<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-House" dms-id="H27F1B9131512414F986E22C585BE52C6" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 3138 RH: State and Local Cybersecurity Improvement Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-06-01</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">IB</distribution-code><calendar display="yes">Union Calendar No. 31</calendar><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3138</legis-num><associated-doc role="report" display="yes">[Report No. 117–48]</associated-doc><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210512">May 12, 2021</action-date><action-desc><sponsor name-id="C001067">Ms. Clarke of New York</sponsor> (for herself, <cosponsor name-id="G000597">Mr. Garbarino</cosponsor>, <cosponsor name-id="K000381">Mr. Kilmer</cosponsor>, <cosponsor name-id="K000386">Mr. Katko</cosponsor>, <cosponsor name-id="R000576">Mr. Ruppersberger</cosponsor>, <cosponsor name-id="M001157">Mr. McCaul</cosponsor>, and <cosponsor name-id="T000193">Mr. Thompson of Mississippi</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HHM00">Committee on Homeland Security</committee-name></action-desc></action><action display="yes"><action-date date="20210601">June 1, 2021</action-date><action-desc>Additional sponsor: <cosponsor name-id="S001208">Ms. Slotkin</cosponsor></action-desc></action><action display="yes"><action-date date="20210601">June 1, 2021</action-date><action-desc>Reported with an amendment, committed to the Committee of the Whole House on the State of the Union, and ordered to be printed</action-desc><action-instruction>Strike out all after the enacting clause and insert the part printed in italic</action-instruction><action-instruction>For text of introduced bill, see copy of bill as introduced on May 12, 2021</action-instruction></action><action><action-desc><pagebreak></pagebreak></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend the Homeland Security Act of 2002 to authorize a grant program relating to the cybersecurity of State and local governments, and for other purposes.<pagebreak></pagebreak></official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause" changed="added" style="OLC" committee-id="HHM00" reported-display-style="italic" id="HBD5B0DFC500B45BDAAC5E9541E7B9A78"><section id="HFBF58789DF1046939E199BA70DEFD536" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>State and Local Cybersecurity Improvement Act</short-title></quote>.</text></section><section id="HF7548AC06C064283B1A0E3303048C1BC"><enum>2.</enum><header>State and local cybersecurity grant program</header><subsection id="H91D54FE6262E4FBC914915DD47BC2B68"><enum>(a)</enum><header>In general</header><text>Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref> et seq.) is amended by adding at the end the following new sections:</text><quoted-block id="H05DBE6A2EE394A80BB9093667B551ED8" style="OLC" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="HEF2B12F4836D470A851439A658D36AE7"><enum>2220A.</enum><header>State and local cybersecurity grant program</header><subsection id="HC6AEFA7767CF4E04B8CB41F38A318236"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="H5F328C864B3D4AD0A4BD3DC49BC6286D"><enum>(1)</enum><header>Cyber threat indicator</header><text>The term <quote>cyber threat indicator</quote> has the meaning given the term in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph><paragraph id="H727E503028804B008150F2AF53A0FAB9" commented="no"><enum>(2)</enum><header>Cybersecurity Plan</header><text>The term <quote>Cybersecurity Plan</quote> means a plan submitted by an eligible entity under subsection (e)(1).</text></paragraph><paragraph id="H07E20F55A8CE4903A8D91EAABEE93743"><enum>(3)</enum><header>Eligible entity</header><text>The term <quote>eligible entity</quote> means—</text><subparagraph id="H745688D48D5149DC9C3C49470E379D2B"><enum>(A)</enum><text>a State; or</text></subparagraph><subparagraph id="H5F3C0AD67B8C4985805CF0C689B9BC66"><enum>(B)</enum><text>an Indian tribe that, not later than 120 days after the date of the enactment of this section or not later than 120 days before the start of any fiscal year in which a grant under this section is awarded—</text><clause id="H740054170DCA40FFA2C6D312ABE106EC"><enum>(i)</enum><text>notifies the Secretary that the Indian tribe intends to develop a Cybersecurity Plan; and</text></clause><clause id="HCE51920B06444B8BB64A040F68657150"><enum>(ii)</enum><text>agrees to forfeit any distribution under subsection (n)(2).</text></clause></subparagraph></paragraph><paragraph id="H08CCDC293E8845C49B342CF70792291A"><enum>(4)</enum><header>Incident</header><text>The term <quote>incident</quote> has the meaning given the term in section 2209.</text></paragraph><paragraph id="HA4DBA836E543492A869CAC72954F6B0E" commented="no"><enum>(5)</enum><header>Indian tribe; Tribal organization</header><text>The term <quote>Indian tribe</quote> or <quote>Tribal organization</quote> has the meaning given that term in section 4(e) of the of the Indian Self-Determination and Education Assistance Act (<external-xref legal-doc="usc" parsable-cite="usc/25/5304">25 U.S.C. 5304(e)</external-xref>).</text></paragraph><paragraph id="H6CCB273A325D43EFB5EAB173E236D86A" commented="no"><enum>(6)</enum><header>Information sharing and analysis organization</header><text>The term <quote>information sharing and analysis organization</quote> has the meaning given the term in section 2222.</text></paragraph><paragraph id="H7078EE35A599433AA194807FB892D66C"><enum>(7)</enum><header>Information system</header><text>The term <quote>information system</quote> has the meaning given the term in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph><paragraph id="H4168E62E1B5D4E67AA5ABB438D008B23"><enum>(8)</enum><header>Online service</header><text>The term <quote>online service</quote> means any internet-facing service, including a website, email, virtual private network, or custom application.</text></paragraph><paragraph id="H00E4AEBEDF244BCE96EDCFA608F63DFD"><enum>(9)</enum><header>Ransomware incident</header><text>The term <quote>ransomware incident</quote> means an incident that actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system, or actually or imminently jeopardizes, without lawful authority, an information system for the purpose of coercing the information system’s owner, operator, or another person.</text></paragraph><paragraph id="HC502EA9176EA46F28C1A5EB7C92D3B0F"><enum>(10)</enum><header>State and Local Cybersecurity Grant Program</header><text>The term <quote>State and Local Cybersecurity Grant Program</quote> means the program established under subsection (b).</text></paragraph><paragraph id="H704C55AFA5564D0F8B29CBF31172CB7A"><enum>(11)</enum><header>State and Local Cybersecurity Resilience Committee</header><text>The term <quote>State and Local Cybersecurity Resilience Committee</quote> means the committee established under subsection (o)(1).</text></paragraph></subsection><subsection id="H8937ECEB739A4D55B627AB9235950928"><enum>(b)</enum><header>Establishment</header><paragraph id="HCD25B740DB994B619AAE0BF20FFF11EB" commented="no"><enum>(1)</enum><header>In general</header><text>The Secretary, acting through the Director, shall establish a program, to be known as the <quote>the State and Local Cybersecurity Grant Program</quote>, to award grants to eligible entities to address cybersecurity risks and cybersecurity threats to information systems of State, local, or Tribal organizations.</text></paragraph><paragraph id="H47B28CCBFFF94D30AA67F506399F3CE5"><enum>(2)</enum><header>Application</header><text>An eligible entity seeking a grant under the State and Local Cybersecurity Grant Program shall submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require.</text></paragraph></subsection><subsection id="H252CC1B6627246DCA172334382A8D2EE" commented="no"><enum>(c)</enum><header>Baseline requirements</header><text>An eligible entity or multistate group that receives a grant under this section shall use the grant in compliance with—</text><paragraph id="H378CE4809FD144F18B3522F798CCC79E" commented="no"><enum>(1)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="HE90D5A4D142B4557AA3F01824322402D"><enum>(A)</enum><text>the Cybersecurity Plan of the eligible entity or the Cybersecurity Plans of the eligible entities that comprise the multistate group; and</text></subparagraph><subparagraph id="HCE09F704900A4E96B32173DBB5B33020" indent="up1"><enum>(B)</enum><text>the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments developed under section 2210(e)(1); or</text></subparagraph></paragraph><paragraph id="H412E73C165DD4CD783367C5AD179677B"><enum>(2)</enum><text>activities carried out under paragraphs (3), (4), and (5) of subsection (h).