<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" bill-type="olc" dms-id="H9BBEFA4806B64F6C92ED100BF9BBA902" public-private="public">
	<form>
		<distribution-code display="yes">I</distribution-code>
		<congress>112th CONGRESS</congress>
		<session>1st Session</session>
		<legis-num>H. R. 3523</legis-num>
		<current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber>
		<action>
			<action-date date="20111130">November 30, 2011</action-date>
			<action-desc><sponsor name-id="R000572">Mr. Rogers of
			 Michigan</sponsor> (for himself, <cosponsor name-id="R000576">Mr.
			 Ruppersberger</cosponsor>, <cosponsor name-id="K000210">Mr. King of New
			 York</cosponsor>, <cosponsor name-id="U000031">Mr. Upton</cosponsor>,
			 <cosponsor name-id="M001134">Mrs. Myrick</cosponsor>,
			 <cosponsor name-id="L000559">Mr. Langevin</cosponsor>,
			 <cosponsor name-id="C001062">Mr. Conaway</cosponsor>,
			 <cosponsor name-id="M001144">Mr. Miller of Florida</cosponsor>,
			 <cosponsor name-id="B001254">Mr. Boren</cosponsor>,
			 <cosponsor name-id="L000554">Mr. LoBiondo</cosponsor>,
			 <cosponsor name-id="C001058">Mr. Chandler</cosponsor>,
			 <cosponsor name-id="N000181">Mr. Nunes</cosponsor>,
			 <cosponsor name-id="G000535">Mr. Gutierrez</cosponsor>,
			 <cosponsor name-id="W000796">Mr. Westmoreland</cosponsor>,
			 <cosponsor name-id="B001256">Mrs. Bachmann</cosponsor>,
			 <cosponsor name-id="R000583">Mr. Rooney</cosponsor>,
			 <cosponsor name-id="H001055">Mr. Heck</cosponsor>, <cosponsor name-id="D000327">Mr. Dicks</cosponsor>, <cosponsor name-id="M001157">Mr.
			 McCaul</cosponsor>, <cosponsor name-id="W000791">Mr. Walden</cosponsor>,
			 <cosponsor name-id="C000059">Mr. Calvert</cosponsor>,
			 <cosponsor name-id="S000364">Mr. Shimkus</cosponsor>,
			 <cosponsor name-id="T000459">Mr. Terry</cosponsor>,
			 <cosponsor name-id="B001248">Mr. Burgess</cosponsor>,
			 <cosponsor name-id="G000550">Mr. Gingrey of Georgia</cosponsor>,
			 <cosponsor name-id="T000460">Mr. Thompson of California</cosponsor>,
			 <cosponsor name-id="K000378">Mr. Kinzinger of Illinois</cosponsor>,
			 <cosponsor name-id="A000369">Mr. Amodei</cosponsor>, and
			 <cosponsor name-id="P000602">Mr. Pompeo</cosponsor>) introduced the following
			 bill; which was referred to the <committee-name committee-id="">Select
			 Committee on Intelligence (Permanent Select)</committee-name></action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To provide for the sharing of certain cyber threat
		  intelligence and cyber threat information between the intelligence community
		  and cybersecurity entities, and for other purposes.</official-title>
	</form>
	<legis-body id="HD4F32EDE23434D119E57076EF383089A" style="OLC">
		<section id="H304B2306C5AF4BCC84483AB074ED86E0" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the
			 <quote><short-title>Cyber Intelligence Sharing and Protection Act of
			 2011</short-title></quote>.</text>
		</section><section id="H8C00D16C4AF54FA69BEF57127DCFE8B5"><enum>2.</enum><header>Cyber threat
			 intelligence and information sharing</header>
			<subsection id="H62A66068CF3840AA8D1EDB795B046529"><enum>(a)</enum><header>In
			 general</header><text display-inline="yes-display-inline">Title XI of the
			 National Security Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding at
			 the end the following new section:</text>
				<quoted-block display-inline="no-display-inline" id="H12DF9945ED284DB79FAFEB6B8D4907E7" style="traditional">
					<section id="H8FF57A5028A24EAC869341E02DD18398"><enum>1104.</enum><header>Cyber threat intelligence and information
		  sharing</header><subsection commented="no" display-inline="yes-display-inline" id="H944D93801DBD4CE6928C149C82137EB6"><enum>(a)</enum><header>Intelligence community
				sharing of cyber threat intelligence with private sector</header>
							<paragraph id="H205B67E625A743C6899CDD6473CDE40C"><enum>(1)</enum><header>In
				general</header><text>The Director of National Intelligence shall establish
				procedures to allow elements of the intelligence community to share cyber
				threat intelligence with private-sector entities and to encourage the sharing
				of such intelligence.</text>
