<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HA7784DCD7C1641BBBC26C2755A0B764F" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 3747 IH: Securing American Research from Cyber Theft Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-06-08</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3747</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210608">June 8, 2021</action-date><action-desc><sponsor name-id="B001291">Mr. Babin</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HSY00">Committee on Science, Space, and Technology</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To provide for a pilot project for a nationwide network of secure computing enclaves for federally funded research in universities, and for other purposes.</official-title></form><legis-body id="HF64243BA957C46D586C7CA6F9F826B32" style="OLC"><section id="H005E85B7AB964210B2B33A243F385445" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Securing American Research from Cyber Theft Act</short-title></quote>.</text></section><section id="HEC32C976BE254FD2861CF50419B93C43"><enum>2.</enum><header>Purpose</header><text display-inline="no-display-inline">The purposes of this Act are to help institutions of higher education protect federally funded research from cyber theft and interference by—</text><paragraph id="H6954B966AE694E1DAB978266283ED355"><enum>(1)</enum><text>directing the Networking and Information Technology Research and Development Program to provide for support and guidance on improving the security of academic computing and networking systems that process, store, and transmit federally funded research; and</text></paragraph><paragraph id="H93B01C52CBB7446F970EBE045BF9927B"><enum>(2)</enum><text>establishing a pilot program to support regional secure computing enclaves for academia to provide researchers with secure data storage and adequately protect Federal Government data.</text></paragraph></section><section id="H505A3A55A9F440FFB7585310B7F92A7E"><enum>3.</enum><header>Networking and information technology research and development update</header><text display-inline="no-display-inline">Section 101(a)(1) of the High-Performance Computing Act of 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5511">15 U.S.C. 5511</external-xref>) is amended—</text><paragraph id="HE93C8DD256FF41D78F05AE1A090FB6C7"><enum>(1)</enum><text>by inserting after subparagraph (I) the following:</text><quoted-block id="H66F8D1C1288948AC99E6C21478F87C04" style="OLC"><subparagraph id="H1E3600E88FF64AEE8F39D4BE9E382091"><enum>(J)</enum><text>provide for improving the security, reliability, and resiliency of computing and networking systems used by institutions of higher education and other nonprofit research institutions for the processing, storage and transmission of sensitive federally funded research and associated data;</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="H352A907EBA594EF4A4350533AE45B925"><enum>(2)</enum><text>by redesignating subparagraphs (J) through (O) as subparagraphs (K) through (P), respectively.</text></paragraph></section><section id="HBCCE0EAECDEA41D38D4490C27370F787"><enum>4.</enum><header>Computing Enclave Pilot Program</header><subsection id="HD933A44E00B94B03B158CA4CA16C1397"><enum>(a)</enum><header>In general</header><text>The Director of the National Science Foundation, in consultation with the Director of the National Institute of Standards and Technology and the Secretary of Energy, shall award grants to establish a pilot program to ensure the security of federally-supported research data and to assist regional institutions of higher education and their researchers in compliance with regulations regarding the safeguarding of sensitive information and other relevant regulations and Federal guidelines.</text></subsection><subsection id="HD74E8F56620047BA96F602E198BAB03D"><enum>(b)</enum><header>Structure</header><text>In carrying out the pilot program established pursuant to subsection (a), the Director shall select three institutions of higher education from among institutions classified under the Indiana University Center for Postsecondary Research Carnegie Classification as a doctorate-granting university with a very high level of research activity, and with a history of working with secure information for the development, installation, maintenance, or sustainment of secure computing enclaves.