<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" bill-type="olc" dms-id="HCBCB5F89D0524EB7A1A358909E94F2A6" key="H" public-private="public"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 HR 1981 IH: Cyber Security Education and Federal Workforce Enhancement Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2017-04-06</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">115th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 1981</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20170406">April 6, 2017</action-date><action-desc><sponsor name-id="J000032">Ms. Jackson Lee</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HED00">Committee on Education and the Workforce</committee-name>, and in addition to the Committees on <committee-name committee-id="HSY00">Science, Space, and Technology</committee-name>, and <committee-name committee-id="HHM00">Homeland Security</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such
			 provisions as fall within the jurisdiction of the committee concerned</action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To codify an office within the Department of Homeland Security with the mission of strengthening
			 the capacity of the agency to attract and retain highly trained computer
			 and information security professionals, and for other purposes.</official-title></form>
	<legis-body id="H14F06C3753CF4BC6AF62AC41E553AB33" style="OLC">
		<section id="HC9B6CA24685E4C01AAEE87CBB3CBE885" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header>
 <subsection id="HF92E610FEA594074A928D4D1FF4F2155"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Cyber Security Education and Federal Workforce Enhancement Act</short-title></quote>.</text> </subsection><subsection id="HD642673BDC7F4536B8EEC172CF626D94"><enum>(b)</enum><header>Table of contents</header><text display-inline="yes-display-inline">The table of contents for this Act is as follows:</text>
				<toc container-level="legis-body-container" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
					<toc-entry idref="HC9B6CA24685E4C01AAEE87CBB3CBE885" level="section">Sec. 1. Short title; table of contents.</toc-entry>
					<toc-entry idref="H84C448634F934A26B90230D983098926" level="section">Sec. 2. Findings.</toc-entry>
					<toc-entry idref="H40430C3F2E674E7C99E7D9D7DB9C66DF" level="title">Title I—Department of Homeland Security K–12 Excellence in Science and Technology</toc-entry>
					<toc-entry idref="HF0D357600B43439DB466C012650D3E85" level="section">Sec. 101. Office of Cybersecurity Education and Awareness.</toc-entry>
					<toc-entry idref="HB6C9080BC1FC48FB9EA98967176F4C2A" level="section">Sec. 102. Science and technology initiative grants.</toc-entry>
					<toc-entry idref="H86E1D38D1FD4442F91249F81A065A68B" level="section">Sec. 103. Project-based learning program.</toc-entry>
					<toc-entry idref="HD809A83911DC44CDA4B7826C15CCED46" level="section">Sec. 104. Matching funds for State and privately financed science and technology after-school
			 programs.</toc-entry>
					<toc-entry idref="H22694A55497B4BD6B78B15A8A1DABB1C" level="section">Sec. 105. Science and Technology Board of Advisors.</toc-entry>
					<toc-entry idref="H2C7C004B77974974B7187053C202D48E" level="section">Sec. 106. Laboratories for science and technology excellence.</toc-entry>
					<toc-entry idref="HA1E7E710E7AF46BE969471DE1D080C07" level="title">Title II—Post-Secondary Computer and Information Security Education</toc-entry>
					<toc-entry idref="H87E946D0B46741049161AF8F1EC81580" level="section">Sec. 201. Computing and Information Research Working Group.</toc-entry>
					<toc-entry idref="H95A89E369947418FAC0720438B73E748" level="section">Sec. 202. Process for adoption research and a best practices voluntary guidelines for laboratory
			 facilities.</toc-entry>
					<toc-entry idref="H89CDD42873F642DAA81722F40563E774" level="section">Sec. 203. Computing and information security mentoring programs for college students.</toc-entry>
					<toc-entry idref="H8E99FEE519364ABE8E142BFD365495DE" level="section">Sec. 204. Grants for computer equipment.</toc-entry>
					<toc-entry idref="H53092957A7824631A7E1BBA410782C40" level="section">Sec. 205. Centers of Academic Computing and Information Assurance.</toc-entry>
					<toc-entry idref="H4CDFF3D1D64E4B37AD8731B78A466A67" level="title">Title III—Federal Workforce Computer and Information Security Professional Development</toc-entry>
					<toc-entry idref="H84BC3408ECC0455989225DEFF79D8AB4" level="section">Sec. 301. Lifelong learning in computer and information security study.</toc-entry>
					<toc-entry idref="H8274E6795748482E9430BDC75927A9ED" level="section">Sec. 302. Computer and information security job opportunities program.</toc-entry>
					<toc-entry idref="H02585A99E91044AFB01123A873448F9B" level="section">Sec. 303. Department of Homeland Security Cybersecurity training programs and equipment.</toc-entry>
					<toc-entry idref="H9B7A038D936343BE95BBD8739A5C3E1C" level="section">Sec. 304. E-Security Fellows Program.</toc-entry>
					<toc-entry idref="H5BF520B69AAD48A5AE4B8657D8C3E7DA" level="title">Title IV—Research</toc-entry>
					<toc-entry idref="H9D3505D2351148A184FD8916188F596B" level="section">Sec. 401. National Science Foundation study on science and technology student retention.</toc-entry>
					<toc-entry idref="HB55CDC3D89AB4B398BC8B39F800AB12D" level="section">Sec. 402. Challenge Grants.</toc-entry>
					<toc-entry idref="H9DEFCACD7FE54303AD36F686633A56E4" level="section">Sec. 403. E-Security Fellows Program.</toc-entry></toc>
 </subsection></section><section id="H84C448634F934A26B90230D983098926"><enum>2.</enum><header>Findings</header><text display-inline="no-display-inline">Congress makes the following findings:</text> <paragraph id="HE9CF3CE27395452BA5DB3BBE5B3610CD"><enum>(1)</enum><text display-inline="yes-display-inline">The Department of Homeland Security’s Cybersecurity Education &amp; Awareness (CE&amp;A) Branch was established under National Security Presidential Directive–54/Homeland Security Presidential Directive–23, which launched the 2008 Comprehensive National Cybersecurity Initiative. There is no appropriations language that references CE&amp;A; it is funded through the Infrastructure Protection and Information Security appropriation under the National Protection and Programs Directorate.</text>
 </paragraph><paragraph id="H47785F737CF24B45B8B3E5757D2687DC"><enum>(2)</enum><text display-inline="yes-display-inline">The Department of Homeland Security’s CE&amp;A works with universities to attract top talent through competitive scholarship, fellowship, and internship programs.</text>
 </paragraph><paragraph id="H56B57BCF85724B4982F267CE4AB63F4E"><enum>(3)</enum><text display-inline="yes-display-inline">The agency certifies more than 125 institutions nationwide as National Centers for Academic Excellence to teach students valuable technical skills in various disciplines of Information Assurance.</text>
 </paragraph><paragraph id="HD5C405A565EA4AAF9A0F64A66D42E383"><enum>(4)</enum><text display-inline="yes-display-inline">The CE&amp;A prepares and makes available computer and information security lesson plans. At the K–12 level, the Department has partnered with USA Today to provide lesson plans about the importance of prevention of computer and digital information crimes at home and in the classroom.</text>
 </paragraph><paragraph id="H149E7416C8F54ED18B452A087177B92E"><enum>(5)</enum><text display-inline="yes-display-inline">The agency initiated the IT Security Essential Body of Knowledge (EBK). The National Cybersecurity Division developed the EBK to establish a national baseline of the essential knowledge and skills that IT security practitioners in the public and private sector should have to perform specific roles and responsibilities.</text>
 </paragraph><paragraph id="HCDEE3B314CB641E0B9A6D44848E01E95"><enum>(6)</enum><text display-inline="yes-display-inline">The challenge for computer and information security coordination and development is no single agreed upon voluntary taxonomy nor definitions to rely upon when categorizing or classifying computer or information security jobs.</text>
 </paragraph><paragraph id="H8E9B30E9E40A48A9A552342D2A8759CE"><enum>(7)</enum><text display-inline="yes-display-inline">The fields of computer and information security study is within the field of information assurance.</text> </paragraph><paragraph id="H0EE23CF22B614BE1827EC64F5AF58485"><enum>(8)</enum><text display-inline="yes-display-inline">The information assurance, cybersecurity and computer security workforce encompasses a variety of context, roles, and occupations and is too broad and diverse to be treated as a single occupation or profession.</text>
 </paragraph><paragraph id="H464148836D204E76A62255412D5B752B"><enum>(9)</enum><text>Science, technology, engineering, and mathematics occupations, which include computer and information security experts and professionals, are expected to grow by 17 percent by the year 2018 compared to 9.8 percent for other jobs.</text>
 </paragraph><paragraph id="HE8183596CCC04EE2BA7B73E2F3B6513D"><enum>(10)</enum><text>The Federal Government is experiencing a shortage of qualified professionals with expertise in computer and information security.</text>
 </paragraph><paragraph id="H02EB72C845E142558B956488B877C6C4"><enum>(11)</enum><text>Insufficiently trained, educated, or supervised Federal computer workers can reduce the Nation’s ability to secure computer networks from cyber attacks or incidents.</text>
 </paragraph><paragraph id="H97B1EA6B0C194F53A7642AB5514A3ED4"><enum>(12)</enum><text>The computing and information security workforce encompasses a variety of context, roles, and occupations and is too broad an diverse to be treated as a single occupation or profession.</text>
 </paragraph><paragraph id="H3344FD19555A43E69F78015E07E96466"><enum>(13)</enum><text>Computing and information security is not solely a technical endeavor, and thus encompasses a wide range of backgrounds and skills that will be needed in an effective national computing and information security workforce.</text>
 </paragraph><paragraph id="H3B6B7A4FA63245BC8352F2E8AB3FBD30"><enum>(14)</enum><text>The route toward professionalization of a field of study can be slow and difficult, and not all portions of a field can or should be professionalized at the same time.</text>
 </paragraph><paragraph id="H987D7E31888C4D18816B857C995815CD"><enum>(15)</enum><text>It is essential, just as it is for other disciplines like medicine and the law, that academics, employers, and government share a common language to identify, train, educate, and employ computer and information security professionals.</text>
 </paragraph><paragraph id="HDC2CF7E600DF4658BD0FECC219DFC6F7"><enum>(16)</enum><text>The secure management of digital sensitive information collected maintained or transmitted by Federal Government agencies, including taxpayer data, Social Security records, medical records, intellectual property, proprietary business information, and sensitive Government data vital to national security and national defense requires an educated and well-trained, as well as supervised, Federal workforce.</text>
 </paragraph><paragraph id="H530D4A2680B441D88C4FDC29F7D82336"><enum>(17)</enum><text>It is in the Nation’s interest to promote opportunities for science and technology education and employment as a means of addressing the need to fill computer and information security jobs within the Federal Government.</text>
 </paragraph><paragraph id="H1824A02807CE479F83D49D0DEA462186"><enum>(18)</enum><text display-inline="yes-display-inline">The Department of Homeland Security’s role is to lead, champion, and sustain the development of a national information assurance, cybersecurity and computer security workforce, as well as to educate the citizenry.</text>
 </paragraph><paragraph id="H7034D71EF6C2494AACEF156F5989A950"><enum>(19)</enum><text display-inline="yes-display-inline">Developing, implementing, and articulating programs that protect against and respond to computer and information security threats and hazards to the Homeland’s security.</text>
 </paragraph><paragraph id="H38683ACD941B4A819666B3AF0046B3EC"><enum>(20)</enum><text display-inline="yes-display-inline">The Department of Homeland Security must create an agile, diverse workforce and digital citizenry that are capable of sustaining a safe, secure, resilient computer and information security space, driven by a dynamic Department organization at the forefront of cross-sector computer and information security workforce development.</text>
			</paragraph></section><title id="H40430C3F2E674E7C99E7D9D7DB9C66DF"><enum>I</enum><header>Department of Homeland Security K–12 Excellence in Science and Technology</header>
			<section commented="no" id="HF0D357600B43439DB466C012650D3E85"><enum>101.</enum><header>Office of Cybersecurity Education and Awareness</header>
 <subsection commented="no" id="H84BBAD0B744140EC9264955C7934EED4"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/141">6 U.S.C. 141</external-xref> et seq.) is amended by adding at the end the following new section:</text>
					<quoted-block display-inline="no-display-inline" id="H8654D2FF648245BF90853CCC4A676DE8" style="OLC">
						<section commented="no" id="HDD4C681A37344E7F95BC08E0F48B258F"><enum>230A.</enum><header>Office of Cybersecurity Education and Awareness</header>
