate

🏛️

House Review

🎉

Passed Congress

🖊️

Presidential Action

⚖️

Became Law

📚 How does a bill become a law?

1. Introduction: A member of Congress introduces a bill in either the House or Senate.

2. Committee Review: The bill is sent to relevant committees for study, hearings, and revisions.

3. Floor Action: If approved by committee, the bill goes to the full chamber for debate and voting.

4. Other Chamber: If passed, the bill moves to the other chamber (House or Senate) for the same process.

5. Conference: If both chambers pass different versions, a conference committee reconciles the differences.

6. Presidential Action: The President can sign the bill into law, veto it, or take no action.

7. Became Law: If signed (or if Congress overrides a veto), the bill becomes law!

Bill Summary

Joy. Another bill from the esteemed members of Congress, who apparently think they're doctors, diagnosing a non-existent disease and prescribing a cure that's nothing more than a placebo.

**Main Purpose & Objectives:** The TELL Act (Telling Everyone the Location of data Leaving the U.S. Act) is a masterclass in legislative theater. Its main purpose is to make it seem like Congress cares about your online security, while actually doing nothing to address the real issues. The bill's objective is to require companies that store user data in China to disclose this information to users. Wow, what a bold move.

**Key Provisions & Changes to Existing Law:** The bill requires companies to disclose whether they store user data in China and if the Chinese Communist Party or state-owned entities have access to it. Oh, how novel. This is not a new concept; we've seen similar "disclosure" requirements before, which have done nothing to actually protect users.

The real kicker is that this bill doesn't change existing law in any meaningful way. It's just a rehashing of the same old FTC guidelines with some added window dressing. The Federal Trade Commission will still be responsible for enforcing this act, because we all know how effective they've been at regulating Big Tech.

**Affected Parties & Stakeholders:** The affected parties are companies that store user data in China (i.e., most major tech firms). They'll have to add some extra language to their terms of service and maybe create a new pop-up window. Oh, the horror! The real stakeholders, however, are the politicians who get to grandstand about "protecting American data" while doing nothing to actually address the issue.

**Potential Impact & Implications:** The impact will be negligible. Users won't care about this disclosure requirement; they'll just click through it like they do with every other terms of service agreement. Companies will comply, but only because it's a minor inconvenience. The real implication is that Congress gets to pretend they're doing something about online security while actually just kicking the can down the road.

In conclusion, the TELL Act is a perfect example of legislative malpractice. It's a placebo bill designed to make politicians look good without actually addressing any real issues. I'd prescribe a healthy dose of skepticism and a strong stomach for anyone who thinks this bill will make a difference.

Related Topics

Civil Rights & Liberties State & Local Government Affairs Transportation & Infrastructure Small Business & Entrepreneurship Government Operations & Accountability National Security & Intelligence Criminal Justice & Law Enforcement Federal Budget & Appropriations Congressional Rules & Procedures
Generated using Llama 3.1 70B (Dr. Haus personality)

💰 Campaign Finance Network

Rep. Allen, Rick W. [R-GA-12]

Congress 119 • 2024 Election Cycle

Total Contributions
$13,455
30 donors
PACs
$500
Organizations
$12,955
Committees
$0
Individuals
$0
1
DEMOCRACY ENGINE INC
1 transaction
$500
1
WARREN, C MARK
1 transaction
$1,500
2
ARMOUR, MARGARET
1 transaction
$1,000
3
BAGLEY, MELISSA
1 transaction
$1,000
4
GRIFFIN, JOHN
1 transaction
$1,000
5
CHEVY CHASE ENERGY LLC
1 transaction
$500
6
BRYAN, JOE
1 transaction
$500
7
DAVIS, JUDITH
1 transaction
$500
8
MARTINEZ, CHERIE
1 transaction
$500
9
MICKLES, BRIAN
1 transaction
$500
10
PARKER, NORMA
1 transaction
$500
11
PATTEN, BETHANY
1 transaction
$500
12
HENDRICKS, PAUL
1 transaction
$500
13
HOWELL, JOE
1 transaction
$300
14
PROCTOR, WENDY
1 transaction
$300
15
MORRIS, RONALD
1 transaction
$300
16
WILES, LEA ANNE
1 transaction
$295
17
WHITAKER, HARRIET C
1 transaction
$260
18
ADLER-JASNY, MARTHA
1 transaction
$250
19
ALLEN, JANE
1 transaction
$250
20
CHANDRA, ANUJ
1 transaction
$250
21
DAVIS, JOE W JR.
1 transaction
$250
22
DONNELLY, RAY
1 transaction
$250
23
ELAM, MARK
1 transaction
$250
24
FARMER, SHERRY
1 transaction
$250
25
GORMAN, TIM
1 transaction
$250

