<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" bill-type="olc" dms-id="H96D0D88CA4C44EC4BB086067157AC1C1" public-private="public">
	<form>
		<distribution-code display="yes">I</distribution-code>
		<congress>111th CONGRESS</congress>
		<session>2d Session</session>
		<legis-num>H. R. 6423</legis-num>
		<current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber>
		<action>
			<action-date date="20101117">November 17, 2010</action-date>
			<action-desc><sponsor name-id="T000193">Mr. Thompson of
			 Mississippi</sponsor> (for himself, <cosponsor name-id="C001067">Ms.
			 Clarke</cosponsor>, and <cosponsor name-id="H000213">Ms. Harman</cosponsor>)
			 introduced the following bill; which was referred to the
			 <committee-name committee-id="HHM00">Committee on Homeland
			 Security</committee-name>, and in addition to the Committee on
			 <committee-name committee-id="HGO00">Oversight and Government
			 Reform</committee-name>, for a period to be subsequently determined by the
			 Speaker, in each case for consideration of such provisions as fall within the
			 jurisdiction of the committee concerned</action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To enhance homeland security, including domestic
		  preparedness and collective response to terrorism, by amending the Homeland
		  Security Act of 2002 to establish the Cybersecurity Compliance Division and
		  provide authorities to the Department of Homeland Security to enhance the
		  security and resiliency of the Nation’s cyber and physical infrastructure
		  against terrorism and other cyber attacks, and for other
		  purposes.</official-title>
	</form>
	<legis-body id="HC2C7C7A7953F45EE923813841A27ADED" style="OLC">
		<section id="HA03397FF3C434767B27C9023C5D1D57F" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the
			 <quote><short-title>Homeland Security Cyber and Physical
			 Infrastructure Protection Act of 2010</short-title></quote>.</text>
		</section><section id="H65DF801DE6A94F4AB0C4CC13188BEC18"><enum>2.</enum><header>Office of
			 Cybersecurity and Communications and Cybersecurity Compliance Division</header>
			<subsection id="H6C11ABC5499C42F890A89DE748248C88"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Subtitle C of title
			 II of the Homeland Security Act of 2002 (6 U.S.C. 141 et seq.) is amended by
			 redesignating sections 221 through 225 in order as section 226 through 229,
			 respectively, and by inserting before section 222 (as so redesignated) the
			 following:</text>
				<quoted-block display-inline="no-display-inline" id="H1C75333A5F2645BBBE94D8B913E624AD" style="OLC">
					<section id="H777C583A94494BFBBCB0C9AE58EE627A"><enum>221.</enum><header>Definitions</header><text display-inline="no-display-inline">In this subtitle:</text>
						<paragraph id="H74109CFB8C8E477BAD9D13A32D55CD85"><enum>(1)</enum><header>Common criteria
				for information technology security evaluation</header><text>The term
				<quote>common criteria for information technology security evaluation</quote>
				means international standard for computer security codified in the
				International Organization for Standardization and the International
				Electrotechnical Commission standard 15408 (ISO/IEC 15408).</text>
						</paragraph><paragraph id="HE40F272EC2904ECFADBD2B7CAAC91D40"><enum>(2)</enum><header>Covered critical
				infrastructure</header><text>The term <quote>covered critical
				infrastructure</quote> means systems and assets designated by the Director
				under section 224(e).</text>
						</paragraph><paragraph id="H3999D337F3EB494C9DC7D74618119F08"><enum>(3)</enum><header>Cyber
				incident</header><text>The term <quote>cyber incident</quote> means an
				occurrence that jeopardizes the security of data or the physical security of a
				computer network owned or operated by a Federal agency or covered critical
				infrastructure.</text>
						</paragraph><paragraph id="H22223E2DFA9C49F0B6A71B44662976EE"><enum>(4)</enum><header>First-party
				regulatory agency</header><text display-inline="yes-display-inline">The term
				<quote>first-party regulatory agency</quote> means a Federal agency that is not
				a sector-specific agency but that has primary regulatory authority for a
				specific critical infrastructure sector or sub-sector.</text>
						</paragraph><paragraph id="H58A4079C5468459CB0E12C685D1D0F28"><enum>(5)</enum><header>Sector-specific
				agency</header><text display-inline="yes-display-inline">The term
				<quote>sector-specific agency</quote> means the agency that, as of the date of
				enactment of this section, is designated under Homeland Security Presidential
				Directive 7 as the lead Federal agency responsible for securing a specific
				critical infrastructure sector.</text>
						</paragraph></section><section id="H27A0F211F46B4177B0AAE3A467C116C0"><enum>222.</enum><header>Office of
				Cybersecurity and Communications</header>
						<subsection id="HF1B1E23FB872465AB65988208BA777B1"><enum>(a)</enum><header>Establishment</header>
							<paragraph id="H2BDA977D57DF46D8B9A88A08477CDCF4"><enum>(1)</enum><header>In
				general</header><text display-inline="yes-display-inline">There shall be in the
				Department an Office of Cybersecurity and Communications.</text>
							</paragraph><paragraph id="H67E7A341765F4BF581AB9A620AA49D92"><enum>(2)</enum><header>Assistant
				Secretary for Cybersecurity and Communications</header><text>The Assistant
				Secretary for Cybersecurity and Communications shall be the head of the
				Office.</text>
							</paragraph><paragraph id="H0C9F2A2C7F6F45E3B1B7536842230BC4"><enum>(3)</enum><header>Components</header><text display-inline="yes-display-inline">The Office shall include—</text>
								<subparagraph id="HFBFD9872CC2E4F89972A3EB3DD33B96F"><enum>(A)</enum><text display-inline="yes-display-inline">the United States Computer Emergency
				Readiness Team, as in effect on the date of enactment of this section;</text>
								</subparagraph><subparagraph id="HEB035564108F42FC96318CBD1EA4D3D5"><enum>(B)</enum><text>the Cybersecurity
				Compliance Division established by subsection (b); and</text>
								</subparagraph><subparagraph id="HD1CAEFA2EB3C4B43985BE167A01AA6F8"><enum>(C)</enum><text>other components
				of the Department that have primary responsibilities for emergency or national
				communications or cybersecurity.</text>
								</subparagraph></paragraph></subsection><subsection id="HDE73998EFE3843CE83B65CAC96E15FB0"><enum>(b)</enum><header>Cybersecurity
				Compliance Division</header>
							<paragraph id="H447C45CEB68F4748A7B922EDF22AB7D7"><enum>(1)</enum><header>In
				general</header><text>There is established in the Office of Cybersecurity and
				Communications a Cybersecurity Compliance Division.</text>
							</paragraph><paragraph id="HD8617E55327544169D68789A3A778C7B"><enum>(2)</enum><header>Director</header><text>The
				Cybersecurity Compliance Division shall be headed by a Director, who shall be
				appointed by the Secretary or the Secretary’s designee from among individuals
