<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 115–278—NOV. 16, 2018?>


<?I97 132 STAT. ?>
<?I98 132 STAT. ?>
<?I99 132 STAT. ?>
<?I50 PUBLIC LAW 115–278—NOV. 16, 2018?>
<?I51 PUBLIC LAW 115–278—NOV. 16, 2018?>
<?I52 PUBLIC LAW 115–278—NOV. 16, 2018?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 115–278: To amend the Homeland Security Act of 2002 to authorize the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>278</docNumber>
<citableAs>Public Law 115–278</citableAs><citableAs>132 Stat. 4168</citableAs>
<approvedDate>2018-11-16</approvedDate>
<dc:date>2018-11-16</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>115</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?4167</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 115–278—NOV. 16, 2018</centerRunningHead>
<coverTitle>CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY ACT OF 2018</coverTitle>
</note>
<page identifier="/us/stat/132/4168">132 STAT. 4168</page>
<dc:type>Public Law</dc:type><docNumber>115–278</docNumber>
<congress value="115">115th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To amend the Homeland Security Act of 2002 to authorize the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes.<sidenote><p class="centered fontsize8" id="x6fbdfa13-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2018-11-16">Nov. 16, 2018</approvedDate></p><p class="centered fontsize8" id="x6fbdfa14-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/115/hr/3359">H.R. 3359</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fbdfa15-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Cybersecurity and Infrastructure Security Agency Act of 2018.</p></sidenote>
<section id="d148503e98" identifier="/us/pl/115/278/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fbe2126-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s101">6 USC 101 note</ref>.</p></sidenote><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Cybersecurity and Infrastructure Security Agency Act of 2018</shortTitle>”.</content></section>
<section id="d148503e113" identifier="/us/pl/115/278/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY.</heading><subsection class="firstIndent0 fontsize10" id="y6fc57427-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>The Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101/etseq">6 U.S.C. 101 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><title id="y6fc7e528-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658178"><num class="fontsize14 bold" value="XXII">“TITLE XXII—</num><heading class="fontsize14 bold">CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY</heading><subtitle id="y6fc7e529-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658178"><num class="fontsize14 bold" value="A">“Subtitle A—</num><heading class="fontsize14 bold">Cybersecurity and Infrastructure Security</heading><section class="indentUp2 firstIndent-2" id="y6fc7e52a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="2201">“SEC. 2201. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc7e52b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s651">6 USC 651</ref>.</p></sidenote><heading class="bold">DEFINITIONS.</heading><chapeau class=" fontsize10" style="-uslm-lc:I658120">  “In this subtitle:</chapeau><paragraph class="indentDown1 fontsize10" id="y6fc7e52c-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Critical infrastructure information</inline>.—</heading><content>The term ‘<term>critical infrastructure information</term>’ has the meaning given the term in section 2222.</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="y6fc7e52d-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Cybersecurity risk</inline>.—</heading><content>The term ‘<term>cybersecurity risk</term>’ has the meaning given the term in section 2209.</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="y6fc7e52e-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Cybersecurity threat</inline>.—</heading><content>The term ‘<term>cybersecurity threat</term>’ has the meaning given the term in section 102(5) of the Cybersecurity Act of 2015 (contained in division N of the Consolidated Appropriations Act, 2016 (<ref href="/us/pl/114/113">Public Law 114–113</ref>; <ref href="/us/usc/t6/s1501">6 U.S.C. 1501</ref>)).</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="y6fc7e52f-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">National cybersecurity asset response activities</inline>.—</heading><chapeau>The term ‘<term>national cybersecurity asset response activities</term>’ means—</chapeau><subparagraph class="fontsize10" id="y6fc7e530-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>furnishing cybersecurity technical assistance to entities affected by cybersecurity risks to protect assets, mitigate vulnerabilities, and reduce impacts of cyber incidents;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc7e531-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>identifying other entities that may be at risk of an incident and assessing risk to the same or similar vulnerabilities;<page identifier="/us/stat/132/4169">132 STAT. 4169</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc7e532-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>assessing potential cybersecurity risks to a sector or region, including potential cascading effects, and developing courses of action to mitigate such risks;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc7e533-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>facilitating information sharing and operational coordination with threat response; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc7e534-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><content>providing guidance on how best to utilize Federal resources and capabilities in a timely, effective manner to speed recovery from cybersecurity risks.</content></subparagraph>
</paragraph>
<paragraph class="indentDown1 fontsize10" id="y6fc7e535-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><heading class="fontsize10"><inline class="smallCaps">Sector-specific agency</inline>.—</heading><content>The term ‘<term>Sector-Specific Agency</term>’ means a Federal department or agency, designated by law or presidential directive, with responsibility for providing institutional knowledge and specialized expertise of a sector, as well as leading, facilitating, or supporting programs and associated activities of its designated critical infrastructure sector in the all hazards environment in coordination with the Department.</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="y6fc7e536-e834-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><heading class="fontsize10"><inline class="smallCaps">Sharing</inline>.—</heading><content>The term ‘<term>sharing</term>’ has the meaning given the term in section 2209.</content></paragraph>
</section>
<section class="indentUp2 firstIndent-2" id="y6fc7e537-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="2202">“SEC. 2202. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc7e538-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s652">6 USC 652</ref>.</p></sidenote><heading class="bold">CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc7e539-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Redesignation</inline>.—</heading><paragraph class="fontsize10" id="y6fc7e53a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The National Protection and Programs Directorate of the Department shall, on and after the date of the enactment of this subtitle, be known as the ‘Cybersecurity and Infrastructure Security Agency’ (in this subtitle referred to as the ‘Agency’).</content></paragraph>
<paragraph class="fontsize10" id="y6fc7e53b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">References</inline>.—</heading><content>Any reference to the National Protection and Programs Directorate of the Department in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Cybersecurity and Infrastructure Security Agency of the Department.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc7e53c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Director</inline>.—</heading><paragraph class="fontsize10" id="y6fc7e53d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The Agency shall be headed by a Director of Cybersecurity and Infrastructure Security (in this subtitle referred to as the ‘Director’), who shall report to the Secretary.</content></paragraph>
<paragraph class="fontsize10" id="y6fc7e53e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Reference</inline>.—</heading><content>Any reference to an Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and any other related program of the Department as described in section 103(a)(1)(H) as in effect on the day before the date of enactment of this subtitle in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Director of Cybersecurity and Infrastructure Security of the Department.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc7e53f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Responsibilities</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc7e540-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote>.—</heading><chapeau>The Director shall—</chapeau><paragraph class="fontsize10" id="y6fc7e541-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>lead cybersecurity and critical infrastructure security programs, operations, and associated policy for the Agency, including national cybersecurity asset response activities;</content></paragraph>
<paragraph class="fontsize10" id="y6fc7e542-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>coordinate with Federal entities, including Sector-Specific Agencies, and non-Federal entities, including international entities, to carry out the cybersecurity and critical infrastructure activities of the Agency, as appropriate;</content></paragraph>
<paragraph class="fontsize10" id="y6fc7e543-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>carry out the responsibilities of the Secretary to secure Federal information and information systems consistent with law, including <ref href="/us/usc/t44/ch35/schII">subchapter II of chapter 35 of title 44, United States Code</ref>, and the Cybersecurity Act of 2015 (contained <page identifier="/us/stat/132/4170">132 STAT. 4170</page>
in division N of the Consolidated Appropriations Act, 2016 (<ref href="/us/pl/114/113">Public Law 114–113</ref>));</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c54-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>coordinate a national effort to secure and protect against critical infrastructure risks, consistent with subsection (e)(1)(E);</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c55-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>upon request, provide analyses, expertise, and other technical assistance to critical infrastructure owners and operators and, where appropriate, provide those analyses, expertise, and other technical assistance in coordination with Sector-Specific Agencies and other Federal departments and agencies;</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c56-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c57-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Collaboration.</p></sidenote><content>develop and utilize mechanisms for active and frequent collaboration between the Agency and Sector-Specific Agencies to ensure appropriate coordination, situational awareness, and communications with Sector-Specific Agencies;</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c58-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c59-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c5a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Collaboration.</p></sidenote><content>maintain and utilize mechanisms for the regular and ongoing consultation and collaboration among the Divisions of the Agency to further operational coordination, integrated situational awareness, and improved integration across the Agency in accordance with this Act;</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c5b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><chapeau>develop, coordinate, and implement—</chapeau><subparagraph class="fontsize10" id="y6fc80c5c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c5d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Strategic plans.</p></sidenote><content>comprehensive strategic plans for the activities of the Agency; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c5e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c5f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Risk assessments.</p></sidenote><content>risk assessments by and for the Agency;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc80c60-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">“(9) </num><content>carry out emergency communications responsibilities, in accordance with title XVIII;</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c61-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="10">“(10) </num><content>carry out cybersecurity, infrastructure security, and emergency communications stakeholder outreach and engagement and coordinate that outreach and engagement with critical infrastructure Sector-Specific Agencies, as appropriate; and</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c62-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">“(11) </num><content>carry out such other duties and powers prescribed by law or delegated by the Secretary.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc80c63-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Deputy Director</inline>.—</heading><chapeau>There shall be in the Agency a Deputy Director of Cybersecurity and Infrastructure Security who shall—</chapeau><paragraph class="fontsize10" id="y6fc80c64-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>assist the Director in the management of the Agency; and</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c65-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>report to the Director.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc80c66-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">“(e) </num><heading class="fontsize10"><inline class="smallCaps">Cybersecurity and Infrastructure Security Authorities of the Secretary</inline>.—</heading><paragraph class="fontsize10" id="y6fc80c67-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>The responsibilities of the Secretary relating to cybersecurity and infrastructure security shall include the following:</chapeau><subparagraph class="fontsize10" id="y6fc80c68-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>To access, receive, and analyze law enforcement information, intelligence information, and other information from Federal Government agencies, State, local, tribal, and territorial government agencies, including law enforcement agencies, and private sector entities, and to integrate that information, in support of the mission responsibilities of the Department, in order to—</chapeau><clause class="fontsize10" id="y6fc80c69-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>identify and assess the nature and scope of terrorist threats to the homeland;</content></clause>
