<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Referred-in-Senate" bill-type="olc" dms-id="H98092CBBE6D140068A545F5DF9656961" key="H" public-private="public" stage-count="1">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>113 HR 624 : Cyber Intelligence Sharing and Protection Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2013-04-22</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">IIB</distribution-code>
		<congress>113th CONGRESS</congress>
		<session>1st Session</session>
		<legis-num>H. R. 624</legis-num>
		<current-chamber display="yes">IN THE SENATE OF THE UNITED
		  STATES</current-chamber>
		<action>
			<action-date date="20130422">April 22, 2013</action-date>
			<action-desc>Received; read twice and referred to the
			 <committee-name committee-id="SLIN00">Select Committee on
			 Intelligence</committee-name></action-desc>
		</action>
		<legis-type>AN ACT</legis-type>
		<official-title display="yes">To provide for the sharing of certain cyber
		  threat intelligence and cyber threat information between the intelligence
		  community and cybersecurity entities, and for other purposes. </official-title>
	</form>
	<legis-body id="HA40E3FAF9770489C9F7879F8A1345F1D" style="OLC">
		<section id="HB0C08BA314F34BDFB081CA26A4A48B86" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the
			 <quote><short-title>Cyber Intelligence Sharing and
			 Protection Act</short-title></quote>.</text>
		</section><section display-inline="no-display-inline" id="H65F7C228C460470EABD4671A3B8CF3B0"><enum>2.</enum><header>Federal
			 Government coordination with respect to cybersecurity</header>
			<subsection id="H3A688187305E412D92C2283878D2DF6D"><enum>(a)</enum><header>Coordinated
			 activities</header><text display-inline="yes-display-inline">The Federal
			 Government shall conduct cybersecurity activities to provide shared situational
			 awareness that enables integrated operational actions to protect, prevent,
			 mitigate, respond to, and recover from cyber incidents.</text>
			</subsection><subsection id="H86D261397C9D422E8BAB20F1A3DEF6E2"><enum>(b)</enum><header>Coordinated
			 information sharing</header>
				<paragraph id="HB2E42C5A52744D3CAFABD42A337B376E"><enum>(1)</enum><header>Designation of
			 coordinating entity for cyber threat information</header><text display-inline="yes-display-inline">The President shall designate an entity
			 within the Department of Homeland Security as the civilian Federal entity to
			 receive cyber threat information that is shared by a cybersecurity provider or
			 self-protected entity in accordance with section 1104(b) of the National
			 Security Act of 1947, as added by section 3(a) of this Act, except as provided
			 in paragraph (2) and subject to the procedures established under paragraph
			 (4).</text>
				</paragraph><paragraph id="H5214584B4257405696F0143C85AE8FD2"><enum>(2)</enum><header>Designation of a
			 coordinating entity for cybersecurity crimes</header><text display-inline="yes-display-inline">The President shall designate an entity
			 within the Department of Justice as the civilian Federal entity to receive
			 cyber threat information related to cybersecurity crimes that is shared by a
			 cybersecurity provider or self-protected entity in accordance with section
			 1104(b) of the National Security Act of 1947, as added by section 3(a) of this
			 Act, subject to the procedures under paragraph (4).</text>
				</paragraph><paragraph id="HD01E445E1E4B4E8EBE6B1F2B9B811371"><enum>(3)</enum><header>Sharing by
			 coordinating entities</header><text display-inline="yes-display-inline">The
			 entities designated under paragraphs (1) and (2) shall share cyber threat
			 information shared with such entities in accordance with section 1104(b) of the
			 National Security Act of 1947, as added by section 3(a) of this Act, consistent
			 with the procedures established under paragraphs (4) and (5).</text>
				</paragraph><paragraph id="H30BD1C3D2DB749A4A0A64B2585838A5D"><enum>(4)</enum><header>Procedures</header><text>Each
			 department or agency of the Federal Government receiving cyber threat
			 information shared in accordance with section 1104(b) of the National Security
			 Act of 1947, as added by section 3(a) of this Act, shall establish procedures
			 to—</text>
					<subparagraph id="H1A0F9591995749F1818266C5AC022E41"><enum>(A)</enum><text display-inline="yes-display-inline">ensure that cyber threat information shared
			 with departments or agencies of the Federal Government in accordance with such
			 section 1104(b) is also shared with appropriate departments and agencies of the
			 Federal Government with a national security mission in real time;</text>
					</subparagraph><subparagraph id="H483EE6537EF64F5A9DC3FC8B579B94C0"><enum>(B)</enum><text>ensure the
			 distribution to other departments and agencies of the Federal Government of
			 cyber threat information in real time; and</text>
					</subparagraph><subparagraph id="H03A34BB6B1E34C329CDA7D78C3C3D3CC"><enum>(C)</enum><text>facilitate
			 information sharing, interaction, and collaboration among and between the
			 Federal Government; State, local, tribal, and territorial governments; and
			 cybersecurity providers and self-protected entities.</text>
					</subparagraph></paragraph><paragraph display-inline="no-display-inline" id="H3478459A39934235A0F076B2F1D8F64F"><enum>(5)</enum><header>Privacy and
			 civil liberties</header>
					<subparagraph id="H6B068C990F9748799246897098F9A520"><enum>(A)</enum><header>Policies and
			 procedures</header><text>The Secretary of Homeland Security, the Attorney
			 General, the Director of National Intelligence, and the Secretary of Defense
			 shall jointly establish and periodically review policies and procedures
			 governing the receipt, retention, use, and disclosure of non-publicly available
			 cyber threat information shared with the Federal Government in accordance with
			 section 1104(b) of the National Security Act of 1947, as added by section 3(a)
			 of this Act. Such policies and procedures shall, consistent with the need to
			 protect systems and networks from cyber threats and mitigate cyber threats in a
			 timely manner—</text>
						<clause id="H37E33C44F6CF4126AE7A60A2265C8945"><enum>(i)</enum><text>minimize the
			 impact on privacy and civil liberties;</text>
						</clause><clause id="H16D0EDF841904955A9FCD5B338A569CD"><enum>(ii)</enum><text display-inline="yes-display-inline">reasonably limit the receipt, retention,
			 use, and disclosure of cyber threat information associated with specific
			 persons that is not necessary to protect systems or networks from cyber threats
			 or mitigate cyber threats in a timely manner;</text>
						</clause><clause id="HBA103EBDA6194B0C93E79C7D402604D9"><enum>(iii)</enum><text>include
			 requirements to safeguard non-publicly available cyber threat information that
			 may be used to identify specific persons from unauthorized access or
			 acquisition;</text>
						</clause><clause id="HB2DE876425EA4AF6A60921932FC563EA"><enum>(iv)</enum><text>protect the
			 confidentiality of cyber threat information associated with specific persons to
			 the greatest extent practicable; and</text>
						</clause><clause id="H530B130D732648C3B80FE40A3AA19C84"><enum>(v)</enum><text display-inline="yes-display-inline">not delay or impede the flow of cyber
			 threat information necessary to defend against or mitigate a cyber
			 threat.</text>
						</clause></subparagraph><subparagraph id="H4796ED231D084E8F9E79C05649812AC0"><enum>(B)</enum><header>Submission to
			 Congress</header><text>The Secretary of Homeland Security, the Attorney
			 General, the Director of National Intelligence, and the Secretary of Defense
			 shall, consistent with the need to protect sources and methods, jointly submit
			 to Congress the policies and procedures required under subparagraph (A) and any
			 updates to such policies and procedures.</text>
					</subparagraph><subparagraph id="HE33BCC1C57E34BB2BE45F9A88ECCB86F"><enum>(C)</enum><header>Implementation</header><text>The
			 head of each department or agency of the Federal Government receiving cyber
			 threat information shared with the Federal Government under such section
