<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 113–282—DEC. 18, 2014?>


<?I97 128 STAT. ?>
<?I98 128 STAT. ?>
<?I99 128 STAT. ?>
<?I50 PUBLIC LAW 113–282—DEC. 18, 2014?>
<?I51 PUBLIC LAW 113–282—DEC. 18, 2014?>
<?I52 PUBLIC LAW 113–282—DEC. 18, 2014?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 113–282: To codify an existing operations center for cybersecurity.</dc:title>
<dc:type>Public Law</dc:type><docNumber>282</docNumber>
<citableAs>Public Law 113–282</citableAs><citableAs>128 Stat. 3066</citableAs>
<approvedDate>2014-12-18</approvedDate>
<dc:date>2014-12-18</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>113</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?3065</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 113–282—DEC. 18, 2014</centerRunningHead>
<coverTitle>NATIONAL CYBERSECURITY PROTECTION ACT OF 2014</coverTitle>
</note>
<page identifier="/us/stat/128/3066">128 STAT. 3066</page>
<dc:type>Public Law</dc:type><docNumber>113–282</docNumber>
<congress value="113">113th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To codify an existing operations center for cybersecurity.<sidenote><p class="centered fontsize8" id="xf1ebf04b-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2014-12-18">Dec. 18, 2014</approvedDate></p><p class="centered fontsize8" id="xf1ebf04c-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/113/s/2519">S. 2519</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ebf04d-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">National Cybersecurity Protection Act of 2014.</p></sidenote>
<section id="d374756e98" identifier="/us/pl/113/282/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ebf04e-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s101">6 USC 101 note</ref>.</p></sidenote><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">National Cybersecurity Protection Act of 2014</shortTitle>”.</content></section>
<section id="d374756e113" identifier="/us/pl/113/282/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ec175f-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s148">6 USC 148 note</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xf1ec3e70-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  In this Act—</chapeau><paragraph class="fontsize10" id="yf1ec3e71-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the term “<term>Center</term>” means the national cybersecurity and communications integration center under section 226 of the Homeland Security Act of 2002, as added by section 3;</content></paragraph>
<paragraph class="fontsize10" id="yf1ec3e72-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the term “<term>critical infrastructure</term>” has the meaning given that term in section 2 of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101">6 U.S.C. 101</ref>);</content></paragraph>
<paragraph class="fontsize10" id="yf1ec3e73-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the term “<term>cybersecurity risk</term>” has the meaning given that term in section 226 of the Homeland Security Act of 2002, as added by section 3;</content></paragraph>
<paragraph class="fontsize10" id="yf1ec3e74-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the term “<term>information sharing and analysis organization</term>” has the meaning given that term in section 212(5) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s131/5">6 U.S.C. 131(5)</ref>);</content></paragraph>
<paragraph class="fontsize10" id="yf1ec3e75-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/5" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>the term “<term>information system</term>” has the meaning given that term in <ref href="/us/usc/t44/s3502/8">section 3502(8) of title 44, United States Code</ref>; and</content></paragraph>
<paragraph class="fontsize10" id="yf1ec3e76-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s2/6" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>the term “<term>Secretary</term>” means the Secretary of Homeland Security.</content></paragraph>
</section>
<section id="d374756e168" identifier="/us/pl/113/282/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER.</heading><subsection class="firstIndent0 fontsize10" id="yf1ecb3a7-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s3/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Subtitle C of title II of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s141/etseq">6 U.S.C. 141 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><section class="centered fontsize12" id="yf1edc518-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="226">“SEC. 226. </num><heading class="fontsize12"><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1edc519-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s148">6 USC 148</ref>.</p></sidenote>NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER.</heading><subsection class="firstIndent0 fontsize10" id="yf1edc51a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section—</chapeau><paragraph class="fontsize10" id="yf1edc51b-e87e-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>the term ‘<term>cybersecurity risk</term>’ means threats to and vulnerabilities of information or information systems and any related consequences caused by or resulting from unauthorized access, use, disclosure, degradation, disruption, modification, or destruction of information or information systems, including such related consequences caused by an act of terrorism;</content></paragraph>
<paragraph class="fontsize10" id="yf1edc51c-e87e-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><chapeau>the term ‘<term>incident</term>’ means an occurrence that—<page identifier="/us/stat/128/3067">128 STAT. 3067</page></chapeau><subparagraph class="fontsize10" id="yf1edc51d-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system; or</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc51e-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1edc51f-e87e-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>the term ‘<term>information sharing and analysis organization</term>’ has the meaning given that term in section 212(5); and</content></paragraph>
