| Last Version Text |
<?xml version="1.0" ?>
<ns0:MeasureDoc xmlns:html="http://www.w3.org/1999/xhtml" xmlns:ns0="http://lc.ca.gov/legalservices/schemas/caml.1#" xmlns:ns3="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="1.0" xsi:schemaLocation="http://lc.ca.gov/legalservices/schemas/caml.1# xca.1.xsd">
<ns0:Description>
<ns0:Id>20250SB__005092CHP</ns0:Id>
<ns0:VersionNum>92</ns0:VersionNum>
<ns0:History>
<ns0:Action>
<ns0:ActionText>INTRODUCED</ns0:ActionText>
<ns0:ActionDate>2024-12-16</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>AMENDED_SENATE</ns0:ActionText>
<ns0:ActionDate>2025-05-23</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>AMENDED_ASSEMBLY</ns0:ActionText>
<ns0:ActionDate>2025-06-27</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>AMENDED_ASSEMBLY</ns0:ActionText>
<ns0:ActionDate>2025-07-09</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>AMENDED_ASSEMBLY</ns0:ActionText>
<ns0:ActionDate>2025-09-02</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>AMENDED_ASSEMBLY</ns0:ActionText>
<ns0:ActionDate>2025-09-03</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>PASSED_ASSEMBLY</ns0:ActionText>
<ns0:ActionDate>2025-09-08</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>PASSED_SENATE</ns0:ActionText>
<ns0:ActionDate>2025-09-09</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>ENROLLED</ns0:ActionText>
<ns0:ActionDate>2025-09-12</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>CHAPTERED</ns0:ActionText>
<ns0:ActionDate>2025-10-13</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>APPROVED</ns0:ActionText>
<ns0:ActionDate>2025-10-13</ns0:ActionDate>
</ns0:Action>
<ns0:Action>
<ns0:ActionText>FILED</ns0:ActionText>
<ns0:ActionDate>2025-10-13</ns0:ActionDate>
</ns0:Action>
</ns0:History>
<ns0:LegislativeInfo>
<ns0:SessionYear>2025</ns0:SessionYear>
<ns0:SessionNum>0</ns0:SessionNum>
<ns0:MeasureType>SB</ns0:MeasureType>
<ns0:MeasureNum>50</ns0:MeasureNum>
<ns0:MeasureState>CHP</ns0:MeasureState>
<ns0:ChapterYear>2025</ns0:ChapterYear>
<ns0:ChapterType>CHP</ns0:ChapterType>
<ns0:ChapterSessionNum>0</ns0:ChapterSessionNum>
<ns0:ChapterNum>676</ns0:ChapterNum>
</ns0:LegislativeInfo>
<ns0:AuthorText authorType="LEAD_AUTHOR">Introduced by Senator Ashby</ns0:AuthorText>
<ns0:Authors>
<ns0:Legislator>
<ns0:Contribution>LEAD_AUTHOR</ns0:Contribution>
<ns0:House>SENATE</ns0:House>
<ns0:Name>Ashby</ns0:Name>
</ns0:Legislator>
</ns0:Authors>
<ns0:Title>An act to add Chapter 35.5 (commencing with Section 22948.30) to Division 8 of the Business and Professions Code, and to amend Section 6320 of the Family Code, relating to connected devices.</ns0:Title>
<ns0:RelatingClause>connected devices</ns0:RelatingClause>
<ns0:GeneralSubject>
<ns0:Subject>Connected devices: device protection requests.</ns0:Subject>
</ns0:GeneralSubject>
<ns0:DigestText>
<html:p>Existing law authorizes a court to issue a restraining order to a person to prevent abuse, as specified, based on reasonable proof of a past act or acts of abuse. Existing law authorizes the order to be issued solely on the affidavit or testimony of the person requesting the restraining order.</html:p>
<html:p>Existing law requires a manufacturer of a connected device to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and information contained in the device from unauthorized access, destruction, use, modification, or disclosure.</html:p>
<html:p>This bill would authorize a survivor, as defined, or a designated representative of a survivor, to submit a
device protection request to an account manager, as defined, seeking to terminate a perpetrator’s access to a connected device or associated user account. The bill would define “survivor” for these purposes to mean an individual who has had specified criminal acts committed or allegedly committed against them or who cares for another individual against whom those criminal acts have been committed or allegedly committed, as provided. The bill would require an account manager, within 2 business days of receiving a complete device protection request, to terminate or disable the perpetrator’s access to the connected device or user account, or to inform the survivor, in a clear and conspicuous manner, of any methods
