<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 134 STAT. ?>
<?I98 134 STAT. ?>
<?I99 134 STAT. ?>
<?I50 PUBLIC LAW 116–207—DEC. 4, 2020?>
<?I51 PUBLIC LAW 116–207—DEC. 4, 2020?>
<?I52 PUBLIC LAW 116–207—DEC. 4, 2020?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 116–207: To establish minimum security standards for Internet of Things devices owned or controlled by the Federal Government, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>207</docNumber>
<citableAs>Public Law 116–207</citableAs><citableAs>134 Stat. 1001</citableAs>
<approvedDate>2020-12-04</approvedDate>
<dc:date>2020-12-04</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>116</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 116–207—DEC. 4, 2020</centerRunningHead>
<page identifier="/us/stat/134/1001">134 STAT. 1001</page>
<dc:type>Public Law</dc:type><docNumber>116–207</docNumber>
<congress value="116">116th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To establish minimum security standards for Internet of Things devices owned or controlled by the Federal Government, and for other purposes.<sidenote><p class="centered fontsize8" id="x501b8fb1-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2020-12-04">Dec. 4, 2020</approvedDate></p><p class="centered fontsize8" id="x501b8fb2-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/116/hr/1668">H.R. 1668</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb3-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Internet</p><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb4-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">of Things</p><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb5-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Cybersecurity</p><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb6-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Improvement Act</p><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb7-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">of 2020.</p><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb8-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s271">15 USC 271 note</ref>.</p></sidenote>
<section id="d226753e100" identifier="/us/pl/116/207/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Internet of Things Cybersecurity Improvement Act of 2020</shortTitle>” or the “<shortTitle role="act">IoT Cybersecurity Improvement Act of 2020</shortTitle>”.</content></section>
<section id="d226753e113" identifier="/us/pl/116/207/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501b8fb9-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3a">15 USC 278g–3a note</ref>.</p></sidenote><heading>SENSE OF CONGRESS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x501bddda-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  It is the sense of Congress that—</chapeau><paragraph class="fontsize10" id="y501bdddb-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>ensuring the highest level of cybersecurity at agencies in the executive branch is the responsibility of the President, followed by the Director of the Office of Management and Budget, the Secretary of Homeland Security, and the head of each such agency;</content></paragraph>
<paragraph class="fontsize10" id="y501bdddc-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>this responsibility is to be carried out by working collaboratively within and among agencies in the executive branch, industry, and academia;</content></paragraph>
<paragraph class="fontsize10" id="y501bdddd-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>the strength of the cybersecurity of the Federal Government and the positive benefits of digital technology transformation depend on proactively addressing cybersecurity throughout the acquisition and operation of Internet of Things devices by the Federal Government; and</content></paragraph>
<paragraph class="fontsize10" id="y501bddde-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><chapeau>consistent with the second draft National Institute for Standards and Technology Interagency or Internal Report 8259 titled “Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device Cybersecurity Capability Baseline”, published in January 2020, Internet of Things devices are devices that—</chapeau><subparagraph class="fontsize10" id="y501bdddf-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/4/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>have at least one transducer (sensor or actuator) for interacting directly with the physical world, have at least one network interface, and are not conventional Information Technology devices, such as smartphones and laptops, for which the identification and implementation of cybersecurity features is already well understood; and</content></subparagraph>
<subparagraph class="fontsize10" id="y501bdde0-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s2/4/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>can function on their own and are not only able to function when acting as a component of another device, such as a processor.</content></subparagraph>
</paragraph>
</section>
<section id="d226753e155" identifier="/us/pl/116/207/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501bdde1-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3a">15 USC 278g–3a</ref>.</p></sidenote><heading>DEFINITIONS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x501c2c02-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  In this Act:<page identifier="/us/stat/134/1002">134 STAT. 1002</page></chapeau><paragraph class="fontsize10" id="y501c2c03-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Agency</inline>.—</heading><content>The term “<term>agency</term>” has the meaning given that term in <ref href="/us/usc/t44/s3502">section 3502 of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c04-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Director of omb</inline>.—</heading><content>The term “<term>Director of OMB</term>” means the Director of the Office of Management and Budget.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c05-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Director of the institute</inline>.—</heading><content>The term “<term>Director of the Institute</term>” means the Director of the National Institute of Standards and Technology.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c06-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Information system</inline>.—</heading><content>The term “<term>information system</term>” has the meaning given that term in <ref href="/us/usc/t44/s3502">section 3502 of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c07-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/5" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">National security system</inline>.—</heading><content>The term “<term>national security system</term>” has the meaning given that term in <ref href="/us/usc/t44/s3552/b/6">section 3552(b)(6) of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c08-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/6" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">(6) </num><heading class="fontsize10"><inline class="smallCaps">Operational technology</inline>.—</heading><content>The term “<term>operational technology</term>” means hardware and software that detects or causes a change through the direct monitoring or control of physical devices, processes, and events in the enterprise.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c09-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/7" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">(7) </num><heading class="fontsize10"><inline class="smallCaps">Secretary</inline>.—</heading><content>The term “<term>Secretary</term>” means the Secretary of Homeland Security.</content></paragraph>