<paragraph class="fontsize10" id="yf1edc520-e87e-11f0-bc57-ad3ac4b1618c" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>the term ‘<term>information system</term>’ has the meaning given that term in <ref href="/us/usc/t44/s3502/8">section 3502(8) of title 44, United States Code</ref>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc521-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Center</inline>.—</heading><content>There is in the Department a national cybersecurity and communications integration center (referred to in this section as the ‘Center’) to carry out certain responsibilities of the Under Secretary appointed under section 103(a)(1)(H).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc522-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Functions</inline>.—</heading><chapeau>The cybersecurity functions of the Center shall include—</chapeau><paragraph class="fontsize10" id="yf1edc523-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>being a Federal civilian interface for the multi-directional and cross-sector sharing of information related to cybersecurity risks, incidents, analysis, and warnings for Federal and non-Federal entities;</content></paragraph>
<paragraph class="fontsize10" id="yf1edc524-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>providing shared situational awareness to enable real-time, integrated, and operational actions across the Federal Government and non-Federal entities to address cybersecurity risks and incidents to Federal and non-Federal entities;</content></paragraph>
<paragraph class="fontsize10" id="yf1edc525-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>coordinating the sharing of information related to cybersecurity risks and incidents across the Federal Government;</content></paragraph>
<paragraph class="fontsize10" id="yf1edc526-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>facilitating cross-sector coordination to address cybersecurity risks and incidents, including cybersecurity risks and incidents that may be related or could have consequential impacts across multiple sectors;</content></paragraph>
<paragraph class="fontsize10" id="yf1edc527-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5)</num><subparagraph class="inline" id="yf1edc528-e87e-11f0-bc57-ad3ac4b1618c"><num value="A">(A) </num><content>conducting integration and analysis, including cross-sector integration and analysis, of cybersecurity risks and incidents; and</content></subparagraph>
<subparagraph class="indentUp0 fontsize10" id="yf1edc529-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>sharing the analysis conducted under subparagraph (A) with Federal and non-Federal entities;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1edc52a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>upon request, providing timely technical assistance, risk management support, and incident response capabilities to Federal and non-Federal entities with respect to cybersecurity risks and incidents, which may include attribution, mitigation, and remediation; and</content></paragraph>
<paragraph class="fontsize10" id="yf1edc52b-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><chapeau>providing information and recommendations on security and resilience measures to Federal and non-Federal entities, including information and recommendations to—</chapeau><subparagraph class="fontsize10" id="yf1edc52c-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>facilitate information security; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc52d-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>strengthen information systems against cybersecurity risks and incidents.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc52e-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Composition</inline>.—</heading><paragraph class="fontsize10" id="yf1edc52f-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>The Center shall be composed of—</chapeau><subparagraph class="fontsize10" id="yf1edc530-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>appropriate representatives of Federal entities, such as—</chapeau><clause class="fontsize10" id="yf1edc531-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>sector-specific agencies;</content></clause>
<clause class="fontsize10" id="yf1edc532-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>civilian and law enforcement agencies; and</content></clause>
<clause class="fontsize10" id="yf1edc533-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>elements of the intelligence community, as that term is defined under section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>);<page identifier="/us/stat/128/3068">128 STAT. 3068</page></content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf1edc534-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><chapeau>appropriate representatives of non-Federal entities, such as—</chapeau><clause class="fontsize10" id="yf1edc535-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>State and local governments;</content></clause>
<clause class="fontsize10" id="yf1edc536-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>information sharing and analysis organizations; and</content></clause>