</text></paragraph></subsection><subsection id="HDBCB1A9AD70A404EBBC2359B0166A882"><enum>(d)</enum><header>Administration</header><text>The State and Local Cybersecurity Grant Program shall be administered in the same office of the Department that administers grants made under sections 2003 and 2004.</text></subsection><subsection id="H8C0C0D01821848B5AB0184AC10AF89BC"><enum>(e)</enum><header>Cybersecurity plans</header><paragraph id="H6C78B993A9874E0DACD03D6E7205CBEA"><enum>(1)</enum><header>In general</header><text>An eligible entity applying for a grant under this section shall submit to the Secretary a Cybersecurity Plan for approval.</text></paragraph><paragraph id="H0C5CB9C51DD34D1696162030FBEC3DE3"><enum>(2)</enum><header>Required elements</header><text>A Cybersecurity Plan of an eligible entity shall—</text><subparagraph id="H43E4AA7B16DC4AF6BEE61364EF7041C0"><enum>(A)</enum><text>incorporate, to the extent practicable, any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems of State, local, or Tribal organizations;</text></subparagraph><subparagraph id="H4F7150A0D1AD4B85857072FC1625FAED"><enum>(B)</enum><text>describe, to the extent practicable, how the eligible entity will—</text><clause id="H58201113B4EC4EAAB47FDCA03AD0972F"><enum>(i)</enum><text display-inline="yes-display-inline">manage, monitor, and track information systems, applications, and user accounts owned or operated by or on behalf of the eligible entity or by local or Tribal organizations within the jurisdiction of the eligible entity and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology;</text></clause><clause id="H9DD9957D0C31422BA839775DAF18ADB2"><enum>(ii)</enum><text display-inline="yes-display-inline">monitor, audit, and track activity between information systems, applications, and user accounts owned or operated by or on behalf of the eligible entity or by local or Tribal organizations within the jurisdiction of the eligible entity and between those information systems and information systems not owned or operated by the eligible entity or by local or Tribal organizations within the jurisdiction of the eligible entity;</text></clause><clause id="H349716F4235948AA8E09B2395ED52EB7"><enum>(iii)</enum><text display-inline="yes-display-inline">enhance the preparation, response, and resilience of information systems, applications, and user accounts owned or operated by or on behalf of the eligible entity or local or Tribal organizations against cybersecurity risks and cybersecurity threats;</text></clause><clause id="H71A5BEFC7C6D4F4D93A62E10E2F1C112" commented="no"><enum>(iv)</enum><text>implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems of the eligible entity or local or Tribal organizations;</text></clause><clause id="HBD1ACA508EFB4F699AB1354F5CA8617F"><enum>(v)</enum><text>ensure that State, local, and Tribal organizations that own or operate information systems that are located within the jurisdiction of the eligible entity—</text><subclause id="H818F233611F54C02881CD4CB5E2DE889"><enum>(I)</enum><text>adopt best practices and methodologies to enhance cybersecurity, such as the practices set forth in the cybersecurity framework developed by, and the cyber supply chain risk management best practices identified by, the National Institute of Standards and Technology; and</text></subclause><subclause id="H2AB03B0928F144D39F2E01AC1405E602"><enum>(II)</enum><text display-inline="yes-display-inline">utilize knowledge bases of adversary tools and tactics to assess risk;</text></subclause></clause><clause id="HD16FA6F7BADE4E85A41C9586638AD633"><enum>(vi)</enum><text>promote the delivery of safe, recognizable, and trustworthy online services by State, local, and Tribal organizations, including through the use of the .gov internet domain;</text></clause><clause id="H0D1E68CB01894F24A009D417C0B5300C" commented="no"><enum>(vii)</enum><text display-inline="yes-display-inline">ensure continuity of operations of the eligible entity and local, and Tribal organizations in the event of a cybersecurity incident (including a ransomware incident), including by conducting exercises to practice responding to such an incident;</text></clause><clause id="H1208A9B3EEBE454AAE04D7DC011E1EDD" commented="no"><enum>(viii)</enum><text>use the National Initiative for Cybersecurity Education Cybersecurity Workforce Framework developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of State, local, or Tribal organizations, enhance recruitment and retention efforts for such workforces, and bolster the knowledge, skills, and abilities of State, local, and Tribal organization personnel to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training;</text></clause><clause id="H1B9FA49736E2468ABA8DE759B10B004F" commented="no"><enum>(ix)</enum><text>ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local and Tribal organizations that own or operate information systems within the jurisdiction of the eligible entity in the event of an incident involving such communications or data networks within the jurisdiction of the eligible entity;</text></clause><clause id="HF7FE76C9CF5243C696AE097A727269C2"><enum>(x)</enum><text>assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats related to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity;</text></clause><clause id="HB80A8CCEEF0A42A899E6D4E75DF2054B" commented="no"><enum>(xi)</enum><text display-inline="yes-display-inline">enhance capabilities to share cyber threat indicators and related information between the eligible entity and local and Tribal organizations that own or operate information systems within the jurisdiction of the eligible entity, including by expanding existing information sharing agreements with the Department;</text></clause><clause id="H4F00484C4A1D41D9BBC364DB9E3A2978"><enum>(xii)</enum><text>enhance the capability of the eligible entity to share cyber threat indictors and related information with the Department;</text></clause><clause id="H07737788B2944DF2AD9462C9C4A2C0F7"><enum>(xiii)</enum><text>leverage cybersecurity services offered by the Department;</text></clause><clause id="H9B7A40A96A64475F81519685B8B21D2A" commented="no"><enum>(xiv)</enum><text display-inline="yes-display-inline">develop and coordinate strategies to address cybersecurity risks and cybersecurity threats to information systems of the eligible entity in consultation with—</text><subclause id="H979FE7CC661F435B8B399426E631776E" commented="no"><enum>(I)</enum><text>local and Tribal organizations within the jurisdiction of the eligible entity; and</text></subclause><subclause id="H2E367F3B452E47FD9B7C57501230A9EE" commented="no"><enum>(II)</enum><text>as applicable—</text><item id="HA4C38C2021624E32AEC1D0C45674130C" commented="no"><enum>(aa)</enum><text>States that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and</text></item><item id="HA40AEB0AFCF84EDCA3D5152DBBC4826D" commented="no"><enum>(bb)</enum><text>countries that neighbor the jurisdiction of the eligible entity; and</text></item></subclause></clause><clause id="H71E36A6885E3482BA617E4247542C128"><enum>(xv)</enum><text>implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives;</text></clause></subparagraph><subparagraph id="HD08D0F5EA3A04170B92A0FACBB5058C3"><enum>(C)</enum><text>describe, to the extent practicable, the individual responsibilities of the eligible entity and local and Tribal organizations within the jurisdiction of the eligible entity in implementing the plan;</text></subparagraph><subparagraph id="H25D4B4EC0ABD4DB9B66CD267F5ADFBC5"><enum>(D)</enum><text>outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and</text></subparagraph><subparagraph id="H524578346C07434E9E7618A305787366"><enum>(E)</enum><text>describe how the eligible entity will measure progress towards implementing the plan.