to reset the device to factory settings or a similar state that removes all account holders, as provided. The bill would specify the requirements for a device protection request and would impose certain requirements on an account manager in processing a request. By providing that a device protection request may include a copy of a signed affidavit, the bill would expand the crime of perjury, and thus impose a state-mandated local program.</html:p>
<html:p>This bill would require the account manager to clearly describe the process to submit a device protection request on their internet website or mobile application and would prohibit the account manager from providing specified information to the perpetrator. The bill would require an account manager and any officer, director, employee, vendor, or agent thereof to treat any information submitted by a survivor or a designated representative of a survivor as confidential and securely dispose of the information, as
provided.</html:p>
<html:p>This bill would authorize enforcement of these provisions by injunction or civil penalty in any court action by any person injured by a violation of those provisions, the Attorney General, a district attorney, county counsel, a city attorney, or a city prosecutor, against an account manager or perpetrator, as provided. The bill would prohibit a waiver of these prohibitions and would declare that these provisions are severable.</html:p>
<html:p>Existing law authorizes a court to issue an ex parte order for, among other things, disturbing the peace of the other party. Existing law provides that disturbing the peace of the other party may be committed directly or indirectly, including through the use of a third party, and by any method or through any means including, but not limited to, telephone, online accounts, text messages, internet-connected devices, or other electronic technologies.</html:p>
<html:p>This bill would provide that, for purposes of those provisions, an internet-connected device includes a connected device as described in the bill.</html:p>
<html:p>The California Constitution requires the state to reimburse local agencies and school districts for certain costs mandated by the state. Statutory provisions establish procedures for making that reimbursement.</html:p>
<html:p>This bill would provide that no reimbursement is required by this act for a specified reason.</html:p>
</ns0:DigestText>
<ns0:DigestKey>
<ns0:VoteRequired>MAJORITY</ns0:VoteRequired>
<ns0:Appropriation>NO</ns0:Appropriation>
<ns0:FiscalCommittee>YES</ns0:FiscalCommittee>
<ns0:LocalProgram>YES</ns0:LocalProgram>
</ns0:DigestKey>
<ns0:MeasureIndicators>
<ns0:ImmediateEffect>NO</ns0:ImmediateEffect>
<ns0:ImmediateEffectFlags>
<ns0:Urgency>NO</ns0:Urgency>
<ns0:TaxLevy>NO</ns0:TaxLevy>
<ns0:Election>NO</ns0:Election>
<ns0:UsualCurrentExpenses>NO</ns0:UsualCurrentExpenses>
<ns0:BudgetBill>NO</ns0:BudgetBill>
<ns0:Prop25TrailerBill>NO</ns0:Prop25TrailerBill>
</ns0:ImmediateEffectFlags>
</ns0:MeasureIndicators>
</ns0:Description>
<ns0:Bill id="bill">
<ns0:Preamble>The people of the State of California do enact as follows:</ns0:Preamble>
<ns0:BillSection id="id_169C8510-F6CD-4A9D-B9A0-1D2A8CB98076">
<ns0:Num>SECTION 1.</ns0:Num>
<ns0:Content>
<html:p>The Legislature finds and declares all of the following:</html:p>
<html:p>
(a)
<html:span class="EnSpace"/>
According to the National Domestic Violence Hotline, almost one-half of all women and men in the United States have experienced psychological aggression by an intimate partner in their lifetime.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
According to the National Network to End Domestic Violence, 97 percent of domestic violence programs report that abusers misuse technology to stalk, harass, and control victims.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
An increase in the use of technology has become a concerning tool in cases of
domestic violence and harassment. Perpetrators leverage smartphone applications to remotely control everyday objects to exercise control over, monitor, and abuse their victims.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
Domestic violence, dating violence, stalking, sexual assault, human trafficking, and related crimes are life-threatening issues and have lasting and harmful effects on individuals, families, and entire communities.