<clause class="fontsize10" id="yf1edc537-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>owners and operators of critical information systems;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf1edc538-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>components within the Center that carry out cybersecurity and communications activities;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc539-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>a designated Federal official for operational coordination with and across each sector; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc53a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><content>other appropriate representatives or entities, as determined by the Secretary.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1edc53b-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Incidents</inline>.—</heading><content>In the event of an incident, during exigent circumstances the Secretary may grant a Federal or non-Federal entity immediate temporary access to the Center.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc53c-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">“(e) </num><heading class="fontsize10"><inline class="smallCaps">Principles</inline>.—</heading><chapeau>In carrying out the functions under subsection (c), the Center shall ensure—</chapeau><paragraph class="fontsize10" id="yf1edc53d-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><chapeau>to the extent practicable, that—</chapeau><subparagraph class="fontsize10" id="yf1edc53e-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>timely, actionable, and relevant information related to cybersecurity risks, incidents, and analysis is shared;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc53f-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>when appropriate, information related to cybersecurity risks, incidents, and analysis is integrated with other relevant information and tailored to the specific characteristics of a sector;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc540-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>activities are prioritized and conducted based on the level of risk;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc541-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>industry sector-specific, academic, and national laboratory expertise is sought and receives appropriate consideration;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc542-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><chapeau>continuous, collaborative, and inclusive coordination occurs—</chapeau><clause class="fontsize10" id="yf1edc543-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>across sectors; and</content></clause>
<clause class="fontsize10" id="yf1edc544-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><chapeau>with—</chapeau><subclause class="fontsize10" id="yf1edc545-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><content>sector coordinating councils;</content></subclause>
<subclause class="fontsize10" id="yf1edc546-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">“(II) </num><content>information sharing and analysis organizations; and</content></subclause>
<subclause class="fontsize10" id="yf1edc547-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">“(III) </num><content>other appropriate non-Federal partners;</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf1edc548-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><content>as appropriate, the Center works to develop and use mechanisms for sharing information related to cybersecurity risks and incidents that are technology-neutral, interoperable, real-time, cost-effective, and resilient; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1edc549-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">“(G) </num><content>the Center works with other agencies to reduce unnecessarily duplicative sharing of information related to cybersecurity risks and incidents;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1edc54a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>that information related to cybersecurity risks and incidents is appropriately safeguarded against unauthorized access; and</content></paragraph>
<paragraph class="fontsize10" id="yf1edc54b-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>that activities conducted by the Center comply with all policies, regulations, and laws that protect the privacy and civil liberties of United States persons.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc54c-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">“(f) </num><heading class="fontsize10"><inline class="smallCaps">No Right or Benefit</inline>.—</heading><paragraph class="fontsize10" id="yf1edc54d-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The provision of assistance or information to, and inclusion in the Center of, governmental or private entities under this section shall be at the sole and unreviewable <page identifier="/us/stat/128/3069">128 STAT. 3069</page>
discretion of the Under Secretary appointed under section 103(a)(1)(H).</content></paragraph>
<paragraph class="fontsize10" id="yf1edc54e-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Certain assistance or information</inline>.—</heading><content>The provision of certain assistance or information to, or inclusion in the Center of, one governmental or private entity pursuant to this section shall not create a right or benefit, substantive or procedural, to similar assistance or information for any other governmental or private entity.”</content></paragraph>
</subsection>
</section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yf1edc54f-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s3/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Technical and Conforming Amendment</inline>.—</heading><content>The table of contents in section 1(b) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101">6 U.S.C. 101 note</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 225 the following:<?GPOvSpace 04?>
<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 226. </designator>