							</paragraph><paragraph id="H70B15A253DBD4FBDB525FC141A564641"><enum>(2)</enum><header>Sharing and use
				of classified intelligence</header><text>The procedures established under
				paragraph (1) shall provide that classified cyber threat intelligence may only
				be—</text>
								<subparagraph commented="no" id="HE51A6FCFB3044840B0CF70B7127369EE"><enum>(A)</enum><text display-inline="yes-display-inline">shared by an element of the intelligence
				community with—</text>
									<clause id="H849EDE18062B4F9285D1A841B3F85372"><enum>(i)</enum><text>certified
				entities; or</text>
									</clause><clause id="H38552E427E6A4BC09634895D02DA1675"><enum>(ii)</enum><text>a
				person with an appropriate security clearance to receive such cyber threat
				intelligence;</text>
									</clause></subparagraph><subparagraph id="H8C35DC825BDD44F9AA8ECEAC6537DC0E"><enum>(B)</enum><text>shared consistent
				with the need to protect the national security of the United States; and</text>
								</subparagraph><subparagraph id="H136CD1EACDD24EB695270374E4CD5532"><enum>(C)</enum><text display-inline="yes-display-inline">used by a certified entity in a manner
				which protects such cyber threat intelligence from unauthorized
				disclosure.</text>
								</subparagraph></paragraph><paragraph commented="no" id="H1AC24966AB854055B39ACFB016AA6456"><enum>(3)</enum><header>Security
				clearance approvals</header><text>The Director of National Intelligence shall
				issue guidelines providing that the head of an element of the intelligence
				community may, as the head of such element considers necessary to carry out
				this subsection—</text>
								<subparagraph id="H1CC9A7DEFBF142A7BDD95DFE1612899A"><enum>(A)</enum><text>grant a security
				clearance on a temporary or permanent basis to an employee or officer of a
				certified entity;</text>
								</subparagraph><subparagraph id="H3A24E4FBD0184446845BA1FCF80551B8"><enum>(B)</enum><text>grant a security
				clearance on a temporary or permanent basis to a certified entity and approval
				to use appropriate facilities; and</text>
								</subparagraph><subparagraph id="H83AD6AF924BC4BFB9A1E55CCDF6B65A0"><enum>(C)</enum><text>expedite the
				security clearance process for a person or entity as the head of such element
				considers necessary, consistent with the need to protect the national security
				of the United States.</text>
								</subparagraph></paragraph><paragraph id="H38A6103C7AAF4D30B4948C55C1FCDE12"><enum>(4)</enum><header>No right or
				benefit</header><text>The provision of information to a private-sector entity
				under this subsection shall not create a right or benefit to similar
				information by such entity or any other private-sector entity.</text>
							</paragraph></subsection><subsection id="HB481F68E7F1B457785A94952DA45804E"><enum>(b)</enum><header>Private sector
				use of cybersecurity systems and sharing of cyber threat information</header>
							<paragraph id="HF33733706FCA4996AB72E4F7CA841D05"><enum>(1)</enum><header>In
				general</header>
								<subparagraph commented="no" id="H973D5B3F811146D1A6AB35FCA0674B09"><enum>(A)</enum><header>Cybersecurity
				providers</header><text>Notwithstanding any other provision of law, a
				cybersecurity provider, with the express consent of a protected entity for
				which such cybersecurity provider is providing goods or services for
				cybersecurity purposes, may, for cybersecurity purposes—</text>
									<clause commented="no" id="HDED1E72F84984850B2FCEDEA460F2A06"><enum>(i)</enum><text display-inline="yes-display-inline">use cybersecurity systems to identify and
				obtain cyber threat information to protect the rights and property of such
				protected entity; and</text>
									</clause><clause commented="no" id="HEC0D21F977C944D088E73BBDCDFFFBB1"><enum>(ii)</enum><text display-inline="yes-display-inline">share such cyber threat information with
				any other entity designated by such protected entity, including, if
				specifically designated, the Federal Government.</text>
									</clause></subparagraph><subparagraph id="H015F78C08874437AB0E08AFB421D4BC3"><enum>(B)</enum><header>Self-protected
				entities</header><text>Notwithstanding any other provision of law, a
