<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HC8589DA3D08C44E9A1A4A2A55B73F5B7" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 3313 IH: Hack Your State Department Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-05-18</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3313</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210518">May 18, 2021</action-date><action-desc><sponsor name-id="L000582">Mr. Lieu</sponsor> (for himself, <cosponsor name-id="S001209">Ms. Spanberger</cosponsor>, <cosponsor name-id="P000048">Mr. Pfluger</cosponsor>, and <cosponsor name-id="T000478">Ms. Tenney</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HFA00">Committee on Foreign Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To require the Secretary of State to design and establish a Vulnerability Disclosure Process (VDP) to improve Department of State cybersecurity and a bug bounty program to identify and report vulnerabilities of internet-facing information technology of the Department of State, and for other purposes.</official-title></form><legis-body id="H7CA3DCCF4A374655BC5C65F49D346BDC" style="OLC"><section id="H3C8214B31BB14805ACC7F05F8B206711" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Hack Your State Department Act</short-title></quote>.</text></section><section id="H9F65EB5ADA9C48B491CC7111E48F31A6"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="HE5C25691C2C74EA998AD9E3BC96D0A99"><enum>(1)</enum><header>Bug bounty program</header><text>The term <quote>bug bounty program</quote> means a program under which an approved individual, organization, or company is temporarily authorized to identify and report vulnerabilities of internet-facing information technology of the Department in exchange for compensation.</text></paragraph><paragraph id="HF07E86B7F3C342128D644C7E9C86A8EF"><enum>(2)</enum><header>Department</header><text>The term <quote>Department</quote> means the Department of State.</text></paragraph><paragraph id="H14632EBEB6D44A138AE9465909AAD43B"><enum>(3)</enum><header>Information technology</header><text>The term <quote>information technology</quote> has the meaning given such term in section 11101 of title 40, United States Code.</text></paragraph><paragraph id="HC34268D1058E4A2A9826986B0A427100"><enum>(4)</enum><header>Secretary</header><text>The term <quote>Secretary</quote> means the Secretary of State.</text></paragraph></section><section id="H566602B7DA7A4A8CBAB1865B82C556E0"><enum>3.</enum><header>Department of State Vulnerability Disclosure Process</header><subsection id="HF83DFB1BDE3D4F2D81F64AB25C8E675F"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this Act, the Secretary shall design, establish, and make publicly known a Vulnerability Disclosure Process (VDP) to improve Department cybersecurity by—</text><paragraph id="H7B37E6E497444B1E9F62B365DA81BF88"><enum>(1)</enum><text>providing security researchers with clear guidelines for—</text><subparagraph id="H1281EB611B4A41378C3EA9CF49A0904B"><enum>(A)</enum><text>conducting vulnerability discovery activities directed at Department information technology; and</text></subparagraph><subparagraph id="H33D98233A7704D1F968E8C77BC546B07"><enum>(B)</enum><text>submitting discovered security vul­ner­a­bil­i­ties to the Department; and</text></subparagraph></paragraph><paragraph id="H60F1420F92CE4563825C0038E1271909"><enum>(2)</enum><text>creating Department procedures and infrastructure to receive and fix discovered vul­ner­a­bil­i­ties.</text></paragraph></subsection><subsection id="H700238876668433EA1656B3B449AC8A0"><enum>(b)</enum><header>Requirements</header><text display-inline="yes-display-inline">In establishing the VDP pursuant to paragraph (1), the Secretary shall—</text><paragraph id="H52A851BFEB8F4FB39CAC5E7622057070"><enum>(1)</enum><text display-inline="yes-display-inline">identify which Department information technology should be included in the process;</text></paragraph><paragraph id="HBC9E2C638C004B088A713619BA67BA67"><enum>(2)</enum><text>determine whether the process should differentiate among and specify the types of security vulnerabilities that may be targeted;</text></paragraph><paragraph id="H8C7A1A2DB8864F25B6ACAC1B04EF1E27"><enum>(3)</enum><text>provide a readily available means of reporting discovered security vulnerabilities and the form in which such vulnerabilities should be reported;</text></paragraph><paragraph id="HE053ED3B84E94BF98B984AD95C27F266"><enum>(4)</enum><text>identify which Department