<paragraph class="fontsize10" id="y501c2c0a-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s3/8" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">(8) </num><heading class="fontsize10"><inline class="smallCaps">Security vulnerability</inline>.—</heading><content>The term “<term>security vulnerability</term>” has the meaning given that term in section 102(17) of the Cybersecurity Information Sharing Act of 2015 (<ref href="/us/usc/t6/s1501/17">6 U.S.C. 1501(17)</ref>).</content></paragraph>
</section>
<section id="d226753e259" identifier="/us/pl/116/207/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501c531b-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3b">15 USC 278g–3b</ref>.</p></sidenote><heading>SECURITY STANDARDS AND GUIDELINES FOR AGENCIES ON USE AND MANAGEMENT OF INTERNET OF THINGS DEVICES.</heading><subsection class="firstIndent0 fontsize10" id="y501d166c-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">National Institute of Standards and Technology Development of Standards and Guidelines for Use of Internet of Things Devices by Agencies</inline>.—</heading><paragraph class="fontsize10" id="y501d166d-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d166e-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x501d166f-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Publication.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 90 days after the date of the enactment of this Act, the Director of the Institute shall develop and publish under section 20 of the National Institute of Standards and Technology Act (<ref href="/us/usc/t15/s278g–3">15 U.S.C. 278g–3</ref>) standards and guidelines for the Federal Government on the appropriate use and management by agencies of Internet of Things devices owned or controlled by an agency and connected to information systems owned or controlled by an agency, including minimum information security requirements for managing cybersecurity risks associated with such devices.</content></paragraph>
<paragraph class="fontsize10" id="y501d1670-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Consistency with ongoing efforts</inline>.—</heading><chapeau>The Director of the Institute shall ensure that the standards and guidelines developed under paragraph (1) are consistent with the efforts of the National Institute of Standards and Technology in effect on the date of the enactment of this Act—</chapeau><subparagraph class="fontsize10" id="y501d1671-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>regarding—</chapeau><clause class="fontsize10" id="y501d1672-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>examples of possible security vulnerabilities of Internet of Things devices; and</content></clause>
<clause class="fontsize10" id="y501d1673-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>considerations for managing the security vulnerabilities of Internet of Things devices; and</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y501d1674-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>with respect to the following considerations for Internet of Things devices:</chapeau><clause class="fontsize10" id="y501d1675-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>Secure Development.</content></clause>
<clause class="fontsize10" id="y501d1676-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>Identity management.</content></clause>
<clause class="fontsize10" id="y501d1677-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>Patching.</content></clause>
<clause class="fontsize10" id="y501d1678-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/2/B/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>Configuration management.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501d1679-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Considering relevant standards</inline>.—</heading><content>In developing the standards and guidelines under paragraph (1), the Director <page identifier="/us/stat/134/1003">134 STAT. 1003</page>
of the Institute shall consider relevant standards, guidelines, and best practices developed by the private sector, agencies, and public-private partnerships.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501d167a-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Review of Agency Information Security Policies and Principles</inline>.—</heading><paragraph class="fontsize10" id="y501d167b-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d167c-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Requirement</inline>.—</heading><content>Not later than 180 days after the date on which the Director of the Institute completes the development of the standards and guidelines required under subsection (a), the Director of OMB shall review agency information security policies and principles on the basis of the standards and guidelines published under subsection (a) pertaining to Internet of Things devices owned or controlled by agencies (excluding agency information security policies and principles pertaining to Internet of Things of devices owned or controlled by agencies that are or comprise a national security system) for consistency with the standards and guidelines submitted under subsection (a) and issue such policies and principles as may be necessary to ensure those policies and principles are consistent with such standards and guidelines.</content></paragraph>
<paragraph class="fontsize10" id="y501d167d-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Review</inline>.—</heading><chapeau>In reviewing agency information security policies and principles under paragraph (1) and issuing policies and principles under such paragraph, as may be necessary, the Director of OMB shall—</chapeau><subparagraph class="fontsize10" id="y501d167e-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d167f-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>consult with the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security; and</content></subparagraph>