</text></subparagraph></paragraph><paragraph id="HDCB1F2B3AC844982BE14A6E573251E46"><enum>(3)</enum><header>Discretionary elements</header><text>A Cybersecurity Plan of an eligible entity may include a description of—</text><subparagraph id="H58977BE82B664357943FE154D953C589" commented="no"><enum>(A)</enum><text>cooperative programs developed by groups of local and Tribal organizations within the jurisdiction of the eligible entity to address cybersecurity risks and cybersecurity threats; and</text></subparagraph><subparagraph id="HDD9B6C0BD849418DA6D2E996E13F222B" commented="no"><enum>(B)</enum><text>programs provided by the eligible entity to support local and Tribal organizations and owners and operators of critical infrastructure to address cybersecurity risks and cybersecurity threats.</text></subparagraph></paragraph><paragraph id="HA15769D5E62643FD92C4D6B21BE49006"><enum>(4)</enum><header>Management of funds</header><text>An eligible entity applying for a grant under this section shall agree to designate the Chief Information Officer, the Chief Information Security Officer, or an equivalent official of the eligible entity as the primary official for the management and allocation of funds awarded under this section.</text></paragraph></subsection><subsection id="H86ED1D13022F49F28B334A6DB06E7CC5"><enum>(f)</enum><header>Multistate grants</header><paragraph id="H2671CAE7844245D086C5C2294ED9AAE0" commented="no"><enum>(1)</enum><header>In general</header><text>The Secretary, acting through the Director, may award grants under this section to a group of two or more eligible entities to support multistate efforts to address cybersecurity risks and cybersecurity threats to information systems within the jurisdictions of the eligible entities.</text></paragraph><paragraph id="H072D20ABA98B4808A0BE4E2796DADB0F"><enum>(2)</enum><header>Satisfaction of other requirements</header><text>In order to be eligible for a multistate grant under this subsection, each eligible entity that comprises a multistate group shall submit to the Secretary—</text><subparagraph id="H863DA531828B4D37B95DBBCD95096A8C"><enum>(A)</enum><text>a Cybersecurity Plan for approval in accordance with subsection (i); and</text></subparagraph><subparagraph id="H176E5F1261CA44D9BA02031A0F36A4ED"><enum>(B)</enum><text display-inline="yes-display-inline">a plan for establishing a cybersecurity planning committee under subsection (g).</text></subparagraph></paragraph><paragraph id="H6FB3C690FBF8411FA48143A2E936E6F9"><enum>(3)</enum><header>Application</header><subparagraph id="H77FAC059F2FF4C29B15D08E55900E6D7"><enum>(A)</enum><header>In general</header><text>A multistate group applying for a multistate grant under paragraph (1) shall submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require.</text></subparagraph><subparagraph id="H05839E8F186147C3A68916D285E131C2"><enum>(B)</enum><header>Multistate project description</header><text>An application of a multistate group under subparagraph (A) shall include a plan describing—</text><clause id="H9CA28BBED10E4FDC839D22E34F154DF8"><enum>(i)</enum><text>the division of responsibilities among the eligible entities that comprise the multistate group for administering the grant for which application is being made;</text></clause><clause id="HE71AB7F17AEA48BC9E45404667761C3C"><enum>(ii)</enum><text>the distribution of funding from such a grant among the eligible entities that comprise the multistate group; and</text></clause><clause id="H07852695BE5A4C938C13DE8102B716F0"><enum>(iii)</enum><text>how the eligible entities that comprise the multistate group will work together to implement the Cybersecurity Plan of each of those eligible entities.</text></clause></subparagraph></paragraph></subsection><subsection id="H2C535BF6F51F480C91958B9971520A6F"><enum>(g)</enum><header>Planning committees</header><paragraph id="H7FDEBC8C5F034B739436A3499B257883"><enum>(1)</enum><header>In general</header><text>An eligible entity that receives a grant under this section shall establish a cybersecurity planning committee to—</text><subparagraph id="H17354DBEBB6F4E538F12C3FE7EA3701D"><enum>(A)</enum><text>assist in the development, implementation, and revision of the Cybersecurity Plan of the eligible entity;</text></subparagraph><subparagraph id="H48F5B80A70F544FD82B18ADA2E750558"><enum>(B)</enum><text display-inline="yes-display-inline">approve the Cybersecurity Plan of the eligible entity; and</text></subparagraph><subparagraph id="H5D61869ACF074394987A3173D570E40E"><enum>(C)</enum><text>assist in the determination of effective funding priorities for a grant under this section in accordance with subsection (h).</text></subparagraph></paragraph><paragraph id="H6FF0728045A643F29AE4D02B6F271EDC"><enum>(2)</enum><header>Composition</header><text>A committee of an eligible entity established under paragraph (1) shall—</text><subparagraph id="H93E61C59EFB6405B87AEA6D53EDF375A"><enum>(A)</enum><text display-inline="yes-display-inline">be comprised of representatives from the eligible entity and counties, cities, towns, Tribes, and public educational and health institutions within the jurisdiction of the eligible entity; and</text></subparagraph><subparagraph id="HFF34238D66F841BFAC46C85F9C5CA526"><enum>(B)</enum><text>include, as appropriate, representatives of rural, suburban, and high-population jurisdictions.</text></subparagraph></paragraph><paragraph id="H980A6813FA8641D5A79ACAFEDC8A82D3"><enum>(3)</enum><header>Cybersecurity expertise</header><text>Not less than <fraction>1/2</fraction> of the representatives of a committee established under paragraph (1) shall have professional experience relating to cybersecurity or information technology.</text></paragraph><paragraph id="H2F5BE01DDE8A41959ACEC623EA0CE93F"><enum>(4)</enum><header>Rule of construction regarding existing planning committees</header><text display-inline="yes-display-inline">Nothing in this subsection may be construed to require an eligible entity to establish a cybersecurity planning committee if the eligible entity has established and uses a multijurisdictional planning committee or commission that meets, or may be leveraged to meet, the requirements of this subsection.</text></paragraph></subsection><subsection id="H1AB22F0989E94A6C82BBC89EADA778B6"><enum>(h)</enum><header>Use of funds</header><text>An eligible entity that receives a grant under this section shall use the grant to—</text><paragraph id="HC215522AC0DD48DBB5F15AB3AE1729C2"><enum>(1)</enum><text>implement the Cybersecurity Plan of the eligible entity;</text></paragraph><paragraph id="HAED3C969623D4FE191DA617C592B47EB"><enum>(2)</enum><text>develop or revise the Cybersecurity Plan of the eligible entity; or</text></paragraph><paragraph id="HF9C594D00E954B0487F0652C0DD0E215" commented="no"><enum>(3)</enum><text>assist with activities that address imminent cybersecurity risks or cybersecurity threats to the information systems of the eligible entity or a local or Tribal organization within the jurisdiction of the eligible entity.</text></paragraph></subsection><subsection id="H1A23048023F6493E8824FB0C59A3E504"><enum>(i)</enum><header>Approval of plans</header><paragraph id="HDAAD166C5E57481BBD9FCD0A7CD9D7B0" commented="no"><enum>(1)</enum><header>Approval as condition of grant</header><text display-inline="yes-display-inline">Before an eligible entity may receive a grant under this section, the Secretary, acting through the Director, shall review the Cybersecurity Plan, or any revisions thereto, of the eligible entity and approve such plan, or revised plan, if it satisfies the requirements specified in paragraph (2).</text></paragraph><paragraph id="HF3E706646765474EA64E88EF470D982E" commented="no"><enum>(2)</enum><header>Plan requirements</header><text>In approving a Cybersecurity Plan of an eligible entity under this subsection, the Director shall ensure that the Cybersecurity Plan—</text><subparagraph id="HAC06E486D0A94977B0F6B4CBB1948974" commented="no"><enum>(A)</enum><text>satisfies the requirements of subsection (e)(2);</text></subparagraph><subparagraph id="H97F2CDEEBD524FF5AC391B1A2D51C20D" commented="no"><enum>(B)</enum><text>upon the issuance of the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments authorized pursuant to section 2210(e), complies, as appropriate, with the goals and objectives of the strategy; and</text></subparagraph><subparagraph id="H9F829B33DB7F49AD9BD40A35FE014E69" commented="no"><enum>(C)</enum><text>has been approved by the cybersecurity planning committee of the eligible entity established under subsection (g).</text></subparagraph></paragraph><paragraph id="HEDB98A0372F0419D9BA8A500FDBA8FA3" commented="no"><enum>(3)</enum><header>Approval of revisions</header><text>The Secretary, acting through the Director, may approve revisions to a Cybersecurity Plan as the Director determines appropriate.