<clause class="fontsize10" id="y6fc80c6a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>detect and identify threats of terrorism against the United States; and</content></clause>
<clause class="fontsize10" id="y6fc80c6b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>understand those threats in light of actual and potential vulnerabilities of the homeland.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc80c6c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c6d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessments.</p></sidenote><content>To carry out comprehensive assessments of the vulnerabilities of the key resources and critical infrastructure of the United States, including the performance of <page identifier="/us/stat/132/4171">132 STAT. 4171</page>
risk assessments to determine the risks posed by particular types of terrorist attacks within the United States, including an assessment of the probability of success of those attacks and the feasibility and potential efficacy of various countermeasures to those attacks. At the discretion of the Secretary, such assessments may be carried out in coordination with Sector-Specific Agencies.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c6e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c6f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c70-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>To integrate relevant information, analysis, and vulnerability assessments, regardless of whether the information, analysis, or assessments are provided or produced by the Department, in order to make recommendations, including prioritization, for protective and support measures by the Department, other Federal Government agencies, State, local, tribal, and territorial government agencies and authorities, the private sector, and other entities regarding terrorist and other threats to homeland security.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c71-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>To ensure, pursuant to section 202, the timely and efficient access by the Department to all information necessary to discharge the responsibilities under this title, including obtaining that information from other Federal Government agencies.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c72-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">“(E) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c73-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c74-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Plan.</p></sidenote><content>To develop, in coordination with the Sector-Specific Agencies with available expertise, a comprehensive national plan for securing the key resources and critical infrastructure of the United States, including power production, generation, and distribution systems, information technology and telecommunications systems (including satellites), electronic financial and property record storage and transmission systems, emergency communications systems, and the physical and technological assets that support those systems.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c75-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">“(F) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c76-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c77-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>To recommend measures necessary to protect the key resources and critical infrastructure of the United States in coordination with other Federal Government agencies, including Sector-Specific Agencies, and in cooperation with State, local, tribal, and territorial government agencies and authorities, the private sector, and other entities.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c78-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">“(G) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c79-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Review.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c7a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Analysis.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c7b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c7c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>To review, analyze, and make recommendations for improvements to the policies and procedures governing the sharing of information relating to homeland security within the Federal Government and between Federal Government agencies and State, local, tribal, and territorial government agencies and authorities.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c7d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">“(H) </num><content>To disseminate, as appropriate, information analyzed by the Department within the Department to other Federal Government agencies with responsibilities relating to homeland security and to State, local, tribal, and territorial government agencies and private sector entities with those responsibilities in order to assist in the deterrence, prevention, or preemption of, or response to, terrorist attacks against the United States.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c7e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">“(I) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c7f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>To consult with State, local, tribal, and territorial government agencies and private sector entities to ensure appropriate exchanges of information, including law <page identifier="/us/stat/132/4172">132 STAT. 4172</page>
enforcement-related information, relating to threats of terrorism against the United States.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c80-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="J">“(J) </num><content>To ensure that any material received pursuant to this Act is protected from unauthorized disclosure and handled and used only for the performance of official duties.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c81-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="K">“(K) </num><content>To request additional information from other Federal Government agencies, State, local, tribal, and territorial government agencies, and the private sector relating to threats of terrorism in the United States, or relating to other areas of responsibility assigned by the Secretary, including the entry into cooperative agreements through the Secretary to obtain such information.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c82-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="L">“(L) </num><content>To establish and utilize, in conjunction with the Chief Information Officer of the Department, a secure communications and information technology infrastructure, including data-mining and other advanced analytical tools, in order to access, receive, and analyze data and information in furtherance of the responsibilities under this section, and to disseminate information acquired and analyzed by the Department, as appropriate.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c83-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="M">“(M) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c84-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><content>To coordinate training and other support to the elements and personnel of the Department, other Federal Government agencies, and State, local, tribal, and territorial government agencies that provide information to the Department, or are consumers of information provided by the Department, in order to facilitate the identification and sharing of information revealed in their ordinary duties and the optimal utilization of information received from the Department.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c85-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="N">“(N) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c86-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><content>To coordinate with Federal, State, local, tribal, and territorial law enforcement agencies, and the private sector, as appropriate.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c87-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="O">“(O) </num><content>To exercise the authorities and oversight of the functions, personnel, assets, and liabilities of those components transferred to the Department pursuant to section 201(g).</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c88-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="P">“(P) </num><content>To carry out the functions of the national cybersecurity and communications integration center under section 2209.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c89-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="Q">“(Q) </num><content>To carry out the requirements of the Chemical Facility Anti-Terrorism Standards Program established under title XXI and the secure handling of ammonium nitrate program established under subtitle J of title VIII, or any successor programs.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc80c8a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c8b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Certification.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c8c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Briefing.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c8d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Public information.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc80c8e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Reallocation</inline>.—</heading><content>The Secretary may reallocate within the Agency the functions specified in sections 2203(b) and 2204(b), consistent with the responsibilities provided in paragraph (1), upon certifying to and briefing the appropriate congressional committees, and making available to the public, at least 60 days prior to the reallocation that the reallocation is necessary for carrying out the activities of the Agency.</content></paragraph>
<paragraph class="fontsize10" id="y6fc80c8f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Staff</inline>.—</heading><subparagraph class="fontsize10" id="y6fc80c90-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The Secretary shall provide the Agency with a staff of analysts having appropriate expertise and experience to assist the Agency in discharging the responsibilities of the Agency under this section.<page identifier="/us/stat/132/4173">132 STAT. 4173</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c91-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Private sector analysts</inline>.—</heading><content>Analysts under this subsection may include analysts from the private sector.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c92-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Security clearances</inline>.—</heading><content>Analysts under this subsection shall possess security clearances appropriate for their work under this section.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc80c93-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Detail of personnel</inline>.—</heading><subparagraph class="fontsize10" id="y6fc80c94-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>In order to assist the Agency in discharging the responsibilities of the Agency under this section, personnel of the Federal agencies described in subparagraph (B) may be detailed to the Agency for the performance of analytic functions and related duties.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c95-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Agencies</inline>.—</heading><chapeau>The Federal agencies described in this subparagraph are—</chapeau><clause class="fontsize10" id="y6fc80c96-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the Department of State;</content></clause>
<clause class="fontsize10" id="y6fc80c97-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the Central Intelligence Agency;</content></clause>
<clause class="fontsize10" id="y6fc80c98-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>the Federal Bureau of Investigation;</content></clause>