				who possess—</text>
								<subparagraph id="HD51EA87BEADF4DCDB350FA38D769D695"><enum>(A)</enum><text>demonstrated
				knowledge and ability in cybersecurity, information technology, infrastructure
				protection, and the operation, security, and resilience of communications
				networks;</text>
								</subparagraph><subparagraph id="HEE964CB700254B1786A2B513B2D45016"><enum>(B)</enum><text>significant
				executive leadership, regulatory, and management experience in the public or
				private sector; and</text>
								</subparagraph><subparagraph id="HD21C9A3250D14F21A945C744DBF95C24"><enum>(C)</enum><text>other skills or
				attributes the Secretary considers necessary.</text>
								</subparagraph></paragraph><paragraph id="HBEC4C49C35E64A8D8A26E050CEC89FFE"><enum>(3)</enum><header>Duties and
				responsibilities</header><text>The Director—</text>
								<subparagraph id="H154ACD6FD4AC41AAABD968FE2D168D99"><enum>(A)</enum><text>shall issue
				risk-based, performance-based regulations, after notice and comment, in
				accordance with section 224;</text>
								</subparagraph><subparagraph id="H4A990D18995E4DA7A699E8349D5A86E6"><enum>(B)</enum><text>shall serve as the
				first-party regulatory agency to enforce regulations under section 224 for
				computer networks and assets in critical infrastructure sectors for which the
				Office of Cybersecurity and Communications or any of its components is the
				designated sector-specific agency;</text>
								</subparagraph><subparagraph id="H49C94528FE0647378FF27E84521E4897"><enum>(C)</enum><text>may require a
				first-party regulatory agency or sector-specific agency to coordinate with the
				Director to—</text>
									<clause id="H36B6C58FD06B418BB589DEA92F64005D"><enum>(i)</enum><text display-inline="yes-display-inline">develop and publish, for covered critical
				infrastructure sectors or subsectors, risk-based and performance-based
				regulations after notice and comment in accordance with paragraph (1), with any
				appropriate modifications, as identified by the Director, necessary for
				application to a specific critical infrastructure sector or subsector;
				and</text>
									</clause><clause id="HE28B5FB171724176B922275180219E6C"><enum>(ii)</enum><text>enforce the
				regulations promulgated under paragraph (1); and</text>
									</clause></subparagraph><subparagraph display-inline="no-display-inline" id="HCED8921B5E6F497291514EB72AAAFF35"><enum>(D)</enum><text>may delegate part
				or all of the responsibilities and authorities for securing private sector
				networks under this section to an appropriate first-party regulatory agency or
				sector-specific agency, which shall report to the Director all activities it
				carries out pursuant to such delegation.</text>
								</subparagraph></paragraph><paragraph commented="no" id="HD342A6A3638744BEB086E420140FF115"><enum>(4)</enum><header>Resources</header><text display-inline="yes-display-inline">There is authorized to be appropriated such
				sums as may be necessary for the operations of the Cybersecurity Compliance
				Division for each of fiscal years 2012, 2013, and 2014.</text>
							</paragraph></subsection></section><section id="H9669B3E163854A90AFB5D6229D67AC61"><enum>223.</enum><header>Department
				responsibilities and authorities for securing Federal Government
				networks</header>
						<subsection id="HADD225FD4DBA4174BE3CBD635ADE678F"><enum>(a)</enum><header>In
				general</header><text>The Secretary, acting through the Assistant Secretary for
				Cybersecurity and Communications or the Director of the Cybersecurity
				Compliance Division pursuant to subparagraphs (B), (C), and (D) of subsection
				(b)(2), shall establish and enforce cybersecurity requirements for civilian
				nonmilitary and nonintelligence community Federal systems to prevent, deter,
				prepare for, detect, report, attribute, mitigate, respond to, and recover from
				cyber attacks and other cyber incidents.</text>
						</subsection><subsection id="H94EEE04D04BB4798AC5E8D51B0CF4146"><enum>(b)</enum><header>Interagency
				working group</header>
							<paragraph id="HE70F345B002C49CA87E759F6CE7DC9D8"><enum>(1)</enum><header>In
				general</header><text>The Assistant Secretary for Cybersecurity and
				Communications shall establish and chair an interagency working group that
				shall include, at a minimum, representation of all chief information officers
				from all Federal civilian agencies, the Director of the Cybersecurity
				Compliance division, the Assistant Secretary for Infrastructure Protection, and
				the White House Cybersecurity Coordinator. The Assistant Secretary shall invite
				the Secretary of Defense, the Director of the National Security Agency, and the
				Director of National Intelligence to participate as nonvoting representatives
				for purposes of advising the interagency working group.</text>
							</paragraph><paragraph id="HA707A9F521C7495FACBC8F89195FC88B"><enum>(2)</enum><header>Functions</header><text>The
				interagency working group shall—</text>
								<subparagraph id="HDB1505F91A4F4378AE4A0B5DBE0198E5"><enum>(A)</enum><text>meet at the call
				of the Chair;</text>
								</subparagraph><subparagraph id="HFE7B0A2D3F0746C3821583DDA55BDC0D"><enum>(B)</enum><text>develop and adopt
				risk-based, performance-based cybersecurity requirements for civilian Federal
				agency computer networks and federally owned critical infrastructure;</text>
								</subparagraph><subparagraph id="HD1CD310F484D439FB8828641CD3567E0"><enum>(C)</enum><text>develop and adopt
				a range of remedies, including penalties, for noncompliance of the requirements
				adopted under paragraph (2), each agency having one vote;</text>
								</subparagraph><subparagraph id="HA77001E581FE464F94F7152E7C5786DA"><enum>(D)</enum><text>develop
				recommended budgets for security of the civilian nonmilitary and
				non-intelligence community Federal agency computer networks; and</text>
								</subparagraph><subparagraph id="H81BB2AB635BC44ED846C407DD45BE61F"><enum>(E)</enum><text>propose updates,
				as necessary, for the Common Criteria for Information Technology Security
				Evaluation as part of a supply chain risk management strategy designed to
				ensure the security and resilience of the Federal information infrastructure,
				including protection against unauthorized access to, alteration of information
				in, disruption of operations of, interruption of communications or services of,
				and insertion of malicious software, engineering vulnerabilities, or otherwise
				corrupting software, hardware, services, or products intended for use in
				Federal information infrastructure.</text>
								</subparagraph></paragraph><paragraph id="H4DE61D3E303545D6A7EF143504CE28DE"><enum>(3)</enum><header>Adoption by
				vote</header><text>Adoption of requirements and remedies under subparagraphs
				(B) and (C) of paragraph (2) shall be by a majority vote of the members of the
