<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 117–116—MAY 5, 2022?>


<?I97 136 STAT. ?>
<?I98 136 STAT. ?>
<?I99 136 STAT. ?>
<?I50 PUBLIC LAW 117–116—MAY 5, 2022?>
<?I51 PUBLIC LAW 117–116—MAY 5, 2022?>
<?I52 PUBLIC LAW 117–116—MAY 5, 2022?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 117–116: To establish cybercrime reporting mechanisms, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>116</docNumber>
<citableAs>Public Law 117–116</citableAs><citableAs>136 Stat. 1180</citableAs>
<approvedDate>2022-05-05</approvedDate>
<dc:date>2022-05-05</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>117</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?1179</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 117–116—MAY 5, 2022</centerRunningHead>
<coverTitle>BETTER CYBERCRIME METRICS ACT</coverTitle>
</note>
<page identifier="/us/stat/136/1180">136 STAT. 1180</page>
<dc:type>Public Law</dc:type><docNumber>117–116</docNumber>
<congress value="117">117th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To establish cybercrime reporting mechanisms, and for other purposes.<sidenote><p class="centered fontsize8" id="x340f2a78-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2022-05-05">May 5, 2022</approvedDate></p><p class="centered fontsize8" id="x340f2a79-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/117/s/2629">S. 2629</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x340f2a7a-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Better Cybercrime Metrics Act.</p><p class="leftAlign firstIndent0 fontsize8" id="x340f2a7b-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t34/s30109">34 USC 30109 note</ref>.</p></sidenote>
<section id="d83263e102" identifier="/us/pl/117/116/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Better Cybercrime Metrics Act</shortTitle>”.</content></section>
<section id="d83263e112" identifier="/us/pl/117/116/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>FINDINGS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x340f518c-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Congress finds the following:</chapeau><paragraph class="fontsize10" id="y340f518d-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s2/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>Public polling indicates that cybercrime could be the most common crime in the United States.</content></paragraph>
<paragraph class="fontsize10" id="y340f518e-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s2/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The United States lacks comprehensive cybercrime data and monitoring, leaving the country less prepared to combat cybercrime that threatens national and economic security.</content></paragraph>
<paragraph class="fontsize10" id="y340f789f-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s2/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>In addition to existing cybercrime vul­ner­a­bil­i­ties, the people of the United States and the United States have faced a heightened risk of cybercrime during the COVID–19 pandemic.</content></paragraph>
<paragraph class="fontsize10" id="y340f78a0-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s2/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><content>Subsection (c) of the Uniform Federal Crime Reporting Act of 1988 (<ref href="/us/usc/t34/s41303/c">34 U.S.C. 41303(c)</ref>) requires the Attorney General to “acquire, collect, classify, and preserve national data on Federal criminal offenses as part of the Uniform Crime Reports” and requires all Federal departments and agencies that investigate criminal activity to “report details about crime within their respective jurisdiction to the Attorney General in a uniform matter and on a form prescribed by the Attorney General”.</content></paragraph>
</section>
<section id="d83263e143" identifier="/us/pl/117/116/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>CYBERCRIME TAXONOMY.</heading><subsection class="firstIndent0 fontsize10" id="y340fedd1-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x340fedd2-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x340fedd3-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Contracts.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 90 days after the date of enactment of this Act, the Attorney General shall seek to enter into an agreement with the National Academy of Sciences to develop a taxonomy for the purpose of categorizing different types of cybercrime and cyber-enabled crime faced by individuals and businesses.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y340fedd4-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Development</inline>.—</heading><chapeau>In developing the taxonomy under subsection (a), the National Academy of Sciences shall—</chapeau><paragraph class="fontsize10" id="y340fedd5-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>ensure the taxonomy is useful for the Federal Bureau of Investigation to classify cybercrime in the National Incident-Based Reporting System, or any successor system;</content></paragraph>
<paragraph class="fontsize10" id="y340fedd6-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x340fedd7-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><chapeau>consult relevant stakeholders, including—</chapeau><subparagraph class="fontsize10" id="y340fedd8-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security;<page identifier="/us/stat/136/1181">136 STAT. 1181</page></content></subparagraph>
<subparagraph class="fontsize10" id="y340fedd9-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Federal, State, and local law enforcement agencies;</content></subparagraph>
<subparagraph class="fontsize10" id="y340fedda-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>criminologists and academics;</content></subparagraph>
