<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Engrossed-in-Senate" bill-type="olc" dms-id="A1" public-print="no" public-private="public" stage-count="1" star-print="no-star-print"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>113 S2519 ES: National Cybersecurity Protection Act of 2014</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date></dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form display="yes">
<congress display="yes">113th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">S. 2519</legis-num><current-chamber display="no">IN THE SENATE OF THE UNITED STATES</current-chamber><legis-type display="yes">AN ACT</legis-type><official-title display="yes">To codify an existing operations center for cybersecurity.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause" style="OLC"><section commented="no" display-inline="no-display-inline" id="id20da8ed108a1413d8fe92b4eb8a821cb" section-type="section-one"><enum>1.</enum><header display-inline="yes-display-inline">Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>National Cybersecurity Protection Act of 2014</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="id07BCA9BC4E6C4AB7B2691C247AC43537" section-type="subsequent-section"><enum>2.</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="no-display-inline">In this Act—</text><paragraph commented="no" display-inline="no-display-inline" id="idf58f1df6e3a04201baf5c99a09432376"><enum>(1)</enum><text display-inline="yes-display-inline">the term <term>Center</term> means the national cybersecurity and communications integration center  under
			 section 226  of the Homeland Security Act of 2002, as added by section 3;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id354B942E2F6E47439A48A183CAA21CA5"><enum>(2)</enum><text display-inline="yes-display-inline">the term <term>critical infrastructure</term> has the meaning given that term
			 in section 2 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101</external-xref>);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idF0C178B027344320B54044BC925B8212"><enum>(3)</enum><text display-inline="yes-display-inline">the term <term>cybersecurity risk</term> has the meaning given that term in section 226 of the Homeland Security Act of 2002, as added by
			 section 3;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7403C73DD56F44C48EDFAF753E17C25D"><enum>(4)</enum><text display-inline="yes-display-inline">the term <term>information sharing and analysis organization</term> has the meaning given that term in section
			 212(5) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/131">6 U.S.C. 131(5)</external-xref>);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id98E9B5BCB3FD45B9A370CFEBCDB064F0"><enum>(5)</enum><text display-inline="yes-display-inline">the term <term>information system</term> has the meaning given that term in <external-xref legal-doc="usc" parsable-cite="usc/44/3502">section 3502(8)</external-xref> of title 44, United States Code; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9C92769EBA514ECDB85C680F6040DED1"><enum>(6)</enum><text display-inline="yes-display-inline">the term <term>Secretary</term> means the Secretary of Homeland Security.</text></paragraph></section><section commented="no" display-inline="no-display-inline" id="id0BB59AA55B7D4323888E050B7E953DF7" section-type="subsequent-section"><enum>3.</enum><header display-inline="yes-display-inline">National cybersecurity and communications integration center</header><subsection commented="no" display-inline="no-display-inline" id="idfb11a2f61197414a84ffe36bbf36f320"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/141">6 U.S.C. 141 et seq.</external-xref>) is amended by
			 adding at the end the following:</text><quoted-block display-inline="no-display-inline" id="id3502EE6307FA46358B872BEAA22F9A4E" style="OLC"><section commented="no" display-inline="no-display-inline" id="id4A7A63F2E75741809067C213CA7698E2" section-type="subsequent-section"><enum>226.</enum><header display-inline="yes-display-inline">National cybersecurity and communications integration center</header><subsection commented="no" display-inline="no-display-inline" id="id44084afcafd6472abd509f238fe26f5a"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="yes-display-inline">In this section—</text><paragraph commented="no" display-inline="no-display-inline" id="id8ce16e4f6378481e8250110f6a3d503d"><enum>(1)</enum><text display-inline="yes-display-inline">the term <term>cybersecurity risk</term> means threats to and vulnerabilities of information or information systems and any related
