<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-House" bill-type="olc" dms-id="HDBAA74D2306A4242B2E78BFBAEDA4DC5" public-private="public"> 
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>114 HR 1731 RH: National Cybersecurity Protection Advancement Act of 2015</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2015-04-17</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">IB</distribution-code> 
<calendar display="yes">Union Calendar No. 61</calendar>
<congress display="yes">114th CONGRESS</congress> <session display="yes">1st Session</session> 
<legis-num>H. R. 1731</legis-num>
<associated-doc role="report" display="yes">[Report No. 114–83]</associated-doc> 
<current-chamber display="yes">IN THE HOUSE OF REPRESENTATIVES</current-chamber> 
<action> 
<action-date date="20150413">April 13, 2015</action-date> 
<action-desc><sponsor name-id="M001157">Mr. McCaul</sponsor> (for himself and <cosponsor name-id="R000601">Mr. Ratcliffe</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HHM00" added-display-style="italic" deleted-display-style="strikethrough">Committee on Homeland Security</committee-name></action-desc> 
</action> 
<action>
<action-date date="20150417">April 17, 2015</action-date>
<action-desc>Reported with an amendment, committed to the Committee of the Whole House on the State of the Union, and ordered to be printed</action-desc>
<action-instruction>Strike out all after the enacting clause and insert the part printed in italic</action-instruction>
<action-instruction>For text of introduced bill, see copy of bill as introduced on April 13, 2015</action-instruction>
</action>
<action display="yes"> 
<action-desc display="yes"><pagebreak/></action-desc> 
</action>
<legis-type>A BILL</legis-type> 
<official-title display="yes">To amend the Homeland Security Act of 2002 to enhance multi-directional sharing of information related to cybersecurity risks and strengthen privacy and civil liberties protections, and for other purposes.<pagebreak/></official-title> 
</form> 
<legis-body display-enacting-clause="yes-display-enacting-clause" changed="added" style="OLC" committee-id="HHM00" reported-display-style="italic" id="H7AD5C476C3814B118CCEAE2F455F4F8B"> 
<section id="HDE78DFF3804F490FA0E54010391BFAEA" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>National Cybersecurity Protection Advancement Act of 2015</short-title></quote>.</text></section> <section id="H55B4D457B7704A38A6B9F618E9BE78EE"><enum>2.</enum><header>National Cybersecurity and Communications Integration Center</header> <subsection id="H442E30211E94447198DEC9C7BE0AB1C0"><enum>(a)</enum><header>Definitions</header> <paragraph id="HD552BE2B8E464A7EB042875D4B1C86D8"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Subsection (a) of the second section 226 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/148">6 U.S.C. 148</external-xref>; relating to the National Cybersecurity and Communications Integration Center) is amended—</text> 
<subparagraph id="HC152B1749E8446BB8167322A5FD395E2"><enum>(A)</enum><text>in paragraph (3), by striking <quote>and</quote> at the end;</text></subparagraph> <subparagraph id="H38A5B9FFFBFD4BC68070C096837A901E"><enum>(B)</enum><text>in paragraph (4), by striking the period at the end and inserting <quote>; and</quote>; and</text></subparagraph> 
<subparagraph id="HEBE994BF323B4B9D89DA614F7B57D636"><enum>(C)</enum><text>by adding at the end the following new paragraphs:</text> <quoted-block style="OLC" id="H1A8419F92802411783E3F4EAAFB306A2" display-inline="no-display-inline"> <paragraph id="H9815E15A9B014A97B22C88A23AA718EF"><enum>(5)</enum><text>the term <quote>cyber threat indicator</quote> means technical information that is necessary to describe or identify—</text> 
<subparagraph id="HDC9CA5486B8D4B648CB4ED0D2EDC2CD7"><enum>(A)</enum><text display-inline="yes-display-inline">a method for probing, monitoring, maintaining, or establishing network awareness of an information system for the purpose of discerning technical vulnerabilities of such information system, if such method is known or reasonably suspected of being associated with a known or suspected cybersecurity risk, including communications that reasonably appear to be transmitted for the purpose of gathering technical information related to a cybersecurity risk;</text></subparagraph> <subparagraph id="HB113627234CE42CA8AE2571858A50796"><enum>(B)</enum><text display-inline="yes-display-inline">a method for defeating a technical or security control of an information system;</text></subparagraph> 
<subparagraph id="H0149700AD65C4E78BBCD8B17D02478A5" commented="no"><enum>(C)</enum><text>a technical vulnerability, including anomalous technical behavior that may become a vulnerability;</text></subparagraph> <subparagraph id="H1727784637B740DB9DDED2E4F32255B3"><enum>(D)</enum><text>a method of causing a user with legitimate access to an information system or information that is stored on, processed by, or transiting an information system to inadvertently enable the defeat of a technical or operational control;</text></subparagraph> 
<subparagraph id="H34D1B7B7D7984AC596B04DE22B01FA90"><enum>(E)</enum><text display-inline="yes-display-inline">a method for unauthorized remote identification of, access to, or use of an information system or information that is stored on, processed by, or transiting an information system that is known or reasonably suspected of being associated with a known or suspected cybersecurity risk;</text></subparagraph> <subparagraph id="H05EFADDEAA7A4B498AA9D9CB0DD65387"><enum>(F)</enum><text>the actual or potential harm caused by a cybersecurity risk, including a description of the information exfiltrated as a result of a particular cybersecurity risk;</text></subparagraph> 
<subparagraph id="H4634618E615D477F81C443B8A5EA8685"><enum>(G)</enum><text>any other attribute of a cybersecurity risk that cannot be used to identify specific persons reasonably believed to be unrelated to such cybersecurity risk, if disclosure of such attribute is not otherwise prohibited by law; or</text></subparagraph> <subparagraph id="H3F8C9806C31D4E6DAB432974789C04A6"><enum>(H)</enum><text>any combination of subparagraphs (A) through (G);</text></subparagraph></paragraph> 
<paragraph id="HE3C55F230E2F48749D374C9D3DDD0149"><enum>(6)</enum><text display-inline="yes-display-inline">the term <quote>cybersecurity purpose</quote> means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity risk or incident;</text></paragraph> <paragraph id="H4116AF6168D3402E915A4A31A4775483"><enum>(7)</enum> <subparagraph id="H6B79D8A8843C4789A27A7BB3B7CB9D47" display-inline="yes-display-inline"><enum>(A)</enum><text display-inline="yes-display-inline">except as provided in subparagraph (B), the term <quote>defensive measure</quote> means an action, device, procedure, signature, technique, or other measure applied to an information system or information that is stored on, processed by, or transiting an information system that detects, prevents, or mitigates a known or suspected cybersecurity risk or incident, or any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control;</text></subparagraph> 
<subparagraph id="H5763350F00D843F6940426CB7A147D46" indent="up1" commented="no"><enum>(B)</enum><text display-inline="yes-display-inline">such term does not include a measure that destroys, renders unusable, or substantially harms an information system or data on an information system not belonging to—</text> <clause id="H92947716AA6F4C32A9BFC17CF8A13A51" commented="no"><enum>(i)</enum><text>the non-Federal entity, not including a State, local, or tribal government, operating such measure; or</text></clause> 
<clause id="H6B4E845D6B3F4FBB9AA86960DB38E623" commented="no"><enum>(ii)</enum><text>another Federal entity or non-Federal entity that is authorized to provide consent and has provided such consent to the non-Federal entity referred to in clause (i);</text></clause></subparagraph></paragraph> <paragraph id="HB9FEA5CC407A41AF9D5C2EB7C88B4502" commented="no"><enum>(8)</enum><text>the term <quote>network awareness</quote> means to scan, identify, acquire, monitor, log, or analyze information that is stored on, processed by, or transiting an information system;</text></paragraph> 
<paragraph id="HFB740816244148BB84D3F9622D4E05AF"><enum>(9)</enum> 
<subparagraph id="HFDBEF75ECFB5487893D571D80162C127" display-inline="yes-display-inline"><enum>(A)</enum><text>the term <quote>private entity</quote> means a non-Federal entity that is an individual or private group, organization, proprietorship, partnership, trust, cooperative, corporation, or other commercial or non-profit entity, including an officer, employee, or agent thereof;</text></subparagraph> <subparagraph id="H2E49DB4B15A34E03A23AFD3A90DBC2AF" indent="up1"><enum>(B)</enum><text>such term includes a component of a State, local, or tribal government performing electric utility services;</text></subparagraph></paragraph> 
<paragraph id="H2DA99D077CD6425A9F2F3DFDB82CD024" commented="no"><enum>(10)</enum><text display-inline="yes-display-inline">the term <quote>security control</quote> means the management, operational, and technical controls used to protect against an unauthorized effort to adversely affect the confidentially, integrity, or availability of an information system or information that is stored on, processed by, or transiting an information system; and</text></paragraph> <paragraph id="H2AC2D666E2214C7482AE3D5780BB725D"><enum>(11)</enum><text>the term <quote>sharing</quote> means providing, receiving, and disseminating.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection> 
<subsection id="H9085439BA64E41CEA480ADD55070764E"><enum>(b)</enum><header>Amendment</header><text>Subparagraph (B) of subsection (d)(1) of such second section 226 of the Homeland Security Act of 2002 is amended—</text> <paragraph id="H0955DBE09135452FA934316B9EAE7A46"><enum>(1)</enum><text>in clause (i), by striking <quote>and local</quote> and inserting <quote>, local, and tribal</quote>;</text></paragraph> 
<paragraph id="H0EB2F455953740ACA8CA0950462F0DBD"><enum>(2)</enum><text>in clause (ii)—</text> <subparagraph id="HC06CCE201BAC45409E1C87542AC6013B"><enum>(A)</enum><text>by inserting <quote>, including information sharing and analysis centers</quote> before the semicolon; and</text></subparagraph> 
<subparagraph id="HE4FEA5EF1DE44C9E8FE497F5201EA88F"><enum>(B)</enum><text>by striking <quote>and</quote> at the end;</text></subparagraph></paragraph> <paragraph id="H145DBBCCF6EE44F490A830DD22F243D5"><enum>(3)</enum><text>in clause (iii), by striking the period at the end and inserting <quote>; and</quote>; and</text></paragraph> 
<paragraph id="H25526CD30FBE496D9DB762611FCC0837"><enum>(4)</enum><text>by adding at the end the following new clause:</text> <quoted-block style="OLC" id="H8D049063AE394646806B6CE44A354017" display-inline="no-display-inline"> <clause id="HBFE96DAB5786408E976AC295A0353B8F"><enum>(iv)</enum><text display-inline="yes-display-inline">private entities.</text></clause><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section> 
<section id="HCB847EB37281494E85343972DDE61B83"><enum>3.</enum><header>Information sharing structure and processes</header><text display-inline="no-display-inline">The second section 226 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/148">6 U.S.C. 148</external-xref>; relating to the National Cybersecurity and Communications Integration Center) is amended—</text> <paragraph id="HB39FDDE7A77F4FF2AC6B76223CCB9E87"><enum>(1)</enum><text>in subsection (c)—</text> 
