<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Referred-in-Senate" bill-type="olc" dms-id="H78FA0E947FF34672905FFB19A2D0156E" public-private="public" stage-count="1">
	<form>
		<distribution-code display="yes">IIB</distribution-code>
		<congress>112th CONGRESS</congress>
		<session>2d Session</session>
		<legis-num>H. R. 2096</legis-num>
		<current-chamber display="yes">IN THE SENATE OF THE UNITED
		  STATES</current-chamber>
		<action>
			<action-date date="20120507">May 7, 2012</action-date>
			<action-desc>Received; read twice and referred to the
			 <committee-name committee-id="SSCM00">Committee on Commerce, Science, and
			 Transportation</committee-name></action-desc>
		</action>
		<legis-type>AN ACT</legis-type>
		<official-title display="yes">To advance cybersecurity research,
		  development, and technical standards, and for other purposes.</official-title>
	</form>
	<legis-body id="H7A1096ACC46049FBBAE67A40AF17965D" style="OLC">
		<section id="HF21FC57C70F74E4793CA14491D8BCE38" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the
			 <quote><short-title>Cybersecurity Enhancement Act of
			 2012</short-title></quote>.</text>
		</section><title id="HBD5764399D34458D925FB25B14CF780A"><enum>I</enum><header>Research and
			 Development</header>
			<section display-inline="no-display-inline" id="H73C93C8FCE964D939138709B1D1C0693"><enum>101.</enum><header>Definitions</header><text display-inline="no-display-inline">In this title:</text>
				<paragraph id="H6062EBD48CE74D238AE41528F5FACF8E"><enum>(1)</enum><header>National
			 coordination office</header><text>The term National Coordination Office means
			 the National Coordination Office for the Networking and Information Technology
			 Research and Development program.</text>
				</paragraph><paragraph id="HE810683EFC8D4F61BAD0547864456000"><enum>(2)</enum><header>Program</header><text>The
			 term Program means the Networking and Information Technology Research and
			 Development program which has been established under section 101 of the
			 High-Performance Computing Act of 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5511">15 U.S.C. 5511</external-xref>).</text>
				</paragraph></section><section id="H9EADF5BD787B457DB85221417EF5FA0A"><enum>102.</enum><header>Findings</header><text display-inline="no-display-inline">Section 2 of the Cyber Security Research and
			 Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7401">15
			 U.S.C. 7401</external-xref>) is amended—</text>
				<paragraph id="H679BF4E13E5F4AAE9E8FA83F05BF8B9F"><enum>(1)</enum><text>by amending
			 paragraph (1) to read as follows:</text>
					<quoted-block id="HA945D8F68F78499F808A3F45E8DC61B7" style="OLC">
						<paragraph id="H6D4BDF36B2974CFDAE70C6C99CA6BE3E"><enum>(1)</enum><text display-inline="yes-display-inline">Advancements in information and
				communications technology have resulted in a globally interconnected network of
				government, commercial, scientific, and education infrastructures, including
				critical infrastructures for electric power, natural gas and petroleum
				production and distribution, telecommunications, transportation, water supply,
				banking and finance, and emergency and government
				services.</text>
						</paragraph><after-quoted-block>;</after-quoted-block></quoted-block>
				</paragraph><paragraph id="HD3F42F3358DD4E98918C7FE64D3F8D0F"><enum>(2)</enum><text>in paragraph (2),
			 by striking <quote>Exponential increases in interconnectivity have facilitated
			 enhanced communications, economic growth,</quote> and inserting <quote>These
			 advancements have significantly contributed to the growth of the United States
			 economy</quote>;</text>
				</paragraph><paragraph id="H771A5274F58D4ED8A425D2817A6E5B85"><enum>(3)</enum><text>by amending
			 paragraph (3) to read as follows:</text>
					<quoted-block display-inline="no-display-inline" id="H12CF6A50F7344941AFC50707D5F00ADD" style="OLC">
						<paragraph id="HB0DCBB4E0159434685E83ED19DB36DA0"><enum>(3)</enum><text display-inline="yes-display-inline">The Cyberspace Policy Review published by
				the President in May, 2009, concluded that our information technology and
				communications infrastructure is vulnerable and has <quote>suffered intrusions
				that have allowed criminals to steal hundreds of millions of dollars and
				nation-states and other entities to steal intellectual property and sensitive
				military information</quote>.</text>
						</paragraph><after-quoted-block>;
				and</after-quoted-block></quoted-block>
				</paragraph><paragraph id="H949D6E6AE86B42E0884751D7E846A9FD"><enum>(4)</enum><text>by amending
			 paragraph (6) to read as follows:</text>
					<quoted-block display-inline="no-display-inline" id="HB43272359D5D4902AA47C8AF7AFB30B3" style="OLC">
						<paragraph id="HFACECC0A124240529106386EC1EE6EA7"><enum>(6)</enum><text display-inline="yes-display-inline">While African-Americans, Hispanics, and
				Native Americans constitute 33 percent of the college-age population, members
				of these minorities comprise less than 20 percent of bachelor degree recipients
				in the field of computer
				sciences.</text>
						</paragraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph></section><section id="H23B2268E876F4FD7A0E5DE6A6A79E9F2"><enum>103.</enum><header>Cybersecurity
			 strategic research and development plan</header>
				<subsection id="H0B7124F02FE540DAAF16FF328BB9A099"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Not later than 12
			 months after the date of enactment of this Act, the agencies identified in
			 subsection 101(a)(3)(B)(i) through (x) of the High-Performance Computing Act of
			 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5511">15 U.S.C.