<clause class="fontsize10" id="y6fc80c99-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">“(iv) </num><content>the National Security Agency;</content></clause>
<clause class="fontsize10" id="y6fc80c9a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">“(v) </num><content>the National Geospatial-Intelligence Agency;</content></clause>
<clause class="fontsize10" id="y6fc80c9b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">“(vi) </num><content>the Defense Intelligence Agency;</content></clause>
<clause class="fontsize10" id="y6fc80c9c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">“(vii) </num><content>Sector-Specific Agencies; and</content></clause>
<clause class="fontsize10" id="y6fc80c9d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="viii">“(viii) </num><content>any other agency of the Federal Government that the President considers appropriate.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc80c9e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><heading class="fontsize10"><inline class="smallCaps">Interagency agreements</inline>.—</heading><content>The Secretary and the head of a Federal agency described in subparagraph (B) may enter into agreements for the purpose of detailing personnel under this paragraph.</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc80c9f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><heading class="fontsize10"><inline class="smallCaps">Basis</inline>.—</heading><content>The detail of personnel under this paragraph may be on a reimbursable or non-reimbursable basis.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc80ca0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">“(f) </num><heading class="fontsize10"><inline class="smallCaps">Composition</inline>.—</heading><chapeau>The Agency shall be composed of the following divisions:</chapeau><paragraph class="fontsize10" id="y6fc80ca1-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>The Cybersecurity Division, headed by an Assistant Director.</content></paragraph>
<paragraph class="fontsize10" id="y6fc80ca2-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>The Infrastructure Security Division, headed by an Assistant Director.</content></paragraph>
<paragraph class="fontsize10" id="y6fc80ca3-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>The Emergency Communications Division under title XVIII, headed by an Assistant Director.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc80ca4-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">“(g) </num><heading class="fontsize10"><inline class="smallCaps">Co-location</inline>.—</heading><paragraph class="fontsize10" id="y6fc80ca5-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>To the maximum extent practicable, the Director shall examine the establishment of central locations in geographical regions with a significant Agency presence.</content></paragraph>
<paragraph class="fontsize10" id="y6fc80ca6-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Coordination</inline>.—</heading><content>When establishing the central locations described in paragraph (1), the Director shall coordinate with component heads and the Under Secretary for Management to co-locate or partner on any new real property leases, renewing any occupancy agreements for existing leases, or agreeing to extend or newly occupy any Federal space or new construction.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc80ca7-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="h">“(h) </num><heading class="fontsize10"><inline class="smallCaps">Privacy</inline>.—</heading><paragraph class="fontsize10" id="y6fc80ca8-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>There shall be a Privacy Officer of the Agency with primary responsibility for privacy policy and compliance for the Agency.</content></paragraph>
<paragraph class="fontsize10" id="y6fc80ca9-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Responsibilities</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc80caa-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Personal information.</p></sidenote>.—</heading><chapeau>The responsibilities of the Privacy Officer of the Agency shall include—</chapeau><subparagraph class="fontsize10" id="y6fc80cab-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>assuring that the use of technologies by the Agency sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information;<page identifier="/us/stat/132/4174">132 STAT. 4174</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833bc-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>assuring that personal information contained in systems of records of the Agency is handled in full compliance as specified in <ref href="/us/usc/t5/s552a">section 552a of title 5, United States Code</ref> (commonly known as the ‘Privacy Act of 1974’);</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833bd-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833be-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Evaluation.</p></sidenote><content>evaluating legislative and regulatory proposals involving collection, use, and disclosure of personal information by the Agency; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833bf-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833c0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessment.</p></sidenote><content>conducting a privacy impact assessment of proposed rules of the Agency on the privacy of personal information, including the type of personal information collected and the number of people affected.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc833c1-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><heading class="fontsize10"><inline class="smallCaps">Savings</inline>.—</heading><content>Nothing in this title may be construed as affecting in any manner the authority, existing on the day before the date of enactment of this title, of any other component of the Department or any other Federal department or agency, including the authority provided to the Sector-Specific Agency specified in section 61003(c) of division F of the Fixing America’s Surface Transportation Act (<ref href="/us/usc/t6/s121">6 U.S.C. 121 note</ref>; <ref href="/us/pl/114/94">Public Law 114–94</ref>).</content></subsection>
</section>
<section class="indentUp2 firstIndent-2" id="y6fc833c2-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="2203">“SEC. 2203. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833c3-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s653">6 USC 653</ref>.</p></sidenote><heading class="bold">CYBERSECURITY DIVISION.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc833c4-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Establishment</inline>.—</heading><paragraph class="fontsize10" id="y6fc833c5-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>There is established in the Agency a Cybersecurity Division.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833c6-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Assistant director</inline>.—</heading><chapeau>The Cybersecurity Division shall be headed by an Assistant Director for Cybersecurity (in this section referred to as the ‘Assistant Director’), who shall—</chapeau><subparagraph class="fontsize10" id="y6fc833c7-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>be at the level of Assistant Secretary within the Department;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833c8-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833c9-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Appointment.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc833ca-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">President.</p></sidenote><content>be appointed by the President without the advice and consent of the Senate; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833cb-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>report to the Director.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc833cc-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Reference</inline>.—</heading><content>Any reference to the Assistant Secretary for Cybersecurity and Communications in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Assistant Director for Cybersecurity.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc833cd-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Functions</inline>.—</heading><chapeau>The Assistant Director shall—</chapeau><paragraph class="fontsize10" id="y6fc833ce-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>direct the cybersecurity efforts of the Agency;</content></paragraph>
<paragraph class="fontsize10" id="y6fc833cf-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>carry out activities, at the direction of the Director, related to the security of Federal information and Federal information systems consistent with law, including <ref href="/us/usc/t44/ch35/schII">subchapter II of chapter 35 of title 44, United States Code</ref>, and the Cybersecurity Act of 2015 (contained in division N of the Consolidated Appropriations Act, 2016 (<ref href="/us/pl/114/113">Public Law 114–113</ref>));</content></paragraph>
<paragraph class="fontsize10" id="y6fc833d0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>fully participate in the mechanisms required under section 2202(c)(7); and</content></paragraph>
<paragraph class="fontsize10" id="y6fc833d1-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>carry out such other duties and powers as prescribed by the Director.</content></paragraph>
</subsection>
</section>
<section class="indentUp2 firstIndent-2" id="y6fc833d2-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="2204">“SEC. 2204. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833d3-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s654">6 USC 654</ref>.</p></sidenote><heading class="bold">INFRASTRUCTURE SECURITY DIVISION.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc833d4-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Establishment</inline>.—</heading><paragraph class="fontsize10" id="y6fc833d5-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>There is established in the Agency an Infrastructure Security Division.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833d6-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Assistant director</inline>.—</heading><chapeau>The Infrastructure Security Division shall be headed by an Assistant Director for Infrastructure Security (in this section referred to as the ‘Assistant Director’), who shall—<page identifier="/us/stat/132/4175">132 STAT. 4175</page></chapeau><subparagraph class="fontsize10" id="y6fc833d7-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>be at the level of Assistant Secretary within the Department;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833d8-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833d9-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Appointment.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc833da-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">President.</p></sidenote><content>be appointed by the President without the advice and consent of the Senate; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc833db-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>report to the Director.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc833dc-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Reference</inline>.—</heading><content>Any reference to the Assistant Secretary for Infrastructure Protection in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Assistant Director for Infrastructure Security.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="y6fc833dd-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Functions</inline>.—</heading><chapeau>The Assistant Director shall—</chapeau><paragraph class="fontsize10" id="y6fc833de-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>direct the critical infrastructure security efforts of the Agency;</content></paragraph>
<paragraph class="fontsize10" id="y6fc833df-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>carry out, at the direction of the Director, the Chemical Facilities Anti-Terrorism Standards Program established under title XXI and the secure handling of ammonium nitrate program established under subtitle J of title VIII, or any successor programs;</content></paragraph>
<paragraph class="fontsize10" id="y6fc833e0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>fully participate in the mechanisms required under section 2202(c)(7); and</content></paragraph>
<paragraph class="fontsize10" id="y6fc833e1-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>carry out such other duties and powers as prescribed by the Director.”</content></paragraph>
</subsection>
</section>
</subtitle>