<subparagraph id="H452F0EC7728A4ACD9592C5B17CB2B809"><enum>(A)</enum><text>in paragraph (1)—</text> <clause id="H443D09E70A404000884BB8F50627F05B"><enum>(i)</enum><text>by striking <quote>a Federal civilian interface</quote> and inserting <quote>the lead Federal civilian interface</quote>; and</text></clause> 
<clause id="HEDB374F3DB6F46789A0A1D668DBC4249"><enum>(ii)</enum><text display-inline="yes-display-inline">by striking <quote>cybersecurity risks,</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>;</text></clause></subparagraph> <subparagraph id="H168B60A5045544D38730E3C210B24788"><enum>(B)</enum><text display-inline="yes-display-inline">in paragraph (3), by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>;</text></subparagraph> 
<subparagraph id="H19D8C754A8E342888662A23D83A5089D"><enum>(C)</enum><text>in paragraph (5)(A), by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>;</text></subparagraph> <subparagraph id="H4798B32EE62C4D569D9C8A7C9FD2926E"><enum>(D)</enum><text display-inline="yes-display-inline">in paragraph (6)—</text> 
<clause id="HE3913178C6424181A7130313986D6731"><enum>(i)</enum><text>by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>; and</text></clause> <clause id="H2CCF397F266142D9B1D505FA4E7B5744"><enum>(ii)</enum><text>by striking <quote>and</quote> at the end; </text></clause></subparagraph> 
<subparagraph id="H929CB7B04565403D938ED519D9FE3EAF"><enum>(E)</enum><text>in paragraph (7)—</text> <clause id="H3F86F37F345640399C5E4B1413709FDB"><enum>(i)</enum><text>in subparagraph (A), by striking <quote>and</quote> at the end;</text></clause> 
<clause id="H458400B38F6A4B028F676EE0B747137C" commented="no"><enum>(ii)</enum><text display-inline="yes-display-inline">in subparagraph (B), by striking the period at the end and inserting <quote>; and</quote>; and</text></clause> <clause id="H3C654FAD4EE1491A8393BCFC5209EB69"><enum>(iii)</enum><text>by adding at the end the following new subparagraph:</text> 
<quoted-block style="OLC" id="H6ECC9D180A124404923E866CCBBABC36" display-inline="no-display-inline"> 
<subparagraph id="H44AFAAA21EA54455BE0C2725004780F9"><enum>(C)</enum><text display-inline="yes-display-inline">sharing cyber threat indicators and defensive measures;</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph> <subparagraph id="H140D9D3D22B6449A91246FE366192163"><enum>(F)</enum><text>by adding at the end the following new paragraphs</text> 
<quoted-block style="OLC" id="HD77204C81F3041C08B894CBA2CDE88E9" display-inline="no-display-inline"> 
<paragraph id="H7799F21D30914D81877BBB54DE7D708C"><enum>(8)</enum><text display-inline="yes-display-inline">engaging with international partners, in consultation with other appropriate agencies, to—</text> <subparagraph id="HD73737180CD648D6AD8007540BBFB27B" commented="no"><enum>(A)</enum><text>collaborate on cyber threat indicators, defensive measures, and information related to cybersecurity risks and incidents; and</text></subparagraph> 
<subparagraph id="H73329FE852064F1B93373AA9ACF25276"><enum>(B)</enum><text>enhance the security and resilience of global cybersecurity;</text></subparagraph></paragraph> <paragraph id="HDDF885617CD54E43ACE6D76CE27AFA38" commented="no"><enum>(9)</enum><text display-inline="yes-display-inline">sharing cyber threat indicators, defensive measures, and other information related to cybersecurity risks and incidents with Federal and non-Federal entities, including across sectors of critical infrastructure and with State and major urban area fusion centers, as appropriate;</text></paragraph> 
<paragraph id="H5C67DB7EC5974E53A5FF886CC839EB21"><enum>(10)</enum><text display-inline="yes-display-inline">promptly notifying the Secretary and the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate of any significant violations of the policies and procedures specified in subsection (i)(6)(A); </text></paragraph> <paragraph id="H9D87D2917C6741C39FE4CF549BD70841"><enum>(11)</enum><text>promptly notifying non-Federal entities that have shared cyber threat indicators or defensive measures that are known or determined to be in error or in contravention of the requirements of this section; and</text></paragraph> 
<paragraph id="H5ABC70AC9FC6403091C0E1258F061BF7"><enum>(12)</enum><text display-inline="yes-display-inline">participating, as appropriate, in exercises run by the Department’s National Exercise Program.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph> <paragraph id="H3EAE727232194DB2B48A603F4FEE6FD5"><enum>(2)</enum><text>in subsection (d)—</text> 
<subparagraph id="H3EF8A23AF5144D23AE19388EA8D2F6F0"><enum>(A)</enum><text>in subparagraph (D), by striking <quote>and</quote> at the end;</text></subparagraph> <subparagraph id="H88F4208AF3994167BBAB05B882FA6AC1"><enum>(B)</enum><text>by redesignating subparagraph (E) as subparagraph (J); and</text></subparagraph> 
<subparagraph id="HFC9296A97E454E71890B5322F42DF7CD"><enum>(C)</enum><text>by inserting after subparagraph (D) the following new subparagraphs:</text> <quoted-block style="OLC" id="H18858C77E12742A183180FEFC4B8D632" display-inline="no-display-inline"> <subparagraph id="H71CFAD27F803483B99E0B8F9316FB237" commented="no"><enum>(E)</enum><text display-inline="yes-display-inline">an entity that collaborates with State and local governments on cybersecurity risks and incidents, and has entered into a voluntary information sharing relationship with the Center;</text></subparagraph> 
<subparagraph id="H3899503A08AE4F9AB258A3736551A0FA"><enum>(F)</enum><text display-inline="yes-display-inline">a United States Computer Emergency Readiness Team that coordinates information related to cybersecurity risks and incidents, proactively and collaboratively addresses cybersecurity risks and incidents to the United States, collaboratively responds to cybersecurity risks and incidents, provides technical assistance, upon request, to information system owners and operators, and shares cyber threat indicators, defensive measures, analysis, or information related to cybersecurity risks and incidents in a timely manner;</text></subparagraph> <subparagraph id="H5186483BA6B94553B66579177B2CE2AB"><enum>(G)</enum><text display-inline="yes-display-inline">the Industrial Control System Cyber Emergency Response Team that—</text> 
<clause id="H881FDFBF3D3D41A78BCC34152270CFF7"><enum>(i)</enum><text>coordinates with industrial control systems owners and operators;</text></clause> <clause id="H15FCED22F2E34282A96371402D47B0DF"><enum>(ii)</enum><text>provides training, upon request, to Federal entities and non-Federal entities on industrial control systems cybersecurity;</text></clause> 
<clause id="HF97B4B5C0F07447080880C92F4423E7C"><enum>(iii)</enum><text>collaboratively addresses cybersecurity risks and incidents to industrial control systems;</text></clause> <clause id="H2637B96F57B5478E92B85343F2AB59B4"><enum>(iv)</enum><text>provides technical assistance, upon request, to Federal entities and non-Federal entities relating to industrial control systems cybersecurity; and</text></clause> 
<clause id="HD8BB9D9081A04101B5A5F33ED6FAA12F"><enum>(v)</enum><text>shares cyber threat indicators, defensive measures, or information related to cybersecurity risks and incidents of industrial control systems in a timely fashion;</text></clause></subparagraph> <subparagraph id="HBAF23061CBBD4479AD270095E386BCA9"><enum>(H)</enum><text display-inline="yes-display-inline">a National Coordinating Center for Communications that coordinates the protection, response, and recovery of emergency communications;</text></subparagraph> 
<subparagraph id="H8EED27007EB5441898681E268D3BE54C"><enum>(I)</enum><text display-inline="yes-display-inline">an entity that coordinates with small and medium-sized businesses; and</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph> <paragraph id="HABD69E9B7C7A4B308FCC874902AC689A"><enum>(3)</enum><text>in subsection (e)—</text> 
<subparagraph id="H81B899606DB341CFA1E25BD900903367"><enum>(A)</enum><text>in paragraph (1)—</text> <clause id="HCFFC10AC0B624E75AD781507D77E6EB4"><enum>(i)</enum><text>in subparagraph (A), by inserting <quote>cyber threat indicators, defensive measures, and</quote> before <quote>information</quote>;</text></clause> 
<clause id="HD9FFF93D69B44BC8B5A699D415B8937F"><enum>(ii)</enum><text display-inline="yes-display-inline">in subparagraph (B), by inserting <quote>cyber threat indicators, defensive measures, and</quote> before <quote>information</quote>;</text></clause> <clause id="H962D650F931646DEA25129C3430D6DF7"><enum>(iii)</enum><text display-inline="yes-display-inline">in subparagraph (F), by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>; </text></clause> 
<clause id="H6C546C589FB34B76A191DF7818FC6607" display-inline="no-display-inline"><enum>(iv)</enum><text display-inline="yes-display-inline">in subparagraph (F), by striking <quote>and</quote> at the end;</text></clause> <clause id="H06D980002AFE4892BA12292BB2BE7E75"><enum>(v)</enum><text display-inline="yes-display-inline">in subparagraph (G), by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>; and </text></clause> 
<clause id="HC338CEAACFCB4583B64EB76054A4BDB0"><enum>(vi)</enum><text display-inline="yes-display-inline">by adding at the end the following:</text> <quoted-block style="OLC" id="H291F3EB7118440D69BF884E16F3491EA" display-inline="no-display-inline"> <subparagraph id="HB5C83755264041B7A87307AA3E49BC48"><enum>(H)</enum><text display-inline="yes-display-inline">the Center ensures that it shares information relating to cybersecurity risks and incidents with small and medium-sized businesses, as appropriate; and</text></subparagraph> 
<subparagraph id="HEBBE343DDE8A4A32883ACDDC752D3C93"><enum>(I)</enum><text display-inline="yes-display-inline">the Center designates an agency contact for non-Federal entities;</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph> <subparagraph id="H5E082D5E65154CFD82C7CCE2EB6EDBD6"><enum>(B)</enum><text>in paragraph (2)—</text> 
<clause id="H95A34318D65F46A9B87D49A9C78EE506"><enum>(i)</enum><text display-inline="yes-display-inline">by striking <quote>cybersecurity risks</quote> and inserting <quote>cyber threat indicators, defensive measures, cybersecurity risks,</quote>; and</text></clause> <clause id="HDDB7C6A719344C4FA9008257B912FDBE"><enum>(ii)</enum><text>by inserting <quote>or disclosure</quote> before the semicolon at the end; and</text></clause></subparagraph> 
<subparagraph id="H0F0464A19E4E4B58AE6084E14C5A403D" commented="no"><enum>(C)</enum><text>in paragraph (3), by inserting before the period at the end the following: <quote>, including by working with the Chief Privacy Officer appointed under section 222 to ensure that the Center follows the policies and procedures specified in subsection (i)(6)(A)</quote>; and</text></subparagraph></paragraph> <paragraph id="H664C22D766E04E90927B3B2021DA8F19"><enum>(4)</enum><text>by adding at the end the following new subsections:</text> 
<quoted-block style="OLC" id="H81E2D0BE624A4E878AB2A74035391861" display-inline="no-display-inline"> 
<subsection id="HE562ADA1085E4B4EAF3ED52E47F915B1"><enum>(g)</enum><header>Rapid automated sharing</header> 
<paragraph id="H03ED8497C98C420BA389489C268623E5"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection, in coordination with industry and other stakeholders, shall develop capabilities making use of existing information technology industry standards and best practices, as appropriate, that support and rapidly advance the development, adoption, and implementation of automated mechanisms for the timely sharing of cyber threat indicators and defensive measures to and from the Center and with each Federal agency designated as the <quote>Sector Specific Agency</quote> for each critical infrastructure sector in accordance with subsection (h).</text></paragraph> <paragraph id="HF92CC10364EA4CC38BC9D45A2E7B43EB"><enum>(2)</enum><header>Biannual report</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a biannual report on the status and progress of the development of the capability described in paragraph (1). Such reports shall be required until such capability is fully implemented.</text></paragraph></subsection> 
