<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 115–236—AUG. 14, 2018?>


<?I97 132 STAT. ?>
<?I98 132 STAT. ?>
<?I99 132 STAT. ?>
<?I50 PUBLIC LAW 115–236—AUG. 14, 2018?>
<?I51 PUBLIC LAW 115–236—AUG. 14, 2018?>
<?I52 PUBLIC LAW 115–236—AUG. 14, 2018?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 115–236: To require the Director of the National Institute of Standards and Technology to disseminate guidance to help reduce small business cybersecurity risks, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>236</docNumber>
<citableAs>Public Law 115–236</citableAs><citableAs>132 Stat. 2444</citableAs>
<approvedDate>2018-08-14</approvedDate>
<dc:date>2018-08-14</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>115</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?2443</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 115–236—AUG. 14, 2018</centerRunningHead>
<coverTitle>NIST SMALL BUSINESS CYBERSECURITY ACT</coverTitle>
</note>
<page identifier="/us/stat/132/2444">132 STAT. 2444</page>
<dc:type>Public Law</dc:type><docNumber>115–236</docNumber>
<congress value="115">115th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Director of the National Institute of Standards and Technology to disseminate guidance to help reduce small business cybersecurity risks, and for other purposes.<sidenote><p class="centered fontsize8" id="xe9d8dde2-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2018-08-14">Aug. 14, 2018</approvedDate></p><p class="centered fontsize8" id="xe9d8dde3-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/115/s/770">S. 770</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe9d8dde4-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">NIST Small Business Cybersecurity Act.</p><p class="leftAlign firstIndent0 fontsize8" id="xe9d8dde5-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s271">15 USC 271 note</ref>.</p></sidenote>
<section id="d295589e102" identifier="/us/pl/115/236/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">NIST Small Business Cybersecurity Act</shortTitle>”.</content></section>
<section id="d295589e112" identifier="/us/pl/115/236/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe9d8dde6-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s272">15 USC 272 note</ref>.</p></sidenote><heading>IMPROVING CYBERSECURITY OF SMALL BUSINESSES.</heading><subsection class="firstIndent0 fontsize10" id="ye9d9c847-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="ye9d9c848-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/a/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Director</inline>.—</heading><content>The term “<term>Director</term>” means the Director of the National Institute of Standards and Technology.</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c849-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/a/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Resources</inline>.—</heading><content>The term “<term>resources</term>” means guidelines, tools, best practices, standards, methodologies, and other ways of providing information.</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c84a-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/a/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Small business concern</inline>.—</heading><content>The term “<term>small business concern</term>” has the meaning given such term in section 3 of the Small Business Act (<ref href="/us/usc/t15/s632">15 U.S.C. 632</ref>).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye9d9c84b-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Small Business Cybersecurity</inline>.—</heading><chapeau>Section 2(e)(1)(A) of the National Institute of Standards and Technology Act (<ref href="/us/usc/t15/s272/e/1/A">15 U.S.C. 272(e)(1)(A)</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="ye9d9c84c-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>in clause (vii), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end;</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c84d-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> clause (viii) as clause (ix); and</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c84e-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="insert">inserting</amendingAction> after clause (vii) the following:<quotedContent><clause class="indentUp2 fontsize10" id="ye9d9c84f-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="viii">“(viii) </num><content>consider small business concerns (as defined in section 3 of the Small Business Act (<ref href="/us/usc/t15/s632">15 U.S.C. 632</ref>)); and”</content></clause>
</quotedContent>.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye9d9c850-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Dissemination of Resources for Small Businesses</inline>.—</heading><paragraph class="fontsize10" id="ye9d9c851-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe9d9c852-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xe9d9c853-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than one year after the date of the enactment of this Act, the Director, in carrying out section 2(e)(1)(A)(viii) of the National Institute of Standards and Technology Act, as added by subsection (b) of this Act, in consultation with the heads of other appropriate Federal agencies, shall disseminate clear and concise resources to help small business concerns identify, assess, manage, and reduce their cybersecurity risks.</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c854-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Requirements</inline>.—</heading><chapeau>The Director shall ensure that the resources disseminated pursuant to paragraph (1)—</chapeau><subparagraph class="fontsize10" id="ye9d9c855-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>are generally applicable and usable by a wide range of small business concerns;</content></subparagraph>