 <subsection commented="no" id="H59B426783BDF42A4BCDF06E76C57D12B"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">There shall be within the Department an Office of Cybersecurity Education and Awareness Branch (hereinafter in this section referred to as the <quote>Office</quote>).</text>
 </subsection><subsection commented="no" id="H42076F9525E54162A7903C34C7F24BAD"><enum>(b)</enum><header>Responsibilities</header><text>The Office shall be responsible for carrying out the duties of the Office as directed by the Secretary. The Office shall also report to the Secretary the ongoing work of the Office. Further, the Office shall report on the statutory authority, Executive orders or agency directives that guide the work of the Office. The Office shall report to the Secretary what additional authority is needed to fulfill the mission for the Office as outlined by the section. The Office shall also conduct research and make recommendations to the Secretary to the extent that the agency can effectively engage in the following:</text>
 <paragraph id="HD540337100FD483B91A5519C3D01333E"><enum>(1)</enum><text display-inline="yes-display-inline">Recruiting, retaining, and sustaining the skills and knowledge of information assurance, cybersecurity and computer security professionals in the Department of Homeland Security, hereinafter known as the <quote>Department</quote>.</text>
 </paragraph><paragraph commented="no" id="H49667AD2518447289D5D6C6584655F70"><enum>(2)</enum><text display-inline="yes-display-inline">Supporting kindergarten through grade 12 science and technology and computer and information safety education through grants, and training programs.</text>
 </paragraph><paragraph id="H87073175C39246B4862889FC918C7D17"><enum>(3)</enum><text>Supporting postsecondary information assurance, cybersecurity and computer security programs that provide education that benefits the mission and objective of the Department regarding recruitment and retention of highly trained computing professionals who are work ready.</text>
 </paragraph><paragraph id="H317A3CDED1D64A66BF63F877C8432E1C"><enum>(4)</enum><text display-inline="yes-display-inline">Promoting public knowledge of computer and information security competitions to provide computer and information security competition administrators, participants, and sponsors with information necessary to further broader public participation in these activities.</text>
 </paragraph><paragraph commented="no" id="HD6AA35ACFA844A33A95F3CF627D2EA04"><enum>(5)</enum><text display-inline="yes-display-inline">Developing a guest lecturer program or part-time lecturer program comprised of information assurance, cybersecurity and computer security experts in the Federal Government, academia and private sector to support education of students at institutions of higher education who are pursuing degrees in computing science.</text>
 </paragraph><paragraph commented="no" id="H24E4D261E5724F8EBABFF3DECE7A0523"><enum>(6)</enum><text display-inline="yes-display-inline">Managing a Computer and Information Security Youth Training Pathway Program for secondary school and postsecondary school students to work in part-time or summer positions along with Federal agency computer and information security professionals.</text>
 </paragraph><paragraph commented="no" id="HB266A5A246D74FC78CE6B2BE8C874B00"><enum>(7)</enum><text display-inline="yes-display-inline">Developing programs that increase the capacity of institutions defined in section 371 of the Higher Education Act of 1965—</text>
 <subparagraph commented="no" id="HCBB3F98D78224AEDAFB9FF9FAE7E8700"><enum>(A)</enum><text>Historically Black Colleges and Universities;</text> </subparagraph><subparagraph commented="no" id="H46FACC8358254147B2AEC30FA96AFF30"><enum>(B)</enum><text>professional and academic areas in which African-Americans are under represented;</text>
 </subparagraph><subparagraph commented="no" id="HB65C81C0169149F2B448FC1D3B22C9B1"><enum>(C)</enum><text>Hispanic-serving institutions;</text> </subparagraph><subparagraph commented="no" id="H9ABE3603D5704F36A48DA018381ECA4A"><enum>(D)</enum><text>Native American colleges; and</text>
 </subparagraph><subparagraph commented="no" id="HFB37C629751642018C0D6E2758FB9E6D"><enum>(E)</enum><text>rural colleges and universities.</text> </subparagraph></paragraph><paragraph id="H310CE600752C45A59D5731ECA2E9ED90"><enum>(8)</enum><text display-inline="yes-display-inline">Conduct research and make recommendations to the Secretary on what the agency can do to increase participation of professional and academic under represented areas at minority institutions.</text>
 </paragraph><paragraph id="H43E936F5F1F245EF8062EF0ADB011B2F"><enum>(9)</enum><text display-inline="yes-display-inline">Providing support to the institutions of higher education described in subparagraphs (A) through (E) of paragraph (7) to provide course work and education in computer and information security designed to raise the number and diversity of students in the field. The Office may use the institutions defined under section 371 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1067q">20 U.S.C. 1067q</external-xref>) minority-serving institutions are defined as follows:</text>
 <subparagraph id="HDFDBD567EE0E40A0BF75EF66090F66BB"><enum>(A)</enum><text>A part B institution (as defined in section 322 (<external-xref legal-doc="usc" parsable-cite="usc/20/1061">20 U.S.C. 1061</external-xref>)).</text> </subparagraph><subparagraph id="HE1F4BCAA17CE461C993B8FBECC372E22"><enum>(B)</enum><text>A Hispanic-serving institution (as defined in section 502 (<external-xref legal-doc="usc" parsable-cite="usc/20/1101a">20 U.S.C. 1101a</external-xref>)).</text>
 </subparagraph><subparagraph id="HF21FA236DC714F28A31115A41557F4CD"><enum>(C)</enum><text>A Tribal College or University (as defined in section 316 (<external-xref legal-doc="usc" parsable-cite="usc/20/1059">20 U.S.C. 1059</external-xref>)).</text> </subparagraph><subparagraph id="HB3695DB486704C8EAB605173B5400515"><enum>(D)</enum><text>An Alaska Native-serving institution or a Native Hawaiian-serving institution (as defined in section 317(b) (<external-xref legal-doc="usc" parsable-cite="usc/20/1059d">20 U.S.C. 1059d(b)</external-xref>)).</text>
 </subparagraph><subparagraph id="H9163755F8A54468C8629A587E91AB7B9"><enum>(E)</enum><text>A Predominantly Black Institution (as defined in subsection (c)).</text> </subparagraph><subparagraph id="HA669DBDA5DEA40F281D27D20B6F5E831"><enum>(F)</enum><text>An Asian American and Native American Pacific Islander-serving institution (as defined in subsection (c)).</text>
 </subparagraph><subparagraph id="HBB6699F248164323BAF145A93D5FD4F5"><enum>(G)</enum><text>A Native American-serving nontribal institution (as defined in subsection (c)).</text> </subparagraph></paragraph></subsection><subsection commented="no" id="H1C720143188D496B86FF4D617C61F2F2"><enum>(c)</enum><header>Definitions</header><text>In this section:</text>
 <paragraph id="HADF8D8A6DD894FEB858F6A164F5FA014"><enum>(1)</enum><text>The term <quote>information assurance, cybersecurity and computer security program</quote> has the meaning given by the Secretary in consultation with the computing and information Security Post Secondary Education Working Group under the bill.</text>
 </paragraph><paragraph id="H1F199D6CEA3E41849C527E11311578A8"><enum>(2)</enum><text>The term <quote>K–12</quote> may be defined by the Secretary in consultation with the K–12 Science and Technology Education Board of Advisors under section 105 of the <short-title>Cyber Security Education and Federal Workforce Enhancement Act</short-title>.</text>
 </paragraph><paragraph id="H6D01AD8A41944A5CA2FF18BAD2E597CA"><enum>(3)</enum><text>The Secretary may define higher education institutions under this title using definitions found in section 371 of the Higher Education Act of 1965.</text>
 </paragraph><paragraph id="HD92D37327C614CD4925881703F1B7B4B"><enum>(4)</enum><text>The term <quote>professional and academic under represented areas</quote> means areas in which African-Americans, Hispanics, and women are under represented has the meaning given such term by the Secretary, who may consult with the Commissioner for Education Statistics and the Commissioner of the Bureau of Labor Statistics. The basis of the determining the means should be based on most recent available satisfactory data, as computing and information security professional and academic areas in which the percentage of African-Americans, Hispanics, and females who have been educated, trained, and employed is less than the percentage of African-Americans, Hispanics, and women in the general population.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="H5238E7A377304A9EBEA89AAAA06F7843"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents in section 1(b) of such Act is amended by inserting after the item relating to section 225 the following new item:</text>
					<quoted-block display-inline="no-display-inline" id="HDFF0921284C642C59341B55A55DCA4E1" style="OLC">
						<toc regeneration="no-regeneration">
							<toc-entry level="section">Sec. 230A. Office of Cybersecurity Education and Awareness.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section><section id="HB6C9080BC1FC48FB9EA98967176F4C2A"><enum>102.</enum><header>Science and technology initiative grants</header>
 <subsection id="HEEF0177DC714428598B0F91C112BB451"><enum>(a)</enum><header>In general</header><text>The Secretary of Homeland Security shall consider existing authority to make grants to secondary schools under this section, which shall be known as <quote>Science and Technology Educators Initiative Grants</quote>.</text>
 </subsection><subsection id="H04762E05D0C44C4691139A1F72619B66"><enum>(b)</enum><header>Selection of schools</header><text>If the Secretary determines that they have the authority they may select secondary schools to receive grants under this section, the Secretary may consider the following factors:</text>
 <paragraph id="H941C67995D29477CA0509D9ADE4EB4CA"><enum>(1)</enum><text>Whether more than 40 percent of the students at the secondary school are eligible for free or reduced price school meal programs under the Richard B. Russell National School Lunch Act and the Child Nutrition Act of 1966.</text>
 </paragraph><paragraph id="H371939D41E23402B84671DC4EAA5E82E"><enum>(2)</enum><text>The location of the secondary school is in a rural area.</text> </paragraph><paragraph id="H2CAEEA721EBB4B9EA908990DF856561F"><enum>(3)</enum><text>The participation of representation of professions and academic area among students which will also include home schooled, individuals residing in rural areas, and individuals attending underperforming secondary schools.</text>
 </paragraph><paragraph id="HB932B5D6C96B47829DA68E55F08E4D9B"><enum>(4)</enum><text>The location of the school in an area where the unemployment rate was not more than one percent higher than the national average unemployment rate during the 24-month period preceding the determination of eligibility under this subsection.</text>
 </paragraph><paragraph id="H9AB9AE7FB40D4F31B64E4F8C8B5942F4"><enum>(5)</enum><text>The location of the secondary school in an area where the per capita income is of 80 percent or less of the national per capita income.</text>
					</paragraph></subsection></section><section id="H86E1D38D1FD4442F91249F81A065A68B"><enum>103.</enum><header>Project-based learning program</header>
 <subsection id="HE3C087C420BB4414A63207E5DC65D74F"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">The Secretary shall direct the Office to conduct research to investigate and make recommendations regarding the feasibility and existing authority to establish a national project-based science and technology learning program, to be known as the <quote>K–12 Science and Technology Learning Program</quote> and make a report to both House and Senate Oversight Committees. Under such research program, the Secretary shall determine existing authority to—</text>
 <paragraph id="H356BC490D8E2429BB0E8E8A698B1C70E"><enum>(1)</enum><text>create State and regional workshops to train teachers in science and technology project-based learning;</text>
 </paragraph><paragraph id="HA3659DE3959645FBBCFCE83C8ED69018"><enum>(2)</enum><text display-inline="yes-display-inline">establish between institutions of higher education, businesses, and local public and private educational agencies that serve students comprised of 40 percent or more of professional and academic under represented areas to provide materials and teaching aids to teachers who successfully complete the science and technology project-based learning program under this section;</text>
 </paragraph><paragraph id="H4DE1A3B144054C06BE35B3F3E8696DE5"><enum>(3)</enum><text display-inline="yes-display-inline">identify no cost or low cost summer and after school science and technology education programs and broadly disseminate that information to the public; and</text>
 </paragraph><paragraph id="HC0D63AF0FD24460C891671DEB10014F2"><enum>(4)</enum><text display-inline="yes-display-inline">make grants to local educational agencies to support the participation of teachers of elementary school and secondary school in science and technology training programs by providing travel and enrollment expenses, with a priority given to teachers who work in schools serving neglected, delinquent, migrant students, English learners, at-risk students, and Native Americans, as determined by the Secretary.</text>