<subsection id="H2E4E579F0D074A2DB2EA8C0432501032"><enum>(h)</enum><header>Sector Specific Agencies</header><text display-inline="yes-display-inline">The Secretary, in collaboration with the relevant critical infrastructure sector and the heads of other appropriate Federal agencies, shall recognize the Federal agency designated as of March 25, 2015, as the <quote>Sector Specific Agency</quote> for each critical infrastructure sector designated in the Department’s National Infrastructure Protection Plan. If the designated Sector Specific Agency for a particular critical infrastructure sector is the Department, for purposes of this section, the Secretary is deemed to be the head of such Sector Specific Agency and shall carry out this section. The Secretary, in coordination with the heads of each such Sector Specific Agency, shall—</text> <paragraph id="HD06A13AA7F81435283359A90ACFA3D19"><enum>(1)</enum><text display-inline="yes-display-inline">support the security and resilience actives of the relevant critical infrastructure sector in accordance with this section;</text></paragraph> 
<paragraph id="HAA55CFDC05474F9EAC249EF68A901FAF"><enum>(2)</enum><text display-inline="yes-display-inline">provide institutional knowledge, specialized expertise, and technical assistance upon request to the relevant critical infrastructure sector; and</text></paragraph> <paragraph id="H7351243AC26B4ECDAF767FACE642555A"><enum>(3)</enum><text display-inline="yes-display-inline">support the timely sharing of cyber threat indicators and defensive measures with the relevant critical infrastructure sector with the Center in accordance with this section.</text></paragraph></subsection> 
<subsection id="H49FF6DCDC4E44C4FBEC381657B53A00B"><enum>(i)</enum><header>Voluntary information sharing procedures</header> 
<paragraph id="H7794723946E74E11A509A05C39A541FB"><enum>(1)</enum><header>Procedures</header> 
<subparagraph id="H045DDA51A110418287B4B4C47BE208E5"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The Center may enter into a voluntary information sharing relationship with any consenting non-Federal entity for the sharing of cyber threat indicators and defensive measures for cybersecurity purposes in accordance with this section. Nothing in this section may be construed to require any non-Federal entity to enter into any such information sharing relationship with the Center or any other entity. The Center may terminate a voluntary information sharing relationship under this subsection if the Center determines that the non-Federal entity with which the Center has entered into such a relationship has, after repeated notice, repeatedly violated the terms of this subsection.</text></subparagraph> <subparagraph id="HB80AE9F309734966A05AE635843516F1"><enum>(B)</enum><header>National security</header><text>The Secretary may decline to enter into a voluntary information sharing relationship under this subsection if the Secretary determines that such is appropriate for national security.</text></subparagraph></paragraph> 
<paragraph id="HE3F79C4AB88E4EA4B7FC72C0D4CD2300" commented="no"><enum>(2)</enum><header>Voluntary information sharing relationships</header><text display-inline="yes-display-inline">A voluntary information sharing relationship under this subsection may be characterized as an agreement described in this paragraph.</text> <subparagraph id="HD3E16FA2D3A34336BCFB3094E7C17603" commented="no"><enum>(A)</enum><header>Standard agreement</header><text display-inline="yes-display-inline">For the use of a non-Federal entity, the Center shall make available a standard agreement, consistent with this section, on the Department’s website.</text></subparagraph> 
<subparagraph id="HE6EA17D7BDFF4D18AEAB72D8646A42FA" commented="no"><enum>(B)</enum><header>Negotiated agreement</header><text display-inline="yes-display-inline">At the request of a non-Federal entity, and if determined appropriate by the Center, the Department shall negotiate a non-standard agreement, consistent with this section.</text></subparagraph> <subparagraph id="HB6E6AC4715B04B589D1D548A528A840E" commented="no"><enum>(C)</enum><header>Existing agreements</header><text display-inline="yes-display-inline">An agreement between the Center and a non-Federal entity that is entered into before the date of the enactment of this section, or such an agreement that is in effect before such date, shall be deemed in compliance with the requirements of this subsection, notwithstanding any other provision or requirement of this subsection. An agreement under this subsection shall include the relevant privacy protections as in effect under the Cooperative Research and Development Agreement for Cybersecurity Information Sharing and Collaboration, as of December 31, 2014. Nothing in this subsection may be construed to require a non-Federal entity to enter into either a standard or negotiated agreement to be in compliance with this subsection.</text></subparagraph></paragraph> 
<paragraph id="H1526C448E16F44AD9A73341F72BAB69E"><enum>(3)</enum><header>Information sharing authorization</header> 
<subparagraph id="H595E51ACF5E648A298F465FE0EFFBDA1"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Except as provided in subparagraph (B), and notwithstanding any other provision of law, a non-Federal entity may, for cybersecurity purposes, share cyber threat indicators or defensive measures obtained on its own information system, or on an information system of another Federal entity or non-Federal entity, upon written consent of such other Federal entity or non-Federal entity or an authorized representative of such other Federal entity or non-Federal entity in accordance with this section with—</text> <clause id="HEB74E2A9927947D38FD346E4C0FE31D6"><enum>(i)</enum><text>another non-Federal entity; or</text></clause> 
<clause id="H2B21C2A77F0A4AEFB7F3A7C41DF6B1C7"><enum>(ii)</enum><text>the Center, as provided in this section.</text></clause></subparagraph> <subparagraph id="HBB0DF3934C1247DB9F88079F8EB2A7CE"><enum>(B)</enum><header>Lawful restriction</header><text display-inline="yes-display-inline">A non-Federal entity receiving a cyber threat indicator or defensive measure from another Federal entity or non-Federal entity shall comply with otherwise lawful restrictions placed on the sharing or use of such cyber threat indicator or defensive measure by the sharing Federal entity or non-Federal entity.</text></subparagraph> 
<subparagraph id="H9529F0537FF34E578EAF413A961896D9" commented="no"><enum>(C)</enum><header>Removal of information unrelated to cybersecurity risks or incidents</header><text display-inline="yes-display-inline">Federal entities and non-Federal entities shall, prior to such sharing, take reasonable efforts to remove information that can be used to identify specific persons and is reasonably believed at the time of sharing to be unrelated to a cybersecurity risks or incident and to safeguard information that can be used to identify specific persons from unintended disclosure or unauthorized access or acquisition.</text></subparagraph> <subparagraph id="H33CF18BA3AAA45E5B8BE2196D01B9C56"><enum>(D)</enum><header>Rule of construction</header><text>Nothing in this paragraph may be construed to—</text> 
<clause id="H3E85862C9057445983FF975CC404DCD7"><enum>(i)</enum><text>limit or modify an existing information sharing relationship;</text></clause> <clause id="HD30B32739E864046BFF91815ED801654"><enum>(ii)</enum><text>prohibit a new information sharing relationship;</text></clause> 
<clause id="HE48A820E1D0048D899B0577B0607213E"><enum>(iii)</enum><text>require a new information sharing relationship between any non-Federal entity and a Federal entity;</text></clause> <clause id="HFB2907905DFC47D99279B35D50105C20"><enum>(iv)</enum><text>limit otherwise lawful activity; or</text></clause> 
<clause id="H1A5FC15B927B47AAA2063D7F10926A55"><enum>(v)</enum><text>in any manner impact or modify procedures in existence as of the date of the enactment of this section for reporting known or suspected criminal activity to appropriate law enforcement authorities or for participating voluntarily or under legal requirement in an investigation.</text></clause></subparagraph> <subparagraph id="HFDB60B7E485F48A299FFB9B9920403E9"><enum>(E)</enum><header>Coordinated vulnerability disclosure</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection, in coordination with industry and other stakeholders, shall develop, publish, and adhere to policies and procedures for coordinating vulnerability disclosures, to the extent practicable, consistent with international standards in the information technology industry.</text></subparagraph></paragraph> 
<paragraph id="HB0D0B6A930574A8D9F94BA53C6D76E03"><enum>(4)</enum><header>Network awareness authorization</header> 
<subparagraph id="H2EF7C3D58598406893DE6A51369E8413"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Notwithstanding any other provision of law, a non-Federal entity, not including a State, local, or tribal government, may, for cybersecurity purposes, conduct network awareness of—</text> <clause id="HE2627E627D53455198F0D9154D0369C0"><enum>(i)</enum><text display-inline="yes-display-inline">an information system of such non-Federal entity to protect the rights or property of such non-Federal entity;</text></clause> 
<clause id="HAB1D9679623B43A6AADC9AE060856CE9"><enum>(ii)</enum><text display-inline="yes-display-inline">an information system of another non-Federal entity, upon written consent of such other non-Federal entity for conducting such network awareness to protect the rights or property of such other non-Federal entity;</text></clause> <clause id="H8A4E97F00387494A9866AB45A2CAA5AF"><enum>(iii)</enum><text display-inline="yes-display-inline">an information system of a Federal entity, upon written consent of an authorized representative of such Federal entity for conducting such network awareness to protect the rights or property of such Federal entity; or</text></clause> 
<clause id="HDEA9B35B464B40B48F93A1F4B3A0EDAA" commented="no"><enum>(iv)</enum><text>information that is stored on, processed by, or transiting an information system described in this subparagraph.</text></clause></subparagraph> <subparagraph id="HFE1CF3B6940D436F9525DCD18545C51E"><enum>(B)</enum><header>Rule of construction</header><text>Nothing in this paragraph may be construed to—</text> 
<clause id="H36002C407EEC4586BB3BD84868222F12" commented="no"><enum>(i)</enum><text>authorize conducting network awareness of an information system, or the use of any information obtained through such conducting of network awareness, other than as provided in this section; or</text></clause> <clause id="H51F949C688064DD584E7127D2A939CE2"><enum>(ii)</enum><text>limit otherwise lawful activity.</text></clause></subparagraph></paragraph> 
<paragraph id="H4548A028EC784CDBB1DDE1F31871B019"><enum>(5)</enum><header>Defensive measure authorization</header> 