</html:p>
<html:p>
(e)
<html:span class="EnSpace"/>
Survivors often lack meaningful support and options when establishing independence from an abuser, including barriers such as financial insecurity and limited access to reliable communications tools to maintain essential connections with family, social safety networks, employers, and support services.
</html:p>
<html:p>
(f)
<html:span class="EnSpace"/>
Laws related to
the use of technology can play a public interest role in the promotion of safety, life, and property with respect to these types of violence and abuse. Independent access to devices can assist survivors in establishing security and autonomy.
</html:p>
<html:p>
(g)
<html:span class="EnSpace"/>
Safeguards within tech-based services can serve a role in preventing abuse and narrowing the digital divide experienced by survivors of abuse.
</html:p>
</ns0:Content>
</ns0:BillSection>
<ns0:BillSection id="id_1EFCAB6C-D74A-43EE-A017-E5964A970265">
<ns0:Num>SEC. 2.</ns0:Num>
<ns0:ActionLine action="IS_ADDED" ns3:href="urn:caml:codes:BPC:caml#xpointer(%2Fcaml%3ALawDoc%2Fcaml%3ACode%2Fcaml%3ALawHeading%5B%40type%3D'DIVISION'%20and%20caml%3ANum%3D'8.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'CHAPTER'%20and%20caml%3ANum%3D'35.5.'%5D)" ns3:label="fractionType: LAW_SPREAD||commencingWith: 22948.30" ns3:type="locator">
Chapter 35.5 (commencing with Section 22948.30) is added to Division 8 of the
<ns0:DocName>Business and Professions Code</ns0:DocName>
, to read:
</ns0:ActionLine>
<ns0:Fragment>
<ns0:LawHeading id="id_3F83E33D-D70F-41A4-86EE-BFF0576C413D" type="CHAPTER">
<ns0:Num>35.5.</ns0:Num>
<ns0:LawHeadingVersion id="id_11D9C515-C6FF-4AC4-8431-3169A0F72729">
<ns0:LawHeadingText>Connected Devices</ns0:LawHeadingText>
</ns0:LawHeadingVersion>
<ns0:LawSection id="id_D1399EF2-FA04-408C-91A2-B3C0B833400F">
<ns0:Num>22948.30.</ns0:Num>
<ns0:LawSectionVersion id="id_98C66A5D-5763-4DAC-9D56-CA8369DB0E56">
<ns0:Content>
<html:p>For purposes of this chapter, the following definitions apply: </html:p>
<html:p>
(a)
<html:span class="EnSpace"/>
“Account manager” means a person or entity that provides an individual an internet-based or app-based user account, or a third party that manages those user accounts on behalf of that person or entity, that has authority to make decisions regarding user access to those user accounts.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
(1)
<html:span class="EnSpace"/>
“Connected device” means any device, or other physical object that is capable of connecting to the internet, directly or indirectly, and that is assigned an internet protocol address or Bluetooth address or enables a person to remotely obtain data
from or send commands to a connected device or account, which may be accomplished through a software application that is designed to be operated on a mobile device, computer, or other technology.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
“Connected device” does not include either of the following:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
Peripheral or component devices that are solely dependent on a primary connected device for internet connectivity and that cannot be independently accessed, remotely disabled, or
disconnected by a user or service provider.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
A connected device that is more than 10 years old or is no longer supported by the account manager.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
(1)
<html:span class="EnSpace"/>
“Covered act” means conduct that constitutes any of the following:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
A crime described in Chapter 8 (commencing with Section 236) of Title 8 of Part 1 of the Penal Code.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
A crime described in Chapter 1 (commencing with Section 261), Chapter 2 (commencing with Section 270), Chapter 2.5 (commencing with Section 273.8), Chapter 4 (commencing with Section 277), Chapter 5 (commencing with Section 281),
Chapter 5.5 (commencing with Section 290), Chapter 7.5 (commencing with Section 311), Chapter 7.6 (commencing with Section 313), or Chapter 8 (commencing with Section 314) of Title 9 of Part 1 of the Penal Code.