</text></paragraph><paragraph id="H0E22E6FCBEE04F7992B17994B0E2D01F"><enum>(4)</enum><header>Exception</header><text>Notwithstanding subsection (e) and paragraph (1) of this subsection, the Secretary may award a grant under this section to an eligible entity that does not submit a Cybersecurity Plan to the Secretary if—</text><subparagraph id="H94DDE5F893FE48979A15F1B9508D555A"><enum>(A)</enum><text>the eligible entity certifies to the Secretary that—</text><clause id="H05D48CC2FC324339AEEB46416E679B23"><enum>(i)</enum><text>the activities that will be supported by the grant are integral to the development of the Cybersecurity Plan of the eligible entity; and</text></clause><clause id="H95E6CC3BF748410D9D4C3EB3A26C88FF"><enum>(ii)</enum><text display-inline="yes-display-inline">the eligible entity will submit by September 30, 2023, to the Secretary a Cybersecurity Plan for review, and if appropriate, approval; or</text></clause></subparagraph><subparagraph id="H128674BBADA649E498E1577F280406A2"><enum>(B)</enum><text>the eligible entity certifies to the Secretary, and the Director confirms, that the eligible entity will use funds from the grant to assist with the activities described in subsection (h)(3).</text></subparagraph></paragraph></subsection><subsection id="H70E0592DC8174B27993EEDC4C092F5C5"><enum>(j)</enum><header>Limitations on uses of funds</header><paragraph id="H76075F12E2BC4D55A001DE83AB953B01"><enum>(1)</enum><header>In general</header><text>An eligible entity that receives a grant under this section may not use the grant—</text><subparagraph id="H6E1329B09D2C426DA9691963B715DE57"><enum>(A)</enum><text>to supplant State, local, or Tribal funds;</text></subparagraph><subparagraph id="H9A9BF615B30046538CBD179014D6C731"><enum>(B)</enum><text>for any recipient cost-sharing contribution;</text></subparagraph><subparagraph id="H04A465C1457D4F139EFCC215064998F1"><enum>(C)</enum><text>to pay a demand for ransom in an attempt to—</text><clause id="H288808097F42467491F8AA0CE1CE86CA"><enum>(i)</enum><text>regain access to information or an information system of the eligible entity or of a local or Tribal organization within the jurisdiction of the eligible entity; or</text></clause><clause id="H3AEEA47B5CDD4BA988063776691259FA"><enum>(ii)</enum><text display-inline="yes-display-inline">prevent the disclosure of information that has been removed without authorization from an information system of the eligible entity or of a local or Tribal organization within the jurisdiction of the eligible entity;</text></clause></subparagraph><subparagraph id="H648CF100C68C43F3BAF3B0E76709EF9A"><enum>(D)</enum><text>for recreational or social purposes; or</text></subparagraph><subparagraph id="HAA674323ED2849E6921280F081979625"><enum>(E)</enum><text>for any purpose that does not address cybersecurity risks or cybersecurity threats on information systems of the eligible entity or of a local or Tribal organization within the jurisdiction of the eligible entity.</text></subparagraph></paragraph><paragraph id="HD8C2C8F50AF046C0AAF666094C75FD3B"><enum>(2)</enum><header>Penalties</header><text>In addition to any other remedy available, the Secretary may take such actions as are necessary to ensure that a recipient of a grant under this section uses the grant for the purposes for which the grant is awarded.</text></paragraph><paragraph id="H6565B80555ED4634957A5B1DE26E8F06"><enum>(3)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">Nothing in paragraph (1) may be construed to prohibit the use of grant funds provided to a State, local, or Tribal organization for otherwise permissible uses under this section on the basis that a State, local, or Tribal organization has previously used State, local, or Tribal funds to support the same or similar uses.</text></paragraph></subsection><subsection id="H9E789ADF35744A83BFD2F68DDA7F1884"><enum>(k)</enum><header>Opportunity to amend applications</header><text>In considering applications for grants under this section, the Secretary shall provide applicants with a reasonable opportunity to correct defects, if any, in such applications before making final awards.</text></subsection><subsection id="H0991E0728C324E49B7146FA820575FA2" commented="no"><enum>(l)</enum><header>Apportionment</header><text>For fiscal year 2022 and each fiscal year thereafter, the Secretary shall apportion amounts appropriated to carry out this section among States as follows:</text><paragraph id="HCAA5BCF185C5474F921F4941F00BCAF3" commented="no"><enum>(1)</enum><header>Baseline amount</header><text>The Secretary shall first apportion 0.25 percent of such amounts to each of American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, the U.S. Virgin Islands, and 0.75 percent of such amounts to each of the remaining States.</text></paragraph><paragraph id="HEC9490B8280646239A1636429F9C091E" commented="no"><enum>(2)</enum><header>Remainder</header><text>The Secretary shall apportion the remainder of such amounts in the ratio that—</text><subparagraph id="H62A8A77DA4394A83B25CE88D20E1FBEC" commented="no"><enum>(A)</enum><text>the population of each eligible entity, bears to</text></subparagraph><subparagraph id="H8889BE60D8B34C8B9B22D9CF8013B948" commented="no"><enum>(B)</enum><text>the population of all eligible entities.</text></subparagraph></paragraph><paragraph id="H78DE97AF258D418C8AD5B031184CF2E5"><enum>(3)</enum><header>Minimum allocation to Indian tribes</header><subparagraph id="H766A08E5222645DC97181C92D8B200B2"><enum>(A)</enum><header>In general</header><text>In apportioning amounts under this section, the Secretary shall ensure that, for each fiscal year, directly eligible Tribes collectively receive, from amounts appropriated under the State and Local Cybersecurity Grant Program, not less than an amount equal to three percent of the total amount appropriated for grants under this section.</text></subparagraph><subparagraph id="H27E67538CF4B4D1AB6B701DF03F499AD"><enum>(B)</enum><header>Allocation</header><text>Of the amount reserved under subparagraph (A), funds shall be allocated in a manner determined by the Secretary in consultation with Indian tribes.</text></subparagraph><subparagraph id="H8A960B0F929C42408F290A1B054C6FD7"><enum>(C)</enum><header>Exception</header><text>This paragraph shall not apply in any fiscal year in which the Secretary—</text><clause id="H53CC71608F1D4F4987C4DD9D15195368"><enum>(i)</enum><text>receives fewer than five applications from Indian tribes; or</text></clause><clause id="H48D83D54877C4AACB9DB5E6A4B8110AB"><enum>(ii)</enum><text>does not approve at least two application from Indian tribes.</text></clause></subparagraph></paragraph></subsection><subsection id="HEEBB757F71F240DFAF6AC0250B33023E"><enum>(m)</enum><header>Federal share</header><paragraph id="HFA6D50B57F14443BB1BC9FD45D668532"><enum>(1)</enum><header>In general</header><text>The Federal share of the cost of an activity carried out using funds made available with a grant under this section may not exceed—</text><subparagraph id="H3D85F480B237462CB1A41281ED5E00B5"><enum>(A)</enum><text>in the case of a grant to an eligible entity—</text><clause id="HF2F19AC7F8A84A098E9D249655197274" commented="no"><enum>(i)</enum><text>for fiscal year 2022, 90 percent;</text></clause><clause id="HE6084D6B21AF4B62BCEE3C07C5520032"><enum>(ii)</enum><text>for fiscal year 2023, 80 percent;</text></clause><clause id="H4F9B8AACC3F54F649FF7187B9143E9BC"><enum>(iii)</enum><text>for fiscal year 2024, 70 percent;</text></clause><clause id="H19CDA7BA2E434FB5BE5177CF764F8FE9"><enum>(iv)</enum><text>for fiscal year 2025, 60 percent; and</text></clause><clause id="H15EB98FFD7CC41BDA9247925C0815A2A"><enum>(v)</enum><text>for fiscal year 2026 and each subsequent fiscal year, 50 percent; and</text></clause></subparagraph><subparagraph id="H02C35397573A463185818B1FC3C2736C"><enum>(B)</enum><text>in the case of a grant to a multistate group—</text><clause id="HF958CB76410E4F9F8F6AFF5A2A620850" commented="no"><enum>(i)</enum><text>for fiscal year 2022, 95 percent;</text></clause><clause id="H3205D1383DCF4D8896EC89E98ED33FE8"><enum>(ii)</enum><text>for fiscal year 2023, 85 percent;</text></clause><clause id="HC081A748342040969CF82291B560882D"><enum>(iii)</enum><text>for fiscal year 2024, 75 percent;</text></clause><clause id="H1584A40259484C81AD55F3B0F19F4208"><enum>(iv)</enum><text>for fiscal year 2025, 65 percent; and</text></clause><clause id="H01BF0B804F204F97B844A69937797F7B"><enum>(v)</enum><text>for fiscal year 2026 and each subsequent fiscal year, 55 percent.