				self-protected entity may, for cybersecurity purposes—</text>
									<clause id="H56FFBE3D858C4CC38AAA0C726CDC4E90"><enum>(i)</enum><text display-inline="yes-display-inline">use cybersecurity systems to identify and
				obtain cyber threat information to protect the rights and property of such
				self-protected entity; and</text>
									</clause><clause id="H76F7ECA987E94107BFC7E267E762AE23"><enum>(ii)</enum><text>share such cyber
				threat information with any other entity, including the Federal
				Government.</text>
									</clause></subparagraph></paragraph><paragraph id="HADB41604518B462E8399D0F8B61FBE39"><enum>(2)</enum><header>Use and
				protection of information</header><text>Cyber threat information shared in
				accordance with paragraph (1)—</text>
								<subparagraph id="HB918DE56F8EE4229807397920B82ECA6"><enum>(A)</enum><text>shall only be
				shared in accordance with any restrictions placed on the sharing of such
				information by the protected entity or self-protected entity authorizing such
				sharing, including, if requested, appropriate anonymization or minimization of
				such information;</text>
								</subparagraph><subparagraph id="H3EA9E7E53FAE4EFC9C98670878ABC029"><enum>(B)</enum><text>may not be used by
				an entity to gain an unfair competitive advantage to the detriment of the
				protected entity or the self-protected entity authorizing the sharing of
				information; and</text>
								</subparagraph><subparagraph id="H8BA316E7667F4F599D628FC630506CF5"><enum>(C)</enum><text>if shared with the
				Federal Government—</text>
									<clause id="H42A080CBBC5B4BA8A6515FD6BC78095C"><enum>(i)</enum><text>shall be exempt
				from disclosure under section 552 of title 5, United States Code;</text>
									</clause><clause commented="no" id="HFBA6CC0520004B728416966786ADE540"><enum>(ii)</enum><text>shall be
				considered proprietary information and shall not be disclosed to an entity
				outside of the Federal Government except as authorized by the entity sharing
				such information; and</text>
									</clause><clause id="H17F815E06B2F493BB5E2031D9429912F"><enum>(iii)</enum><text>shall not be
				used by the Federal Government for regulatory purposes.</text>
									</clause></subparagraph></paragraph><paragraph id="H63E8A24BA61E493EB78A5647D8C16373"><enum>(3)</enum><header>Exemption from
				liability</header><text display-inline="yes-display-inline">No civil or
				criminal cause of action shall lie or be maintained in Federal or State court
				against a protected entity, self-protected entity, cybersecurity provider, or
				an officer, employee, or agent of a protected entity, self-protected entity, or
				cybersecurity provider, acting in good faith—</text>
								<subparagraph id="HFBFDD4F5858D46DF968DD3B54FD1CB1F"><enum>(A)</enum><text>for using
				cybersecurity systems or sharing information in accordance with this section;
				or</text>
								</subparagraph><subparagraph id="H239C2A38F025438A8213BE0CC299E152"><enum>(B)</enum><text>for not acting on
				information obtained or shared in accordance with this section.</text>
								</subparagraph></paragraph><paragraph commented="no" id="H2510C2C223354F57B1A13AA3CB561588"><enum>(4)</enum><header>Relationship to
				other laws requiring the disclosure of information</header><text>The submission
				of information under this subsection to the Federal Government shall not
				satisfy or affect any requirement under any other provision of law for a person
				or entity to provide information to the Federal Government.</text>
							</paragraph></subsection><subsection id="H7B12E3ABA6A3456A9E7EEF8ED981BCB1"><enum>(c)</enum><header>Report on
				information sharing</header><text>The Privacy and Civil Liberties Oversight
				Board established under section 1061 of the Intelligence Reform and Terrorism
				Prevention Act of 2004 (5 U.S.C. 601 note) shall annually submit to Congress a
				report in unclassified form containing—</text>
							<paragraph id="H7A3F3E88DD2A44F69CD6BF09FEF862F8"><enum>(1)</enum><text>a review of the
				sharing and use of information by the Federal Government under this section and