			 1104(b) shall—</text>
						<clause id="HE062547B4A21415697CC6A20B78EA7D0"><enum>(i)</enum><text>implement the
			 policies and procedures established under subparagraph (A); and</text>
						</clause><clause id="HC0E3EC0901C143CFB9A1D9A1680D645F"><enum>(ii)</enum><text>promptly notify
			 the Secretary of Homeland Security, the Attorney General, the Director of
			 National Intelligence, the Secretary of Defense, and the appropriate
			 congressional committees of any significant violations of such policies and
			 procedures.</text>
						</clause></subparagraph><subparagraph id="H6D9E474D15D244F19A0CDC46ABE83615"><enum>(D)</enum><header>Oversight</header><text>The
			 Secretary of Homeland Security, the Attorney General, the Director of National
			 Intelligence, and the Secretary of Defense shall jointly establish a program to
			 monitor and oversee compliance with the policies and procedures established
			 under subparagraph (A).</text>
					</subparagraph></paragraph><paragraph id="H66B79C0B57E545A3822B65CE17C94E60"><enum>(6)</enum><header>Information
			 sharing relationships</header><text>Nothing in this section shall be construed
			 to—</text>
					<subparagraph id="H68A7D47651EC461E860E7EA7577E627D"><enum>(A)</enum><text>alter existing
			 agreements or prohibit new agreements with respect to the sharing of cyber
			 threat information between the Department of Defense and an entity that is part
			 of the defense industrial base;</text>
					</subparagraph><subparagraph id="H6132DF3A8BAF47B8A609B9546A39E9D9"><enum>(B)</enum><text>alter existing
			 information-sharing relationships between a cybersecurity provider, protected
			 entity, or self-protected entity and the Federal Government;</text>
					</subparagraph><subparagraph id="H79A7FEB342894D7793D93D591D9D3EE2"><enum>(C)</enum><text>prohibit the
			 sharing of cyber threat information directly with a department or agency of the
			 Federal Government for criminal investigative purposes related to crimes
			 described in section 1104(c)(1) of the National Security Act of 1947, as added
			 by section 3(a) of this Act; or</text>
					</subparagraph><subparagraph id="H8313DA8C14D64353A2FDFE7A7955D674"><enum>(D)</enum><text display-inline="yes-display-inline">alter existing agreements or prohibit new
			 agreements with respect to the sharing of cyber threat information between the
			 Department of Treasury and an entity that is part of the financial services
			 sector.</text>
					</subparagraph></paragraph><paragraph id="H1A354A63F66D4DB7BA493949A41CA2AF"><enum>(7)</enum><header>Technical
			 assistance</header>
					<subparagraph id="H055E8BEE17804361AF7DAF62A42E65E7"><enum>(A)</enum><header>Discussions and
			 assistance</header><text display-inline="yes-display-inline">Nothing in this
			 section shall be construed to prohibit any department or agency of the Federal
			 Government from engaging in formal or informal technical discussion regarding
			 cyber threat information with a cybersecurity provider or self-protected entity
			 or from providing technical assistance to address vulnerabilities or mitigate
			 threats at the request of such a provider or such an entity.</text>
					</subparagraph><subparagraph id="HA3950407672F44BD94C47066D7FD4BCE"><enum>(B)</enum><header>Coordination</header><text display-inline="yes-display-inline">Any department or agency of the Federal
			 Government engaging in an activity referred to in subparagraph (A) shall
			 coordinate such activity with the entity of the Department of Homeland Security
			 designated under paragraph (1) and share all significant information resulting
			 from such activity with such entity and all other appropriate departments and
			 agencies of the Federal Government.</text>
					</subparagraph><subparagraph id="H06146BD121EF4A08AEF671F9286B4CE3"><enum>(C)</enum><header>Sharing by
			 designated entity</header><text display-inline="yes-display-inline">Consistent
			 with the policies and procedures established under paragraph (5), the entity of
			 the Department of Homeland Security designated under paragraph (1) shall share
			 with all appropriate departments and agencies of the Federal Government all
			 significant information resulting from—</text>
						<clause id="HF546305A657C467CBF1C368E8C8DEFDA"><enum>(i)</enum><text>formal or informal
			 technical discussions between such entity of the Department of Homeland
			 Security and a cybersecurity provider or self-protected entity about cyber
			 threat information; or</text>
						</clause><clause id="HCBE50425E2794DBD95A428E8424071D5"><enum>(ii)</enum><text>any
			 technical assistance such entity of the Department of Homeland Security
			 provides to such cybersecurity provider or such self-protected entity to
			 address vulnerabilities or mitigate threats.</text>
						</clause></subparagraph></paragraph></subsection><subsection display-inline="no-display-inline" id="H357B51A66F4D4979BA8BD33F75542678"><enum>(c)</enum><header>Reports on
			 information sharing</header>
				<paragraph id="H8DFD7959D7F146A39E96049472803A36"><enum>(1)</enum><header>Inspector
			 General of the Department of Homeland Security report</header><text display-inline="yes-display-inline">The Inspector General of the Department of
			 Homeland Security, in consultation with the Inspector General of the Department
			 of Justice, the Inspector General of the Intelligence Community, the Inspector
			 General of the Department of Defense, and the Privacy and Civil Liberties
			 Oversight Board, shall annually submit to the appropriate congressional
			 committees a report containing a review of the use of information shared with
			 the Federal Government under subsection (b) of section 1104 of the National
			 Security Act of 1947, as added by section 3(a) of this Act, including—</text>
					<subparagraph id="H6881CBA30E10497899689387D6429252"><enum>(A)</enum><text>a review of the
			 use by the Federal Government of such information for a purpose other than a
			 cybersecurity purpose;</text>
					</subparagraph><subparagraph id="H48A584891E2B4C1E808269EAD6851FB2"><enum>(B)</enum><text>a review of the
			 type of information shared with the Federal Government under such
			 subsection;</text>
					</subparagraph><subparagraph id="HE6850857E91F410F992F9A2E7E7C83F9"><enum>(C)</enum><text>a review of the
			 actions taken by the Federal Government based on such information;</text>
					</subparagraph><subparagraph id="HBDAC8BC1B5DF45D29741308155D37B60"><enum>(D)</enum><text>appropriate
			 metrics to determine the impact of the sharing of such information with the
			 Federal Government on privacy and civil liberties, if any;</text>
					</subparagraph><subparagraph commented="no" id="H63334C464B3E4793A204AA4792C4BBE8"><enum>(E)</enum><text display-inline="yes-display-inline">a list of the departments or agencies
			 receiving such information;</text>
					</subparagraph><subparagraph id="H3E4510A23F0F4CACA0C305F4E1E70693"><enum>(F)</enum><text>a review of the
			 sharing of such information within the Federal Government to identify
			 inappropriate stovepiping of shared information; and</text>
					</subparagraph><subparagraph id="H68541966A56F4F65827B68D8ED442A16"><enum>(G)</enum><text>any
			 recommendations of the Inspector General of the Department of Homeland Security
			 for improvements or modifications to the authorities under such section.</text>
					</subparagraph></paragraph><paragraph id="H3CB4B24FD07B40158FE4215FB6ED7B93"><enum>(2)</enum><header>Privacy and
			 civil liberties officers report</header><text display-inline="yes-display-inline">The Officer for Civil Rights and Civil
			 Liberties of the Department of Homeland Security, in consultation with the
			 Privacy and Civil Liberties Oversight Board, the Inspector General of the
			 Intelligence Community, and the senior privacy and civil liberties officer of
			 each department or agency of the Federal Government that receives cyber threat
			 information shared with the Federal Government under such subsection (b), shall
			 annually and jointly submit to Congress a report assessing the privacy and
			 civil liberties impact of the activities conducted by the Federal Government
