<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HFED3242A64634E09AC3771D479C2E0D9" public-private="public" key="H" bill-type="olc">
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 5440 IH: Cyber Incident Reporting for Critical Infrastructure Act of 2021</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-09-30</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code>
<congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session>
<legis-num display="yes">H. R. 5440</legis-num>
<current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber>
<action display="yes">
<action-date date="20210930">September 30, 2021</action-date>
<action-desc><sponsor name-id="C001067">Ms. Clarke of New York</sponsor> (for herself, <cosponsor name-id="K000386">Mr. Katko</cosponsor>, <cosponsor name-id="T000193">Mr. Thompson of Mississippi</cosponsor>, and <cosponsor name-id="G000597">Mr. Garbarino</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HHM00">Committee on Homeland Security</committee-name></action-desc>
</action>
<legis-type>A BILL</legis-type>
<official-title display="yes">To amend the Homeland Security Act of 2002 to establish the Cyber Incident Review Office in the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes.</official-title>
</form>
<legis-body id="H9DF5425DA1CE4DC49CD8EAC0FFF69C99" style="OLC">
<section id="HC96131932BE34D13ADA465BB3FC8F12A" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cyber Incident Reporting for Critical Infrastructure Act of 2021</short-title></quote>.</text></section> <section id="H77E50ADCE3B24F48B9AF1AB3D318C38A"><enum>2.</enum><header>Cyber Incident Review Office</header> <subsection id="H32F3DE5667394D4F9EB880410FD808B5"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651 et seq.</external-xref>) is amended by adding at the end the following new section:</text>
<quoted-block id="HA0FFBFC41D97484CB66D3FFA52DAC5D2" style="OLC">
<section id="H49BEB027A5F74B58AF5D5F4D013E4BD6"><enum>2220A.</enum><header>Cyber Incident Review Office</header>
<subsection id="H8FCB683C1BF8422886A4789241845E83"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="HDC3DE12C10924878927CAF9906299FF2"><enum>(1)</enum><header>Cloud service provider</header><text>The term <quote>cloud service provider</quote> means an entity offering products or services related to cloud computing, as defined by the National Institutes of Standards and Technology in NIST Special Publication 800–145 and any amendatory or superseding document relating thereto.</text></paragraph>
<paragraph id="H547A5C23566947C28B49BC11E3B872A1"><enum>(2)</enum><header>Covered entity</header><text>The term <quote>covered entity</quote> means an entity that owns or operates critical infrastructure that satisfies the definition established by the Director in the reporting requirements and procedures issued pursuant to subsection (d).</text></paragraph> <paragraph id="H82A88816FB3F441D9BA74F235F958614"><enum>(3)</enum><header>Covered cybsecurity incident</header><text>The term <quote>covered cybersecurity incident</quote> means a cybersecurity incident experienced by a covered entity that satisfies the definition and criteria established by the Director in the reporting requirements and procedures issued pursuant to subsection (d).</text></paragraph>
<paragraph id="H21CE541FA9694783A43E81D8AEE7586E"><enum>(4)</enum><header>Cyber threat indicator</header><text>The term <quote>cyber threat indicator</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph> <paragraph id="H753F52C3E5ED4E15A4A878AD19C43BD5"><enum>(5)</enum><header>Cybersecurity purpose</header><text>The term <quote>cybersecurity purpose</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph>
<paragraph id="HBE28DE8503AE4DBDA4C54C94E8C20C11"><enum>(6)</enum><header>Cybersecurity threat</header><text>The term <quote>cybersecurity threat</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph> <paragraph id="HBC9DBB92559F4A20BCFFD66AF59A1924"><enum>(7)</enum><header>Defensive measure</header><text>The term <quote>defensive measure</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph>
<paragraph id="H911484802D86453F923AACD9DFA1C54B"><enum>(8)</enum><header>Information Sharing and Analysis Organization</header><text display-inline="yes-display-inline">The term <quote>Information Sharing and Analysis Organization</quote> has the meaning given such term in section 2222(5).</text></paragraph> <paragraph id="HA6284F7125A9440290CEB6C4A1FDDDD7"><enum>(9)</enum><header>Information system</header><text display-inline="yes-display-inline">The term <quote>information system</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501(9)</external-xref>).</text></paragraph>
<paragraph id="H619EE0282D7047E699CE2CBE03728864"><enum>(10)</enum><header>Intelligence community</header><text>The term <quote>intelligence community</quote> has the meaning given the term in section 3(4) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)</external-xref>).</text></paragraph> <paragraph id="H80D22276BBA04D4DB8795BFF7A2EC601"><enum>(11)</enum><header>Managed service provider</header><text>The term <quote>managed service provider</quote> means an entity that delivers services, such as network, application, infrastructure, or security services, via ongoing and regular support and active administration on customers’ premises, in the managed service provider’s data center (such as hosting), or in a third-party data center.</text></paragraph>
<paragraph id="HC76750C3FA714C72A5F663D6F8255329"><enum>(12)</enum><header>Security control</header><text>The term <quote>security control</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph> <paragraph id="HE668D7086BD6436FB8765166AE66D58F"><enum>(13)</enum><header>Security vulnerability</header><text>The term <quote>security vulnerability</quote> has the meaning given such term in section 102 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>)).</text></paragraph>
<paragraph id="H27F7CD8126B44D5BBE20988E3B2CC94C" commented="no"><enum>(14)</enum><header>Significant cyber incident</header><text>The term <quote>significant cyber incident</quote> means a cyber incident, or a group of related cyber incidents, that the Director determines is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.</text></paragraph> <paragraph id="H41A75A92491245F3AB6AD709667B3C78"><enum>(15)</enum><header>Supply chain attack</header><text display-inline="yes-display-inline">The term <quote>supply chain attack</quote> means an attack that allows an adversary to utilize implants or other vulnerabilities inserted into information technology hardware, software, operating systems, peripherals (such as information technology products), or services at any point during the life cycle in order to infiltrate the networks of third parties where such products, services, or technologies are deployed.</text></paragraph></subsection>