</text></clause></subparagraph></paragraph><paragraph id="HB42847138D4C45849D6AEFF574020AC8"><enum>(2)</enum><header>Waiver</header><text>The Secretary may waive or modify the requirements of paragraph (1) for an Indian tribe if the Secretary determines such a waiver is in the public interest.</text></paragraph></subsection><subsection id="H75C559F06D894CC58742B09711D77D9C"><enum>(n)</enum><header>Responsibilities of grantees</header><paragraph id="HF266AFC5095948C3A2F8335B20D287E6"><enum>(1)</enum><header>Certification</header><text>Each eligible entity or multistate group that receives a grant under this section shall certify to the Secretary that the grant will be used—</text><subparagraph id="H5AA49FC14FBA45A0BC817CF9BC613CF9"><enum>(A)</enum><text>for the purpose for which the grant is awarded; and</text></subparagraph><subparagraph id="H69FDA92506C54E87B3A942225DB363F2" commented="no"><enum>(B)</enum><text>in compliance with, as the case may be—</text><clause id="H23D409E577F04B939BB06579F87D8818" commented="no"><enum>(i)</enum><text>the Cybersecurity Plan of the eligible entity;</text></clause><clause id="H54188E2A6ABE4C5DA844D40AB4018BA3" commented="no"><enum>(ii)</enum><text>the Cybersecurity Plans of the eligible entities that comprise the multistate group; or</text></clause><clause id="H92412F4283494F6891E65DE14DED7401" commented="no"><enum>(iii)</enum><text display-inline="yes-display-inline">a purpose approved by the Secretary under subsection (h) or pursuant to an exception under subsection (i).</text></clause></subparagraph></paragraph><paragraph id="H3A137CDF9ABD401A94AFC3AC6D8C77A9"><enum>(2)</enum><header>Availability of funds to local and Tribal organizations</header><text display-inline="yes-display-inline">Not later than 45 days after the date on which an eligible entity or multistate group receives a grant under this section, the eligible entity or multistate group shall, without imposing unreasonable or unduly burdensome requirements as a condition of receipt, obligate or otherwise make available to local and Tribal organizations within the jurisdiction of the eligible entity or the eligible entities that comprise the multistate group, and as applicable, consistent with the Cybersecurity Plan of the eligible entity or the Cybersecurity Plans of the eligible entities that comprise the multistate group—</text><subparagraph id="H0A0428CCC99F4816A247C9E072ECA93E"><enum>(A)</enum><text>not less than 80 percent of funds available under the grant;</text></subparagraph><subparagraph id="HFA9019B3EC724A8AAC9648D165CDC71D"><enum>(B)</enum><text>with the consent of the local and Tribal organizations, items, services, capabilities, or activities having a value of not less than 80 percent of the amount of the grant; or</text></subparagraph><subparagraph id="H8FBEDAB3800C40EC83799E3E90AE9495"><enum>(C)</enum><text>with the consent of the local and Tribal organizations, grant funds combined with other items, services, capabilities, or activities having the total value of not less than 80 percent of the amount of the grant.</text></subparagraph></paragraph><paragraph id="HB2E54798DE314C77AE5003857C09C97F"><enum>(3)</enum><header>Certifications regarding distribution of grant funds to local and Tribal organizations</header><text>An eligible entity or multistate group shall certify to the Secretary that the eligible entity or multistate group has made the distribution to local, Tribal, and territorial governments required under paragraph (2).</text></paragraph><paragraph id="H6B162BA620274E899EB58E6DCAC661B6"><enum>(4)</enum><header>Extension of period</header><subparagraph id="H47820C8633E041B5B06C178D0BA4089B"><enum>(A)</enum><header>In general</header><text>An eligible entity or multistate group may request in writing that the Secretary extend the period of time specified in paragraph (2) for an additional period of time.</text></subparagraph><subparagraph id="HC612B5F058424A83888E4331DBFA5C94"><enum>(B)</enum><header>Approval</header><text>The Secretary may approve a request for an extension under subparagraph (A) if the Secretary determines the extension is necessary to ensure that the obligation and expenditure of grant funds align with the purpose of the State and Local Cybersecurity Grant Program.</text></subparagraph></paragraph><paragraph id="H31413658EA0B4B038ABCB7A995CCEB15"><enum>(5)</enum><header>Exception</header><text>Paragraph (2) shall not apply to the District of Columbia, the Commonwealth of Puerto Rico, American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, the Virgin Islands, or an Indian tribe.</text></paragraph><paragraph id="HAA6D1B4DD3E44EC2801E40F93AE77597"><enum>(6)</enum><header>Direct funding</header><text display-inline="yes-display-inline">If an eligible entity does not make a distribution to a local or Tribal organization required in accordance with paragraph (2), the local or Tribal organization may petition the Secretary to request that grant funds be provided directly to the local or Tribal organization.</text></paragraph><paragraph id="HB69D984DFE4B480786F8E95239116271"><enum>(7)</enum><header>Penalties</header><text display-inline="yes-display-inline">In addition to other remedies available to the Secretary, the Secretary may terminate or reduce the amount of a grant awarded under this section to an eligible entity or distribute grant funds previously awarded to such eligible entity directly to the appropriate local or Tribal organization as a replacement grant in an amount the Secretary determines appropriate if such eligible entity violates a requirement of this subsection.</text></paragraph></subsection><subsection id="H784F6E6CE2C841C791DD38CA64B6FF9C"><enum>(o)</enum><header>Advisory committee</header><paragraph id="HCAD2B61988F240CB9214207310278D8F"><enum>(1)</enum><header>Establishment</header><text>Not later than 120 days after the date of enactment of this section, the Director shall establish a State and Local Cybersecurity Resilience Committee to provide State, local, and Tribal stakeholder expertise, situational awareness, and recommendations to the Director, as appropriate, regarding how to—</text><subparagraph id="H2FB449C53D9743E19DB1B550CE04D058" commented="no"><enum>(A)</enum><text>address cybersecurity risks and cybersecurity threats to information systems of State, local, or Tribal organizations; and</text></subparagraph><subparagraph id="H41C55F0CDF2941B38838D70F921B8986" commented="no"><enum>(B)</enum><text>improve the ability of State, local, and Tribal organizations to prevent, protect against, respond to, mitigate, and recover from such cybersecurity risks and cybersecurity threats.</text></subparagraph></paragraph><paragraph id="H347C05D62CE84185B10A262DCCEEABD2"><enum>(2)</enum><header>Duties</header><text>The committee established under paragraph (1) shall—</text><subparagraph id="HF091899102C74DDE8AE00EC5416C55B4"><enum>(A)</enum><text>submit to the Director recommendations that may inform guidance for applicants for grants under this section;</text></subparagraph><subparagraph id="H306121D5AB194AF4B42DC74D02B41E3E"><enum>(B)</enum><text>upon the request of the Director, provide to the Director technical assistance to inform the review of Cybersecurity Plans submitted by applicants for grants under this section, and, as appropriate, submit to the Director recommendations to improve those plans prior to the approval of the plans under subsection (i);</text></subparagraph><subparagraph id="H228E238B2A064B4FBD9B60F2B3E65073"><enum>(C)</enum><text>advise and provide to the Director input regarding the Homeland Security Strategy to Improve Cybersecurity for State, Local, Tribal, and Territorial Governments required under section 2210;</text></subparagraph><subparagraph id="H9F55DE28F0F545649FB080198A314E95"><enum>(D)</enum><text>upon the request of the Director, provide to the Director recommendations, as appropriate, regarding how to—</text><clause id="HC99D641363654F4E94D8B933BA9F8794" commented="no"><enum>(i)</enum><text>address cybersecurity risks and cybersecurity threats on information systems of State, local, or Tribal organizations; and</text></clause><clause id="H94873E9C83A1482C8F97FE49A40343BC"><enum>(ii)</enum><text>improve the cybersecurity resilience of State, local, or Tribal organizations; and</text></clause></subparagraph><subparagraph id="H3F926AA4C7144468ABC57A4AE989EDD9"><enum>(E)</enum><text>regularly coordinate with the State, Local, Tribal and Territorial Government Coordinating Council, within the Critical Infrastructure Partnership Advisory Council, established under section 871.