				interagency working group, in which each agency with a voting representative on
				the interagency working group has one vote.</text>
							</paragraph></subsection><subsection commented="no" id="H87181F415A9B4385BFD58CE36604E0E7"><enum>(c)</enum><header>Codification of
				agreements</header><text display-inline="yes-display-inline">All measures
				adopted under subsection (b) shall be submitted by the Secretary to the Office
				of Management and Budget for establishment in a binding Governmentwide memo or
				circular.</text>
						</subsection><subsection id="H3607435747704A6CA8C4714AB14FC119"><enum>(d)</enum><header>Enforcement of
				cybersecurity requirements for Federal Government networks</header><text display-inline="yes-display-inline">The Assistant Secretary, acting through the
				Director of the Cybersecurity Compliance Division, may enforce all requirements
				adopted under subsection (b)(2)(B).</text>
						</subsection><subsection id="H9C5B8633F6874425ABFACCC727732EDB"><enum>(e)</enum><header>Certifications,
				audits, and inspections</header><text display-inline="yes-display-inline">The
				Director of the Cybersecurity Compliance Division, in carrying out the
				Assistant Secretary for Cybersecurity and Communications’ enforcement authority
				under subsection (d), shall require a certification of compliance from the head
				of each civilian Federal agency that is subject to the requirements under
				subsection (b)(2)(B), and may conduct announced or unannounced audits and
				inspections of any network owned, operated, or used by a Federal civilian
				agency.</text>
						</subsection><subsection id="HA3DF4E4FDE6C423EAC31EA4FD08241B7"><enum>(f)</enum><header>Enforcement</header><text display-inline="yes-display-inline">If a certification, audit, or inspection
				carried out under subsection (e) shows noncompliance with a requirement under
				subsection (b)(2)(B), Assistant Secretary, acting through the Director of the
				Cybersecurity Compliance Division, may identify the appropriate remedies,
				including penalties, under subsection (b)(2)(C).</text>
						</subsection><subsection id="H08381757BBE9489D8DE9484324F30A32"><enum>(g)</enum><header>Execution of
				penalties by OMB</header><text display-inline="yes-display-inline">The Director
				of the Office of Management and Budget shall execute each remedy identified by
				the Director of the Cybersecurity Compliance Division under subsection (f) on
				behalf of the Assistant Secretary.</text>
						</subsection><subsection id="H950BD53BD3AF443E97620980F554FB15"><enum>(h)</enum><header>Reporting of
				cyber incidents on Federal networks</header><text display-inline="yes-display-inline">The requirements under subsection (b)(2)(B)
				shall include a requirement that all Federal entities report any cyber
				incidents on their computer networks to the Director and to the United States
				Computer Emergency Readiness Team.</text>
						</subsection><subsection id="H588021C3518C498881E9F1F438EF69B7"><enum>(i)</enum><header>Responding to
				cyber incidents on Federal networks</header><text display-inline="yes-display-inline">If an incident is reported under subsection
				(h), the United States Computer Emergency Readiness Team shall, in coordination
				with the reporting agency, research the incident to determine and report to the
				Director and the reporting agency—</text>
							<paragraph id="H137441FE355A4A71B22FBECBA6E09463"><enum>(1)</enum><text>the extent of any
				compromise;</text>
							</paragraph><paragraph id="H4F0E38D595C74A269BAC3A05E32EB281"><enum>(2)</enum><text>an identification
				of any attackers, including any affiliations with terrorists, terrorist
				organizations, criminal organizations, state entities, and nonstate
				entities;</text>
							</paragraph><paragraph id="HAEA23EEB50574BB29F0EDE43B27A9BF7"><enum>(3)</enum><text>the method of
				penetration;</text>
							</paragraph><paragraph id="H94426D7BDC0A404A9D530B76400D4B13"><enum>(4)</enum><text>ramifications of
				any such compromise on future operations;</text>
							</paragraph><paragraph id="HAC99CDB20F85424FBF53121585A0E0BF"><enum>(5)</enum><text>secondary
				ramifications of any such compromise on other Federal or non-Federal
				networks;</text>
							</paragraph><paragraph id="HBDE1A27E8C6C47568AE47566C0AA2371"><enum>(6)</enum><text>ramifications of
				any such compromise on national security, including war fighting capability;
				and</text>
							</paragraph><paragraph id="HCB0CB4F473BF40B488FFB922BA6688E6"><enum>(7)</enum><text>recommended
				mitigation activities.</text>
							</paragraph></subsection></section><section id="H30A1E525A682483584F3DE51452D422A"><enum>224.</enum><header>Department
				responsibilities and authorities for securing private sector networks</header>
						<subsection id="H81DDB09E47AA479C89BBA224E3142231"><enum>(a)</enum><header>Findings</header><text>Congress
				finds that—</text>
							<paragraph id="HD04C515C41CA47D59A0FF8BBF2861FAB"><enum>(1)</enum><text>pursuant to
				Homeland Security Presidential Directive 7 the Department established
				public-private partnerships including Government Coordinating Councils (GCCs)
				and Sector Coordinating Councils (SCCs) to aid in the task of protecting the
				Nation’s critical infrastructures;</text>
							</paragraph><paragraph id="H4E78D2288D384FBEA28CAF738034B35F"><enum>(2)</enum><text>as part of this
				structure, each critical infrastructure sector has a designated sector-specific
				agency;</text>
							</paragraph><paragraph id="HEDC3A31A8539479E975D917B9E1370F4"><enum>(3)</enum><text>the designated
				sector-specific agency for the Information Technology sector is the Office of
				Cybersecurity and Communications, and the designated sector-specific agency for
				the communications sector is the National Communications System, which resides
				within the Office of Cybersecurity and Communications;</text>
							</paragraph><paragraph id="H4C0C9D02B38B4FFFA541C30A6E1A15DE"><enum>(4)</enum><text>if cybersecurity
				regulation are necessary, the Department, consistent with the entire GCC/SCC
				structure, as the sector-specific agency, will be the regulator for
				cybersecurity requirements within the information technology and communications
				sectors; and</text>
							</paragraph><paragraph id="H8BE550D97089496E946AADBDB17036C0"><enum>(5)</enum><text>in other critical
				infrastructure sectors, enforcement of cybersecurity regulations should be
				accomplished through appropriate first-party regulatory agencies or
				sector-specific agencies.</text>
							</paragraph></subsection><subsection id="H1F1FF1EFE5864CAD802FDECFB325B2D2"><enum>(b)</enum><header>General
				authority</header><text>The Secretary, acting through the Director, may
				establish and enforce risk-based cybersecurity requirements for private sector
				computer networks within covered critical infrastructures.</text>
						</subsection><subsection id="HC2A3828C64594BA984DAB9FCDC3C5B5E"><enum>(c)</enum><header>Risk-Based