offices and positions will be responsible for receiving, prioritizing, and addressing security vulnerability disclosure reports;</text></paragraph><paragraph id="H6E1D0E31092149FF8CAC2A8D49BE995A"><enum>(5)</enum><text>consult with the Attorney General regarding how to ensure that individuals, organizations, and companies that comply with the requirements of the process are protected from prosecution under section 1030 of title 18, United States Code, and similar provisions of law for specific activities authorized under the process;</text></paragraph><paragraph id="HDFA4072B0EAA4A80B5F23683877A0A91"><enum>(6)</enum><text>consult with the relevant offices at the Department of Defense that were responsible for launching the 2016 Vulnerability Disclosure Program, <quote>Hack the Pentagon</quote>, and subsequent Department of Defense bug bounty programs;</text></paragraph><paragraph id="HBA051669BDC7462DA8F6804B7A2D029B"><enum>(7)</enum><text>engage qualified interested persons, including nongovernmental sector representatives, about the structure of the process as constructive and to the extent practicable; and</text></paragraph><paragraph commented="no" id="H8748727D3E174DD4884D34F1605DB446"><enum>(8)</enum><text>award contracts to entities, as necessary, to manage the process and implement the remediation of discovered security vulnerabilities.</text></paragraph></subsection><subsection id="H9D610E1CB64D4163865C375AC4F28E63"><enum>(c)</enum><header>Annual reports</header><text>Not later than 180 days after the establishment of the VDP under subsection (a) and annually thereafter for the next six years, the Secretary of State shall submit to the Committee on Foreign Affairs of the House of Representatives and the Committee on Foreign Relations of the Senate a report on the VDP, including information relating to the following:</text><paragraph id="HF1634AC48E2545D39314D62DFDFDF400"><enum>(1)</enum><text display-inline="yes-display-inline">The number and severity of all security vulnerabilities reported.</text></paragraph><paragraph id="HCE9949364CD24E77AD42BC3A01A52073"><enum>(2)</enum><text>The number of previously unidentified security vulnerabilities remediated as a result.</text></paragraph><paragraph id="HDCE489D8E36E4671AAEB9746355440C3"><enum>(3)</enum><text>The current number of outstanding previously unidentified security vulnerabilities and Department of State remediation plans.</text></paragraph><paragraph id="HBE4545531FD148BCA3DA12E2C9CC32AC"><enum>(4)</enum><text>The average length of time between the reporting of security vulnerabilities and remediation of such vulnerabilities.</text></paragraph><paragraph id="HAD28027F1ECF4A62AEC66B1ACD746654"><enum>(5)</enum><text>The resources, surge staffing, roles, and responsibilities within the Department used to implement the VDP and complete security vulnerability remediation.</text></paragraph><paragraph id="H4C4F1B23F2F9458AB7AAF9D2894B1693"><enum>(6)</enum><text>Any other information the Secretary determines relevant.</text></paragraph></subsection></section><section id="HCD045D1C545B496DA0065374D013C142"><enum>4.</enum><header>Department of State bug bounty pilot program</header><subsection id="H6436E3EC60254293826060361CFB8826"><enum>(a)</enum><header>Establishment of pilot program</header><paragraph id="HDA1A138407A54B3F96C89BB2502C0F78"><enum>(1)</enum><header>In general</header><text>Not later than one year after the date of the enactment of this Act, the Secretary shall establish a bug bounty pilot program to minimize security vulnerabilities of internet-facing information technology of the Department.</text></paragraph><paragraph id="HAD4F193F1E1F45A1B3D428996C5D92FA"><enum>(2)</enum><header>Requirements</header><text>In establishing the pilot program described in paragraph (1), the Secretary shall—</text><subparagraph id="HC92896EC06694503879D3F066B21AAB2"><enum>(A)</enum><text>provide compensation for reports of previously unidentified security vulnerabilities within the websites, applications, and other internet-facing information technology of the Department that are accessible to the public;</text></subparagraph><subparagraph commented="no" id="HCFB69BF2A38246108E3FB418ACA4C58D"><enum>(B)</enum><text>award contracts to entities, as necessary, to manage such pilot program and for executing the remediation of security vul­ner­a­bil­i­ties identified pursuant to subparagraph (A);</text></subparagraph><subparagraph id="HCF78583F287041BD9F26948DE2471243"><enum>(C)</enum><text>identify