			 5511(a)(3)(B)(i)</external-xref> through (x)) or designated under section
			 101(a)(3)(B)(xi) of such Act, working through the National Science and
			 Technology Council and with the assistance of the National Coordination Office,
			 shall transmit to Congress a strategic plan based on an assessment of
			 cybersecurity risk to guide the overall direction of Federal cybersecurity and
			 information assurance research and development for information technology and
			 networking systems. Once every 3 years after the initial strategic plan is
			 transmitted to Congress under this section, such agencies shall prepare and
			 transmit to Congress an update of such plan.</text>
				</subsection><subsection id="H2F8D4E72157D4B7096A851999A02ADC7"><enum>(b)</enum><header>Contents of
			 plan</header><text>The strategic plan required under subsection (a)
			 shall—</text>
					<paragraph id="H39209BCCA7444B64AFD7C77D48436ABD"><enum>(1)</enum><text>specify and
			 prioritize near-term, mid-term and long-term research objectives, including
			 objectives associated with the research areas identified in section 4(a)(1) of
			 the Cyber Security Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C. 7403(a)(1)</external-xref>) and how the
			 near-term objectives complement research and development areas in which the
			 private sector is actively engaged;</text>
					</paragraph><paragraph id="HE78B045F2D42461BBB6AFF9662580CAC"><enum>(2)</enum><text display-inline="yes-display-inline">describe how the Program will focus on
			 innovative, transformational technologies with the potential to enhance the
			 security, reliability, resilience, and trustworthiness of the digital
			 infrastructure, and to protect consumer privacy;</text>
					</paragraph><paragraph id="H50B52F7B31C546B4835CB5E845327D03"><enum>(3)</enum><text>describe how the
			 Program will foster the rapid transfer of research and development results into
			 new cybersecurity technologies and applications for the timely benefit of
			 society and the national interest, including through the dissemination of best
			 practices and other outreach activities;</text>
					</paragraph><paragraph id="H254E81832A74437292F931D5CC82B066"><enum>(4)</enum><text>describe how the
			 Program will establish and maintain a national research infrastructure for
			 creating, testing, and evaluating the next generation of secure networking and
			 information technology systems;</text>
					</paragraph><paragraph id="H0E719AA7F96D4F3EB5F34AE53D07C9D1"><enum>(5)</enum><text display-inline="yes-display-inline">describe how the Program will facilitate
			 access by academic researchers to the infrastructure described in paragraph
			 (4), as well as to relevant data, including event data; and</text>
					</paragraph><paragraph id="H097542995DFF4AB7A7E90AE381DB48D0"><enum>(6)</enum><text display-inline="yes-display-inline">describe how the Program will engage
			 females and individuals identified in section 33 or 34 of the Science and
			 Engineering Equal Opportunities Act (42 U.S.C. 1885a or 1885b) to foster a more
			 diverse workforce in this area.</text>
					</paragraph></subsection><subsection id="H93DB5430921949568B55181B6DFFAC3F"><enum>(c)</enum><header>Development of
			 roadmap</header><text>The agencies described in subsection (a) shall develop
			 and annually update an implementation roadmap for the strategic plan required
			 in this section. Such roadmap shall—</text>
					<paragraph id="H398CA95606AB4D8998DD7D055C39E3F0"><enum>(1)</enum><text>specify the role
			 of each Federal agency in carrying out or sponsoring research and development
			 to meet the research objectives of the strategic plan, including a description
			 of how progress toward the research objectives will be evaluated;</text>
					</paragraph><paragraph id="H377DFDA90C6E494CA8AB75414D014357"><enum>(2)</enum><text>specify the
			 funding allocated to each major research objective of the strategic plan and
			 the source of funding by agency for the current fiscal year; and</text>
					</paragraph><paragraph id="HD040757C04FB497FB5436D20F62A075F"><enum>(3)</enum><text>estimate the
			 funding required for each major research objective of the strategic plan for
			 the following 3 fiscal years.</text>
					</paragraph></subsection><subsection id="H3F8D5989043447A49DEC7EFC99DA5260"><enum>(d)</enum><header>Recommendations</header><text>In
			 developing and updating the strategic plan under subsection (a), the agencies
			 involved shall solicit recommendations and advice from—</text>
					<paragraph id="HCD48166CCC23444DA71E7C8B5C10E9F6"><enum>(1)</enum><text>the advisory
			 committee established under section 101(b)(1) of the High-Performance Computing
			 Act of 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5511">15
			 U.S.C. 5511(b)(1)</external-xref>); and</text>
					</paragraph><paragraph id="HF97FCB9B20A74F5588ADE039D5159BE4"><enum>(2)</enum><text display-inline="yes-display-inline">a wide range of stakeholders, including
			 industry, academia, including representatives of minority serving institutions
			 and community colleges, National Laboratories, and other relevant organizations
			 and institutions.</text>
					</paragraph></subsection><subsection id="H7CE50DF2605F4BFEB2917D8F6B1565F3"><enum>(e)</enum><header>Appending to
			 report</header><text>The implementation roadmap required under subsection (c),
			 and its annual updates, shall be appended to the report required under section
			 101(a)(2)(D) of the High-Performance Computing Act of 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5511">15 U.S.C.
			 5511(a)(2)(D)</external-xref>).</text>
				</subsection></section><section id="HD3EC413975254E5C84D0FA8B10309FA1"><enum>104.</enum><header>Social and
			 behavioral research in cybersecurity</header><text display-inline="no-display-inline">Section 4(a)(1) of the Cyber Security
			 Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C. 7403(a)(1)</external-xref>) is
			 amended—</text>
				<paragraph id="HC87CB12750294140A577F31C790B90F3"><enum>(1)</enum><text>by inserting
			 <quote>and usability</quote> after <quote>to the structure</quote>;</text>
				</paragraph><paragraph id="H396B7194518142D58BB6FDC0D32A561F"><enum>(2)</enum><text>in subparagraph
			 (H), by striking <quote>and</quote> after the semicolon;</text>
				</paragraph><paragraph id="H9BD052C9076F4A23BE4D17D64BF31904"><enum>(3)</enum><text>in subparagraph
			 (I), by striking the period at the end and inserting <quote>; and</quote>;
			 and</text>
				</paragraph><paragraph id="H14C927796CD242ADA9C08A66B021DDFF"><enum>(4)</enum><text>by adding at the
			 end the following new subparagraph:</text>
					<quoted-block id="H9DA71E8E7A484C02A9E7381F0D0BCADA" style="OLC">
						<subparagraph id="HC41B3C4224514D24948CBB2CC1411CD6"><enum>(J)</enum><text>social and
				behavioral factors, including human-computer interactions, usability, and user
				motivations.</text>
						</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</paragraph></section><section id="H7989ECB420C44370AF00CB6A609F504A"><enum>105.</enum><header>National
			 Science Foundation cybersecurity research and development programs</header>
				<subsection id="H052C6353DA7D473D9644C05E213B4D1F"><enum>(a)</enum><header>Computer and
			 network security research areas</header><text display-inline="yes-display-inline">Section 4(a)(1) of the Cyber Security
			 Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C. 7403(a)(1)</external-xref>) is
			 amended—</text>
					<paragraph id="H7057B584FC4D4B79AA93A78A5AD3A959"><enum>(1)</enum><text>in subparagraph
			 (A) by inserting <quote>identity management,</quote> after
			 <quote>cryptography,</quote>; and</text>
					</paragraph><paragraph id="HBF964F433A4F4BEDBE0DB6A23877ABA9"><enum>(2)</enum><text>in subparagraph
			 (I), by inserting <quote>, crimes against children, and organized crime</quote>
			 after <quote>intellectual property</quote>.</text>
					</paragraph></subsection><subsection id="HB7ED1F97EA40497AABA1EC21A15262ED"><enum>(b)</enum><header>Computer and
			 network security research grants</header><text>Section 4(a)(3) of such Act
			 (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C.