<subparagraph id="H0A834974807541B4B59F9ACD7D6CED6F"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Except as provided in subparagraph (B) and notwithstanding any other provision of law, a non-Federal entity, not including a State, local, or tribal government, may, for cybersecurity purposes, operate a defensive measure that is applied to—</text> <clause id="H8CB34D23E3204D7AA1E75A9C7E55B438"><enum>(i)</enum><text display-inline="yes-display-inline">an information system of such non-Federal entity to protect the rights or property of such non-Federal entity;</text></clause> 
<clause id="H39563DE9C41D4C8485F3193A4F803220"><enum>(ii)</enum><text>an information system of another non-Federal entity upon written consent of such other non-Federal entity for operation of such defensive measure to protect the rights or property of such other non-Federal entity;</text></clause> <clause id="H8439EE6DE9354639950EACF7CAAF70AB"><enum>(iii)</enum><text>an information system of a Federal entity upon written consent of an authorized representative of such Federal entity for operation of such defensive measure to protect the rights or property of such Federal entity; or</text></clause> 
<clause id="H3F75C815CD6A456D9D73BABF6E10AC13" commented="no"><enum>(iv)</enum><text>information that is stored on, processed by, or transiting an information system described in this subparagraph.</text></clause></subparagraph> <subparagraph id="HFA503E8F98844B83B7C82A1A6472E053"><enum>(B)</enum><header>Rule of construction</header><text>Nothing in this paragraph may be construed to—</text> 
<clause id="H3C66B9B8BB934BBC8B099D9EC92F8B89"><enum>(i)</enum><text display-inline="yes-display-inline">authorize the use of a defensive measure other than as provided in this section; or</text></clause> <clause id="H739A9081A0B64332BA1D07F211EA61A4"><enum>(ii)</enum><text>limit otherwise lawful activity.</text></clause></subparagraph></paragraph> 
<paragraph id="H5EF71D488CD64084A5244EEA81737A3A"><enum>(6)</enum><header>Privacy and civil liberties protections</header> 
<subparagraph id="H07EF998550F046F5B8727B42C3F2252A"><enum>(A)</enum><header>Policies and procedures</header> 
<clause id="H94514B807B924A32AC7392FEBAD52D31"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection shall, in coordination with the Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer of the Department, establish and annually review policies and procedures governing the receipt, retention, use, and disclosure of cyber threat indicators, defensive measures, and information related to cybersecurity risks and incidents shared with the Center in accordance with this section. Such policies and procedures shall apply only to the Department, consistent with the need to protect information systems from cybersecurity risks and incidents and mitigate cybersecurity risks and incidents in a timely manner, and shall—</text> <subclause id="H7D3627204F9B4AD09431B3D569E4216E"><enum>(I)</enum><text>be consistent with the Department’s Fair Information Practice Principles developed pursuant to section 552a of title 5, United States Code (commonly referred to as the <quote>Privacy Act of 1974</quote> or the <quote>Privacy Act</quote>), and subject to the Secretary’s authority under subsection (a)(2) of section 222 of this Act;</text></subclause> 
<subclause id="H153F8403F41D443EB052188F506748E8" commented="no"><enum>(II)</enum><text display-inline="yes-display-inline">reasonably limit, to the greatest extent practicable, the receipt, retention, use, and disclosure of cyber threat indicators and defensive measures associated with specific persons that is not necessary, for cybersecurity purposes, to protect a network or information system from cybersecurity risks or mitigate cybersecurity risks and incidents in a timely manner;</text></subclause> <subclause id="H06BF370D0C974DAA8F45AFD08616230D"><enum>(III)</enum><text>minimize any impact on privacy and civil liberties;</text></subclause> 
<subclause id="H5CC4F91F48EA4A68A4CB046CD9EF239A"><enum>(IV)</enum><text>provide data integrity through the prompt removal and destruction of obsolete or erroneous names and personal information that is unrelated to the cybersecurity risk or incident information shared and retained by the Center in accordance with this section;</text></subclause> <subclause id="HBBE747254CE74A998CE960A58A73CE97"><enum>(V)</enum><text display-inline="yes-display-inline">include requirements to safeguard cyber threat indicators and defensive measures retained by the Center, including information that is proprietary or business-sensitive that may be used to identify specific persons from unauthorized access or acquisition;</text></subclause> 
<subclause id="H33CE94B0E19C4DAA8BD72B27D4E9A5C1"><enum>(VI)</enum><text display-inline="yes-display-inline">protect the confidentiality of cyber threat indicators and defensive measures associated with specific persons to the greatest extent practicable; and</text></subclause> <subclause id="H84D8FB927F5A49C89C6D3EE888B43588"><enum>(VII)</enum><text>ensure all relevant constitutional, legal, and privacy protections are observed.</text></subclause></clause> 
<clause id="HECC88E5E4DF94529AC5D5B6C4EEBC859"><enum>(ii)</enum><header>Submission to Congress</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this section and annually thereafter, the Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department, in consultation with the Privacy and Civil Liberties Oversight Board (established pursuant to section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/42/2000ee">42 U.S.C. 2000ee</external-xref>)), shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate the policies and procedures governing the sharing of cyber threat indicators, defensive measures, and information related to cybsersecurity risks and incidents described in clause (i) of subparagraph (A).</text></clause> <clause id="HC70D8956E78C435E943F53058A11AAA9" commented="no"><enum>(iii)</enum><header>Public notice and access</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection, in consultation with the Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer of the Department, and the Privacy and Civil Liberties Oversight Board (established pursuant to section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (<external-xref legal-doc="usc" parsable-cite="usc/42/2000ee">42 U.S.C. 2000ee</external-xref>)), shall ensure there is public notice of, and access to, the policies and procedures governing the sharing of cyber threat indicators, defensive measures, and information related to cybersecurity risks and incidents.</text></clause> 
<clause id="HC8317930219A47C09B2240BCC58C94F8"><enum>(iv)</enum><header>Consultation</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection when establishing policies and procedures to support privacy and civil liberties may consult with the National Institute of Standards and Technology.</text></clause></subparagraph> <subparagraph id="H6A8CDD9B77BB46A8B63254F962E1655B"><enum>(B)</enum><header>Implementation</header><text>The Chief Privacy Officer of the Department, on an ongoing basis, shall—</text> 
<clause id="H55650945C26C4497A9B0A55737BC2756"><enum>(i)</enum><text display-inline="yes-display-inline">monitor the implementation of the policies and procedures governing the sharing of cyber threat indicators and defensive measures established pursuant to clause (i) of subparagraph (A);</text></clause> <clause id="HE2D7669B176342378749EF64182545B1"><enum>(ii)</enum><text>regularly review and update privacy impact assessments, as appropriate, to ensure all relevant constitutional, legal, and privacy protections are being followed;</text></clause> 
<clause id="H01AF376BC09B45F194CE9057B2604B20" commented="no"><enum>(iii)</enum><text display-inline="yes-display-inline">work with the Under Secretary for Cybersecurity and Infrastructure Protection to carry out paragraphs (10) and (11) of subsection (c);</text></clause> <clause id="H2DD80BFBD0A840F6A38F3295C2767F32"><enum>(iv)</enum><text display-inline="yes-display-inline">annually submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report that contains a review of the effectiveness of such policies and procedures to protect privacy and civil liberties; and</text></clause> 
<clause id="H49CD514732D142DF9EDEDA7C93043995"><enum>(v)</enum><text>ensure there are appropriate sanctions in place for officers, employees, or agents of the Department who intentionally or willfully conduct activities under this section in an unauthorized manner.</text></clause></subparagraph> <subparagraph id="H97097BE6E77A42C9A0C3F84DAAFD3BFC"><enum>(C)</enum><header>Inspector General report</header><text display-inline="yes-display-inline">The Inspector General of the Department, in consultation with the Privacy and Civil Liberties Oversight Board and the Inspector General of each Federal agency that receives cyber threat indicators or defensive measures shared with the Center under this section, shall, not later than two years after the date of the enactment of this subsection and periodically thereafter submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report containing a review of the use of cybersecurity risk information shared with the Center, including the following:</text> 
<clause id="HB3943AE15CD1447684CDC5FD9C62B522"><enum>(i)</enum><text display-inline="yes-display-inline">A report on the receipt, use, and dissemination of cyber threat indicators and defensive measures that have been shared with Federal entities under this section.</text></clause> <clause id="H673BEF83DDCD43C3A2ACAB5B55D3055E"><enum>(ii)</enum><text>Information on the use by the Center of such information for a purpose other than a cybersecurity purpose.</text></clause> 
<clause id="HE540794E79514CF481E929C36418580D"><enum>(iii)</enum><text>A review of the type of information shared with the Center under this section.</text></clause> <clause id="H03A8C9086CD349ACA991418DAE389ECD"><enum>(iv)</enum><text>A review of the actions taken by the Center based on such information.</text></clause> 
<clause id="HEE18A2262ACB489691CB2A754109FB08"><enum>(v)</enum><text>The appropriate metrics that exist to determine the impact, if any, on privacy and civil liberties as a result of the sharing of such information with the Center.</text></clause> <clause id="H08D4353C34D04693BDAFCCE56A7D9211"><enum>(vi)</enum><text>A list of other Federal agencies receiving such information.</text></clause> 
<clause id="H8B9C9F5D54424E9F9F05C2A489E66711"><enum>(vii)</enum><text>A review of the sharing of such information within the Federal Government to identify inappropriate stove piping of such information.</text></clause> <clause id="HC50AEBD339944D41AA9E286B7A9D42A5"><enum>(viii)</enum><text>Any recommendations of the Inspector General of the Department for improvements or modifications to information sharing under this section.</text></clause></subparagraph> 
<subparagraph id="H663929DE31564E609939397B1CA65A5F"><enum>(D)</enum><header>Privacy and Civil Liberties Officers report</header><text display-inline="yes-display-inline">The Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer of the Department, in consultation with the Privacy and Civil Liberties Oversight Board, the Inspector General of the Department, and the senior privacy and civil liberties officer of each Federal agency that receives cyber threat indicators and defensive measures shared with the Center under this section, shall biennially submit to the appropriate congressional committees a report assessing the privacy and civil liberties impact of the activities under this paragraph. Each such report shall include any recommendations the Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer of the Department consider appropriate to minimize or mitigate the privacy and civil liberties impact of the sharing of cyber threat indicators and defensive measures under this section.</text></subparagraph> <subparagraph id="H6A0B612912F94262856363CF2B9D7C63"><enum>(E)</enum><header>Form</header><text>Each report required under paragraphs (C) and (D) shall be submitted in unclassified form, but may include a classified annex.</text></subparagraph></paragraph> 