<label>National cybersecurity and communications integration center.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d374756e559" identifier="/us/pl/113/282/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>RECOMMENDATIONS REGARDING NEW AGREEMENTS.</heading><subsection class="firstIndent0 fontsize10" id="yf1ee1270-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Not later than 180 days after the date <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ee1271-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote>of enactment of this Act, the Secretary shall submit recommendations on how to expedite the implementation of information-sharing agreements for cybersecurity purposes between the Center and non-Federal entities (referred to in this section as “cybersecurity information-sharing agreements”) to—</chapeau><paragraph class="fontsize10" id="yf1ee1272-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the Committee on Homeland Security and Governmental Affairs and the Committee on the Judiciary of the Senate; and</content></paragraph>
<paragraph class="fontsize10" id="yf1ee1273-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Committee on Homeland Security and the Committee on the Judiciary of the House of Representatives.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1ee1274-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>In submitting recommendations under subsection (a), the Secretary shall—</chapeau><paragraph class="fontsize10" id="yf1ee1275-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>address the development and utilization of a scalable form that retains all privacy and other protections in cybersecurity information-sharing agreements that are in effect as of the date on which the Secretary submits the recommendations, including Cooperative Research and Development Agreements; and</content></paragraph>
<paragraph class="fontsize10" id="yf1ee1276-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>include in the recommendations any additional authorities or resources that may be needed to carry out the implementation of any new cybersecurity information-sharing agreements.</content></paragraph>
</subsection>
</section>
<section id="d374756e607" identifier="/us/pl/113/282/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>ANNUAL REPORT.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xf1ee87a7-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Not later than 1 year after the date of enactment of this Act, and every year thereafter for 3 years, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs and the Committee on the Judiciary of the Senate, the Committee on Homeland Security and the Committee on the Judiciary of the House of Representatives, and the Comptroller General of the United States a report on the Center, which shall include—</chapeau><subsection class="firstIndent0 fontsize10" id="yf1ee87a8-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a"> (a) </num><chapeau>information on the Center, including—</chapeau><paragraph class="fontsize10" id="yf1ee87a9-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>an assessment of the capability and capacity of the Center to carry out its cybersecurity mission under this Act;</content></paragraph>
<paragraph class="fontsize10" id="yf1ee87aa-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the number of representatives from non-Federal entities that are participating in the Center, including the number of representatives from States, nonprofit organizations, and private sector entities, respectively;</content></paragraph>
<paragraph class="fontsize10" id="yf1ee87ab-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the number of requests from non-Federal entities to participate in the Center and the response to such requests;<page identifier="/us/stat/128/3070">128 STAT. 3070</page></content></paragraph>
<paragraph class="fontsize10" id="yf1ee87ac-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>the average length of time taken to resolve requests described in paragraph (3);</content></paragraph>
<paragraph class="fontsize10" id="yf1ee87ad-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><chapeau>the identification of—</chapeau><subparagraph class="fontsize10" id="yf1ee87ae-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>any delay in resolving requests described in paragraph (3) involving security clearance processing; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1ee87af-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the agency involved with a delay described in subparagraph (A);</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1ee87b0-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>a description of any other obstacles or challenges to resolving requests described in paragraph (3) and a summary of the reasons for denials of any such requests;</content></paragraph>
<paragraph class="fontsize10" id="yf1ee87b1-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><chapeau>the extent to which the Department is engaged in information sharing with each critical infrastructure sector, including—</chapeau><subparagraph class="fontsize10" id="yf1ee87b2-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/7/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the extent to which each sector has representatives at the Center;</content></subparagraph>
<subparagraph class="fontsize10" id="yf1ee87b3-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/7/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the extent to which owners and operators of critical infrastructure in each critical infrastructure sector participate in information sharing at the Center; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1ee87b4-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/7/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>the volume and range of activities with respect to which the Secretary has collaborated with the sector coordinating councils and the sector-specific agencies to promote greater engagement with the Center; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1ee87b5-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s5/a/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>the policies and procedures established by the Center to safeguard privacy and civil liberties.</content></paragraph>
</subsection>
