Background
Business and Professions Code section 22757.14
Code section 22757.14 (a) On or before January 1, 2027, and annually thereafter, the Department of Technology shall assess recent evidence and developments relevant to the purposes of this chapter and shall make recommendations about whether and how to update any of the following definitions for the purposes of this chapter to ensure that they accurately reflect technological developments, scientific literature, and widely accepted national and international standards:
- “Frontier model” so that it applies to foundation models at the frontier of artificial intelligence development.
“Frontier model” means a foundation model that was trained using a quantity of computing power greater than 1026 integer or floating-point operations. This quantity of computing power described shall include computing for the original training run and for any subsequent fine-tuning, reinforcement learning, or other material modifications the developer applies to a preceding foundation model. - “Frontier developer” so that it applies to developers of frontier models who are themselves at the frontier of artificial intelligence development.
“Frontier developer” means a person who has trained, or initiated the training of, a frontier model, with respect to which the person has used, or intends to use, at least as much computing power to train the frontier model as would meet the technical specifications found in the definition of “frontier model.” - “Large frontier developer” so that it applies to well-resourced frontier developers.
“Large frontier developer” means a frontier developer that together with its affiliates collectively had annual gross revenues in excess of five hundred million dollars ($500,000,000) in the preceding calendar year.
Code section 22757.14 (b) In making recommendations pursuant to this section, the Department of Technology shall take into account all of the following:
- Similar thresholds used in international standards or federal law, guidance, or regulations for the management of catastrophic risk and shall align with a definition adopted in a federal law or regulation to the extent that it is consistent with the purposes of this chapter.
- Input from stakeholders, including academics, industry, the open-source community, and governmental entities.
- The extent to which a person will be able to determine, before beginning to train or deploy a foundation model, whether that person will be subject to the definition as a frontier developer or as a large frontier developer with an aim toward allowing earlier determinations if possible.
- The complexity of determining whether a person or foundation model is covered, with an aim toward allowing simpler determinations if possible.
- The external verifiability of determining whether a person or foundation model is covered, with an aim toward definitions that are verifiable by parties other than the frontier developer.
Code section 22757.14 (c) Upon developing recommendations pursuant to this section, the Department of Technology shall submit a report to the Legislature, pursuant to Section 9795 of the Government Code, with those recommendations.
For more information on the Transparency in Frontier Artificial Intelligence Act, please reference the full bill text.
Input collection form
Any interested individual representing themselves or one of these entities is able to submit any feedback related to this requirement using the form below.
Only input received through the form below before June 1, 2026, will be reviewed by CDT.
Please read the Privacy Notice on Collection before submitting feedback.
Privacy Notice on Collection
In accordance with California Government Code § 11015.5 and the Information Practices Act of 1977 (Civil Code § 1798 et seq.), and as required by the Statewide Information Management Manual (SIMM) 5310-A, the California Department of Technology provides the following notice regarding the collection and use of personal information when completing the TFAIA Input form. Personal information is defined in Civil Code section 1798.3(a) and Government Code section 11015.5(d)(1).
Purpose of the Collection
CDT is collecting responses, personal information, and business information for the purpose of, including but not limited to:
- Complying with CDT’s obligations under Business and Professions Code section 22757.14.
- Conducting outreach or research.
- Complying with legal obligations and CDT’s statutory functions and responsibilities.
Authority for Collection
The collection and use of your personal information is authorized under:
- Government Code sections 11015.5 and 11019.9
- Information Practices Act – Civil Code section 1798 et seq.
- Public Records Act – Government Code section 7920 et seq.
- Statewide Information Management Manual (SIMM) 5310–A and 5310–B
- Business and Professions Code section 22757.14
- Applicable state or federal program requirements
Use of Information
The responses, personal information and business information you provide may be used for purposes including, but not limited to:
- Collecting and analyzing input from stakeholders such as academics, industry, the open-source community, and governmental entities on frontier artificial intelligence related definitions as required by Business and Professions Code section 22757.14.
- Drafting and submitting a report with CDT’s recommendations on the frontier artificial intelligence related definitions to the State Legislature as required by Business and Professions Code section 22757.14.
- Sharing all the responses received with the public, with attribution to the submitter.
- Conducting outreach or research.
Disclosure of Information
Information may be shared only as authorized by law, including with:
- Other government agencies for verification, analysis, reporting, and program administration.
- Contractors or vendors under strict confidentiality agreements.
- Law enforcement or regulatory agencies as required by law.
Consequences of Not Providing Information
Providing personal information and business information is voluntary. Please do not include any personal information beyond what is specifically requested in this TFAIA Input form. No confidential or proprietary information should be provided on this TFAIA Input form.
Access and Correction
You have the right to access records containing your personal information maintained by CDT. Requests for access or corrections should be directed to tfaia-input@state.ca.gov .
Information sessions
CDT will host information sessions on the process for submitting input.
April 9, 2026 Session
10:00AM to 11:00AM PST
April 16, 2026 Session
11:00AM to 12:00PM PST
May 5, 2026 Session
2:00PM to 3:00PM PST
May 26, 2026 Session
2:00PM to 3:00PM PST
Subscribe to the TFAIA listserv
Other TFAIA reporting
Please visit the California Cybersecurity Integration Center to submit:
- A critical safety incident or,
- A periodic summary of any assessment of the potential catastrophic risk resulting from internal use of frontier models.