</title>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833e2-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Treatment of Certain Positions</inline>.—</heading><paragraph class="fontsize10" id="y6fc833e3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Under secretary</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833e4-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s652">6 USC 652 note</ref>.</p></sidenote>.—</heading><content>The individual serving as the Under Secretary appointed pursuant to section 103(a)(1)(H) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s113/a/1/H">6 U.S.C. 113(a)(1)(H)</ref>) of the Department of Homeland Security on the day before the date of enactment of this Act may continue to serve as the Director of Cybersecurity and Infrastructure Security of the Department on and after such date.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833e5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Director for emergency </inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833e6-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s571">6 USC 571 note</ref>.</p></sidenote>communications.—</heading><content>The individual serving as the Director for Emergency Communications of the Department of Homeland Security on the day before the date of enactment of this Act may continue to serve as the Assistant Director for Emergency Communications of the Department on and after such date.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833e7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Assistant secretary for cybersecurity and communications</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833e8-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s653">6 USC 653 note</ref>.</p></sidenote>.—</heading><content>The individual serving as the Assistant Secretary for Cybersecurity and Communications on the day before the date of enactment of this Act may continue to serve as the Assistant Director for Cybersecurity on and after such date.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833e9-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/b/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Assistant secretary for infrastructure protection</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833ea-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s654">6 USC 654 note</ref>.</p></sidenote>.—</heading><content>The individual serving as the Assistant Secretary for Infrastructure Protection on the day before the date of enactment of this Act may continue to serve as the Assistant Director for Infrastructure Security on and after such date.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833eb-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Reference</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833ec-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s571">6 USC 571 note</ref>.</p></sidenote>.—</heading><chapeau>Any reference to—</chapeau><paragraph class="fontsize10" id="y6fc833ed-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the Office of Emergency Communications in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Emergency Communications Division; and</content></paragraph>
<paragraph class="fontsize10" id="y6fc833ee-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>the Director for Emergency Communications in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Assistant Director for Emergency Communications.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833ef-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Oversight</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833f0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote>.—</heading><chapeau>The Director of Cybersecurity and Infrastructure Security of the Department of Homeland Security shall provide <page identifier="/us/stat/132/4176">132 STAT. 4176</page>
to Congress, in accordance with the deadlines specified in paragraphs (1) through (6), information on the following:</chapeau><paragraph class="fontsize10" id="y6fc833f1-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833f2-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Briefing.</p></sidenote><content>Not later than 60 days after the date of enactment of this Act, a briefing on the activities of the Agency relating to the development and use of the mechanisms required pursuant to section 2202(c)(6) of the Homeland Security Act of 2002 (as added by subsection (a)).</content></paragraph>
<paragraph class="fontsize10" id="y6fc833f3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833f4-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Briefing.</p></sidenote><content>Not later than 1 year after the date of the enactment of this Act, a briefing on the activities of the Agency relating to the use and improvement by the Agency of the mechanisms required pursuant to section 2202(c)(6) of the Homeland Security Act of 2002 and how such activities have impacted coordination, situational awareness, and communications with Sector-Specific Agencies.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833f5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Not later than 90 days after the date of the enactment of this Act, information on the mechanisms of the Agency for regular and ongoing consultation and collaboration, as required pursuant to section 2202(c)(7) of the Homeland Security Act of 2002 (as added by subsection (a)).</content></paragraph>
<paragraph class="fontsize10" id="y6fc833f6-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>Not later than 1 year after the date of the enactment of this Act, information on the activities of the consultation and collaboration mechanisms of the Agency as required pursuant to section 2202(c)(7) of the Homeland Security Act of 2002, and how such mechanisms have impacted operational coordination, situational awareness, and integration across the Agency.</content></paragraph>
<paragraph class="fontsize10" id="y6fc833f7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/d/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>Not later than 180 days after the date of enactment of this Act, information, which shall be made publicly available and updated as appropriate, on the mechanisms and structures of the Agency responsible for stakeholder outreach and engagement, as required under section 2202(c)(10) of the Homeland Security Act of 2002 (as added by subsection (a)).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833f8-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><inline class="smallCaps">Cyber Workforce</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833f9-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc833fa-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote>.—</heading><content>Not later than 90 days after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, in coordination with the Director of the Office of Personnel Management, shall submit to Congress a report detailing how the Agency is meeting legislative requirements under the Cybersecurity Workforce Assessment Act (<ref href="/us/pl/113/246">Public Law 113–246</ref>; <ref href="/us/stat/128/2880">128 Stat. 2880</ref>) and the Homeland Security Cybersecurity Workforce Assessment Act (enacted as section 4 of the Border Patrol Agent Pay Reform Act of 2014; <ref href="/us/pl/113/277">Public Law 113–277</ref>) to address cyber workforce needs.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833fb-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><heading class="fontsize10"><inline class="smallCaps">Facility</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc833fc-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote>.—</heading><content>Not later than 180 days after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security shall report to Congress on the most efficient and effective methods of consolidating Agency facilities, personnel, and programs to most effectively carry out the Agency’s mission.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc833fd-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">(g) </num><heading class="fontsize10"><inline class="smallCaps">Technical and Conforming Amendments to the Homeland Security Act of 2002</inline>.—</heading><chapeau>The Homeland Security Act of 2002 (<ref href="/us/usc/t6/s101/etseq">6 U.S.C. 101 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y6fc833fe-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="amend">amending</amendingAction> section 103(a)(1)(H) (<ref href="/us/usc/t6/s113/a/1/H">6 U.S.C. 113(a)(1)(H)</ref>) to read as follows:<quotedContent><subparagraph class="fontsize10" id="y6fc833ff-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">“(H) </num><content>A Director of the Cybersecurity and Infrastructure Security Agency.”</content></subparagraph>
</quotedContent>;</content></paragraph>
<paragraph class="fontsize10" id="y6fc83400-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>in title II (<ref href="/us/usc/t6/s121/etseq">6 U.S.C. 121 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc85a11-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in the title heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><b>AND INFRASTRUCTURE PROTECTION</b></quotedText>”;<page identifier="/us/stat/132/4177">132 STAT. 4177</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a12-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in the subtitle A heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><b>and Infrastructure Protection</b></quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a13-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>in section 201 (<ref href="/us/usc/t6/s121">6 U.S.C. 121</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a14-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in the section heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText>and infrastructure protection</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc85a15-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (a)—</chapeau><subclause class="fontsize10" id="y6fc85a16-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in the subsection heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">and Infrastructure Protection</headingText></quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc85a17-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>and an Office of Infrastructure Protection</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc85a18-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><chapeau>in subsection (b)—</chapeau><subclause class="fontsize10" id="y6fc85a19-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in the subsection heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">and Assistant Secretary for Infrastructure Protection</headingText></quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc85a1a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> paragraph (3);</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc85a1b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><chapeau>in subsection (c)—</chapeau><subclause class="fontsize10" id="y6fc85a1c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iv/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>and infrastructure protection</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc85a1d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/iv/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>or the Assistant Secretary for Infrastructure Protection, as appropriate</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc85a1e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><chapeau>in subsection (d)—</chapeau><subclause class="fontsize10" id="y6fc85a1f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in the subsection heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText><headingText class="smallCaps">and Infrastructure Protection</headingText></quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc85a20-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in the matter preceding paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and infrastructure protection</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc85a21-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>by <amendingAction type="delete">striking</amendingAction> paragraphs (5), (6), and (25);</content></subclause>
<subclause class="fontsize10" id="y6fc85a22-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/IV" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">(IV) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraphs (7) through (24) as paragraphs (5) through (22), respectively;</content></subclause>
<subclause class="fontsize10" id="y6fc85a23-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/V" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="V">(V) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> paragraph (26) as paragraph (23); and</content></subclause>
<subclause class="fontsize10" id="y6fc85a24-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/v/VI" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="VI">(VI) </num><content>in paragraph (23)(B)(i), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 319</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 320</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc85a25-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>in subsection (e)(1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and the Office of Infrastructure Protection</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc85a26-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/C/vii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">(vii) </num><content>in subsection (f)(1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and the Office of Infrastructure Protection</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc85a27-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>in section 202 (<ref href="/us/usc/t6/s122">6 U.S.C. 122</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a28-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in subsection (c), in the matter preceding paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director of Central Intelligence</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of National Intelligence</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc85a29-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in subsection (d)(2), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director of Central Intelligence</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of National Intelligence</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc85a2a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><chapeau>in section 204 (<ref href="/us/usc/t6/s124a">6 U.S.C. 124a</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a2b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/E/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in subsection (c)(1), in the matter preceding subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of the Cybersecurity and Infrastructure Security Agency</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc85a2c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/E/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in subsection (d)(1), in the matter preceding subparagraph (A), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of the Cybersecurity and Infrastructure Security Agency</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc85a2d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><content>in section 210A(c)(2)(B) (<ref href="/us/usc/t6/s124h/c/2/B">6 U.S.C. 124h(c)(2)(B)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Infrastructure Protection</quotedText>” and <page identifier="/us/stat/132/4178">132 STAT. 4178</page>