			 consequences caused by or
			 resulting from unauthorized access, use, disclosure, degradation,
			 disruption, modification, or destruction of information or information
			 systems, including such related consequences caused by an act of
			 terrorism;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id1be7e39e61824c979ba74de08fc46fde"><enum>(2)</enum><text display-inline="yes-display-inline">the term <term>incident</term> means an occurrence that—</text><subparagraph commented="no" display-inline="no-display-inline" id="id894aa36745e140e0abfefcaf619ab45c"><enum>(A)</enum><text display-inline="yes-display-inline">actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or
			 availability of information on an information system; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5be6d311ea9e45f8a26ef4a252f86046"><enum>(B)</enum><text display-inline="yes-display-inline">constitutes a violation or imminent threat of violation of law, security policies, security
			 procedures, or acceptable use policies;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4cd6bfeb1d4147a58d3e5964dce1f65a"><enum>(3)</enum><text display-inline="yes-display-inline">the term <term>information sharing and analysis organization</term> has the meaning given that term in section
			 212(5);   and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id600225ef13b9497a808149f25fcfa465"><enum>(4)</enum><text display-inline="yes-display-inline">the term <term>information system</term> has the meaning given that term in <external-xref legal-doc="usc" parsable-cite="usc/44/3502">section 3502(8)</external-xref> of title 44, United States Code.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ida44eb91bbd58436fb637b41c3ae459e7"><enum>(b)</enum><header display-inline="yes-display-inline">Center</header><text display-inline="yes-display-inline">There is in the Department a national cybersecurity and communications integration center (referred
			 to in this section as the <term>Center</term>) to carry
			 out certain responsibilities of the Under Secretary appointed under
			 section
			 103(a)(1)(H).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id48e3791287a148c890a3b43a1f78fb56"><enum>(c)</enum><header display-inline="yes-display-inline">Functions</header><text display-inline="yes-display-inline">The cybersecurity functions of the Center shall include—</text><paragraph commented="no" display-inline="no-display-inline" id="idb811bf1dab2340768385aedf0d69e132"><enum>(1)</enum><text display-inline="yes-display-inline">being a Federal civilian interface for the multi-directional and cross-sector sharing of
			 information
			 related to cybersecurity risks, incidents, analysis, and warnings for
			 Federal and non-Federal entities;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id547493406e814afa8827f797caf23a85"><enum>(2)</enum><text display-inline="yes-display-inline">providing shared situational awareness to enable real-time, integrated, and operational actions
			 across the Federal Government and non-Federal entities to address
			 cybersecurity risks and incidents
			 to Federal and non-Federal entities;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8f51f65978d44e09b05e79ce1f8acb73"><enum>(3)</enum><text display-inline="yes-display-inline">coordinating the sharing of information related to cybersecurity risks and incidents across the
			 Federal Government;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id888d41a9ec2a4b46a7ba037cc6a2681b"><enum>(4)</enum><text display-inline="yes-display-inline">facilitating cross-sector coordination to address cybersecurity risks and incidents, including
			 cybersecurity risks and incidents that may be related or could have
			 consequential impacts across multiple sectors;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida696456c42a7455e95597c17ee8e7838"><enum>(5)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="id31EEDD7B8F6D4132A0E9BC11D2F87666"><enum>(A)</enum><text display-inline="yes-display-inline">conducting integration and analysis, including cross-sector integration and analysis, of
			 cybersecurity
			 risks and incidents; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6407CE33253F4A96BD9652F4F336506F" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">sharing the analysis conducted under subparagraph (A) with Federal and non-Federal
			 entities;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2b8e69b9d84348b9b5dc213e5c11cdd0"><enum>(6)</enum><text display-inline="yes-display-inline">upon request, providing timely technical assistance, risk management support, and incident response