<paragraph id="HA8B135933BBB4B888BB1C6634DFB1346"><enum>(7)</enum><header>Uses and protection of information</header> 
<subparagraph id="H65443BEC29464319B38E3887A64CE17E"><enum>(A)</enum><header>Non-Federal entities</header><text display-inline="yes-display-inline">A non-Federal entity, not including a State, local, or tribal government, that shares cyber threat indicators or defensive measures through the Center or otherwise under this section—</text> <clause id="H730445F5F3594092AE82965DB2414853"><enum>(i)</enum><text>may use, retain, or further disclose such cyber threat indicators or defensive measures solely for cybersecurity purposes;</text></clause> 
<clause id="H2A8C847DC52643C381BE724AC794E6C3"><enum>(ii)</enum><text>shall, prior to such sharing, take reasonable efforts to remove information that can be used to identify specific persons and is reasonably believed at the time of sharing to be unrelated to a cybersecurity risk or incident, and to safeguard information that can be used to identify specific persons from unintended disclosure or unauthorized access or acquisition;</text></clause> <clause id="HD7586BED58FE478BB7BB2C15BA93C11A" commented="no"><enum>(iii)</enum><text>shall comply with appropriate restrictions that a Federal entity or non-Federal entity places on the subsequent disclosure or retention of cyber threat indicators and defensive measures that it discloses to other Federal entities or non-Federal entities;</text></clause> 
<clause id="HF31F55916436434B83D1905A9F7AF09D"><enum>(iv)</enum><text>shall be deemed to have voluntarily shared such cyber threat indicators or defensive measures;</text></clause> <clause id="H6EC1AC5FFA2A4736988646C8322FAD50"><enum>(v)</enum><text display-inline="yes-display-inline">shall implement and utilize a security control to protect against unauthorized access to or acquisition of such cyber threat indicators or defensive measures; and</text></clause> 
<clause id="HB066C7EE22FF4FB18C7AC262C6B5654B"><enum>(vi)</enum><text>may not use such information to gain an unfair competitive advantage to the detriment of any non-Federal entity.</text></clause></subparagraph> <subparagraph id="H7850710056A74406B20A6ED063AE79F2"><enum>(B)</enum><header>Federal entities</header> <clause id="HE01C0D8870B541C6A142BF0B074F46AB" commented="no"><enum>(i)</enum><header>Uses of information</header><text display-inline="yes-display-inline">A Federal entity that receives cyber threat indicators or defensive measures shared through the Center or otherwise under this section from another Federal entity or a non-Federal entity—</text> 
<subclause id="HD34F53A4ECB149BB8BEEB4EB51477E52" commented="no"><enum>(I)</enum><text>may use, retain, or further disclose such cyber threat indicators or defensive measures solely for cybersecurity purposes;</text></subclause> <subclause id="H043C6B4772324AB2BF9EE60CD48C5EF1" commented="no"><enum>(II)</enum><text>shall, prior to such sharing, take reasonable efforts to remove information that can be used to identify specific persons and is reasonably believed at the time of sharing to be unrelated to a cybersecurity risk or incident, and to safeguard information that can be used to identify specific persons from unintended disclosure or unauthorized access or acquisition;</text></subclause> 
<subclause id="H4D7C4C8002BC4F5DA621B39F4D362831" commented="no"><enum>(III)</enum><text>shall be deemed to have voluntarily shared such cyber threat indicators or defensive measures; </text></subclause> <subclause id="H1EA92E2301D54BB5BA6EACD885C73872" commented="no"><enum>(IV)</enum><text display-inline="yes-display-inline">shall implement and utilize a security control to protect against unauthorized access to or acquisition of such cyber threat indicators or defensive measures; and </text></subclause> 
<subclause id="HE0CD7E568CC047478EE77B8024FD028F"><enum>(V)</enum><text display-inline="yes-display-inline">may not use such cyber threat indicators or defensive measures to engage in surveillance or other collection activities for the purpose of tracking an individual’s personally identifiable information.</text></subclause></clause> <clause id="H5903A0D98F7348519048FD9C5A472EE2"><enum>(ii)</enum><header>Protections for information</header><text>The cyber threat indicators and defensive measures referred to in clause (i)—</text> 
<subclause id="HDBB455E9D22742799A3ED7E1E07AFA95"><enum>(I)</enum><text>are exempt from disclosure under section 552 of title 5, United States Code, and withheld, without discretion, from the public under subsection (b)(3)(B) of such section;</text></subclause> <subclause id="HB195CF8039C04406B87DE16D90A9D3B1"><enum>(II)</enum><text>may not be used by the Federal Government for regulatory purposes;</text></subclause> 
<subclause id="H127469C2A50841B7AE0BD93C2702B818"><enum>(III)</enum><text>may not constitute a waiver of any applicable privilege or protection provided by law, including trade secret protection;</text></subclause> <subclause id="HC780068FAB2D47D6A4F26E89D1F211FB" commented="no"><enum>(IV)</enum><text>shall be considered the commercial, financial, and proprietary information of the non-Federal entity referred to in clause (i) when so designated by such non-Federal entity; and</text></subclause> 
<subclause id="H3F053065C0F4402F96230828BBFE2D26" commented="no"><enum>(V)</enum><text>may not be subject to a rule of any Federal entity or any judicial doctrine regarding ex parte communications with a decisionmaking official.</text></subclause></clause></subparagraph> <subparagraph id="H11D4D480E3F5479D961F72132A3CFC0E"><enum>(C)</enum><header>State, local, or tribal government</header> <clause id="HDEF156370D164E85B995C5B16B8865A8" commented="no"><enum>(i)</enum><header>Uses of information</header><text display-inline="yes-display-inline">A State, local, or tribal government that receives cyber threat indicators or defensive measures from the Center from a Federal entity or a non-Federal entity—</text> 
<subclause id="HB25F0D6BFFF94D788F21E969C288B0BB" commented="no"><enum>(I)</enum><text display-inline="yes-display-inline">may use, retain, or further disclose such cyber threat indicators or defensive measures solely for cybersecurity purposes;</text></subclause> <subclause id="HCD25FCDE9B344FAFA59DBCCA7888C372" commented="no"><enum>(II)</enum><text>shall, prior to such sharing, take reasonable efforts to remove information that can be used to identify specific persons and is reasonably believed at the time of sharing to be unrelated to a cybersecurity risk or incident, and to safeguard information that can be used to identify specific persons from unintended disclosure or unauthorized access or acquisition;</text></subclause> 
<subclause id="H6DD57AB13D12404B831572E58F223489" commented="no"><enum>(III)</enum><text display-inline="yes-display-inline">shall consider such information the commercial, financial, and proprietary information of such Federal entity or non-Federal entity if so designated by such Federal entity or non-Federal entity;</text></subclause> <subclause id="HD1A4B16263BA47589F84A5865CCB76C3" commented="no"><enum>(IV)</enum><text>shall be deemed to have voluntarily shared such cyber threat indicators or defensive measures; and</text></subclause> 
<subclause id="HE2C99E8DDBF940FCB786D6ED126216BE" commented="no"><enum>(V)</enum><text display-inline="yes-display-inline">shall implement and utilize a security control to protect against unauthorized access to or acquisition of such cyber threat indicators or defensive measures.</text></subclause></clause> <clause id="H408AB287EE6748CEA70DF8D77BE70C4D"><enum>(ii)</enum><header>Protections for information</header><text>The cyber threat indicators and defensive measures referred to in clause (i)—</text> 
<subclause id="H4949AC69B3624268A38F5FB93EBB0E6D"><enum>(I)</enum><text>shall be exempt from disclosure under any State, local, or tribal law or regulation that requires public disclosure of information or records by a public or quasi-public entity; and</text></subclause> <subclause id="H21FBC8DF8254472BAB668F2F5D5D5438"><enum>(II)</enum><text>may not be used by any State, local, or tribal government to regulate a lawful activity of a non-Federal entity.</text></subclause></clause></subparagraph></paragraph> 
<paragraph id="H453B242D4E444E12A214329B8EDB6466"><enum>(8)</enum><header>Liability exemptions</header> 
<subparagraph id="H2BB60241377B402AAB9989DFDFFD304C"><enum>(A)</enum><header>Network awareness</header><text>No cause of action shall lie or be maintained in any court, and such action shall be promptly dismissed, against any non-Federal entity that, for cybersecurity purposes, conducts network awareness under paragraph (4), if such network awareness is conducted in accordance with such paragraph and this section.</text></subparagraph> <subparagraph id="H606F50A02D7B4C419DF2076EA7709847"><enum>(B)</enum><header>Information sharing</header><text>No cause of action shall lie or be maintained in any court, and such action shall be promptly dismissed, against any non-Federal entity that, for cybersecurity purposes, shares cyber threat indicators or defensive measures under paragraph (3), or fails to act based on such sharing, if such sharing is conducted in accordance with such paragraph and this section.</text></subparagraph> 
<subparagraph id="H9DAD66F0FE9D41A0A5B670A57C511BC9"><enum>(C)</enum><header>Willful misconduct</header> 
<clause id="H2B621551EE6B4C9C9790C2B8478963B3"><enum>(i)</enum><header>Rule of construction</header><text>Nothing in this section may be construed to—</text> <subclause id="HA40CC1EC409248D58A00802F03E1FC1F" commented="no"><enum>(I)</enum><text>require dismissal of a cause of action against a non-Federal entity that has engaged in willful misconduct in the course of conducting activities authorized by this section; or</text></subclause> 
<subclause id="H9A26DE784F5442148AB801DEDC15C89E"><enum>(II)</enum><text>undermine or limit the availability of otherwise applicable common law or statutory defenses.</text></subclause></clause> <clause id="HE9BBC68C480A49F4A1B9AB9D17577524"><enum>(ii)</enum><header>Proof of willful misconduct</header><text>In any action claiming that subparagraph (A) or (B) does not apply due to willful misconduct described in clause (i), the plaintiff shall have the burden of proving by clear and convincing evidence the willful misconduct by each non-Federal entity subject to such claim and that such willful misconduct proximately caused injury to the plaintiff.</text></clause> 
<clause id="HE1EFBDCEE41C415CABE8E331026B74C6"><enum>(iii)</enum><header>Willful misconduct defined</header><text>In this subsection, the term <quote>willful misconduct</quote> means an act or omission that is taken—</text> <subclause id="HD103B54CBAA2471D94E87B19941A6EA5"><enum>(I)</enum><text>intentionally to achieve a wrongful purpose;</text></subclause> 
<subclause id="H57C9A12ED6CF488BB84E4A7E2A65B01C"><enum>(II)</enum><text>knowingly without legal or factual justification; and</text></subclause> <subclause id="H0E9D8E0301444262B6A606ABF315D274"><enum>(III)</enum><text>in disregard of a known or obvious risk that is so great as to make it highly probable that the harm will outweigh the benefit.</text></subclause></clause></subparagraph> 