 </paragraph></subsection><subsection commented="no" id="H0DA1D765120F4646B9C471B6AABFE0BF"><enum>(b)</enum><header>Authority</header><text display-inline="yes-display-inline">The Secretary shall have the authority under this statute to conduct a limited pilot project to test recommendations on possible programs that would be low-cost but have the greatest impact on instilling the importance of technology and science education.</text>
 </subsection><subsection id="H44EA9CB19A254908BE14586EB55F05D4"><enum>(c)</enum><header>Report to Congress</header><text>The Secretary shall submit to Congress an annual report on the program established under this section.</text>
 </subsection><subsection id="H048CCBE8449A4CB29897DFDA342C77D3"><enum>(d)</enum><header>Project-Based science and technology learning defined</header><text>In this section, the term <term>project-based science and technology learning</term> means a systematic teaching method that engages students in learning essential science, technology, engineering and mathematics through knowledge and life-enhancing skills through an extended, student-influenced inquiry process structured around complex, authentic questions and carefully designed products and tasks developed specifically for education.</text>
				</subsection></section><section id="HD809A83911DC44CDA4B7826C15CCED46"><enum>104.</enum><header>Matching funds for State and privately financed science and technology after-school programs</header>
 <subsection id="H9BE6CEDD50E54538B15669E375B3E627"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall provide matching funds to local educational agencies for after-school programs dedicated to science, technology, engineering, and math in an amount equal to the amount provided to the program by a State, local, tribal, or territorial government or by a nonprofit or private entity.</text>
 </subsection><subsection commented="no" id="HC67A3EE0047945F58AC99D2870BC334B"><enum>(b)</enum><header>Criteria</header><text display-inline="yes-display-inline">In selecting programs for which to provide funds under this section, the Secretary shall consider—</text> <paragraph commented="no" id="HB75E7E2CDEBA4555BE73A4FBA5B25686"><enum>(1)</enum><text>the number of students served by the programs; and</text>
 </paragraph><paragraph commented="no" id="HB7D00AFA389A4ACAAADAA7467BB88494"><enum>(2)</enum><text display-inline="yes-display-inline">the participation in the programs of students from populations referred to in section 230A of the Homeland Security Act of 2002, as added by section 101.</text>
 </paragraph></subsection><subsection id="H69564053531E4BDD8A03C5842263C689"><enum>(c)</enum><header>Limitation on amount of funding</header><text display-inline="yes-display-inline">For any fiscal year, no individual school’s after-school program shall receive more than $5,000 under this section.</text>
				</subsection></section><section id="H22694A55497B4BD6B78B15A8A1DABB1C"><enum>105.</enum><header>Science and Technology Board of Advisors</header>
 <subsection id="HCFD588868F4D4226A2CAB2F06D02E1EC"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">There is established in the Department of Homeland Security the <quote>Research K–12 Science and Technology Education Board of Advisors</quote> (hereinafter in this section referred to as the <quote>Board</quote>).</text> </subsection><subsection id="H8EE632ABC19D4240968B91FBBD3C8DE0"><enum>(b)</enum><header>Membership</header> <paragraph id="H77427C89A3F743E9AD101290D412172E"><enum>(1)</enum><header>Composition</header><text display-inline="yes-display-inline">The Board shall be composed of 15 members appointed by the Secretary of Homeland Security, all of whom shall have K–12 education expertise in programs. The Secretary shall appoint members based on the following qualifications:</text>
 <subparagraph id="H52AF263AB10C4D9495A375F95E0F4285"><enum>(A)</enum><text>Members of the Board shall have experience in K–12 science, technology, engineering, and mathematics education programs.</text>
 </subparagraph><subparagraph id="H184ACFE3F7CB4E52936243810A480C4F"><enum>(B)</enum><text display-inline="yes-display-inline">Members of the Board shall have experience in training K–12 educators on providing science and technology instruction.</text>
 </subparagraph><subparagraph id="H4BB32A5E7DEA492481DE790077051CBE"><enum>(C)</enum><text display-inline="yes-display-inline">Members of the Board shall have experience in the promotion of science and technology education among under represented populations, as defined by section 230A of the Homeland Security Act of 2002, as added by section 101.</text>
 </subparagraph></paragraph><paragraph id="HA74CAF98C592495A955922EA347D15EF"><enum>(2)</enum><header>Deadline for appointment</header><text>All members of the Board shall be appointed not later than 60 days after the date of the enactment of this Act.</text>
 </paragraph><paragraph id="H83F89A1885FB42DEA585E5DC40A9F594"><enum>(3)</enum><header>Vacancies</header><text>Any vacancy in the membership of the Board shall not affect its powers and shall be filled in the same manner in which the original appointment was made.</text>
					</paragraph><paragraph id="HEBD3C266816B4E0C98D28D84A6304A7B"><enum>(4)</enum><header>Compensation</header>
 <subparagraph id="H6CE230658D1145AFA7C1A74020FCED34"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Members of the Board shall not receive any compensation for their service.</text> </subparagraph><subparagraph id="H8EB40370198B4400AA2F16719D802697"><enum>(B)</enum><header>Travel expenses</header><text display-inline="yes-display-inline">While away from their homes or regular places of business in the performance of services for the Board, members of the Board shall be allowed travel expenses, including per diem in lieu of subsistence, in the same manner as persons employed intermittently in the Government service are allowed expenses under section 5703(b) of title 5, United States Code.</text>
 </subparagraph><subparagraph id="H430F48574C564A3E93367FBDC81AA27C"><enum>(C)</enum><header>Prohibition of consultant or contracting work</header><text>No member of the Board while serving in this capacity or for 1 year following departure from the Board may work as a consultant or contract worker for the Department of Homeland Security in a position related to the work of the Board or member agency that participates as a member of the Board.</text>
 </subparagraph></paragraph></subsection><subsection id="H2C98D35C0C1C454DBB6279A18F007EA1"><enum>(c)</enum><header>Responsibilities</header><text display-inline="yes-display-inline">The responsibilities of the Board are to research and make recommendations to the Secretary on—</text> <paragraph id="HB2A6A717EDE541FD9A5923B684F7CB3B"><enum>(1)</enum><text display-inline="yes-display-inline">the status of K–12 science and technology education domestically and internationally;</text>
 </paragraph><paragraph id="H74B07D0507D34423BD5E77549F3CE113"><enum>(2)</enum><text>how to increase the quality and diversity of science and technology curriculum;</text>
 </paragraph><paragraph id="HD03B537B68A241E6AF6D8557B532F14F"><enum>(3)</enum><text>promoting K–12 science and technology competitions;</text> </paragraph><paragraph id="HDD92C923531347DFB0D37DAAC3A1DF54"><enum>(4)</enum><text>establishing a virtual network to support teacher and student science and technology education and development;</text>
 </paragraph><paragraph id="H3A65B9789CA44F95A1976E26C4A89BBD"><enum>(5)</enum><text display-inline="yes-display-inline">ascertaining, evaluating, and reporting on best practices for project-based science and technology learning (as such term is defined in section 103(c)); and</text>
 </paragraph><paragraph id="H5404C3E0B5C2454E84A8E28DE58B5241"><enum>(6)</enum><text display-inline="yes-display-inline">identifying K–12 science and technology education efforts that are successful in engaging youth, with proven competence in engaging females, minorities, individuals residing in rural areas, individuals residing in majority minority districts, home schooled students.</text>
 </paragraph></subsection><subsection id="H0D04A035995D4A7B91EFAE7982848340"><enum>(d)</enum><header>Chair</header><text display-inline="yes-display-inline">The Chair of the Board shall be designated by the Secretary from among the members of the Board.</text> </subsection><subsection id="HDD96B0ED84BD466E841D4FBCFD454BC5"><enum>(e)</enum><header>Meetings</header> <paragraph id="H2E8EB7DEF8BA4215A1E52FEB861C793C"><enum>(1)</enum><header>Initial meeting</header><text display-inline="yes-display-inline">The Board shall meet and begin the operations of the Board by not later than 90 days after the date of the enactment of this Act.</text>
 </paragraph><paragraph id="H3C6BA270AD1647FFBCA6009C56FA5588"><enum>(2)</enum><header>Subsequent meetings</header><text display-inline="yes-display-inline">After its initial meeting, the Board shall set the time and place of its next meeting. The Board can upon the call of the chairman or a majority of its members meet.</text>
 </paragraph><paragraph id="H07B78EA041E4414CB3C3FAD86899BF5B"><enum>(3)</enum><header>Quorum</header><text display-inline="yes-display-inline">A majority of the Board shall constitute a quorum.</text> </paragraph><paragraph id="H4E25E19B754E45628DB219379A7EB0A2"><enum>(4)</enum><header>Voting</header><text>Proxy voting shall be allowed on behalf of a member of the Board.</text>
 </paragraph><paragraph id="H9D30DB6C8D5149F4827C6B7FAC2F913A"><enum>(5)</enum><header>Rules of procedure</header><text display-inline="yes-display-inline">The Board may establish rules for the conduct of the Board’s business, if such rules are not inconsistent with this section or other applicable law.</text>
					</paragraph></subsection><subsection id="HD1F7599F081E435AB493F8AE6637588A"><enum>(f)</enum><header>Powers</header>
 <paragraph id="HDFD8F05CC404405C8ACE378A34F24F7D"><enum>(1)</enum><header>Hearings and evidence</header><text display-inline="yes-display-inline">The Board or, on the authority of the Board, any subcommittee or member thereof, may, for the purpose of carrying out this title hold such hearings and sit and act at such times and places, take such testimony, receive such evidence, administer such oaths.</text>
 </paragraph><paragraph commented="no" id="H560991DBCBDA40B8B123BD5B43145647"><enum>(2)</enum><header>Federal agency staff</header><text display-inline="yes-display-inline">The Secretary shall make decisions regarding Federal agency staff to be detailed to support the work of the Board.</text>
 </paragraph><paragraph id="H63EBE43DC2674FB8B915308921DA12EF"><enum>(3)</enum><header>Contract authority</header><text display-inline="yes-display-inline">The Board may enter into contracts with the approval of the Secretary to such extent and in such amounts as necessary for the Board to discharge its duties under this section.</text>
					</paragraph><paragraph id="HA94F129E1BA34051BE614D188838EBE4"><enum>(4)</enum><header>Information from Federal agencies</header>
 <subparagraph id="HB876C0BCD27C49ADB57ADF8A6BC0309F"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">After providing notice to the Secretary who may provide staff from the Department to meet the staffing needs of the Board. After 10 working days following notice to the Secretary the Board is authorized to secure directly from any executive department, bureau, agency, board, office, independent establishment, or instrumentality of the Government, information, suggestions, estimates, and statistics for the purposes of this title. Each department, bureau, agency, board, office, independent establishment, or instrumentality shall, to the extent authorized by law, furnish such information, suggestions, estimates, and statistics directly to the Board, upon request made by the chairman, the chairman of any subcommittee created by a majority of the Board, or any member designated by a majority of the Board.</text>
 </subparagraph><subparagraph id="H61D653B42B8D4CDBB391751732FD1B25"><enum>(B)</enum><header>Receipt, handling, storage, and dissemination</header><text display-inline="yes-display-inline">Information shall only be received, handled, stored, and disseminated by members of the Board and its staff consistent with all applicable statutes, regulations, and Executive orders.</text>
						</subparagraph></paragraph><paragraph id="H275BFC8C5F2C4B2EBAC89FA17E46D562"><enum>(5)</enum><header>Assistance from Federal agencies</header>
 <subparagraph id="HA0C809346B224CD69035AE1FA7CA57FC"><enum>(A)</enum><header>General Services Administration</header><text display-inline="yes-display-inline">The Administrator of General Services shall provide to the Board on a reimbursable basis administrative support and other services for the performance of the Board's functions.</text>
 </subparagraph><subparagraph id="H83B2AE2BB6DB45548A178FE1F2333F42"><enum>(B)</enum><header>Other departments and agencies</header><text display-inline="yes-display-inline">In addition to the assistance prescribed in subparagraph (A), departments and agencies of the United States may provide to the Board such services, funds, facilities, staff, and other support services as they may determine advisable and as may be authorized by law.</text>