				cybersecurity requirements for critical infrastructure</header>
							<paragraph id="H0CC5BB296CAC4FDFA0313E0C56E7F612"><enum>(1)</enum><header>In
				general</header><text>The Director shall promulgate risk-based,
				performance-based cybersecurity requirements for covered critical
				infrastructures, that are designed to prevent, deter, prepare for, detect,
				report, attribute, mitigate, respond to and recover from cyber
				incidents.</text>
							</paragraph><paragraph id="HD5F5CCAF2D034F079D77090F715B951B"><enum>(2)</enum><header>Risk
				factors</header><text>The requirements shall be based on the risk factors of
				threats, vulnerabilities, and consequences, as follows:</text>
								<subparagraph id="H3585DF1F6A2C45B78823B2CE157F0B85"><enum>(A)</enum><header>Threats</header><text>The
				requirements shall be based on terrorist or other known adversary capabilities
				and intent, or the likelihood of a potential terrorist or other adversary
				attacking or causing a cyber incident against critical infrastructure, as
				identified by the Secretary in consultation with the Director of National
				Intelligence, including—</text>
									<clause id="H72610EA8ECBE4B75BECA4FBF7AA32A2D"><enum>(i)</enum><text>theft,
				modification, compromise, damage, or destruction of data or databases;</text>
									</clause><clause id="H24E4EC1078D6476EAA591DA6C5F36556"><enum>(ii)</enum><text>physical
				compromise, damage, or destruction of covered critical infrastructures;
				and</text>
									</clause><clause id="H9F7E53397D844A40AECBC68A64549824"><enum>(iii)</enum><text>national,
				corporate, or personal espionage.</text>
									</clause></subparagraph></paragraph><paragraph id="H499726CF2C624A0EA407F58AB1D53D87"><enum>(3)</enum><header>Vulnerabilities</header><text>The
				requirements shall require security measures based on—</text>
								<subparagraph id="HEB5AD1EC7A114647B39BC4082D7B6C50"><enum>(A)</enum><text>preparedness;</text>
								</subparagraph><subparagraph id="HB1B9D4983EEB40178AE485BE05623752"><enum>(B)</enum><text>target
				attractiveness; and</text>
								</subparagraph><subparagraph id="H8FC3DD3CF9D84298BC2E9A1C90A91AA6"><enum>(C)</enum><text>deterrence
				capabilities.</text>
								</subparagraph></paragraph><paragraph id="H5409837D90004AA2BAC3CE095E763CDE"><enum>(4)</enum><header>Consequences</header><text>The
				requirements shall require security measures based on—</text>
								<subparagraph id="H1E41F7BB697B490BB697DBD752A18ABC"><enum>(A)</enum><text>the potential
				extent and likelihood of death, injury, or serious adverse effects to human
				health and safety caused by a disruption of the reliable operation of covered
				critical infrastructure;</text>
								</subparagraph><subparagraph id="H12A67029DD404E0E9D24FBB2BF719AA8"><enum>(B)</enum><text>the threat to or
				potential impact on national security caused by a disruption of the reliable
				operation of covered critical infrastructure;</text>
								</subparagraph><subparagraph id="HDD477D3A9C314024A52FB0F995BB4120"><enum>(C)</enum><text>the extent to
				which the disruption of the reliable operation of covered critical
				infrastructure will disrupt the reliable operation of other covered critical
				infrastructure;</text>
								</subparagraph><subparagraph id="H7FD09CF2E0BC4749A3A2EC45C8C68D45"><enum>(D)</enum><text display-inline="yes-display-inline">the potential for harm to the economy that
				would result from a disruption of the reliable operation of covered critical
				infrastructure; and</text>
								</subparagraph><subparagraph id="H159D0ED000AA4F6FBD67AB517210A36F"><enum>(E)</enum><text display-inline="yes-display-inline">other risk-based security factors that the
				Director, in consultation with the head of the sector-specific agency that is
				the first-party regulatory agency with responsibility for the covered critical
				infrastructure concerned, determines to be appropriate and necessary to protect
				public health and safety, critical infrastructure, national security, or
				economic security.</text>
								</subparagraph></paragraph></subsection><subsection id="HA8D37A56F5C346E58E0BE099853F05D9"><enum>(d)</enum><header>Consultation</header><text>In
				establishing security performance requirements under subsection (c), the
				Director shall, to the maximum extent practicable, consult with—</text>
							<paragraph id="HAE3595DD3B654E7DB430A5291593FE15"><enum>(1)</enum><text>the Assistant
				Secretary for Infrastructure Protection of the Department;</text>
							</paragraph><paragraph id="H69F37515637C4D02970AC074F34F2383"><enum>(2)</enum><text>the Officer for
				Civil Rights and Civil Liberties of the Department;</text>
							</paragraph><paragraph id="HB583B62E4C8C4BDDBAEC7C4582BCEB69"><enum>(3)</enum><text>the Chief Privacy
				Officer of the Department;</text>
							</paragraph><paragraph id="HB62F372319EC42AC9F6EAADC263A753E"><enum>(4)</enum><text>the Under
				Secretary for Intelligence and Analysis;</text>
							</paragraph><paragraph id="H49EE5C8DC61E43EBB243C91B4147C623"><enum>(5)</enum><text>the Director of
				National Intelligence;</text>
							</paragraph><paragraph id="HAF37DFD44F1A469EB091D2F3CC0A245A"><enum>(6)</enum><text>the Director of
				the National Security Agency;</text>
							</paragraph><paragraph id="H8360A71516CC4545AA6AB1C9A3F636A0"><enum>(7)</enum><text>the Director of
				the National Institute of Standards and Technology;</text>
							</paragraph><paragraph id="H5BC7DDD9456240CD974DBAE68147BCB2"><enum>(8)</enum><text>the heads of
				sector-specific agencies;</text>
							</paragraph><paragraph id="HF0230618D70D42009AF46F981626CED4"><enum>(9)</enum><text>the heads of
				first-party regulatory agencies;</text>
							</paragraph><paragraph id="HDE208481AC7448C89BBEECD09726DA09"><enum>(10)</enum><text>private sector
				companies or industry groups, including but not limited to members of
				appropriate sector coordinating councils;</text>
							</paragraph><paragraph id="H8AF48D03BE8749FB964CF5CF72BE23BB"><enum>(11)</enum><text>State, local, and
				tribal agency representatives;</text>
							</paragraph><paragraph id="HAB33C17F26D94B6A9A545CA0A7096C06"><enum>(12)</enum><text>academic
				institutions and think tanks;</text>
							</paragraph><paragraph id="H87C2E923EE1042D49DF523D2F7DE4B74"><enum>(13)</enum><text>private sector,
				government, and nonprofit entities that specialize in privacy and civil
				liberties; and</text>
							</paragraph><paragraph id="HBDFBE0937B57433BBF29D2A93AFECE72"><enum>(14)</enum><text>the White House
				Cybersecurity Coordinator.</text>
							</paragraph></subsection><subsection id="H5C0D7C215E2047D39679407824BB846B"><enum>(e)</enum><header>Covered critical
				infrastructures</header>
							<paragraph id="HAC053F172D8944E2B84DEDD7FB79B9C1"><enum>(1)</enum><header>Designation</header><text>The
				Director shall—</text>