			 7403(a)(3)</external-xref>) is amended by striking subparagraphs (A) through
			 (E) and inserting the following new subparagraphs:</text>
					<quoted-block id="H4778115EF64F450FA33DFE96CD400E8E" style="OLC">
						<subparagraph id="HB4B060E0CB9F47F791501EBE17E56EAB"><enum>(A)</enum><text>$90,000,000 for
				fiscal year 2013;</text>
						</subparagraph><subparagraph id="H41212D1264C2494FBF0F2E2F2899CE21"><enum>(B)</enum><text>$90,000,000 for
				fiscal year 2014; and</text>
						</subparagraph><subparagraph id="H7FF9EAF7543B4DD6A2780AFC36229C30"><enum>(C)</enum><text>$90,000,000 for
				fiscal year
				2015.</text>
						</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HCA65D3541D2C49399B39F390E6B44DD5"><enum>(c)</enum><header>Computer and
			 network security research centers</header><text>Section 4(b) of such Act
			 (<external-xref legal-doc="usc" parsable-cite="usc/15/7403">15 U.S.C.
			 7403(b)</external-xref>) is amended—</text>
					<paragraph id="H1EA79BBDDF7D46E9899D7413C5720890"><enum>(1)</enum><text>in paragraph
			 (4)—</text>
						<subparagraph id="H75D5006AEA334BFC90358F67148CFAD4"><enum>(A)</enum><text>in subparagraph
			 (C), by striking <quote>and</quote> after the semicolon;</text>
						</subparagraph><subparagraph id="H0376DF73D7F241EFAE61EAFCB5511A66"><enum>(B)</enum><text display-inline="yes-display-inline">in subparagraph (D), by striking the period
			 and inserting <quote>; and</quote>; and</text>
						</subparagraph><subparagraph id="H1C718816D2404067925130F37AAC4848"><enum>(C)</enum><text>by adding at the
			 end the following new subparagraph:</text>
							<quoted-block display-inline="no-display-inline" id="HBEF063353FAC422E8771509268A519FD" style="OLC">
								<subparagraph id="H75D1D4DFCBF6422CB6B47B4C76936C84"><enum>(E)</enum><text display-inline="yes-display-inline">how the center will partner with government
				laboratories, for-profit entities, other institutions of higher education, or
				nonprofit research institutions.</text>
								</subparagraph><after-quoted-block>;
				and</after-quoted-block></quoted-block>
						</subparagraph></paragraph><paragraph id="H0167845ED11B4016953DD827B5124020"><enum>(2)</enum><text display-inline="yes-display-inline">in paragraph (7) by striking subparagraphs
			 (A) through (E) and inserting the following new subparagraphs:</text>
						<quoted-block display-inline="no-display-inline" id="H76E8FDBD36924A4282949A5CFC89054F" style="OLC">
							<subparagraph id="HABB64482AD4E4B699D34229179FEA7C5"><enum>(A)</enum><text display-inline="yes-display-inline">$4,500,000 for fiscal year 2013;</text>
							</subparagraph><subparagraph id="HE1A6688156F446F580837E7DDFB78A95"><enum>(B)</enum><text>$4,500,000 for
				fiscal year 2014; and</text>
							</subparagraph><subparagraph id="HA3F4F33B893D47619E396ABEDB3A189C"><enum>(C)</enum><text>$4,500,000 for
				fiscal year
				2015.</text>
							</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
					</paragraph></subsection><subsection id="H58BCA8D336BF44AC8D047B9C3F4D1302"><enum>(d)</enum><header>Computer and
			 network security capacity building grants</header><text display-inline="yes-display-inline">Section 5(a)(6) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7404">15 U.S.C.
			 7404(a)(6)</external-xref>) is amended by striking subparagraphs (A) through
			 (E) and inserting the following new subparagraphs:</text>
					<quoted-block display-inline="no-display-inline" id="H93FDB0B2AB8C44DD911E0E8B07BCBCF1" style="OLC">
						<subparagraph id="H355FE04E6C204F11AB59B5A41A338B4C"><enum>(A)</enum><text display-inline="yes-display-inline">$19,000,000 for fiscal year 2013;</text>
						</subparagraph><subparagraph id="H9FCDB5F4446B42C3B03D7369E0F9E155"><enum>(B)</enum><text>$19,000,000 for
				fiscal year 2014; and</text>
						</subparagraph><subparagraph id="H00FC42FF415F4C01AEB04B9DC189D949"><enum>(C)</enum><text>$19,000,000 for
				fiscal year
				2015.</text>
						</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HA1085AFEB2D74125A968DFDC2FA06F4D"><enum>(e)</enum><header>Scientific and
			 advanced technology act grants</header><text display-inline="yes-display-inline">Section 5(b)(2) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7404">15 U.S.C.
			 7404(b)(2)</external-xref>) is amended by striking subparagraphs (A) through
			 (E) and inserting the following new subparagraphs:</text>
					<quoted-block display-inline="no-display-inline" id="HD2D6FC67384C4D81B2CBF1FE82A2230D" style="OLC">
						<subparagraph id="H20B951F8F51347E1BFA5C208E8F1F368"><enum>(A)</enum><text display-inline="yes-display-inline">$2,500,000 for fiscal year 2013;</text>
						</subparagraph><subparagraph id="HAB6C84F8B5DB4FCB85877914AA2080C7"><enum>(B)</enum><text>$2,500,000 for
				fiscal year 2014; and</text>
						</subparagraph><subparagraph id="HD63363647D6649D5800F18215BEB0E48"><enum>(C)</enum><text>$2,500,000 for
				fiscal year
				2015.</text>
						</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="HD665085E1F134FF1AEB30D8ACC4572A3"><enum>(f)</enum><header>Graduate
			 traineeships in computer and network security</header><text display-inline="yes-display-inline">Section 5(c)(7) of such Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7404">15 U.S.C.
			 7404(c)(7)</external-xref>) is amended by striking subparagraphs (A) through
			 (E) and inserting the following new subparagraphs:</text>
					<quoted-block display-inline="no-display-inline" id="H7023BA1E00BA4615A1334D83152B0B72" style="OLC">
						<subparagraph id="HAF6F83E321BA4A73A6ADE440438DF3CB"><enum>(A)</enum><text display-inline="yes-display-inline">$24,000,000 for fiscal year 2013;</text>
						</subparagraph><subparagraph id="H5BAB5466ECA942B6AA1BCFCF203E468C"><enum>(B)</enum><text>$24,000,000 for
				fiscal year 2014; and</text>
						</subparagraph><subparagraph id="HD90B381486DD4301A8398A1CF8501522"><enum>(C)</enum><text>$24,000,000 for
				fiscal year
				2015.</text>
						</subparagraph><after-quoted-block>.</after-quoted-block></quoted-block>
				</subsection><subsection id="H5C2F2C60E4EF45A4ACE8F6422CE7147F"><enum>(g)</enum><header>Cyber security
			 faculty development traineeship program</header><text>Section 5(e) of such Act
			 (<external-xref legal-doc="usc" parsable-cite="usc/15/7404">15 U.S.C.
			 7404(e)</external-xref>) is repealed.</text>
				</subsection></section><section id="HF1DC40BA10EE4947B62ACB4C284065F3"><enum>106.</enum><header>Federal cyber
			 scholarship for service program</header>
				<subsection id="H8A11D077F9EF484B94709D568B6D4EC2"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">The Director of the
			 National Science Foundation shall continue a Scholarship for Service program
			 under section 5(a) of the Cyber Security Research and Development Act
			 (<external-xref legal-doc="usc" parsable-cite="usc/15/7404">15 U.S.C.