 </subparagraph><subparagraph id="HAB2A3188165E4C3687B6000F4C60B02E"><enum>(C)</enum><header>Postal services</header><text display-inline="yes-display-inline">The Board may use the United States mails in the same manner and under the same conditions as departments and agencies of the United States.</text>
						</subparagraph></paragraph></subsection><subsection id="H11D33B2EA99C478CBA19FC74CFF9198E"><enum>(g)</enum><header>Staff</header>
					<paragraph id="HB1DD926D42C2467896C1EAC7B4AA0FF5"><enum>(1)</enum><header>In general</header>
 <subparagraph id="HC5CFD1A8BD72455593801BA946C25DC1"><enum>(A)</enum><header>Appointment and compensation</header><text display-inline="yes-display-inline">The Chair, in accordance with rules agreed upon by the Board, may appoint and fix the compensation of a staff director and such other personnel as may be necessary to enable the Board to carry out its functions, without regard to the provisions of title 5, United States Code, governing appointments in the competitive service, and without regard to the provisions of chapter 51 and subchapter III of chapter 53 of such title relating to classification and General Schedule pay rates, except that no rate of pay fixed under this subsection may exceed the equivalent of that payable for a position at level V of the Executive Schedule under section 5316 of title 5, United States Code.</text>
						</subparagraph><subparagraph id="H17279C6BCB574DA782F1AE1D2D331D3A"><enum>(B)</enum><header>Personnel as Federal employees</header>
 <clause id="HD0469E5D9D9945CD9DA63D5C6AD411E4"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">The executive director and any personnel of the Board who are employees shall be employees under section 2105 of title 5, United States Code, for purposes of chapters 63, 81, 83, 84, 85, 87, 89, and 90 of that title.</text>
 </clause><clause id="H4A5E6329239543F8BB4B60C36B66E95B"><enum>(ii)</enum><header>Members of the Board</header><text>Clause (i) shall not be construed to apply to members of the Board.</text> </clause></subparagraph></paragraph><paragraph id="H93A8BC9F16614BCE8B604CF6F7434306"><enum>(2)</enum><header>Detailees</header><text display-inline="yes-display-inline">Any Federal Government employee may be detailed to the Board without reimbursement from the Board, and such detailee shall retain the rights, status, and privileges of his or her regular employment without interruption.</text>
 </paragraph><paragraph id="HDA23B46CC7B949FBA5165FA37518F3A3"><enum>(3)</enum><header>Administrative support from the department</header><text>At the request of the Board, the Secretary of Homeland Security shall provide the Board with Administrative support necessary for the Board to carry out its duties under this title.</text>
					</paragraph></subsection><subsection id="H9533B9AA51554A91B4C80DD3124F1ED9"><enum>(h)</enum><header>Reports</header>
 <paragraph id="H92EEDB20A4AA4649880870DC77C1A554"><enum>(1)</enum><header>Quarterly reports</header><text>The Board shall submit to the Secretary of Homeland Security quarterly reports on the activities of the Board.</text>
 </paragraph><paragraph id="H533D642F0CFD42E4836F31AA46A98195"><enum>(2)</enum><header>Final report</header><text>Not later than two years after the date of the enactment of this Act, the Board shall submit to the Secretary a final report containing such findings conclusions, and recommendations as have been agreed to by a majority of Board members.</text>
					</paragraph></subsection><subsection id="H649553C0C6AC4C81A9C34F76BEA4B5FE"><enum>(i)</enum><header>Applicability of FACA</header>
 <paragraph id="H12920BBA90A44D839EA1731287D46EEA"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Nothing in the Federal Advisory Committee Act (5 U.S.C. App.) shall apply to the Board.</text> </paragraph><paragraph id="H53144B4327C643A88F3654C6F3438868"><enum>(2)</enum><header>Public meetings and release of public versions of reports</header><text>The Board shall—</text>
 <subparagraph id="H46485149BA1B4997A97AC81D5F24C8CF"><enum>(A)</enum><text display-inline="yes-display-inline">hold public hearings and meetings to the extent appropriate; and</text> </subparagraph><subparagraph id="HF2F36C31584640118D7E28FC33ABBB9B"><enum>(B)</enum><text>release public versions of the reports required under subsection (h).</text>
 </subparagraph></paragraph><paragraph id="H44F8EE23463C4063BBA9F71D7295C017"><enum>(3)</enum><header>Public hearings</header><text display-inline="yes-display-inline">Any public hearings of the Board shall be conducted in a manner consistent with the protection of information provided to or developed for or by the Board as required by any applicable statute, regulation, or Executive order.</text>
 </paragraph></subsection><subsection id="HB1A3BA8E0B834615AD2676E2CFE61E5F"><enum>(j)</enum><header>Termination</header><text display-inline="yes-display-inline">The Board, and all the authorities of this title, shall terminate two years after the date of the Board’s first meeting, which shall take place 90 days following its appointment.</text>
 <paragraph id="HBE32A0EA13714E948AA034B6D474FEAD"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Board and all the authorities under this section shall terminate 60 days after the date on which the final report is submitted under subsection (h)(2).</text>
 </paragraph><paragraph id="H7D7172AFD55041A0BF1596493FB1198E"><enum>(2)</enum><header>Administrative activities before termination</header><text display-inline="yes-display-inline">The Board may use the 60-day period referred to in paragraph (1) for the purpose of concluding its activities, including providing testimony to committees of Congress concerning its reports and disseminating the final report.</text>
 </paragraph></subsection><subsection id="H1600D21B6A234484B3083646DDF0C9C0"><enum>(k)</enum><header>Funding</header><text display-inline="yes-display-inline">There is authorized to be appropriated such sums as may be necessary to carry out this section. Amounts made available pursuant to this subsection shall remain available until the termination of the Board.</text>
 </subsection></section><section id="H2C7C004B77974974B7187053C202D48E"><enum>106.</enum><header>Laboratories for science and technology excellence</header><text display-inline="no-display-inline">The Secretary of Homeland Security shall determine if existing authority allows the agency to make grants to local education agencies for the purpose of supplying laboratory facilities at secondary schools to promote the teaching of science, technology, engineering, and mathematics. If the Secretary determines that the authority does not exist shall make a report to congressional oversight committees detailing the limitation in agency authority to conduct activity under this section and make recommendations on the benefits if any should the agency have the authority to engage in the activity outlined in this section.</text>
			</section></title><title id="HA1E7E710E7AF46BE969471DE1D080C07"><enum>II</enum><header>Post-Secondary Computer and Information Security Education</header>
			<section id="H87E946D0B46741049161AF8F1EC81580"><enum>201.</enum><header>Computing and Information Research Working Group</header>
 <subsection id="H355FBCB078004F5A991CD1F105EE38A8"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">There is hereby established in the Department of Homeland Security the Computing and Information Security Post-Secondary Education Working Group, hereafter in this section referred to as the <quote>Working Group</quote>.</text>
 </subsection><subsection id="H3010784C041B4C73B865C28DE7F430EA"><enum>(b)</enum><header>Responsibilities</header><text display-inline="yes-display-inline">The Working Group shall conduct research and—</text> <paragraph id="HEAF3B7CC7FE64277A1F077286A1788EF"><enum>(1)</enum><text display-inline="yes-display-inline">assist the Secretary in developing voluntary guidelines that could serve as guidance to Federal civil agency training programs, computer and information security certification authorities, and accreditation bodies seeking guidance on developing, enhancing, or sustaining competitive information security; and</text>
 </paragraph><paragraph id="HA3C51DA312964CFAA9AD601D6A64BCAF"><enum>(2)</enum><text>make recommendations to the Secretary regarding—</text> <subparagraph id="HF2C9FE0A069B47F2BB0C99E6DC95E0A5"><enum>(A)</enum><text>the state of the computing and information security workforce development;</text>
 </subparagraph><subparagraph id="H887A4BFE3FBE4B28814FA076A973858B"><enum>(B)</enum><text>evaluations and reports on the advantages, disadvantages, and approaches to professionalizing the Nation’s computing and information security workforce;</text>
 </subparagraph><subparagraph id="H7BBA693486EF41FFBF01991489DB7688"><enum>(C)</enum><text>criteria that can be used to identify which, if any, specialty areas may require professionalization;</text>
 </subparagraph><subparagraph id="H332E8D2132B64B4698D4B3D298FCB5E1"><enum>(D)</enum><text>criteria for evaluating different approaches and tools for professionalization;</text> </subparagraph><subparagraph id="H9A06C21012E44181B88BA1C46C7BFAA6"><enum>(E)</enum><text>techniques that enhance the efficiency and effectiveness of computing and information security workers;</text>
 </subparagraph><subparagraph id="H322822E35B3D400DAFA493FBE6B576D4"><enum>(F)</enum><text>better tools and approaches for risk identification and assessment;</text> </subparagraph><subparagraph id="H22C685292C23442095F687E8D83C0108"><enum>(G)</enum><text>improved system design and development;</text>
 </subparagraph><subparagraph id="HFDCB1A6E22924EE9A58FFEAA45D3675A"><enum>(H)</enum><text>creation of better incentives for deployment of better computing and information security technologies;</text>
 </subparagraph><subparagraph id="HC7FA1C1972AE49A59D4B7B4FD2800C18"><enum>(I)</enum><text>improvements in end user behaviors through training and better coordination among network managers;</text> </subparagraph><subparagraph id="H3C7B3ED51A204EB89E258D0304301456"><enum>(J)</enum><text>core curriculum requirements for computing and information security training;</text>
 </subparagraph><subparagraph id="H5814CBE60CAA4FD5B6939688F4E75B2C"><enum>(K)</enum><text>efficacy and efficiencies of taxonomy and definitions for computer and information security;</text> </subparagraph><subparagraph id="H15C713DD0B8943B3899A060CB0F7B40A"><enum>(L)</enum><text>guidelines for accreditations and certification of computing and information security college and university programs;</text>
 </subparagraph><subparagraph id="H03D1FCCD550F456AB69ADE3E5ADA3281"><enum>(M)</enum><text>identifying the role of mentors in the retention of students enrolled in computing and technology programs at institutions of higher education who complete degree programs;</text>
 </subparagraph><subparagraph id="HFEB69233A5DD4DCDBBA5F026A35EFEED"><enum>(N)</enum><text>remote access to computing and information security education and training through the Internet; and</text>
 </subparagraph><subparagraph id="H8B9AFB52E30A416A83C1D3FF3A368F3D"><enum>(O)</enum><text>institution of higher education funding and research needs.</text> </subparagraph></paragraph></subsection><subsection id="H93EA12D878DF498690E0FB190C7971EE"><enum>(c)</enum><header>Deadline for submittal of research funding and recommendations</header> <paragraph id="HBFDFCC7AF3534943996658C85A071F61"><enum>(1)</enum><header>Initial research</header><text display-inline="yes-display-inline">The Working Group shall submit to the Secretary an initial research plan that will guide the work of the Working Group.</text>
 </paragraph><paragraph commented="no" id="HE06C62A883A4495D986825B9BB154AAC"><enum>(2)</enum><header>Other research recommendations</header><text>The Working Group shall provide the Secretary a list of other areas that require research to accomplish the purpose of the agency’s goal of providing cyber security protection for the agency. The Working Group shall provide a description of the proposed research and the purpose of the research as it relates to the goals of cybersecurity of the agency.</text>
 </paragraph><paragraph id="HEE84C56E8469434198025515E58F2367"><enum>(3)</enum><header>Initial recommendations</header><text>The Working Group shall submit to the Secretary initial recommendations under this section by not later than nine months after the date on which all of the members of the Working Group are appointed.</text>
 </paragraph><paragraph id="H18A09C76A3984F55AB5A4E66CAE599C4"><enum>(4)</enum><header>Other recommendations</header><text display-inline="yes-display-inline">Not later than six months after all members of the Working Group are appointed, the Working Group shall submit to the Secretary research and recommendations on the effectiveness of Federal civil agency computer and information security training programs, including an evaluation of certification authorities and their role in providing work ready staff to fill positions with the agency.</text>