<subsection id="HFEC8EA64BF954C3E8FA8F09333D17A9D" commented="no"><enum>(b)</enum><header>Cyber Incident Review Office</header><text display-inline="yes-display-inline">There is established in the Agency a Cyber Incident Review Office (in this section referred to as the <quote>Office</quote>) to receive, aggregate, and analyze reports related to covered cybersecurity incidents submitted by covered entities in furtherance of the activities specified in subsection (c) of this section and sections 2202(e), 2209(c), and 2203 to enhance the situational awareness of cybersecurity threats across critical infrastructure sectors.</text></subsection> <subsection id="HB311C82F0C004D58A999695819C78B8B" commented="no"><enum>(c)</enum><header>Activities</header><text>The Office shall, in furtherance of the activities specified in sections 2202(e), 2209(c), and 2203—</text>
<paragraph id="HD9385DCD348D4FD3BC2A816CB06E81E9" commented="no"><enum>(1)</enum><text display-inline="yes-display-inline">receive, aggregate, analyze, and secure reports from covered entities related to a covered cybersecurity incident to assess the effectiveness of security controls and identify tactics, techniques, and procedures adversaries use to overcome such controls;</text></paragraph> <paragraph id="H1E5799F79DC743A4AE1391E8A8327C20" commented="no"><enum>(2)</enum><text>facilitate the timely sharing between relevant critical infrastructure owners and operators and, as appropriate, the intelligence community of information relating to covered cybersecurity incidents, particularly with respect to an ongoing cybersecurity threat or security vulnerability;</text></paragraph>
<paragraph id="H4DE7F9CF31D6497AA5F9A8E4D59E9168" commented="no"><enum>(3)</enum><text>for a covered cybersecurity incident that also satisfies the definition of a significant cyber incident, or are part of a group of related cyber incidents that together satisfy such definition, conduct a review of the details surrounding such covered cybersecurity incident or group of such incidents and identify ways to prevent or mitigate similar incidents in the future;</text></paragraph> <paragraph id="H84A4868E2E9A46208461C2F9F8F72DE2" commented="no"><enum>(4)</enum><text>with respect to covered cybersecurity incident reports under subsection (d) involving an ongoing cybersecurity threat or security vulnerability, immediately review such reports for cyber threat indicators that can be anonymized and disseminated, with defensive measures, to appropriate stakeholders, in coordination with other Divisions within the Agency, as appropriate;</text></paragraph>
<paragraph id="H14112B04C327483FB241CDA6DD7D0E70" commented="no"><enum>(5)</enum><text>publish quarterly unclassified, public reports that describe aggregated, anonymized observations, findings, and recommendations based on covered cybersecurity incident reports under subsection (d);</text></paragraph> <paragraph id="HADC78AC146104FEAAFA979D2D1B24783"><enum>(6)</enum><text>leverage information gathered regarding cybersecurity incidents to enhance the quality and effectiveness of bi-directional information sharing and coordination efforts with appropriate stakeholders, including sector coordinating councils, information sharing and analysis organizations, technology providers, cybersecurity and incident response firms, and security researchers, including by establishing mechanisms to receive feedback from such stakeholders regarding how the Agency can most effectively support private sector cybersecurity; and</text></paragraph>
<paragraph id="HCBA25C6446284E04B6AF656611576F89"><enum>(7)</enum><text>proactively identify opportunities, in accordance with the protections specified in subsections (e) and (f), to leverage and utilize data on cybersecurity incidents in a manner that enables and strengthens cybersecurity research carried out by academic institutions and other private sector organizations, to the greatest extent practicable.</text></paragraph></subsection> <subsection id="H2041FB4EE6A14BF4BF26180553F23E49"><enum>(d)</enum><header>Covered cybersecurity incident reporting requirements and procedures</header> <paragraph id="H999AC662AB6A40ACBB1C3D71F9761433"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 270 days after the date of the enactment of this section, the Director, in consultation with Sector Risk Management Agencies and the heads of other Federal departments and agencies, as appropriate, shall, after a 60 day consultative period, followed by a 90 day comment period with appropriate stakeholders, including sector coordinating councils, publish in the Federal Register an interim final rule implementing this section. Notwithstanding section 553 of title 5, United States Code, such rule shall be effective, on an interim basis, immediately upon publication, but may be subject to change and revision after public notice and opportunity for comment. The Director shall issue a final rule not later than one year after publication of such interim final rule. Such interim final rule shall—</text>
<subparagraph id="HF1AEBC08282E4ECDBA4801303B183678" commented="no"><enum>(A)</enum><text>require covered entities to submit to the Office reports containing information relating to covered cybersecurity incidents; and</text></subparagraph> <subparagraph id="H4BD0AA4A081B4E14AB0827900D1F00A6"><enum>(B)</enum><text>establish procedures that clearly describe—</text>
<clause id="HCE0F5226306844EAA3978F2FDA26ACDE"><enum>(i)</enum><text>the types of critical infrastructure entities determined to be covered entities;</text></clause> <clause id="H4BF1C322B4BE4359A3BDF8EB794DC3A5"><enum>(ii)</enum><text>the types of cybersecurity incidents determined to be covered cybersecurity incidents;</text></clause>
<clause id="H00A914308C8746FA88FC9F5F5B22FB10"><enum>(iii)</enum><text display-inline="yes-display-inline">the mechanisms by which covered cybersecurity incident reports under subparagraph (A) are to be submitted, including—</text> <subclause id="H56E20A51DB404401B25F7029BDF81645"><enum>(I)</enum><text>the contents, described in paragraph (4), to be included in each such report, including any supplemental reporting requirements;</text></subclause>