</section>
<section id="d374756e688" identifier="/us/pl/113/282/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><heading>GAO REPORT.</heading><content style="-uslm-lc:I658120">  Not later than 2 years after the date of enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the effectiveness of the Center in carrying out its cybersecurity mission.</content></section>
<section id="d374756e695" identifier="/us/pl/113/282/s7" style="-uslm-lc:I658141"><num class="fontsize12" value="7">SEC. 7. </num><heading>CYBER INCIDENT RESPONSE PLAN; CLEARANCES; BREACHES.</heading><subsection class="firstIndent0 fontsize10" id="yf1ef7216-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Cyber Incident Response Plan; Clearances</inline>.—</heading><content>Subtitle C of title II of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s141/etseq">6 U.S.C. 141 et seq.</ref>), as amended by section 3, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><section class="centered fontsize12" id="yf1ef7217-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="227">“SEC. 227. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef7218-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s149">6 USC 149</ref>.</p></sidenote><heading class="fontsize12">CYBER INCIDENT RESPONSE PLAN.</heading><content class="indentUp0 firstIndent0 fontsize10" style="-uslm-lc:I658120">  “The Under Secretary appointed under section 103(a)(1)(H) shall, in coordination with appropriate Federal departments and agencies, State and local governments, sector coordinating councils, information sharing and analysis organizations (as defined in section 212(5)), owners and operators of critical infrastructure, and other appropriate entities and individuals, develop, regularly update, maintain, and exercise adaptable cyber incident response plans to address cybersecurity risks (as defined in section 226) to critical infrastructure.</content></section>
<section class="centered fontsize12" id="yf1ef7219-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658143"><num class="fontsize12" value="228">“SEC. 228. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef721a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s150">6 USC 150</ref>.</p></sidenote><heading class="fontsize12">CLEARANCES.</heading><content class="indentUp0 firstIndent0 fontsize10" style="-uslm-lc:I658120">  “The Secretary shall make available the process of application for security clearances under Executive Order 13549 (<ref href="/us/fr/75/162">75 Fed. Reg. 162</ref>; relating to a classified national security information program) or any successor Executive Order to appropriate representatives <page identifier="/us/stat/128/3071">128 STAT. 3071</page>
of sector coordinating councils, sector information sharing and analysis organizations (as defined in section 212(5)), owners and operators of critical infrastructure, and any other person that the Secretary determines appropriate.”</content></section>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yf1ef721b-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef721c-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t44/s3543">44 USC 3543 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Breaches</inline>.—</heading><paragraph class="fontsize10" id="yf1ef721d-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Requirements</inline>.—</heading><chapeau>The Director of the Office of Management and Budget shall ensure that data breach notification policies and guidelines are updated periodically and require—</chapeau><subparagraph class="fontsize10" id="yf1ef721e-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef721f-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Notifications.</p></sidenote><chapeau>except as provided in paragraph (4), notice by the affected agency to each committee of Congress described in <ref href="/us/usc/t44/s3544/c/1">section 3544(c)(1) of title 44, United States Code</ref>, the Committee on the Judiciary of the Senate, and the Committee on Homeland Security and the Committee on the Judiciary of the House of Representatives, which shall—</chapeau><clause class="fontsize10" id="yf1ef7220-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef7221-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><content>be provided expeditiously and not later than 30 days after the date on which the agency discovered the unauthorized acquisition or access; and</content></clause>
<clause class="fontsize10" id="yf1ef7222-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>include—</chapeau><subclause class="fontsize10" id="yf1ef7223-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>information about the breach, including a summary of any information that the agency knows on the date on which notification is provided about how the breach occurred;</content></subclause>
<subclause class="fontsize10" id="yf1ef7224-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>an estimate of the number of individuals affected by the breach, based on information that the agency knows on the date on which notification is provided, including an assessment of the risk of harm to affected individuals;</content></subclause>
<subclause class="fontsize10" id="yf1ef7225-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/ii/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>a description of any circumstances necessitating a delay in providing notice to affected individuals; and</content></subclause>
