<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Referred-in-Senate" bill-type="olc" dms-id="H846A2F89115246DD8BC839F8895497C7" key="H" public-private="public" stage-count="1">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 HR 2105 : NIST Small Business Cybersecurity Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2017-10-16</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">IIB</distribution-code>
		<congress display="yes">115th CONGRESS</congress><session display="yes">1st Session</session>
		<legis-num display="yes">H. R. 2105</legis-num>
		<current-chamber display="yes">IN THE SENATE OF THE UNITED STATES</current-chamber>
		<action><action-date date="20171016">October 16, 2017</action-date><action-desc> Received; read twice and referred to the <committee-name committee-id="SSCM00">Committee on Commerce, Science, and Transportation</committee-name></action-desc></action><legis-type>AN ACT</legis-type>
		<official-title display="yes">To require the Director of the National Institute of Standards and Technology to disseminate
			 guidance to help reduce small business cybersecurity risks, and for other
			 purposes.</official-title>
	</form>
	<legis-body id="H7ED7EA25701E4A148A0CE068630F0A57" style="OLC">
 <section id="HB30B7C10E0BD49C4BDAC947C4DC4C06D" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>NIST Small Business Cybersecurity Act</short-title></quote>.</text> </section><section id="H8B6BD29D689E4AB49C59DF0C644B9776"><enum>2.</enum><header>Improving cybersecurity of small businesses</header> <subsection id="H8FB6610F84CA4A2F86B60D55088C7C35"><enum>(a)</enum><header>Definitions</header><text>In this section:</text>
 <paragraph id="HEE17B50407F44C4BAE982944C0A96606"><enum>(1)</enum><header>Director</header><text>The term <quote>Director</quote> means the Director of the National Institute of Standards and Technology.</text> </paragraph><paragraph id="H0A4C81DFBDA042DBA5E5259E44B585B1"><enum>(2)</enum><header>Resources</header><text>The term <quote>resources</quote> means guidelines, tools, best practices, standards, methodologies, and other ways of providing information.</text>
 </paragraph><paragraph id="H4D8EEEAA709F40309F249DE52B1AEA87"><enum>(3)</enum><header>Small business concern</header><text>The term <quote>small business concern</quote> has the meaning given such term in section 3 of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632</external-xref>).</text> </paragraph></subsection><subsection id="HBB80CBEAC5534B96B7DDFF89FAB09D6F"><enum>(b)</enum><header>Small business cybersecurity</header><text>Section 2(e)(1)(A) of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/272">15 U.S.C. 272(e)(1)(A)</external-xref>) is amended—</text>
 <paragraph id="H70F69FCE52F249AC86AA92FD3F2BCC5D"><enum>(1)</enum><text>in clause (vii), by striking <quote>and</quote> at the end;</text> </paragraph><paragraph id="H59AF67814025417C8C937955AFCFFFE6"><enum>(2)</enum><text>by redesignating clause (viii) as clause (ix); and</text>
 </paragraph><paragraph id="H345C859229594453956680C5CCB6D99A"><enum>(3)</enum><text>by inserting after clause (vii) the following:</text> <quoted-block id="H1C9557BFDBB94F4C92C0FD4A266DE2E8" style="OLC"> <clause id="H66F0D88A2D934F8AACAA8AF87B5E9C50"><enum>(viii)</enum><text>consider small business concerns (as defined in section 3 of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632</external-xref>)); and</text></clause><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph></subsection><subsection id="H6A683B9E742E4B71ADDFB118E9A5671E"><enum>(c)</enum><header>Dissemination of resources for small businesses</header>
 <paragraph id="H9730454B84E645D29F9F30B2EB68F8DD"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than one year after the date of the enactment of this Act, the Director, in carrying out section 2(e)(1)(A)(viii) of the National Institute of Standards and Technology Act, as added by subsection (b) of this Act, in consultation with the heads of other appropriate Federal agencies, shall disseminate clear and concise resources to help small business concerns identify, assess, manage, and reduce their cybersecurity risks.</text>
 </paragraph><paragraph id="HEBB9F5E736FE48E59E92F09F66C0FAC4"><enum>(2)</enum><header>Requirements</header><text>The Director shall ensure that the resources disseminated pursuant to paragraph (1)—</text> <subparagraph id="H9CD6A2F32DB4451CA4DC23E4440D396B"><enum>(A)</enum><text>are generally applicable and usable by a wide range of small business concerns;</text>