 </paragraph><paragraph id="H0B0DB834ED444829B806DFD2131E6F22"><enum>(5)</enum><header>Subsequent research and recommendations</header><text display-inline="yes-display-inline">Not later than one year after the date of the submittal of the initial research and recommendations under paragraph (1), and annually thereafter, the Working Group shall submit to the Secretary subsequent research and recommendations under this section and an update on the progress made toward a well trained and sustainable Department computer and information workforce.</text>
					</paragraph></subsection><subsection id="HFDA7023E6F954993AAA8D22544793642"><enum>(d)</enum><header>Membership</header>
 <paragraph id="H0420085BF4C94C1DB87DC9C7FA2AC607"><enum>(1)</enum><header>Chair</header><text>The Chair of the Working Group shall be the Director of the National Institute of Standards and Technology or the Director’s designee.</text>
 </paragraph><paragraph commented="no" id="H6FAB124E56534E2798F6BE2D9C1CA839"><enum>(2)</enum><header>Other members</header><text display-inline="yes-display-inline">The Working Group shall be composed of 21 members, who are appointed by the Secretary of Homeland Security in consultation with the Director of NIST and the head of the entity represented by the member.</text>
 </paragraph><paragraph id="HD98909D2C68F4C74B1D347707AABC1D2"><enum>(3)</enum><header>Appointment</header><text>All appointments are for a term of 2 years with one reappointment for an additional 2 years.</text> </paragraph><paragraph id="HD54BD7F5C9B148AB915845CA311E3C2F"><enum>(4)</enum><header>Quorum</header><text display-inline="yes-display-inline">A majority of the members of the Working Group shall constitute a quorum.</text>
 </paragraph></subsection><subsection id="HF3C60509AE33464681E2227D0E95A223"><enum>(e)</enum><header>No compensation for service</header><text display-inline="yes-display-inline">While away from their homes or regular places of business in the performance of services for the Commission, members of the Commission shall be allowed travel expenses, including per diem in lieu of subsistence, in the same manner as persons employed intermittently in the Government service are allowed expenses under section 5703(b) of title 5, United States Code.</text>
 </subsection><subsection id="H4C43232AAE9C41D1B938B218B4494AB3"><enum>(f)</enum><header>Technical support from the Department of Homeland Security</header><text display-inline="yes-display-inline">At the request of the Working Group, the Secretary of Homeland Security shall provide the Working Group with technical support necessary for the Working Group to carry out its duties under this section.</text>
 </subsection><subsection id="H486D69373B1148ACB9BCF5CA9A61D71E"><enum>(g)</enum><header>Intellectual property rights</header><text display-inline="yes-display-inline">No private-sector individual or entity shall obtain any intellectual property rights to any guidelines or recommendations nor the contents of any guideline (or any modification to any guideline) adopted by the Secretary under this section.</text>
 </subsection><subsection id="H2142F3D2B7804B84831698245E57679E"><enum>(h)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than one year after the date of the enactment of this Act, the Working Group shall submit to the Secretary a report containing researching findings, an outline for other areas requiring research and why as well as recommendations of the Working Group.</text>
 </subsection><subsection id="H11661C9D8AF8465EAAF8802C832DA693"><enum>(i)</enum><header>Submittal of recommendations to Congress</header><text display-inline="yes-display-inline">Not later than 18 months after the date of the enactment of this Act, the Secretary shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report on the research findings, an outline of other areas requiring research and why and recommendations for furthering the cybersecurity of the agency.</text>
 </subsection><subsection id="H69BA60D4AB8041BC909B2191FAE2060E"><enum>(j)</enum><header>Treatment of recommendations</header><text display-inline="yes-display-inline">The Secretary has the benefit of the Working Group’s work which the Secretary may accept, reject, or modify. The Secretary shall not be bound by the recommendations of the Working Group.</text>
 </subsection><subsection id="H5CE04D124CD44E16B8FEFEFD09523A3D"><enum>(k)</enum><header>Publication of recommendations in Federal Register</header><text display-inline="yes-display-inline">The Secretary shall approve the publication of grant application guidelines in the Federal Register by not later than 90 days after receiving the report submitted under subsection (h).</text>
 </subsection><subsection commented="no" id="HCEB923BBCF5C49069E77A1A942EF97E1"><enum>(l)</enum><header>Applicability of FACA</header><text display-inline="yes-display-inline">Nothing in the Federal Advisory Committee Act (5 U.S.C. App.; relating to the termination of advisory committees) shall apply to the Working Group.</text>
				</subsection></section><section id="H95A89E369947418FAC0720438B73E748"><enum>202.</enum><header>Process for adoption research and a best practices voluntary guidelines for laboratory facilities</header>
 <subsection id="H17765D0DBAF04512A512CF5B1AE413B2"><enum>(a)</enum><header>Establishment of the Post-Secondary Laboratory Development Task Force</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall establish a <quote>Post-Secondary Laboratory Research Development Task Force</quote> (hereinafter in this section referred to as the <quote>Development Task Force</quote>).</text> </subsection><subsection id="HDF3DFA1DB81241B79F67DB904C49FC7F"><enum>(b)</enum><header>Responsibilities</header><text display-inline="yes-display-inline">The Development Task Force shall conduct research for and make recommendations to the Secretary regarding best practices voluntary guidelines for college and university laboratory facilities for education and research purposes related to information assurance, cybersecurity and computing security. Such research on what baseline equipment, capacity, skilled instruction, and certification may be needed for a set of best practices voluntary guidelines for colleague or university laboratories and make recommendations on the best methods of assuring that the greatest number of institutions have access to facilities that meet the baseline best practices regarding—</text>
 <paragraph id="H909BBC14A29645DABE843E59B457DF2B"><enum>(1)</enum><text display-inline="yes-display-inline">qualifications for laboratories for the purpose of providing education or instruction in computing security, computer networks, enterprises, informatics, and other systems designated by the Secretary;</text>
 </paragraph><paragraph id="HE6F07DB1F3F241A2BB54BBC05838D1DA"><enum>(2)</enum><text>types of software;</text> </paragraph><paragraph id="HB85363F586004951814D5ACB8C08F0D9"><enum>(3)</enum><text>types of hardware;</text>
 </paragraph><paragraph id="HDD76971A2B664637883C1943761652F3"><enum>(4)</enum><text>types of firmware;</text> </paragraph><paragraph id="H49503A1F792645F28630934A7C6B3F10"><enum>(5)</enum><text>security applications, including firewalls, whole hat hackers, red teams, and blue teams;</text>
 </paragraph><paragraph id="HB9656912BF344285A9E888365C5B6C99"><enum>(6)</enum><text>security protocols needed to protect the physical and computer resources of the laboratory;</text> </paragraph><paragraph id="HE295F2C448144CCBA19EEDD8FB265424"><enum>(7)</enum><text>accreditation and certification of college and university computer and information security laboratories;</text>
 </paragraph><paragraph id="H1EC5FE03E95243AF8EDA283DBF030296"><enum>(8)</enum><text>best practices for—</text> <subparagraph id="H3072BD0CEB0A464BA3C808905A33FB16"><enum>(A)</enum><text>public-private collaborations to support secondary and post-secondary laboratory facilities for computer or information security;</text>
 </subparagraph><subparagraph id="HEC3C9130FBD84280AC4D101EDD5557BD"><enum>(B)</enum><text>visiting guest lecture programs for business and Government information technology security experts; and</text>
 </subparagraph><subparagraph id="HC7A9173DF4A84E228124B9365C6560C0"><enum>(C)</enum><text>developing real world laboratory exercise and proficiency measures; and</text> </subparagraph></paragraph><paragraph id="HA57499A996064C3AAE959F84D8F8B80A"><enum>(9)</enum><text display-inline="yes-display-inline">how best to recruit and retain instructors with requisite degrees to teach computer and information security courses to undergraduate and graduate students.</text>
					</paragraph></subsection><subsection id="H1A6F2DAA08D046618DA7745AEA73ED86"><enum>(c)</enum><header>Membership</header>
 <paragraph id="HD3018B1972074E988E82F48BB466BE65"><enum>(1)</enum><header>Members</header><text display-inline="yes-display-inline">The Development Task Force shall be composed of 19 members, including the Chair. The Secretary of Homeland Security, in consultation with the head of the entity represented by the member agencies, shall appoint members. The Secretary shall appoint a chair from among the members of the Development Task Force. Such members shall consist of one representative of each of the following agencies:</text>
 <subparagraph id="HA038E0F9DB034F9894CBE2C1F222F09A"><enum>(A)</enum><text display-inline="yes-display-inline">The White House Office of Science and Technology Policy.</text> </subparagraph><subparagraph id="HDE51ECB417304055A383462711FB7D88"><enum>(B)</enum><text>The Office of the Director of National Intelligence.</text>
 </subparagraph><subparagraph id="H0AF3DB5386D34FE48C37C1AA442F47C1"><enum>(C)</enum><text>The Department of Energy.</text> </subparagraph><subparagraph id="HE340C9B9074047E79ABCD8ED04660FF6"><enum>(D)</enum><text>The Defense Advanced Research Projects Agency.</text>
 </subparagraph><subparagraph id="H28AB77993EAF4BD8B7311B9689975D25"><enum>(E)</enum><text>The Department of Commerce.</text> </subparagraph><subparagraph id="HFFDFF11BF21342E383000E67AA637F51"><enum>(F)</enum><text>The National Institutes of Health.</text>
 </subparagraph><subparagraph id="H84103D29F986443797FE342EF8E99314"><enum>(G)</enum><text>The National Institute of Science and Technology.</text> </subparagraph><subparagraph id="H8C8B642FF9B744428EF9CAD641D72065"><enum>(H)</enum><text>The National Science Foundation.</text>
 </subparagraph><subparagraph id="H63CA257ECFC84296A97030224D2ED4CD"><enum>(I)</enum><text>The Director of the Office of Personnel Management.</text> </subparagraph></paragraph><paragraph id="H49CDF584B0BA4137BC1BD62487A22C9B"><enum>(2)</enum><header>Other members</header><text display-inline="yes-display-inline">The Secretary shall consider for the other members of the Development Task Force representatives from organizations that advocate and promote professional development of professional and academic under represented areas and organizations with the mission of promoting professional development and academic excellence in information assurance, cybersecurity and computing security:</text>
 <subparagraph id="H790276AD85724240AF55D74CDF8EB0E0"><enum>(A)</enum><text>Organizations with the mission of advancing computing as a science and profession.</text> </subparagraph><subparagraph id="H79D5521A3169482A86F8A2073DED493D"><enum>(B)</enum><text>Organizations that promote information system security education.</text>
 </subparagraph><subparagraph id="HBC5B9BB470B145F9A6A05A68C6619CE5"><enum>(C)</enum><text>Professional associations that are well established and broadly recognized for the advancement of technology.</text>
 </subparagraph><subparagraph id="H4592103AE98E486A86CB3282B37DF7D4"><enum>(D)</enum><text>Professional associations that represent professionals and academics referred to in section 230A of the Homeland Security Act of 2002, as added by section 101.</text>
 </subparagraph><subparagraph id="H26749F207E004D88A9DF60CD7C4E563D"><enum>(E)</enum><text>K–12 science and technology programs that conduct successful after school and summer programs for under represented populations, rural communities and serve communities where unemployment is at least two percent higher than the national average.</text>
 </subparagraph><subparagraph id="H8D43673B6AC74983B7DB1B28F3F184BD"><enum>(F)</enum><text>Organizations that promote education of Native Americans or other indigenous peoples of the United States or its territories.</text>
 </subparagraph><subparagraph id="H4F6EF35AA7054623BB7FEA3DD3D1EA6F"><enum>(G)</enum><text>Regional diversity of public and private school districts that excel at science and technology education.</text>
 </subparagraph></paragraph><paragraph id="H22BDC8B07ABC4EFC86BA18DB2A2E251D"><enum>(3)</enum><header>Quorum</header><text display-inline="yes-display-inline">A majority of the members of the Development Task Force shall constitute a quorum.</text> </paragraph><paragraph id="H9935F097602A4B0CA79B97213FDF0DFD"><enum>(4)</enum><header>Voting</header><text>Proxy voting shall be allowed on behalf of a member of the Development Task Force.</text>
 </paragraph><paragraph id="H83C5E0109B444782AA64F41C5C16A763"><enum>(5)</enum><header>Rules of procedure</header><text>The Development Task Force may establish rules for the conduct of the Development Task Force’s business, if such rules are not inconsistent with this section or other applicable law.</text>
					</paragraph></subsection><subsection id="HA8827CB7BC314660A9CA3F754B9FA64A"><enum>(d)</enum><header>Powers</header>