			 7404(a)</external-xref>) to recruit and train the next generation of Federal
			 cybersecurity professionals and to increase the capacity of the higher
			 education system to produce an information technology workforce with the skills
			 necessary to enhance the security of the Nation’s communications and
			 information infrastructure.</text>
				</subsection><subsection id="HEB6DF9B0CF204A33B1C52774128CAA15"><enum>(b)</enum><header>Characteristics
			 of program</header><text>The program under this section shall—</text>
					<paragraph id="H07A7BD1A592C4D77AD533D3BD2CBCC9C"><enum>(1)</enum><text display-inline="yes-display-inline">provide, through qualified institutions of
			 higher education, scholarships that provide tuition, fees, and a competitive
			 stipend for up to 2 years to students pursing a bachelor’s or master’s degree
			 and up to 3 years to students pursuing a doctoral degree in a cybersecurity
			 field;</text>
					</paragraph><paragraph id="HCB45B3BEB34E4853A6CBAFA7974C86BB"><enum>(2)</enum><text display-inline="yes-display-inline">provide the scholarship recipients with
			 summer internship opportunities or other meaningful temporary appointments in
			 the Federal information technology workforce; and</text>
					</paragraph><paragraph id="H76821CF9EE364E17AAFAC535A74B0013"><enum>(3)</enum><text>increase the
			 capacity of institutions of higher education throughout all regions of the
			 United States to produce highly qualified cybersecurity professionals, through
			 the award of competitive, merit-reviewed grants that support such activities
			 as—</text>
						<subparagraph id="HD889236351C642F3AC0D329738151FC7"><enum>(A)</enum><text>faculty
			 professional development, including technical, hands-on experiences in the
			 private sector or government, workshops, seminars, conferences, and other
			 professional development opportunities that will result in improved
			 instructional capabilities;</text>
						</subparagraph><subparagraph id="HF6DC89E0E9FE46B386F6221C4CDAD1C9"><enum>(B)</enum><text display-inline="yes-display-inline">institutional partnerships, including
			 minority serving institutions and community colleges; and</text>
						</subparagraph><subparagraph id="H55A6D9E376114410BA250FEE7B8B9BEF"><enum>(C)</enum><text>development of
			 cybersecurity-related courses and curricula.</text>
						</subparagraph></paragraph></subsection><subsection id="H39F5CBB195AB4E98AEBAD52E738632D0"><enum>(c)</enum><header>Scholarship
			 requirements</header>
					<paragraph id="H8822D5FC86414B299BB4D94EFB4E73A5"><enum>(1)</enum><header>Eligibility</header><text display-inline="yes-display-inline">Scholarships under this section shall be
			 available only to students who—</text>
						<subparagraph id="H3BD15636D61A433C92A66DF51C680E9C"><enum>(A)</enum><text>are citizens or
			 permanent residents of the United States;</text>
						</subparagraph><subparagraph id="H6DE557FBEA844C3A88BAB760629CA272"><enum>(B)</enum><text>are full-time
			 students in an eligible degree program, as determined by the Director, that is
			 focused on computer security or information assurance at an awardee
			 institution; and</text>
						</subparagraph><subparagraph id="H9BA1C2DC00634DB2BE5F7E9A4184E227"><enum>(C)</enum><text display-inline="yes-display-inline">accept the terms of a scholarship pursuant
			 to this section.</text>
						</subparagraph></paragraph><paragraph id="HECB0C6E9F5AB4787977A193C5DA36D00"><enum>(2)</enum><header>Selection</header><text display-inline="yes-display-inline">Individuals shall be selected to receive
			 scholarships primarily on the basis of academic merit, with consideration given
			 to financial need, to the goal of promoting the participation of individuals
			 identified in section 33 or 34 of the Science and Engineering Equal
			 Opportunities Act (42 U.S.C. 1885a or 1885b), and to veterans. For purposes of
			 this paragraph, the term <quote>veteran</quote> means a person who—</text>
						<subparagraph id="H1358D5CE39E840C0876D1D320379CC48"><enum>(A)</enum><text display-inline="yes-display-inline">served on active duty (other than active
			 duty for training) in the Armed Forces of the United States for a period of
			 more than 180 consecutive days, and who was discharged or released therefrom
			 under conditions other than dishonorable; or</text>
						</subparagraph><subparagraph id="HB172647552F148B49979F51EB1418F23"><enum>(B)</enum><text>served on active
			 duty (other than active duty for training) in the Armed Forces of the United
			 States and was discharged or released from such service for a service-connected
			 disability before serving 180 consecutive days.</text>
						</subparagraph><continuation-text continuation-text-level="paragraph">For purposes
			 of subparagraph (B), the term <quote>service-connected</quote> has the meaning
			 given such term under <external-xref legal-doc="usc" parsable-cite="usc/38/101">section 101</external-xref> of title 38, United
			 States Code.</continuation-text></paragraph><paragraph id="HFB718043060242A29D073116091716E7"><enum>(3)</enum><header>Service
			 obligation</header><text display-inline="yes-display-inline">If an individual
			 receives a scholarship under this section, as a condition of receiving such
			 scholarship, the individual upon completion of their degree must serve as a
			 cybersecurity professional within the Federal workforce for a period of time as
			 provided in paragraph (5). If a scholarship recipient is not offered employment
			 by a Federal agency or a federally funded research and development center, the
			 service requirement can be satisfied at the Director’s discretion by—</text>
						<subparagraph id="H07576EED178F49318F30FF932B6D5D8F"><enum>(A)</enum><text>serving as a
			 cybersecurity professional in a State, local, or tribal government agency;
			 or</text>
						</subparagraph><subparagraph id="H6C772D3894704D829E1BA05D44F8F3CE"><enum>(B)</enum><text>teaching
			 cybersecurity courses at an institution of higher education.</text>
						</subparagraph></paragraph><paragraph id="H51D47B4159A84483BDF7253CC971139A"><enum>(4)</enum><header>Conditions of
			 support</header><text display-inline="yes-display-inline">As a condition of
			 acceptance of a scholarship under this section, a recipient shall agree to
			 provide the awardee institution with annual verifiable documentation of
			 employment and up-to-date contact information.</text>
					</paragraph><paragraph id="HA48EAAC3EC9C4C80A0898BEBF46D89BB"><enum>(5)</enum><header>Length of
			 service</header><text display-inline="yes-display-inline">The length of service
			 required in exchange for a scholarship under this subsection shall be 1 year
			 more than the number of years for which the scholarship was received.</text>
					</paragraph></subsection><subsection id="H29FC6A21BA4D4F7CA567F205E512BEE4"><enum>(d)</enum><header>Failure To
			 complete service obligation</header>
					<paragraph display-inline="no-display-inline" id="H05819D3C1D0A4D8089B796BA97477CEC"><enum>(1)</enum><header>General
			 rule</header><text>If an individual who has received a scholarship under this
			 section—</text>
						<subparagraph id="H893D3C3F33A34432A9A045239D03A046"><enum>(A)</enum><text>fails to maintain
			 an acceptable level of academic standing in the educational institution in
			 which the individual is enrolled, as determined by the Director;</text>