</html:p>
<html:p>
(C)
<html:span class="EnSpace"/>
An act under federal law, tribal law, or the Uniform Code of Military Justice that is similar to an offense described in subparagraph (A), (B), (D), or (E).
</html:p>
<html:p>
(D)
<html:span class="EnSpace"/>
Domestic violence, as defined in Section 6211 of the Family Code.
</html:p>
<html:p>
(E)
<html:span class="EnSpace"/>
A misdemeanor described in subdivision (e) of Section 243 of the Penal Code.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Nothing in paragraph (1) shall be construed to require a criminal conviction or any other determination of a court in order for
conduct to constitute a covered act.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
“Device access” means the ability to remotely control a connected device, remotely change the characteristics of a connected device, or remotely view or manipulate data collected by or through a connected device, by accessing a user account or accounts associated with the connected device. Acts that require device access include, but are not limited to, remotely manipulating an audio system, security system, light fixture, or other home appliance or fixture.
</html:p>
<html:p>
(e)
<html:span class="EnSpace"/>
“Device protection request” means a request by a survivor to terminate or disable a perpetrator’s access to a connected device or account, including, but not limited to, the ability of a person to obtain data from or send commands to a connected device or account.
</html:p>
<html:p>
(f)
<html:span class="EnSpace"/>
“Perpetrator” means an individual who has committed or allegedly committed a covered act against a survivor or an individual under the care of a survivor.
</html:p>
<html:p>
(g)
<html:span class="EnSpace"/>
“Survivor” means an individual who has had a covered act committed, or allegedly committed, against the individual, or who cares for another individual against whom a covered act has been committed or allegedly committed, provided that the individual providing care did not commit or allegedly commit the covered act.
</html:p>
<html:p>
(h)
<html:span class="EnSpace"/>
“User account or account” means an account or other means by which a person enrolls in or obtains access to a connected device or online service.
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_3B89F3B8-8AF9-4CF7-ABC1-29200094AD65">
<ns0:Num>22948.31.</ns0:Num>
<ns0:LawSectionVersion id="id_B6142CF5-E949-4E88-8671-5C85BC3E9F20">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
A survivor, or a designated representative of a survivor, may submit a device protection request to an account manager seeking to terminate a perpetrator’s access to a connected device or associated user account.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
A device protection request shall include all of the following:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
A verification that the perpetrator has committed or allegedly committed a covered act against the survivor or an individual in the survivor’s care, by providing either of the following:
</html:p>
<html:p>
(A)
<html:span class="EnSpace"/>
A copy of a signed affidavit from a licensed medical or mental health care
provider, licensed military medical or mental health care provider, licensed social worker, victim services provider, or licensed military victim services provider, a temporary restraining order, an emergency protective order, or a protective order lawfully issued pursuant to Section 527.6 of the Code of Civil Procedure, Part 3 (commencing with Section 6240) or Part 4 (commencing with Section 6300) of Division 10 of the Family Code, or Section 136.2 of the Penal Code.
</html:p>
<html:p>
(B)
<html:span class="EnSpace"/>
A copy of a police report, statements provided by police, including military police, to magistrates or judges, charging documents, protective or restraining orders, military protective orders, or any other official record that documents the covered act, including a copy of a written report by a peace officer employed by a state or local law enforcement agency acting in the
peace officer’s official capacity stating that the individual has filed a report alleging victimization of an act or crime.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Verification of the survivor’s exclusive legal possession or control of the connected device, including, but not limited to, a dissolution decree, temporary restraining order, protective order, domestic violence restraining order, or other document indicating the survivor’s exclusive use care, possession, or control of the connected device.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
Identification of the connected device or devices.