<amendingAction type="insert">inserting</amendingAction> “<quotedText>Cybersecurity and Infrastructure Security Agency</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a2e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> section 210E (<ref href="/us/usc/t6/s124l">6 U.S.C. 124l</ref>) as section 2214<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc85a2f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s664">6 USC 664</ref>.</p></sidenote> and transferring such section to appear after section 2213 (as redesignated by subparagraph (I));</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a30-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/H" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">(H) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc85a31-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s671–674">6 USC 671–674</ref>.</p></sidenote><content>in subtitle B, by <amendingAction type="redesignate">redesignating</amendingAction> sections 211 through 215 (<ref href="/us/usc/t6/s101">6 U.S.C. 101 note</ref>, and 131 through 134) as sections 2221 through 2225, respectively, and transferring such subtitle, including the enumerator and heading of subtitle B and such sections, to appear after section 2214 (as redesignated by subparagraph (G));</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a32-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/I" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc85a33-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s655–663">6 USC 655–663</ref>.</p></sidenote><content>by <amendingAction type="redesignate">redesignating</amendingAction> sections 223 through 230 (<ref href="/us/usc/t6/s143">6 U.S.C. 143</ref> through 151) as sections 2205 through 2213, respectively, and transferring such sections to appear after section 2204, as added by this Act;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a34-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/J" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="J">(J) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc85a35-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s124m">6 USC 124m</ref>.</p></sidenote><content>by <amendingAction type="redesignate">redesignating</amendingAction> section 210F as section 210E; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a36-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/2/K" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="K">(K) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subtitles C and D as subtitles B and C, respectively;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc85a37-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>in title III (<ref href="/us/usc/t6/s181/etseq">6 U.S.C. 181 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc85a38-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in section 302 (<ref href="/us/usc/t6/s182">6 U.S.C. 182</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a39-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>biological,,</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>biological,</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc85a3a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in paragraph (3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of the Cybersecurity and Infrastructure Security Agency</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc85a3b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> the second section 319 (<ref href="/us/usc/t6/s195f">6 U.S.C. 195f</ref>) (relating to EMP and GMD mitigation research and development) as section 320; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a3c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/3/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in section 320(c)(1), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>Section 214</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Section 2224</quotedText>”;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc85a3d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>in title V (<ref href="/us/usc/t6/s311/etseq">6 U.S.C. 311 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc85a3e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in section 508(d)(2)(D) (<ref href="/us/usc/t6/s318/d/2/D">6 U.S.C. 318(d)(2)(D)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>The Director of the Office of Emergency Communications of the Department of Homeland Security</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>The Assistant Director for Emergency Communications</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a3f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in section 514 (<ref href="/us/usc/t6/s321c">6 U.S.C. 321c</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a40-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> subsection (b); and</content></clause>
<clause class="fontsize10" id="y6fc85a41-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsection (c) as subsection (b); and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc85a42-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>in section 523 (<ref href="/us/usc/t6/s321l">6 U.S.C. 321l</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a43-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in subsection (a), in the matter preceding paragraph (1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc85a44-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/4/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in subsection (c), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”;</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc85a45-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><chapeau>in title VIII (<ref href="/us/usc/t6/s361/etseq">6 U.S.C. 361 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc85a46-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/5/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in section 884(d)(4)(A)(ii) (<ref href="/us/usc/t6/s464/d/4/A/ii">6 U.S.C. 464(d)(4)(A)(ii)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and other related programs of the Department</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”; and<page identifier="/us/stat/132/4179">132 STAT. 4179</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc85a47-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/5/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in section 899B(a) (<ref href="/us/usc/t6/s488a/a">6 U.S.C. 488a(a)</ref>), by <amendingAction type="add">adding</amendingAction> at the end the following: “<quotedText>Such regulations shall be carried out by the Cybersecurity and Infrastructure Security Agency.</quotedText>”;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc85a48-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><chapeau>in title XVIII (<ref href="/us/usc/t6/s571/etseq">6 U.S.C. 571 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc85a49-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in section 1801 (<ref href="/us/usc/t6/s571">6 U.S.C. 571</ref>)—</chapeau><clause class="fontsize10" id="y6fc85a4a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in the section heading, by <amendingAction type="delete">striking</amendingAction> “<quotedText>office of emergency communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>emergency communications division</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc85a4b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (a)—</chapeau><subclause class="fontsize10" id="y6fc85a4c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Emergency Communications Division</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc85a4d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following: “<quotedText>The Division shall be located in the Cybersecurity and Infrastructure Security Agency.</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc85a4e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>by <amendingAction type="amend">amending</amendingAction> subsection (b) to read as follows:<quotedContent><subsection class="indentDown3 firstIndent0 fontsize10" id="y6fc85a4f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Assistant Director</inline>.—</heading><content>The head of the Division shall be the Assistant Director for Emergency Communications. The Assistant Director shall report to the Director of Cybersecurity and Infrastructure Security. All decisions of the Assistant Director that entail the exercise of significant authority shall be subject to the approval of the Director of Cybersecurity and Infrastructure Security.”</content></subsection>
</quotedContent>;</content></clause>
<clause class="fontsize10" id="y6fc85a50-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><chapeau>in subsection (c)—</chapeau><subclause class="fontsize10" id="y6fc85a51-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iv/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in the matter preceding paragraph (1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant</quotedText>” before “<quotedText>Director</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc85a52-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iv/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in paragraph (14), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end;</content></subclause>
<subclause class="fontsize10" id="y6fc85a53-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iv/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>in paragraph (15), by <amendingAction type="delete">striking</amendingAction> the period at the end and <amendingAction type="insert">inserting</amendingAction> “<quotedText>; and</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc85a54-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/iv/IV" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">(IV) </num><content>by <amendingAction type="insert">inserting</amendingAction> after paragraph (15) the following:<quotedContent><paragraph class="indentDown3 fontsize10" id="y6fc88165-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="16">“(16) </num><content>fully participate in the mechanisms required under section 2202(c)(7).”</content></paragraph>
</quotedContent>;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc88166-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>in subsection (d), in the matter preceding paragraph (1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant</quotedText>” before “<quotedText>Director</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc88167-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/A/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>in subsection (e), in the matter preceding paragraph (1), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant</quotedText>” before “<quotedText>Director</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc88168-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in sections 1802 through 1805 (<ref href="/us/usc/t6/s572">6 U.S.C. 572</ref> through 575), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director for Emergency Communications</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director for Emergency Communications</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc88169-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>in section 1809 (<ref href="/us/usc/t6/s579">6 U.S.C. 579</ref>)—</chapeau><clause class="fontsize10" id="y6fc8816a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director of Emergency Communications</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director for Emergency Communications</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc8816b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (b)—</chapeau><subclause class="fontsize10" id="y6fc8816c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director for Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director for Emergency Communications</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc8816d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Emergency Communications Division</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc8816e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>in subsection (e)(3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>the Director</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the Assistant