								<subparagraph id="H9EEE6965E9A14DCDB453E501742A77B4"><enum>(A)</enum><text display-inline="yes-display-inline">determine, in consultation with the heads
				of sector-specific agencies and the heads of first-party regulatory agencies,
				which systems or assets of critical infrastructure shall be subject to the
				requirements of this section and designate them as covered critical
				infrastructures for purposes of this section;</text>
								</subparagraph><subparagraph id="HD34179E3467E49FDBBFAF38FA6E5388D"><enum>(B)</enum><text>notify each
				first-party regulatory agency or sector-specific agency of each such
				determination; and</text>
								</subparagraph><subparagraph id="H957D9631C017400A8AFAE2687B06B5B7"><enum>(C)</enum><text>acting through the
				corresponding first-party regulatory agency or sector-specific agency, notify
				owners or operators of covered critical infrastructure sectors of the
				requirements of this subtitle.</text>
								</subparagraph></paragraph><paragraph id="HF70AC52137134F5FA84A3BE5AC33D2DD"><enum>(2)</enum><header>Requirements</header><text>A
				system or asset may not be designated as covered critical infrastructure under
				paragraph (1) unless—</text>
								<subparagraph id="H993D748B51E9480A81DD702FD4D7D0B2"><enum>(A)</enum><text>the system or
				asset meets the requirements for inclusion on the prioritized critical
				infrastructure list established by the Secretary under section
				210E(a)(2);</text>
								</subparagraph><subparagraph id="HE8B22197906D4450B39DF749CA6A06E2"><enum>(B)</enum><text>the system or
				asset is a component of the national information infrastructure or the national
				information infrastructure is essential to the reliable operation of the system
				or asset; or</text>
								</subparagraph><subparagraph id="HAF2784455FE744D9ABE555306DA13E80"><enum>(C)</enum><text>the destruction or
				the disruption of the reliable operation of the system or asset would cause a
				national or regional catastrophe.</text>
								</subparagraph></paragraph><paragraph id="HB121681094BB443C988987DF9A35BA07"><enum>(3)</enum><header>Factors to be
				considered</header><text>In designating systems or assets under this section,
				the Director shall consider cyber risks and consequences by sector,
				including—</text>
								<subparagraph id="HBDD1EB94F605465FBACDF112A8475C33"><enum>(A)</enum><text display-inline="yes-display-inline">the factors listed in section subsection
				(c);</text>
								</subparagraph><subparagraph id="H1FE0ACB7C80242349325E9E7C7C8805A"><enum>(B)</enum><text>known cyber
				incidents or cyber risks identified by existing risk assessments;</text>
								</subparagraph><subparagraph id="H7A34D1142CF94F6383AFC8738BAC76A5"><enum>(C)</enum><text>interdependencies
				between components of covered critical infrastructure; and</text>
								</subparagraph><subparagraph id="H0198D035BB8D41458F8FAFFEB4942D22"><enum>(D)</enum><text>the potential for
				the destruction or disruption of the system or asset to cause—</text>
									<clause id="H66FE730FD9184705A99D70132EAAEDB5"><enum>(i)</enum><text>a
				mass casualty event with an extraordinary number of fatalities;</text>
									</clause><clause id="H0ACA914EB52842B1B21A949FD1FAC053"><enum>(ii)</enum><text>severe economic
				consequences;</text>
									</clause><clause id="H8315ABE36C6A48BBA44787BDEC95269D"><enum>(iii)</enum><text>mass evacuations
				with a prolonged absence; or</text>
									</clause><clause id="H9B32EC6C93974F96AB09655CC00E853E"><enum>(iv)</enum><text>severe
				degradation of national security capabilities, including intelligence and
				defense functions.</text>
									</clause></subparagraph></paragraph><paragraph id="H86BC39E877714783998B7418387E77A5"><enum>(4)</enum><header>Reconsideration</header><text>Prior
				to a final designation of a system or asset of critical infrastructure under
				this subsection, the Director shall provide the owner or operator of the system
				or asset an opportunity to appeal the determination made under paragraph
				(1)(A).</text>
							</paragraph></subsection><subsection id="H26117A6795924C71BD52C163CCB84E91"><enum>(f)</enum><header>Cybersecurity
				plans</header><text display-inline="yes-display-inline">The Director shall
				require entities determined under subsection (e) to be covered critical
				infrastructures to comply with the requirements under subsection (c) and to
				submit to the first-party regulatory agency or sector-specific agency, a
				proposed cybersecurity plan to satisfy the security performance requirements
				described in subsection (c) on a timeline determined by the Director.</text>
						</subsection><subsection id="H80131D296E40444DBA18BB676961BA3A"><enum>(g)</enum><header>Cybersecurity
				plan review</header><text>Upon submission of the plan, the first-party
				regulatory agency or sector-specific agency shall, based on guidance provided
				by the Director—</text>
							<paragraph id="H9BBAE7AC1AB34A13BA0A6FF40514DF2E"><enum>(1)</enum><text>review
				cybersecurity plans submitted pursuant to subsection (f);</text>
							</paragraph><paragraph id="H5FACD697B3864876BD70F71855FA4FEA"><enum>(2)</enum><text>approve or
				disapprove each cybersecurity plan;</text>
							</paragraph><paragraph id="HD5B8B075C9554A08A15AED0BBDB1A1C0"><enum>(3)</enum><text>notify the
				submitter of the cybersecurity plan of approval or disapproval;</text>
							</paragraph><paragraph id="HAFF97A62A26745A38697C4AF5DED4585"><enum>(4)</enum><text>in the case of
				disapproval, provide a clear explanation of the reasons for disapproval,
				possible changes that would result in approval, and provide a timetable for
				resubmission for compliance; and</text>
							</paragraph><paragraph id="HE29741EFB7934C47B70AAC5C6FAFC016"><enum>(5)</enum><text>inform the
				Director of any approvals or disapprovals.</text>
							</paragraph></subsection><subsection id="HA47E7290DE1B4A549791050EB8F46512"><enum>(h)</enum><header>Implementation
				of cybersecurity plans</header>
							<paragraph id="HBA2DFA311C134D3282D71D2DE7521965"><enum>(1)</enum><header>In
				general</header><text>The owners and operators of covered critical
				infrastructure shall have flexibility in their cybersecurity plans to implement
				any cybersecurity measure, or combination thereof, to satisfy the cybersecurity
				performance requirements described in subsection (c) and the first-party
				regulatory agency or sector-specific agency may not disapprove under this
				section any proposed cybersecurity measures, or combination thereof, based on
				the presence or absence of any particular cybersecurity measure if the proposed
				cybersecurity measures, or combination thereof, satisfy the cybersecurity
				performance requirements established by the Director under subsection
				(c).</text>
							</paragraph><paragraph id="H517F6501A29C433CBBC6E869ED800A2D"><enum>(2)</enum><header>Recommended
				cybersecurity measures</header><text>The Assistant Secretary for Cybersecurity