<subclause id="HE06030832DB74F45BE624AFC7DD3C6E3"><enum>(II)</enum><text>the timing relating to when each such report should be submitted; and</text></subclause> <subclause id="H31E2EF8EFFDC4725B48D3A4F0E21F0C9"><enum>(III)</enum><text>the format of each such report;</text></subclause></clause>
<clause id="H6F875F473BB34190AB30CAB5EB0A7F46"><enum>(iv)</enum><text display-inline="yes-display-inline">describe the manner in which the Office will carry out enforcement actions under subsection (g), including with respect to the issuance of subpoenas, conducting examinations, and other aspects relating to noncompliance; and</text></clause> <clause id="HC23297C1B0F6483B8BFA2E6F5E0AC895" commented="no"><enum>(v)</enum><text>any other responsibilities to be carried out by covered entities, or other procedures necessary to implement this section.</text></clause></subparagraph></paragraph>
<paragraph id="H2FF266D85B9849419260066064F33E26"><enum>(2)</enum><header>Covered entities</header><text display-inline="yes-display-inline">In determining which types of critical infrastructure entities are covered entities for purposes of this section, the Secretary, acting through the Director, in consultation with Sector Risk Management Agencies and the heads of other Federal departments and agencies, as appropriate, shall consider—</text> <subparagraph id="H3B46DCCC943A47E784390794EBB1C774"><enum>(A)</enum><text>the consequences that disruption to or compromise of such an entity could cause to national security, economic security, or public health and safety;</text></subparagraph>
<subparagraph id="H6D94C2E7AE7649F6A39ED759EE35AF16"><enum>(B)</enum><text>the likelihood that such an entity may be targeted by a malicious cyber actor, including a foreign country;</text></subparagraph> <subparagraph id="H6D53E5DB7EA6442AB33EA4269E03229D"><enum>(C)</enum><text>the extent to which damage, disruption, or unauthorized access to such and entity will disrupt the reliable operation of other critical infrastructure assets; and</text></subparagraph>
<subparagraph id="HDB93CE38F6644374BF1B9A304B0AC20C" commented="no"><enum>(D)</enum><text>the extent to which an entity or sector is subject to existing regulatory requirements to report cybersecurity incidents, and the possibility of coordination and sharing of reports between the Office and the regulatory authority to which such entity submits such other reports.</text></subparagraph></paragraph> <paragraph id="HF06732A207A1488FB6C711272F5C8037" commented="no"><enum>(3)</enum><header>Outreach to covered entities</header> <subparagraph id="HFE1C157EA4394613BB0E8710E11DE61A" commented="no"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The Director shall conduct an outreach and education campaign to inform covered entities of the requirements of this section.</text></subparagraph>
<subparagraph id="H37686ABEEC4945EAB31099D92227A360" commented="no"><enum>(B)</enum><header>Elements</header><text>The outreach and education campaign under subparagraph (A) shall include the following:</text> <clause id="H77CD0B98CD924564B6FA1CF16D0247E3" commented="no"><enum>(i)</enum><text>Overview of the interim final rule and final rule issued pursuant to this section.</text></clause>
<clause id="H9B8E630B79854BC89F786EA956143B15" commented="no"><enum>(ii)</enum><text display-inline="yes-display-inline">Overview of reporting requirements and procedures issued pursuant to paragraph (1).</text></clause> <clause id="HA89A70036A2F4BC89BD8777254D6B8B8" commented="no"><enum>(iii)</enum><text display-inline="yes-display-inline">Overview of mechanisms to submit to the Office covered cybersecurity incident reports and information relating to the disclosure, retention, and use of incident reports under this section.</text></clause>
<clause id="HA68953E8AC4A429396BFF242B251C932" commented="no"><enum>(iv)</enum><text>Overview of the protections afforded to covered entities for complying with requirements under subsection (f).</text></clause> <clause id="HC233D94DE712437A942B0682ED80E441" commented="no"><enum>(v)</enum><text>Overview of the steps taken under subsection (g) when a covered entity is not in compliance with the reporting requirements under paragraph (1).</text></clause></subparagraph>
<subparagraph id="H31A76FBB22734C3A9776F608A315F5FD" commented="no"><enum>(C)</enum><header>Coordination</header><text>The Director may conduct the outreach and education campaign under subparagraph (A) through coordination with the following:</text> <clause id="HFACEC46C28A14E30A66A2BD8C6DF4407" commented="no"><enum>(i)</enum><text>The Critical Infrastructure Partnership Advisory Council established pursuant to section 871.</text></clause>
<clause id="H89BCC173EC624EE8B1CE203E7232F160" commented="no"><enum>(ii)</enum><text>Information Sharing and Analysis Organizations.</text></clause> <clause id="H9E52DA20FF1E41CD8B821FA4667FD333" commented="no"><enum>(iii)</enum><text>Any other means the Director determines to be effective to conduct such campaign.</text></clause></subparagraph></paragraph>
<paragraph id="HFACFDB73181540CFB7E5D4049B2E8BD9"><enum>(4)</enum><header>Covered cybersecurity incidents</header>
<subparagraph id="H07A7ABB6A52346DF82FB3C190D2503FE" commented="no"><enum>(A)</enum><header>Considerations</header><text>In accordance with subparagraph (B), in determining which types of incidents are covered cybersecurity incidents for purposes of this section, the Director shall consider—</text> <clause id="H4B8F32A6A85A47878BA5F9890DC5C734" commented="no"><enum>(i)</enum><text>the sophistication or novelty of the tactics used to perpetrate such an incident, as well as the type, volume, and sensitivity of the data at issue;</text></clause>
<clause id="H1478A9E973FF463FBE9362E99D1233E8" commented="no"><enum>(ii)</enum><text>the number of individuals directly or indirectly affected or potentially affected by such an incident; and</text></clause> <clause id="HE2721AB94C0C477FA4C83803F30C5762" commented="no"><enum>(iii)</enum><text display-inline="yes-display-inline">potential impacts on industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers.</text></clause></subparagraph>
<subparagraph id="HE5388F452EA74BE9A11269CB60B5C66A" commented="no"><enum>(B)</enum><header>Minimum thresholds</header><text display-inline="yes-display-inline">For a cybersecurity incident to be considered a covered cybersecurity incident a cybersecurity incident shall, at a minimum, include at least one of the following:</text> <clause id="HB4E63034138B463EB51A43147B86D8E5" commented="no"><enum>(i)</enum><text>Unauthorized access to an information system or network that leads to loss of confidentiality, integrity, or availability of such information system or network, or has a serious impact on the safety and resiliency of operational systems and processes.</text></clause>