Director</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc8816f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><chapeau>in subsection (m)(1)—<page identifier="/us/stat/132/4180">132 STAT. 4180</page></chapeau><subclause class="fontsize10" id="y6fc88170-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/iv/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>The Director</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>The Assistant Director</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc88171-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/iv/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>the Director determines</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>the Assistant Director determines</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc88172-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/C/iv/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Cybersecurity and Infrastructure Security Agency</quotedText>”;</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc88173-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>in section 1810 (<ref href="/us/usc/t6/s580">6 U.S.C. 580</ref>)—</chapeau><clause class="fontsize10" id="y6fc88174-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in subsection (a)(1), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director of the Office of Emergency Communications (referred to in this section as the ‘Director’)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director for Emergency Communications (referred to in this section as the ‘Assistant Director’)</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc88175-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in subsection (c), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Emergency Communications Division</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc88176-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/6/D/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director</quotedText>”;</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc88177-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><chapeau>in title XX (<ref href="/us/usc/t6/s601/etseq">6 U.S.C. 601 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc88178-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in paragraph (4)(A)(iii)(II) of section 2001 (<ref href="/us/usc/t6/s601">6 U.S.C. 601</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 210E(a)(2)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2214(a)(2)</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc88179-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in section 2008(a)(3) (<ref href="/us/usc/t6/s609/a/3">6 U.S.C. 609(a)(3)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 210E(a)(2)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2214(a)(2)</quotedText>”; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc8817a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><chapeau>in section 2021 (<ref href="/us/usc/t6/s611">6 U.S.C. 611</ref>)—</chapeau><clause class="fontsize10" id="y6fc8817b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> subsection (c); and</content></clause>
<clause class="fontsize10" id="y6fc8817c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/7/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsection (d) as subsection (c);</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc8817d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><chapeau>in title XXI (<ref href="/us/usc/t6/s621/etseq">6 U.S.C. 621 et seq.</ref>)—</chapeau><subparagraph class="fontsize10" id="y6fc8817e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/8/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in section 2102(a)(1) (<ref href="/us/usc/t6/s622/a/1">6 U.S.C. 622(a)(1)</ref>), by <amendingAction type="insert">inserting</amendingAction> “<quotedText>, which shall be located in the Cybersecurity and Infrastructure Security Agency</quotedText>” before the period at the end; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc8817f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/8/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in section 2104(c)(2) (<ref href="/us/usc/t6/s624/c/2">6 U.S.C. 624(c)(2)</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary responsible for overseeing critical infrastructure protection, cybersecurity, and other related programs of the Department appointed under section 103(a)(1)(H)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc88180-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">(9) </num><chapeau>in title XXII, as added by this Act—</chapeau><subparagraph class="fontsize10" id="y6fc88181-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in subtitle A—</chapeau><clause class="fontsize10" id="y6fc88182-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in section 2205, as so redesignated—</chapeau><subclause class="fontsize10" id="y6fc88183-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><chapeau>in the matter preceding paragraph (1)—</chapeau><item class="fontsize10" id="y6fc88184-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/i/I/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 201</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2202</quotedText>”; and</content></item>
<item class="fontsize10" id="y6fc88185-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/i/I/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary appointed under section 103(a)(1)(H)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”; and</content></item>
</subclause>
<subclause class="fontsize10" id="y6fc88186-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in paragraph (1)(B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>and</quotedText>” at the end;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc88187-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in section 2206, as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>Assistant Secretary for Infrastructure Protection</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc88188-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><chapeau>in section 2209, as so redesignated—<page identifier="/us/stat/132/4181">132 STAT. 4181</page></chapeau><subclause class="fontsize10" id="y6fc88189-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary appointed under section 103(a)(1)(H)</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc8818a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in subsection (a)(4), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 212(5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2222(5)</quotedText>”;</content></subclause>
<subclause class="fontsize10" id="y6fc8818b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iii/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><content>in subsection (b), by <amendingAction type="add">adding</amendingAction> at the end the following: “<quotedText>The Center shall be located in the Cybersecurity and Infrastructure Security Agency. The head of the Center shall report to the Assistant Director for Cybersecurity.</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc8818c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iii/IV" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="IV">(IV) </num><content>in subsection (c)(11), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Office of Emergency Communications</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Emergency Communications Division</quotedText>”;</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc8818d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><chapeau>in section 2210, as so redesignated—</chapeau><subclause class="fontsize10" id="y6fc8818e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iv/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc8818f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iv/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><chapeau>in subsection (c)—</chapeau><item class="fontsize10" id="y6fc88190-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iv/II/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary appointed under section 103(a)(1)(H)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security</quotedText>”; and</content></item>
<item class="fontsize10" id="y6fc88191-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/iv/II/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 212(5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2222(5)</quotedText>”;</content></item>
</subclause>
</clause>
<clause class="fontsize10" id="y6fc88192-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>in section 2211(b)(2)(A), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>the section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc88193-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>in section 2212, as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 212(5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2222(5)</quotedText>”;</content></clause>
<clause class="fontsize10" id="y6fc88194-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/vii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">(vii) </num><chapeau>in section 2213(a), as so redesignated—</chapeau><subclause class="fontsize10" id="y6fc88195-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/vii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>in paragraph (3), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 228</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2210</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc88196-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/vii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>in paragraph (4), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc88197-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/viii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="viii">(viii) </num><chapeau>in section 2214, as so redesignated—</chapeau><subclause class="fontsize10" id="y6fc88198-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/viii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> subsection (e); and</content></subclause>
<subclause class="fontsize10" id="y6fc88199-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/A/viii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="redesignate">redesignating</amendingAction> subsection (f) as subsection (e); and</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc8819a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in subtitle B—</chapeau><clause class="fontsize10" id="y6fc8819b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>in section 2222(8), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc8819c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/g/9/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in section 2224(h), as so redesignated, by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 213</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2223</quotedText>”;</content></clause>
</subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc8819d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="h">(h) </num><heading class="fontsize10"><inline class="smallCaps">Technical and Conforming Amendments to Other Laws</inline>.—</heading><paragraph class="fontsize10" id="y6fc8819e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Cybersecurity act of 2015</inline>.—</heading><chapeau>The Cybersecurity Act of 2015 (<ref href="/us/usc/t6/s1501/etseq">6 U.S.C. 1501 et seq.</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="y6fc8819f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>in section 202(2) (<ref href="/us/usc/t6/s131">6 U.S.C. 131 note</ref>)—</chapeau><clause class="fontsize10" id="y6fc881a0-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc881a1-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as so redesignated by section 223(a)(3) of this division</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc881a2-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>in section 207(2) (<ref href="/us/pl/114/113">Public Law 114–113</ref>; <ref href="/us/stat/129/2962">129 Stat. 2962</ref>)—</chapeau><clause class="fontsize10" id="y6fc881a3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc881a4-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as redesignated by section 223(a) of this division,</quotedText>”;<page identifier="/us/stat/132/4182">132 STAT. 4182</page></content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc881a5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>in section 208 (<ref href="/us/pl/114/113">Public Law 114–113</ref>; <ref href="/us/stat/129/2962">129 Stat. 2962</ref>), by <amendingAction type="delete">striking</amendingAction> “<quotedText>Under Secretary appointed under section 103(a)(1)(H) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s113/a/1/H">6 U.S.C. 113(a)(1)(H)</ref>)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Director of Cybersecurity and Infrastructure Security of the Department</quotedText>”;</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc881a6-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><chapeau>in section 222 (<ref href="/us/usc/t6/s1521">6 U.S.C. 1521</ref>)—</chapeau><clause class="fontsize10" id="y6fc881a7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in paragraph (2)—</chapeau><subclause class="fontsize10" id="y6fc881a8-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 228</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2210</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc881a9-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(4) of this division</quotedText>”; and</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc881aa-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in paragraph (4)—</chapeau><subclause class="fontsize10" id="y6fc881ab-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc881ac-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/D/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as so redesignated by section 223(a)(3) of this division</quotedText>”;</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc881ad-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><chapeau>in section 223(b) (<ref href="/us/usc/t6/s151">6 U.S.C. 151 note</ref>)—</chapeau><clause class="fontsize10" id="y6fc881ae-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/E/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230(b)(1) of the Homeland Security Act of 2002, as added by subsection (a)</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213(b)(1) of the Homeland Security Act of 2002</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc881af-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/E/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>in paragraph (1)(B), by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230(b)(2) of the Homeland Security Act of 2002, as added by subsection (a)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213(b)(2) of the Homeland Security Act of 2002</quotedText>”;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc881b0-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="F">(F) </num><chapeau>in section 226 (<ref href="/us/usc/t6/s1524">6 U.S.C. 1524</ref>)—</chapeau><clause class="fontsize10" id="y6fc881b1-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in subsection (a)—</chapeau><subclause class="fontsize10" id="y6fc881b2-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><chapeau>in paragraph (1)—</chapeau><item class="fontsize10" id="y6fc881b3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/I/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213</quotedText>”; and</content></item>
