<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HE0EC0BC6833645F58C45A02E743B953A" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 1091 IH: Protect Our Universities Act of 2021</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-02-18</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 1091</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210218">February 18, 2021</action-date><action-desc><sponsor name-id="B001299">Mr. Banks</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HED00">Committee on Education and Labor</committee-name>, and in addition to the Committees on <committee-name committee-id="HIG00">Intelligence (Permanent Select)</committee-name>, <committee-name committee-id="HAS00">Armed Services</committee-name>, and <committee-name committee-id="HSY00">Science, Space, and Technology</committee-name>, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned</action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To create a task force within the Department of Education to address the threat of foreign government influence and threats to academic research integrity on college campuses, and for other purposes.</official-title></form><legis-body id="H9A9FDF478A2E4B968F73BD963BE32D9F" style="OLC"><section id="H1B648F4E2ED24B3C8E23D15DE71F2AD9" section-type="section-one"><enum>1.</enum><header>Short Title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Protect Our Universities Act of 2021</short-title></quote>.</text></section><section id="H4CFD788A6FE541EEA8264D5E804D7075"><enum>2.</enum><header>Findings</header><text display-inline="no-display-inline">Congress finds the following:</text><paragraph id="H7EABE3FFEB324CBDB661F5B31FE0A89B"><enum>(1)</enum><text>Adversaries of the United States take advantage of a largely vulnerable academic system. Academia is a place of uniquely free thought; however, adversaries take advantage of access to federally funded sensitive research that takes place on the campuses of institutions of higher education.</text></paragraph><paragraph id="H95C3FC39344146F5983CDB5C07E82EA7"><enum>(2)</enum><text>As stated in a 2018 report by the White House Office of Trade and Manufacturing Policy, <quote>More than 300,000 Chinese nationals annually attend U.S. universities or find employment at U.S. national laboratories, innovation centers, incubators, and think tanks. Chinese nationals now account for approximately one third of foreign university and college students in the United States and about 25 percent of graduate students specializing in science, technology, engineering, or math (STEM).</quote>.</text></paragraph><paragraph id="H764BCA8D5B274888B09088AE524DF7AA"><enum>(3)</enum><text>International students from nations that are adversarial to the United States could face undue pressure or incentives to divulge technology to their home nation or to use sensitive information to negatively impact the United States. According to the same 2018 White House Report, <quote>The national and economic security risks are that the Chinese State may seek to manipulate or pressure even unwitting or unwilling Chinese nationals into becoming non-traditional information collectors that serve Beijing’s military and strategic ambitions.</quote>.</text></paragraph><paragraph id="H507AB34599934A96AF09BDE26AFB2116"><enum>(4)</enum><text>Technology and information that could be deemed sensitive to the national security interests of the United States should be given increased scrutiny to determine if access should be restricted in a research environment.</text></paragraph><paragraph id="HDAEF1FAD15F24DB98EF42103F47DB84A"><enum>(5)</enum><text display-inline="yes-display-inline">An open federally funded research environment exposes the United States to the possibility of exchanging research affiliated with current or future critical military technological systems.</text></paragraph><paragraph display-inline="no-display-inline" id="HCC4252CB0D22411B9F42873717278E70"><enum>(6)</enum><text>In Federal Bureau of Investigation (FBI) Director Wray’s view, Chinese non-traditional intelligence collectors <quote>are exploiting the very open research and development environment that we have, which we all revere. But they’re taking advantage of it, so one of the things we’re trying to do is view the China threat as not just the whole-of-government threat, but a whole-of-society threat on their end, and I think it’s going to take a whole-of-society response by us.</quote>.</text></paragraph><paragraph id="H9182B33D6AC5481CBFBBA1208E474B89"><enum>(7)</enum><text>As stated in the January 2018 China’s Technology Transfer Strategy report by the Defense Innovation Unit, <quote>Academia is an opportune environment for learning about science and technology since the cultural values of U.S. educational institutions reflect an open and free exchange of ideas. As a result, Chinese science and engineering students frequently master technologies that later become critical to key military systems, amounting over time to unintentional violations of U.S. export control laws.