<subparagraph id="H554CD4E69B6A4D79B7286E18161433CD"><enum>(D)</enum><header>Exclusion</header><text>The term <quote>non-Federal entity</quote> as used in this paragraph shall not include a State, local, or tribal government.</text></subparagraph></paragraph> <paragraph id="HF84A7DE10FF343E7BCA25B9CD723ABE1"><enum>(9)</enum><header>Federal Government liability for violations of restrictions on the use and protection of voluntarily shared information</header> <subparagraph id="HEC2C39F095F34113A6E92C6592D47C66"><enum>(A)</enum><header>In general</header><text>If a department or agency of the Federal Government intentionally or willfully violates the restrictions specified in paragraph (3), (6), or (7)(B) on the use and protection of voluntarily shared cyber threat indicators or defensive measures, or any other provision of this section, the Federal Government shall be liable to a person injured by such violation in an amount equal to the sum of—</text> 
<clause id="H96DB40D3C6AC408FBCC4F26B57C723E6"><enum>(i)</enum><text>the actual damages sustained by such person as a result of such violation or $1,000, whichever is greater; and</text></clause> <clause id="HF4E1CAE151614311B28B0700E4DD3F81"><enum>(ii)</enum><text display-inline="yes-display-inline">reasonable attorney fees as determined by the court and other litigation costs reasonably occurred in any case under this subsection in which the complainant has substantially prevailed.</text></clause></subparagraph> 
<subparagraph id="HE220192F4FC34523A774265B0CF5D7AE"><enum>(B)</enum><header>Venue</header><text>An action to enforce liability under this subsection may be brought in the district court of the United States in—</text> <clause id="HB63E48CD65F9435B8F9A5EC18D1098FC"><enum>(i)</enum><text>the district in which the complainant resides;</text></clause> 
<clause id="H8A1EE69B3B5940718C0E4B4EE2EC7E2D"><enum>(ii)</enum><text>the district in which the principal place of business of the complainant is located;</text></clause> <clause id="HF151B13C111B4676B13B1FB2C37DE2A6"><enum>(iii)</enum><text>the district in which the department or agency of the Federal Government that disclosed the information is located; or</text></clause> 
<clause id="H3045EAD927F7458EA9476749F400BAB8"><enum>(iv)</enum><text>the District of Columbia.</text></clause></subparagraph> <subparagraph id="H0BD31CB0E0F641E09A9467F4C9EEBF27"><enum>(C)</enum><header>Statute of limitations</header><text>No action shall lie under this subsection unless such action is commenced not later than two years after the date of the violation of any restriction specified in paragraph (3), (6), or 7(B), or any other provision of this section, that is the basis for such action.</text></subparagraph> 
<subparagraph id="H3FDC69EFFDCD422E9E29B054F5724566"><enum>(D)</enum><header>Exclusive cause of action</header><text>A cause of action under this subsection shall be the exclusive means available to a complainant seeking a remedy for a violation of any restriction specified in paragraph (3), (6), or 7(B) or any other provision of this section.</text></subparagraph></paragraph> <paragraph id="H87BD7869F2E34B5696705E443E1BC8C7"><enum>(10)</enum><header>Anti-trust exemption</header> <subparagraph id="H4F1176F6E55F438FA5A9827EE468A752"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Except as provided in subparagraph (C), it shall not be considered a violation of any provision of antitrust laws for two or more non-Federal entities to share a cyber threat indicator or defensive measure, or assistance relating to the prevention, investigation, or mitigation of a cybersecurity risk or incident, for cybersecurity purposes under this Act.</text></subparagraph> 
<subparagraph id="H39E378D84FD4462AB9AFDE541701E559"><enum>(B)</enum><header>Applicability</header><text>Subparagraph (A) shall apply only to information that is shared or assistance that is provided in order to assist with—</text> <clause id="HA5C8DEA80DE6443083A8A498C13DF875"><enum>(i)</enum><text>facilitating the prevention, investigation, or mitigation of a cybersecurity risk or incident to an information system or information that is stored on, processed by, or transiting an information system; or</text></clause> 
<clause id="H2FD8A1F78F1A4A81874167FA9CEEF704"><enum>(ii)</enum><text display-inline="yes-display-inline">communicating or disclosing a cyber threat indicator or defensive measure to help prevent, investigate, or mitigate the effect of a cybersecurity risk or incident to an information system or information that is stored on, processed by, or transiting an information system.</text></clause></subparagraph> <subparagraph id="H21883963596B4022A3DFB5273DDEA718"><enum>(C)</enum><header>Prohibited conduct</header><text display-inline="yes-display-inline">Nothing in this section may be construed to permit price-fixing, allocating a market between competitors, monopolizing or attempting to monopolize a market, or exchanges of price or cost information, customer lists, or information regarding future competitive planning.</text></subparagraph></paragraph> 
<paragraph id="HDCCE510B9D614D1D93B7A0DDA500D8C6"><enum>(11)</enum><header>Construction and preemption</header> 
<subparagraph id="HC1C8F5C41DE740C4B81A3E5EFD0F2A7D" commented="no"><enum>(A)</enum><header>Otherwise lawful disclosures</header><text display-inline="yes-display-inline">Nothing in this section may be construed to limit or prohibit otherwise lawful disclosures of communications, records, or other information, including reporting of known or suspected criminal activity or participating voluntarily or under legal requirement in an investigation, by a non-Federal to any other non-Federal entity or Federal entity under this section.</text></subparagraph> <subparagraph id="H62194A023FFE46D091DE1C668C1EBAD0" commented="no"><enum>(B)</enum><header>Whistle blower protections</header><text display-inline="yes-display-inline">Nothing in this section may be construed to prohibit or limit the disclosure of information protected under section 2302(b)(8) of title 5, United States Code (governing disclosures of illegality, waste, fraud, abuse, or public health or safety threats), section 7211 of title 5, United States Code (governing disclosures to Congress), section 1034 of title 10, United States Code (governing disclosure to Congress by members of the military), section 1104 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3234">50 U.S.C. 3234</external-xref>) (governing disclosure by employees of elements of the intelligence community), or any similar provision of Federal or State law.</text></subparagraph> 
<subparagraph id="H55D4CE6EDBF74B559E52B0FAC28B7798"><enum>(C)</enum><header>Relationship to other laws</header><text display-inline="yes-display-inline">Nothing in this section may be construed to affect any requirement under any other provision of law for a non-Federal entity to provide information to a Federal entity.</text></subparagraph> <subparagraph id="HC2AA85BE1C7C4AB6B79B62DCCC4907D3"><enum>(D)</enum><header>Preservation of contractual obligations and rights</header><text>Nothing in this section may be construed to—</text> 
<clause id="HB0B81FDC665B4912855C5B98A392FF45"><enum>(i)</enum><text display-inline="yes-display-inline">amend, repeal, or supersede any current or future contractual agreement, terms of service agreement, or other contractual relationship between any non-Federal entities, or between any non-Federal entity and a Federal entity; or</text></clause> <clause id="H2C058392DCBF41C282E221086EE4C620"><enum>(ii)</enum><text>abrogate trade secret or intellectual property rights of any non-Federal entity or Federal entity.</text></clause></subparagraph> 
<subparagraph id="H4A02CC12C24F4A05A9CA1722D9EAAEA1"><enum>(E)</enum><header>Anti-tasking restriction</header><text>Nothing in this section may be construed to permit a Federal entity to—</text> <clause id="HA0B4BE9771A647CFB2359664CC47A09C"><enum>(i)</enum><text display-inline="yes-display-inline">require a non-Federal entity to provide information to a Federal entity;</text></clause> 
<clause id="H762D454AEDC44EEEA62B5FA76989FB8A"><enum>(ii)</enum><text display-inline="yes-display-inline">condition the sharing of cyber threat indicators or defensive measures with a non-Federal entity on such non-Federal entity’s provision of cyber threat indicators or defensive measures to a Federal entity; or</text></clause> <clause id="H8F62E4B097FD401DA1FCC577367E12B4"><enum>(iii)</enum><text display-inline="yes-display-inline">condition the award of any Federal grant, contract, or purchase on the sharing of cyber threat indicators or defensive measures with a Federal entity.</text></clause></subparagraph> 
<subparagraph id="HD0530899149C403DAF7637DABDD5F3D9" commented="no"><enum>(F)</enum><header>No liability for non-participation</header><text>Nothing in this section may be construed to subject any non-Federal entity to liability for choosing to not engage in the voluntary activities authorized under this section.</text></subparagraph> <subparagraph id="H04A7CE6760914F51A4960BD6E0D1E535"><enum>(G)</enum><header>Use and retention of information</header><text display-inline="yes-display-inline">Nothing in this section may be construed to authorize, or to modify any existing authority of, a department or agency of the Federal Government to retain or use any information shared under this section for any use other than permitted in this section.</text></subparagraph> 
<subparagraph id="H7E783A8A6AB14220ADBE49EDCCB5E5C7"><enum>(H)</enum><header>Voluntary sharing</header><text display-inline="yes-display-inline">Nothing in this section may be construed to restrict or condition a non-Federal entity from sharing, for cybersecurity purposes, cyber threat indicators, defensive measures, or information related to cybersecurity risks or incidents with any other non-Federal entity, and nothing in this section may be construed as requiring any non-Federal entity to share cyber threat indicators, defensive measures, or information related to cybersecurity risks or incidents with the Center.</text></subparagraph> <subparagraph id="H14CC0F1CD8954B42831F71212462CF95"><enum>(I)</enum><header>Federal preemption</header><text display-inline="yes-display-inline">This section supersedes any statute or other provision of law of a State or political subdivision of a State that restricts or otherwise expressly regulates an activity authorized under this section.</text></subparagraph></paragraph></subsection> 
<subsection id="HEB32CD40FAE14164878899E78F9D104D"><enum>(j)</enum><header>Direct reporting</header><text display-inline="yes-display-inline">The Secretary shall develop policies and procedures for direct reporting to the Secretary by the Director of the Center regarding significant cybersecurity risks and incidents.</text></subsection> <subsection id="H3C6B75806BFC4DABB9CCA70D8485B48D"><enum>(k)</enum><header>Additional responsibilities</header><text display-inline="yes-display-inline">The Secretary shall build upon existing mechanisms to promote a national awareness effort to educate the general public on the importance of securing information systems.</text></subsection> 