				and Communications may, at the request of an owner and operator of covered
				critical infrastructure, recommend a specific cybersecurity measure, or
				combination thereof, that will satisfy the cybersecurity performance
				requirements established by the Director. The absence of the recommended
				security measures, or combination thereof, may not serve as the basis for a
				disapproval of the security measure, or combination thereof, proposed by the
				owner or operator of covered critical infrastructure if the proposed security
				measure, or combination thereof, otherwise satisfies the security performance
				requirements established by the Director under (c).</text>
							</paragraph></subsection><subsection id="HC0AF9FD7014B4B16BE3CB979F142C09E"><enum>(i)</enum><header>Enforcement
				certifications, audits and inspections</header><text display-inline="yes-display-inline">The sector-specific agency or first-party
				regulatory agency, in enforcing the requirements under subsection (c), shall
				require an entity with a cybersecurity plan approved under subsection (g) to
				certify that the cybersecurity plan has been implemented, and may conduct
				announced or unannounced audits and inspections of any such entity to determine
				compliance.</text>
						</subsection><subsection id="H0EBDF609031D4878BC79339E57BF3DBA"><enum>(j)</enum><header>Reporting of
				cyber incidents on covered critical infrastructure networks</header><text display-inline="yes-display-inline">The requirements under subsection (c) shall
				include a requirement that each covered critical infrastructure entity report
				any cyber incidents on its networks to the first-party regulatory agency for
				the entity or to the sector-specific agency for the entity (if there is no
				first-party regulatory agency), and to US CERT.</text>
						</subsection><subsection id="H6EF3A185A6134C0BB0DDAC717B523F78"><enum>(k)</enum><header>Responding to
				cyber incidents on private networks</header><text display-inline="yes-display-inline">If an incident is reported under subsection
				(j), the United States Computer Emergency Readiness Team may, at the invitation
				of and in coordination with the reporting entity, investigate the incident to
				determine and report to the Director and the reporting entity—</text>
							<paragraph id="H82BDA6F793494CD286308A0A3026303B"><enum>(1)</enum><text>the extent of any
				compromise;</text>
							</paragraph><paragraph id="HC0A5F74C1F424D42A33D7372F08245C5"><enum>(2)</enum><text>an identification
				of any attackers, including any affiliations with terrorists, terrorist
				organizations, state entities, and nonstate entities;</text>
							</paragraph><paragraph id="H22A987335A64460CAE9AC09392B38F08"><enum>(3)</enum><text>the method of
				penetration;</text>
							</paragraph><paragraph id="H97FA5174166342D8913C7F442843A5CF"><enum>(4)</enum><text>ramifications of
				any such compromise on future operations;</text>
							</paragraph><paragraph id="HC3DC72FAEF9946D5B41FCC5C44A0BF3F"><enum>(5)</enum><text>secondary
				ramifications of any such compromise on other Federal or non-Federal
				networks;</text>
							</paragraph><paragraph id="H0163A18F0E114E94818C891CF1BBF2CA"><enum>(6)</enum><text>ramifications of
				any such compromise on national security, including war fighting capability;
				and</text>
							</paragraph><paragraph id="H556A025BF7A44D27B4D0B32AF6BC097A"><enum>(7)</enum><text>recommended
				mitigation activities.</text>
							</paragraph></subsection><subsection id="H9D8CB5C3C85C4576B44F11A8B8BDFD04"><enum>(l)</enum><header>SAFETY act
				incentives</header><text display-inline="yes-display-inline">The Director may
				recommend SAFETY Act designation and certification to entities determined under
				subsections (g) and (i) to be in compliance with the requirements of this
				section.</text>
						</subsection><subsection id="H2E463CCD497248DA8E71CE20FEA14A49"><enum>(m)</enum><header>Penalties</header><text>In
				the case of noncompliance with the requirements of this section the Director
				may recommend recision or suspension of SAFETY Act designation and
				certification during the period of noncompliance, and may levy civil penalties,
				not to exceed $100,000 per day, for each instance of
				noncompliance.</text>
						</subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
			</subsection><subsection id="H956CA2470B65457EA7D8F69E741BD85C"><enum>(b)</enum><header>Deadlines</header><text display-inline="yes-display-inline">The Cybersecurity Compliance Division of
			 the Department of Homeland Security shall—</text>
				<paragraph id="H4E730AA50C9C483EB0E6872EE785E640"><enum>(1)</enum><text>not later than six
			 months after such date of enactment of this Act, publish a notice of proposed
			 rulemaking for regulations required under section 224of the Homeland Security
			 Act of 2002, as amended by this section; and</text>
				</paragraph><paragraph id="H5BC9B0A579124C87A95B4359468E56D7"><enum>(2)</enum><text display-inline="yes-display-inline">not later than one year after such date of
			 enactment of this Act, promulgate final regulations required under such
			 section.</text>
				</paragraph></subsection><subsection id="H90BA31B012AD4D519A41E95F610CF6B8"><enum>(c)</enum><header>Rule of
			 construction</header><text>Nothing in this section shall be construed to
			 provide authority to any sector-specific agency or first-party regulatory
			 agency to establish standards or other measures outside of the requirements of
			 this Act except as required by this Act and the amendments made by this
			 Act.</text>
			</subsection><subsection id="H4B71809E48B14F0BBD252ABA088EC0C4"><enum>(d)</enum><header>Clerical
			 amendment</header><text display-inline="yes-display-inline">The table of
			 contents in section 1(b) of such Act is amended by striking the items relating
			 to sections 221 through 225 and inserting the following:</text>
				<quoted-block display-inline="no-display-inline" id="H1F3890C0A41341149EDAC5D20C07B6A5" style="OLC">
					<toc regeneration="no-regeneration">
						<toc-entry level="section">Sec. 221. Definitions.</toc-entry>
						<toc-entry level="section">Sec. 222. Office of Cybersecurity and
				Communications.</toc-entry>
						<toc-entry level="section">Sec. 223. Department responsibilities and
				authorities for securing Federal Government networks.</toc-entry>
						<toc-entry level="section">Sec. 224. Department responsibilities and
				authorities for securing private sector networks.</toc-entry>
						<toc-entry level="section">Sec. 225. Procedures for sharing
				information.</toc-entry>
						<toc-entry level="section">Sec. 226. Privacy Officer.</toc-entry>
						<toc-entry level="section">Sec. 227. Enhancement of non-Federal
				cybersecurity.</toc-entry>
						<toc-entry level="section">Sec. 228. Net guard.</toc-entry>
						<toc-entry level="section">Sec. 229. Cyber Security Enhancement Act
				of 2002.</toc-entry>
					</toc>
					<after-quoted-block>.