which Department information technology should be included in such pilot program;</text></subparagraph><subparagraph id="H93C0EA66256F401BB792DDB1369FEB72"><enum>(D)</enum><text>consult with the Attorney General on how to ensure that individuals, organizations, or companies that comply with the requirements of such pilot program are protected from prosecution under section 1030 of title 18, United States Code, and similar provisions of law for specific activities authorized under such pilot program;</text></subparagraph><subparagraph id="HD5B778EADD7E4F71896CF85242F26B31"><enum>(E)</enum><text>consult with the relevant offices at the Department of Defense that were responsible for launching the 2016 <quote>Hack the Pentagon</quote> pilot program and subsequent Department of Defense bug bounty programs;</text></subparagraph><subparagraph id="HA485813864B74BAB90C172ADECEFF040"><enum>(F)</enum><text>develop a process by which an approved individual, organization, or company can register with the entity referred to in subparagraph (B), submit to a background check as determined by the Department, and receive a determination as to eligibility for participation in such pilot program;</text></subparagraph><subparagraph id="H3C6231053DA44E7392CB83EB42912DC3"><enum>(G)</enum><text>engage qualified interested persons, including nongovernmental sector representatives, about the structure of such pilot program as constructive and to the extent practicable; and</text></subparagraph><subparagraph id="H090A95A3CADF4361814F5B028EDC2FAA"><enum>(H)</enum><text>consult with relevant United States Government officials to ensure that such pilot program complements persistent network and vulnerability scans of the Department of State’s internet-accessible systems, such as the scans conducted pursuant to Binding Operational Directive BOD–19–02 or successor Directive.</text></subparagraph></paragraph><paragraph id="H1E96137A0C664334B9ADF72CB5BA9496"><enum>(3)</enum><header>Duration</header><text>The pilot program established under paragraph (1) should be short-term in duration and not last longer than one year.</text></paragraph></subsection><subsection id="H6C0A4A33C7D64E94A0DFFCBF9C0BEF27"><enum>(b)</enum><header>Report</header><text>Not later than 180 days after the date on which the bug bounty pilot program under subsection (a) is completed, the Secretary shall submit to the Committee on Foreign Relations of the Senate and the Committee on Foreign Affairs of the House of Representatives a report on such pilot program, including information relating to—</text><paragraph id="HECDE1646787A4DC68EBE9F2B266DCA8E"><enum>(1)</enum><text>the number of approved individuals, organizations, or companies involved in such pilot program, broken down by the number of approved individuals, organizations, or companies that—</text><subparagraph id="H9DD6203FADBB4BA287BC1530929CC886"><enum>(A)</enum><text>registered;</text></subparagraph><subparagraph id="HC3ADA834A71149C78F5D4208FC039834"><enum>(B)</enum><text>were approved;</text></subparagraph><subparagraph id="H472780EA9F31458AB1DF5932842D5D08"><enum>(C)</enum><text>submitted security vulnerabilities; and</text></subparagraph><subparagraph id="H91CE67FDF13741CF9C08AC239EEEAACE"><enum>(D)</enum><text>received compensation;</text></subparagraph></paragraph><paragraph id="HB1685FCC88584F69B241AAB1D334D592"><enum>(2)</enum><text display-inline="yes-display-inline">the number and severity of all security vulnerabilities reported as part of such pilot program;</text></paragraph><paragraph id="H0C7E7194C2E54A6BA9006BF660D08187"><enum>(3)</enum><text>the number of previously unidentified security vulnerabilities remediated as a result of such pilot program;</text></paragraph><paragraph id="H998BB6BF11054C299E1DF251B4D02709"><enum>(4)</enum><text>the current number of outstanding previously unidentified security vulnerabilities and Department remediation plans;</text></paragraph><paragraph id="H8FFDE0304E0745BEA167FBCD9DB8E623"><enum>(5)</enum><text>the average length of time between the reporting of security vulnerabilities and remediation of such vulnerabilities;</text></paragraph><paragraph id="H5A5C785A88CF4C428DAF39CE7079BADF"><enum>(6)</enum><text>the types of compensation provided under such pilot program; and</text></paragraph><paragraph id="H4425DD905D414BAA8614B65725BFF3DA"><enum>(7)</enum><text>the lessons learned from such pilot program.</text></paragraph></subsection></section></legis-body></bill> 