<subclause class="fontsize10" id="yf1ef7226-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/A/ii/IV" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">(IV) </num><content>an estimate of whether and when the agency will provide notice to affected individuals; and</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="yf1ef7227-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>notice by the affected agency to affected individuals, pursuant to data breach notification policies and guidelines, which shall be provided as expeditiously as practicable and without unreasonable delay after the agency discovers the unauthorized acquisition or access.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1ef7228-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">National security; law enforcement; remediation</inline>.—</heading><content>The Attorney General, the head of an element of the intelligence community (as such term is defined under section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>), or the Secretary may delay the notice to affected individuals under paragraph (1)(B) if the notice would disrupt a law enforcement investigation, endanger national security, or hamper security remediation actions.</content></paragraph>
<paragraph class="fontsize10" id="yf1ef7229-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef722a-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p><p class="leftAlign firstIndent0 fontsize8" id="xf1ef722b-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Effective date.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">OMB report</inline>.—</heading><chapeau>During the first 2 years beginning after the date of enactment of this Act, the Director of the Office of Management and Budget shall, on an annual basis—</chapeau><subparagraph class="fontsize10" id="yf1ef722c-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>assess agency implementation of data breach notification policies and guidelines in aggregate; and</content></subparagraph>
<subparagraph class="fontsize10" id="yf1ef722d-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>include the assessment described in clause (i) in the report required under <ref href="/us/usc/t44/s3543/a/8">section 3543(a)(8) of title 44, United States Code</ref>.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yf1ef722e-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Exception</inline>.—</heading><content>Any element of the intelligence community (as such term is defined under section 3(4) of the National Security Act of 1947 (<ref href="/us/usc/t50/s3003/4">50 U.S.C. 3003(4)</ref>) that is required to <page identifier="/us/stat/128/3072">128 STAT. 3072</page>
provide notice under paragraph (1)(A) shall only provide such notice to appropriate committees of Congress.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yf1ef722f-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef7230-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s149">6 USC 149 note</ref>.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Rule of Construction</inline>.—</heading><content>Nothing in the amendment made by subsection (a) or in subsection (b)(1) shall be construed to alter any authority of a Federal agency or department.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yf1ef7231-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s7/d" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Technical and Conforming Amendment</inline>.—</heading><content>The table of contents in section 1(b) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101">6 U.S.C. 101 note</ref>), as amended by section 3, <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="insert">inserting</amendingAction> after the item relating to section 226 the following:<?GPOvSpace 04?>
<quotedContent><toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 227. </designator>
<label>Cyber incident response plan.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 228. </designator>
<label>Clearances.”.</label>
</referenceItem></toc>
</quotedContent></content></subsection>
</section>
<section id="d374756e931" identifier="/us/pl/113/282/s8" style="-uslm-lc:I658141"><num class="fontsize12" value="8">SEC. 8. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xf1ef7232-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s148">6 USC 148 note</ref>.</p></sidenote><heading>RULES OF CONSTRUCTION.</heading><subsection class="firstIndent0 fontsize10" id="yf1ef9943-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s8/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Prohibition on New Regulatory Authority</inline>.—</heading><content>Nothing in this Act or the amendments made by this Act shall be construed to grant the Secretary any authority to promulgate regulations or set standards relating to the cybersecurity of private sector critical infrastructure that was not in effect on the day before the date of enactment of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yf1ef9944-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s8/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Private Entities</inline>.—</heading><chapeau>Nothing in this Act or the amendments made by this Act shall be construed to require any private entity—</chapeau><paragraph class="fontsize10" id="yf1ef9945-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s8/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>to request assistance from the Secretary; or</content></paragraph>
<paragraph class="fontsize10" id="yf1ef9946-e87e-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/113/282/s8/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>that requested such assistance from the Secretary to implement any measure or recommendation suggested by the Secretary.</content></paragraph>
</subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2014-12-18">December 18, 2014</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/113/s/2519">S. 2519</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/113/240">113–240</ref> (<committee>Comm. on Homeland Security and Governmental Affairs</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 160 (2014):</heading>
<p class="indentUp4 firstIndent-1" id="xf1efc057-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 10, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="xf1efc058-e87e-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Dec. 11, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>