			 under such section 1104. Such report shall include any recommendations the
			 Civil Liberties Protection Officer and Chief Privacy and Civil Liberties
			 Officer consider appropriate to minimize or mitigate the privacy and civil
			 liberties impact of the sharing of cyber threat information under such section
			 1104.</text>
				</paragraph><paragraph id="HE6DDF230FA7F4E75B0A0EFBF443E5C00"><enum>(3)</enum><header>Form</header><text>Each
			 report required under paragraph (1) or (2) shall be submitted in unclassified
			 form, but may include a classified annex.</text>
				</paragraph></subsection><subsection id="HD018B4D74E2A4552848A8199687A3FC3"><enum>(d)</enum><header>Definitions</header><text>In
			 this section:</text>
				<paragraph id="HE1AD1D60F46A403FBCA8087F794F1810"><enum>(1)</enum><header>Appropriate
			 congressional committees</header><text>The term <term>appropriate congressional
			 committees</term> means—</text>
					<subparagraph id="HA0FCC4A9241C43DFBBD1561CA1919594"><enum>(A)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security, the
			 Committee on the Judiciary, the Permanent Select Committee on Intelligence, and
			 the Committee on Armed Services of the House of Representatives; and</text>
					</subparagraph><subparagraph id="H24D5B1297D964FE98B1214A9BC0EB512"><enum>(B)</enum><text>the Committee on
			 Homeland Security and Governmental Affairs, the Committee on the Judiciary, the
			 Select Committee on Intelligence, and the Committee on Armed Services of the
			 Senate.</text>
					</subparagraph></paragraph><paragraph id="HE0EB106137F0438C90F58BE239EA2184"><enum>(2)</enum><header>Cyber threat
			 information, cyber threat intelligence, cybersecurity crimes, cybersecurity
			 provider, cybersecurity purpose, and self-protected entity</header><text>The
			 terms <term>cyber threat information</term>, <term>cyber threat
			 intelligence</term>, <term>cybersecurity crimes</term>, <term>cybersecurity
			 provider</term>, <term>cybersecurity purpose</term>, and <term>self-protected
			 entity</term> have the meaning given those terms in section 1104 of the
			 National Security Act of 1947, as added by section 3(a) of this Act.</text>
				</paragraph><paragraph id="H9C3D88D4F4EF4292B323403DCB029A83"><enum>(3)</enum><header>Intelligence
			 community</header><text display-inline="yes-display-inline">The term
			 <term>intelligence community</term> has the meaning given the term in section
			 3(4) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/401a">50 U.S.C. 401a(4)</external-xref>).</text>
				</paragraph><paragraph id="H1FB8F75710AD465F8A1F103AD8ADC5E2"><enum>(4)</enum><header>Shared
			 situational awareness</header><text>The term <term>shared situational
			 awareness</term> means an environment where cyber threat information is shared
			 in real time between all designated Federal cyber operations centers to provide
			 actionable information about all known cyber threats.</text>
				</paragraph></subsection></section><section id="HE6F4D008B97A4B648C10ACA36E289E7A"><enum>3.</enum><header>Cyber threat
			 intelligence and information sharing</header>
			<subsection id="HCC583EEAC3654DC49518053D3639B821"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Title XI of the
			 National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/442">50 U.S.C. 442 et seq.</external-xref>) is amended by
			 adding at the end the following new section:</text>
				<quoted-block display-inline="no-display-inline" id="HF0D1E94965E54AB9A14344B5641EB288" style="traditional">
					<section id="HD22475534EA249A6B9C7FAE6DD6FFA00"><enum>1104.</enum><header>Cyber threat intelligence and information
		  sharing</header><subsection commented="no" display-inline="yes-display-inline" id="H8CC58BC8C7804E759E22DA46A4AECCB3"><enum>(a)</enum><header>Intelligence community
				sharing of cyber threat intelligence with private sector and utilities</header>
							<paragraph id="H5B240912A6E340C8B402F5BAF15EF4A6"><enum>(1)</enum><header>In
				general</header><text display-inline="yes-display-inline">The Director of
				National Intelligence shall establish procedures to allow elements of the
				intelligence community to share cyber threat intelligence with private-sector
				entities and utilities and to encourage the sharing of such
				intelligence.</text>
							</paragraph><paragraph id="HEA742B0A9A984F168BD529487B76A0F4"><enum>(2)</enum><header>Sharing and use
				of classified intelligence</header><text>The procedures established under
				paragraph (1) shall provide that classified cyber threat intelligence may only
				be—</text>
								<subparagraph commented="no" id="HE012A5A404AF4046A70283CEE922FE72"><enum>(A)</enum><text display-inline="yes-display-inline">shared by an element of the intelligence
				community with—</text>
									<clause id="HB856FD8E195A43B0A742637E74B99892"><enum>(i)</enum><text>a
				certified entity; or</text>
									</clause><clause id="H33AF6CBBD3264B7281912801006EC33C"><enum>(ii)</enum><text>a
				person with an appropriate security clearance to receive such cyber threat
				intelligence;</text>
									</clause></subparagraph><subparagraph id="H4555BA51B2D04FD48CBB10FEBD9BF972"><enum>(B)</enum><text>shared consistent
				with the need to protect the national security of the United States;</text>
								</subparagraph><subparagraph id="H2D6EEC8AA5BE409A8BC6972E6C2ACE1B"><enum>(C)</enum><text display-inline="yes-display-inline">used by a certified entity in a manner
				which protects such cyber threat intelligence from unauthorized disclosure;
				and</text>
								</subparagraph><subparagraph id="HD2F39E75213F43ADB407697C49905231"><enum>(D)</enum><text>used, retained, or
				further disclosed by a certified entity for cybersecurity purposes.</text>
								</subparagraph></paragraph><paragraph commented="no" id="H6DDCD0F3BDF54A7DB2F2E0F5FBC4B1F6"><enum>(3)</enum><header>Security
				clearance approvals</header><text>The Director of National Intelligence shall
				issue guidelines providing that the head of an element of the intelligence
				community may, as the head of such element considers necessary to carry out
				this subsection—</text>
								<subparagraph id="H1F0203BE59214F7BA7E01526F83B0721"><enum>(A)</enum><text display-inline="yes-display-inline">grant a security clearance on a temporary
				or permanent basis to an employee, independent contractor, or officer of a
				certified entity;</text>
								</subparagraph><subparagraph id="H5D39A64FECEE49D4A49306FEEAF07310"><enum>(B)</enum><text>grant a security
				clearance on a temporary or permanent basis to a certified entity and approval
				to use appropriate facilities; and</text>
								</subparagraph><subparagraph id="H16D6C32776674278A7B92DBB2FDDC98F"><enum>(C)</enum><text>expedite the
				security clearance process for a person or entity as the head of such element
				considers necessary, consistent with the need to protect the national security
				of the United States.</text>
								</subparagraph></paragraph><paragraph id="H8C9F2378D1174F0193D6D5ABF07511E5"><enum>(4)</enum><header>No right or
				benefit</header><text display-inline="yes-display-inline">The provision of
				information to a private-sector entity or a utility under this subsection shall
				not create a right or benefit to similar information by such entity or such
				utility or any other private-sector entity or utility.</text>
							</paragraph><paragraph id="H25AB694C1E334765B5D5B33B59AFF1C0"><enum>(5)</enum><header>Restriction on
				disclosure of cyber threat intelligence</header><text display-inline="yes-display-inline">Notwithstanding any other provision of law,
				a certified entity receiving cyber threat intelligence pursuant to this
				subsection shall not further disclose such cyber threat intelligence to another
				entity, other than to a certified entity or other appropriate agency or
				department of the Federal Government authorized to receive such cyber threat
				intelligence.</text>
							</paragraph></subsection><subsection id="HEDACAF2A3AB749E89073C05F42ECD994"><enum>(b)</enum><header>Use of
				cybersecurity systems and sharing of cyber threat information</header>
							<paragraph id="H4433375E1CFC4C7EA2E41A06FD1AC829"><enum>(1)</enum><header>In
				general</header>
