<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-Senate" bill-type="olc" dms-id="A1" public-private="public"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>116 S734 RS: Internet of Things Cybersecurity Improvement Act of 2019</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2019-03-11</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 215</calendar><congress>116th CONGRESS</congress><session>1st Session</session><legis-num>S. 734</legis-num><associated-doc role="report">[Report No. 116–112]</associated-doc><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20190311">March 11, 2019</action-date><action-desc><sponsor name-id="S327">Mr. Warner</sponsor> (for himself, <cosponsor name-id="S377">Mr. Gardner</cosponsor>, <cosponsor name-id="S388">Ms. Hassan</cosponsor>, <cosponsor name-id="S375">Mr. Daines</cosponsor>, <cosponsor name-id="S385">Ms. Cortez Masto</cosponsor>, and <cosponsor name-id="S381">Mr. Rounds</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name added-display-style="italic" committee-id="SSGA00" deleted-display-style="strikethrough">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><action stage="Reported-in-Senate"><action-date>September 23, 2019</action-date><action-desc>Reported by <sponsor name-id="S345">Mr. Johnson</sponsor>, with an amendment</action-desc><action-instruction>Strike out all after the enacting clause and insert the part printed in italic</action-instruction></action><legis-type>A BILL</legis-type><official-title>To leverage Federal Government procurement power to encourage increased cybersecurity for Internet
			 of Things devices, and for other purposes. </official-title></form>
	<legis-body display-enacting-clause="yes-display-enacting-clause" id="HE9CE1CF8F10B48038671CA843121C21B" style="OLC">
 <section changed="deleted" committee-id="SSGA00" id="HD20BF0D04778468BAC3993546CC8142A" reported-display-style="strikethrough" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Internet of Things Cybersecurity Improvement Act of 2019</short-title></quote> or the <quote><short-title>IoT Cybersecurity Improvement Act of 2019</short-title></quote>.</text> </section><section changed="deleted" committee-id="SSGA00" id="H73F98E811EB0479A965A23B686C47889" reported-display-style="strikethrough"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
 <paragraph id="HE52A7774B86848978F1577A087213D14"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> has the meaning given such term in section 3502 of title 44, United States Code.</text> </paragraph><paragraph id="H57A224B338E24972B666653890D69477"><enum>(2)</enum><header>Covered device</header> <subparagraph id="H88A31C1545CC4BD384BC1CC825A077BA"><enum>(A)</enum><header>In general</header><text>The term <term>covered device</term> means a physical object that—</text>
 <clause id="H39063AA8B29041A988AD79844FB654AA"><enum>(i)</enum><text>is capable of connecting to and is in regular connection with the Internet;</text> </clause><clause id="H645C0CE4F2D44407BAB02FD5DAAC946B"><enum>(ii)</enum><text>has computer processing capabilities that can collect, send, or receive data; and</text>
 </clause><clause id="HFD8D836CA9DE43D0A6EDF252812F4A63"><enum>(iii)</enum><text>is not a general-purpose computing device, including personal computing systems, smart mobile communications devices, programmable logic controls, and mainframe computing systems.</text>
 </clause></subparagraph><subparagraph id="H83F833F6B5384074BEDCC75EBD8D797C"><enum>(B)</enum><header>Modification of definition</header><text>The Director of the Office of Management and Budget shall establish a process by which—</text> <clause id="H13A3012DFC304507810385617C7FE12A"><enum>(i)</enum><text>interested parties may petition for a device that is not described in subparagraph (A) to be considered a device that is not a covered device; and</text>
 </clause><clause id="HDBFFA22FA7F14E008E604DF30C681385"><enum>(ii)</enum><text>the Director acts upon any petition submitted under clause (i) in a timely manner.</text> </clause></subparagraph></paragraph><paragraph id="H34D17D2BDFCD43C787412705CE5F448E"><enum>(3)</enum><header>Security vulnerability</header><text display-inline="yes-display-inline">The term <term>security vulnerability</term> means any attribute of hardware, firmware, software, or combination of 2 or more of these factors that could enable the compromise of the confidentiality, integrity, or availability of an information system or its information or physical devices to which it is connected.</text>