</html:p>
<html:p>
(4)
<html:span class="EnSpace"/>
Identification of the person that the requester seeks to deny device or account access.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
An account manager shall offer a survivor or
a designated representative of a survivor the ability to submit a device protection request under subdivision (b) through secure remote means that are easily navigable. Except as specified under subdivision (b), an account manager shall not require a specific form of documentation to submit a device protection request.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
Within two business days of receiving a complete device protection request, the account manager shall do one of the following:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
Terminate or disable the identified perpetrator’s access to the connected device or user account, and notify the survivor or their representative that access has been successfully denied.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Inform the survivor, in a clear and conspicuous manner, of any methods to reset the device to factory settings or to a similar state that removes all account holders. A reset method is one that does not require the survivor to possess a personal identification number (PIN), password, or other access credential, and shall be available solely by virtue of the survivor’s physical proximity to the
device.
</html:p>
<html:p>
(e)
<html:span class="EnSpace"/>
An account manager shall clearly describe the process under this section to submit a device protection request, including required documentation and available remedies, on its internet website and any associated mobile application.
</html:p>
<html:p>
(f)
<html:span class="EnSpace"/>
An account manager shall not require any of the following as a condition for processing a device protection request:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
Payment of a fee, penalty, or other charge for the survivor or a designated representative of the survivor to submit a request, or for the account manager to carry out the request.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Approval of the device protection request by any person who has device or account access that is not the survivor.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
An increase in the rate charged for the account if any
subscription fee or other recurring charge for account access applies.
</html:p>
<html:p>
(4)
<html:span class="EnSpace"/>
Any other requirement not listed under subdivision (b).
</html:p>
<html:p>
(g)
<html:span class="EnSpace"/>
An account manager shall not deny a device protection request due to arrears accrued by the account or associated with the connected device.
</html:p>
<html:p>
(h)
<html:span class="EnSpace"/>
An account manager shall not notify the perpetrator of the access termination and shall not disclose any data, credentials, or account changes relating to the survivor or any new account created after the perpetrator’s access is removed.
</html:p>
<html:p>
(i)
<html:span class="EnSpace"/>
A survivor shall not be financially responsible for any amount incurred or charged to the connected device or associated account by
the perpetrator after the perpetrator’s access has been terminated under this chapter.
</html:p>
<html:p>
(j)
<html:span class="EnSpace"/>
(1)
<html:span class="EnSpace"/>
An account manager and any officer, director, employee, vendor, or agent thereof shall treat any information submitted by a survivor or a designated representative of a survivor under this section as confidential and securely dispose of the information not later than 90 days after receiving the information.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Nothing in paragraph (1) shall be construed to prohibit an account manager from maintaining, for longer than the period specified in that paragraph, a record that verifies that a survivor or a designated representative of a survivor fulfilled the conditions of a device protection request under subdivision (b).
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_DDD92B19-364F-4D9A-BD01-A2CC80AE8276">
<ns0:Num>22948.32.</ns0:Num>
<ns0:LawSectionVersion id="id_17ECC9F2-51F9-47EF-8CD8-D735B630F1FD">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
(1)
<html:span class="EnSpace"/>
An account manager that fails to deny a perpetrator access in compliance with subdivision (a) of Section 22948.31 or otherwise does not comply with the requirements described in Section 22948.31 shall be deemed in violation of this chapter.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
A perpetrator that maintains or exercises device or account access, including by disturbing the peace of the other party, as described in subdivision (c) of Section 6320 of the Family Code, despite having their device or account access denied pursuant to subdivision (a) of Section 22948.31, shall be deemed in violation of this chapter.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
(1)
<html:span class="EnSpace"/>
Actions for relief pursuant to this chapter may be prosecuted exclusively in a court of competent jurisdiction in a civil action brought by any person injured by the violation or in the name of the people of the State of California by the Attorney General, a district attorney, county counsel, a city attorney, or a city prosecutor.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
A court may enjoin a person or entity who engages, has engaged, or proposes to engage in a violation of this chapter. The court may make any orders or judgments as may be necessary to prevent or remedy a violation of this chapter.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
A person or entity who engages, has engaged, or proposes to engage in a violation of this chapter shall be liable for a civil penalty not to exceed two thousand five hundred dollars
($2,500) per violation for each connected device in violation of this chapter. If multiple violations of this chapter are alleged in any civil action, they shall be specifically alleged, and a court of competent jurisdiction shall make specific findings as to each violation. If the action is brought by the Attorney General, the penalty shall be deposited into the General Fund. If the action is brought by a district attorney or county counsel, the penalty shall be paid to the treasurer of the county in which the judgment was entered. If the action is brought by a city attorney or city prosecutor, the penalty shall be paid to the treasurer of the city in which the judgment was entered. If the action is brought by a person injured by the violation, the penalty shall be awarded to that person.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
The prevailing plaintiff in any action commenced
under this section shall be entitled to recover court costs and reasonable attorney’s fees.