						</subparagraph><subparagraph id="H0C4B5FA22C8146B284E34D178705AC69"><enum>(B)</enum><text>is dismissed from
			 such educational institution for disciplinary reasons;</text>
						</subparagraph><subparagraph id="HA628E20947884EABB9BDADCA2760AD6F"><enum>(C)</enum><text>withdraws from the
			 program for which the award was made before the completion of such
			 program;</text>
						</subparagraph><subparagraph id="H67E77771357E4B248DF1B4DBF76538FC"><enum>(D)</enum><text>declares that the
			 individual does not intend to fulfill the service obligation under this
			 section; or</text>
						</subparagraph><subparagraph id="H013E0BE2A1CA4227A0CC3EC152B409B2"><enum>(E)</enum><text>fails to fulfill
			 the service obligation of the individual under this section,</text>
						</subparagraph><continuation-text continuation-text-level="paragraph">such
			 individual shall be liable to the United States as provided in paragraph
			 (3).</continuation-text></paragraph><paragraph id="H344FCFEDFA194D2DA1A2832E5435A8A4"><enum>(2)</enum><header>Monitoring
			 compliance</header><text display-inline="yes-display-inline">As a condition of
			 participating in the program, a qualified institution of higher education
			 receiving a grant under this section shall—</text>
						<subparagraph id="HC602629336604E3EBF065E3AA7B59C63"><enum>(A)</enum><text>enter into an
			 agreement with the Director of the National Science Foundation to monitor the
			 compliance of scholarship recipients with respect to their service obligation;
			 and</text>
						</subparagraph><subparagraph id="H8BF101D1CA7F4887A73365833D85444A"><enum>(B)</enum><text>provide to the
			 Director, on an annual basis, post-award employment information required under
			 subsection (c)(4) for scholarship recipients through the completion of their
			 service obligation.</text>
						</subparagraph></paragraph><paragraph id="HD07F4B8EDAA046EE9002B3124DA73368"><enum>(3)</enum><header>Amount of
			 repayment</header>
						<subparagraph id="HB038023BB73946E2992F251DF833E7C8"><enum>(A)</enum><header>Less than one
			 year of service</header><text>If a circumstance described in paragraph (1)
			 occurs before the completion of 1 year of a service obligation under this
			 section, the total amount of awards received by the individual under this
			 section shall be repaid or such amount shall be treated as a loan to be repaid
			 in accordance with subparagraph (C).</text>
						</subparagraph><subparagraph id="HCC0FA8332B8E4CFBB5E45CA6EED66521"><enum>(B)</enum><header>More than one
			 year of service</header><text>If a circumstance described in subparagraph (D)
			 or (E) of paragraph (1) occurs after the completion of 1 year of a service
			 obligation under this section, the total amount of scholarship awards received
			 by the individual under this section, reduced by the ratio of the number of
			 years of service completed divided by the number of years of service required,
			 shall be repaid or such amount shall be treated as a loan to be repaid in
			 accordance with subparagraph (C).</text>
						</subparagraph><subparagraph id="HA497581DB86A4FCC91647001E89086EA"><enum>(C)</enum><header>Repayments</header><text display-inline="yes-display-inline">A loan described in subparagraph (A) or (B)
			 shall be treated as a Federal Direct Unsubsidized Stafford Loan under part D of
			 title IV of the Higher Education Act of 1965 (20 U.S.C. 1087a and following),
			 and shall be subject to repayment, together with interest thereon accruing from
			 the date of the scholarship award, in accordance with terms and conditions
			 specified by the Director (in consultation with the Secretary of Education) in
			 regulations promulgated to carry out this paragraph.</text>
						</subparagraph></paragraph><paragraph id="H645565419AC64F1596F0B37E17E9CF30"><enum>(4)</enum><header>Collection of
			 repayment</header>
						<subparagraph id="H0B60BD9F38EE443DA6D60E61F56C7A7B"><enum>(A)</enum><header>In
			 general</header><text>In the event that a scholarship recipient is required to
			 repay the scholarship under this subsection, the institution providing the
			 scholarship shall—</text>
							<clause id="HCC5DEE81659340D4B2947952942A6BCB"><enum>(i)</enum><text>be
			 responsible for determining the repayment amounts and for notifying the
			 recipient and the Director of the amount owed; and</text>
							</clause><clause id="HC7505EC295064F24BA334A7C9C61A81B"><enum>(ii)</enum><text>collect such
			 repayment amount within a period of time as determined under the agreement
			 described in paragraph (2), or the repayment amount shall be treated as a loan
			 in accordance with paragraph (3)(C).</text>
							</clause></subparagraph><subparagraph id="H6D3744673BA646E69E7860AB5C48CAD0"><enum>(B)</enum><header>Returned to
			 treasury</header><text>Except as provided in subparagraph (C) of this
			 paragraph, any such repayment shall be returned to the Treasury of the United
			 States.</text>
						</subparagraph><subparagraph id="H2BBC13E0E3D64F4DBE3F81F8DA332D4D"><enum>(C)</enum><header>Retain
			 percentage</header><text>An institution of higher education may retain a
			 percentage of any repayment the institution collects under this paragraph to
			 defray administrative costs associated with the collection. The Director shall
			 establish a single, fixed percentage that will apply to all eligible
			 entities.</text>
						</subparagraph></paragraph><paragraph id="H9DD59B9721A64CFCB02BAC074AB6891E"><enum>(5)</enum><header>Exceptions</header><text>The
			 Director may provide for the partial or total waiver or suspension of any
			 service or payment obligation by an individual under this section whenever
			 compliance by the individual with the obligation is impossible or would involve
			 extreme hardship to the individual, or if enforcement of such obligation with
			 respect to the individual would be unconscionable.</text>
					</paragraph></subsection><subsection id="HE5E657C3670844EFA85988B633AA24FA"><enum>(e)</enum><header>Hiring
			 authority</header><text>For purposes of any law or regulation governing the
			 appointment of individuals in the Federal civil service, upon successful
			 completion of their degree, students receiving a scholarship under this section
			 shall be hired under the authority provided for in
			 <external-xref legal-doc="regulation" parsable-cite="cfr/5/213.3102">section
			 213.3102(r)</external-xref> of title 5, Code of Federal Regulations, and be
			 exempted from competitive service. Upon fulfillment of the service term, such
			 individuals shall be converted to a competitive service position without
			 competition if the individual meets the requirements for that position.</text>
				</subsection></section><section id="H26B84AD4FCD747DF80E8B4DFB0B37E81"><enum>107.</enum><header>Cybersecurity
			 workforce assessment</header><text display-inline="no-display-inline">Not later
			 than 180 days after the date of enactment of this Act the President shall
			 transmit to the Congress a report addressing the cybersecurity workforce needs
			 of the Federal Government. The report shall include—</text>
				<paragraph id="H7E1F1373CD124E9DA7F8E767546EA03A"><enum>(1)</enum><text display-inline="yes-display-inline">an examination of the current state of and
			 the projected needs of the Federal cybersecurity workforce, including a
			 comparison of the different agencies and departments, and an analysis of the