			</paragraph></section><section changed="deleted" committee-id="SSGA00" id="H4E2950B2D8AE4915B7CF25F50EE11775" reported-display-style="strikethrough"><enum>3.</enum><header>National Institute of Standards and Technology considerations and recommendations regarding
			 managing Internet of Things cybersecurity risks</header>
			<subsection id="H446AB0FDE0CD44C78003D4EECF322CB1"><enum>(a)</enum><header>Completion of ongoing efforts relating to considerations for managing internet of things
			 cybersecurity risks</header>
 <paragraph id="H522CFDE9B70E4CE999A6976B811744D9"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Director of the National Institute of Standards and Technology shall ensure that the efforts of the Institute in effect on the date of the enactment of this Act regarding considerations for managing Internet of Things cybersecurity risks, especially regarding examples of possible cybersecurity capabilities of Internet of Things devices, are completed no later than September 30, 2019.</text>
 </paragraph><paragraph id="H699DEFF0D90B4AC2AC2F07B4F443BF23"><enum>(2)</enum><header>Matters addressed</header><text>In ensuring efforts are completed under paragraph (1), the Director shall also ensure that such efforts address, at a minimum, the following considerations for covered devices:</text>
 <subparagraph id="H46A132ECD4F245B3B7B556CDA5B48CB1"><enum>(A)</enum><text display-inline="yes-display-inline">Secure Development.</text> </subparagraph><subparagraph id="H24EBC809A7F746828B728D86C0BC5370"><enum>(B)</enum><text display-inline="yes-display-inline">Identity management.</text>
 </subparagraph><subparagraph id="HE7B7BA34A5774129BB1289D20FD08C9D"><enum>(C)</enum><text display-inline="yes-display-inline">Patching.</text> </subparagraph><subparagraph id="HF91B5EBFE5F441CFBD19FA2CCE97DB1D"><enum>(D)</enum><text display-inline="yes-display-inline">Configuration management.</text>
					</subparagraph></paragraph></subsection><subsection id="HDFDC8B43B20D4AEF9DEC1F60ACCA01E3"><enum>(b)</enum><header>Development of recommended standards for use of internet of things devices by Federal Government</header>
 <paragraph id="H7669A6A6CBAB4117856D21BACC014E69"><enum>(1)</enum><header>In general</header><text>Not later than March 31, 2020, the Director of the Institute shall develop recommendations for the Federal Government on the appropriate use and management by the Federal Government of Internet of Things devices owned or controlled by the Federal Government, including minimum information security requirements for managing cybersecurity risks associated with such devices.</text>
 </paragraph><paragraph id="H66826937752E4BA7AA2F5F0229E87788"><enum>(2)</enum><header>Consistency with ongoing efforts</header><text>The Director of the Institute shall ensure that the recommendations and standards developed under paragraph (1) are consistent with the efforts referred to in subsection (a), especially with respect to the examples of possible cybersecurity capabilities referred to in such subsection.</text>
				</paragraph></subsection><subsection id="H9E33D15A3989444C8FBE64427C4128D4"><enum>(c)</enum><header> Institute Report on cybersecurity considerations stemming from the convergence of Information
			 Technology, Internet of Things, and Operational Technology devices,
 networks and systems</header><text display-inline="yes-display-inline">Not later than 180 days following the enactment of this Act, the Director of the Institute shall publish a draft report related to the increasing convergence of traditional Information Technology devices, networks, and systems with Internet of Things devices, networks and systems and Operational Technology devices, networks and systems, including considerations for managing cybersecurity risks associated with such trends.</text>
			</subsection></section><section changed="deleted" committee-id="SSGA00" id="HF2492B6A2CF44F608C6704B2A2ACC5DE" reported-display-style="strikethrough"><enum>4.</enum><header>Policies for Federal agencies on use and management of Internet of Things devices</header>
 <subsection id="HABB96FDF68D6458E8563A4234806771C"><enum>(a)</enum><header>Revisions to the federal acquisition regulation</header><text>Not later than 180 days after the date on which the Director of the National Institute of Standards and Technology completes the development of the recommendations required under section 3(b), the Director of the Office of Management and Budget shall issue guidelines for each agency that are consistent with such recommendations.</text>