<subparagraph class="fontsize10" id="y340feddb-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>cybercrime experts; and</content></subparagraph>
<subparagraph class="fontsize10" id="y340feddc-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>business leaders; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y340feddd-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/b/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>take into consideration relevant taxonomies developed by non-governmental organizations, international organizations, academies, or other entities.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y340fedde-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x340feddf-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Summaries.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><chapeau>Not later than 1 year after the date on which the Attorney General enters into an agreement under subsection (a), the National Academy of Sciences shall submit to the appropriate committees of Congress a report detailing and summarizing—</chapeau><paragraph class="fontsize10" id="y340fede0-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the taxonomy developed under subsection (a); and</content></paragraph>
<paragraph class="fontsize10" id="y340fede1-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>any findings from the process of developing the taxonomy under subsection (a).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y340fede2-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s3/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of Appropriations</inline>.—</heading><content>There are authorized to be appropriated to carry out this section $1,000,000.</content></subsection>
</section>
<section id="d83263e250" identifier="/us/pl/117/116/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>CYBERCRIME REPORTING.</heading><subsection class="firstIndent0 fontsize10" id="y341014f3-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 2 years after the date of enactment of this Act, the Attorney General shall establish a category in the National Incident-Based Reporting System, or any successor system, for the collection of cybercrime and cyber-enabled crime reports from Federal, State, and local officials.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y341014f4-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Recommendations</inline>.—</heading><content>In establishing the category required under subsection (a), the Attorney General shall, as appropriate, incorporate recommendations from the taxonomy developed under section 3(a).</content></subsection>
</section>
<section id="d83263e273" identifier="/us/pl/117/116/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>NATIONAL CRIME VICTIMIZATION SURVEY.</heading><subsection class="firstIndent0 fontsize10" id="y341014f5-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s5/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x341014f6-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="x341014f7-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Coordination.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Not later than 540 days after the date of enactment of this Act, the Director of the Bureau of Justice Statistics, in coordination with the Director of the Bureau of the Census, shall include questions relating to cybercrime victimization in the National Crime Victimization Survey.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="y341014f8-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s5/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Authorization of Appropriations</inline>.—</heading><content>There are authorized to be appropriated to carry out this section $2,000,000.</content></subsection>
</section>
<section id="d83263e301" identifier="/us/pl/117/116/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x341014f9-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessments.</p></sidenote><heading>GAO STUDY ON CYBERCRIME METRICS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="x34103c0a-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Not later than 180 days after the date of enactment of this Act, the Comptroller General of the United States shall submit to Congress a report that assesses—</chapeau><paragraph class="fontsize10" id="y34103c0b-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s6/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>the effectiveness of reporting mechanisms for cybercrime and cyber-enabled crime in the United States; and<page identifier="/us/stat/136/1182">136 STAT. 1182</page></content></paragraph>
<paragraph class="fontsize10" id="y34103c0c-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s6/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>disparities in reporting data between—</chapeau><subparagraph class="fontsize10" id="y34103c0d-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s6/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>data relating to cybercrime and cyber-enabled crime; and</content></subparagraph>
<subparagraph class="fontsize10" id="y34103c0e-e81d-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/116/s6/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>other types of crime data.</content></subparagraph>
</paragraph>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2022-05-05">May 5, 2022</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/117/s/2629">S. 2629</ref>:</heading>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 167 (2021):</subheading>
<p class="indentUp2 firstIndent-1" id="x3410631f-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 7, considered and passed Senate.</p><subheading style="-uslm-lc:I658033">Vol. 168 (2022):</subheading>
<p class="indentUp2 firstIndent-1" id="x34106320-e81d-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Mar. 28, 29, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>