</quote>.</text></paragraph><paragraph id="HB3451E0170C24555BFC0857A2DAEC2D3"><enum>(8)</enum><text>In 2020, Bill Evanina, the senior counterintelligence official in the Office of the Director of National Intelligence, stated <quote>… our ideas, technology, research, innovation is incubated on those university campuses. That’s where the science and technology originates—and that’s why it’s the most prime place to steal.</quote>.</text></paragraph><paragraph id="H419B1B262BD74C67AA7E3AECFBD283C9"><enum>(9)</enum><text>David Bowdich, Deputy Director of the Federal Bureau of Investigation, stated at the March 2020 Academic Security and Counter Exploitation Annual Seminar that [China] is <quote>taking advantage of non-traditional collectors to work on their behalf, like ostensibly private companies or some graduate students and researchers. … And they are targeting cutting-edge research at our universities.</quote>.</text></paragraph><paragraph id="HEA500DD835B842E8B0E270999401E9F1"><enum>(10)</enum><text>The 2020 House of Representatives China Task Force Report states, <quote>Research programs at U.S. colleges and universities are increasingly targeted by students and researchers acting as <quote>non-traditional collectors</quote>. These students, ranging from undergraduates to postdoctoral researchers, are generally untrained in espionage techniques but are asked to actively target sensitive dual-use technologies and other emerging research during their time in the U.S. The stated goal for these operations is to exfiltrate research data from the U.S. to the PRC.</quote>.</text></paragraph></section><section id="HEED597F1693E4174B8F6647A9C6B9C2E"><enum>3.</enum><header>Task Force</header><subsection id="H1F39FA6F49024B6E8614B56E74052995"><enum>(a)</enum><header>Task Force established</header><text display-inline="yes-display-inline">Not later than one year after the date of enactment of this Act, the Secretary of Education, in consultation with the Secretary of Defense and the Director of National Intelligence, shall establish the National Security Technology Task Force (hereinafter referred to as the <quote>Task Force</quote>) within the Department of Education to address the threat of espionage at institutions of higher education.</text></subsection><subsection id="HC1801C93A4084645A9584F3A94461735"><enum>(b)</enum><header>Membership</header><paragraph id="H5DCE4E43283A4ECC9B2E4638B00EBEE5"><enum>(1)</enum><header>Designation</header><text>The Task Force shall include not more than 30 members, of which—</text><subparagraph id="H9A5336CFF2BF4E78B5CCBCBA2B5A52E4"><enum>(A)</enum><text>at least 1 representative shall be from the Department of Defense, designated by the Secretary of Defense;</text></subparagraph><subparagraph id="H5E900795C50F4771A5C6C292DD4C22BA"><enum>(B)</enum><text display-inline="yes-display-inline">at least 1 representative shall be from the intelligence community, designated by the Director of National Intelligence;</text></subparagraph><subparagraph id="HBB5828F55D734CC7A7595DD4E1668886"><enum>(C)</enum><text display-inline="yes-display-inline">at least 1 representative shall be from the Department of Justice, designated by the United States Attorney General;</text></subparagraph><subparagraph id="H8A2F243958C642FD93D3E8C131A32BA8"><enum>(D)</enum><text display-inline="yes-display-inline">at least 1 representative shall be from the Department of Energy, designated by the Secretary of Energy; and</text></subparagraph><subparagraph commented="no" id="H77A8D956A2F64B1AAB5C6E6446358B2B"><enum>(E)</enum><text display-inline="yes-display-inline">at least 1 representative shall be from each of the following offices of the Department of Education, as appointed and named by the Secretary of Education:</text><clause commented="no" id="H8BEB20C8492D44AB90F38ADCCA16AC9F"><enum>(i)</enum><text>Office of Postsecondary Education.</text></clause><clause commented="no" id="HC2417907C7FB470EA26A75B90240F73E"><enum>(ii)</enum><text>Office of Planning, Evaluation, and Policy Development.</text></clause><clause id="H29899DD202CE4CA6BAF04D7A4DF50EA1"><enum>(iii)</enum><text display-inline="yes-display-inline">Office of the General Counsel.</text></clause><clause commented="no" id="H8766E5ABB7B44323BAE6E8136CE8C779"><enum>(iv)</enum><text>Any other office the Secretary of Education determines to be appropriate.</text></clause></subparagraph></paragraph><paragraph id="HBBB2966F472147C7A0A67361946C31B6"><enum>(2)</enum><header>Membership list</header><text>Not later than 10 days after the first meeting of the Task Force, the Task Force shall submit to Congress a list identifying each member of the Task Force.