<subparagraph class="fontsize10" id="y501d1680-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>ensure such policies and principles are consistent with the information security requirements under <ref href="/us/usc/t44/ch35/schII">subchapter II of chapter 35 of title 44, United States Code</ref>.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501d1681-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">National security systems</inline>.—</heading><content>Any policy or principle issued by the Director of OMB under paragraph (1) shall not apply to national security systems.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501d1682-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d1683-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Quinquennial Review and Revision</inline>.—</heading><paragraph class="fontsize10" id="y501d1684-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Review and revision of nist standards and guidelines</inline>.—</heading><chapeau>Not later than 5 years after the date on which the Director of the Institute publishes the standards and guidelines under subsection (a), and not less frequently than once every 5 years thereafter, the Director of the Institute, shall—</chapeau><subparagraph class="fontsize10" id="y501d1685-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>review such standards and guidelines; and</content></subparagraph>
<subparagraph class="fontsize10" id="y501d1686-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>revise such standards and guidelines as appropriate.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501d1687-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d1688-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Updated omb policies and principles for agencies</inline>.—</heading><content>Not later than 180 days after the Director of the Institute makes a revision pursuant to paragraph (1), the Director of OMB, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, shall update any policy or principle issued under subsection (b)(1) as necessary to ensure those policies and principles are consistent with the review and any revision under paragraph (1) under this subsection and paragraphs (2) and (3) of subsection (b).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501d1689-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s4/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Revision of Federal Acquisition Regulation</inline>.—</heading><content>The Federal Acquisition Regulation shall be revised as necessary to implement any standards and guidelines promulgated in this section.<page identifier="/us/stat/134/1004">134 STAT. 1004</page></content></subsection>
</section>
<section id="d226753e466" identifier="/us/pl/116/207/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501d168a-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3c">15 USC 278g–3c</ref>.</p></sidenote><heading>GUIDELINES ON THE DISCLOSURE PROCESS FOR SECURITY VULNERABILITIES RELATING TO INFORMATION SYSTEMS, INCLUDING INTERNET OF THINGS DEVICES.</heading><subsection class="firstIndent0 fontsize10" id="y501db2cb-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501db2cc-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x501db2cd-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="x501db2ce-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Publication.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><chapeau>Not later than 180 days after the date of the enactment of this Act, the Director of the Institute, in consultation with such cybersecurity researchers and private sector industry experts as the Director considers appropriate, and in consultation with the Secretary, shall develop and publish under section 20 of the National Institute of Standards and Technology Act (<ref href="/us/usc/t15/s278g–3">15 U.S.C. 278g–3</ref>) guidelines—</chapeau><paragraph class="fontsize10" id="y501db2cf-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>for the reporting, coordinating, publishing, and receiving of information about—</chapeau><subparagraph class="fontsize10" id="y501db2d0-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>a security vulnerability relating to information systems owned or controlled by an agency (including Internet of Things devices owned or controlled by an agency); and</content></subparagraph>
<subparagraph class="fontsize10" id="y501db2d1-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the resolution of such security vulnerability; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501db2d2-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>for a contractor providing to an agency an information system (including an Internet of Things device) and any subcontractor thereof at any tier providing such information system to such contractor, on—</chapeau><subparagraph class="fontsize10" id="y501db2d3-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>receiving information about a potential security vulnerability relating to the information system; and</content></subparagraph>
<subparagraph class="fontsize10" id="y501db2d4-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>disseminating information about the resolution of a security vulnerability relating to the information system.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501db2d5-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The guidelines published under subsection (a) shall—</chapeau><paragraph class="fontsize10" id="y501db2d6-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>to the maximum extent practicable, be aligned with industry best practices and Standards 29147 and 30111 of the International Standards Organization (or any successor standard) or any other appropriate, relevant, and widely-used standard;</content></paragraph>
<paragraph class="fontsize10" id="y501db2d7-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>incorporate guidelines on—</chapeau><subparagraph class="fontsize10" id="y501db2d8-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>receiving information about a potential security vulnerability relating to an information system owned or controlled by an agency (including an Internet of Things device); and</content></subparagraph>