				the procedures and guidelines established or issued by the Director of National
				Intelligence under subsection (a); and</text>
							</paragraph><paragraph id="H1AD24AB8BF3D46F197F25B515BB1E1EE"><enum>(2)</enum><text>any
				recommendations of the Board for improvements or modifications to such
				authorities to address privacy and civil liberties concerns.</text>
							</paragraph></subsection><subsection id="H4013759A9B3244DBA3688D0C051282F8"><enum>(d)</enum><header>Federal
				preemption</header><text>This section supersedes any statute of a State or
				political subdivision of a State that restricts or otherwise expressly
				regulates an activity authorized under subsection (b).</text>
						</subsection><subsection id="HC1E128CE7CE540E8956824497CC9C933"><enum>(e)</enum><header>Savings
				clause</header><text display-inline="yes-display-inline">Nothing in this
				section shall be construed to limit any other authority to use a cybersecurity
				system or to identify, obtain, or share cyber threat intelligence or cyber
				threat information.</text>
						</subsection><subsection id="H5480B7B09DFE43C2A549C5C1468B2D41"><enum>(f)</enum><header>Definitions</header><text>In
				this section:</text>
							<paragraph id="H598B3ADD95774D17B6F138644A8C5587"><enum>(1)</enum><header>Certified
				entity</header><text>The term <quote>certified entity</quote> means a protected
				entity, self-protected entity, or cybersecurity provider that—</text>
								<subparagraph commented="no" id="HE4A69AAB61AD454EB4B074BCCEDDB1E8"><enum>(A)</enum><text>possesses or is
				eligible to obtain a security clearance, as determined by the Director of
				National Intelligence; and</text>
								</subparagraph><subparagraph id="H5D67B9D048AB4D2AB1E66F4A3B9AB376"><enum>(B)</enum><text>is able to
				demonstrate to the Director of National Intelligence that such provider or such
				entity can appropriately protect classified cyber threat intelligence.</text>
								</subparagraph></paragraph><paragraph id="HA381185B43A44FF48A57902EC334DDB3"><enum>(2)</enum><header>Cyber threat
				intelligence</header><text display-inline="yes-display-inline">The term
				<quote>cyber threat intelligence</quote> means information in the possession of
				an element of the intelligence community directly pertaining to a vulnerability
				of, or threat to, a system or network of a government or private entity,
				including information pertaining to the protection of a system or network
				from—</text>
								<subparagraph id="HF28DC28284624F549D3C938DCB96504F"><enum>(A)</enum><text>efforts to
				degrade, disrupt, or destroy such system or network; or</text>
								</subparagraph><subparagraph id="H09B9FE48EF3E4EC982809E835D1F0A9B"><enum>(B)</enum><text>theft or
				misappropriation of private or government information, intellectual property,
				or personally identifiable information.</text>
								</subparagraph></paragraph><paragraph id="H6D92EBBB7C504D38BED78BA7F5D2ED8A"><enum>(3)</enum><header>Cybersecurity
				provider</header><text>The term <quote>cybersecurity provider</quote> means a
				non-governmental entity that provides goods or services intended to be used for
				cybersecurity purposes.</text>
							</paragraph><paragraph id="HE25B088F379D43C5B4924D2775CEEE8C"><enum>(4)</enum><header>Cybersecurity
				purpose</header><text display-inline="yes-display-inline">The term
				<quote>cybersecurity purpose</quote> means the purpose of ensuring the
				integrity, confidentiality, or availability of, or safeguarding, a system or
				network, including protecting a system or network from—</text>
								<subparagraph id="H2311CFADFBDB4C7EA961F3E0E0B70945"><enum>(A)</enum><text>efforts to
				degrade, disrupt, or destroy such system or network; or</text>
								</subparagraph><subparagraph id="H90730D5F963744B9946FB0B370FCCB1A"><enum>(B)</enum><text>theft or
				misappropriation of private or government information, intellectual property,
				or personally identifiable information.</text>
								</subparagraph></paragraph><paragraph id="H48BD5454F34E4E5BB695EE8E8925EF5A"><enum>(5)</enum><header>Cybersecurity
				system</header><text display-inline="yes-display-inline">The term