 <paragraph id="HD84312238738440791433DC25E91EFF1"><enum>(1)</enum><header>Hearings and evidence</header><text>The Development Task Force or, on the authority of the Development Task Force, or any subcommittee or member thereof, may, for the purpose of carrying out this section hold such hearings and sit and act at such times and places, take such testimony, receive such evidence, and administer such oaths.</text>
 </paragraph><paragraph id="H928A4A3ECAA546C0B71C3096BB60EC83"><enum>(2)</enum><header>Contract authority</header><text display-inline="yes-display-inline">After giving notice to the Secretary who may substitute agency staff with the requisite skills to fill a position needed by the Board at no additional cost to the Board. After 10 working days following notice to the Secretary the Development Task Force may enter into contracts to such extent and in such amounts as necessary for the Development Task Force to discharge its duties under this section.</text>
					</paragraph><paragraph id="H680188A170044A98A09C25D08FB08B29"><enum>(3)</enum><header>Information from federal agencies</header>
 <subparagraph id="HBCA9B4E252E347B988C2C0133702FA60"><enum>(A)</enum><header>In general</header><text>The Development Task Force is authorized to secure directly from any executive department, bureau, agency, board, office, independent establishment, or instrumentality of the Government information, suggestions, estimates, and statistics for the purposes of this section. Each department, bureau, agency, board, office, independent establishment, or instrumentality shall, to the extent authorized by law, furnish such information, suggestions, estimates, and statistics directly to the Board, upon request made by the chairman, the chairman of any subcommittee created by a majority of the Board, or any member designated by a majority of the Board.</text>
 </subparagraph><subparagraph id="H3157CD3E419949C78320C83EE8D15F34"><enum>(B)</enum><header>Receipt, handling, storage, and dissemination</header><text>Information shall only be received, handled, stored, and disseminated by members of the Board and its staff consistent with all applicable statutes, regulations, and Executive orders.</text>
						</subparagraph></paragraph><paragraph id="H74958D2750774B888EFCC326BA0BEB26"><enum>(4)</enum><header>Assistance from federal agencies</header>
 <subparagraph id="H43D8C6C9178F4A8BBE02E8AFA5DAA0F2"><enum>(A)</enum><header>General services administration</header><text>The Administrator of General Services shall provide to the Development Task Force on a reimbursable basis administrative support and other services for the performance of the Board’s functions.</text>
 </subparagraph><subparagraph id="H1CA75D6D47CF4D1A9DDADD58A7048439"><enum>(B)</enum><header>Other departments and agencies</header><text>In addition to the assistance prescribed in subparagraph (A), departments and agencies of the United States may provide to the Board such services, funds, facilities, staff, and other support services as they may determine advisable and as may be authorized by law.</text>
 </subparagraph><subparagraph id="H740D8F191CC44258A278C8B3967D5929"><enum>(C)</enum><header>Postal services</header><text>The Development Task Force may use the United States mails in the same manner and under the same conditions as departments and agencies of the United States.</text>
						</subparagraph></paragraph></subsection><subsection id="H70B9A3CE9797406C8F935044CA44A68A"><enum>(e)</enum><header>Staff</header>
 <paragraph id="H5F7EBFEFF4EF497DA2A8487E9E9BF80C"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">While away from their homes or regular places of business in the performance of services for the Commission, members of the Commission shall be allowed travel expenses, including per diem in lieu of subsistence, in the same manner as persons employed intermittently in the Government service are allowed expenses under section 5703(b) of title 5, United States Code.</text>
					</paragraph><paragraph id="H18BF1773F53B48EB81B3E119FD024836"><enum>(2)</enum><header>Personnel as federal employees</header>
 <subparagraph id="H919C9291C0D54A018ED8D8D2F05805A9"><enum>(A)</enum><header>In general</header><text>The executive director and any personnel of the Development Task Force who are employees shall be employees under section 2105 of title 5, United States Code, for purposes of chapters 63, 81, 83, 84, 85, 87, 89, and 90 of that title.</text>
 </subparagraph><subparagraph id="HD5366DEAC03E4A828504BFF3796FC6EE"><enum>(B)</enum><header>Members of the development task force</header><text>Subparagraph (A) shall not be construed to apply to members of the Development Task Force.</text> </subparagraph></paragraph><paragraph id="HE3E6745D09B24E229A69F982821933F4"><enum>(3)</enum><header>Detailees</header><text>Any Federal Government employee may be detailed to the Board without reimbursement from the Development Task Force, and such detailee shall retain the rights, status, and privileges of his or her regular employment without interruption.</text>
 </paragraph></subsection><subsection id="H168327F1ED9F418D90DBE41B0B833B59"><enum>(f)</enum><header>No compensation for service</header><text display-inline="yes-display-inline">Members of the Development Task Force shall not receive any compensation for their service, but shall be paid travel expenses, including per diem in lieu of subsistence, at rates authorized for employees of agencies under subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/57">chapter 57</external-xref> of title 5, United States Code, while away from their homes or regular places of business in the performance of services for the Development Task Force.</text>
 </subsection><subsection id="HCF98F6C33289439F8A34BE91FA8EB639"><enum>(g)</enum><header>Prohibition of consultant or contracting work</header><text>No member of the Development Task Force while serving in this capacity or for 1 year following departure from the Development Task Force may work as a consultant or contract worker for the Department of Homeland Security in a position related to the work of the Development Task Force or member agency that participates as a member of the Development Task Force.</text>
 </subsection><subsection commented="no" id="H670A06C55BAD4F419A757978346C6DDE"><enum>(h)</enum><header>Report</header><text display-inline="yes-display-inline">The Development Task Force shall submit a report to the Secretary of Homeland Security; a report on research findings, best practices voluntary guidelines and recommendations to the Secretary. The report shall be in unclassified form but may include a classified annex.</text>
 </subsection><subsection id="H7AAE8ADE2147403E86E5A102752C16B0"><enum>(i)</enum><header>Secretary of Homeland Security report</header><text display-inline="yes-display-inline">The Secretary shall submit to Congress a report on the work of the Development Task Force’s research into best practices voluntary guidelines, areas that require additional study and a set of recommendations. The Secretary shall indicate to the Congress which Development Task Force recommendations have been implemented, which will be implemented, or which will be rejected and why.</text>
 </subsection><subsection id="H94CC630258D34DDCAAD807256ADA6B32"><enum>(j)</enum><header>Technical support from the Department</header><text display-inline="yes-display-inline">At the request of Development Task Force the Secretary of Homeland Security shall provide the Development Task Force with technical support necessary for the Development Task Force to carry out its duties under this section.</text>
 </subsection><subsection id="HD6031D60BFA94398B0DCD59D0EFFC198"><enum>(k)</enum><header>Intellectual property</header><text display-inline="yes-display-inline">No private-sector individual or entity serving on the Development Task Force shall obtain any intellectual property rights to any guidelines or recommendations that derive from the work of the Development Task Force or any guidelines (or any modification to any guidelines) based on the work of the Development Task Force.</text>
 </subsection><subsection id="H648078A658E549428809E5E130C3141D"><enum>(l)</enum><header>Prohibition of consultant or contracting work</header><text>No member of the Development Task Force while serving in this capacity or for 1 year following departure from the Development Task Force may work as a consultant or contract worker in a position related to the direct work of the Development Task Force to the Department of Homeland Security or member agency that participates as a member of the Development Task Force.</text>
				</subsection></section><section id="H89CDD42873F642DAA81722F40563E774"><enum>203.</enum><header>Computing and information security mentoring programs for college students</header>
				<subsection id="H3A3846A9C85E43E6A43CF5C5CF971001"><enum>(a)</enum><header>Office of Cybersecurity and Information Security Professional’s Mentoring Program</header>
 <paragraph id="H2551AACAFF5B468D80BA70221A9B7D5D"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/141">6 U.S.C. 141</external-xref> et seq.) is further amended by adding at the end the following new section:</text>
						<quoted-block display-inline="no-display-inline" id="HE5700ADD62E3425BBBED47969B3E16BC" style="OLC">
							<section id="H5ECA5684F61848F09FE49B597F2D5567"><enum>230B.</enum><header>Office of Computing and Information Security Professional’s Mentoring Program</header>
 <subsection id="H05C1AA473AF047E5B16D408A971E804D"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">There is in the Department an Office of Computing and Information Security Professional’s Mentoring Program. The head of the office is the Mentoring Coordinator, who shall be appointed by the Secretary.</text>
 </subsection><subsection id="H12ED25C253714FBAA2AA4E549668F512"><enum>(b)</enum><header>Responsibilities</header><text display-inline="yes-display-inline">The Mentoring Coordinator shall be responsible for working with outreach to institution of higher education, critical infrastructure owners, and the heads of Federal departments and agencies to develop and promote the participation of professionals as volunteer mentors to—</text>
 <paragraph id="HD747C6112902424F8B7DAE89F654E6B1"><enum>(1)</enum><text display-inline="yes-display-inline">undergraduate students at institutions of higher education who are enrolled in the third or fourth year of a program of education leading to a degree in computing or information security;</text>
 </paragraph><paragraph id="H323F3CBC4FF348C696B24019AAF9C0EE"><enum>(2)</enum><text>students enrolled in a program of education leading to a doctoral degree in computing or information security; and</text>
 </paragraph><paragraph id="H375F83EF39994249B940B0E4EFAAD132"><enum>(3)</enum><text>new employees of Federal departments and agencies whose primary responsibilities relate to computing or information security.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph><paragraph id="HA72B5F357CA147F39FE88BC305368C0A"><enum>(2)</enum><header>Clerical amendment</header><text>The table of contents in section 1(b) of such Act is further amended by inserting after the item relating to section 230A the following new item:</text>
						<quoted-block display-inline="no-display-inline" id="H7B8AA91C88F1487CA744379DDC2AF390" style="OLC">
							<toc regeneration="no-regeneration">
								<toc-entry level="section">Sec. 230B. Office of Computing and Information Security Professional’s Mentoring Program.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></subsection><subsection id="H121F6FE7D178460EBD50D249AD4E6E31"><enum>(b)</enum><header>Grant program</header>
 <paragraph id="H37B6EB70C8604C78860CD386DCE046C1"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall determine existing authority to make grants to covered institutions of higher learning for the establishment of mentoring programs for undergraduates enrolled in programs or courses of education in information assurance, cybersecurity or computing security programs.</text>
 </paragraph><paragraph id="HC135C8CD3DAC44EFBC5731304DEBA867"><enum>(2)</enum><header>Covered institutions of higher learning</header><text display-inline="yes-display-inline">For purposes of this subsection, the term <quote>covered institution of higher learning</quote> means those institutions as defined in section 371 of the Higher Education Act of 1965 and listed in section 101 of this bill.</text>
					</paragraph></subsection></section><section id="H8E99FEE519364ABE8E142BFD365495DE"><enum>204.</enum><header>Grants for computer equipment</header>
 <subsection id="H46182283D3E24E92A5B9BC6146D76A7A"><enum>(a)</enum><header>Grants</header><text display-inline="yes-display-inline">The Secretary of Homeland Security may make grants to post-secondary institutions that offer courses or degrees in computing or information security to be used to establish or equip a computer laboratory to be made available to students and faculty for both teaching and research purposes.</text>
 </subsection><subsection commented="no" id="H837C451DA592443096CE62AB4CFF31C2"><enum>(b)</enum><header>Technical support</header><text display-inline="yes-display-inline">The Secretary shall ensure that each recipient of a grant under this section also receives technical support on the use and proper function of equipment and software.</text>