			 capacity of such agencies and departments to meet those needs;</text>
				</paragraph><paragraph id="H976A4F6389BF49899924C49B29674F2D"><enum>(2)</enum><text display-inline="yes-display-inline">an analysis of the sources and availability
			 of cybersecurity talent, a comparison of the skills and expertise sought by the
			 Federal Government and the private sector, an examination of the current and
			 future capacity of United States institutions of higher education, including
			 community colleges, to provide current and future cybersecurity professionals,
			 through education and training activities, with those skills sought by the
			 Federal Government, State and local entities, and the private sector, and a
			 description of how successful programs are engaging the talents of females and
			 individuals identified in section 33 or 34 of the Science and Engineering Equal
			 Opportunities Act (42 U.S.C. 1885a or 1885b);</text>
				</paragraph><paragraph id="H7B5A752328434EBCA7988AF315F8F0A4"><enum>(3)</enum><text>an examination of
			 the effectiveness of the National Centers of Academic Excellence in Information
			 Assurance Education, the Centers of Academic Excellence in Research, and the
			 Federal Cyber Scholarship for Service programs in promoting higher education
			 and research in cybersecurity and information assurance and in producing a
			 growing number of professionals with the necessary cybersecurity and
			 information assurance expertise, including individuals from States or regions
			 in which the unemployment rate exceeds the national average;</text>
				</paragraph><paragraph id="H47009CFF53DF40ECB4EEB8A9DDBFD034"><enum>(4)</enum><text display-inline="yes-display-inline">an analysis of any barriers to the Federal
			 Government recruiting and hiring cybersecurity talent, including barriers
			 relating to compensation, the hiring process, job classification, and hiring
			 flexibilities; and</text>
				</paragraph><paragraph id="H8CE798B181A24C53805DD7042D930B60"><enum>(5)</enum><text display-inline="yes-display-inline">recommendations for Federal policies to
			 ensure an adequate, well-trained Federal cybersecurity workforce.</text>
				</paragraph></section><section id="HAE0C26D285674549BD82B5C2AD37FD0C"><enum>108.</enum><header>Cybersecurity
			 university-industry task force</header>
				<subsection id="H3CF6B99D72FE471B8F9EA1AB06D25AF2"><enum>(a)</enum><header>Establishment of
			 university-Industry task force</header><text>Not later than 180 days after the
			 date of enactment of this Act, the Director of the Office of Science and
			 Technology Policy shall convene a task force to explore mechanisms for carrying
			 out collaborative research, development, education, and training activities for
			 cybersecurity through a consortium or other appropriate entity with
			 participants from institutions of higher education and industry.</text>
				</subsection><subsection id="H028FDC7A014D4642A9973B0505A7A97C"><enum>(b)</enum><header>Functions</header><text>The
			 task force shall—</text>
					<paragraph id="H0DA6DDE51E1141B88F9AE7CFB90B825A"><enum>(1)</enum><text>develop options
			 for a collaborative model and an organizational structure for such entity under
			 which the joint research and development activities could be planned, managed,
			 and conducted effectively, including mechanisms for the allocation of resources
			 among the participants in such entity for support of such activities;</text>
					</paragraph><paragraph id="HC5459E55A02A47638305329525133D42"><enum>(2)</enum><text display-inline="yes-display-inline">propose a process for developing a research
			 and development agenda for such entity, including guidelines to ensure an
			 appropriate scope of work focused on nationally significant challenges and
			 requiring collaboration;</text>
					</paragraph><paragraph id="HC46CE76B11B6418EAE7EBCD11A7CB386"><enum>(3)</enum><text>define the roles
			 and responsibilities for the participants from institutions of higher education
			 and industry in such entity;</text>
					</paragraph><paragraph id="HD8F54DD107744D37B27AF7BFEC1BE249"><enum>(4)</enum><text display-inline="yes-display-inline">propose guidelines for assigning
			 intellectual property rights and for the transfer of research and development
			 results to the private sector; and</text>
					</paragraph><paragraph id="H253182296DB5463DBEBF5EFD41ACC66C"><enum>(5)</enum><text>make
			 recommendations for how such entity could be funded from Federal, State, and
			 nongovernmental sources.</text>
					</paragraph></subsection><subsection id="H7F789CC914944EF296C0F56257B94C28"><enum>(c)</enum><header>Composition</header><text display-inline="yes-display-inline">In establishing the task force under
			 subsection (a), the Director of the Office of Science and Technology Policy
			 shall appoint an equal number of individuals from institutions of higher
			 education, including minority-serving institutions and community colleges, and
			 from industry with knowledge and expertise in cybersecurity.</text>
				</subsection><subsection id="H704209E347D44C3D944A2A9EE314DB3C"><enum>(d)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 12 months after the date of
			 enactment of this Act, the Director of the Office of Science and Technology
			 Policy shall transmit to the Congress a report describing the findings and
			 recommendations of the task force.</text>
				</subsection><subsection id="H66D6C707A6CA47979F3486747CBA9733"><enum>(e)</enum><header>Termination</header><text display-inline="yes-display-inline">The task force shall terminate upon
			 transmittal of the report required under subsection (d).</text>
				</subsection><subsection id="H593AEB0098014BFA88C539DFEB8B9862"><enum>(f)</enum><header>Compensation and
			 Expenses</header><text>Members of the task force shall serve without
			 compensation.</text>
				</subsection></section><section id="H216096C4DF9A4617B58A672E382A1EE4"><enum>109.</enum><header>Cybersecurity
			 automation and checklists for Government systems</header><text display-inline="no-display-inline">Section 8(c) of the Cyber Security Research
			 and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7406">15 U.S.C. 7406(c)</external-xref>) is amended to
			 read as follows:</text>
				<quoted-block display-inline="no-display-inline" id="H2CABC1A6E165428F9ADBBB2FE3276659" style="OLC">
					<subsection id="H44447D7859B64006BFC03163BBD69FE9"><enum>(c)</enum><header>Security
				automation and checklists for government systems</header>
						<paragraph id="HD0C88F984A444A55BB26B585ACA3DC6B"><enum>(1)</enum><header>In
				general</header><text>The Director of the National Institute of Standards and
				Technology shall develop, and revise as necessary, security automation
				standards, associated reference materials (including protocols), and checklists
				providing settings and option selections that minimize the security risks
				associated with each information technology hardware or software system and
				security tool that is, or is likely to become, widely used within the Federal
				Government in order to enable standardized and interoperable technologies,
				architectures, and frameworks for continuous monitoring of information security
				within the Federal Government.</text>
						</paragraph><paragraph id="H86E51A7BDEBB41DC9B6B659225F8AF77"><enum>(2)</enum><header>Priorities for