			 capabilities to Federal and non-Federal entities with respect to
			 cybersecurity risks and incidents, which may include attribution,
			 mitigation, and remediation; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id36b14d4cbcd743b799b181c125f74c66"><enum>(7)</enum><text display-inline="yes-display-inline">providing information and recommendations on security and resilience measures to Federal and
			 non-Federal entities, including information and recommendations to—</text><subparagraph commented="no" display-inline="no-display-inline" id="id8F903A02A7994756838FB16AF9F0FE90"><enum>(A)</enum><text display-inline="yes-display-inline">facilitate information security; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idD9E328DE63B14DB388B1C44A4B698077"><enum>(B)</enum><text display-inline="yes-display-inline">strengthen information systems against cybersecurity risks and
			 incidents.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idd2322775abd44f83a1d700c8f9302a2a"><enum>(d)</enum><header display-inline="yes-display-inline">Composition</header><paragraph commented="no" display-inline="no-display-inline" id="id863e2437adb245aa8a64b1a78bc5c4d6"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Center shall be composed of—</text><subparagraph commented="no" display-inline="no-display-inline" id="id15104852019940c6b67bdac6ba9550f5"><enum>(A)</enum><text display-inline="yes-display-inline">appropriate representatives of Federal entities, such as—</text><clause commented="no" display-inline="no-display-inline" id="id12C751B5041942DF83C5735BD1184923"><enum>(i)</enum><text display-inline="yes-display-inline">sector-specific agencies;</text></clause><clause commented="no" display-inline="no-display-inline" id="idD9A18F8CB9054C29BED86179FC8E038F"><enum>(ii)</enum><text display-inline="yes-display-inline">civilian and law
			 enforcement agencies; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id0C61479ACFBE42C88EA0272D1CBAACD3"><enum>(iii)</enum><text display-inline="yes-display-inline">elements of the intelligence community, as that
			 term is defined under section 3(4) of the National Security Act of 1947
			 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)</external-xref>);</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5a094297fdc84d8b83ddcb77b130823a"><enum>(B)</enum><text display-inline="yes-display-inline">appropriate representatives of non-Federal entities, such as—</text><clause commented="no" display-inline="no-display-inline" id="id18773c6da67d4e3db01cd1607a8c34e4"><enum>(i)</enum><text display-inline="yes-display-inline">State and local governments;</text></clause><clause commented="no" display-inline="no-display-inline" id="id7fdd96f2c06d40dbb8a4dbf32113997c"><enum>(ii)</enum><text display-inline="yes-display-inline">information sharing and analysis organizations; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idd070f0a984a14beeb035aaeeeaad7097"><enum>(iii)</enum><text display-inline="yes-display-inline">owners and operators of critical information systems;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6b941920e85a4eaabbdea61210df9f98"><enum>(C)</enum><text display-inline="yes-display-inline">components within the Center that carry out cybersecurity and communications activities;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id49b066292d884574848b452b1e05af7d"><enum>(D)</enum><text display-inline="yes-display-inline">a designated Federal official for operational coordination with and across each sector; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id0D9D90AC8227485CAC8550099BD5B7AF"><enum>(E)</enum><text display-inline="yes-display-inline">other appropriate representatives or entities, as determined by the Secretary.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2bcc9ed1121f4a778f0ee9ab36b7d725"><enum>(2)</enum><header display-inline="yes-display-inline">Incidents</header><text display-inline="yes-display-inline">In the event of an incident, during exigent circumstances the Secretary may grant a Federal or
			 non-Federal entity immediate
			 temporary access to the Center.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id9a91757b91e147b8bcc76b0863f50209"><enum>(e)</enum><header display-inline="yes-display-inline">Principles</header><text display-inline="yes-display-inline">In carrying out the functions under subsection (c), the Center shall ensure—</text><paragraph commented="no" display-inline="no-display-inline" id="idBECC04DC959B49479BF4440DA79ECABF"><enum>(1)</enum><text display-inline="yes-display-inline">to the extent