								<subparagraph commented="no" id="H066F8741E16242DA9F150F09FF49B328"><enum>(A)</enum><header>Cybersecurity
				providers</header><text>Notwithstanding any other provision of law, a
				cybersecurity provider, with the express consent of a protected entity for
				which such cybersecurity provider is providing goods or services for
				cybersecurity purposes, may, for cybersecurity purposes—</text>
									<clause commented="no" id="H50EFABA024B841C98BC33C43ADC939B0"><enum>(i)</enum><text display-inline="yes-display-inline">use cybersecurity systems to identify and
				obtain cyber threat information to protect the rights and property of such
				protected entity; and</text>
									</clause><clause commented="no" id="HF62BD76AB4174F118104F412697B86C2"><enum>(ii)</enum><text display-inline="yes-display-inline">share such cyber threat information with
				any other entity designated by such protected entity, including, if
				specifically designated, the entities of the Department of Homeland Security
				and the Department of Justice designated under paragraphs (1) and (2) of
				section 2(b) of the Cyber Intelligence Sharing and Protection Act.</text>
									</clause></subparagraph><subparagraph id="H0AB7F2C92EDF4C92AD9D72E4A1025A8D"><enum>(B)</enum><header>Self-protected
				entities</header><text>Notwithstanding any other provision of law, a
				self-protected entity may, for cybersecurity purposes—</text>
									<clause id="HFA79A61538384691887C76B15BAC3BC7"><enum>(i)</enum><text display-inline="yes-display-inline">use cybersecurity systems to identify and
				obtain cyber threat information to protect the rights and property of such
				self-protected entity; and</text>
									</clause><clause id="H75CD296AEC5B4C2B981DE5582B824FC4"><enum>(ii)</enum><text display-inline="yes-display-inline">share such cyber threat information with
				any other entity, including the entities of the Department of Homeland Security
				and the Department of Justice designated under paragraphs (1) and (2) of
				section 2(b) of the Cyber Intelligence Sharing and Protection Act.</text>
									</clause></subparagraph></paragraph><paragraph id="H25380A5CB64740199EE4998A61751679"><enum>(2)</enum><header>Use and
				protection of information</header><text>Cyber threat information shared in
				accordance with paragraph (1)—</text>
								<subparagraph id="HE393EE5BA36545F5B613350424AEE2F7"><enum>(A)</enum><text display-inline="yes-display-inline">shall only be shared in accordance with any
				restrictions placed on the sharing of such information by the protected entity
				or self-protected entity authorizing such sharing, including appropriate
				anonymization or minimization of such information and excluding limiting a
				department or agency of the Federal Government from sharing such information
				with another department or agency of the Federal Government in accordance with
				this section;</text>
								</subparagraph><subparagraph id="H2EDBE521973B4D778D46610A2E947935"><enum>(B)</enum><text>may not be used by
				an entity to gain an unfair competitive advantage to the detriment of the
				protected entity or the self-protected entity authorizing the sharing of
				information;</text>
								</subparagraph><subparagraph display-inline="no-display-inline" id="H4DD980D84A664B7896517D5733AE606A"><enum>(C)</enum><text display-inline="yes-display-inline">may only be used by a non-Federal recipient
				of such information for a cybersecurity purpose;</text>
								</subparagraph><subparagraph id="H74C0976D06E24ED59569CF17490F24EB"><enum>(D)</enum><text>if shared with the
				Federal Government—</text>
									<clause id="HA0656249DD3D4A93BD48E8199DABDF38"><enum>(i)</enum><text display-inline="yes-display-inline">shall be exempt from disclosure under
				section
				552 of title 5, United States Code (commonly known as the
				<quote>Freedom of Information Act</quote>);</text>
									</clause><clause commented="no" id="H576D52B17ABF42CF91EC4D808875C219"><enum>(ii)</enum><text>shall be
				considered proprietary information and shall not be disclosed to an entity
				outside of the Federal Government except as authorized by the entity sharing
				such information;</text>
									</clause><clause id="HB223E51C9F1A4837B91BA4CA611CCEEB"><enum>(iii)</enum><text>shall not be
				used by the Federal Government for regulatory purposes;</text>
									</clause><clause id="H8F981F35FECC435883EB57ED8D64D070"><enum>(iv)</enum><text display-inline="yes-display-inline">shall not be provided to another department
				or agency of the Federal Government under paragraph (2)(A) if—</text>
										<subclause id="H17BE5EC8F2094229B6E14A31DDFF88CE"><enum>(I)</enum><text display-inline="yes-display-inline">the entity providing such information
				determines that the provision of such information will undermine the purpose
				for which such information is shared; or</text>
										</subclause><subclause id="H5349FB3082AF49FE8456E888C88DF2DA"><enum>(II)</enum><text>unless otherwise
				directed by the President, the head of the department or agency of the Federal
				Government receiving such cyber threat information determines that the
				provision of such information will undermine the purpose for which such
				information is shared; and</text>
										</subclause></clause><clause id="H55C4F4CEAFDD40378826A3ED575D6A41"><enum>(v)</enum><text>shall be handled
				by the Federal Government consistent with the need to protect sources and
				methods and the national security of the United States; and</text>
									</clause></subparagraph><subparagraph display-inline="no-display-inline" id="H4E1D8E137A424EA6B2A986AA6931D416"><enum>(E)</enum><text display-inline="yes-display-inline">shall be exempt from disclosure under a law
				or regulation of a State, political subdivision of a State, or a tribe that
				requires public disclosure of information by a public or quasi-public
				entity.</text>
								</subparagraph></paragraph><paragraph id="H8E6049E8BDC94A56820E27174C360732"><enum>(3)</enum><header>Exemption from
				liability</header>
								<subparagraph id="HC38CC4CF7FC1431CB20AB32D2CCFC2E8"><enum>(A)</enum><header>Exemption</header><text>No
				civil or criminal cause of action shall lie or be maintained in Federal or
				State court against a protected entity, self-protected entity, cybersecurity
				provider, or an officer, employee, or agent of a protected entity,
				self-protected entity, or cybersecurity provider, acting in good faith—</text>
									<clause id="HE3CA512C7A1840638315148EA813C216"><enum>(i)</enum><text display-inline="yes-display-inline">for using cybersecurity systems to identify
				or obtain cyber threat information or for sharing such information in
				accordance with this section; or</text>
									</clause><clause id="H2654AB2290924C588A2F248F4F629086"><enum>(ii)</enum><text display-inline="yes-display-inline">for decisions made for cybersecurity
				purposes and based on cyber threat information identified, obtained, or shared
				under this section.</text>
									</clause></subparagraph><subparagraph display-inline="no-display-inline" id="HB2A749F566354164A0F5D85825B04BEA"><enum>(B)</enum><header>Lack of good
				faith</header><text display-inline="yes-display-inline">For purposes of the
				exemption from liability under subparagraph (A), a lack of good faith includes
				any act or omission taken with intent to injure, defraud, or otherwise endanger
				any individual, government entity, private entity, or utility.</text>
								</subparagraph></paragraph><paragraph commented="no" id="H7A92B73178A842C69310952015B24311"><enum>(4)</enum><header>Relationship to
				other laws requiring the disclosure of information</header><text>The submission
				of information under this subsection to the Federal Government shall not
				satisfy or affect—</text>
								<subparagraph id="H38DE6F1ED5B14CEE88BAF4507AB0FCA0"><enum>(A)</enum><text display-inline="yes-display-inline">any requirement under any other provision
				of law for a person or entity to provide information to the Federal Government;
				or</text>
								</subparagraph><subparagraph id="H18ECD26F682D43A19134519DE60BE849"><enum>(B)</enum><text display-inline="yes-display-inline">the applicability of other provisions of