 </subsection><subsection id="H488838D47CDB44749B9009269002E5C6"><enum>(c)</enum><header>Publication in Federal Register</header><text display-inline="yes-display-inline">The Secretary shall publish the name of each institution of higher education that receives a grant under this section and the amount of such grant.</text>
 </subsection><subsection id="HBAE42E47B58246D0B2EFB1EF90D449E0"><enum>(d)</enum><header>Qualification</header><text display-inline="yes-display-inline">In making grants under this section, the Secretary—</text> <paragraph id="H375583563D654A92B2D27CD786707C9B"><enum>(1)</enum><text>shall take into consideration whether more than 50 percent of the students at an institution are taking online or distance learning computer science and information security courses; and</text>
 </paragraph><paragraph id="HF8F1DAE10D9F48EDB2D22908AF264E63"><enum>(2)</enum><text>may establish guidance to institutions for entering into laboratory facilities sharing agreements to allow institutions to qualify for grants under this section.</text>
					</paragraph></subsection></section><section id="H53092957A7824631A7E1BBA410782C40"><enum>205.</enum><header>Centers of Academic Computing and Information Assurance</header>
 <subsection id="H076E4758359D4522AC879D6B302CC631"><enum>(a)</enum><header>Program established</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall establish a program for Centers of Academic Computer and Information Assurance Distinction.</text>
				</subsection><subsection id="HEB3A0A8D4B2A4D9481344957AC0A900B"><enum>(b)</enum><header>Designation of Centers</header>
 <paragraph id="H8F15A1163C574359B6C7F72D499B26C7"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Secretary may designate five colleges or universities as Centers of Distinction for Academic Computing and Information Security Assurance each year with no limit to the total number of such Centers that may be established. The Secretary may make public the Centers for Distinction in Academic Computing and Information Security Assurance.</text>
 </paragraph><paragraph id="H8F63C58B351C4714861B35DE787AB479"><enum>(2)</enum><header>Revocation of designations</header><text display-inline="yes-display-inline">The Secretary may revoke the designation of a Center of Distinction for Academic Computing and Information Security Assurance.</text>
 </paragraph><paragraph id="H89AF763509644897AC8526541A569DAA"><enum>(3)</enum><header>Criteria</header><text display-inline="yes-display-inline">The Secretary shall make available information regarding the criteria for designating an institution as a Center of Distinction for Academic Computing and Information Security Assurance under this section.</text>
 </paragraph><paragraph id="H78D975E786F24CE89E2AAC93E1DC40AE"><enum>(4)</enum><header>Distance learning</header><text display-inline="yes-display-inline">In designating Centers under this section, the Secretary shall consider the number of students who are enrolled in distance learning computer or information security courses and whether collaborations for in laboratory instruction through shared arrangements with established information assurance, cybersecurity computing security programs at secondary education programs that laboratory facilities that meet best practices as outlined by the Secretary would be sufficient to meet the requirements established under this section.</text>
 </paragraph></subsection><subsection id="HB9AC1E0DED5847879FB334FB25F229B7"><enum>(c)</enum><header>Outreach</header><text display-inline="yes-display-inline">The Secretary shall identify and report on the success of efforts to reach under represented populations in the field of computing and information security through work with institutions as defined under section 371 of the Higher Education Act of 1965 listed in section 101 of this bill.</text>
 </subsection><subsection id="HDCD09176FB3A4A77BDBF2B6C5366846B"><enum>(d)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 220 days after the date of the enactment of this Act, the Secretary shall submit to Congress recommendations regarding distance learning computer and information security programs for meeting the cybersecurity professional requirements of the agency.</text>
 </subsection><subsection id="H9CA2BCBB0C7243B28325A6F55FA5B068"><enum>(e)</enum><header>Consideration of programs</header><text>The Secretary may consider the following when making grants to postsecondary education institutions and private sector entities who are contracted, provided grants or funds to conduct research on information assurance, cybersecurity and computing security to advance the agency’s cybersecurity capacity:</text>
 <paragraph id="H57A12A6AC9A6487A9513F7843B7B55C1"><enum>(1)</enum><text>Institutions designated as a Center of Distinction for Academic Computing and Information Security Assurance.</text>
 </paragraph><paragraph id="H978C5CF858124801AB7479465ED904A0"><enum>(2)</enum><text>Institutions who have established academic mentoring and program development partnerships related to information assurance, cybersecurity, and computing security academic programs with institutions defined under section 371 of the Higher Education Act of 1965 listed in section 101 of this bill.</text>
					</paragraph></subsection></section></title><title id="H4CDFF3D1D64E4B37AD8731B78A466A67"><enum>III</enum><header>Federal Workforce Computer and Information Security Professional Development</header>
			<section commented="no" id="H84BC3408ECC0455989225DEFF79D8AB4"><enum>301.</enum><header>Lifelong learning in computer and information security study</header>
 <subsection commented="no" id="HAA6906C0BCA74059A4F324B859FA3081"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall establish a program to be known as the <quote>Lifelong Computer and Information Security Study</quote>. Such program shall be designed to promote computer and information security professionals among Federal civilian agencies, critical infrastructure, and the general public by supporting post-employment education and training.</text>
 </subsection><subsection commented="no" id="H436A6925D61B4E7D9AD441BD39C5CC43"><enum>(b)</enum><header>Discretion of Secretary</header><text display-inline="yes-display-inline">The Secretary shall have the discretion to determine the best methods for accomplishing the objective of this section.</text>
 </subsection><subsection commented="no" id="H449661AAFB6E4E309A06C647B57C0F03"><enum>(c)</enum><header>Reports</header><text>The Secretary shall periodically submit to Congress a report on the implementation of this section.</text> </subsection></section><section id="H8274E6795748482E9430BDC75927A9ED" section-type="subsequent-section"><enum>302.</enum><header>Computer and information security job opportunities program</header> <subsection id="H3C94025863574D0B890F86058AADBD14"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Secretary of Homeland Security, acting through the Deputy Assistant Secretary for Cybersecurity Education and Awareness, shall establish, in conjunction with the National Science Foundation, a program to award grants to institutions of higher education (and consortia thereof) for—</text>
 <paragraph id="H556FCDFDE7E04A9495256176498DFA96"><enum>(1)</enum><text>the establishment or expansion of computer and information security professional development programs;</text>
 </paragraph><paragraph id="H7927508E57D8424DB52B827E012BC581"><enum>(2)</enum><text>the establishment or expansion (or both) of associate degree programs in computer and information security; and</text>
 </paragraph><paragraph id="HA3E58F2FD0284BEF9C742F8419F70936"><enum>(3)</enum><text>the purchase of equipment to provide training in computer and information security for either professional development programs or degree programs.</text>
 </paragraph></subsection><subsection id="H133E146DB0564D73B1DDDA9A22E0B188"><enum>(b)</enum><header>Goals and criteria</header><text display-inline="yes-display-inline">The Secretary, acting through the Deputy Assistant Secretary and in consultation with the Working Group established under section 201, shall establish the goals for the program under this section and the criteria for awarding grants.</text>
				</subsection><subsection id="H09582FAAFDFA42F6AF3A1928024AE23B"><enum>(c)</enum><header>Awards</header>
 <paragraph commented="no" id="H4B03C5A153AE452CA822069D0B1885A5"><enum>(1)</enum><header>Peer review</header><text>All awards under this section shall be provided on a competitive, merit-reviewed basis. The peer review process shall be published in the Federal Register. Those serving in a peer review role shall do so for 2 years with an option for 1 additional term. Applicants in the event of a denial of an award shall be provided with a detailed explanation for the denial.</text>
 </paragraph><paragraph id="H3CF7DF8B0A70486C8C278A4760697730"><enum>(2)</enum><header>Focus</header><text>In making awards under this section, the Deputy Assistant Secretary shall, to the extent practicable, ensure geographic diversity and the participation of women and under represented minorities.</text>
 </paragraph><paragraph id="H1CFFEB782D5F4964856B1F93F3930841"><enum>(3)</enum><header>Preference</header><text display-inline="yes-display-inline">In making awards under this section, the Deputy Assistant Secretary shall—</text> <subparagraph id="H485C50B93A7E45DD82C48DC45EB42625"><enum>(A)</enum><text>give preference to applications submitted by consortia of institutions, to encourage as many students and professionals as possible to benefit from the program established under this section;</text>
 </subparagraph><subparagraph id="HBB69920C00C24584950119335660C5D6"><enum>(B)</enum><text display-inline="yes-display-inline">give preference to any application submitted by a consortium of institutions that includes at least one institution that is eligible to receive funds under title III or V of the Higher Education Act of 1965; and</text>
 </subparagraph><subparagraph id="H04B823E4A0014DE6B03D4B1ABA2F32B7"><enum>(C)</enum><text display-inline="yes-display-inline">consider the enrollment of students in online and distance learning courses.</text> </subparagraph></paragraph></subsection><subsection commented="no" id="H44851C09C2354FF987918745EA4CF0CB"><enum>(d)</enum><header>Institution of higher education defined</header><text>In this section the term <term>institution of higher education</term> has the meaning given that term in section 101(a) of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001(a)</external-xref>).</text>
				</subsection></section><section id="H02585A99E91044AFB01123A873448F9B" section-type="subsequent-section"><enum>303.</enum><header>Department of Homeland Security Cybersecurity training programs and equipment</header>
 <subsection id="HD83EA860380C47458F84FCE8D28E58C4"><enum>(a)</enum><header>In general</header><text>The Secretary of Homeland Security, acting through the Assistant Secretary of Cybersecurity, shall establish, in conjunction with the National Science Foundation, a program to award grants to institutions of higher education (and consortia thereof) for—</text>
 <paragraph id="HC2EE8DD2D7914D8889DF0605D0DAE80A"><enum>(1)</enum><text>the establishment or expansion of cybersecurity professional development programs;</text> </paragraph><paragraph id="H722DC43832D145769EA681ACC7964397"><enum>(2)</enum><text>the establishment or expansion (or both) of associate degree programs in cybersecurity; and</text>
 </paragraph><paragraph id="H210503AD6D3E4BC5B0CC940EBD58F020"><enum>(3)</enum><text>the purchase of equipment to provide training in cybersecurity for either professional development programs or degree programs.</text>
					</paragraph></subsection><subsection id="H6AC2EDB5C44F4B03A6CC6A7002EF753E"><enum>(b)</enum><header>Roles</header>
 <paragraph id="HFD4C3D5E687D49CA919D9B779D96643F"><enum>(1)</enum><header>Department of Homeland Security</header><text>The Secretary, acting through the Assistant Secretary and in consultation with the Director of the National Science Foundation, shall establish the goals for the program established under this section and the criteria for awarding grants.</text>
 </paragraph><paragraph id="H239D02F25B3D4814A6308C2DC859ACAF"><enum>(2)</enum><header>National Science Foundation</header><text>The Director of the National Science Foundation shall operate the program established under this section consistent with the goals and criteria established under paragraph (1), including soliciting applicants, reviewing applications, and making and administering awards. The Director may consult with the Assistant Secretary in selecting awardees.</text>
 </paragraph><paragraph id="H16B23AFC64E8435FA20C177CA0B81B9E"><enum>(3)</enum><header>Funding</header><text>The Secretary shall transfer to the National Science Foundation the funds necessary to carry out this section.</text>
					</paragraph></subsection><subsection id="H554DCB96A15D4650974B6E7A22A36122"><enum>(c)</enum><header>Awards</header>
 <paragraph id="H7E5D500B2C5F442FBD3529A75341DB4E"><enum>(1)</enum><header>Peer review</header><text>All awards under this section shall be provided on a competitive, merit-reviewed basis.</text> </paragraph><paragraph id="HC29AA15369CF484D9879A56DB1CBF410"><enum>(2)</enum><header>Focus</header><text>In making awards under this section, the Director shall, to the extent practicable, ensure geographic diversity and the participation of women and under represented minorities.</text>