<clause id="H8662010E23CA43BF982B0D93AB893777" commented="no"><enum>(ii)</enum><text display-inline="yes-display-inline">Disruption of business or industrial operations due to a denial of service attack, a ransomware attack, or exploitation of a zero-day vulnerability, against—</text> <subclause id="H2BC3D8BFA13C4E599F7A53E334CB07DF" commented="no"><enum>(I)</enum><text>an information system or network; or</text></subclause>
<subclause id="H7F8B9F33F5834898B322CD8ADB5A8AC3" commented="no"><enum>(II)</enum><text>an operational technology system or process.</text></subclause></clause> <clause id="H47FC3A8394A6480EAC9C02225A9C940B" commented="no"><enum>(iii)</enum><text display-inline="yes-display-inline">Unauthorized access or disruption of business or industrial operations due to loss of service facilitated through, or caused by a compromise of, a cloud service provider, managed service provider, other third-party data hosting provider, or supply chain attack.</text></clause></subparagraph></paragraph>
<paragraph id="H43FD3A987A52457C9C60AE8A9D4EF730"><enum>(5)</enum><header>Reports</header>
<subparagraph id="H5614A8CD601145BABAFA44BEF7AAC1E4" commented="no"><enum>(A)</enum><header>Timing</header>
<clause id="HC0D46CB59D6F4D928976CF17812B92D0" commented="no"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">The Director, in consultation with Sector Risk Management Agencies and the heads of other Federal departments and agencies, as appropriate, shall establish reporting timelines for covered entities to submit promptly to the Office covered cybersecurity incident reports, as the Director determines reasonable and appropriate based on relevant factors, such as the nature, severity, and complexity of the covered cybersecurity incident at issue and the time required for investigation, but in no case may the Director require reporting by a covered entity earlier than 72 hours after confirmation that a covered cybersecurity incident has occurred.</text></clause> <clause id="H96907753E0F241399EC6E4E8E0636B07"><enum>(ii)</enum><header>Considerations</header><text display-inline="yes-display-inline">In determining reporting timelines under clause (i), the Director shall—</text>
<subclause id="HF6387DEC5CE84327807AAB2B2A240A6F" commented="no"><enum>(I)</enum><text display-inline="yes-display-inline">consider any existing regulatory reporting requirements, similar in scope purpose, and timing to the reporting requirements under this section, to which a covered entity may also be subject, and make efforts to harmonize the timing and contents of any such reports to the maximum extent practicable; and</text></subclause> <subclause id="H62EB031986274C12B05826AEA0FBD9B1"><enum>(II)</enum><text>balance the Agency’s need for situational awareness with a covered entity’s ability to conduct incident response and investigations.</text></subclause></clause></subparagraph>
<subparagraph id="H1E34338073B54B4C9F7020787325EBCF"><enum>(B)</enum><header>Third-party reporting</header>
<clause id="HB738A0DF414E491F90056E1DE61C31CD"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">A covered entity may submit a covered cybersecurity incident report through a third-party entity or Information Sharing and Analysis Organization.</text></clause> <clause id="H3E8C26C21B2A45A7AE7C4EAF61AB89DD" commented="no"><enum>(ii)</enum><header>Duty to ensure compliance</header><text display-inline="yes-display-inline">Third-party reporting under this subparagraph does not relieve a covered entity of the duty to ensure compliance with the requirements of this paragraph.</text></clause></subparagraph>
<subparagraph id="H796D1D91FF49476889FE66D2C1BC20AC" commented="no"><enum>(C)</enum><header>Supplemental reporting</header><text display-inline="yes-display-inline">A covered entity shall submit promptly to the Office, until such date that such covered entity notifies the Office that the cybersecurity incident investigation at issue has concluded and the associated covered cybersecurity incident has been fully mitigated and resolved, periodic updates or supplements to a previously submitted covered cybersecurity incident report if new or different information becomes available that would otherwise have been required to have been included in such previously submitted report. In determining reporting timelines, the Director may choose to establish a flexible, phased reporting timeline for covered entities to report information in a manner that aligns with investigative timelines and allows covered entities to prioritize incident response efforts over compliance. </text></subparagraph> <subparagraph id="HA3036CF5364F40A18E175712248DF348"><enum>(D)</enum><header>Contents</header><text>Covered cybersecurity incident reports submitted pursuant to this section shall contain such information as the Director prescribes, including the following information, to the extent applicable and available, with respect to a covered cybersecurity incident:</text>
<clause id="H0CEC7F5BA0C942C1827ECAACD4E635DB"><enum>(i)</enum><text>A description of the covered cybersecurity incident, including identification of the affected information systems, networks, or devices that were, or are reasonably believed to have been, affected by such incident, and the estimated date range of such incident.</text></clause> <clause id="HCC3B66AB285A40B3848A80CF4E42CA14"><enum>(ii)</enum><text display-inline="yes-display-inline">Where applicable, a description of the vulnerabilities exploited and the security defenses that were in place, as well as the tactics, techniques, and procedures relevant to such incident.</text></clause>
<clause id="H613EA57BA94B4D2C89E164859E193372"><enum>(iii)</enum><text display-inline="yes-display-inline">Where applicable, any identifying information related to the actor reasonably believed to be responsible for such incident.</text></clause> <clause id="HA84B92412088473CAB72193D3B1F6E96"><enum>(iv)</enum><text>Where applicable, identification of the category or categories of information that was, or is reasonably believed to have been, accessed or acquired by an unauthorized person.</text></clause>