</text></subparagraph></paragraph><paragraph id="HA137D7BBCD8B426986339B6A0CE350A4"><enum>(3)</enum><header>Membership</header><subparagraph id="H2C0312C787AB4A38AFBAD6FF1D268BC2"><enum>(A)</enum><header>Number and appointment</header><text>The State and Local Cybersecurity Resilience Committee established pursuant to paragraph (1) shall be composed of 15 members appointed by the Director, as follows:</text><clause id="H6632886AEA034F31ACCBC72AD106203A"><enum>(i)</enum><text>Two individuals recommended to the Director by the National Governors Association.</text></clause><clause id="H36B3DD444D7D44238AD2A0DC912EA684"><enum>(ii)</enum><text>Two individuals recommended to the Director by the National Association of State Chief Information Officers.</text></clause><clause id="HC5995A87318D40FAB10A7E8AE585F287"><enum>(iii)</enum><text>One individual recommended to the Director by the National Guard Bureau.</text></clause><clause id="H1C40DFB19BF94DF4A68EFAEDB57068C9"><enum>(iv)</enum><text>Two individuals recommended to the Director by the National Association of Counties.</text></clause><clause id="H4990F672542D41A1B934316C3B8B80B6"><enum>(v)</enum><text>One individual recommended to the Director by the National League of Cities.</text></clause><clause id="H3E36BDF1BC59430DBE4E3832A0F56434"><enum>(vi)</enum><text>One individual recommended to the Director by the United States Conference of Mayors.</text></clause><clause id="H130F10BEF20F426988E83FEDD0C43530"><enum>(vii)</enum><text>One individual recommended to the Director by the Multi-State Information Sharing and Analysis Center.</text></clause><clause id="H7C4928667D0C4089B9E58CE6B96C7EAC"><enum>(viii)</enum><text>One individual recommended to the Director by the National Congress of American Indians.</text></clause><clause id="H43B72D561AC040F7BC52CEC41C034B9D"><enum>(viii)</enum><text>Four individuals who have educational and professional experience relating to cybersecurity work or cybersecurity policy.</text></clause></subparagraph><subparagraph id="H7CE6F8BD0A464B129A268EB396C295EE"><enum>(B)</enum><header>Terms</header><clause id="H19A8E0F00D244D9EB4ADE5B5A54AA492"><enum>(i)</enum><header>In general</header><text>Subject to clause (ii), each member of the State and Local Cybersecurity Resilience Committee shall be appointed for a term of two years.</text></clause><clause id="HE8871EC75F29437A946591787D997821"><enum>(ii)</enum><header>Requirement</header><text>At least two members of the State and Local Cybersecurity Resilience Committee shall also be members of the State, Local, Tribal and Territorial Government Coordinating Council, within the Critical Infrastructure Partnership Advisory Council, established under section 871.</text></clause><clause id="H8F0D21649EB3461C900E823B7D63034C"><enum>(iii)</enum><header>Exception</header><text>A term of a member of the State and Local Cybersecurity Resilience Committee shall be three years if the member is appointed initially to the Committee upon the establishment of the Committee.</text></clause><clause id="H33F018BFE62F45F5A7E785EBC89C9CA1"><enum>(iv)</enum><header>Term remainders</header><text>Any member of the State and Local Cybersecurity Resilience Committee appointed to fill a vacancy occurring before the expiration of the term for which the member’s predecessor was appointed shall be appointed only for the remainder of such term. A member may serve after the expiration of such member’s term until a successor has taken office.</text></clause><clause id="H30D9FAF3E5664DEAA51EBA4C6F2B0129"><enum>(v)</enum><header>Vacancies</header><text>A vacancy in the State and Local Cybersecurity Resilience Committee shall be filled in the manner in which the original appointment was made.</text></clause></subparagraph><subparagraph id="H8AB2B129D9604C2A956FB35D04065056"><enum>(C)</enum><header>Pay</header><text>Members of the State and Local Cybersecurity Resilience Committee shall serve without pay.</text></subparagraph></paragraph><paragraph id="HB463EC8135B24918A7C4E430F80319CE"><enum>(4)</enum><header>Chairperson; vice chairperson</header><text>The members of the State and Local Cybersecurity Resilience Committee shall select a chairperson and vice chairperson from among members of the committee.</text></paragraph><paragraph id="H5C31CF69ECB14CDFB1EE2FE698D23885"><enum>(5)</enum><header>Permanent authority</header><text>Notwithstanding <external-xref legal-doc="usc-act" parsable-cite="usc-act/Federal Advisory Committee Act /14">section 14</external-xref> of the Federal Advisory Committee Act (5 U.S.C. App.), the State and Local Cybersecurity Resilience Committee shall be a permanent authority.</text></paragraph></subsection><subsection id="HF050FB147BF64BF0844862D46A89C7BC"><enum>(p)</enum><header>Reports</header><paragraph id="H2DEECB1414544338AC5C242D83A91802"><enum>(1)</enum><header>Annual reports by grant recipients</header><subparagraph id="H97A2C4B2C37C45BBB8B28FE7096B8A31"><enum>(A)</enum><header>In general</header><text>Not later than one year after an eligible entity or multistate group receives funds under this section, the eligible entity or multistate group shall submit to the Secretary a report on the progress of the eligible entity or multistate group in implementing the Cybersecurity Plan of the eligible entity or Cybersecurity Plans of the eligible entities that comprise the multistate group, as the case may be.</text></subparagraph><subparagraph id="H66A8B8FC7ED44555A27ECFF24C974D37"><enum>(B)</enum><header>Absence of plan</header><text display-inline="yes-display-inline">Not later than 180 days after an eligible entity that does not have a Cybersecurity Plan receives funds under this section for developing its Cybersecurity Plan, the eligible entity shall submit to the Secretary a report describing how the eligible entity obligated and expended grant funds during the fiscal year to—</text><clause id="HDF354285D67448BDB74F5742A16DBB5B"><enum>(i)</enum><text>so develop such a Cybersecurity Plan; or</text></clause><clause id="H6A7C1ACEB3994E469774732439169D7C"><enum>(ii)</enum><text>assist with the activities described in subsection (h)(3).</text></clause></subparagraph></paragraph><paragraph id="H8E6EEA2AD5094E77BEAD249D5936120F"><enum>(2)</enum><header>Annual reports to Congress</header><text>Not less frequently than once per year, the Secretary, acting through the Director, shall submit to Congress a report on the use of grants awarded under this section and any progress made toward the following:</text><subparagraph id="H5C109394C3F146918A0EFD31C6746FA7"><enum>(A)</enum><text>Achieving the objectives set forth in the Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments, upon the date on which the strategy is issued under section 2210.</text></subparagraph><subparagraph id="H1DEDF7042BAB4811829C5F31597DE76A"><enum>(B)</enum><text>Developing, implementing, or revising Cybersecurity Plans.</text></subparagraph><subparagraph id="HEF923081CECD42168A77C744E1CFEC7A" commented="no"><enum>(C)</enum><text display-inline="yes-display-inline">Reducing cybersecurity risks and cybersecurity threats to information systems, applications, and user accounts owned or operated by or on behalf of State, local, and Tribal organizations as a result of the award of such grants.</text></subparagraph></paragraph></subsection><subsection id="H755A4C08FB424162A330983D9B1F3528"><enum>(q)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated for grants under this section—</text><paragraph id="H1843E8AF4A7142089E66AFCB34048AEF" commented="no"><enum>(1)</enum><text>for each of fiscal years 2022 through 2026, $500,000,000; and</text></paragraph><paragraph id="H4E95987B80F74FE78C1C86E8687092FD"><enum>(2)</enum><text>for each subsequent fiscal year, such sums as may be necessary.</text></paragraph></subsection></section><section id="H50A3E3DB5FB94440AFAAA0C8850C8F32"><enum>2220B.</enum><header>Cybersecurity resource guide development for state, local, tribal, and territorial government officials</header><text display-inline="no-display-inline">The Secretary, acting through the Director, shall develop, regularly update, and maintain a resource guide for use by State, local, Tribal, and territorial government officials, including law enforcement officers, to help such officials identify, prepare for, detect, protect against, respond to, and recover from cybersecurity risks (as such term is defined in section 2209), cybersecurity threats, and incidents (as such term is defined in section 2209).