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_09B6F10B-ECD1-4A9B-8239-870EB8BF9A8E">
<ns0:Num>22948.33.</ns0:Num>
<ns0:LawSectionVersion id="id_CCCB9492-A7C2-47C2-B719-72D5B5DFBB2A">
<ns0:Content>
<html:p>Any waiver of the provisions of this chapter is contrary to public policy and void and unenforceable.</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_1207242F-2516-4312-A2B3-EBCA35D0A01D">
<ns0:Num>22948.34.</ns0:Num>
<ns0:LawSectionVersion id="id_8E49FD27-3F7D-4DA4-B5B0-0840A39F7EA3">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
The duties and obligations imposed by this chapter are cumulative with any other duties or obligations imposed under other law, and shall not be construed to relieve any party from any duties or obligations imposed under other law.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
The remedies or penalties provided by this chapter are cumulative to each other and to the remedies or penalties available under all other laws of the state.
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_ECEF7455-5E42-4665-B944-A0A9A938F4F5">
<ns0:Num>22948.35.</ns0:Num>
<ns0:LawSectionVersion id="id_2A2C7DC6-BBF1-40AD-9211-4E07CDD287ED">
<ns0:Content>
<html:p>Notwithstanding any other provision of this chapter, any entity that is subject to the federal Safe Connections Act of 2022 (Public Law 117-223) or regulations of the Federal Communications Commission adopted pursuant to the authority of that law, shall not be subject to this chapter.</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_3C793F5D-5153-4D5B-8057-CB185A02C088">
<ns0:Num>22948.36.</ns0:Num>
<ns0:LawSectionVersion id="id_CC838750-8558-4670-9CB3-7C1C863629C8">
<ns0:Content>
<html:p>Notwithstanding any other provision of this chapter, an entity that is subject to Chapter 6 (commencing with Section 28200) of Division 12 of the Vehicle Code shall not be subject to this chapter.</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
<ns0:LawSection id="id_FE7DDD01-410B-49C0-A110-912C967A21F1">
<ns0:Num>22948.37.</ns0:Num>
<ns0:LawSectionVersion id="id_4FB02DFF-719F-47F9-8E02-D861166A4B0D">
<ns0:Content>
<html:p>The provisions of this chapter are severable. If any provision of this chapter or its application is held invalid, that invalidity shall not affect other provisions or applications that can be given effect without the invalid provision or application.</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
</ns0:LawHeading>
</ns0:Fragment>
</ns0:BillSection>
<ns0:BillSection id="id_9C45042C-2004-4419-A3AB-658462381DC1">
<ns0:Num>SEC. 3.</ns0:Num>
<ns0:ActionLine action="IS_AMENDED" ns3:href="urn:caml:codes:FAM:caml#xpointer(%2Fcaml%3ALawDoc%2Fcaml%3ACode%2Fcaml%3ALawHeading%5B%40type%3D'DIVISION'%20and%20caml%3ANum%3D'10.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'PART'%20and%20caml%3ANum%3D'4.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'CHAPTER'%20and%20caml%3ANum%3D'2.'%5D%2Fcaml%3ALawHeading%5B%40type%3D'ARTICLE'%20and%20caml%3ANum%3D'1.'%5D%2Fcaml%3ALawSection%5Bcaml%3ANum%3D'6320.'%5D)" ns3:label="fractionType: LAW_SECTION" ns3:type="locator">
Section 6320 of the
<ns0:DocName>Family Code</ns0:DocName>
is amended to read:
</ns0:ActionLine>
<ns0:Fragment>
<ns0:LawSection id="id_EF88057A-323E-46BD-8ECA-CAC2146FAFBB">
<ns0:Num>6320.</ns0:Num>
<ns0:LawSectionVersion id="id_D16DBF16-F2BD-4547-B153-42E491540916">
<ns0:Content>
<html:p>
(a)
<html:span class="EnSpace"/>
The court may issue an ex parte order enjoining a party from molesting, attacking, striking, stalking, threatening, sexually assaulting, battering, credibly impersonating as described in Section 528.5 of the Penal Code, falsely personating as described in Section 529 of the Penal Code, harassing, telephoning, including, but not limited to, making annoying telephone calls as described in Section 653m of the Penal Code, destroying personal property, contacting, either directly or indirectly, by mail or otherwise, coming within a specified distance of, or disturbing the peace of the other party, and, in the discretion of the court, on a showing of good cause, of other named family or household members.