				development</header><text display-inline="yes-display-inline">The Director of
				the National Institute of Standards and Technology shall establish priorities
				for the development of standards, reference materials, and checklists under
				this subsection on the basis of—</text>
							<subparagraph id="HDB6526B6174F40C49FF0E8AD42B66EF1"><enum>(A)</enum><text>the security risks
				associated with the use of the system;</text>
							</subparagraph><subparagraph id="H8BB0562742D24F03BCBBF4C427BEF709"><enum>(B)</enum><text>the number of
				agencies that use a particular system or security tool;</text>
							</subparagraph><subparagraph id="HD0A0399A33A44511AF011CF444A26C0A"><enum>(C)</enum><text>the usefulness of
				the standards, reference materials, or checklists to Federal agencies that are
				users or potential users of the system;</text>
							</subparagraph><subparagraph id="H4F777BF666D2499395483876BDE1C029"><enum>(D)</enum><text>the effectiveness
				of the associated standard, reference material, or checklist in creating or
				enabling continuous monitoring of information security; or</text>
							</subparagraph><subparagraph id="H078ECCB0C3304F56BB6F9B57E663B935"><enum>(E)</enum><text>such other factors
				as the Director of the National Institute of Standards and Technology
				determines to be appropriate.</text>
							</subparagraph></paragraph><paragraph id="H5E6E371583A449DAB5BE322C4A18DF94"><enum>(3)</enum><header>Excluded
				systems</header><text display-inline="yes-display-inline">The Director of the
				National Institute of Standards and Technology may exclude from the application
				of paragraph (1) any information technology hardware or software system or
				security tool for which such Director determines that the development of a
				standard, reference material, or checklist is inappropriate because of the
				infrequency of use of the system, the obsolescence of the system, or the
				inutility or impracticability of developing a standard, reference material, or
				checklist for the system.</text>
						</paragraph><paragraph id="H78F9F715F9FA451FA5303C60C300D0C5"><enum>(4)</enum><header>Dissemination of
				standards and related materials</header><text display-inline="yes-display-inline">The Director of the National Institute of
				Standards and Technology shall ensure that Federal agencies are informed of the
				availability of any standard, reference material, checklist, or other item
				developed under this subsection.</text>
						</paragraph><paragraph id="H86E0916C8D8841E18E122A8AB201DB06"><enum>(5)</enum><header>Agency use
				requirements</header><text>The development of standards, reference materials,
				and checklists under paragraph (1) for an information technology hardware or
				software system or tool does not—</text>
							<subparagraph id="H6C8DB4F87A02462097AB10FE2E39C812"><enum>(A)</enum><text>require any
				Federal agency to select the specific settings or options recommended by the
				standard, reference material, or checklist for the system;</text>
							</subparagraph><subparagraph id="H2943A12269B74DF6BE4C85EC7C7E221F"><enum>(B)</enum><text>establish
				conditions or prerequisites for Federal agency procurement or deployment of any
				such system;</text>
							</subparagraph><subparagraph id="HFAA5759D6DA6490787D819EAA275AAC1"><enum>(C)</enum><text display-inline="yes-display-inline">imply an endorsement of any such system by
				the Director of the National Institute of Standards and Technology; or</text>
							</subparagraph><subparagraph id="H00E4D6E53DB946C2A4E9C9661226492E"><enum>(D)</enum><text>preclude any
				Federal agency from procuring or deploying other information technology
				hardware or software systems for which no such standard, reference material, or
				checklist has been developed or identified under paragraph
				(1).</text>
							</subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
			</section><section id="HCF7BF4A089434AC8A82798A08F68DAED"><enum>110.</enum><header>National
			 Institute of Standards and Technology cybersecurity research and
			 development</header><text display-inline="no-display-inline">Section 20 of the
			 National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3</external-xref>)
			 is amended by redesignating subsection (e) as subsection (f), and by inserting
			 after subsection (d) the following:</text>
				<quoted-block id="H212F8844F0D94E039B4FEC4C65F28B9F">
					<subsection id="H4F9E4995268B4B94B1E5D019C8431517"><enum>(e)</enum><header>Intramural
				security research</header><text>As part of the research activities conducted in
				accordance with subsection (d)(3), the Institute shall—</text>
						<paragraph id="H50AF81B5E81A4D138637554EC5D1425E"><enum>(1)</enum><text>conduct a research
				program to develop a unifying and standardized identity, privilege, and access
				control management framework for the execution of a wide variety of resource
				protection policies and that is amenable to implementation within a wide
				variety of existing and emerging computing environments;</text>
						</paragraph><paragraph id="H4386F7FA9BB74AAFB034E4A8CF30AA4E"><enum>(2)</enum><text>carry out research
				associated with improving the security of information systems and
				networks;</text>
						</paragraph><paragraph id="H3495BEC88CF2484D97A3F0B705157026"><enum>(3)</enum><text>carry out research
				associated with improving the testing, measurement, usability, and assurance of
				information systems and networks; and</text>
						</paragraph><paragraph id="HEEC95CEB8E344D2BA972A3EAE0283E2D"><enum>(4)</enum><text>carry out research
				associated with improving security of industrial control
				systems.</text>
						</paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
			</section></title><title id="H1C624E460B504D53B0F46E4A35ADE4D9"><enum>II</enum><header>Advancement of
			 Cybersecurity Technical Standards</header>
			<section id="HBBAC4E488F904B9BB854B3AE3347F215"><enum>201.</enum><header>Definitions</header><text display-inline="no-display-inline">In this title:</text>
				<paragraph id="H6F515DA49ADC4269BE7C5A36671EE612"><enum>(1)</enum><header>Director</header><text>The
			 term <quote>Director</quote> means the Director of the National Institute of
			 Standards and Technology.</text>
				</paragraph><paragraph id="H4205E0D02E234017B45D5A48B17CEDDB"><enum>(2)</enum><header>Institute</header><text display-inline="yes-display-inline">The term <quote>Institute</quote> means the
			 National Institute of Standards and Technology.</text>
				</paragraph></section><section id="H27CE158BC1E644058FEF1C219F7C1518"><enum>202.</enum><header>International
			 cybersecurity technical standards</header>
				<subsection id="H709AB13B079D47459E917F09FBD030E1"><enum>(a)</enum><header>In
			 general</header><text>The Director, in coordination with appropriate Federal
			 authorities, shall—</text>
					<paragraph id="H57AD63BE1F5E4519BFE3637DA38DF8A9"><enum>(1)</enum><text>as appropriate,
			 ensure coordination of Federal agencies engaged in the development of
			 international technical standards related to information system security;
			 and</text>
					</paragraph><paragraph id="H92185298E5384D4D91928392C9BCF712"><enum>(2)</enum><text>not later than 1
			 year after the date of enactment of this Act, develop and transmit to the
			 Congress a plan for ensuring such Federal agency coordination.</text>