 </subsection><subsection id="H13BEC4C940404259AD30FA0C2A847CE4"><enum>(b)</enum><header>Requirement</header><text>In issuing the guidelines required under subsection (a), the Director of the Office of Management and Budget shall ensure that the guidelines are consistent with the information security requirements in subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code.</text>
 </subsection><subsection id="H22E3BCDC2C6E4FFB82CB5C5C689E44AD"><enum>(c)</enum><header>Quinquennial reviews and revisions</header><text>Not less frequently than once every 5 years—</text> <paragraph id="H9DFEA9C8499B4462BA8F33E3D22EF30C"><enum>(1)</enum><text>the Director of the Office of Management and Budget and the Director of the National Institute of Standards and Technology shall review the policies issued under subsection (a); and</text>
 </paragraph><paragraph id="HD0B9299CECFE41068EF6DFE54465918E"><enum>(2)</enum><text>the Director of the Office of Management and Budget shall, in consultation with the Director of the National Institute of Standards and Technology, revise such policies.</text>
				</paragraph></subsection></section><section changed="deleted" committee-id="SSGA00" id="HC2C2F151BBED44FA960BFB92B2A0DE2E" reported-display-style="strikethrough"><enum>5.</enum><header>National Institute of Standards and Technology guidance on coordinated disclosure of security
			 vulnerabilities relating to Internet of Things devices</header>
 <subsection id="H9403BC84D717488E8EEDAC5224DC04F2"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of the National Institute of Standards and Technology shall, in consultation with such cybersecurity researchers and private-sector industry experts as the Director considers appropriate, publish guidance on policies and procedures for the reporting, coordinating, publishing, and receiving of information about—</text>
 <paragraph id="H268E6501A0AC4870884A43652DDF7A8C"><enum>(1)</enum><text>a security vulnerability relating to a covered device used by the Federal Government; and</text> </paragraph><paragraph id="H0F381452FD064F9681D181648FAAAAB1"><enum>(2)</enum><text>the resolution of such security vulnerability.</text>
 </paragraph></subsection><subsection id="H79870A83BA8141BF944CB680B94A2B52"><enum>(b)</enum><header>Elements</header><text>The guidance published under subsection (a) shall include the following:</text> <paragraph id="HF85F0ED7ECC34D618449A9241FEBED9C"><enum>(1)</enum><text>Policies and procedures described in subsection (a) that, to the maximum extent practicable, are aligned with Standards 29147 and 30111 of the International Standards Organization, or any successor standards. Such policies and procedures shall include policies and procedures for a contractor or vendor providing a covered device to the Federal Government on—</text>
 <subparagraph id="H51772B8374A7478C8F8231454AEA3FB1"><enum>(A)</enum><text>receiving information about a potential security vulnerability relating to the covered device; and</text> </subparagraph><subparagraph id="H78D02C3D50514280AB9A8AEA44DA27AC"><enum>(B)</enum><text>disseminating information about the resolution of a security vulnerability relating to the covered device.</text>
 </subparagraph></paragraph><paragraph id="HCE980AF616B3467891EF7B3D5E151D7E"><enum>(2)</enum><text>Guidance, including example content, on the information items that should be produced through the implementation of the security vulnerability disclosure process of the contractor.</text>
				</paragraph></subsection></section><section changed="deleted" committee-id="SSGA00" id="H7E32CBC613474BA788A7E33F2C0C6B0C" reported-display-style="strikethrough"><enum>6.</enum><header>Guidelines for Federal agencies on coordinated disclosure of security vulnerabilities relating to
			 Internet of Things devices</header>
 <subsection id="HF81DB15336BD4896AE053422703C26C3"><enum>(a)</enum><header>Agency guidelines required</header><text>Not later than 180 days after the date on which the guidance required under section 4 is published, the Director of the Office of Management and Budget shall, in consultation with the Administrator of the General Services Administration, issue guidelines for each agency on reporting, coordinating, publishing, and receiving information about—</text>
 <paragraph id="HE78409C3685D408DA8C577B22AD76E08"><enum>(1)</enum><text>a security vulnerability relating to a covered device used by the agency; and</text> </paragraph><paragraph id="H46D440AFC4084D9AB3CDC1B8469D6C43"><enum>(2)</enum><text>the resolution of such security vulnerability.</text>