<item class="fontsize10" id="y6fc881b4-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/I/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(6) of this division</quotedText>”;</content></item>
</subclause>
<subclause class="fontsize10" id="y6fc881b5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><chapeau>in paragraph (4)—</chapeau><item class="fontsize10" id="y6fc881b6-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/II/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 228(b)(1)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2210(b)(1)</quotedText>”; and</content></item>
<item class="fontsize10" id="y6fc881b7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/II/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(4) of this division</quotedText>”; and</content></item>
</subclause>
<subclause class="fontsize10" id="y6fc881b8-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/III" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="III">(III) </num><chapeau>in paragraph (5)—</chapeau><item class="fontsize10" id="y6fc881b9-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/III/aa" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="aa">(aa) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230(b)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213(b)</quotedText>”; and</content></item>
<item class="fontsize10" id="y6fc881ba-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/i/III/bb" style="-uslm-lc:I658130"><num class="fontsize10" style="-uslm-lc:emspace2" value="bb">(bb) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(6) of this division</quotedText>”; and</content></item>
</subclause>
</clause>
<clause class="fontsize10" id="y6fc881bb-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (c)(1)(A)(vi)—</chapeau><subclause class="fontsize10" id="y6fc881bc-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230(c)(5)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213(c)(5)</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc881bd-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/F/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(6) of this division</quotedText>”;</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc881be-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="G">(G) </num><chapeau>in section 227 (<ref href="/us/usc/t6/s1525">6 U.S.C. 1525</ref>)—</chapeau><clause class="fontsize10" id="y6fc881bf-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>in subsection (a)—</chapeau><subclause class="fontsize10" id="y6fc881c0-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc881c1-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(6) of this division,</quotedText>”; and</content></subclause>
</clause>
<clause class="fontsize10" id="y6fc8a8d2-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (b)—</chapeau><subclause class="fontsize10" id="y6fc8a8d3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 230(d)(2)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2213(d)(2)</quotedText>”; and<page identifier="/us/stat/132/4183">132 STAT. 4183</page></content></subclause>
<subclause class="fontsize10" id="y6fc8a8d4-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/G/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as added by section 223(a)(6) of this division,</quotedText>”; and</content></subclause>
</clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc8a8d5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/H" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="H">(H) </num><chapeau>in section 404 (<ref href="/us/usc/t6/s1532">6 U.S.C. 1532</ref>)—</chapeau><clause class="fontsize10" id="y6fc8a8d6-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/H/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>Director for Emergency Communications</quotedText>” each place that term appears and <amendingAction type="insert">inserting</amendingAction> “<quotedText>Assistant Director for Emergency Communications</quotedText>”; and</content></clause>
<clause class="fontsize10" id="y6fc8a8d7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/H/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><chapeau>in subsection (a)—</chapeau><subclause class="fontsize10" id="y6fc8a8d8-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/H/ii/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209</quotedText>”; and</content></subclause>
<subclause class="fontsize10" id="y6fc8a8d9-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/1/H/ii/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>by <amendingAction type="delete">striking</amendingAction> “<quotedText>, as redesignated by section 223(a)(3) of this division,</quotedText>”.</content></subclause>
</clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc8a8da-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/2" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Small business act</inline>.—</heading><content>Section 21(a)(8)(B) of the Small Business Act (<ref href="/us/usc/t15/s648/a/8/B">15 U.S.C. 648(a)(8)(B)</ref>) <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> “<quotedText>section 227(a) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s148/a">6 U.S.C. 148(a)</ref>)</quotedText>” and <amendingAction type="insert">inserting</amendingAction> “<quotedText>section 2209(a) of the Homeland Security Act of 2002</quotedText>”.</content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8db-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/3" role="instruction" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Title 5</inline>.—</heading><chapeau><ref href="/us/usc/t5/ch53/schII">Subchapter II of chapter 53 of title 5, United States Code</ref>, <amendingAction type="amend">is amended</amendingAction>—</chapeau><subparagraph class="fontsize10" id="y6fc8a8dc-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>in section 5314, by <amendingAction type="insert">inserting</amendingAction> after “<quotedText>Under Secretaries, Department of Homeland Security.</quotedText>” the following:<quotedContent><p class="indentDown1 fontsize10" id="x6fc8a8dd-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122">  “Director, Cybersecurity and Infrastructure Security Agency.”</p></quotedContent>; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc8a8de-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/h/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>in section 5315, by <amendingAction type="insert">inserting</amendingAction> after “<quotedText>Assistant Secretaries, Department of Homeland Security.</quotedText>” the following:<quotedContent><p class="indentDown1 fontsize10" id="x6fc8a8df-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122">  “Assistant Director for Cybersecurity, Cybersecurity and Infrastructure Security Agency.</p><p class="indentDown1 fontsize10" id="x6fc8a8e0-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122">  “Assistant Director for Infrastructure Security, Cybersecurity and Infrastructure Security Agency.”</p></quotedContent>.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc8a8e1-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><heading class="fontsize10"><inline class="smallCaps">Table of Contents Amendments</inline>.—</heading><chapeau>The table of contents in section 1(b) of the Homeland Security Act of 2002 (<ref href="/us/pl/107/296">Public Law 107–296</ref>; <ref href="/us/stat/116/2135">116 Stat. 2135</ref>) <amendingAction type="amend">is amended</amendingAction>—</chapeau><paragraph class="fontsize10" id="y6fc8a8e2-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to title II and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><toc>
<referenceItem role="title" style="-uslm-lc:I658274">
<designator>“TITLE II—</designator>
<label>INFORMATION ANALYSIS”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e3-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to subtitle A of title II and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><toc>
<referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle A—</designator>
<label>Information and Analysis; Access to Information”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e4-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to section 201 and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 201. </designator>
<label>Information and analysis.”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e5-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>by <amendingAction type="delete">striking</amendingAction> the items relating to sections 210E and 210F and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 210E. </designator>
<label>Classified Information Advisory Officer.”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e6-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><content>by <amendingAction type="delete">striking</amendingAction> the items relating to subtitle B of title II and sections 211 through 215;</content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e7-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/6" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><content>by <amendingAction type="delete">striking</amendingAction> the items relating to section 223 through section 230;</content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e8-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/7" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to subtitle C and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><page identifier="/us/stat/132/4184">132 STAT. 4184</page>
<toc>
<referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle B—</designator>
<label>Information Security”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8e9-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/8" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to subtitle D and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><toc>
<referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle C—</designator>
<label>Office of Science and Technology”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8ea-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/9" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">(9) </num><content>by <amendingAction type="delete">striking</amendingAction> the items relating to sections 317, 319, 318, and 319 and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 317. </designator>
<label>Promoting antiterrorism through international cooperation program.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 318. </designator>
<label>Social media working group.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 319. </designator>
<label>Transparency in research and development.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 320. </designator>
<label>EMP and GMD mitigation research and development.”;<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8eb-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/10" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="10">(10) </num><content>by <amendingAction type="delete">striking</amendingAction> the item relating to section 1801 and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><?GPOvSpace 04?>
<toc>
<referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1801. </designator>
<label>Emergency Communications Division.”; and<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></paragraph>
<paragraph class="fontsize10" id="y6fc8a8ec-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s2/i/11" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">(11) </num><content>by <amendingAction type="add">adding</amendingAction> at the end the following:<quotedContent><toc>
<referenceItem role="title" style="-uslm-lc:I658274">
