<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 135 STAT. ?>
<?I98 135 STAT. ?>
<?I99 135 STAT. ?>
<?I50 PUBLIC LAW 117–47—OCT. 8, 2021?>
<?I51 PUBLIC LAW 117–47—OCT. 8, 2021?>
<?I52 PUBLIC LAW 117–47—OCT. 8, 2021?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 117–47: To establish a K–12 education cybersecurity initiative, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>47</docNumber>
<citableAs>Public Law 117–47</citableAs><citableAs>135 Stat. 397</citableAs>
<approvedDate>2021-10-08</approvedDate>
<dc:date>2021-10-08</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>117</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 117–47—OCT. 8, 2021</centerRunningHead>
<page identifier="/us/stat/135/397">135 STAT. 397</page>
<dc:type>Public Law</dc:type><docNumber>117–47</docNumber>
<congress value="117">117th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To establish a K–12 education cybersecurity initiative, and for other purposes.<sidenote><p class="centered fontsize8" id="xae3e33e8-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076"><approvedDate date="2021-10-08">Oct. 8, 2021</approvedDate></p><p class="centered fontsize8" id="xae3e33e9-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658076">[<ref href="/us/bill/117/s/1917">S. 1917</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3e33ea-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">K–12 Cybersecurity Act of 2021.</p><p class="leftAlign firstIndent0 fontsize8" id="xae3e33eb-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s652">6 USC 652 note</ref>.</p></sidenote>
<section id="d68057e92" identifier="/us/pl/117/47/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">K–12 Cybersecurity Act of 2021</shortTitle>”.</content></section>
<section id="d68057e102" identifier="/us/pl/117/47/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><heading>FINDINGS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xae3e820c-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658120">  Congress finds the following:</chapeau><paragraph class="fontsize10" id="yae3e820d-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>K–12 educational institutions across the United States are facing cyber attacks.</content></paragraph>
<paragraph class="fontsize10" id="yae3e820e-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>Cyber attacks place the information systems of K–12 educational institutions at risk of possible disclosure of sensitive student and employee information, including—</chapeau><subparagraph class="fontsize10" id="yae3e820f-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>grades and information on scholastic development;</content></subparagraph>
<subparagraph class="fontsize10" id="yae3e8210-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>medical records;</content></subparagraph>
<subparagraph class="fontsize10" id="yae3e8211-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>family records; and</content></subparagraph>
<subparagraph class="fontsize10" id="yae3e8212-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>personally identifiable information.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yae3e8213-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s2/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>Providing K–12 educational institutions with resources to aid cybersecurity efforts will help K–12 educational institutions prevent, detect, and respond to cyber events.</content></paragraph>
</section>
<section id="d68057e144" identifier="/us/pl/117/47/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>K–12 EDUCATION CYBERSECURITY INITIATIVE.</heading><subsection class="firstIndent0 fontsize10" id="yae3f9384-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Definitions</inline>.—</heading><chapeau>In this section:</chapeau><paragraph class="fontsize10" id="yae3f9385-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/a/1" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">Cybersecurity risk</inline>.—</heading><content>The term “<term>cybersecurity risk</term>” has the meaning given the term in section 2209 of the Homeland Security Act of 2002 (<ref href="/us/usc/t6/s659">6 U.S.C. 659</ref>).</content></paragraph>
<paragraph class="fontsize10" id="yae3f9386-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/a/2" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Director</inline>.—</heading><content>The term “<term>Director</term>” means the Director of Cybersecurity and Infrastructure Security.</content></paragraph>
<paragraph class="fontsize10" id="yae3f9387-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/a/3" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Information system</inline>.—</heading><content>The term “<term>information system</term>” has the meaning given the term in <ref href="/us/usc/t44/s3502">section 3502 of title 44, United States Code</ref>.</content></paragraph>
<paragraph class="fontsize10" id="yae3f9388-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/a/4" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10 smallCaps">K–12 educational institution<inline class="noSmallCaps">.—</inline></heading><content>The term “<term>K–12 educational institution</term>” means an elementary school or a secondary school, as those terms are defined in section 8101 of the Elementary and Secondary Education Act of 1965 (<ref href="/us/usc/t20/s7801">20 U.S.C. 7801</ref>).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f9389-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f938a-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Study</inline>.—</heading><paragraph class="fontsize10" id="yae3f938b-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f938c-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Evaluations.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>Not later than 120 days after the date of enactment of this Act, the Director, in accordance with subsection (g)(1), shall conduct a study on the specific cybersecurity risks facing K–12 educational institutions that—</chapeau><subparagraph class="fontsize10" id="yae3f938d-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f938e-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Analysis.</p></sidenote><content>analyzes how identified cybersecurity risks specifically impact K–12 educational institutions;<page identifier="/us/stat/135/398">135 STAT. 398</page></content></subparagraph>
<subparagraph class="fontsize10" id="yae3f938f-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>includes an evaluation of the challenges K–12 educational institutions face in—</chapeau><clause class="fontsize10" id="yae3f9390-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><chapeau>securing—</chapeau><subclause class="fontsize10" id="yae3f9391-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/B/i/I" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="I">(I) </num><content>information systems owned, leased, or relied upon by K–12 educational institutions; and</content></subclause>
<subclause class="fontsize10" id="yae3f9392-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/B/i/II" style="-uslm-lc:I658128"><num class="fontsize10" style="-uslm-lc:emspace2" value="II">(II) </num><content>sensitive student and employee records; and</content></subclause>
</clause>