			 practicable, that—</text><subparagraph commented="no" display-inline="no-display-inline" id="id45689cba481f47b3a6ce197aa6759229"><enum>(A)</enum><text display-inline="yes-display-inline">timely, actionable, and relevant information related to cybersecurity risks, incidents, and
			 analysis is shared;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2128b30d8eee4890a1091f19e8770f99"><enum>(B)</enum><text display-inline="yes-display-inline">when appropriate, information related to cybersecurity risks, incidents, and analysis is integrated
			 with other relevant information and tailored to the specific
			 characteristics of a sector;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3381baaaa18241d6898f56814ca58ea7"><enum>(C)</enum><text display-inline="yes-display-inline">activities are prioritized and conducted based on the level of risk;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id136794565b194dd8b8bc87051d28b86c"><enum>(D)</enum><text display-inline="yes-display-inline">industry sector-specific, academic, and national laboratory expertise is sought and receives
			 appropriate consideration;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3aca380a1ff44d909a3644680eba35f3"><enum>(E)</enum><text display-inline="yes-display-inline">continuous, collaborative, and inclusive coordination occurs—</text><clause commented="no" display-inline="no-display-inline" id="idE2A8E6DAD646426A8D7C52CA5F65B388"><enum>(i)</enum><text display-inline="yes-display-inline">across sectors; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id3EBCD87324CE4B25A14938625CB0ED1A"><enum>(ii)</enum><text display-inline="yes-display-inline">with—</text><subclause commented="no" display-inline="no-display-inline" id="id4BACA01D48E740FEAF8A931E6678A1F8"><enum>(I)</enum><text display-inline="yes-display-inline">sector
			 coordinating councils;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idE6F94EFCAAAF42E8B72DC04E8DE0BA3E"><enum>(II)</enum><text display-inline="yes-display-inline">information sharing and analysis organizations;
			 and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id3A233BA022B44D2290AFD2933241E37B"><enum>(III)</enum><text display-inline="yes-display-inline">other appropriate non-Federal partners;</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idd249164903874189acb447e84de926fc"><enum>(F)</enum><text display-inline="yes-display-inline">as appropriate, the Center works to develop and use mechanisms for sharing information related to
			 cybersecurity risks and incidents that are technology-neutral,
			 interoperable, real-time, cost-effective, and resilient; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8539e4ad222a458883833177497352bc"><enum>(G)</enum><text display-inline="yes-display-inline">the Center works with other agencies to reduce unnecessarily duplicative sharing of information
			 related to
			 cybersecurity risks and incidents;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idB7F1446C497B452AA4A07D1FB4C38147"><enum>(2)</enum><text display-inline="yes-display-inline">that information related to cybersecurity risks and incidents is appropriately safeguarded against
			 unauthorized access;  and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id51bec32e6677494cbd04b1487c289f88"><enum>(3)</enum><text display-inline="yes-display-inline">that activities conducted by the Center comply with all policies, regulations, and laws that
			 protect the
			 privacy and civil
			 liberties of United States persons.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idc0dc6cc9776246b4bbf67e97d2aad174"><enum>(f)</enum><header display-inline="yes-display-inline">No right or benefit</header><paragraph commented="no" display-inline="no-display-inline" id="id80E47603A2CD4EB9A594A30AA9CBD0D9"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The provision of assistance or information to, and inclusion in the Center of,
			 governmental or private entities under this section shall be at the
			 sole and unreviewable discretion of the Under Secretary appointed under
			 section 103(a)(1)(H).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2AE2E7CE4FFD4DB7B969EE8602D74282"><enum>(2)</enum><header display-inline="yes-display-inline">Certain assistance or information</header><text display-inline="yes-display-inline">The provision of certain assistance or information to, or inclusion in the
			 Center of, one governmental or private entity pursuant to this section
			 shall not create a right or benefit, substantive or procedural, to similar