</text></paragraph></subsection><subsection id="H9FB1503DF5FE429FAB098C8DBE79D222"><enum>(c)</enum><header>Sensitive Research Project List</header><text display-inline="yes-display-inline">The Task Force shall, in consultation with the Office of the Director of National Intelligence, actively maintain a list of sensitive research projects. Such list shall—</text><paragraph id="H319307E2F86E4483A340754C5CBCCEDE"><enum>(1)</enum><text>be referred to as the Sensitive Research Projects List; and</text></paragraph><paragraph id="H38633CCBE71B400EBA27FDB0C21938C3"><enum>(2)</enum><text>for each project included on the list, indicate—</text><subparagraph id="H55F3842E5E7E449C80E0ECD0C0733143"><enum>(A)</enum><text>the qualified funding agency that is funding the project;</text></subparagraph><subparagraph id="HB9AB2EF541554BCBAB8F0FF1658D9294"><enum>(B)</enum><text>whether the project is open to student participation; and</text></subparagraph><subparagraph id="HDCE120FA951A487A95916E5D6E187134"><enum>(C)</enum><text display-inline="yes-display-inline">whether the project is related to—</text><clause id="H78CE5EE8A40B431393B0833C5CBD117F"><enum>(i)</enum><text display-inline="yes-display-inline">an item listed on the Commerce Control List (CCL) maintained by the Department of Commerce;</text></clause><clause id="H5DA3E420CF95494B89BB6761999D87D7"><enum>(ii)</enum><text display-inline="yes-display-inline">an item listed on the United States Munitions List maintained by the Department of State; or</text></clause><clause id="HF87C01386E674100A2BE22FA722B9FC0"><enum>(iii)</enum><text>technology designated by the Secretary of Defense as having a technology readiness level of 1, 2, or 3.</text></clause></subparagraph></paragraph></subsection><subsection commented="no" id="HAD1BCA218A22478FA14D5F8691AF7B02"><enum>(d)</enum><header>Consultation with OIG</header><text display-inline="yes-display-inline">The Task Force shall periodically, but no less than annually, consult with the Office of the Inspector General of the Department of Education, which shall include annual reports to the Office of the Inspector General on the activities of the Task Force, with an opportunity for the Office of the Inspector General to provide active feedback related to such activities.</text></subsection><subsection commented="no" id="HD1A7A136C0174333A5E074D87AE58AA8"><enum>(e)</enum><header>Instruction to institutions of higher education</header><text display-inline="yes-display-inline">Not less than once every six months, the Task Force shall provide relevant instruction to institutions of higher education at which research projects on the Sensitive Research Project List are being carried out. Such instruction shall provide the institutions of higher education with information related to the threat posed by espionage, best practices identified by the Task Force, and, to the extent possible, any specific risks that the intelligence community, the qualified funding agency, or law enforcement entities determine appropriate to share with the institutions.</text></subsection><subsection commented="no" id="H08A2EA5AFD3344BF92995EB21C81F2DD"><enum>(f)</enum><header>Report to Congress</header><text display-inline="yes-display-inline">Not later than one year after the date of enactment of this Act, and every six months thereafter, the Task Force shall provide a report to the Committee on Education and Labor, the Committee on Armed Services, and the Permanent Select Committee on Intelligence of the House of Representatives, and to the Committee on Health, Education, Labor, and Pensions, the Committee on Armed Services, and the Select Committee on Intelligence of the Senate, regarding the threat of espionage at institutions of higher education. In each such briefing, the Task Force shall identify actions that may be taken to reduce espionage carried out through student participation in sensitive research projects. The Task Force shall also include in this report an assessment of whether the current licensing regulations relating to the International Traffic in Arms Regulations and the Export Administration Regulations are sufficient to protect the security of the projects listed on the Sensitive Research Project List.</text></subsection></section><section id="HE8C4818AA2E14006A33165EC648DE471"><enum>4.</enum><header>Foreign student participation in sensitive research projects</header><subsection id="HE4765EAA250C46249150AAB908F48190"><enum>(a)</enum><header>Approval of foreign student participation required</header><text display-inline="yes-display-inline">Beginning on the date that is one year after the date of enactment of this Act, for each project on the Sensitive Research Project List that is open to student participation, the head of such project at the institution of higher education at which the project is being carried out shall ensure that each student participating in such project shall be required to provide proof of citizenship before the student is permitted to participate in such project. A student who is a citizen of a country identified in <internal-xref idref="H30914299941B40229405CD065AF99D70" legis-path="4.