<subparagraph class="fontsize10" id="y501db2d9-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>disseminating information about the resolution of a security vulnerability relating to an information system owned or controlled by an agency (including an Internet of Things device); and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501db2da-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>be consistent with the policies and procedures produced under section 2009(m) of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s659/m">6 U.S.C. 659(m)</ref>).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501db2db-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Information Items</inline>.—</heading><content>The guidelines published under subsection (a) shall include example content, on the information items that should be reported, coordinated, published, or received pursuant to this section by a contractor, or any subcontractor thereof at any tier, providing an information system (including Internet of Things device) to the Federal Government.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y501db2dc-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Oversight</inline>.—</heading><content>The Director of OMB shall oversee the implementation of the guidelines published under subsection (a).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y501db2dd-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s5/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501db2de-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Operational and Technical Assistance</inline>.—</heading><content>The Secretary, in consultation with the Director of OMB, shall administer the implementation of the guidelines published under subsection (a) and provide operational and technical assistance in implementing such guidelines.<page identifier="/us/stat/134/1005">134 STAT. 1005</page></content></subsection>
</section>
<section id="d226753e598" identifier="/us/pl/116/207/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501dd8ef-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Consultation.</p><p class="leftAlign firstIndent0 fontsize8" id="x501dd8f0-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3d">15 USC 278g–3d</ref>.</p></sidenote><heading>IMPLEMENTATION OF COORDINATED DISCLOSURE OF SECURITY VULNERABILITIES RELATING TO AGENCY INFORMATION SYSTEMS, INCLUDING INTERNET OF THINGS DEVICES.</heading><subsection class="firstIndent0 fontsize10" id="y501e0001-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s6/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e0002-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Agency Guidelines Required</inline>.—</heading><content>Not later than 2 years after the date of the enactment of this Act, the Director of OMB, in consultation with the Secretary, shall develop and oversee the implementation of policies, principles, standards, or guidelines as may be necessary to address security vulnerabilities of information systems (including Internet of Things devices).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y501e0003-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s6/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Operational and Technical Assistance</inline>.—</heading><content>Consistent with <ref href="/us/usc/t44/s3553/b">section 3553(b) of title 44, United States Code</ref>, the Secretary, in consultation with the Director of OMB, shall provide operational and technical assistance to agencies on reporting, coordinating, publishing, and receiving information about security vulnerabilities of information systems (including Internet of Things devices).</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y501e0004-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s6/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Consistency With Guidelines From National Institute of Standards and Technology</inline>.—</heading><content>The Secretary shall ensure that the assistance provided under subsection (b) is consistent with applicable standards and publications developed by the Director of the Institute.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y501e0005-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s6/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Revision of Federal Acquisition Regulation</inline>.—</heading><content>The Federal Acquisition Regulation shall be revised as necessary to implement the provisions under this section.</content></subsection>
</section>
<section id="d226753e653" identifier="/us/pl/116/207/s7" style="-uslm-lc:I658141"><num class="fontsize12" value="7">SEC. 7. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e0006-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t15/s278g–3e">15 USC 278g–3e</ref>.</p></sidenote><heading>CONTRACTOR COMPLIANCE WITH COORDINATED DISCLOSURE OF SECURITY VULNERABILITIES RELATING TO AGENCY INTERNET OF THINGS DEVICES.</heading><subsection class="firstIndent0 fontsize10" id="y501e9c47-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Prohibition on Procurement and Use</inline>.—</heading><paragraph class="fontsize10" id="y501e9c48-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c49-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The head of an agency is prohibited from procuring or obtaining, renewing a contract to procure or obtain, or using an Internet of Things device, if the Chief Information Officer of that agency determines during a review required by <ref href="/us/usc/t40/s11319/b/1/C">section 11319(b)(1)(C) of title 40, United States Code</ref>, of a contract for such device that the use of such device prevents compliance with the standards and guidelines developed under section 4 or the guidelines published under section 5 with respect to such device.</content></paragraph>
<paragraph class="fontsize10" id="y501e9c4a-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c4b-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Applicability.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Simplified acquisition threshold</inline>.—</heading><content>Notwithstanding <ref href="/us/usc/t41/s1905">section 1905 of title 41, United States Code</ref>, the requirements under paragraph (1) shall apply to a contract or subcontract in amounts not greater than the simplified acquisition threshold.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501e9c4c-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Waiver</inline>.—</heading><paragraph class="fontsize10" id="y501e9c4d-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c4e-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Determination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Authority</inline>.—</heading><chapeau>The head of an agency may waive the prohibition under subsection (a)(1) with respect to an Internet of Things device if the Chief Information Officer of that agency determines that—</chapeau><subparagraph class="fontsize10" id="y501e9c4f-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the waiver is necessary in the interest of national security;</content></subparagraph>
<subparagraph class="fontsize10" id="y501e9c50-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>procuring, obtaining, or using such device is necessary for research purposes; or</content></subparagraph>