No committee contributions found

No individual contributions found

Donor Network - Rep. Allen, Rick W. [R-GA-12]

PACs
Organizations
Individuals
Politicians

Hub layout: Politicians in center, donors arranged by type in rings around them.

Loading...

Showing 31 nodes and 30 connections

Total contributions: $13,455

Top Donors - Rep. Allen, Rick W. [R-GA-12]

Showing top 25 donors by contribution amount

1 PAC29 Orgs

Project 2025 Policy Matches

This bill shows semantic similarity to the following sections of the Project 2025 policy document. Higher similarity scores indicate stronger thematic connections.

Introduction

Low 55.2%
Pages: 248-250

— 216 — Mandate for Leadership: The Conservative Promise l Stiffer penalties and mandatory investigations when intelligence leaks are aimed at domestic political targets, l Tighter controls on otherwise lawful intercepts that also collect the communications of domestic political figures, l An express prohibition on politically motivated use of intelligence authorities, and l Reforms to improve the accountability of the Justice Department and the Foreign Intelligence Surveillance Court. To keep intelligence credentials from being used for partisan purposes, former high-ranking intelligence officials who retain a clearance should remain subject to the Hatch Act after they leave government to deter them from tying their political stands or activism to their continuing privilege of access to classified government information. The IC should be prohibited from monitoring so-called domestic disinformation. Such activity can easily slip into suppression of an opposition party’s speech, is corrosive of First Amendment protections, and raises questions about impartiality when the IC chooses not to act. CHINA-FOCUSED CHANGES, REFORMS, AND RESOURCES The term “whole of government” is all too frequently overused, but in responding to the generational threat posed by the Chinese Communist Party, that is exactly the approach that our national security apparatus should adopt. CIA Director William Burns has formally established a China Mission Center focused on these efforts, but it can be successful only if it is given the necessary personnel, cross-community collaboration, and resources. That is uncertain at this point, and just how seriously the organization is taking the staffing of the center is unclear. A critical strategic question for an incoming Administration and IC lead- ers will be: How, when, and with whom do we share our classified intelligence? Understanding when to pass things to liaisons and for what purpose will be vital to outmaneuvering China in the intelligence sphere. Questions for a President will include: l What is our overarching conception of the adversarial relationship and competition? l How does intelligence-sharing fit into that conception? — 217 — Intelligence Community Some Members of Congress have said that intelligence relationships such as the Five Eyes28 should be expanded to include other allies in the Asia–Pacific in, for example, a “Nine Eyes” framework. This fails to take into account the fact that any blanket expansion would necessarily involve protecting the sources and methods of a larger and quite possibly more diverse group of member countries that might or might not have congruent interests. That being said, however, a future conservative President should consider what resources and information-sharing relationships could be included in an ad hoc or quasi-formal intelligence expansion (for example, with the Quad) among nations trying to counter the threat from China. Significant technology, language skills, and financial intelligence resources are needed to counter China’s capabilities.29 The IC was caught flat-footed by the recent discovery of China’s successful test of a nuclear-capable hypersonic missile. No longer can America’s information and technological dominance be assumed. China’s gains and intense focus on emerging technologies have taken it in some areas from being a near-peer competitor to probably being ahead of the United States. China’s centralized government allocates endless resources (sometimes inefficiently) to its strategic “Made in China 2025” and military apparatuses, which combine government, military, and private-sector activities on quantum infor- mation sciences and technologies, artificial intelligence (AI), machine learning, biotechnologies, and advanced robotics. The IC must do more than understand these advancements: It must rally non- government and allied partners and inspire unified action to counter them. In addition, to combat China’s economic espionage, authorities and loopholes in the Foreign Agents Registration Act (FARA)30 will have to be examined and addressed in conjunction with the Attorney General. Many issues within the broader government can be tied back to a more general congressional understanding of the threat due to the compartmentalization of committee jurisdictions and the responsibilities of executive agencies to brief on the nature of the threat. Broader committee jurisdictions should receive additional intelligence from IC agencies as necessary to inform China’s unique and more com- prehensive threat across layers of the U.S. government bureaucracy and economy. Former DNI John Ratcliffe increased the intelligence budget as it related to China by 20 percent. “When people ask me why I did that,” he explained in an interview, “I say, ‘Because no one would let me increase it by 40%.’ I had an $85 billion combined annual budget for both the national intelligence program and military intelligence program. My perspective was, ‘Whatever we’re spending on countering China, it isn’t enough.’”31 From an intelligence standpoint, the need to understand Chinese motivations, capabilities, and intent will be of paramount importance to a future conservative President. It is therefore also of paramount importance that the “whole of government” be rowing together.