<clause id="HA7E6405D33214A70801F465D3D035606"><enum>(v)</enum><text display-inline="yes-display-inline">Contact information, such as telephone number or electronic mail address, that the Office may use to contact the covered entity or, where applicable, an authorized agent of such covered entity, or, where applicable, the service provider, acting with the express permission, and at the direction, of such covered entity, to assist with compliance with the requirements of this section.</text></clause></subparagraph></paragraph> <paragraph id="HAB8862F3AE574743B2860F12D0FE09AE" commented="no"><enum>(6)</enum><header>Responsibilities of covered entities</header><text>Covered entities that experience a covered cybersecurity incident shall coordinate with the Office to the extent necessary to comply with this section, and, to the extent practicable, cooperate with the Office in a manner that supports enhancing the Agency’s situational awareness of cybersecurity threats across critical infrastructure sectors.</text></paragraph>
<paragraph id="HE1F883F1FCAB4053BC6904F54BDC85BA"><enum>(7)</enum><header>Harmonizing reporting requirements</header><text display-inline="yes-display-inline">In establishing the reporting requirements and procedures under paragraph (1), the Director shall, to the maximum extent practicable—</text> <subparagraph id="H147655625DE24C47AA3A4641F645ED30"><enum>(A)</enum><text display-inline="yes-display-inline">review existing regulatory requirements, including the information required in such reports, to report cybersecurity incidents that may apply to covered entities, and ensure that any such reporting requirements and procedures avoid conflicting, duplicative, or burdensome requirements; and</text></subparagraph>
<subparagraph id="H2830BC1AA1A84226836F50E809B68737" commented="no"><enum>(B)</enum><text display-inline="yes-display-inline">coordinate with other regulatory authorities that receive reports relating to cybersecurity incidents to identify opportunities to streamline reporting processes, and where feasible, enter into agreements with such authorities to permit the sharing of such reports with the Office, consistent with applicable law and policy, without impacting the Office’s ability to gain timely situational awareness of a covered cybersecurity incident or significant cyber incident.</text></subparagraph></paragraph></subsection> <subsection id="H2E399AB2DCA046BAB12FF2E61DD629DE"><enum>(e)</enum><header>Disclosure, retention, and use of incident reports</header> <paragraph id="HD9CE6062A4FB4CE49ECCA9815E1326DC" commented="no"><enum>(1)</enum><header>Authorized activities</header><text>No information provided to the Office in accordance with subsections (d) or (h) may be disclosed to, retained by, or used by any Federal department or agency, or any component, officer, employee, or agent of the Federal Government, except if the Director determines such disclosure, retention, or use is necessary for—</text>
<subparagraph id="HFF00AC35077743558F043805E15B9FE3" commented="no"><enum>(A)</enum><text>a cybersecurity purpose;</text></subparagraph> <subparagraph id="H4C875F7A092C4220B8C6240421D9ABCE" commented="no"><enum>(B)</enum><text>the purpose of identifying—</text>
<clause id="H7D2BDD93361C4151B25E2B255B332E70" commented="no"><enum>(i)</enum><text>a cybersecurity threat, including the source of such threat; or</text></clause> <clause id="H4ADBE3AFDD904A16BB108628DF6B7A65" commented="no"><enum>(ii)</enum><text>a security vulnerability;</text></clause></subparagraph>
<subparagraph id="H4E003A38848148F287F3586ECE718EE9" commented="no"><enum>(C)</enum><text>the purpose of responding to, or otherwise preventing, or mitigating a specific threat of—</text> <clause id="H7389207F037C4F7683B3507E31714A6E" commented="no"><enum>(i)</enum><text>death;</text></clause>
<clause id="H597726398F2E43AD88D03D01B00DBCDB" commented="no"><enum>(ii)</enum><text>serious bodily harm; or</text></clause> <clause id="H0F517701D04D4920B62126BF8366E0EC" commented="no"><enum>(iii)</enum><text>serious economic harm, including a terrorist act or a use of a weapon of mass destruction;</text></clause></subparagraph>
<subparagraph id="H2E947F5D59974266852CD00F3F78F068" commented="no"><enum>(D)</enum><text>the purpose of responding to, investigating, prosecuting, or otherwise preventing or mitigating a serious threat to a minor, including sexual exploitation or threats to physical safety; or</text></subparagraph> <subparagraph id="H5512D022AE8F46F481D47C70679A22F0" commented="no"><enum>(E)</enum><text display-inline="yes-display-inline">the purpose of preventing, investigating, disrupting, or prosecuting an offense related to a threat—</text>
<clause id="HEC2D05C483014580B41BA16DED57186E"><enum>(i)</enum><text>described in subparagraphs (B) through (D); or</text></clause> <clause id="H54A146866B75418FBD7C056E1F727E11" commented="no"><enum>(ii)</enum><text>specified in section 105(d)(5)(A)(v) of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1504">6 U.S.C. 1504(d)(5)(A)(v)</external-xref>)).</text></clause></subparagraph></paragraph>
<paragraph id="H401443B8D29A449DA44A6413DA199888"><enum>(2)</enum><header>Exceptions</header>
<subparagraph id="H8364245D4E24446DB9C662E3B2D2E3C0" commented="no"><enum>(A)</enum><header>Rapid, confidential, bi-directional sharing of cyber threat indicators</header><text>Upon receiving a covered cybersecurity incident report submitted pursuant to this section, the Office shall immediately review such report to determine whether the incident that is the subject of such report is connected to an ongoing cybersecurity threat or security vulnerability and where applicable, use such report to identify, develop, and rapidly disseminate to appropriate stakeholders actionable, anonymized cyber threat indicators and defensive measures.</text></subparagraph> <subparagraph id="HFC3DE2676E0D44AA93FF7EEB6635BE19" commented="no"><enum>(B)</enum><header>Principles for sharing security vulnerabilities</header><text>With respect to information in a covered cybersecurity incident report regarding a security vulnerability referred to in paragraph (1)(B)(ii), the Director shall develop principles that govern the timing and manner in which information relating to security vulnerabilities may be shared, consistent with common industry best practices and United States and international standards.</text></subparagraph></paragraph>