				law, including section
				552 of title 5, United States Code (commonly known as the
				<quote>Freedom of Information Act</quote>), with respect to information
				required to be provided to the Federal Government under such other provision of
				law.</text>
								</subparagraph></paragraph><paragraph id="H6614820EACDE4ECABD1156624DA0851A"><enum>(5)</enum><header>Rule of
				construction</header><text display-inline="yes-display-inline">Nothing in this
				subsection shall be construed to provide new authority to—</text>
								<subparagraph id="H418CC46618D64DC597CFCEA269286AB3"><enum>(A)</enum><text>a cybersecurity
				provider to use a cybersecurity system to identify or obtain cyber threat
				information from a system or network other than a system or network owned or
				operated by a protected entity for which such cybersecurity provider is
				providing goods or services for cybersecurity purposes; or</text>
								</subparagraph><subparagraph id="H7426B5BCDB8843EEAEC1306745EE994F"><enum>(B)</enum><text display-inline="yes-display-inline">a self-protected entity to use a
				cybersecurity system to identify or obtain cyber threat information from a
				system or network other than a system or network owned or operated by such
				self-protected entity.</text>
								</subparagraph></paragraph></subsection><subsection id="H0D1A4AE1908546B7B0D1C2F21D632ECF"><enum>(c)</enum><header>Federal
				Government use of information</header>
							<paragraph id="H29012A8D5BEC41B08C7C26D1B17EC4C4"><enum>(1)</enum><header>Limitation</header><text display-inline="yes-display-inline">The Federal Government may use cyber threat
				information shared with the Federal Government in accordance with subsection
				(b)—</text>
								<subparagraph id="HA2517A82F36849AB834134FF37DC1BBD"><enum>(A)</enum><text>for cybersecurity
				purposes;</text>
								</subparagraph><subparagraph id="H0A671D46C1EA4FC0A42166F1F625DB03"><enum>(B)</enum><text>for the
				investigation and prosecution of cybersecurity crimes;</text>
								</subparagraph><subparagraph id="H84D831076E4C413AA472C05F228AC4F2"><enum>(C)</enum><text>for the protection
				of individuals from the danger of death or serious bodily harm and the
				investigation and prosecution of crimes involving such danger of death or
				serious bodily harm; or</text>
								</subparagraph><subparagraph id="HCBD7EF6BB6334F93B7F91DE9CE7F756B"><enum>(D)</enum><text display-inline="yes-display-inline">for the protection of minors from child
				pornography, any risk of sexual exploitation, and serious threats to the
				physical safety of minors, including kidnapping and trafficking and the
				investigation and prosecution of crimes involving child pornography, any risk
				of sexual exploitation, and serious threats to the physical safety of minors,
				including kidnapping and trafficking, and any crime referred to in
				section
				2258A(a)(2) of title 18, United States Code.</text>
								</subparagraph></paragraph><paragraph id="H6D02B171ED5D46269CFDF33741A22056"><enum>(2)</enum><header>Affirmative
				search restriction</header><text>The Federal Government may not affirmatively
				search cyber threat information shared with the Federal Government under
				subsection (b) for a purpose other than a purpose referred to in paragraph
				(1).</text>
							</paragraph><paragraph id="H4F3C6DDAD2BF49F39067385FD5358F0E"><enum>(3)</enum><header>Anti-tasking
				restriction</header><text>Nothing in this section shall be construed to permit
				the Federal Government to—</text>
								<subparagraph id="HBE337D960D0D4706B58BC31877B8DC1F"><enum>(A)</enum><text>require a
				private-sector entity or utility to share information with the Federal
				Government; or</text>
								</subparagraph><subparagraph id="H2AA8E551A9234ADDBD6EE596B2423754"><enum>(B)</enum><text>condition the
				sharing of cyber threat intelligence with a private-sector entity or utility on
				the provision of cyber threat information to the Federal Government.</text>
								</subparagraph></paragraph><paragraph commented="no" id="H266CFC78468F4D0DAEFEAFBD248C3036"><enum>(4)</enum><header>Protection of
				sensitive personal documents</header><text display-inline="yes-display-inline">The Federal Government may not use the
				following information, containing information that identifies a person, shared
				with the Federal Government in accordance with subsection (b):</text>
								<subparagraph commented="no" id="H27C453ECAAD44C49B2952C89726330B3"><enum>(A)</enum><text>Library
				circulation records.</text>
								</subparagraph><subparagraph commented="no" id="H1EE5127C72124B27924D04F32D5094D2"><enum>(B)</enum><text>Library patron
				lists.</text>
								</subparagraph><subparagraph commented="no" id="HF3A10E0445034953A3DA20CFE1ED9368"><enum>(C)</enum><text>Book sales
				records.</text>
								</subparagraph><subparagraph commented="no" id="H78C49E3BBAF0438B8179BB437B569BA5"><enum>(D)</enum><text>Book customer
				lists.</text>
								</subparagraph><subparagraph commented="no" id="H1D679CFD7B744CF697BD1C7A02C10CA5"><enum>(E)</enum><text>Firearms sales
				records.</text>
								</subparagraph><subparagraph commented="no" id="HC931EB919E494A5BB88517941B65F815"><enum>(F)</enum><text>Tax return
				records.</text>
								</subparagraph><subparagraph commented="no" id="H50C9B197397D49138B4BCB34A99B7FA7"><enum>(G)</enum><text>Educational
				records.</text>
								</subparagraph><subparagraph commented="no" id="H914D9192C7864D3EB4241430836B43BA"><enum>(H)</enum><text>Medical
				records.</text>
								</subparagraph></paragraph><paragraph id="H34DD964333A342A083AE208721237871"><enum>(5)</enum><header>Notification of
				non-cyber threat information</header><text display-inline="yes-display-inline">If a department or agency of the Federal
				Government receiving information pursuant to subsection (b)(1) determines that
				such information is not cyber threat information, such department or agency
				shall notify the entity or provider sharing such information pursuant to
				subsection (b)(1).</text>
							</paragraph><paragraph id="HCED4C0B544E74674911BC7C3A480BA2E"><enum>(6)</enum><header>Retention and
				use of cyber threat information</header><text display-inline="yes-display-inline">No department or agency of the Federal
				Government shall retain or use information shared pursuant to subsection (b)(1)
				for any use other than a use permitted under subsection (c)(1).</text>
							</paragraph></subsection><subsection display-inline="no-display-inline" id="HD00CC66D864044E2A4AF66B035BDCB7B"><enum>(d)</enum><header>Federal
				Government liability for violations of restrictions on the disclosure, use, and
				protection of voluntarily shared information</header>
							<paragraph id="H6AE0CDF7E61E48AD87B13DE9751820A7"><enum>(1)</enum><header>In
				general</header><text>If a department or agency of the Federal Government
				intentionally or willfully violates subsection (b)(3)(D) or subsection (c) with
				respect to the disclosure, use, or protection of voluntarily shared cyber
				threat information shared under this section, the United States shall be liable
				to a person adversely affected by such violation in an amount equal to the sum
				of—</text>
								<subparagraph id="H201F10AB647D42169166E1EA5A795D49"><enum>(A)</enum><text>the actual damages
				sustained by the person as a result of the violation or $1,000, whichever is
				greater; and</text>
								</subparagraph><subparagraph id="HCB1E5AB3CDC342518E3E7CA0D0902D2D"><enum>(B)</enum><text>the costs of the
				action together with reasonable attorney fees as determined by the
				court.</text>
								</subparagraph></paragraph><paragraph id="H1D2E3E4A1A93417E9B386A1B797F635D"><enum>(2)</enum><header>Venue</header><text>An
				action to enforce liability created under this subsection may be brought in the
				district court of the United States in—</text>
								<subparagraph id="H3DE4E959CF2044A690A59F0F97A44094"><enum>(A)</enum><text>the district in
				which the complainant resides;</text>
								</subparagraph><subparagraph id="H1D5131CD2304497BA81049930A115C9C"><enum>(B)</enum><text>the district in