</html:p>
<html:p>
(b)
<html:span class="EnSpace"/>
On a showing of good cause, the court may include in a protective order a grant to the petitioner of the exclusive care, possession, or control of any animal owned, possessed, leased, kept, or held by either the petitioner or the respondent or a minor child residing in the residence or household of either the petitioner or the respondent. The court may order the respondent to stay away from the animal and forbid the respondent from taking, transferring, encumbering, concealing, molesting, attacking, striking, threatening, harming, or otherwise disposing of the animal.
</html:p>
<html:p>
(c)
<html:span class="EnSpace"/>
As used in subdivision (a), “disturbing the peace of the other party” refers to conduct that, based on the totality of the circumstances, destroys the mental or emotional calm of the other party. This conduct may be committed directly or indirectly, including
through the use of a third party, and by any method or through any means including, but not limited to, telephone, online accounts, text messages, internet-connected devices, including connected devices as defined in Section 22948.30 of the Business and Professions Code, or other electronic technologies. This conduct includes, but is not limited to, coercive control, which is a pattern of behavior that in purpose or effect unreasonably interferes with a person’s free will and personal liberty. Examples of coercive control include, but are not limited to, unreasonably engaging in any of the following:
</html:p>
<html:p>
(1)
<html:span class="EnSpace"/>
Isolating the other party from friends, relatives, or other sources of support.
</html:p>
<html:p>
(2)
<html:span class="EnSpace"/>
Depriving the other party of basic necessities.
</html:p>
<html:p>
(3)
<html:span class="EnSpace"/>
Controlling, regulating, or monitoring the other party’s movements, communications, daily behavior, finances, economic resources, or access to services.
</html:p>
<html:p>
(4)
<html:span class="EnSpace"/>
Compelling the other party by force, threat of force, or intimidation, including threats based on actual or suspected immigration status, to engage in conduct from which the other party has a right to abstain or to abstain from conduct in which the other party has a right to engage.
</html:p>
<html:p>
(5)
<html:span class="EnSpace"/>
Engaging in reproductive coercion, which consists of control over the reproductive autonomy of another through force, threat of force, or intimidation, and may include, but is not limited to, unreasonably pressuring the other party to become pregnant, deliberately interfering with contraception use or access to reproductive
health information, or using coercive tactics to control, or attempt to control, pregnancy outcomes.
</html:p>
<html:p>
(d)
<html:span class="EnSpace"/>
This section does not limit any remedies available under this act or any other provision of law.
</html:p>
</ns0:Content>
</ns0:LawSectionVersion>
</ns0:LawSection>
</ns0:Fragment>
</ns0:BillSection>
<ns0:BillSection id="id_CD336149-064F-4048-9B5D-EFE1C4A62366">
<ns0:Num>SEC. 4.</ns0:Num>
<ns0:Content>
<html:p>
No reimbursement is required by this act pursuant to Section 6 of Article XIII
<html:span class="ThinSpace"/>
B of the California Constitution because the only costs that may be incurred by a local agency or school district will be incurred because this act creates a new crime or infraction, eliminates a crime or infraction, or changes the penalty for a crime or infraction, within the meaning of Section 17556 of the Government Code, or changes the definition of a crime within the meaning of Section 6 of Article XIII
<html:span class="ThinSpace"/>
B of the California Constitution.
</html:p>
</ns0:Content>
</ns0:BillSection>
</ns0:Bill>
</ns0:MeasureDoc>
|