 </subparagraph><subparagraph id="H80210001128B43E09E9404C0E48A0A14"><enum>(B)</enum><text>vary with the nature and size of the implementing small business concern, and the nature and sensitivity of the data collected or stored on the information systems or devices of the implementing small business concern;</text>
 </subparagraph><subparagraph id="H3E0D36034265431CAED18B5FE02E800F"><enum>(C)</enum><text>include elements, that promote awareness of simple, basic controls, a workplace cybersecurity culture, and third-party stakeholder relationships, to assist small business concerns in mitigating common cybersecurity risks;</text>
 </subparagraph><subparagraph id="H1E860B1546C94B30ADF208FAF9BB0FF7"><enum>(D)</enum><text>include case studies of practical application;</text> </subparagraph><subparagraph id="HFF01E5C28ED249B68A2B1D47295DC11E"><enum>(E)</enum><text>are technology-neutral and can be implemented using technologies that are commercial and off-the-shelf; and</text>
 </subparagraph><subparagraph id="HAFF2C73DAE534E52A095C1CAA27384D5"><enum>(F)</enum><text>are based on international standards to the extent possible, and are consistent with the Stevenson-Wydler Technology Innovation Act of 1980 (<external-xref legal-doc="usc" parsable-cite="usc/15/3701">15 U.S.C. 3701</external-xref> et seq.).</text>
 </subparagraph></paragraph><paragraph id="HE0F4702648D84AF5B7622BC77D11D1E6"><enum>(3)</enum><header>National cybersecurity awareness and education program</header><text>The Director shall ensure that the resources disseminated under paragraph (1) are consistent with the efforts of the Director under section 401 of the Cybersecurity Enhancement Act of 2014 (<external-xref legal-doc="usc" parsable-cite="usc/15/7451">15 U.S.C. 7451</external-xref>).</text>
 </paragraph><paragraph id="H14F8383834044C3D880EA60B1C31D60A"><enum>(4)</enum><header>Small Business Development Center Cyber Strategy</header><text>In carrying out paragraph (1), the Director, to the extent practicable, shall consider any methods included in the Small Business Development Center Cyber Strategy developed under section 1841(a)(3)(B) of the National Defense Authorization Act for Fiscal Year 2017 (<external-xref legal-doc="public-law" parsable-cite="pl/114/328">Public Law 114–328</external-xref>).</text>
 </paragraph><paragraph id="H37F06DC1A32C4DC392482A05271369F8"><enum>(5)</enum><header>Voluntary resources</header><text>The use of the resources disseminated under paragraph (1) shall be considered voluntary.</text> </paragraph><paragraph id="H48D16CCE87B84442A9E94A8802C5F191"><enum>(6)</enum><header>Updates</header><text>The Director shall review and, if necessary, update the resources disseminated under paragraph (1) in accordance with the requirements under paragraph (2).</text>
 </paragraph><paragraph id="HE869CEB4A8E247B3B0A444B3EED4A236"><enum>(7)</enum><header>Public availability</header><text>The Director and the head of each Federal agency that so elects shall make prominently available on the respective agency’s public Internet website information about the resources and updates to the resources disseminated under paragraph (1). The Director and the heads shall each ensure that the information they respectively make prominently available is consistent, clear, and concise.</text>
 </paragraph></subsection><subsection id="H5959009C465445148C52B36382CFC5D3"><enum>(d)</enum><header>Other Federal cybersecurity requirements</header><text>Nothing in this section may be construed to supersede, alter, or otherwise affect any cybersecurity requirements applicable to Federal agencies.</text>
 </subsection><subsection id="H46382750370A4FC9A66DF9FE46BBA18F"><enum>(e)</enum><header>Funding</header><text display-inline="yes-display-inline">This Act shall be carried out using funds otherwise authorized to be appropriated or made available to the National Institute of Standards and Technology.</text>
			</subsection></section></legis-body>
	<attestation><attestation-group><attestation-date chamber="House" date="20171011">Passed the House of Representatives October 11, 2017.</attestation-date><attestor display="yes">Karen L. Haas,</attestor><role>Clerk</role></attestation-group></attestation>
</bill>