<subparagraph class="fontsize10" id="y501e9c51-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>such device is secured using alternative and effective methods appropriate to the function of such device.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501e9c52-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Agency process</inline>.—</heading><content>The Director of OMB shall establish a standardized process for the Chief Information Officer of each agency to follow in determining whether the waiver under paragraph (1) may be granted.<page identifier="/us/stat/134/1006">134 STAT. 1006</page></content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501e9c53-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Reports to Congress</inline>.—</heading><paragraph class="fontsize10" id="y501e9c54-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c55-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><chapeau>Every 2 years during the 6-year period beginning on the date of the enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Oversight and Reform of the House of Representatives, the Committee on Homeland Security of the House of Representatives, and the Committee on Homeland Security and Governmental Affairs of the Senate a report—</chapeau><subparagraph class="fontsize10" id="y501e9c56-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>on the effectiveness of the process established under subsection (b)(2);</content></subparagraph>
<subparagraph class="fontsize10" id="y501e9c57-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c58-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x501e9c59-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">tions.</p></sidenote><content>that contains recommended best practices for the procurement of Internet of Things devices; and</content></subparagraph>
<subparagraph class="fontsize10" id="y501e9c5a-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c5b-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Lists.</p></sidenote><chapeau>that lists—</chapeau><clause class="fontsize10" id="y501e9c5c-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1/C/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501e9c5d-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Time period.</p></sidenote><content>the number and type of each Internet of Things device for which a waiver under subsection (b)(1) was granted during the 2-year period prior to the submission of the report; and</content></clause>
<clause class="fontsize10" id="y501e9c5e-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/1/C/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>the legal authority under which each such waiver was granted, such as whether the waiver was granted pursuant to subparagraph (A), (B), or (C) of such subsection.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y501e9c5f-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Classification of report</inline>.—</heading><content>Each report submitted under this subsection shall be submitted in unclassified form, but may include a classified annex that contains the information described under paragraph (1)(C).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501e9c60-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s7/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Effective Date</inline>.—</heading><content>The prohibition under subsection (a)(1) shall take effect 2 years after the date of the enactment of this Act.</content></subsection>
</section>
<section id="d226753e824" identifier="/us/pl/116/207/s8" style="-uslm-lc:I658141"><num class="fontsize12" value="8">SEC. 8. </num><heading>GOVERNMENT ACCOUNTABILITY OFFICE REPORT ON CYBERSECURITY CONSIDERATIONS STEMMING FROM THE CONVERGENCE OF INFORMATION TECHNOLOGY, INTERNET OF THINGS, AND OPERATIONAL TECHNOLOGY DEVICES, NETWORKS, AND SYSTEMS.</heading><subsection class="firstIndent0 fontsize10" id="y501ec371-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s8/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x501ec372-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Briefing</inline>.—</heading><chapeau>Not later than 1 year after the date of the enactment of this Act, the Comptroller General of the United States shall provide a briefing to the Committee on Oversight and Reform of the House of Representatives, the Committee on Homeland Security of the House of Representatives, and the Committee on Homeland Security and Governmental Affairs of the Senate on broader Internet of Things efforts, including projects designed to assist in managing potential security vulnerabilities associated with the use of traditional information technology devices, networks, and systems with—</chapeau><paragraph class="fontsize10" id="y501ec373-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s8/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Internet of Things devices, networks, and systems; and</content></paragraph>
<paragraph class="fontsize10" id="y501ec374-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s8/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>operational technology devices, networks, and systems.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y501ec375-e826-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/116/207/s8/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><content>Not later than 2 years after the date of enactment of this Act, the Comptroller General shall submit a report to the <page identifier="/us/stat/134/1007">134 STAT. 1007</page>
Committee on Oversight and Reform of the House of Representatives, the Committee on Homeland Security of the House of Representatives, and the Committee on Homeland Security and Governmental Affairs of the Senate on broader Internet of Things efforts addressed in subsection (a).</content></subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2020-12-04">December 4, 2020</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/116/hr/1668">H.R. 1668</ref> (<ref href="/us/bill/116/s/734">S. 734</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/116/501">116–501</ref>, Pt. 1 (<committee>Comm. on Oversight and Reform</committee>).
</note>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/116/112">116–112</ref> (<committee>Comm. on Homeland Security and Governmental Affairs</committee>) accompanying <ref href="/us/bill/116/s/734">S. 734</ref>.
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 166 (2020):</heading>
<p class="indentUp4 firstIndent-1" id="x501eea86-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Sept. 14, considered and passed House.</p><p class="indentUp4 firstIndent-1" id="x501eea87-e826-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Nov. 17, considered and passed Senate.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>