				<quote>cybersecurity system</quote> means a system designed or employed to
				ensure the integrity, confidentiality, or availability of, or safeguard, a
				system or network, including protecting a system or network from—</text>
								<subparagraph id="H492F0D9B6B904ABEB9F989724E5BB19F"><enum>(A)</enum><text>efforts to
				degrade, disrupt, or destroy such system or network; or</text>
								</subparagraph><subparagraph id="H2A35E8098C2C482191118C3A9B64783D"><enum>(B)</enum><text>theft or
				misappropriation of private or government information, intellectual property,
				or personally identifiable information.</text>
								</subparagraph></paragraph><paragraph id="H55B51A12BF3E45AC8D57451ECEF9E2E8"><enum>(6)</enum><header>Cyber threat
				information</header><text display-inline="yes-display-inline">The term
				<quote>cyber threat information</quote> means information directly pertaining
				to a vulnerability of, or threat to a system or network of a government or
				private entity, including information pertaining to the protection of a system
				or network from—</text>
								<subparagraph id="H87BC9022CB0A4A4B90837D62A3955B5F"><enum>(A)</enum><text>efforts to
				degrade, disrupt, or destroy such system or network; or</text>
								</subparagraph><subparagraph id="HD282E308B1D84CFAB1599AC360DEF823"><enum>(B)</enum><text>theft or
				misappropriation of private or government information, intellectual property,
				or personally identifiable information.</text>
								</subparagraph></paragraph><paragraph id="HA4CED76DC5064C169448DB49898EC04B"><enum>(7)</enum><header>Protected
				entity</header><text>The term <quote>protected entity</quote> means an entity,
				other than an individual, that contracts with a cybersecurity provider for
				goods or services to be used for cybersecurity purposes.</text>
							</paragraph><paragraph commented="no" id="H87E27EF67B2E4480AA2431A2B03F0ACE"><enum>(8)</enum><header>Self-protected
				entity</header><text>The term <quote>self-protected entity</quote> means an
				entity, other than an individual, that provides goods or services for
				cybersecurity purposes to
				itself.</text>
							</paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block>
			</subsection><subsection id="H43F490E5A78948628982831FE78313D9"><enum>(b)</enum><header>Procedures and
			 guidelines</header><text>The Director of National Intelligence shall—</text>
				<paragraph id="H520B031C6C6247CE9E1342BAC0F9FEB4"><enum>(1)</enum><text display-inline="yes-display-inline">not later than 60 days after the date of
			 the enactment of this Act, establish procedures under paragraph (1) of section
			 1104(a) of the National Security Act of 1947, as added by subsection (a) of
			 this section, and issue guidelines under paragraph (3) of such section 1104(a);
			 and</text>
				</paragraph><paragraph commented="no" id="H16E6F7B3A4B64F44B4F7BE5B32FEFE94"><enum>(2)</enum><text>following the
			 establishment of such procedures and the issuance of such guidelines,
			 expeditiously distribute such procedures and such guidelines to appropriate
			 Federal Government and private-sector entities.</text>
				</paragraph></subsection><subsection id="H22AF48B204AC4B0BBBDE612EC58C211C"><enum>(c)</enum><header>Initial
			 report</header><text>The first report required to be submitted under subsection
			 (c) of section 1104 of the National Security Act of 1947, as added by
			 subsection (a) of this section, shall be submitted not later than one year
			 after the date of the enactment of this Act.</text>
			</subsection><subsection id="H7B61B417B130465E95E013B29ADD48A9"><enum>(d)</enum><header>Table of
			 contents amendment</header><text display-inline="yes-display-inline">The table
			 of contents in the first section of such Act is amended by adding at the end
			 the following new item:</text>
				<quoted-block display-inline="no-display-inline" id="H77200039931442BFAC13F99FF09E9441" style="traditional">
					<toc regeneration="no-regeneration">
						<toc-entry level="section">Sec. 1104. Cyber threat intelligence and
				information
				sharing.</toc-entry>
					</toc>
					<after-quoted-block>.</after-quoted-block></quoted-block>
			</subsection></section></legis-body>
</bill>