<paragraph id="HEAEE664B9E964737B51513BBE2D23EBA" commented="no"><enum>(3)</enum><header>Privacy and civil liberties</header><text display-inline="yes-display-inline">Information contained in reports submitted to the Office pursuant to subsections (d) and (h) shall be retained, used, and disseminated, where permissible and appropriate, by the Federal Government in a manner consistent with processes for the protection of personal information adopted pursuant to section 105 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1504">6 U.S.C. 1504</external-xref>)).</text></paragraph> <paragraph id="H1D7A1F4F977D4A52BE2592A2DC2E0836" commented="no"><enum>(4)</enum><header>Prohibition on use of information in regulatory actions</header> <subparagraph id="HA962FE6D86C346DABEBF375CB39C3818"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Information contained in reports submitted to the Office pursuant to subsections (d) and (h) may not be used by any Federal, State, Tribal, or local government to regulate, including through an enforcement action, the lawful activities of any non-Federal entity.</text></subparagraph>
<subparagraph id="H9720ECF5CCE44471B9BF234334B92F7B"><enum>(B)</enum><header>Exception</header><text display-inline="yes-display-inline">A report submitted to the Agency pursuant to subsection (d) or (h) may, consistent with Federal or State regulatory authority specifically relating to the prevention and mitigation of cybersecurity threats to information systems, inform the development or implementation of regulations relating to such systems. </text></subparagraph></paragraph></subsection> <subsection id="H12125A9AA79548309AA3121C928BA29F"><enum>(f)</enum><header>Protections for reporting entities and information</header><text>Reports describing covered cybersecurity incidents submitted to the Office by covered entities in accordance with subsection (d), as well as voluntarily-submitted cybersecurity incident reports submitted to the Office pursuant to subsection (h), shall be—</text>
<paragraph id="H3CDFE8E274624F8FA6D2EBFB7660600C" commented="no"><enum>(1)</enum><text display-inline="yes-display-inline">entitled to the protections against liability described in section 106 of the Cybersecurity Act of 2015 (enacted as division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; <external-xref legal-doc="usc" parsable-cite="usc/6/1505">6 U.S.C. 1505</external-xref>));</text></paragraph> <paragraph id="H64A6C472F83B4283BC22331ECF2E11F6" commented="no"><enum>(2)</enum><text>exempt from disclosure under section 552 of title 5, United States Code, as well as any provision of State, Tribal, or local freedom of information law, open government law, open meetings law, open records law, sunshine law, or similar law requiring disclosure of information or records; and</text></paragraph>
<paragraph id="H95C442F0D4FB4104895F62D3882D52B8"><enum>(3)</enum><text>considered the commercial, financial, and proprietary information of the covered entity when so designated by the covered entity.</text></paragraph></subsection> <subsection id="H0C41A5E7335C4753BF9872544FF9F44E"><enum>(g)</enum><header>Noncompliance with required reporting</header> <paragraph id="HD91AA9E7EBA245C39D8633EB97F5235B"><enum>(1)</enum><header>Purpose</header><text>In the event a covered entity experiences a cybersecurity incident but does not comply with the reporting requirements under this section, the Director may obtain information about such incident by engaging directly such covered entity in accordance with paragraph (2) to request information about such incident, or, if the Director is unable to obtain such information through such engagement, by issuing a subpoena to such covered entity, subject to paragraph (3), to gather information sufficient to determine whether such incident is a covered cybersecurity incident, and if so, whether additional action is warranted pursuant to paragraph (4).</text></paragraph>
<paragraph id="H8FA5CD80190D4439B3F3CAC258CE1EAB" commented="no"><enum>(2)</enum><header>Initial request for information</header>
<subparagraph id="H85327D2033BE4436AD45D9629536F65A" commented="no"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">If the Director has reason to believe, whether through public reporting, intelligence gathering, or other information in the Federal Government’s possession, that a covered entity has experienced a cybersecurity incident that may be a covered cybersecurity incident but did not submit pursuant to subsection (d) to the Office a covered cybersecurity incident report relating thereto, the Director may request information from such covered entity to confirm whether the cybersecurity incident at issue is a covered cybersecurity incident, and determine whether further examination into the details surrounding such incident are warranted pursuant to paragraph (4).</text></subparagraph> <subparagraph id="HA93604E04D864B008D8EC1F99A8598C5" commented="no"><enum>(B)</enum><header>Treatment</header><text>Information provided to the Office in response to a request under subparagraph (A) shall be treated as if such information was submitted pursuant to the reporting procedures established in accordance with subsection (d).</text></subparagraph></paragraph>
<paragraph id="H8F16D0BA93C14A68B0AF960E9E7373F1"><enum>(3)</enum><header>Authority to issue subpoenas</header>
<subparagraph id="H8271569174D248E983809BE96C93931E"><enum>(A)</enum><header>In general</header><text>If, after the date that is seven days from the date on which the Director made a request for information in paragraph (2), the Director has received no response from the entity from which such information was requested, or received an inadequate response, the Director may issue to such entity a subpoena to compel disclosure of information the Director considers necessary to determine whether a covered cybersecurity incident has occurred and assess potential impacts to national security, economic security, or public health and safety, determine whether further examination into the details surrounding such incident are warranted pursuant to paragraph (4), and if so, compel disclosure of such information as is necessary to carry out activities described in subsection (c).</text></subparagraph> <subparagraph id="H9689D641AA3346A9A146909449F82AAB" commented="no"><enum>(B)</enum><header>Civil action</header><text>If a covered entity does not comply with a subpoena, the Director may bring a civil action in a district court of the United States to enforce such subpoena. An action under this paragraph may be brought in the judicial district in which the entity against which the action is brought resides, is found, or does business. The court may punish a failure to obey an order of the court to comply with the subpoena as a contempt of court.</text></subparagraph>