 </paragraph></subsection><subsection id="H2ACBD778573F48F5B43AD5D80EF19C51"><enum>(b)</enum><header>Contractor and vendor compliance with National Institute of Standards and Technology guidance</header><text>The guidelines required by subsection (a) shall include a limitation that prohibits an agency from acquiring or using any covered device from a contractor or vendor if the contractor or vendor fails to comply with the guidance published under section 5(a).</text>
 </subsection><subsection id="HEBFD135247504E729588C3B090A7B59E"><enum>(c)</enum><header>Consistency with guidance from National Institute of Standards and Technology</header><text>The Director shall ensure that the guidelines issued under subsection (a) are consistent with the guidance published under section 5(a).</text></subsection></section></legis-body>
	<legis-body display-enacting-clause="no-display-enacting-clause">
 <section changed="added" commented="no" committee-id="SSGA00" display-inline="no-display-inline" id="id30af2a54-2221-4265-a4ca-5dbda8a28005" reported-display-style="italic" section-type="section-one"><enum>1.</enum><header display-inline="yes-display-inline">Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Internet of Things Cybersecurity Improvement Act of 2019</short-title></quote> or the <quote><short-title>IoT Cybersecurity Improvement Act of 2019</short-title></quote>.</text> </section><section changed="added" committee-id="SSGA00" id="id470c04f4-1aa0-4060-933b-e2e145c1f48c" reported-display-style="italic"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
 <paragraph id="idd969aa1e-bd0b-484c-9cb5-7f86312b81e0"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> has the meaning given such term in section 3502 of title 44, United States Code.</text> </paragraph><paragraph id="id4B7573D2DC334ACB999476E25E933A98"><enum>(2)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the National Institute of Standards and Technology.</text>
 </paragraph><paragraph id="id2C9AF55D7C3B476CAADE7F35C4BCDD54"><enum>(3)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text> </paragraph><paragraph id="id8CD4FE8095E8452BACAC8C3E23D873F2"><enum>(4)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Homeland Security.</text>
 </paragraph><paragraph id="id29696c6f-3b93-4a3d-ba6f-edc35a224877"><enum>(5)</enum><header>Security vulnerability</header><text display-inline="yes-display-inline">The term <term>security vulnerability</term> has the meaning given the term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text>
			</paragraph></section><section changed="added" committee-id="SSGA00" id="idd6f4b232-93c5-4310-9eec-24631b3de12c" reported-display-style="italic"><enum>3.</enum><header>National Institute of Standards and Technology considerations and recommendations regarding
			 managing Internet of Things cybersecurity risks</header>
			<subsection id="idd183ddb1-1791-4a43-954f-16a3dcea18c1"><enum>(a)</enum><header>Development of recommended guidelines for use of internet of things devices by
			 Federal Government</header>
 <paragraph id="idd2e53845-56f5-4df1-896c-b6925cd8d3b9"><enum>(1)</enum><header>In general</header><text>Not later than March 31, 2020, the Director shall develop standards and guidelines for the Federal Government on the appropriate use and management by the Federal Government of Internet of Things devices owned or controlled by the Federal Government, including minimum information security requirements for managing cybersecurity risks associated with such devices.</text>
 </paragraph><paragraph id="ida4779249-f7a1-4705-9773-acb80481b70b"><enum>(2)</enum><header>Consistency with ongoing efforts</header><text>The Director shall ensure that the standards and guidelines developed under paragraph (1) are consistent with the efforts of the National Institute of Standards and Technology in effect on the date of enactment of this Act regarding considerations for managing Internet of Things cybersecurity risks, especially regarding examples of possible cybersecurity capabilities of Internet of Things devices, and in particular with respect to the following considerations for Internet of Things devices:</text>
 <subparagraph commented="no" id="id6fede14c17cd4ed2b4824cbabc0f6a2d"><enum>(A)</enum><text>Secure development.</text> </subparagraph><subparagraph commented="no" id="id46decd9825054d88876aa3b6f87dee7c"><enum>(B)</enum><text>Identity management.</text>
 </subparagraph><subparagraph commented="no" id="id8d39911628b2454fad289a8aa0014c22"><enum>(C)</enum><text>Patching.</text> </subparagraph><subparagraph commented="no" id="id69d08961b0f540368f649b5bb1a08e81"><enum>(D)</enum><text>Configuration management.</text>