<subsection id="H25B739DE26A3434AAC48ABC2DB2EC9AE"><enum>(l)</enum><header>Reports on international cooperation</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this subsection and periodically thereafter, the Secretary of Homeland Security shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report on the range of efforts underway to bolster cybersecurity collaboration with relevant international partners in accordance with subsection (c)(8).</text></subsection> <subsection id="H3FE4A083622447538CD818018C157493"><enum>(m)</enum><header>Outreach</header><text display-inline="yes-display-inline">Not later than 60 days after the date of the enactment of this subsection, the Secretary, acting through the Under Secretary for Cybersecurity and Infrastructure Protection, shall—</text> 
<paragraph id="H99A24A4E95444A9FA679B59AFCE4168E"><enum>(1)</enum><text>disseminate to the public information about how to voluntarily share cyber threat indicators and defensive measures with the Center; and</text></paragraph> <paragraph id="HE5CC2D296C3545B08D99A11142987BD8"><enum>(2)</enum><text>enhance outreach to critical infrastructure owners and operators for purposes of such sharing.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section> 
<section id="H5F486D3698AB47CBA172F2CB7D6D939E"><enum>4.</enum><header>Information sharing and analysis organizations</header><text display-inline="no-display-inline">Section 212 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/131">6 U.S.C. 131</external-xref>) is amended—</text> <paragraph id="HC2FEC62D79264680A25F095DA9978408"><enum>(1)</enum><text>in paragraph (5)—</text> 
<subparagraph id="H266FE2330858488298EADA23E9819AFA"><enum>(A)</enum><text>in subparagraph (A)—</text> <clause id="H06DD56FE886D47E0B58E21342B56EB97" commented="no"><enum>(i)</enum><text>by inserting <quote>information related to cybersecurity risks and incidents and</quote> after <quote>critical infrastructure information</quote>; and</text></clause> 
<clause id="H744A07215D9744BD81A47C9C690DCCD6"><enum>(ii)</enum><text>by striking <quote>related to critical infrastructure </quote> and inserting <quote>related to cybersecurity risks, incidents, critical infrastructure, and</quote>;</text></clause></subparagraph> <subparagraph id="H2DE334DA90644185AE052BE02FABFC50"><enum>(B)</enum><text display-inline="yes-display-inline">in subparagraph (B)—</text> 
<clause id="H28A0AC2A352B4D0FBD0D17D30DE98302"><enum>(i)</enum><text>by striking <quote>disclosing critical infrastructure information </quote> and inserting <quote>disclosing cybersecurity risks, incidents, and critical infrastructure information</quote>; and</text></clause> <clause id="H442156B69377434D91F33453E2CC01F0"><enum>(ii)</enum><text display-inline="yes-display-inline">by striking <quote>related to critical infrastructure or</quote> and inserting <quote>related to cybersecurity risks, incidents, critical infrastructure, or</quote> and</text></clause></subparagraph> 
<subparagraph id="HCD05B468D2334C8886469DA990750DE8"><enum>(C)</enum><text display-inline="yes-display-inline">in subparagraph (C), by striking <quote>disseminating critical infrastructure information </quote> and inserting <quote>disseminating cybersecurity risks, incidents, and critical infrastructure information</quote>; and</text></subparagraph></paragraph> <paragraph id="H11EDF7B9FCD946C28B2332576EA625F5"><enum>(2)</enum><text>by adding at the end the following new paragraph:</text> 
<quoted-block style="OLC" id="HA09C38FA10A84D94815F9BF99C219F2D" display-inline="no-display-inline"> 
<paragraph id="H68318A55EE6A4C318BBECDF056141F4D"><enum>(8)</enum><header>Cybersecurity risk; incident</header><text display-inline="yes-display-inline">The terms <quote>cybersecurity risk</quote> and <quote>incident</quote> have the meanings given such terms in the second section 226 (relating to the National Cybersecurity and Communications Integration Center).</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section> <section id="HC30C8B3D09384C61BB0C6EF6583A259E" commented="no"><enum>5.</enum><header>Streamlining of Department of Homeland Security cybersecurity and infrastructure protection organization</header> <subsection id="H91ABD932045A4A9EA662950A52401303" commented="no"><enum>(a)</enum><header>Cybersecurity and Infrastructure Protection</header><text display-inline="yes-display-inline">The National Protection and Programs Directorate of the Department of Homeland Security shall, after the date of the enactment of this Act, be known and designated as the <quote>Cybersecurity and Infrastructure Protection</quote>. Any reference to the National Protection and Programs Directorate of the Department in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Cybersecurity and Infrastructure Protection of the Department.</text></subsection> 
<subsection id="H550DEE625158449384B80F2C84B23BD5"><enum>(b)</enum><header>Senior leadership of Cybersecurity and Infrastructure Protection</header> 
<paragraph id="H2DEABA1FC3B145649FBA9389743B70FE"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Subsection (a) of section 103 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/113">6 U.S.C. 113</external-xref>) is amended—</text> <subparagraph id="HB1F42A8B87EF40E699389447A8839E3F"><enum>(A)</enum><text>in paragraph (1)—</text> 
<clause id="H91C4F41DA1A14C4DB1ECB4980E006DD0"><enum>(i)</enum><text>by amending subparagraph (H) to read as follows:</text> <quoted-block style="OLC" id="HE32AB96C84EB46F9B0CBE451883AF799" display-inline="no-display-inline"> <subparagraph id="H5CA172E6822F47E6972C7D33D7362C4B"><enum>(H)</enum><text display-inline="yes-display-inline">An Under Secretary for Cybersecurity and Infrastructure Protection.</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause> 
<clause id="H09F81031FC79489884AEC12E0611068F"><enum>(ii)</enum><text>by adding at the end the following new subparagraphs:</text> <quoted-block style="OLC" id="H8D768CB19ED94ABD936FB293B942F98A" display-inline="no-display-inline"> <subparagraph id="H2DA067B8038B4AE583A22A282041AB47"><enum>(K)</enum><text display-inline="yes-display-inline">A Deputy Under Secretary for Cybersecurity.</text></subparagraph> 
<subparagraph id="HABF4D263C9E845F1B763C65C589F5C4A"><enum>(L)</enum><text>A Deputy Under Secretary for Infrastructure Protection.</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph> <subparagraph id="HB653DFF1D8D14C56A0B78CB3D99623B6"><enum>(B)</enum><text>by adding at the end the following new paragraph:</text> 
<quoted-block style="OLC" id="HF49B3B4248F141C5B459EBA764AED3C7" display-inline="no-display-inline"> 
<paragraph id="H0EBD6E7CB32E44CB9F36421350FA5944"><enum>(3)</enum><header>Deputy Under Secretaries</header><text display-inline="yes-display-inline">The Deputy Under Secretaries referred to in subparagraphs (K) and (L) of paragraph (1) shall be appointed by the President without the advice and consent of the Senate.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph> <paragraph id="H74891694D4774D7AA22A6BEAF43F1E7A"><enum>(2)</enum><header>Continuation in office</header><text>The individuals who hold the positions referred in subparagraphs (H), (K), and (L) of paragraph (1) of section 103(a) the Homeland Security Act of 2002 (as amended and added by paragraph (1) of this subsection) as of the date of the enactment of this Act may continue to hold such positions.</text></paragraph></subsection> 
<subsection id="H22081E9695564686B58A096F2DE7CBE5" commented="no"><enum>(c)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 90 days after the date of the enactment of this Act, the Under Secretary for Cybersecurity and Infrastructure Protection of the Department of Homeland Security shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report on the feasibility of becoming an operational component, including an analysis of alternatives, and if a determination is rendered that becoming an operational component is the best option for achieving the mission of Cybersecurity and Infrastructure Protection, a legislative proposal and implementation plan for becoming such an operational component. Such report shall also include plans to more effectively carry out the cybersecurity mission of Cybersecurity and Infrastructure Protection, including expediting information sharing agreements.</text></subsection></section> <section id="H6F52D5741EFC468CBCDD4FA579EEC799"><enum>6.</enum><header>Cyber incident response plans</header> <subsection id="HC0A56EC5EF0E4A08B2D73618D9594CF2"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 227 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/149">6 U.S.C. 149</external-xref>) is amended—</text> 
<paragraph id="HE2AA70B54BC5477F8278C6CF427949A3"><enum>(1)</enum><text>in the heading, by striking <quote><header-in-text level="section" style="OLC">plan</header-in-text></quote> and inserting <quote><header-in-text level="section" style="OLC">plans</header-in-text></quote>;</text></paragraph> <paragraph id="HBAB4E2C2EFC9479AA72D59AF4E9DA74A"><enum>(2)</enum><text>by striking <quote>The Under Secretary appointed under section 103(a)(1)(H) shall</quote> and inserting the following:</text> 
<quoted-block style="OLC" id="H4505632CDDE747AC9BE4612EC02B1FD0" display-inline="no-display-inline"> 
<subsection id="H8E51C02F86774A48A05F682EA3F6F28E"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection shall</text></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph> <paragraph id="HDE89EB5295774C8480A0987B679147C9"><enum>(3)</enum><text display-inline="yes-display-inline">by adding at the end the following new subsection:</text> 
<quoted-block style="OLC" id="H42FC3DEB21D84683AAF52787088BF471" display-inline="no-display-inline"> 
<subsection id="H6D061E6A198748AA98D695D2B1798771"><enum>(b)</enum><header>Updates to the Cyber Incident Annex to the National Response Framework</header><text display-inline="yes-display-inline">The Secretary, in coordination with the heads of other appropriate Federal departments and agencies, and in accordance with the National Cybersecurity Incident Response Plan required under subsection (a), shall regularly update, maintain, and exercise the Cyber Incident Annex to the National Response Framework of the Department.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection> <subsection id="H72CF1D2B1D0F4B9F868EEE76091A5566"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of the Homeland Security Act of 2002 is amended by amending the item relating to section 227 to read as follows:</text> 
<quoted-block style="OLC" id="H70C2CFAB25C9446DBA3EA05B09BF4B74" display-inline="no-display-inline">
<toc regeneration="no-regeneration">
<toc-entry level="section">Sec. 227. Cyber incident response plans.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section> 
<section id="H146F01AD0CF749A78F483D32FCBC55AE"><enum>7.</enum><header>Security and resiliency of public safety communications; Cybersecurity awareness campaign</header> 
<subsection id="H8FF55CC1829A4BD5AE22787F9B86DD48"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle C of title II of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/141">6 U.S.C. 141 et seq.</external-xref>) is amended by adding at the end the following new sections:</text> <quoted-block style="OLC" id="H1D558921DAF14C20BFC7F0596084897A" display-inline="no-display-inline"> <section id="HF14E544F573D4F2FA5E31471E31EE291"><enum>230.</enum><header>Security and resiliency of public safety communications</header><text display-inline="no-display-inline">The National Cybersecurity and Communications Integration Center, in coordination with the Office of Emergency Communications of the Department, shall assess and evaluate consequence, vulnerability, and threat information regarding cyber incidents to public safety communications to help facilitate continuous improvements to the security and resiliency of such communications.</text></section> 
<section id="H9B246B7A6D75443D8A258E236FA8F1DD"><enum>231.</enum><header>Cybersecurity awareness campaign</header> 