<clause class="fontsize10" id="yae3f9393-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>implementing cybersecurity protocols;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yae3f9394-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>identifies cybersecurity challenges relating to remote learning; and</content></subparagraph>
<subparagraph class="fontsize10" id="yae3f9395-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>evaluates the most accessible ways to communicate cybersecurity recommendations and tools.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yae3f9396-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Congressional briefing</inline>.—</heading><content>Not later than 120 days after the date of enactment of this Act, the Director shall provide a Congressional briefing on the study conducted under paragraph (1).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f9397-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f9398-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xae3f9399-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Guidelines.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Cybersecurity Recommendations</inline>.—</heading><content>Not later than 60 days after the completion of the study required under subsection (b)(1), the Director, in accordance with subsection (g)(1), shall develop recommendations that include cybersecurity guidelines designed to assist K–12 educational institutions in facing the cybersecurity risks described in subsection (b)(1), using the findings of the study.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f939a-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/d" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">(d) </num><heading class="fontsize10"><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f939b-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Deadline.</p></sidenote><inline class="smallCaps">Online Training Toolkit</inline>.—</heading><chapeau>Not later than 120 days after the completion of the development of the recommendations required under subsection (c), the Director shall develop an online training toolkit designed for officials at K–12 educational institutions to—</chapeau><paragraph class="fontsize10" id="yae3f939c-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/d/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>educate the officials about the cybersecurity recommendations developed under subsection (c); and</content></paragraph>
<paragraph class="fontsize10" id="yae3f939d-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/d/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f939e-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Strategy.</p></sidenote><content>provide strategies for the officials to implement the recommendations developed under subsection (c).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f939f-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/e" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">(e) </num><heading class="fontsize10"><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xae3f93a0-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658180">Web posting.</p></sidenote><inline class="smallCaps">Public Availability</inline>.—</heading><chapeau>The Director shall make available on the website of the Department of Homeland Security with other information relating to school safety the following:</chapeau><paragraph class="fontsize10" id="yae3f93a1-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/e/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The findings of the study conducted under subsection (b)(1).</content></paragraph>
<paragraph class="fontsize10" id="yae3f93a2-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/e/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The cybersecurity recommendations developed under subsection (c).</content></paragraph>
<paragraph class="fontsize10" id="yae3f93a3-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/e/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The online training toolkit developed under subsection (d).</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f93a4-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/f" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">(f) </num><heading class="fontsize10"><inline class="smallCaps">Voluntary Use</inline>.—</heading><content>The use of the cybersecurity recommendations developed under (c) by K–12 educational institutions shall be voluntary.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yae3f93a5-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">(g) </num><heading class="fontsize10"><inline class="smallCaps">Consultation</inline>.—</heading><paragraph class="fontsize10" id="yae3f93a6-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>In the course of the conduction of the study required under subsection (b)(1) and the development of the recommendations required under subsection (c), the Director shall consult with individuals and entities focused on cybersecurity and education, as appropriate, including—</chapeau><subparagraph class="fontsize10" id="yae3f93a7-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>teachers;</content></subparagraph>
<subparagraph class="fontsize10" id="yae3f93a8-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>school administrators;</content></subparagraph>
<subparagraph class="fontsize10" id="yae3f93a9-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><content>Federal agencies;</content></subparagraph>
<subparagraph class="fontsize10" id="yae3f93aa-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><content>non-Federal cybersecurity entities with experience in education issues; and</content></subparagraph>
<subparagraph class="fontsize10" id="yae3f93ab-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/1/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>private sector organizations.<page identifier="/us/stat/135/399">135 STAT. 399</page></content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yae3f93ac-e813-11f0-bc57-ad3ac4b1618c" identifier="/us/pl/117/47/s3/g/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Inapplicability of faca</inline>.—</heading><content>The Federal Advisory Committee Act (<ref href="/us/usc/t5/app">5 U.S.C App.</ref>) shall not apply to any consultation under paragraph (1).</content></paragraph>
</subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2021-10-08">October 8, 2021</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/117/s/1917">S. 1917</ref> (<ref href="/us/bill/117/hr/4691">H.R. 4691</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/117/122">117–122</ref> (<committee>Comm. on Homeland Security</committee>)                            accompanying <ref href="/us/bill/117/hr/4691">H.R. 4691</ref>.
</note>
<note>
<headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/117/32">117–32</ref> (<committee>Comm. on Homeland Security and                             Governmental Affairs</committee>).
</note>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 167 (2021):</heading>
<p class="indentUp4 firstIndent-1" id="xae3fbabd-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Aug. 9, considered and passed Senate.</p><p class="indentUp4 firstIndent-1" id="xae3fbabe-e813-11f0-bc57-ad3ac4b1618c" style="-uslm-lc:I658035">Sept. 29, considered and passed House.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>