</text></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H022AC481485C4286AB565B357F20FDF9"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents in section 1(b) of the Homeland Security Act of 2002, as amended by section 4, is further amended by inserting after the item relating to section 2220 the following new items:</text><quoted-block style="OLC" id="H26062C13AE09489AB33A63A2CA11786A" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><toc regeneration="no-regeneration" changed="added" reported-display-style="italic" committee-id="HHM00"><toc-entry level="section">Sec. 2220A. State and Local Cybersecurity Grant Program. </toc-entry><toc-entry level="section">Sec. 2220B. Cybersecurity resource guide development for State, local, Tribal, and territorial government officials.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="H3D725611F9A64707B86D22E3BC83DF7E"><enum>3.</enum><header>Strategy</header><subsection id="H783B799351714FE2A005CB2BC56B3C21"><enum>(a)</enum><header>Homeland security strategy to improve the cybersecurity of state, local, tribal, and territorial governments</header><text>Section 2210 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/660">6 U.S.C. 660</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block id="H95CFB12438A64B5C85846213F8372306" style="OLC" changed="added" reported-display-style="italic" committee-id="HHM00"><subsection id="H7267D03A03BB48EF96189E2196256F10"><enum>(e)</enum><header>Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments</header><paragraph id="H125A8755B1394885932F7A22E644264A"><enum>(1)</enum><header>In general</header><subparagraph id="H4D9C741D574F4A09A4D3670AE7EE09E9"><enum>(A)</enum><header>Requirement</header><text>Not later than one year after the date of the enactment of this subsection, the Secretary, acting through the Director, shall, in coordination with the heads of appropriate Federal agencies, State, local, Tribal, and territorial governments, the State and Local Cybersecurity Resilience Committee established under section 2220A, and other stakeholders, as appropriate, develop and make publicly available a Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments.</text></subparagraph><subparagraph id="HD347E29610CC418791FF846CA13A696C"><enum>(B)</enum><header>Recommendations and requirements</header><text>The strategy required under subparagraph (A) shall—</text><clause id="H791E4545EC5A4C1588C492318C798D66"><enum>(i)</enum><text display-inline="yes-display-inline">provide recommendations relating to the ways in which the Federal Government should support and promote the ability of State, local, Tribal, and territorial governments to identify, mitigate against, protect against, detect, respond to, and recover from cybersecurity risks (as such term is defined in section 2209), cybersecurity threats, and incidents (as such term is defined in section 2209); and</text></clause><clause id="HC6DC716E04CA4A23A2D60922CD28A144"><enum>(ii)</enum><text>establish baseline requirements for cybersecurity plans under this section and principles with which such plans shall align.</text></clause></subparagraph></paragraph><paragraph id="H4F9D9B321A3E480EA1ACBD49BE14D6CB"><enum>(2)</enum><header>Contents</header><text>The strategy required under paragraph (1) shall—</text><subparagraph id="H4E7B07AC4A8D4358B8F33D169D985953"><enum>(A)</enum><text>identify capability gaps in the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;</text></subparagraph><subparagraph id="HED3912EBDFC24CA38CB200C49A72721A"><enum>(B)</enum><text>identify Federal resources and capabilities that are available or could be made available to State, local, Tribal, and territorial governments to help those governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;</text></subparagraph><subparagraph id="H3E3862BE0FF148D2B346B6BBD88FC2C4"><enum>(C)</enum><text>identify and assess the limitations of Federal resources and capabilities available to State, local, Tribal, and territorial governments to help those governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents and make recommendations to address such limitations;</text></subparagraph><subparagraph id="H1DA4AAB66081460DB11516D4B7D1D953"><enum>(D)</enum><text>identify opportunities to improve the coordination of the Agency with Federal and non-Federal entities, such as the Multi-State Information Sharing and Analysis Center, to improve—</text><clause id="H8050F81EAB9A45F59A39A8B0CD47B7EB"><enum>(i)</enum><text>incident exercises, information sharing and incident notification procedures;</text></clause><clause id="H0143D21680124C07A4D9EC1C94183FA9"><enum>(ii)</enum><text>the ability for State, local, Tribal, and territorial governments to voluntarily adapt and implement guidance in Federal binding operational directives; and</text></clause><clause id="H3FA2CC36AA7748E4B965B8E61FBC3F88"><enum>(iii)</enum><text>opportunities to leverage Federal schedules for cybersecurity investments under section 502 of title 40, United States Code;</text></clause></subparagraph><subparagraph id="HB619A0BD19F4465E9DB4EC1829EE81F3"><enum>(E)</enum><text>recommend new initiatives the Federal Government should undertake to improve the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;</text></subparagraph><subparagraph id="H9C577DD8085744998FF7D0FEECA13E74"><enum>(F)</enum><text>set short-term and long-term goals that will improve the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents; and</text></subparagraph><subparagraph id="H89297F5D90BB43BEA8CAA92BFF03F5F2"><enum>(G)</enum><text>set dates, including interim benchmarks, as appropriate for State, local, Tribal, and territorial governments to establish baseline capabilities to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents.</text></subparagraph></paragraph><paragraph id="H7D1458FBE02A404B8F7761BB40E39BB2"><enum>(3)</enum><header>Considerations</header><text>In developing the strategy required under paragraph (1), the Director, in coordination with the heads of appropriate Federal agencies, State, local, Tribal, and territorial governments, the State and Local Cybersecurity Resilience Committee established under section 2220A, and other stakeholders, as appropriate, shall consider—</text><subparagraph id="HFE9F143D0F6946EAB3365DF426E860D8"><enum>(A)</enum><text>lessons learned from incidents that have affected State, local, Tribal, and territorial governments, and exercises with Federal and non-Federal entities;</text></subparagraph><subparagraph id="H740C7CB07C9E4F4A9347E87B4222C00F"><enum>(B)</enum><text>the impact of incidents that have affected State, local, Tribal, and territorial governments, including the resulting costs to such governments;</text></subparagraph><subparagraph id="H5AFE105726514B2EB2E15E3D17B1D17A" commented="no"><enum>(C)</enum><text display-inline="yes-display-inline">the information related to the interest and ability of state and non-state threat actors to compromise information systems (as such term is defined in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)) owned or operated by State, local, Tribal, and territorial governments;</text></subparagraph><subparagraph id="HCBC78197C1914DB587364395CE681970"><enum>(D)</enum><text>emerging cybersecurity risks and cybersecurity threats to State, local, Tribal, and territorial governments resulting from the deployment of new technologies; and</text></subparagraph><subparagraph id="HB4CEF59ACC0249B8A45EE669D4672490"><enum>(E)</enum><text>recommendations made by the State and Local Cybersecurity Resilience Committee established under section 2220A.</text></subparagraph></paragraph><paragraph id="HD94A4992DD824F008B7D6C4ACB087A1C"><enum>(4)</enum><header>Exemption</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">Chapter 35</external-xref> of title 44, United States Code (commonly known as the <quote>Paperwork Reduction Act</quote>), shall not apply to any action to implement this subsection.