<subparagraph id="H6B6F533C18EF433D9316A9420C3EBF1E"><enum>(C)</enum><header>Non-applicability of protections</header><text>The protections described in subsection (f) do not apply to a covered entity that is the recipient of a subpoena under this paragraph (3).</text></subparagraph></paragraph> <paragraph id="HE0614F6C6A8F477A81F03E22FE782BD0"><enum>(4)</enum><header>Additional actions</header> <subparagraph id="H44598032D4454AC0B63EAE789875043E" commented="no"><enum>(A)</enum><header>Examination</header><text display-inline="yes-display-inline">If, based on the information provided in response to a subpoena issued pursuant to paragraph (3), the Director determines that the cybersecurity incident at issue is a significant cyber incident, or is part of a group of related cybersecurity incidents that together satisfy the definition of a significant cyber incident, and a more thorough examination of the details surrounding such incident is warranted in order to carry out activities described in subsection (c), the Director may direct the Office to conduct an examination of such incident in order to enhance the Agency’s situational awareness of cybersecurity threats across critical infrastructure sectors, in a manner consistent with privacy and civil liberties protections under applicable law.</text></subparagraph>
<subparagraph id="H4EB58A97A4624A1692C34913FEB46107" commented="no"><enum>(B)</enum><header>Provision of certain information to Attorney General</header><text display-inline="yes-display-inline">Notwithstanding subsection (e)(4) and paragraph (2)(B), if the Director determines, based on the information provided in response to a subpoena issued pursuant to paragraph (3) or identified in the course of an examination under subparagraph (A), that the facts relating to the cybersecurity incident at issue may constitute grounds for a regulatory enforcement action or criminal prosecution, the Director may provide such information to the Attorney General or the appropriate regulator, who may use such information for a regulatory enforcement action or criminal prosecution.</text></subparagraph></paragraph></subsection> <subsection id="HD37977C9F3A7488E9499A2F029A363D2" commented="no"><enum>(h)</enum><header>Voluntary reporting of cyber incidents</header><text>The Agency shall receive cybersecurity incident reports submitted voluntarily by entities that are not covered entities, or concerning cybersecurity incidents that do not satisfy the definition of covered cybersecurity incidents but may nevertheless enhance the Agency’s situational awareness of cybersecurity threats across critical infrastructure sectors. The protections under this section applicable to covered cybersecurity incident reports shall apply in the same manner and to the same extent to voluntarily-submitted cybersecurity incident reports under this subsection.</text></subsection>
<subsection id="HB09915676ACA4193BC50E47021E0B290" commented="no"><enum>(i)</enum><header>Notification to impacted covered entities</header><text display-inline="yes-display-inline">If the Director receives information regarding a cybersecurity incident impacting a Federal agency relating to unauthorized access to data provided to such Federal agency by a covered entity, and with respect to which such incident is likely to undermine the security of such covered entity or cause operational or reputational damage to such covered entity, the Director shall, to the extent practicable, notify such covered entity and provide to such covered entity such information regarding such incident as is necessary to enable such covered entity to address any such security risk or operational or reputational damage arising from such incident.</text></subsection> <subsection id="H66CD099C409240768A64CB2D7C2EA7EE"><enum>(j)</enum><header>Exemption</header><text>Subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, does not apply to any action to carry out this section.</text></subsection>
<subsection id="HD2A1A25BECFF4B01AAE2D7F5F54E6BF1"><enum>(k)</enum><header>Saving provision</header><text display-inline="yes-display-inline">Nothing in this section may be construed as modifying, superseding, or otherwise affecting in any manner any regulatory authority held by a Federal department or agency, including Sector Risk Management Agencies, existing on the day before the date of the enactment of this section, or any existing regulatory requirements or obligations that apply to covered entities.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection> <subsection id="H187FE7A9645E4DD5AED7243899483EA4"><enum>(b)</enum><header>Reports</header> <paragraph id="HEBE9E12BC4DF47ECB5064645D6475D09"><enum>(1)</enum><header>On stakeholder engagement</header><text display-inline="yes-display-inline">Not later than 30 days before the date on which that the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security intends to issue an interim final rule under subsection (d)(1) of section 2220A of the Homeland Security Act of 2002 (as added by subsection (a)), the Director shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report that describes how the Director engaged stakeholders in the development of such interim final rules.</text></paragraph>
<paragraph id="HB73A5D11838F4202BE258D99D300E088"><enum>(2)</enum><header>On opportunities to strengthen cybersecurity research</header><text display-inline="yes-display-inline">Not later than one year after the date of the enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report describing how the Cyber Incident Review Office of the Department of Homeland Security (established pursuant to section 2220A of the Homeland Security Act of 2002, as added by subsection (a)) has carried out activities under subsection (c)(6) of such section 2220A by proactively identifying opportunities to use cybersecurity incident data to inform and enable cybersecurity research carried out by academic institutions and other private sector organizations.</text></paragraph></subsection> <subsection id="H0264ED4AE5A64741929FB1675D1FC2A9"><enum>(c)</enum><header>Title XXII technical and clerical amendments</header> <paragraph id="H71CBC1C10FCC484ABFA3E94C24ADE20F"><enum>(1)</enum><header>Technical amendments</header> <subparagraph id="HCB115A7FB5DD4D1E8E1B11591219BAB0"><enum>(A)</enum><header>Homeland Security Act of 2002</header><text display-inline="yes-display-inline">Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651 et seq.</external-xref>) is amended—</text>