			 assistance or information for any other governmental or private entity.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id5ccb05dce7b1417792f5875ccc51b3cf"><enum>(b)</enum><header display-inline="yes-display-inline">Technical and conforming amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101</external-xref> note) is
			 amended by inserting after the item relating to section 225  the
			 following:</text><quoted-block display-inline="no-display-inline" id="id91e72d2a-cd57-42dc-9422-e1611e316626" style="OLC"><toc><toc-entry bold="off" level="section">Sec. 226. National cybersecurity and communications integration center.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section commented="no" display-inline="no-display-inline" id="id459d6f3ec469407e93b67e37a18ca6dd" section-type="subsequent-section"><enum>4.</enum><header display-inline="yes-display-inline">Recommendations regarding new agreements</header><subsection commented="no" display-inline="no-display-inline" id="id1058CF683839482587B927196BD246FE"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of enactment of this Act, the Secretary
			 shall submit
			 recommendations on how to expedite the implementation of
			 information-sharing agreements for cybersecurity purposes between the
			 Center and non-Federal entities
			 (referred to in this section as <term>cybersecurity information-sharing agreements</term>) to—</text><paragraph commented="no" display-inline="no-display-inline" id="id8118C5CB4AE244F883B41FE47C649871"><enum>(1)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs and the Committee on the Judiciary of
			 the
			 Senate; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idFF15E81B3B424B51AEE9CD384376271F"><enum>(2)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and the Committee on the Judiciary of the House of
			 Representatives.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idE443F48B823C402F815F09F6F7AACEF0"><enum>(b)</enum><header display-inline="yes-display-inline">Contents</header><text display-inline="yes-display-inline">In submitting	recommendations under subsection (a), the Secretary shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id19296B6906E94F91AA9F5343D41EC2EC"><enum>(1)</enum><text display-inline="yes-display-inline">address the
			 development and utilization of a scalable form that retains all privacy
			 and other protections in cybersecurity information-sharing agreements that
			 are in effect as of the date on which the Secretary submits the
			 recommendations,
			 including Cooperative Research and Development Agreements; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id435D3F3D86794608B3C964AD2ABC1942"><enum>(2)</enum><text display-inline="yes-display-inline">include in the recommendations any additional authorities or
			 resources that may be needed to carry out the implementation of any
			 new cybersecurity information-sharing agreements.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id81231bc2079d41bab2a4f943c7c7cd28" section-type="subsequent-section"><enum>5.</enum><header display-inline="yes-display-inline">Annual report</header><text display-inline="no-display-inline">Not later than 1 year after the date of enactment of this Act, and every year thereafter for 3
			 years, the Secretary shall submit to the Committee on
			 Homeland Security
			 and Governmental Affairs and the Committee on the Judiciary of the Senate,
			 the Committee on Homeland
			 Security and the Committee on the Judiciary of the House of
			 Representatives, and the Comptroller General of
			 the United States a report on the Center, which shall include—</text><subsection commented="no" display-inline="no-display-inline" id="ida2ab447944f341a7aacaae211dc2f94b"><enum>(a)</enum><text display-inline="yes-display-inline">information on the Center, including—</text><paragraph commented="no" display-inline="no-display-inline" id="id7238f162ceca456f891a0c8bcde8e683"><enum>(1)</enum><text display-inline="yes-display-inline">an assessment of the capability and capacity of the Center to carry out its cybersecurity mission
			 under this Act;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idaca042d4107144498f444db7e9dcd681"><enum>(2)</enum><text display-inline="yes-display-inline">the number of representatives from non-Federal entities that are participating in the Center,
			 including the number of representatives from States, nonprofit
			 organizations, and private sector entities, respectively;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb1491ff977224626bf866d6fd503e5b1"><enum>(3)</enum><text display-inline="yes-display-inline">the number of requests from non-Federal entities to participate in the Center and the response to