				  </after-quoted-block></quoted-block>
			</subsection></section><section id="H35D02476645F4E4EBADDF4B5A2DD7E4D"><enum>3.</enum><header>Information
			 sharing</header><text display-inline="no-display-inline">The Assistant
			 Secretary for Cybersecurity and Communications of the Department of Homeland
			 Security in coordination with the Assistant Secretary Infrastructure Protection
			 of the Department of Homeland Security shall, to the maximum extent possible,
			 consistent with rules for the handling of classified information, share
			 relevant information regarding cybersecurity threats and vulnerabilities, and
			 any proposed actions to mitigate them, with all Federal agencies, appropriate
			 State, local, or tribal authority representatives, and all covered critical
			 infrastructure owners and operators, including by expediting necessary security
			 clearances for designated points of contact for critical
			 infrastructures.</text>
		</section><section id="H25F4CF0A3B8C4A2AB1C8881DC1044A6F"><enum>4.</enum><header>Information
			 protection</header><text display-inline="no-display-inline">The Assistant
			 Secretary for Cybersecurity and Communications of the Department of Homeland
			 Security shall designate, as appropriate, information received from Federal
			 agencies pursuant to the requirements enacted by section 2 (including the
			 amendments made by such section), information received from covered critical
			 infrastructure owners and operators pursuant to such section, and information
			 provided to Federal agencies or covered critical infrastructure owners and
			 operators pursuant to this section as sensitive security information and shall
			 require and enforce sensitive security information requirements for handling,
			 storage, and dissemination of any such information.</text>
		</section><section id="H40CFA4DC4E80495A8EB1E1A3D9888AA0"><enum>5.</enum><header>Cybersecurity
			 research and development</header>
			<subsection id="HEB535F5B43C74004B9FDD4015CBBDE3E"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">The Under Secretary
			 for Science and Technology of the Department of Homeland Security shall support
			 research, development, testing, evaluation, and transition of cybersecurity
			 technology, including fundamental, long-term research to improve the ability of
			 the United States to prevent, protect against, detect, respond to, and recover
			 from acts of terrorism and cyber attacks, with an emphasis on research and
			 development relevant to large-scale, high-impact attacks.</text>
			</subsection><subsection id="H62D540C4DB1D4DC890614DA23D413A23"><enum>(b)</enum><header>Activities</header><text>The
			 research and development supported under subsection (a) shall include work
			 to—</text>
				<paragraph id="H1F64F23DE22748CC9A0D6368948D5BB2"><enum>(1)</enum><text>advance the
			 development and accelerate the deployment of more secure versions of
			 fundamental Internet protocols and architectures, including for the domain name
			 system and routing protocols;</text>
				</paragraph><paragraph id="H19B187F71ED84FDBB4D6F75F3B3BED77"><enum>(2)</enum><text>improve and create
			 technologies for detecting attacks or intrusions, including real-time
			 monitoring and real-time analytic technologies;</text>
				</paragraph><paragraph id="HC48629E820F3407B9FBB3F353CD2B07A"><enum>(3)</enum><text>improve and create
			 mitigation and recovery methodologies, including techniques and policies for
			 real-time containment of attacks, and development of resilient networks and
			 systems that degrade gracefully;</text>
				</paragraph><paragraph id="H980411A73DE3481E9461F29B28918807"><enum>(4)</enum><text>develop and
			 support infrastructure and tools to support cybersecurity research and
			 development efforts, including modeling, test beds, and data sets for
			 assessment of new cybersecurity technologies;</text>
				</paragraph><paragraph id="H7D0246032C454C9998EC822D723700F2"><enum>(5)</enum><text>assist the
			 development and support of technologies to reduce vulnerabilities in process
			 control systems;</text>
				</paragraph><paragraph id="HB52379F933B043AB99855A166FB97B07"><enum>(6)</enum><text>develop and
			 support cyber forensics and attack attribution; and</text>
				</paragraph><paragraph id="H80A9FA4694D44328BC4BEAD7EC687551"><enum>(7)</enum><text>test, evaluate,
			 and facilitate the transfer of technologies associated with the engineering of
			 less vulnerable software and securing the information technology software
			 development lifecycle.</text>
				</paragraph></subsection><subsection id="H84BFE733D5CB46BF8138F0E1C90BC463"><enum>(c)</enum><header>Coordination</header><text>In
			 carrying out this section, the Under Secretary shall coordinate activities
			 with—</text>
				<paragraph id="HE666B5F50AC84F51BCFDA5DDA01C0764"><enum>(1)</enum><text display-inline="yes-display-inline">the Under Secretary for National Protection
			 and Programs, the Assistant Secretary for Cybersecurity and Communications, and
			 the Assistant Secretary for Infrastructure Protection of the Department of
			 Homeland Security; and</text>
				</paragraph><paragraph id="HDCF0C4316A514862A3E6C757C03D3341"><enum>(2)</enum><text>the heads of other
			 relevant Federal departments and agencies, including the National Science
			 Foundation, the Defense Advanced Research Projects Agency, the Information
			 Assurance Directorate of the National Security Agency, the National Institute
			 of Standards and Technology, the Department of Commerce, and other appropriate
			 working groups established by the President to identify unmet needs and
			 cooperatively support activities, as appropriate.</text>
				</paragraph></subsection></section><section id="H97B9B495863D491C9B7A96872533175F"><enum>6.</enum><header>Cyber workforce
			 recruitment, development, and retention</header>
			<subsection id="H8C2F2AA15F3D42748C9F85619D113C5B"><enum>(a)</enum><header>Workforce
			 plan</header><text display-inline="yes-display-inline">Not later than 180 days
			 after the date of enactment of this Act and in every subsequent year, the
			 Assistant Secretary for Cybersecurity and Communication of the Department of
			 Homeland Security shall develop a strategic cybersecurity workforce plan as
			 part of the Federal agency performance plan required under section 1115 of
			 title 31, United States Code, that includes—</text>
				<paragraph id="H2544C54C540E40E399B495B96A51BBB4"><enum>(1)</enum><text>a
			 description of the Department’s cybersecurity mission; and</text>