(b)">subsection (b)</internal-xref> shall be permitted to participate in such a project only if—</text><paragraph id="H581704A002924802875412320CA34758"><enum>(1)</enum><text>the student applies for, and receives approval from, the Director of National Intelligence to participate in such project, based on a background check and any other information the Director determines to be appropriate; and</text></paragraph><paragraph id="H30E8547325E54B17850880FC3900D0E2"><enum>(2)</enum><text display-inline="yes-display-inline">in the case of such a project that is related to an item or technology described in subparagraph (C) of <internal-xref idref="H38633CCBE71B400EBA27FDB0C21938C3" legis-path="3.(c)(2)">section 3(c)(2)</internal-xref>, the student applies for, and receives approval from, the head of the qualified funding agency, to participate in such project.</text></paragraph></subsection><subsection commented="no" id="H30914299941B40229405CD065AF99D70"><enum>(b)</enum><header>List of citizenship requiring approval</header><text display-inline="yes-display-inline">Approval under <internal-xref idref="HE4765EAA250C46249150AAB908F48190" legis-path="4.(a)">subsection (a)</internal-xref> shall be required for any student who is a citizen of a country that is one of the following:</text><paragraph commented="no" id="H837A847735BC46BCBBE6AE781D9C3703"><enum>(1)</enum><text>The People’s Republic of China.</text></paragraph><paragraph commented="no" id="H74CC2E9C216F4EAB924389860C7EED80"><enum>(2)</enum><text>The Democratic People’s Republic of Korea.</text></paragraph><paragraph commented="no" id="HEE66B61D46AB498B91C3FBBA1A60A80A"><enum>(3)</enum><text>The Russian Federation.</text></paragraph><paragraph commented="no" id="H563CB7DE6B6945FA8AEF81D89710B2E5"><enum>(4)</enum><text>The Islamic Republic of Iran.</text></paragraph><paragraph id="HF63E1632D6F0472886C1D305417B4CD4"><enum>(5)</enum><text>Any country identified by the head of the qualified funding agency as requiring approval for the purposes of this section.</text></paragraph></subsection></section><section commented="no" id="HC25BEB6295D940658C4921EF240644DD"><enum>5.</enum><header>Foreign entities</header><subsection commented="no" display-inline="no-display-inline" id="H5F6C3BBB7D4D485BA60A173B6FD4323F"><enum>(a)</enum><header>List of foreign entities that pose an intelligence threat</header><text display-inline="yes-display-inline">Not later than one year after the date of the enactment of this Act, the Director of National Intelligence shall identify foreign entities, including governments, corporations, non-profit and for-profit organizations, and any subsidiary or affiliate of such an entity, that the Director determines pose a threat of espionage with respect to sensitive research projects, and shall develop and maintain a list of such entities. The Director may add or remove entities from such list at any time. The initial list developed by the Director shall include the following entities (including any subsidiary or affiliate):</text><paragraph commented="no" id="H54C5E0AC252D40CB9BC17A8E96B52E27"><enum>(1)</enum><text>Huawei Technologies Company.</text></paragraph><paragraph commented="no" id="H5C7FA5F927C74D9A910AAA670F084857"><enum>(2)</enum><text>ZTE Corporation.</text></paragraph><paragraph commented="no" id="H1EE5767DA5CB4A82811B46C6C211A278"><enum>(3)</enum><text>Hytera Communications Corporation.</text></paragraph><paragraph commented="no" id="H0D958CC7419E483F8FBBBD2C74FFAB48"><enum>(4)</enum><text>Hangzhou Hikvision Digital Technology Company.</text></paragraph><paragraph commented="no" id="HB4EA2FB0765B4A1C810FAD09D744CE91"><enum>(5)</enum><text>Dahua Technology Company.</text></paragraph><paragraph commented="no" id="H0A3CAE869FA74EB9AD1F7F5E75362D09"><enum>(6)</enum><text>Kaspersky Lab.</text></paragraph><paragraph id="H51A7431711D246C5A33F42FFA49B8AF5"><enum>(7)</enum><text display-inline="yes-display-inline">Any entity that is owned or controlled by, or otherwise has demonstrated financial ties to, the government of a country identified under <internal-xref idref="H30914299941B40229405CD065AF99D70" legis-path="4.(b)">section 4(b)</internal-xref>.</text></paragraph></subsection><subsection id="HA645505052584D06A2953E9B38899EB0"><enum>(b)</enum><header>Notice to institutions of higher education</header><text display-inline="yes-display-inline">The Director of National Intelligence shall make the initial list required under <internal-xref idref="H5F6C3BBB7D4D485BA60A173B6FD4323F" legis-path="5.(a)">subsection (a)</internal-xref>, and any changes to such list, available to the Secretary of Education, the Task Force, and the head of each qualified funding agency as soon as practicable. The Secretary of Education shall provide such initial list and subsequent amendments to each institution of higher education at which a project on the Sensitive Research Project List is being carried out.