</text></subsection><subsection id="H6C86C09E77964958B5977417E50A30AD"><enum>(c)</enum><header>Regionalization</header><paragraph id="H9D2BDF4AA38440B9B168FB130B0832BA"><enum>(1)</enum><header>In general</header><text>In selecting universities pursuant to subsection (b), the Director shall give preference to institutions of higher education with the capability of serving other regional universities.</text></paragraph><paragraph id="H7C7F66B95A4442BC8FB9FC0FF1A1D1EC"><enum>(2)</enum><header>Geographic dispersal</header><text>The enclaves should be geographically dispersed to better meet the needs of regional interests.</text></paragraph></subsection><subsection id="HE90FEB221169434C8499E69837D06B0C"><enum>(d)</enum><header>Program elements</header><text>The Director shall work with institutions of higher education selected pursuant to subsection (b) to—</text><paragraph id="HEE458EA8FCF9469FA38C70356D8BC1A4"><enum>(1)</enum><text>develop an approved design blueprint for compliance with Federal data protection protocols;</text></paragraph><paragraph id="H2CA5134F04404F10AB0D941EF1EF986F"><enum>(2)</enum><text>develop a comprehensive and confidential list, or a bill of materials, of each binary component of the software, firmware, or product that is required to deploy additional secure computing enclaves;</text></paragraph><paragraph id="H705DC1BD6B4E4297B4C2B414D126CE94"><enum>(3)</enum><text>develop templates for all policies and procedures required to operate the secure computing enclave in a research setting;</text></paragraph><paragraph id="HAD28A896ABEC45C5B6D7FB51ACA0C333"><enum>(4)</enum><text>develop a system security plan template; and</text></paragraph><paragraph id="H70D4B28D96B14A418CB34F578540E971"><enum>(5)</enum><text>develop a process for managing a plan of action and milestones for the secure computing enclave.</text></paragraph></subsection><subsection id="H73E7B126898F43ED94ADD577D28A5087"><enum>(e)</enum><header>Duration</header><text>Subject to other availability of appropriations, the pilot program established pursuant to subsection (a) shall operate for not less than 3 years.</text></subsection><subsection id="H89FEEAB7E2E340269C43A8006E2F5817"><enum>(f)</enum><header>Report</header><paragraph id="H17AFF1F6806F4764A8B82C303D423AA9"><enum>(1)</enum><header>In general</header><text>The Director of the National Science Foundation shall report to Congress not later than 6 months after the completion of the pilot program under subsection (a).</text></paragraph><paragraph id="H17269FC45F6144BBA809A1B06C80889D"><enum>(2)</enum><header>Contents</header><text>The report required under paragraph (1) shall include—</text><subparagraph id="H7131ED38FF514F90A4070F18723E7B7F"><enum>(A)</enum><text>an assessment of the pilot program under subsection (a), including an assessment of the security benefits provided by such secure computing enclaves;</text></subparagraph><subparagraph id="HCF5713920A5443DD80BFDA4B728B7C2E"><enum>(B)</enum><text>recommendations related to the value of expanding the network of secure computing enclaves; and</text></subparagraph><subparagraph id="H4A3C1655238C401AAC9C3C161E8AB7ED"><enum>(C)</enum><text>recommendations on the efficacy of the use of secure computing enclaves by other Federal agencies in a broader effort to expand security of Federal research.</text></subparagraph></paragraph></subsection><subsection id="H7E1E190FA7674B8CB4288BCBDC534F50"><enum>(g)</enum><header>Authorization of appropriations</header><text>There is authorized to be appropriated to the Director, $38,000,000 for fiscal years 2022 through 2024, to carry out the activities outlined in this section.</text></subsection></section><section id="H36FC289C896B4FDD9EEBAF7635FE09F6"><enum>5.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="HA6C6E30E6C2F4374A885BE9DA2AA35E1"><enum>(1)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the National Science Foundation.</text></paragraph><paragraph id="HD15CC1BA4D0C4C6F8F7E77D6F185833B"><enum>(2)</enum><header>Institution of higher education</header><text>The term <term>institution of higher education</term> has the meaning given such term in section 101 of the Higher Education Act of 1965 (<external-xref legal-doc="usc" parsable-cite="usc/20/1001">20 U.S.C. 1001</external-xref>).</text></paragraph></section></legis-body></bill> 