					</subparagraph></paragraph></subsection><subsection id="idd10876c6-e845-426d-b8ab-3306b7a8ba78"><enum>(b)</enum><header> Institute Report on cybersecurity considerations stemming from the convergence of Information
			 Technology, Internet of Things, and Operational Technology devices,
 networks, and systems</header><text display-inline="yes-display-inline">Not later than 180 days after the date of enactment of this Act, the Director shall brief the appropriate committees of Congress on the increasing convergence of traditional information technology devices, networks, and systems with Internet of Things devices, networks, and systems and operational technology devices, networks, and systems, including considerations for managing cybersecurity risks and security vulnerabilities associated with such trends.</text>
			</subsection></section><section changed="added" committee-id="SSGA00" id="idc4618568-92db-4233-a4e7-9bb58d2e9ca7" reported-display-style="italic"><enum>4.</enum><header>Policies and principles for Federal agencies on use and
			 management of Internet of Things devices</header>
 <subsection id="id9010374f-3c76-4eb8-b985-435b90fe9627"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date on which the Director completes the development of the standards and guidelines required under section 3(a), the Director of the Office of Management and Budget, in consultation with the Secretary, shall issue policies and principles for each agency that are consistent with such standards and guidelines.</text>
 </subsection><subsection id="ide18231e0-e3e6-4cf0-9e23-87d559752624"><enum>(b)</enum><header>Requirement</header><text>In issuing the policies, principles, standards, or guidelines required under subsection (a), the Director of the Office of Management and Budget, in consultation with the Secretary, shall ensure that the policies and principles are consistent with the information security requirements in subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code.</text>
 </subsection><subsection id="id04e17b28-161a-47bf-8b10-8781843d8e5c"><enum>(c)</enum><header>Reviews and revisions</header><text>The Director of the Office of Management and Budget, in consultation with the Secretary, shall—</text>
 <paragraph id="id51DC9A017E75435EB1E2CE11EA768A89"><enum>(1)</enum><text>review any policies, principles, standards, or guidelines issued under subsection (a); and</text>
 </paragraph><paragraph id="ida6bc7704-55b1-44a2-8fbe-563a018a56a6"><enum>(2)</enum><text>revise such policies, principles, standards, and guidelines.</text> </paragraph></subsection></section><section changed="added" committee-id="SSGA00" id="idc1a71e66-e190-4fb4-889c-627a8acb145f" reported-display-style="italic"><enum>5.</enum><header>Guidelines on coordinated disclosure of security vulnerabilities relating to information systems, including Internet of Things devices</header> <subsection id="id57c3c0d8-43f2-4fa3-9496-e432e8de1ed1"><enum>(a)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act, the Director, in consultation with such cybersecurity researchers and private-sector industry experts as the Director considers appropriate, and in consultation with the Secretary, shall publish guidelines for the reporting, coordinating, publishing, and receiving of information about—</text>
 <paragraph id="id192f9821-def7-4ef8-8d5a-f1ba3b5999ec"><enum>(1)</enum><text>a security vulnerability relating to agency information systems, including Internet of Things devices; and</text>
 </paragraph><paragraph id="idab1e0879-5a09-4d9e-812b-c6340216199e"><enum>(2)</enum><text>the resolution of such security vulnerability.</text> </paragraph></subsection><subsection id="id445cfad0a8cd42da92694635f4732d72"><enum>(b)</enum><header>Elements</header><text>The guidelines published under subsection (a) shall—</text>
 <paragraph id="ide0d52fdc79024ffda4147f72e33b67f8"><enum>(1)</enum><text>to the maximum extent practicable, be aligned with industry best practices and Standards 29147 and 30111 of the International Standards Organization, or any successor standards; and</text>
 </paragraph><paragraph id="id16eba693a9754cd68e67fa88f854505a"><enum>(2)</enum><text>incorporate guidelines on—</text> <subparagraph id="id617f292442fb4b0cbb8efc218a3a0817"><enum>(A)</enum><text>receiving information about a potential security or personal information vulnerability relating to agency information systems, and when relevant, Internet of Things devices; and</text>