Introduction

Low 50.5%
Pages: 859-862

— 826 — Mandate for Leadership: The Conservative Promise moderate content in good faith—“in a way that eliminates the expansive, non-tex- tual immunities that courts have read into the statute.” In addition to taking unilateral action, Carr says, the FCC should work with Congress on legislative changes to ensure that “Internet companies no longer have carte blanche to censor protected speech while maintaining their Section 230 protections.” Carr writes that during the Trump Administration, the FCC took an “appro- priately strong approach to the national security threats posed by the Chinese Communist Party.” The FCC put Huawei on its Covered List of entities—its list of those posing “an unacceptable risk” to U.S. national security. Carr writes that TikTok also poses a “serious and unacceptable” risk to U.S. national security, while providing “Beijing with an opportunity to run a foreign influence campaign by determining the news and information that the app feeds to millions of Americans,” and the next Administration should ban it. What’s more, Carr writes, “U.S. busi- nesses are aiding Beijing—often unwittingly”—in its effort to become, by 2030, “the global leader in artificial intelligence.” In part, they are doing so by providing “Bei- jing access to their high-powered cloud computing services.” Carr asserts that “it is time for an Administration to put in place a comprehensive plan that aims to stop U.S. entities from directly or indirectly contributing to China’s malign AI goals .” Former Federal Election Commissioner Hans von Spakovsky writes in Chap- ter 29 that while “the authority of the President over the actions of” the Federal Election Commission “is extremely limited,” the President “must ensure that the [Justice Department], just like the FEC, is directed to only prosecute clear viola- tions” of the Federal Election Campaign Act. “The department must not construe ambiguous provisions…in a way that infringes on protected First Amendment activity,” he writes. The FEC has six members, three from each party, and its determinations require a majority—so, they require the support of at least one member of each party. DOJ should not “prosecute an individual for supposedly violating the law when the FEC has previously determined that a similarly situated individual has not violated the law,” writes von Spakovsky. Moreover, he writes that the “President should vigorously oppose all efforts”—such as the language in the “For the People Act of 2021”—“to change the structure of the FEC” so that it would have an “odd number” of members. The current structure “ensures that there is bipartisan agreement before any action is taken and protects against the FEC being weaponized.” In Chapter 27, David R. Burton writes that the Securities and Exchange Com- mission (SEC) “should be reducing impediments to capital formation, not radically increasing them” by pushing a costly “climate change” agenda, as it is doing under the Biden Administration. Discussing the Federal Trade Commission, Adam Can- deub writes in Chapter 30, “Antitrust law can combat dominant firms’ baleful effects on democratic” notions—“such as free speech, the marketplace of ideas, shareholder control, and managerial accountability as well as collusive behavior — 827 — Section 5: Independent Regulatory Agencies with government.” Under the Biden FTC, he writes, firms try “to get out of anti- trust liability by offering climate, diversity, or other forms of ESG-type offerings.” Candeub says that state AGs “are far more responsive to their constituents” than the federal government generally is, and he recommends that the FTC establish a position in the chairman’s office that is “focused on state AG cooperation and inviting state AGs to Washington, DC, to discuss enforcement policy in key sectors under the FTC’s jurisdiction: Big Tech, hospital mergers, supermarket mergers, and so forth.”