				which the principal place of business of the complainant is located;</text>
								</subparagraph><subparagraph id="H47C622F4919E47309ED28146985DC365"><enum>(C)</enum><text>the district in
				which the department or agency of the Federal Government that disclosed the
				information is located; or</text>
								</subparagraph><subparagraph id="HF701617F42194DFA8FE7B90D68C79008"><enum>(D)</enum><text>the District of
				Columbia.</text>
								</subparagraph></paragraph><paragraph id="HA42019ED817544589CE453A5C2432EBB"><enum>(3)</enum><header>Statute of
				limitations</header><text display-inline="yes-display-inline">No action shall
				lie under this subsection unless such action is commenced not later than two
				years after the date of the violation of subsection (b)(3)(D) or subsection (c)
				that is the basis for the action.</text>
							</paragraph><paragraph id="H6B24E386069A44EEAE7CD328C0EB1DE9"><enum>(4)</enum><header>Exclusive cause
				of action</header><text display-inline="yes-display-inline">A cause of action
				under this subsection shall be the exclusive means available to a complainant
				seeking a remedy for a violation of subsection (b)(3)(D) or subsection
				(c).</text>
							</paragraph></subsection><subsection id="H12D2405605DC44F7B16E7938232ABEDF"><enum>(e)</enum><header>Federal
				preemption</header><text>This section supersedes any statute of a State or
				political subdivision of a State that restricts or otherwise expressly
				regulates an activity authorized under subsection (b).</text>
						</subsection><subsection id="H59F8D836D3364AC6818496B9DCFF8A12"><enum>(f)</enum><header>Savings
				clauses</header>
							<paragraph id="H862DA7F7288B4FEFA72C0EA4980B3C39"><enum>(1)</enum><header>Existing
				authorities</header><text>Nothing in this section shall be construed to limit
				any other authority to use a cybersecurity system or to identify, obtain, or
				share cyber threat intelligence or cyber threat information.</text>
							</paragraph><paragraph id="H555B780321544E8FA246D193DADF54D8"><enum>(2)</enum><header>Limitation on
				military and intelligence community involvement in private and public sector
				cybersecurity efforts</header><text display-inline="yes-display-inline">Nothing
				in this section shall be construed to provide additional authority to, or
				modify an existing authority of, the Department of Defense or the National
				Security Agency or any other element of the intelligence community to control,
				modify, require, or otherwise direct the cybersecurity efforts of a
				private-sector entity or a component of the Federal Government or a State,
				local, or tribal government.</text>
							</paragraph><paragraph id="HF438E3187A6D4D9D87EF6C6C963112C2"><enum>(3)</enum><header>Information
				sharing relationships</header><text>Nothing in this section shall be construed
				to—</text>
								<subparagraph id="HB7E3EE954EF849349B84291A84903DCD"><enum>(A)</enum><text>limit or modify an
				existing information sharing relationship;</text>
								</subparagraph><subparagraph id="H36CE2F9CF29B4B1A9291D4A4768F8B26"><enum>(B)</enum><text>prohibit a new
				information sharing relationship;</text>
								</subparagraph><subparagraph id="HB948ADA107034C3C91630F07367C1C90"><enum>(C)</enum><text>require a new
				information sharing relationship between the Federal Government and a
				private-sector entity or utility;</text>
								</subparagraph><subparagraph id="H36A054101B2245ADB206E497AEFCE148"><enum>(D)</enum><text>modify the
				authority of a department or agency of the Federal Government to protect
				sources and methods and the national security of the United States; or</text>
								</subparagraph><subparagraph id="H222B4101872040BE9EF2D18423EDBEB1"><enum>(E)</enum><text display-inline="yes-display-inline">preclude the Federal Government from
				requiring an entity to report significant cyber incidents if authorized or
				required to do so under another provision of law.</text>
								</subparagraph></paragraph><paragraph id="H5863E16F0C8C43A4B48A421E7F77917E"><enum>(4)</enum><header>Limitation on
				Federal Government use of cybersecurity systems</header><text display-inline="yes-display-inline">Nothing in this section shall be construed
				to provide additional authority to, or modify an existing authority of, any
				entity to use a cybersecurity system owned or controlled by the Federal
				Government on a private-sector system or network to protect such private-sector
				system or network.</text>
							</paragraph><paragraph commented="no" id="HC3AF0577DC8E413C8D7E7083BA59806E"><enum>(5)</enum><header>No liability for
				non-participation</header><text display-inline="yes-display-inline">Nothing in
				this section shall be construed to subject a protected entity, self-protected
				entity, cyber security provider, or an officer, employee, or agent of a
				protected entity, self-protected entity, or cybersecurity provider, to
				liability for choosing not to engage in the voluntary activities authorized
				under this section.</text>
							</paragraph><paragraph id="H15FE17760EB34483AE9EAFA37066BF30"><enum>(6)</enum><header>Use and
				retention of information</header><text display-inline="yes-display-inline">Nothing in this section shall be construed
				to authorize, or to modify any existing authority of, a department or agency of
				the Federal Government to retain or use information shared pursuant to
				subsection (b)(1) for any use other than a use permitted under subsection
				(c)(1).</text>
							</paragraph><paragraph id="HA33DB4F9205D4DFEB7DF0D38A0F6388C"><enum>(7)</enum><header>Limitation on
				surveillance</header><text display-inline="yes-display-inline">Nothing in this
				section shall be construed to authorize the Department of Defense or the
				National Security Agency or any other element of the intelligence community to
				target a United States person for surveillance.</text>
							</paragraph></subsection><subsection id="H49AFD10947FB44FA8CDAB85E942CB4C5"><enum>(g)</enum><header>Definitions</header><text>In
				this section:</text>
							<paragraph id="H80874F6A04F24102AA34985F2E691B56"><enum>(1)</enum><header>Availability</header><text display-inline="yes-display-inline">The term <quote>availability</quote> means
				ensuring timely and reliable access to and use of information.</text>
							</paragraph><paragraph id="H44ABD42494074BE6BFC55BC47659A5E8"><enum>(2)</enum><header>Certified
				entity</header><text>The term <term>certified entity</term> means a protected
				entity, self-protected entity, or cybersecurity provider that—</text>
								<subparagraph commented="no" id="H91BAF027E208413B854788ECF762E017"><enum>(A)</enum><text>possesses or is
				eligible to obtain a security clearance, as determined by the Director of
				National Intelligence; and</text>
								</subparagraph><subparagraph id="HA8F0CCFF185A4E3C9E99B175F0251EE3"><enum>(B)</enum><text>is able to
				demonstrate to the Director of National Intelligence that such provider or such
				entity can appropriately protect classified cyber threat intelligence.</text>
								</subparagraph></paragraph><paragraph id="H2AF57EDC54C1423D9304A2616F0E32DE"><enum>(3)</enum><header>Confidentiality</header><text display-inline="yes-display-inline">The term <quote>confidentiality</quote>
				means preserving authorized restrictions on access and disclosure, including
				means for protecting personal privacy and proprietary information.</text>
							</paragraph><paragraph id="H15D0D109EF06474F9E381F29F315B278"><enum>(4)</enum><header>Cyber threat
				information</header>
								<subparagraph id="HAFA4410406644EEA82957EDBC3727927"><enum>(A)</enum><header>In
				General</header><text>The term <quote>cyber threat information</quote> means
				information directly pertaining to—</text>
									<clause id="H2AA2EC325BEF4F35923A67E1E0BC9C18"><enum>(i)</enum><text>a
				vulnerability of a system or network of a government or private entity or
				utility;</text>
									</clause><clause id="HE6DC8933C102446594D8A4D89ADD8939"><enum>(ii)</enum><text display-inline="yes-display-inline">a threat to the integrity, confidentiality,