 </paragraph><paragraph id="HE14ACB3FC0644DF59CCFDC46E987ED57"><enum>(3)</enum><header>Preference</header><text>In making awards under this section, the Director—</text> <subparagraph id="H85111DD3723D4E408ABB0D21F4D26F84"><enum>(A)</enum><text>shall give preference to applications submitted by consortia of institutions, to encourage as many students and professionals as possible to benefit from the program established under this section; and</text>
 </subparagraph><subparagraph id="HD656BADBAE734D579DF561417C7F1BD0"><enum>(B)</enum><text display-inline="yes-display-inline">shall give preference to any application submitted by a consortium of institutions that includes at least one institution that is eligible to receive funds under title III or V of the Higher Education Act of 1965.</text>
 </subparagraph></paragraph></subsection><subsection id="H51FC05AEE67B44B996B2DE5A21157296"><enum>(d)</enum><header>Institution of higher education defined</header><text>In this section the term <quote>institution of higher education</quote> has the meaning given that term in section 101(a) of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001(a)</external-xref>).</text>
 </subsection><subsection id="HC2D37FE0AE45458EA20C52AAC076D319"><enum>(e)</enum><header>Authorization of appropriations</header><text>There is authorized to be appropriated to the Secretary for carrying out this section $3,700,000 for each of fiscal years 2016 and 2017.</text>
				</subsection></section><section display-inline="no-display-inline" id="H9B7A038D936343BE95BBD8739A5C3E1C" section-type="subsequent-section"><enum>304.</enum><header>E-Security Fellows Program</header>
 <subsection id="H193A24297BA24A1782CE8EBE581B9FFE"><enum>(a)</enum><header>Establishment of program</header><text>Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C. 121</external-xref> et seq.) is further amended by adding at the end the following:</text>
					<quoted-block display-inline="no-display-inline" id="H07C67FFCC8114EB499613C5CF9D5B61E" style="OLC">
						<section id="H1AF1B74ACC3942E2A0362DAD5D6AEB87"><enum>230C.</enum><header>E-Security Fellows Program</header>
							<subsection id="H6BA98BF9F5374A60AAC4AE5699439B8F"><enum>(a)</enum><header>Establishment</header>
 <paragraph id="H8373B66D49844145AF22FC17593B00E1"><enum>(1)</enum><header>In general</header><text>The Secretary shall establish a fellowship program in accordance with this section for the purpose of bringing State, local, tribal, and private sector officials to participate in the work of the National Cybersecurity Division in order to become familiar with the Department’s stated cybersecurity missions and capabilities, including but not limited to—</text>
 <subparagraph id="H1F703D7D9E9F496EA217964EA47B69BE"><enum>(A)</enum><text>enhancing Federal, State, local, and tribal government cybersecurity;</text> </subparagraph><subparagraph id="HAC81A8C94D334600881497C4BAB03F68"><enum>(B)</enum><text>developing partnerships with other Federal agencies, State, local, and tribal governments, and the private sector;</text>
 </subparagraph><subparagraph id="HCC7ADB9DE5544AB1819BB60FF628B57A"><enum>(C)</enum><text>improving and enhancing public/private information sharing involving cyber attacks, threats, and vulnerabilities;</text>
 </subparagraph><subparagraph id="H4B9A9AECE930489BA9C43CC4E3F054C3"><enum>(D)</enum><text>providing and coordinating incident response and recovery planning efforts; and</text> </subparagraph><subparagraph id="HF39296B3CFCC4FF6A3DE8D71891BC05A"><enum>(E)</enum><text>fostering training and certification.</text>
 </subparagraph></paragraph><paragraph id="HC3CA21F9A3534B4588475E0043648BBE"><enum>(2)</enum><header>Program name</header><text>The program under this section shall be known as the E-Security Fellows Program.</text> </paragraph></subsection><subsection id="HE642DD2C37BF486D873B93509A164537"><enum>(b)</enum><header>Eligibility</header><text>In order to be eligible for selection as a fellow under the program, an individual must—</text>
 <paragraph id="HAD4197BDD15D4F7D921D91F8971799AD"><enum>(1)</enum><text>have cybersecurity-related responsibilities; and</text> </paragraph><paragraph id="HD1C13736F8004243B780F9FD25C25A7C"><enum>(2)</enum><text>be eligible to possess an appropriate national security clearance.</text>
 </paragraph></subsection><subsection id="HCB59DBF4004645098BF11BA15C2735CF"><enum>(c)</enum><header>Limitations</header><text>The Secretary—</text> <paragraph id="HABDDC137F0AE49D2A924A63CDFADD318"><enum>(1)</enum><text>may conduct up to 2 iterations of the program each year, each of which shall be 180 days in duration; and</text>
 </paragraph><paragraph id="H9D5B0B6C4FE84E37B47E99BFA12E8752"><enum>(2)</enum><text>shall ensure that the number of fellows selected for each iteration does not impede the activities of the Division.</text>
 </paragraph></subsection><subsection id="HBF3FA071826A415A87D24C29022F6AE5"><enum>(d)</enum><header>Condition</header><text>As a condition of selecting an individual as a fellow under the program, the Secretary shall require that the individual’s employer agree to continue to pay the individual’s salary and benefits during the period of the fellowship.</text>
 </subsection><subsection id="HC8F2728AA1C1469794A098FACAEC84CE"><enum>(e)</enum><header>Stipend</header><text>During the period of the fellowship of an individual under the program, the Secretary shall, subject to the availability of appropriations, provide to the individual a stipend to cover the individual’s reasonable living expenses during the period of the fellowship.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="HB0D9FAE718BC4B1CB6B0A5006C8076D5"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents in section 1(b) of such Act is amended by adding at the end of the items relating to such subtitle the following:</text>
					<quoted-block display-inline="no-display-inline" id="H36D7118779AA4861912326F37FC9C7DB" style="OLC">
						<toc container-level="quoted-block-container" idref="H07C67FFCC8114EB499613C5CF9D5B61E" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
							<toc-entry idref="H1AF1B74ACC3942E2A0362DAD5D6AEB87" level="section">Sec. 230C. E-Security Fellows Program.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section></title><title id="H5BF520B69AAD48A5AE4B8657D8C3E7DA"><enum>IV</enum><header>Research</header>
			<section id="H9D3505D2351148A184FD8916188F596B"><enum>401.</enum><header>National Science Foundation study on science and technology student retention</header>
 <subsection id="H3434350D42C24858B813F887A21AC7CE"><enum>(a)</enum><header>Study</header><text display-inline="yes-display-inline">The National Science Foundation shall conduct a study on the causes of the high dropout rates of women and minority students enrolled in programs of education leading to degrees in science, technology, engineering, and mathematics and the effects of such dropout rates on the cost of education for such students and the shortage of workers qualified for jobs in science and technology.</text>
 </subsection><subsection id="HD5050B82B061461D989ABF727B47C0E8"><enum>(b)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the National Science Foundation shall submit to Congress a report on the study conducted under subsection (a) together with any recommendations of the National Science Foundation.</text>
				</subsection></section><section id="HB55CDC3D89AB4B398BC8B39F800AB12D"><enum>402.</enum><header>Challenge Grants</header>
 <subsection id="H43085B3CAA7A47409A0AA9DA29480FA1"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Secretary of Homeland Security shall make grants to the Center of Distinction for Academic Computing and Information Security Assurance, which shall be known as <quote>Challenge Grants</quote>. The recipient of a grant under this section shall use the grant to form a partnership with section 230A of the Homeland Security Act of 2002, as added by section 101 to assist in improving the computing programs of such colleges and universities and meeting the requirements to become a Center of Distinction for Academic Computing and Information Security. The Secretary shall ensure that the institutions that receive assistance under this subsection are the institutions as defined under section 371 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1067q">20 U.S.C. 1067q</external-xref>).</text>
 </subsection><subsection id="HDACFD654411B412C949D6256BADDA0D9"><enum>(b)</enum><header>Report</header><text display-inline="yes-display-inline">The Secretary shall submit to Congress a report on the outcomes of the partnerships funded by grants under this section and shall include in such report the recommendations of the Secretary regarding improving the access of the population served by the institutions of higher education described in subsection (a).</text>
				</subsection></section><section display-inline="no-display-inline" id="H9DEFCACD7FE54303AD36F686633A56E4" section-type="subsequent-section"><enum>403.</enum><header>E-Security Fellows Program</header>
 <subsection id="H5CE0842240F1465BA602AE44CCE5C621"><enum>(a)</enum><header>Establishment of program</header><text>Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/121">6 U.S.C. 121</external-xref> et seq.) is further amended by adding at the end the following:</text>
					<quoted-block display-inline="no-display-inline" id="H15DD90E5815A46D98B9E319461360C6D" style="OLC">
						<section id="H2FB8B338FA3D4503857C6093415DCB0B"><enum>230D.</enum><header>E-Security Fellows Program</header>
							<subsection id="H22FF7FE88B484D9790A3C43F35C0E61B"><enum>(a)</enum><header>Establishment</header>
 <paragraph id="H702E1DC441224EFEA0E07FA99467E6FB"><enum>(1)</enum><header>In general</header><text>The Secretary shall establish a fellowship program in accordance with this section for the purpose of bringing State, local, tribal, and private sector officials to participate in the work of the National Cybersecurity Division in order to become familiar with the Department’s stated cybersecurity missions and capabilities, including but not limited to—</text>
 <subparagraph id="HAAAD7F2FD3D14516B8B4F9936144A5E3"><enum>(A)</enum><text>developing partnerships with other Federal agencies, State, local, and tribal governments, and the private sector; and</text>
 </subparagraph><subparagraph id="H219053959D1745F2959CA45134C5AB35"><enum>(B)</enum><text>fostering training and certification.</text> </subparagraph></paragraph><paragraph id="H544DEFD2A17846D5B119A77C1ED5C0B4"><enum>(2)</enum><header>Program name</header><text>The program under this section shall be known as the <quote>E-Security Fellows Program</quote>.</text>
 </paragraph></subsection><subsection id="H86FB44D82AB548078FF80F614DB418C7"><enum>(b)</enum><header>Eligibility</header><text>In order to be eligible for selection as a fellow under the program, an individual must—</text> <paragraph id="H986C68BA5C71419F842C4DEA5ED6BD09"><enum>(1)</enum><text>have computer and information security-related responsibilities; and</text>
 </paragraph><paragraph id="H3CDD65A6D3D54CEFA9307D6578CE727B"><enum>(2)</enum><text>be eligible to possess an appropriate national security clearance.</text> </paragraph></subsection><subsection id="H069BE8AA5A95425D871FB50B308A20D1"><enum>(c)</enum><header>Limitations</header><text>The Secretary—</text>
 <paragraph id="H6A2B80F2832D4CD8B97F079BA9F3DC04"><enum>(1)</enum><text>may conduct up to 2 iterations of the program each year, each of which shall be 180 days in duration; and</text>
 </paragraph><paragraph id="HF800A14C18E048E5A7F299C3D346AADD"><enum>(2)</enum><text>shall ensure that the number of fellows selected for each iteration does not impede the activities of the Division.</text>
 </paragraph></subsection><subsection id="HAEE5F0C2203448BCA0BE39BCDF850704"><enum>(d)</enum><header>Condition</header><text>As a condition of selecting an individual as a fellow under the program, the Secretary shall require that the individual’s employer agree to continue to pay the individual’s salary and benefits during the period of the fellowship.</text>
 </subsection><subsection id="H684AB63567ED41589DBA3D8A7484BD63"><enum>(e)</enum><header>Stipend</header><text>During the period of the fellowship of an individual under the program, the Secretary shall, subject to the availability of appropriations, provide to the individual a stipend to cover the individual’s reasonable living expenses during the period of the fellowship.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="H1E973C967C5A49C19507DA6D7303C5BE"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents in section 1(b) of such Act is further amended by adding at the end of the items relating to such subtitle the following:</text>
					<quoted-block display-inline="no-display-inline" id="HAC6AC94F5EA542499C722E47BF7134AF" style="OLC">
						<toc container-level="quoted-block-container" idref="H15DD90E5815A46D98B9E319461360C6D" lowest-bolded-level="division-lowest-bolded" lowest-level="section" quoted-block="no-quoted-block" regeneration="yes-regeneration">
							<toc-entry idref="H2FB8B338FA3D4503857C6093415DCB0B" level="section">Sec. 230D. E-Security Fellows Program.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection></section></title></legis-body></bill>