			 such requests;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ideee78f67c1d04529a74359c3766ffaf3"><enum>(4)</enum><text display-inline="yes-display-inline">the average length of time taken to resolve requests described in paragraph (3);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id102a241685fe41d79e41689a584f7e91"><enum>(5)</enum><text display-inline="yes-display-inline">the identification of—</text><subparagraph commented="no" display-inline="no-display-inline" id="id0BCEC044C7FE407FAE60279CE1172490"><enum>(A)</enum><text display-inline="yes-display-inline">any delay in resolving requests described in paragraph (3) involving security clearance
			 processing; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id78C5BF61C8524A8A994B0E7F11635A9A"><enum>(B)</enum><text display-inline="yes-display-inline">the agency involved with a delay described in subparagraph (A);</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="iddc393d8e81c04e65a329a3b2559124d3"><enum>(6)</enum><text display-inline="yes-display-inline">a description of any other obstacles or challenges to resolving requests described in paragraph
			 (3) and a summary of the
			 reasons for denials of any such requests;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id84a9a95e1585424ea3142a9997cd635d"><enum>(7)</enum><text display-inline="yes-display-inline">the extent to which the Department is engaged in information sharing with each critical
			 infrastructure sector, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="id12e816d014e64cc49ba459dbb052bcfc"><enum>(A)</enum><text display-inline="yes-display-inline">the extent to which each sector has representatives at the Center;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2dd7379ac69644dc83adb1902d75ff55"><enum>(B)</enum><text display-inline="yes-display-inline">the extent to which owners and operators of critical infrastructure in each critical infrastructure
			 sector participate in information sharing at the Center; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6bccca8f259242e78966dfa4f6dd12b6"><enum>(C)</enum><text display-inline="yes-display-inline">the volume and range of activities with respect to which the Secretary has collaborated with the
			 sector
			 coordinating councils and the sector-specific agencies to promote greater
			 engagement with the Center; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id25cc272b231a42138b076ace20ab36e6"><enum>(8)</enum><text display-inline="yes-display-inline">the policies and procedures established by the Center to safeguard privacy and civil liberties.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="id1e61c9188bf642f0b5c3a048bdbb07e8" section-type="subsequent-section"><enum>6.</enum><header display-inline="yes-display-inline">GAO report</header><text display-inline="no-display-inline">Not later than 2 years after the date of enactment of this Act, the Comptroller General of the
			 United States shall submit to the Committee on Homeland Security
			 and Governmental Affairs of the Senate and the Committee on Homeland
			 Security of the House of Representatives a report on the effectiveness of
			 the Center in carrying out its cybersecurity mission.</text></section><section commented="no" display-inline="no-display-inline" id="idd13ef55f0cba440299cf1ab95e07bed0" section-type="subsequent-section"><enum>7.</enum><header display-inline="yes-display-inline">Cyber incident response plan; clearances; breaches</header><subsection commented="no" display-inline="no-display-inline" id="idEBA87E298C0749AC9CACEF7E7CCF55F1"><enum>(a)</enum><header display-inline="yes-display-inline">Cyber incident response plan; clearances</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/141">6 U.S.C. 141 et seq.</external-xref>), as amended by
			 section 3, is amended by adding at the end the following:</text><quoted-block display-inline="no-display-inline" id="idA65106F958534BB88570BC8D37E7A233" style="OLC"><section commented="no" display-inline="no-display-inline" id="id55E2993EC5C54ED18FA333113B995728" section-type="subsequent-section"><enum>227.</enum><header display-inline="yes-display-inline">Cyber incident response plan</header><text display-inline="no-display-inline">The Under Secretary appointed under section 103(a)(1)(H) shall, in coordination with appropriate
			 Federal departments and agencies, State and local governments, sector
			 coordinating councils, information sharing and analysis organizations (as
			 defined in section 212(5)),
			 owners and operators of critical infrastructure, and other appropriate