 </subparagraph><subparagraph id="ida25047044b504e8cb634111c772f048d"><enum>(B)</enum><text>disseminating information about the resolution of a security or personal information vulnerability relating to agency information systems, and when relevant, Internet of Things devices.</text>
 </subparagraph></paragraph></subsection><subsection id="idd4beda7c-3905-4eab-9894-a4e6a15cdc4f"><enum>(c)</enum><header>Information items</header><text>The guidelines published under subsection (a) shall include guidelines, including example content, on the information items that should be produced through the implementation of the security vulnerability disclosure process of a contractor or vendor providing Internet of Things devices to the Federal Government.</text>
 </subsection><subsection id="id04a8932c5e8d4680851150f19366893c"><enum>(d)</enum><header>Oversight</header><text>The Director of the Office of Management and Budget shall oversee the implementation of the guidelines published under subsection (a).</text>
 </subsection><subsection id="id56cfbba2a0224e5b9eba1e15e330c05f"><enum>(e)</enum><header>Operational and technical assistance</header><text>The Secretary shall provide operational and technical assistance in implementing the guidelines published under subsection (a).</text>
			</subsection></section><section changed="added" committee-id="SSGA00" id="idf0ecf094-6aa1-486a-8448-e685cf583534" reported-display-style="italic"><enum>6.</enum><header>Implementation of coordinated disclosure of security vulnerabilities relating to
			 agency information systems, including Internet of Things devices</header>
 <subsection id="id338bdca8-e817-44f0-aea6-45790809877a"><enum>(a)</enum><header>Agency guidelines required</header><text>Not later than 180 days after the date on which the Director publishes guidelines under section 5(a), the Director of the Office of Management and Budget shall issue policies and principles on security vulnerabilities of information systems, including Internet of Things devices.</text>
 </subsection><subsection id="id4BF2F076CF5047BBB8AFB49FF5710089"><enum>(b)</enum><header>Procedures</header><text>The Secretary, in consultation with the Director of the Office of Management and Budget, shall develop and issue procedures for each agency on reporting, coordinating, publishing, and receiving information about security vulnerabilities of information systems, including Internet of Things devices.</text>
 </subsection><subsection id="id861a7d32-7a61-4895-9bb9-1cf6c2b76c08"><enum>(c)</enum><header>Contractor and vendor compliance with policies and procedures</header><text>The procedures required under subsection (b) shall include a limitation that prohibits an agency from acquiring or using any Internet of Things device from a contractor or vendor if the contractor or vendor fails to comply with the guidelines published under section 5(a).</text>
 </subsection><subsection commented="no" display-inline="no-display-inline" id="ida25c0e1d-2afa-4852-9730-6fbcbc97e234"><enum>(d)</enum><header>Consistency with guidelines from National Institute of Standards and Technology</header><text>The Secretary shall ensure that the procedures required under subsection (b) are consistent with applicable standards and publications established by the National Institute of Standards and Technology.</text>
 </subsection></section><section changed="added" committee-id="SSGA00" id="id7ecd83bf98914518acde95a83cdc1712" reported-display-style="italic"><enum>7.</enum><header>Waiver</header><text display-inline="no-display-inline">The head of an agency may use an Internet of Things device without regard to any policies, principles, standards, or guidelines issued under this Act if the use of the Internet of Things device is—</text>
 <paragraph id="id1cf8de67e90a45eabf340e760cc54509"><enum>(1)</enum><text>necessary for national security or for research purposes;</text> </paragraph><paragraph id="idcf384873844e41e1a4e091948fafd50b"><enum>(2)</enum><text>appropriate to the function of the covered device;</text>
 </paragraph><paragraph id="idc9ca924501a7401198581c0e6711dcb1"><enum>(3)</enum><text>secured using alternative and effective methods; or</text> </paragraph><paragraph id="id4d04f03c70b74247ad879471bde620e2"><enum>(4)</enum><text>of substantially higher quality or affordability than a product that meets such policies, principles, standards, or guidelines.</text></paragraph></section></legis-body><endorsement><action-date>September 23, 2019</action-date><action-desc>Reported with an amendment</action-desc></endorsement></bill>