				</paragraph><paragraph id="HA8B2D72637934853B1B75C1C1802F37F"><enum>(2)</enum><text>a
			 description and analysis, relating to the specialized workforce needed by the
			 Department to fulfill the Federal agency’s cybersecurity mission,
			 including—</text>
					<subparagraph id="HA8AB216EE44A47DD86D3A3422491B39A"><enum>(A)</enum><text>the cybersecurity
			 workforce needs of the Department on the date of the report, and near-, mid-,
			 and long-term projections of workforce needs;</text>
					</subparagraph><subparagraph id="H705372927B404ACA8DEA42361CF22204"><enum>(B)</enum><text>hiring projections
			 to meet cybersecurity workforce needs, including, for at least a 2-year period,
			 specific occupation and grade levels;</text>
					</subparagraph><subparagraph id="HA42CA137A58B4C98B023105F26BBAD6B"><enum>(C)</enum><text>long-term and
			 short-term strategic goals to address critical skills deficiencies, including
			 analysis of the numbers of and reasons for attrition of employees;</text>
					</subparagraph><subparagraph id="H4DC16E1F3D6A43389A5A19A237597F49"><enum>(D)</enum><text>recruitment
			 strategies to attract highly qualified candidates from diverse backgrounds and
			 geographic locations;</text>
					</subparagraph><subparagraph id="H12EEC415F9DD46FE9860F224FCE6FE9B"><enum>(E)</enum><text>an assessment of
			 the sources and availability of individuals with needed expertise;</text>
					</subparagraph><subparagraph id="HC538A7A2FC0D4766B8117ED034F7E4AC"><enum>(F)</enum><text>ways to streamline
			 the hiring process;</text>
					</subparagraph><subparagraph id="HAA6F02B5A373468B83669F6D570D81DF"><enum>(G)</enum><text>the barriers to
			 recruiting and hiring individuals qualified in cybersecurity and
			 recommendations to overcome the barriers; and</text>
					</subparagraph><subparagraph id="HAC58FFDC634343DDAE087F2752A767FA"><enum>(H)</enum><text>a training and
			 development plan to enhance and improve the knowledge of employees.</text>
					</subparagraph></paragraph></subsection><subsection id="H9EE55B481ED14F3081A909B6ECF54851"><enum>(b)</enum><header>Training</header>
				<paragraph id="H3DC019AEA2AE4F8AAD3CBDC089DDC3AF"><enum>(1)</enum><header>Federal
			 government employees and federal contractors</header><text>The Assistant
			 Secretary for Cybersecurity and Communications shall establish a cybersecurity
			 awareness and education curriculum that shall be required for all Federal
			 employees and contractors engaged in the design, development, or operation of
			 civilian Federal agency computer networks.</text>
				</paragraph><paragraph id="H83D7F1ECE87043AEAE67F126B3F11637"><enum>(2)</enum><header>Contents</header><text display-inline="yes-display-inline">The curriculum established under paragraph
			 (1) may include—</text>
					<subparagraph id="H08D6EE01DC9740DC840679E084983936"><enum>(A)</enum><text>role-based
			 security awareness training;</text>
					</subparagraph><subparagraph id="H3359C187637D4D54B708484BCF7965E6"><enum>(B)</enum><text>recommended
			 cybersecurity practices;</text>
					</subparagraph><subparagraph id="H4CD52640140A40FFA079F80ED48E6394"><enum>(C)</enum><text>cybersecurity
			 recommendations for traveling abroad;</text>
					</subparagraph><subparagraph id="HF236282944DA46E199CE85B9276F0A10"><enum>(D)</enum><text>unclassified
			 counterintelligence information;</text>
					</subparagraph><subparagraph id="HF2410D1C77DA4571857DEDAFB1C9205C"><enum>(E)</enum><text>information
			 regarding industrial espionage;</text>
					</subparagraph><subparagraph id="HE91AE09DFE884CA98859C8246B85C181"><enum>(F)</enum><text>information
			 regarding malicious activity online;</text>
					</subparagraph><subparagraph id="HF2C632BB6AF24A6F835B4E7151203F43"><enum>(G)</enum><text>information
			 regarding cybersecurity and law enforcement;</text>
					</subparagraph><subparagraph id="H510E7C89F58642B9B3BBA83BD77E5003"><enum>(H)</enum><text>identity
			 management information;</text>
					</subparagraph><subparagraph id="H8BCEDC9C1C1C406085C02C42F30D137E"><enum>(I)</enum><text>information
			 regarding supply chain security;</text>
					</subparagraph><subparagraph id="H65A93B91E03C4B5BA9F11AA0232AAEC7"><enum>(J)</enum><text>information
			 security risks associated with the activities of Federal employees; and</text>
					</subparagraph><subparagraph id="H3B6599C8B10D4F82A93528F8F5FB8C70"><enum>(K)</enum><text>the
			 responsibilities of Federal employees in complying with policies and procedures
			 designed to reduce information security risks identified under subparagraph
			 (J).</text>
					</subparagraph></paragraph></subsection><subsection commented="no" id="H37F9901CDB864EE59CCF7361633FA240"><enum>(c)</enum><header>Education
			 opportunities</header><text>The Assistant Secretary for Cybersecurity and
			 Communications shall develop and implement a strategy to provide Federal
			 employees who work in cybersecurity-related areas with the opportunity to
			 obtain additional education.</text>
			</subsection><subsection id="HA0F2A1EBA7CE45578117A1F9FA2DC17D"><enum>(d)</enum><header>Direct hire
			 authority</header><text>Without regard to the civil service laws (other than
			 sections 3303 and 3328 of title 5, United States Code), the Secretary, acting
			 through the Assistant Secretary For Cybersecurity and Communications, in
			 consultation with the Under Secretary for Management, may appoint not more than
			 500 employees under this subsection to carry out the requirements of this Act
			 at a rate of pay that may not exceed the maximum rate of basic pay payable
			 under section 5376 of title 5, United States Code, upon certification to the
			 Congress that standard Federal hiring processes have not resulted in the
			 required number of critical cybersecurity positions being filled.</text>
			</subsection><subsection id="H6759C5280F564433AD7696A86EC8DC83"><enum>(e)</enum><header>Retention
			 bonuses</header><text>Notwithstanding section 5754 of title 5, United States
			 Code, the Director may pay a retention bonus under that section to any
			 individual appointed under this section, if the Secretary, acting through
			 Assistant Secretary for Cybersecurity and Communications, in consultation with
			 the Under Secretary for Management, determines that, in the absence of a
			 retention bonus, there is a high risk that the individual would likely leave
			 employment with the Department. The Secretary shall submit a written
			 explanation of this determination to Congress prior to announcing the use of
			 this authority.</text>
			</subsection></section></legis-body>
</bill>