</text></subsection><subsection commented="no" id="HAED4BA2D4CF743049A91B6BF2FC45B4B"><enum>(c)</enum><header>Prohibition on use of certain technologies</header><text display-inline="yes-display-inline">Beginning on the date that is one year after the date of the enactment of this Act, the head of each sensitive research project shall, as a condition of receipt of funds from a qualified funding agency, provide an assurance to such qualified funding agency that, beginning on the date that is two years after the date of the enactment of this Act, any technology developed by an entity included on the list maintained under <internal-xref idref="H5F6C3BBB7D4D485BA60A173B6FD4323F" legis-path="5.(a)">subsection (a)</internal-xref> shall not be utilized in carrying out the sensitive research project.</text></subsection></section><section id="HC9BD50562BC242B0A30BA85F45F64AA8"><enum>6.</enum><header>Enforcement</header><text display-inline="no-display-inline">The head of each qualified funding agency shall take such steps as may be necessary to enforce the provisions of sections 4 and 5 of this Act. Upon determination that the head of a sensitive research project has failed to meet the requirements of either section 4 or section 5, the head of a qualified funding agency may determine the appropriate enforcement action, including—</text><paragraph id="HB137EC02E9F7474AA1E58C58C7222520"><enum>(1)</enum><text>imposing a probationary period, not to exceed 6 months, on the head of such project, or on the project;</text></paragraph><paragraph id="H087091B0DB5D46D1B66F9F16A17E8262"><enum>(2)</enum><text display-inline="yes-display-inline">reducing or otherwise limiting the funding for such project until the violation has been remedied;</text></paragraph><paragraph id="HA7A163DE34FA4154BF8239A26D29C0D3"><enum>(3)</enum><text>permanently cancelling the funding for such project; or</text></paragraph><paragraph id="HB53E9F3D196340569A1B963614573EF2"><enum>(4)</enum><text display-inline="yes-display-inline">any other action the head of the qualified funding agency determines to be appropriate.</text></paragraph></section><section id="H74168331648844C7BE06FB9B1A06EC06"><enum>7.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="HDB1435EEAD26408280079FBC4DB57748"><enum>(1)</enum><header>Citizen of a country</header><text display-inline="yes-display-inline">The term <term>citizen of a country</term>, with respect to a student, includes all countries in which the student has held or holds citizenship or holds permanent residency.</text></paragraph><paragraph id="H0BAAB02CA85B476DAC23DFA550CD9966"><enum>(2)</enum><header>Institution of higher education</header><text display-inline="yes-display-inline">The term <term>institution of higher education</term> means an institution described in section 102 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1002">20 U.S.C. 1002</external-xref>) that receives Federal funds in any amount and for any purpose.</text></paragraph><paragraph id="H1F96F37CE5D1499780E3235E1695C77E"><enum>(3)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given that term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="H42C3B6019D3E45338F8A17D799F41004"><enum>(4)</enum><header>Qualified funding agency</header><text>The term <term>qualified funding agency</term>, with respect to a sensitive research project, means—</text><subparagraph id="H7AC79E1D03DB4F2191FFFC14AF203B30"><enum>(A)</enum><text>the Department of Defense, if the sensitive research project is funded in whole or in part by the Department of Defense;</text></subparagraph><subparagraph id="H5C8B3CCD0F11420CA41CE7D5839C6040"><enum>(B)</enum><text display-inline="yes-display-inline">the Department of Energy, if the sensitive research project is funded in whole or in part by the Department of Energy; or</text></subparagraph><subparagraph id="H6794BCEA7B504FE185D5BF8F50EEE128"><enum>(C)</enum><text>an element of the intelligence community, if the sensitive research project is funded in whole or in part by the element of the intelligence community.</text></subparagraph></paragraph><paragraph id="H259C9470CC08440C85FB9140AB14C475"><enum>(5)</enum><header>Sensitive research project</header><text display-inline="yes-display-inline">The term <term>sensitive research project</term> means a research project at an institution of higher education that is funded by a qualified funding agency, except that such term shall not include any research project that is classified or that requires the participants in such project to obtain a security clearance.</text></paragraph><paragraph id="HC596C28CCEBF4B01BE927D44BC381909"><enum>(6)</enum><header>Student participation</header><text display-inline="yes-display-inline">The term <term>student participation</term> shall not include student activity in—</text><subparagraph id="HAB3C239836FB4635B3E9FC934C7EB3F4"><enum>(A)</enum><text>a research project that is required for completion of a course in which the student is enrolled at an institution of higher education; or</text></subparagraph><subparagraph id="H6F7D0EABF0BB450A9303C228509E3B2E"><enum>(B)</enum><text>a research project for which the student is conducting unpaid research.</text></subparagraph></paragraph></section></legis-body></bill> 