<subsection id="H72D8A0F9F01C4081B905A864A0BAD2A9"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection shall develop and implement an ongoing and comprehensive cybersecurity awareness campaign regarding cybersecurity risks and voluntary best practices for mitigating and responding to such risks. Such campaign shall, at a minimum, publish and disseminate, on an ongoing basis, the following:</text> <paragraph id="HCBBE3698A1BC44939BD6CCE5692A34A9"><enum>(1)</enum><text>Public service announcements targeted at improving awareness among State, local, and tribal governments, the private sector, academia, and stakeholders in specific audiences, including the elderly, students, small businesses, members of the Armed Forces, and veterans.</text></paragraph> 
<paragraph id="H7D7CB0D3EBD54CFCBC0812C4B41FDD29"><enum>(2)</enum><text>Vendor and technology-neutral voluntary best practices information.</text></paragraph></subsection> <subsection id="H97ED31AE39554041B977A7A80E7B8269"><enum>(b)</enum><header>Consultation</header><text>The Under Secretary for Cybersecurity and Infrastructure Protection shall consult with a wide range of stakeholders in government, industry, academia, and the non-profit community in carrying out this section. </text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection> 
<subsection id="HBB6454BC17DE4D919B4A2516C704B128"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of the Homeland Security Act of 2002 is amended by inserting after the item relating to section 226 (relating to cybersecurity recruitment and retention) the following new items:</text> <quoted-block style="OLC" id="H41823FBCC11F4FE8AB55D82838248DD5" display-inline="no-display-inline"> <toc regeneration="no-regeneration"> <toc-entry level="section">Sec. 230. Security and resiliency of public safety communications.</toc-entry> <toc-entry level="section">Sec. 231. Cybersecurity awareness campaign.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section> <section id="HE9B13CD4921942FFAAA2143697E12A1A"><enum>8.</enum><header>Critical infrastructure protection research and development</header> <subsection id="HC5BF0624EF824D5297188CFA9DBDC28A"><enum>(a)</enum><header>Strategic plan; Public-private consortiums</header><text>Title III of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/181">6 U.S.C. 181 et seq.</external-xref>) is amended by adding at the end the following new section:</text> 
<quoted-block id="H6A97ECCF94864576B40C8ACBF76049E0" style="OLC"> 
<section id="H5AAE31DBEB9D4E3FBC1B8A2A86B95ECB"><enum>318.</enum><header>Research and development strategy for critical infrastructure protection</header> 
<subsection id="H93B28D7978E14F71A1FC82FDD192E106"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this section, the Secretary, acting through the Under Secretary for Science and Technology, shall submit to Congress a strategic plan to guide the overall direction of Federal physical security and cybersecurity technology research and development efforts for protecting critical infrastructure, including against all threats. Such plan shall be updated and submitted to Congress every two years.</text></subsection> <subsection id="HFDE8DC6127A74F2AB92B3F8AA90AEEB9"><enum>(b)</enum><header>Contents of plan</header><text>The strategic plan, including biennial updates, required under subsection (a) shall include the following:</text> 
<paragraph id="HA3F55AA797D745C6A4A73B00C0A9B039"><enum>(1)</enum><text>An identification of critical infrastructure security risks and any associated security technology gaps, that are developed following—</text> <subparagraph id="H2CFBABE3775D4E1CB8E38EA131B81C90"><enum>(A)</enum><text>consultation with stakeholders, including critical infrastructure Sector Coordinating Councils; and</text></subparagraph> 
<subparagraph id="HBAFE55046B7A4774892D4BF03AA3343E"><enum>(B)</enum><text>performance by the Department of a risk and gap analysis that considers information received in such consultations.</text></subparagraph></paragraph> <paragraph id="H5B73E28B445348749482031C829598CE"><enum>(2)</enum><text>A set of critical infrastructure security technology needs that—</text> 
<subparagraph id="H7E5E6D93DAF6465FAC5DF69B56199234"><enum>(A)</enum><text>is prioritized based on the risks and gaps identified under paragraph (1);</text></subparagraph> <subparagraph id="HE81BF13E781641BF94921FC9FE96EA33"><enum>(B)</enum><text>emphasizes research and development of technologies that need to be accelerated due to rapidly evolving threats or rapidly advancing infrastructure technology; and</text></subparagraph> 
<subparagraph id="H375A2C2963C749208E198634D0244046"><enum>(C)</enum><text>includes research, development, and acquisition roadmaps with clearly defined objectives, goals, and measures.</text></subparagraph></paragraph> <paragraph id="H3539A0E9EEEB4316B2A3460103FF6BAA"><enum>(3)</enum><text>An identification of laboratories, facilities, modeling, and simulation capabilities that will be required to support the research, development, demonstration, testing, evaluation, and acquisition of the security technologies described in paragraph (2).</text></paragraph> 
<paragraph id="H7A0B38673B8F440F966D993CD26848D9"><enum>(4)</enum><text>An identification of current and planned programmatic initiatives for fostering the rapid advancement and deployment of security technologies for critical infrastructure protection, including a consideration of opportunities for public-private partnerships, intragovernment collaboration, university centers of excellence, and national laboratory technology transfer.</text></paragraph> <paragraph id="H058B7AD73A394EAC8C91A32BDCB93811"><enum>(5)</enum><text>A description of progress made with respect to each critical infrastructure security risk, associated security technology gap, and critical infrastructure technology need identified in the preceding strategic plan required under subsection (a).</text></paragraph></subsection> 
<subsection id="H260194BD5DD04088B6D234D11432553B"><enum>(c)</enum><header>Coordination</header><text>In carrying out this section, the Under Secretary for Science and Technology shall coordinate with the Under Secretary for the National Protection and Programs Directorate.</text></subsection> <subsection id="H6B1004FEE27643EC97D091874FBA79A0"><enum>(d)</enum><header>Consultation</header><text>In carrying out this section, the Under Secretary for Science and Technology shall consult with—</text> 
<paragraph id="HB2A430DE8C844166842D3CBA11149270"><enum>(1)</enum><text>critical infrastructure Sector Coordinating Councils;</text></paragraph> <paragraph id="H09F31F1291BC43F198CB9FDDA9FC1125"><enum>(2)</enum><text>to the extent practicable, subject matter experts on critical infrastructure protection from universities, colleges, national laboratories, and private industry;</text></paragraph> 
<paragraph id="HB1008EE6CAB648F391959682C1E4C868"><enum>(3)</enum><text>the heads of other relevant Federal departments and agencies that conduct research and development relating to critical infrastructure protection; and</text></paragraph> <paragraph id="HE46796F69AD44FB1BE3356E6C2C2243C"><enum>(4)</enum><text>State, local, and tribal governments, as appropriate.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection> 
<subsection id="H597E5F489A46401AA23CC21C6DAA4F15"><enum>(b)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of contents of the Homeland Security Act of 2002 is amended by inserting after the item relating to section 317 the following new item:</text> <quoted-block style="OLC" id="H0DE9914C82554D31BAD6B2DF12ABB679" display-inline="no-display-inline"> <toc regeneration="no-regeneration"> <toc-entry level="section">Sec. 318. Research and development strategy for critical infrastructure protection.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section> <section id="HA5AEEB55286D470AA4DBA8C9037767B2"><enum>9.</enum><header>Report on reducing cybersecurity risks in DHS data centers</header><text display-inline="no-display-inline">Not later than one year after the date of the enactment of this Act, the Secretary of Homeland Security shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report on the feasibility of the Department of Homeland Security creating an environment for the reduction in cybersecurity risks in Department data centers, including by increasing compartmentalization between systems, and providing a mix of security controls between such compartments.</text></section> 
<section id="HA7DC5266F41A4DF485BBD3914D7232AE"><enum>10.</enum><header>Assessment</header><text display-inline="no-display-inline">Not later than two years after the date of the enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report that contains an assessment of the implementation by the Secretary of Homeland Security of this Act and the amendments made by this Act and, to the extent practicable, findings regarding increases in the sharing of cyber threat indicators, defensive measures, and information relating to cybersecurity risks and incidents at the National Cybersecurity and Communications Integration Center and throughout the United States.</text></section> <section id="H9A8AFA44FE7748F092F8FA9D66567D8E"><enum>11.</enum><header>Consultation</header><text display-inline="no-display-inline">The Under Secretary for Cybersecurity and Infrastructure Protection shall produce a report on the feasibility of creating a risk-informed prioritization plan should multiple critical infrastructures experience cyber incidents simultaneously.</text></section> 
<section id="H8FD773974381474D98D674DA15DD8E50"><enum>12.</enum><header>Technical assistance</header><text display-inline="no-display-inline">The Inspector General of the Department of Homeland Security shall review the operations of the United States Computer Emergency Readiness Team (US-CERT) and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) to assess the capacity to provide technical assistance to non-Federal entities and to adequately respond to potential increases in requests for technical assistance.</text></section> <section id="H84560DA98BD64EAC8918503717CDBE2B" commented="no"><enum>13.</enum><header>Prohibition on new regulatory authority</header><text display-inline="no-display-inline">Nothing in this Act or the amendments made by this Act may be construed to grant the Secretary of Homeland Security any authority to promulgate regulations or set standards relating to the cybersecurity of non-Federal entities, not including State, local, and tribal governments, that was not in effect on the day before the date of the enactment of this Act.</text></section> 
<section id="HDBD9306721F04665B2794DD886B17FDE"><enum>14.</enum><header>Sunset</header><text display-inline="no-display-inline">Any requirements for reports required by this Act or the amendments made by this Act shall terminate on the date that is seven years after the date of the enactment of this Act.</text></section> <section id="HF9D46EC80BC5401D8968554433F07234"><enum>15.</enum><header>Prohibition on new funding</header><text display-inline="no-display-inline">No funds are authorized to be appropriated to carry out this Act and the amendments made by this Act. This Act and such amendments shall be carried out using amounts appropriated or otherwise made available for such purposes.</text></section> 
</legis-body> 
<endorsement display="yes">
<action-date date="20150417">April 17, 2015</action-date>
<action-desc>Reported with an amendment, committed to the Committee of the Whole House on the State of the Union, and ordered to be printed</action-desc></endorsement>
</bill> 