			 entities and individuals, develop, regularly update, maintain, and
			 exercise adaptable cyber incident response plans to address cybersecurity
			 risks (as defined in section 226) to critical infrastructure.</text></section><section commented="no" display-inline="no-display-inline" id="id7B7757A462C74F59B727FD5DCB5A1CED" section-type="subsequent-section"><enum>228.</enum><header display-inline="yes-display-inline">Clearances</header><text display-inline="no-display-inline">The Secretary shall make available the process of application for security
			 clearances under
			 Executive Order 13549 (75 Fed. Reg. 162; relating to a classified national
			 security information program) or any successor Executive Order to
			 appropriate
			 representatives of sector coordinating councils, sector information
			 sharing and analysis organizations (as defined in section 212(5)), owners
			 and
			 operators of critical infrastructure, and any other person that the
			 Secretary determines appropriate.</text></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="id4A14E7B044184E62AE222C624D066117"><enum>(b)</enum><header display-inline="yes-display-inline">Breaches</header><paragraph commented="no" display-inline="no-display-inline" id="id9B7F9CE284F64FB592CFC1F8E86182DA"><enum>(1)</enum><header display-inline="yes-display-inline">Requirements</header><text display-inline="yes-display-inline">The Director of the Office of Management and Budget shall ensure that data breach notification
			 policies and guidelines are updated periodically and require—</text><subparagraph commented="no" display-inline="no-display-inline" id="idE679405B18CD4541ADF7DD9A92316A75"><enum>(A)</enum><text display-inline="yes-display-inline">except as provided in paragraph (4), notice by the affected agency to each committee of Congress
			 described in section
			 3544(c)(1) of title 44, United States
			 Code, the Committee on the Judiciary of the Senate, and the Committee on
			 Homeland Security and the Committee on the Judiciary of the House of
			 Representatives, which shall—</text><clause commented="no" display-inline="no-display-inline" id="id2941CFF3FA864FDFA303111CBF29FF10"><enum>(i)</enum><text display-inline="yes-display-inline">be provided expeditiously and not later
			 than 30 days after the date on which the agency discovered the
			 unauthorized acquisition or access; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idCC2206BC8E7940839F6AC7231D26CACE"><enum>(ii)</enum><text display-inline="yes-display-inline">include—</text><subclause commented="no" display-inline="no-display-inline" id="id068798dafaec4492881f2b77d1318e5f"><enum>(I)</enum><text display-inline="yes-display-inline">information about the breach, including a summary of any information that the agency knows on the
			 date on which notification is provided about how
			 the breach occurred;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ide74b172196b146afa508d154e45bbc1c"><enum>(II)</enum><text display-inline="yes-display-inline">an estimate of the number of individuals affected by the breach, based on information that the
			 agency knows on the date on which notification is provided,
			 including an assessment of the risk of harm to affected
			 individuals;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id6bfd6cb7e62b410585603e1df2d7eab4"><enum>(III)</enum><text display-inline="yes-display-inline">a description of any circumstances necessitating a delay in providing notice to affected
			 individuals;
			 and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="iddbbb9d42b1794acdbd44c3e114a2dff7"><enum>(IV)</enum><text display-inline="yes-display-inline">an estimate of whether and when the agency will provide notice to affected individuals;
			 and</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1d0af45b72db416ba65203ee4cd20a4a"><enum>(B)</enum><text display-inline="yes-display-inline">notice by the affected agency to affected individuals,
			 pursuant to data breach notification policies and guidelines, which shall
			 be
			 provided as expeditiously as practicable and without unreasonable delay
			 after the agency discovers the unauthorized acquisition	or access.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf707955dc1484044a1ade36f784ab980"><enum>(2)</enum><header display-inline="yes-display-inline">National security; law enforcement; remediation</header><text display-inline="yes-display-inline">The Attorney General, the head of an element of the intelligence community (as such term is defined
			 under section 3(4) of the National Security Act of 1947 (50 U.S.C.