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H7554961303514FA998A97493C4339E04"><enum>(b)</enum><header>Responsibilities of the Director of the Cybersecurity and Infrastructure Security Agency</header><text>Section 2202 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/652">6 U.S.C. 652</external-xref>) is amended—</text><paragraph id="H566C5A552A804F84A4D9FDC6F79C3F2E"><enum>(1)</enum><text>by redesignating subsections (d) through (i) as subsections (e) through (j), respectively; and</text></paragraph><paragraph id="H09A825AA6F944FB3882BA11A38B7DDBC"><enum>(2)</enum><text>by inserting after subsection (c) the following new subsection:</text><quoted-block id="H0849E7123FEA4C64B7D5928DFB445AF5" style="OLC" changed="added" reported-display-style="italic" committee-id="HHM00"><subsection id="H8EAFA39C269D4DB292F09B04271CFE04"><enum>(d)</enum><header>Additional responsibilities</header><text>In addition to the responsibilities under subsection (c), the Director shall—</text><paragraph id="H1B0A19FA13B3425896822C5AA0C76EDD"><enum>(1)</enum><text>develop program guidance, in consultation with the State and Local Government Cybersecurity Resilience Committee established under section 2220A, for the State and Local Cybersecurity Grant Program under such section or any other homeland security assistance administered by the Department to improve cybersecurity;</text></paragraph><paragraph id="HB04C933300214C66A41D5F3DD94F6477"><enum>(2)</enum><text>review, in consultation with the State and Local Cybersecurity Resilience Committee, all cybersecurity plans of State, local, Tribal, and territorial governments developed pursuant to any homeland security assistance administered by the Department to improve cybersecurity;</text></paragraph><paragraph id="H545066FE026744FA874B488D253F37BA"><enum>(3)</enum><text>provide expertise and technical assistance to State, local, Tribal, and territorial government officials with respect to cybersecurity; and</text></paragraph><paragraph id="H13AFD8C790D64EE18E57FFD2E08CF434"><enum>(4)</enum><text>provide education, training, and capacity development to enhance the security and resilience of cybersecurity and infrastructure security.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="HDB4A029F6A164CF2A8A0F3BF8D5E33CD"><enum>(c)</enum><header>Feasibility study</header><text>Not later than 270 days after the date of the enactment of this Act, the Director of the Cybersecurity and Infrastructure Security of the Department of Homeland Security shall conduct a study to assess the feasibility of implementing a short-term rotational program for the detail to the Agency of approved State, local, Tribal, and territorial government employees in cyber workforce positions.</text></subsection></section><section id="H949E479228CA4A41B90467D9A7E3E8C2" section-type="subsequent-section"><enum>4.</enum><header>Title XXII technical and clerical amendments</header><subsection id="H43D9CE218E8E48BA8375ABF0F7D73443"><enum>(a)</enum><header>Technical amendments</header><paragraph id="H6B9032F6B38B4030A3636F57D9676151"><enum>(1)</enum><header>Homeland Security Act of 2002</header><text display-inline="yes-display-inline">Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref> et seq.) is amended—</text><subparagraph id="HABDEB11B84D74224BC5C1DF05BD902AA"><enum>(A)</enum><text display-inline="yes-display-inline">in the first section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665">6 U.S.C. 665</external-xref>; relating to the duties and authorities relating to .gov internet domain), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="H6C139848B92F422C99831F0503350399" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="H818023D70B8B40B89D4F69589D870DE1"><enum>2215.</enum><header>Duties and authorities relating to .gov internet domain</header></section><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="H21752F3BD40E45E0B6D92939C4E91802"><enum>(B)</enum><text display-inline="yes-display-inline">in the second section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665b">6 U.S.C. 665b</external-xref>; relating to the joint cyber planning office), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="H46AE9EC6BB1E4EB39771A907239ABAFA" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="H337DE933643C487D8E2547A1D9CCD65D"><enum>2216.</enum><header>Joint cyber planning office</header></section><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="H76C82180B24E4341941EFD71884686FE"><enum>(C)</enum><text display-inline="yes-display-inline">in the third section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665c">6 U.S.C. 665c</external-xref>; relating to the Cybersecurity State Coordinator), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="HB0D9BB84C5FD4694BAF18C2F9E601B08" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="HBA69EF6D626A4C9F8CB90C6204D79671"><enum>2217.</enum><header>Cybersecurity State Coordinator</header></section><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="HAC9B67B3AED6432291D4A054A4E37FD8"><enum>(D)</enum><text display-inline="yes-display-inline">in the fourth section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665d">6 U.S.C. 665d</external-xref>; relating to Sector Risk Management Agencies), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="HFFC6B8C3954741D18C822BC4A972CC54" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="H09557CA5BBCC4785B0B0690E9BAE53A1"><enum>2218.</enum><header>Sector Risk Management Agencies</header></section><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="HF9B720DD5E474600B4C98A050382CBAF"><enum>(E)</enum><text display-inline="yes-display-inline">in section 2216 (<external-xref legal-doc="usc" parsable-cite="usc/6/665e">6 U.S.C. 665e</external-xref>; relating to the Cybersecurity Advisory Committee), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="H93CD5A60609B4F6C925F42A064235C5D" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="H7BDF8D6CB507456A907619BAB1DFE9CB"><enum>2219.</enum><header>Cybersecurity Advisory Committee</header></section><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph id="HFB7085824E1142ED8416CA3B72340991"><enum>(F)</enum><text display-inline="yes-display-inline">in section 2217 (<external-xref legal-doc="usc" parsable-cite="usc/6/665f">6 U.S.C. 665f</external-xref>; relating to Cybersecurity Education and Training Programs), by amending the section enumerator and heading to read as follows:</text><quoted-block style="OLC" id="H337759EC97B04029B47B0BB10D3FDA1D" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><section id="H05247ABC5D4246AA9E9176BB2ECEF8BF"><enum>2220.</enum><header>Cybersecurity Education and Training Programs</header></section><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="HBB3216274C214A59A0207ADB173CA2B5"><enum>(2)</enum><header>Consolidated Appropriations Act, 2021</header><text display-inline="yes-display-inline">Paragraph (1) of section 904(b) of division U of the Consolidated Appropriations Act, 2021 (<external-xref legal-doc="public-law" parsable-cite="pl/116/260">Public Law 116–260</external-xref>) is amended, in the matter preceding subparagraph (A), by inserting <quote>of 2002</quote> after <quote>Homeland Security Act</quote>.</text></paragraph></subsection><subsection id="HBBB1671083EC4192BFDDAF1C7C6DF574"><enum>(b)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of the Homeland Security Act of 2002 is amended by striking the items relating to sections 2214 through 2217 and inserting the following new items:</text><quoted-block style="OLC" id="HEE93343ED1134351AC142DE970E08940" display-inline="no-display-inline" changed="added" reported-display-style="italic" committee-id="HHM00"><toc regeneration="no-regeneration" changed="added" reported-display-style="italic" committee-id="HHM00"><toc-entry level="section">Sec. 2214. National Asset Database. </toc-entry><toc-entry level="section">Sec. 2215. Duties and authorities relating to .gov internet domain. </toc-entry><toc-entry level="section">Sec. 2216. Joint cyber planning office. </toc-entry><toc-entry level="section">Sec. 2217. Cybersecurity State Coordinator. </toc-entry><toc-entry level="section">Sec. 2218. Sector Risk Management Agencies. </toc-entry><toc-entry level="section">Sec. 2219. Cybersecurity Advisory Committee. </toc-entry><toc-entry level="section">Sec. 2220. Cybersecurity Education and Training Programs.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></legis-body><endorsement display="yes"><action-date>June 1, 2021</action-date><action-desc>Reported with an amendment, committed to the Committee of the Whole House on the State of the Union, and ordered to be printed</action-desc></endorsement></bill> 