<designator>“TITLE XXII—</designator>
<label>CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle A—</designator>
<label>Cybersecurity and Infrastructure Security</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2201. </designator>
<label>Definitions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2202. </designator>
<label>Cybersecurity and Infrastructure Security Agency.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2203. </designator>
<label>Cybersecurity Division.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2204. </designator>
<label>Infrastructure Security Division.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2205. </designator>
<label>Enhancement of Federal and non-Federal cybersecurity.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2206. </designator>
<label>Net guard.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2207. </designator>
<label>Cyber Security Enhancement Act of 2002.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2208. </designator>
<label>Cybersecurity recruitment and retention.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2209. </designator>
<label>National cybersecurity and communications integration center.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2210. </designator>
<label>Cybersecurity plans.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2211. </designator>
<label>Cybersecurity strategy.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2212. </designator>
<label>Clearances.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2213. </designator>
<label>Federal intrusion detection and prevention system.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2214. </designator>
<label>National Asset Database.</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle B—</designator>
<label>Critical Infrastructure Information</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2221. </designator>
<label>Short title.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2222. </designator>
<label>Definitions.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2223. </designator>
<label>Designation of critical infrastructure protection program.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2224. </designator>
<label>Protection of voluntarily shared critical infrastructure information.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 2225. </designator>
<label>No private right of action.”.</label>
</referenceItem></toc>
</quotedContent></content></paragraph>
</subsection>
</section>
<section id="d148503e3402" identifier="/us/pl/115/278/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc8cffd-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s452">6 USC 452 note</ref>.</p></sidenote><heading>TRANSFER OF OTHER ENTITIES.</heading><subsection class="firstIndent0 fontsize10" id="y6fc9452e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc9452f-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Effective date.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Office of Biometric Identity Management</inline>.—</heading><content>The Office of Biometric Identity Management of the Department of Homeland Security located in the National Protection and Programs Directorate of the Department of Homeland Security on the day before the date of enactment of this Act is hereby transferred to the Management Directorate of the Department.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc94530-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Federal Protective Service</inline>.—</heading><paragraph class="fontsize10" id="y6fc94531-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc94532-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc94533-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote>.—</heading><content>Not later than 90 days after the completion of the Government Accountability Office review of the organizational placement of the Federal Protective Service (authorized under <ref href="/us/usc/t40/s1315">section 1315 of title 40, United States Code</ref>), the Secretary of Homeland Security shall determine the appropriate placement of the Service within the Department of Homeland Security and commence the transfer of the Service to such component, directorate, or other office of the Department that the Secretary so determines appropriate.</content></paragraph>
<paragraph class="fontsize10" id="y6fc94534-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Exception</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc94535-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc94536-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote>—</heading><chapeau>If the Secretary of Homeland Security determines pursuant to paragraph (1) that no component, directorate, or other office of the Department of Homeland Security <page identifier="/us/stat/132/4185">132 STAT. 4185</page>
is an appropriate placement for the Federal Protective Service, the Secretary shall—</chapeau><subparagraph class="fontsize10" id="y6fc94537-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>provide to the Committee on Homeland Security and the Committee on Transportation and Infrastructure of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate and the Office of Management and Budget a detailed explanation, in writing, of the reason for such determination that includes—</chapeau><clause class="fontsize10" id="y6fc94538-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>information on how the Department considered the Government Accountability Office review described in such paragraph;</content></clause>
<clause class="fontsize10" id="y6fc94539-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc9453a-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Lists.</p></sidenote><content>a list of the components, directorates, or other offices of the Department that were considered for such placement; and</content></clause>
<clause class="fontsize10" id="y6fc9453b-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/A/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>information on why each such component, directorate, or other office of the Department was determined to not be an appropriate placement for the Service;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y6fc9453c-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc9453d-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination plan.</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc9453e-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote><content>not later than 120 days after the completion of the Government Accountability Office review described in such paragraph, develop and submit to the committees specified in subparagraph (A) and the Office of Management and Budget a plan to coordinate with other appropriate Federal agencies, including the General Services Administration, to determine a more appropriate placement for the Service; and</content></subparagraph>
<subparagraph class="fontsize10" id="y6fc9453f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s3/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc94540-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x6fc94541-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote><content>not later than 180 days after the completion of such Government Accountability Office review, submit to such committees and the Office of Management and Budget a recommendation regarding the appropriate placement of the Service within the executive branch of the Federal Government.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section id="d148503e3513" identifier="/us/pl/115/278/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>DHS REPORT ON CLOUD-BASED CYBERSECURITY.</heading><subsection class="firstIndent0 fontsize10" id="y6fc99362-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/a" role="definitions" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definition</inline>.—</heading><content>In this section, the term “<term>Department</term>” means the Department of Homeland Security.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y6fc99363-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc99364-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><chapeau>Not later than 120 days after the date of enactment of this Act, the Secretary of Homeland Security, in coordination with the Director of the Office of Management and Budget and the Administrator of General Services, shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Government Reform and the Committee on Homeland Security of the House of Representatives a report on the leadership role of the Department in cloud-based cybersecurity deployments for civilian Federal departments and agencies, which shall include—</chapeau><paragraph class="fontsize10" id="y6fc99365-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>information on the plan of the Department for ensuring access to a security operations center as a service capability in accordance with the December 19, 2017 Report to the President on Federal IT Modernization issued by the American Technology Council;</content></paragraph>
<paragraph class="fontsize10" id="y6fc99366-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>information on what service capabilities under paragraph (1) the Department will prioritize, including—</chapeau><subparagraph class="fontsize10" id="y6fc99367-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc99368-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Criteria.</p></sidenote><content>criteria the Department will use to evaluate capabilities offered by the private sector; and<page identifier="/us/stat/132/4186">132 STAT. 4186</page></content></subparagraph>
<subparagraph class="fontsize10" id="y6fc99369-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>how Federal government- and private sector-provided capabilities will be integrated to enable visibility and consistency of such capabilities across all cloud and on premise environments, as called for in the report described in paragraph (1); and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y6fc9936a-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s4/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>information on how the Department will adapt the current capabilities of, and future enhancements to, the intrusion detection and prevention system of the Department and the Continuous Diagnostics and Mitigation Program of the Department to secure civilian Federal government networks in a cloud environment.</content></paragraph>
</subsection>
</section>
<section id="d148503e3570" identifier="/us/pl/115/278/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x6fc9936b-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s651">6 USC 651 note</ref>.</p></sidenote><heading>RULE OF CONSTRUCTION.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x6fc9ba7c-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Nothing in this Act or an amendment made by this Act may be construed as—</chapeau><paragraph class="fontsize10" id="y6fc9ba7d-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s5/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>conferring new authorities to the Secretary of Homeland Security, including programmatic, regulatory, or enforcement authorities, outside of the authorities in existence on the day before the date of enactment of this Act;</content></paragraph>
<paragraph class="fontsize10" id="y6fc9ba7e-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s5/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>reducing or limiting the programmatic, regulatory, or enforcement authority vested in any other Federal agency by statute; or</content></paragraph>
<paragraph class="fontsize10" id="y6fc9ba7f-e834-11f0-a1e4-69761a48a15a" identifier="/us/pl/115/278/s5/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>affecting in any manner the authority, existing on the day before the date of enactment of this Act, of any other Federal agency or component of the Department of Homeland Security.</content></paragraph>
</section>
<section id="d148503e3597" identifier="/us/pl/115/278/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><heading>PROHIBITION ON ADDITIONAL FUNDING.</heading><content style="-uslm-lc:I658120">  No additional funds are authorized to be appropriated to carry out this Act or the amendments made by this Act. This Act and the amendments made by this Act shall be carried out using amounts otherwise authorized.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2018-11-16">November 16, 2018</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/115/hr/3359">H.R. 3359</ref>:</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/115/454">115–454</ref>, Pt. 1 (<committee>Comm. on Homeland Security</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 163 (2017):</subheading>
<p class="indentUp2 firstIndent-1" id="x6fc9e090-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 11, considered and passed House.</p><subheading style="-uslm-lc:I658033">Vol. 164 (2018):</subheading>
<p class="indentUp2 firstIndent-1" id="x6fc9e091-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Oct. 3, considered and passed Senate, amended.</p><p class="indentUp2 firstIndent-1" id="x6fc9e092-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Nov. 13, House concurred in Senate amendment.</p></note>
<note>
<heading style="-uslm-lc:I658032">DAILY COMPILATION OF PRESIDENTIAL DOCUMENTS (2018):</heading>
<p class="indentUp4 firstIndent-1" id="x6fc9e093-e834-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Nov. 16, Presidential remarks.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>