				or availability of a system or network of a government or private entity or
				utility or any information stored on, processed on, or transiting such a system
				or network;</text>
									</clause><clause id="H4C33FFDEFF1147129D874E221ABEF29D"><enum>(iii)</enum><text display-inline="yes-display-inline">efforts to deny access to or degrade,
				disrupt, or destroy a system or network of a government or private entity or
				utility; or</text>
									</clause><clause id="H9E5E40D45BD14A8C9303BE485483F941"><enum>(iv)</enum><text display-inline="yes-display-inline">efforts to gain unauthorized access to a
				system or network of a government or private entity or utility, including to
				gain such unauthorized access for the purpose of exfiltrating information
				stored on, processed on, or transiting a system or network of a government or
				private entity or utility.</text>
									</clause></subparagraph><subparagraph id="H17B6B3E8F6FF45C39975748FBBAFE660"><enum>(B)</enum><header>Exclusion</header><text>Such
				term does not include information pertaining to efforts to gain unauthorized
				access to a system or network of a government or private entity or utility that
				solely involve violations of consumer terms of service or consumer licensing
				agreements and do not otherwise constitute unauthorized access.</text>
								</subparagraph></paragraph><paragraph id="H07E4431F53A64700BB4AF7368E31F3E8"><enum>(5)</enum><header>Cyber threat
				intelligence</header>
								<subparagraph id="H6B1E3AF53B6F40568DE14A8862532284"><enum>(A)</enum><header>In
				general</header><text>The term <quote>cyber threat intelligence</quote> means
				intelligence in the possession of an element of the intelligence community
				directly pertaining to—</text>
									<clause id="H071740720E7D46408EF7052621421A7D"><enum>(i)</enum><text>a
				vulnerability of a system or network of a government or private entity or
				utility;</text>
									</clause><clause id="HB326237E4D8344889B0E7956F3CB16E2"><enum>(ii)</enum><text display-inline="yes-display-inline">a threat to the integrity, confidentiality,
				or availability of a system or network of a government or private entity or
				utility or any information stored on, processed on, or transiting such a system
				or network;</text>
									</clause><clause id="H322D26991E664FC98438E4FD76788C6D"><enum>(iii)</enum><text display-inline="yes-display-inline">efforts to deny access to or degrade,
				disrupt, or destroy a system or network of a government or private entity or
				utility; or</text>
									</clause><clause id="HA70C31E6E425464F921A94FB15428AA5"><enum>(iv)</enum><text display-inline="yes-display-inline">efforts to gain unauthorized access to a
				system or network of a government or private entity or utility, including to
				gain such unauthorized access for the purpose of exfiltrating information
				stored on, processed on, or transiting a system or network of a government or
				private entity or utility.</text>
									</clause></subparagraph><subparagraph display-inline="no-display-inline" id="HA354FFBDCE724E608F7BB73F7F6A2F93"><enum>(B)</enum><header>Exclusion</header><text>Such
				term does not include intelligence pertaining to efforts to gain unauthorized
				access to a system or network of a government or private entity or utility that
				solely involve violations of consumer terms of service or consumer licensing
				agreements and do not otherwise constitute unauthorized access.</text>
								</subparagraph></paragraph><paragraph id="H4522DCFD786740F48E7768C69E19296E"><enum>(6)</enum><header>Cybersecurity
				crime</header><text display-inline="yes-display-inline">The term
				<quote>cybersecurity crime</quote> means—</text>
								<subparagraph id="HAB7945B1A2594ABF8A8ED9491AEADB87"><enum>(A)</enum><text>a crime under a
				Federal or State law that involves—</text>
									<clause id="H65DE3F30080244CCBADAB50BF779967F"><enum>(i)</enum><text>efforts to deny
				access to or degrade, disrupt, or destroy a system or network;</text>
									</clause><clause id="H884516E768374BB283407747027664AA"><enum>(ii)</enum><text>efforts to gain
				unauthorized access to a system or network; or</text>
									</clause><clause id="HAF68325EF96E4E02A900E1D8B18CAF7E"><enum>(iii)</enum><text>efforts to
				exfiltrate information from a system or network without authorization;
				or</text>
									</clause></subparagraph><subparagraph id="H1691A04784EF44C9BFAD3D7FD9121893"><enum>(B)</enum><text>the violation of a
				provision of Federal law relating to computer crimes, including a violation of
				any provision of title 18, United States Code, created or amended by the
				Computer Fraud and Abuse Act of 1986 (<external-xref legal-doc="public-law" parsable-cite="pl/99/474">Public Law 99–474</external-xref>).</text>
								</subparagraph></paragraph><paragraph id="H83BF8F68649D4A138A9914329E423EC2"><enum>(7)</enum><header>Cybersecurity
				provider</header><text>The term <term>cybersecurity provider</term> means a
				non-Federal entity that provides goods or services intended to be used for
				cybersecurity purposes.</text>
							</paragraph><paragraph id="HD0A6AEC6DB4247ACAFD9AB9485A00BA2"><enum>(8)</enum><header>Cybersecurity
				purpose</header>
								<subparagraph id="HB760CBE8614543098A59F1667362CF62"><enum>(A)</enum><header>In
				general</header><text display-inline="yes-display-inline">The term
				<quote>cybersecurity purpose</quote> means the purpose of ensuring the
				integrity, confidentiality, or availability of, or safeguarding, a system or
				network, including protecting a system or network from—</text>
									<clause id="HC7BFCA4CBA9F4D46AA1818C0BCE1FD88"><enum>(i)</enum><text>a
				vulnerability of a system or network;</text>
									</clause><clause id="H56FE361E691042A4968209ABC51FC604"><enum>(ii)</enum><text display-inline="yes-display-inline">a threat to the integrity, confidentiality,
				or availability of a system or network or any information stored on, processed
				on, or transiting such a system or network;</text>
									</clause><clause id="H1AEFCBFA06AF4AE09AAA7A572E26CB5B"><enum>(iii)</enum><text display-inline="yes-display-inline">efforts to deny access to or degrade,
				disrupt, or destroy a system or network; or</text>
									</clause><clause id="HC91D5A68F631474F92FD67FBE1419960"><enum>(iv)</enum><text display-inline="yes-display-inline">efforts to gain unauthorized access to a
				system or network, including to gain such unauthorized access for the purpose
				of exfiltrating information stored on, processed on, or transiting a system or
				network.</text>
									</clause></subparagraph><subparagraph id="HFBE9DB6C99B44D6580757758B60EF079"><enum>(B)</enum><header>Exclusion</header><text>Such
				term does not include the purpose of protecting a system or network from
				efforts to gain unauthorized access to such system or network that solely
				involve violations of consumer terms of service or consumer licensing
				agreements and do not otherwise constitute unauthorized access.</text>
								</subparagraph></paragraph><paragraph display-inline="no-display-inline" id="H3A26A7BF02D84922A39B565D40204F81"><enum>(9)</enum><header>Cybersecurity
				system</header>
								<subparagraph id="H30D951EFE6EC4009A686F4BAD049721A"><enum>(A)</enum><header>In
				general</header><text display-inline="yes-display-inline">The term
				<quote>cybersecurity system</quote> means a system designed or employed to
				ensure the integrity, confidentiality, or availability of, or safeguard, a
				system or network, including protecting a system or network from—</text>
									<clause id="HF19BF9F0F392474D88B4EB074CCA4829"><enum>(i)</enum><text>a
				vulnerability of a system or network;</text>
									</clause><clause id="HA0EF612125514D84BC64066F09ED02E7"><enum>(ii)</enum><text display-inline="yes-display-inline">a threat to the integrity, confidentiality,
				or availability of a system or network or any information stored on, processed
				on, or transiting such a system or network;</text>
									</clause><clause id="HCFECF09DE69441189EB0C8911812B34B"><enum>(iii)</enum><text display-inline="yes-display-inline">efforts to deny access to or degrade,