					</paragraph></subsection><subsection id="HC146058D6978422B90FEEB42EC1317B3"><enum>(b)</enum><header>Consultation
			 with the private sector</header><text>In carrying out the activities specified
			 in subsection (a)(1), the Director shall ensure consultation with appropriate
			 private sector stakeholders.</text>
				</subsection></section><section display-inline="no-display-inline" id="H478A1E5821D14CCB9EAAE3F17CBEF445" section-type="subsequent-section"><enum>203.</enum><header>Cloud computing
			 strategy</header>
				<subsection id="H5D81C5485DD5441992BC1935A57B437A"><enum>(a)</enum><header>In
			 general</header><text>The Director, in collaboration with the Federal CIO
			 Council, and in consultation with other relevant Federal agencies and
			 stakeholders from the private sector, shall continue to develop and encourage
			 the implementation of a comprehensive strategy for the use and adoption of
			 cloud computing services by the Federal Government.</text>
				</subsection><subsection id="H917AF380D01A4D2EA129ABED2B53721D"><enum>(b)</enum><header>Activities</header><text>In
			 carrying out the strategy developed under subsection (a), the Director shall
			 give consideration to activities that—</text>
					<paragraph id="H319FCF9C519A4643B7E0CB9CF63FAB07"><enum>(1)</enum><text display-inline="yes-display-inline">accelerate the development, in
			 collaboration with the private sector, of standards that address
			 interoperability and portability of cloud computing services;</text>
					</paragraph><paragraph id="HA304E80E209444009D0929901A2CDCB0"><enum>(2)</enum><text>advance the
			 development of conformance testing performed by the private sector in support
			 of cloud computing standardization; and</text>
					</paragraph><paragraph id="HC460DD2FCBB84D26A9656487BE02FAA9"><enum>(3)</enum><text display-inline="yes-display-inline">support, in consultation with the private
			 sector, the development of appropriate security frameworks and reference
			 materials, and the identification of best practices, for use by Federal
			 agencies to address security and privacy requirements to enable the use and
			 adoption of cloud computing services, including activities—</text>
						<subparagraph id="H0D26371DB6A4477C8EBA00C4A355BB22"><enum>(A)</enum><text>to ensure the
			 physical security of cloud computing data centers and the data stored in such
			 centers;</text>
						</subparagraph><subparagraph id="HC9752574628C4B46BF14CF03EF92BB23"><enum>(B)</enum><text>to ensure secure
			 access to the data stored in cloud computing data centers;</text>
						</subparagraph><subparagraph id="HA49BA5C6E49743DDB7B71EEC45DFC796"><enum>(C)</enum><text>to develop
			 security standards as required under section 20 of the National Institute of
			 Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g-3</external-xref>); and</text>
						</subparagraph><subparagraph id="H95111692721E454EB917B5BB3908043F"><enum>(D)</enum><text>to support the
			 development of the automation of continuous monitoring systems.</text>
						</subparagraph></paragraph></subsection></section><section id="H0FE06396B4194AE88E367D89D73B274F"><enum>204.</enum><header>Promoting
			 cybersecurity awareness and education</header>
				<subsection id="HE0BD6492F36E44BF84CAA429599E122F"><enum>(a)</enum><header>Program</header><text display-inline="yes-display-inline">The Director, in collaboration with
			 relevant Federal agencies, industry, educational institutions, National
			 Laboratories, the National Coordination Office of the Networking and
			 Information Technology Research and Development program, and other
			 organizations, shall continue to coordinate a cybersecurity awareness and
			 education program to increase knowledge, skills, and awareness of cybersecurity
			 risks, consequences, and best practices through—</text>
					<paragraph id="H68588F28E87441C09E0B9ED70F7674B2"><enum>(1)</enum><text>the widespread
			 dissemination of cybersecurity technical standards and best practices
			 identified by the Institute;</text>
					</paragraph><paragraph id="H09B907772FF34B259A60C565DA6294E2"><enum>(2)</enum><text>efforts to make
			 cybersecurity best practices usable by individuals, small to medium-sized
			 businesses, State, local, and tribal governments, and educational institutions;
			 and</text>
					</paragraph><paragraph id="H3FDB137BF8EF4B87B979DC9DD73D99FB"><enum>(3)</enum><text display-inline="yes-display-inline">efforts to attract, recruit, and retain
			 qualified professionals to the Federal cybersecurity workforce.</text>
					</paragraph></subsection><subsection id="H80BDF2A460074CFBB10C28F468E746B8"><enum>(b)</enum><header>Strategic
			 Plan</header><text>The Director shall, in cooperation with relevant Federal
			 agencies and other stakeholders, develop and implement a strategic plan to
			 guide Federal programs and activities in support of a comprehensive
			 cybersecurity awareness and education program as described under subsection
			 (a).</text>
				</subsection><subsection id="HF41A6108B10642FFB1E9C0ECBCF64441"><enum>(c)</enum><header>Report to
			 Congress</header><text>Not later than 1 year after the date of enactment of
			 this Act and every 5 years thereafter, the Director shall transmit the
			 strategic plan required under subsection (b) to the Committee on Science,
			 Space, and Technology of the House of Representatives and the Committee on
			 Commerce, Science, and Transportation of the Senate.</text>
				</subsection></section><section id="H7D426D646F794FCF8D1E60B1F270CA3E"><enum>205.</enum><header>Identity
			 management research and development</header><text display-inline="no-display-inline">The Director shall continue a program to
			 support the development of technical standards, metrology, testbeds, and
			 conformance criteria, taking into account appropriate user concerns, to—</text>
				<paragraph id="H8093312FB69A4635910A588DEA5201BA"><enum>(1)</enum><text>improve
			 interoperability among identity management technologies;</text>
				</paragraph><paragraph id="H20C6ED60147C4B3291469D5EDAFA07A6"><enum>(2)</enum><text>strengthen
			 authentication methods of identity management systems;</text>
				</paragraph><paragraph id="H717FFF0CF3524813B98F338B1147FDAC"><enum>(3)</enum><text>improve privacy
			 protection in identity management systems, including health information
			 technology systems, through authentication and security protocols; and</text>
				</paragraph><paragraph id="H717A666D04134FAB9AC541FBBA9C0F0D"><enum>(4)</enum><text>improve the
			 usability of identity management systems.</text>
				</paragraph></section><section id="HF1193ADBB28F4C19A9FF881985DEC8C1"><enum>206.</enum><header>Authorizations</header><text display-inline="no-display-inline">No additional funds are authorized to carry
			 out this title and the amendments made by this title or to carry out the
			 amendments made by sections 109 and 110 of this Act. This title and the
			 amendments made by this title and the amendments made by sections 109 and 110
			 of this Act shall be carried out using amounts otherwise authorized or
			 appropriated.</text>
			</section></title></legis-body>
	<attestation>
		<attestation-group>
			<attestation-date chamber="House" date="20120427">Passed the House of
			 Representatives April 27, 2012.</attestation-date>
			<attestor display="yes">Karen L. Haas,</attestor>
			<role>Clerk</role>
		</attestation-group>
	</attestation>
</bill>