			 3003(4)), or the Secretary may delay the notice to
			 affected individuals
			 under paragraph (1)(B) if the notice would disrupt a law enforcement
			 investigation, endanger national security, or hamper security remediation
			 actions.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf76e0749b775479fbb1a8f5b5cd3d9a0"><enum>(3)</enum><header display-inline="yes-display-inline">OMB report</header><text display-inline="yes-display-inline">During the first 2 years beginning after the date of enactment of this Act, the Director of
			 the Office of Management and Budget shall, on an annual basis—</text><subparagraph commented="no" display-inline="no-display-inline" id="idC06F47AC72F3458F8606011D78222193"><enum>(A)</enum><text display-inline="yes-display-inline">assess agency implementation of data breach notification policies and guidelines in aggregate; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idA0F3522E55994624885558EFC6DB5AAB"><enum>(B)</enum><text display-inline="yes-display-inline">include the assessment described in clause (i) in the report required under section 3543(a)(8) of
			 title 44, United States Code.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idB96EE90440FB4AB8A3B898AB8F382C0D"><enum>(4)</enum><header display-inline="yes-display-inline">Exception</header><text display-inline="yes-display-inline">Any element of the intelligence community  (as such term is defined
			 under section 3(4) of the National Security Act of 1947 (50 U.S.C.
			 3003(4)) that is required to provide notice under paragraph (1)(A) shall
			 only
			 provide such notice to appropriate committees of Congress.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id403237602BC246CCAEF832BC33CC7FD4"><enum>(c)</enum><header display-inline="yes-display-inline">Rule of construction</header><text display-inline="yes-display-inline">Nothing in the amendment made by subsection (a) or in subsection (b)(1) shall be construed to alter
			 any
			 authority of a Federal agency or department.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="idA944B9E95CA240E1BDF80A4B88CB658F"><enum>(d)</enum><header display-inline="yes-display-inline">Technical and conforming amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101</external-xref> note), as
			 amended by section 3, is
			 amended by inserting after the item relating to section 226 the
			 following:</text><quoted-block display-inline="no-display-inline" id="id54E8B55037DB4E7B9DC1F42E707081D5" style="OLC"><toc><toc-entry bold="off" level="section">Sec. 227. Cyber incident response plan.</toc-entry><toc-entry bold="off" level="section">Sec. 228. Clearances.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section commented="no" display-inline="no-display-inline" id="ida14e036ba2e74756a292ce0a1029de47" section-type="subsequent-section"><enum>8.</enum><header display-inline="yes-display-inline">Rules of construction</header><subsection commented="no" display-inline="no-display-inline" id="id5dd92863bd6b482a8342a16f6334d1aa"><enum>(a)</enum><header display-inline="yes-display-inline">Prohibition on new regulatory authority</header><text display-inline="yes-display-inline">Nothing in this Act or the amendments made by this Act shall be construed to grant the
			 Secretary any authority to promulgate
			 regulations or set standards relating
			 to the cybersecurity of private sector critical infrastructure that was
			 not in effect on the day before the date of enactment of this Act.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id5e8485f3a1dc4e519776acd985e961c1"><enum>(b)</enum><header display-inline="yes-display-inline">Private entities</header><text display-inline="yes-display-inline">Nothing in this Act or the amendments made by this Act shall be construed to require any
			 private entity—</text><paragraph commented="no" display-inline="no-display-inline" id="id6EA5CF6D079B4E9E9CB0901CAF36FB95"><enum>(1)</enum><text display-inline="yes-display-inline">to
			 request assistance from the Secretary; or</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id882059639D084EDAB6B840120F4CF8E5"><enum>(2)</enum><text display-inline="yes-display-inline">that requested such assistance from the Secretary to implement any measure or recommendation
			 suggested by the Secretary.</text></paragraph></subsection></section></legis-body><attestation><attestation-group><attestation-date chamber="Senate" date="20141210">Passed the Senate December 10, 2014.</attestation-date><attestor display="no"></attestor><role>Secretary</role></attestation-group></attestation><endorsement display="yes"></endorsement></bill>