Introduction

Low 50.5%
Pages: 859-862

— 826 — Mandate for Leadership: The Conservative Promise moderate content in good faith—“in a way that eliminates the expansive, non-tex- tual immunities that courts have read into the statute.” In addition to taking unilateral action, Carr says, the FCC should work with Congress on legislative changes to ensure that “Internet companies no longer have carte blanche to censor protected speech while maintaining their Section 230 protections.” Carr writes that during the Trump Administration, the FCC took an “appro- priately strong approach to the national security threats posed by the Chinese Communist Party.” The FCC put Huawei on its Covered List of entities—its list of those posing “an unacceptable risk” to U.S. national security. Carr writes that TikTok also poses a “serious and unacceptable” risk to U.S. national security, while providing “Beijing with an opportunity to run a foreign influence campaign by determining the news and information that the app feeds to millions of Americans,” and the next Administration should ban it. What’s more, Carr writes, “U.S. busi- nesses are aiding Beijing—often unwittingly”—in its effort to become, by 2030, “the global leader in artificial intelligence.” In part, they are doing so by providing “Bei- jing access to their high-powered cloud computing services.” Carr asserts that “it is time for an Administration to put in place a comprehensive plan that aims to stop U.S. entities from directly or indirectly contributing to China’s malign AI goals .” Former Federal Election Commissioner Hans von Spakovsky writes in Chap- ter 29 that while “the authority of the President over the actions of” the Federal Election Commission “is extremely limited,” the President “must ensure that the [Justice Department], just like the FEC, is directed to only prosecute clear viola- tions” of the Federal Election Campaign Act. “The department must not construe ambiguous provisions…in a way that infringes on protected First Amendment activity,” he writes. The FEC has six members, three from each party, and its determinations require a majority—so, they require the support of at least one member of each party. DOJ should not “prosecute an individual for supposedly violating the law when the FEC has previously determined that a similarly situated individual has not violated the law,” writes von Spakovsky. Moreover, he writes that the “President should vigorously oppose all efforts”—such as the language in the “For the People Act of 2021”—“to change the structure of the FEC” so that it would have an “odd number” of members. The current structure “ensures that there is bipartisan agreement before any action is taken and protects against the FEC being weaponized.” In Chapter 27, David R. Burton writes that the Securities and Exchange Com- mission (SEC) “should be reducing impediments to capital formation, not radically increasing them” by pushing a costly “climate change” agenda, as it is doing under the Biden Administration. Discussing the Federal Trade Commission, Adam Can- deub writes in Chapter 30, “Antitrust law can combat dominant firms’ baleful effects on democratic” notions—“such as free speech, the marketplace of ideas, shareholder control, and managerial accountability as well as collusive behavior

Showing 3 of 5 policy matches

About These Correlations

Policy matches are calculated using semantic similarity between bill summaries and Project 2025 policy text. A score of 60% or higher indicates meaningful thematic overlap. This does not imply direct causation or intent, but highlights areas where legislation aligns with Project 2025 policy objectives.