				disrupt, or destroy a system or network; or</text>
									</clause><clause id="H4FF1CA0EBEA64B6FAE2F36A43E1D344B"><enum>(iv)</enum><text display-inline="yes-display-inline">efforts to gain unauthorized access to a
				system or network, including to gain such unauthorized access for the purpose
				of exfiltrating information stored on, processed on, or transiting a system or
				network.</text>
									</clause></subparagraph><subparagraph id="HC21D4EBF18BD49E49C385F3C490D512F"><enum>(B)</enum><header>Exclusion</header><text>Such
				term does not include a system designed or employed to protect a system or
				network from efforts to gain unauthorized access to such system or network that
				solely involve violations of consumer terms of service or consumer licensing
				agreements and do not otherwise constitute unauthorized access.</text>
								</subparagraph></paragraph><paragraph id="H395E43C1291E42AA9C14839BD6DC06A6"><enum>(10)</enum><header>Integrity</header><text display-inline="yes-display-inline">The term <quote>integrity</quote> means
				guarding against improper information modification or destruction, including
				ensuring information nonrepudiation and authenticity.</text>
							</paragraph><paragraph id="H9FC42B3BF9C14B19AE62B0E5FBAC9130"><enum>(11)</enum><header>Protected
				entity</header><text>The term <term>protected entity</term> means an entity,
				other than an individual, that contracts with a cybersecurity provider for
				goods or services to be used for cybersecurity purposes.</text>
							</paragraph><paragraph commented="no" id="HCCE3F637AD4141649EDD8ECB660234BA"><enum>(12)</enum><header>Self-protected
				entity</header><text>The term <term>self-protected entity</term> means an
				entity, other than an individual, that provides goods or services for
				cybersecurity purposes to itself.</text>
							</paragraph><paragraph display-inline="no-display-inline" id="H282CCB460FBB44DFAD28D1ADB7174510"><enum>(13)</enum><header>Utility</header><text display-inline="yes-display-inline">The term <term>utility</term> means an
				entity providing essential services (other than law enforcement or regulatory
				services), including electricity, natural gas, propane, telecommunications,
				transportation, water, or wastewater
				services.</text>
							</paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
			</subsection><subsection id="H2F422FAC668D43F3BE6BD2087C1085B5"><enum>(b)</enum><header>Procedures and
			 guidelines</header><text>The Director of National Intelligence shall—</text>
				<paragraph id="H78E7DD6E10A44016BB8EF793F50683D0"><enum>(1)</enum><text display-inline="yes-display-inline">not later than 60 days after the date of
			 the enactment of this Act, establish procedures under paragraph (1) of section
			 1104(a) of the National Security Act of 1947, as added by subsection (a) of
			 this section, and issue guidelines under paragraph (3) of such section
			 1104(a);</text>
				</paragraph><paragraph display-inline="no-display-inline" id="HD65902DB916146818C7E219C66C6D62F"><enum>(2)</enum><text display-inline="yes-display-inline">in establishing such procedures and issuing
			 such guidelines, consult with the Secretary of Homeland Security to ensure that
			 such procedures and such guidelines permit the owners and operators of critical
			 infrastructure to receive all appropriate cyber threat intelligence (as defined
			 in section 1104(h)(5) of such Act, as added by subsection (a)) in the
			 possession of the Federal Government; and</text>
				</paragraph><paragraph commented="no" id="HDF2F49EF9A534870AA63F74AC199CA9D"><enum>(3)</enum><text>following the
			 establishment of such procedures and the issuance of such guidelines,
			 expeditiously distribute such procedures and such guidelines to appropriate
			 departments and agencies of the Federal Government, private-sector entities,
			 and utilities (as defined in section 1104(h)(13) of such Act, as added by
			 subsection (a)).</text>
				</paragraph></subsection><subsection display-inline="no-display-inline" id="H946EB779531F47CB9CE8BFA2F98210AF"><enum>(c)</enum><header>Privacy and
			 civil liberties policies and procedures</header><text>Not later than 60 days
			 after the date of the enactment of this Act, the Director of National
			 Intelligence, in consultation with the Secretary of Homeland Security and the
			 Attorney General, shall establish the policies and procedures required under
			 section 1104(c)(7)(A) of the National Security Act of 1947, as added by
			 subsection (a) of this section.</text>
			</subsection><subsection id="HF18B4969451F4509AB08912E659A7611"><enum>(d)</enum><header>Initial
			 reports</header><text>The first reports required to be submitted under
			 paragraphs (1) and (2) of subsection (e) of section 1104 of the National
			 Security Act of 1947, as added by subsection (a) of this section, shall be
			 submitted not later than 1 year after the date of the enactment of this
			 Act.</text>
			</subsection><subsection id="HF31CA3CDD9494244BBFE73DD6775BE67"><enum>(e)</enum><header>Table of
			 contents amendment</header><text display-inline="yes-display-inline">The table
			 of contents in the first section of the National Security Act of 1947 is
			 amended by adding at the end the following new item:</text>
				<quoted-block display-inline="no-display-inline" id="HDFA64518D96E4159A31B4673952ED08A" style="traditional">
					<toc regeneration="no-regeneration">
						<toc-entry level="section">Sec. 1104. Cyber threat intelligence and
				information
				sharing.</toc-entry>
					</toc>
					<after-quoted-block>.</after-quoted-block></quoted-block>
			</subsection></section><section commented="no" id="HB90BB9399081480C9E52BF6538B7B8FC"><enum>4.</enum><header>Sunset</header><text display-inline="no-display-inline">Effective on the date that is 5 years after
			 the date of the enactment of this Act—</text>
			<paragraph commented="no" id="H6DE80DA341B240E0A568D845BED74817"><enum>(1)</enum><text>section 1104 of
			 the National Security Act of 1947, as added by section 2(a) of this Act, is
			 repealed; and</text>
			</paragraph><paragraph commented="no" id="HE7B60947393043B3BD88680288AFB20C"><enum>(2)</enum><text>the table of
			 contents in the first section of the National Security Act of 1947, as amended
			 by section 2(d) of this Act, is amended by striking the item relating to
			 section 1104, as added by such section 2(d).</text>
			</paragraph></section><section id="H2C26CEDC277449959760E55C6ACB887C"><enum>5.</enum><header>Sense of Congress
			 on international cooperation</header><text display-inline="no-display-inline">It is the sense of Congress that
			 international cooperation with regard to cybersecurity should be encouraged
			 wherever possible under this Act and the amendments made by this Act.</text>
		</section><section id="H4ED77409F55049F08F6AEC200DAC65F6"><enum>6.</enum><header>Rule of
			 construction relating to consumer data</header><text display-inline="no-display-inline">Nothing in this Act or the amendments made
			 by this Act shall be construed to provide new or alter any existing authority
			 for an entity to sell personal information of a consumer to another entity for
			 marketing purposes.</text>
		</section><section id="HD09557CF76374B62BA022DFA91E8E6C3"><enum>7.</enum><header>Savings clause
			 with regard to cybersecurity provider obligation to report cyber threat
			 incident information to Federal Government</header><text display-inline="no-display-inline">Nothing in this Act or the amendments made
			 by this Act shall be construed to provide authority to a department or agency
			 of the Federal Government to require a cybersecurity provider that has
			 contracted with the Federal Government to provide information services to
			 provide information about cybersecurity incidents that do not pose a threat to
			 the Federal Government’s information.</text>
		</section></legis-body>
	<attestation>
		<attestation-group>
			<attestation-date chamber="House" date="20130418">Passed the House of
			 Representatives April 18, 2013.</attestation-date>
			<attestor display="yes">Karen L. Haas,</attestor>
			<role>Clerk</role>
		</attestation-group>
	</attestation>
</bill>