<subparagraph class="fontsize10" id="ye9d9c856-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>vary with the nature and size of the implementing small business concern, and the nature and sensitivity <page identifier="/us/stat/132/2445">132 STAT. 2445</page>
of the data collected or stored on the information systems or devices of the implementing small business concern;</content></subparagraph>
<subparagraph class="fontsize10" id="ye9d9c857-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>include elements, that promote awareness of simple, basic controls, a workplace cybersecurity culture, and third-party stakeholder relationships, to assist small business concerns in mitigating common cybersecurity risks;</content></subparagraph>
<subparagraph class="fontsize10" id="ye9d9c858-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>include case studies of practical application;</content></subparagraph>
<subparagraph class="fontsize10" id="ye9d9c859-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>are technology-neutral and can be implemented using technologies that are commercial and off-the-shelf; and</content></subparagraph>
<subparagraph class="fontsize10" id="ye9d9c85a-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>are based on international standards to the extent possible, and are consistent with the Stevenson-Wydler Technology Innovation Act of 1980 (<ref href="/us/usc/t15/s3701/etseq">15 U.S.C. 3701 et seq.</ref>).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="ye9d9c85b-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">National cybersecurity awareness and education program</inline>.—</heading><content>The Director shall ensure that the resources disseminated under paragraph (1) are consistent with the efforts of the Director under section 401 of the Cybersecurity Enhancement Act of 2014 (<ref href="/us/usc/t15/s7451">15 U.S.C. 7451</ref>).</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c85c-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Small business development center cyber strategy</inline>.—</heading><content>In carrying out paragraph (1), the Director, to the extent practicable, shall consider any methods included in the Small Business Development Center Cyber Strategy developed under section 1841(a)(3)(B) of the National Defense Authorization Act for Fiscal Year 2017 (<ref href="/us/pl/114/328">Public Law 114–328</ref>).</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c85d-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Voluntary resources</inline>.—</heading><content>The use of the resources disseminated under paragraph (1) shall be considered voluntary.</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c85e-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe9d9c85f-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Review.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Updates</inline>.—</heading><content>The Director shall review and, if necessary, update the resources disseminated under paragraph (1) in accordance with the requirements under paragraph (2).</content></paragraph>
<paragraph class="fontsize10" id="ye9d9c860-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/c/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xe9d9c861-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Public availability</inline>.—</heading><content>The Director and the head of each Federal agency that so elects shall make prominently available on the respective agency’s public Internet website information about the resources and updates to the resources disseminated under paragraph (1). The Director and the heads shall each ensure that the information they respectively make prominently available is consistent, clear, and concise.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="ye9d9c862-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Other Federal Cybersecurity Requirements</inline>.—</heading><content>Nothing in this section may be construed to supersede, alter, or otherwise affect any cybersecurity requirements applicable to Federal agencies.<page identifier="/us/stat/132/2446">132 STAT. 2446</page></content></subsection>
<subsection class="firstIndent0 fontsize10" id="ye9d9c863-e835-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/115/236/s2/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Funding</inline>.—</heading><content>This Act shall be carried out using funds otherwise authorized to be appropriated or made available to the National Institute of Standards and Technology.</content></subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2018-08-14">August 14, 2018</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/115/s/770">S. 770</ref> (<ref href="/us/bill/115/hr/2105">H.R. 2105</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/115/153">115–153</ref> (<committee>Comm. on Commerce, Science, and Transporta­tion</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 163 (2017):</subheading>
<p class="indentUp2 firstIndent-1" id="xe9d9ef74-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658034">Sept. 28, considered and passed Senate.</p><subheading style="-uslm-lc:I658033">Vol. 164 (2018):</subheading>
<p class="indentUp2 firstIndent-1" id="xe9d9ef75-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658034">July 25, considered and passed House, amended.</p><p class="indentUp2 firstIndent-1" id="xe9d9ef76-e835-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658034">Aug. 1, Senate concurred in House amendments.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>