<clause id="HA9183B1E1C674251AF05362A97262EA9"><enum>(i)</enum><text>in section 2202 (<external-xref legal-doc="usc" parsable-cite="usc/6/652">6 U.S.C. 652</external-xref>)—</text> <subclause id="H6E97B8328F29432F9E4A8E2D7712D168"><enum>(I)</enum><text>in paragraph (11), by striking <quote>and</quote> after the semicolon;</text></subclause>
<subclause id="HA98FF9B2A1064DC3926663C453AD3970"><enum>(II)</enum><text>in the first paragraph (12) (relating to appointment of a Cybersecurity State Coordinator) by striking <quote>as described in section 2215; and</quote> and inserting <quote>as described in section 2217;</quote>;</text></subclause> <subclause id="H903B63E944DC4110B9C4A0F957C5F957"><enum>(III)</enum><text>by redesignating the second paragraph (12) (relating to the .gov internet domain) as paragraph (13); and</text></subclause>
<subclause id="HEC70E3376D4041299BB318035D5A67C4"><enum>(IV)</enum><text>by redesignating the third paragraph (12) (relating to carrying out such other duties and responsibilities) as paragraph (14);</text></subclause></clause> <clause id="H36D61C7A082543CA8FD8AAFF37550B52"><enum>(ii)</enum><text display-inline="yes-display-inline">in the first section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665">6 U.S.C. 665</external-xref>; relating to the duties and authorities relating to .gov internet domain), by amending the section enumerator and heading to read as follows:</text>
<quoted-block style="OLC" id="H19B07F3BDEA846AF80FC41C5CBE50515" display-inline="no-display-inline">
<section id="HF78187AC0BFF491F9DF387F183682876"><enum>2215.</enum><header>Duties and authorities relating to .gov internet domain</header></section><after-quoted-block>;</after-quoted-block></quoted-block></clause>
<clause id="H937BC2ADFD21492983DFC74815B097BC"><enum>(iii)</enum><text display-inline="yes-display-inline">in the second section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665b">6 U.S.C. 665b</external-xref>; relating to the joint cyber planning office), by amending the section enumerator and heading to read as follows:</text> <quoted-block style="OLC" id="H48DF8591DBDB470F86FD68588C86DAF8" display-inline="no-display-inline"> <section id="HF4F5B75ED48647B9A85AB5E94234ECB4"><enum>2216.</enum><header>Joint cyber planning office</header></section><after-quoted-block>;</after-quoted-block></quoted-block></clause> <clause id="H28C0DD1963F3438CB36E1D0C1F3737D2"><enum>(iv)</enum><text display-inline="yes-display-inline">in the third section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665c">6 U.S.C. 665c</external-xref>; relating to the Cybersecurity State Coordinator), by amending the section enumerator and heading to read as follows:</text>
<quoted-block style="OLC" id="H68E84733D836418189CAF1BAD5FA9532" display-inline="no-display-inline">
<section id="HF1DDDB7BC81245B4937B521FDE248A16"><enum>2217.</enum><header>Cybersecurity State Coordinator</header></section><after-quoted-block>;</after-quoted-block></quoted-block></clause>
<clause id="HB0F79B24F6A74CF6B47AB11ED6F81E44"><enum>(v)</enum><text display-inline="yes-display-inline">in the fourth section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665d">6 U.S.C. 665d</external-xref>; relating to Sector Risk Management Agencies), by amending the section enumerator and heading to read as follows:</text> <quoted-block style="OLC" id="HA1C4C21C78B74418B0B2B98141F84711" display-inline="no-display-inline"> <section id="HA2D2ABF53B1A41EEA19349569EBF8B63"><enum>2218.</enum><header>Sector Risk Management Agencies</header></section><after-quoted-block>;</after-quoted-block></quoted-block></clause> <clause id="H78B267373A1C49B2BCF56F6795021641"><enum>(vi)</enum><text display-inline="yes-display-inline">in section 2216 (<external-xref legal-doc="usc" parsable-cite="usc/6/665e">6 U.S.C. 665e</external-xref>; relating to the Cybersecurity Advisory Committee), by amending the section enumerator and heading to read as follows:</text>
<quoted-block style="OLC" id="H525C075AB5D9482781B32CA9EA28AEE1" display-inline="no-display-inline">
<section id="H48EEBF370A4B4C05932B5D8F902BA8E6"><enum>2219.</enum><header>Cybersecurity Advisory Committee</header></section><after-quoted-block>;</after-quoted-block></quoted-block><continuation-text continuation-text-level="clause">and</continuation-text></clause>
<clause id="HE94FFCB3F1BE49798A052083B0B3629E"><enum>(vii)</enum><text display-inline="yes-display-inline">in section 2217 (<external-xref legal-doc="usc" parsable-cite="usc/6/665f">6 U.S.C. 665f</external-xref>; relating to Cybersecurity Education and Training Programs), by amending the section enumerator and heading to read as follows:</text> <quoted-block style="OLC" id="HD598C09DCA52477287ECD8DA5FB889B8" display-inline="no-display-inline"> <section id="H908EE6A1AEAB43E19B7E86A3E90F5B18"><enum>2220.</enum><header>Cybersecurity Education and Training Programs</header></section><after-quoted-block>.</after-quoted-block></quoted-block></clause></subparagraph> <subparagraph id="H53C09D166612459885F1DCD590383408"><enum>(B)</enum><header>Consolidated Appropriations Act, 2021</header><text display-inline="yes-display-inline">Paragraph (1) of section 904(b) of division U of the Consolidated Appropriations Act, 2021 (<external-xref legal-doc="public-law" parsable-cite="pl/116/260">Public Law 116–260</external-xref>) is amended, in the matter preceding subparagraph (A), by inserting <quote>of 2002</quote> after <quote>Homeland Security Act</quote>.</text></subparagraph></paragraph>
<paragraph id="H57FE99A5F9264870A005D1CC21EBA95A"><enum>(2)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of the Homeland Security Act of 2002 is amended by striking the items relating to sections 2214 through 2217 and inserting the following new items:</text> <quoted-block style="OLC" id="HCA9B21053BD04F3E8CB9CA505838CFF4" display-inline="no-display-inline"> <toc regeneration="no-regeneration"> <toc-entry level="section">Sec. 2214. National Asset Database. </toc-entry> <toc-entry level="section">Sec. 2215. Duties and authorities relating to .gov internet domain. </toc-entry> <toc-entry level="section">Sec. 2216. Joint cyber planning office. </toc-entry> <toc-entry level="section">Sec. 2217. Cybersecurity State Coordinator. </toc-entry> <toc-entry level="section">Sec. 2218. Sector Risk Management Agencies. </toc-entry> <toc-entry level="section">Sec. 2219. Cybersecurity Advisory Committee. </toc-entry> <toc-entry level="section">Sec. 2220. Cybersecurity Education and Training Programs. </toc-entry> <toc-entry level="section">Sec. 2220A. Cyber Incident Review Office.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section> </legis-body> </bill> 

