<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-type="olc" bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-EHF21044-DH9-2T-55S"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S161 IS: Strengthening and Enhancing Cybersecurity Usage to Reach Every Small Business Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-02-02</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 161</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210202">February 2, 2021</action-date><action-desc><sponsor name-id="S385">Ms. Cortez Masto</sponsor> (for herself, <cosponsor name-id="S323">Mr. Risch</cosponsor>, and <cosponsor name-id="S402">Ms. Rosen</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSSB00">Committee on Small Business and Entrepreneurship</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To require the Administrator of the Small Business Administration to establish a program to assist small business concerns with purchasing cybersecurity products and services, and for other purposes.</official-title></form><legis-body style="OLC" display-enacting-clause="yes-display-enacting-clause" id="H57C64C07AE724CD78B3033523BEC8EF1"><section section-type="section-one" id="id95192EA242C640339B20F6F72C7CF5D0"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Strengthening and Enhancing Cybersecurity Usage to Reach Every Small Business Act</short-title></quote> or the <quote><short-title>SECURE Small Business Act</short-title></quote>.</text></section><section id="H875D984914E5410DB0E45F01E0789F50"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H17E19B0ACBD6497E94594CEF2A8DF975"><enum>(1)</enum><header>Administrator</header><text display-inline="yes-display-inline">The term <term>Administrator</term> means the Administrator of the Small Business Administration.</text></paragraph><paragraph commented="no" id="H1A21EA104D274ECDB4E09C0D04DF09BC"><enum>(2)</enum><header>Covered industry sectors</header><text>The term <term>covered industry sectors</term> means the following industry sectors:</text><subparagraph commented="no" id="HFC55F0E584334559903682DCD243E60E"><enum>(A)</enum><text>Accommodation and food services.</text></subparagraph><subparagraph commented="no" id="H1FC35FABAA3D4A548AB2727A935B7518"><enum>(B)</enum><text>Agriculture.</text></subparagraph><subparagraph commented="no" id="H7608B4DE2F944510BC324ECDA5FADC08"><enum>(C)</enum><text>Construction.</text></subparagraph><subparagraph commented="no" id="H73C79AEFE49F4E62B33EF9CF81C0EC67"><enum>(D)</enum><text>Healthcare and social assistance.</text></subparagraph><subparagraph commented="no" id="HF66EBBC0D5764305ACED9BF227926D5E"><enum>(E)</enum><text>Retail and wholesale trade.</text></subparagraph><subparagraph commented="no" id="H771983AFAC39472198A56C587BE4B508"><enum>(F)</enum><text>Transportation and warehousing.</text></subparagraph><subparagraph commented="no" id="H729ECA6959904B3194628056056C07B2"><enum>(G)</enum><text>Entertainment and recreation.</text></subparagraph><subparagraph commented="no" id="H65C945A273E24AF7AE02726A1D1B7051"><enum>(H)</enum><text>Finance and insurance.</text></subparagraph><subparagraph commented="no" id="H10FBAE7958CC4A5FB71B341989AFAE84"><enum>(I)</enum><text>Manufacturing.</text></subparagraph><subparagraph commented="no" id="H2145ED81E58343C39719EE9E74770799"><enum>(J)</enum><text>Information and telecommunications.</text></subparagraph><subparagraph commented="no" id="H85B5F9A400034FA38272E7AC5711F705"><enum>(K)</enum><text display-inline="yes-display-inline">Any other industry sector that the Administrator determines to be relevant.</text></subparagraph></paragraph><paragraph id="HBB82C48D531B499884DC8142F9C76916"><enum>(3)</enum><header>Covered vendor</header><text display-inline="yes-display-inline">The term <term>covered vendor</term> means a vendor of cybersecurity products and services, including cybersecurity risk insurance.</text></paragraph><paragraph commented="no" id="H105A2F8563254F3AAE4D991D0B1DC0BD"><enum>(4)</enum><header>Cybersecurity</header><text display-inline="yes-display-inline">The term <term>cybersecurity</term> means—</text><subparagraph commented="no" id="HAD9951FAD8AB4D57895F8C7897CCCDF6"><enum>(A)</enum><text>the art of protecting networks, devices, and data from unauthorized access or criminal use; and</text></subparagraph><subparagraph commented="no" id="H5F9D55E932BA40F0807F60C9F40D0426"><enum>(B)</enum><text>the practice of ensuring the confidentiality, integrity, and availability of information. </text></subparagraph></paragraph><paragraph commented="no" id="H79C0F9DC2B87477B96A5420BFB9D3AEB"><enum>(5)</enum><header>Cybersecurity threat</header><text>The term <term>cybersecurity threat</term> means the possibility of a malicious attempt to infiltrate, damage, disrupt, or destroy computer networks or systems.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H2098A7FDC46445AD8B9B244681D98A3D"><enum>(6)</enum><header>Small business concern</header><text display-inline="yes-display-inline">The term <term>small business concern</term> has the meaning given the term in section 3(a) of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632(a)</external-xref>). </text></paragraph></section><section id="H41A668064A70457988B2D80C7C411BA2"><enum>3.</enum><header>Cybersecurity cooperative marketplace program</header><subsection id="HBD5AE85CB04E41BDAD13F48C4E3C69A9"><enum>(a)</enum><header>Establishment</header><text display-inline="yes-display-inline">Not later than 180 days after the date of enactment of this Act, the Administrator, in consultation with the Director of the National Institute of Standards and Technology, shall establish a program to assist small business concerns with purchasing cybersecurity products and services.</text></subsection><subsection id="HD8D342047B77431CBF5315BF3F79CEBA"><enum>(b)</enum><header>Duties</header><text>In carrying out the program established under subsection (a), the Administrator shall—</text><paragraph commented="no" id="HE49CBC31E2434DA3819866B0688E3E2D"><enum>(1)</enum><text display-inline="yes-display-inline">educate small business concerns about the types of cybersecurity products and services that are specific to each covered industry sector; and</text></paragraph><paragraph commented="no" id="H701752C86C4A4C8C8175BE3B12A8B025"><enum>(2)</enum><text display-inline="yes-display-inline">provide outreach to covered vendors and small business concerns to encourage use of the cooperative marketplace described in subsection (c).</text></paragraph></subsection><subsection commented="no" id="H36DB802AF95C41FDABBD3D956E3442D7"><enum>(c)</enum><header>Cooperative marketplace for purchasing cybersecurity products and services</header><text display-inline="yes-display-inline">The Administrator shall—</text><paragraph id="H4181A30DFB674DDEAF8CAD9A9766C25E"><enum>(1)</enum><text>establish and maintain a website that—</text><subparagraph id="H9E4F80D6394D4B74B1DB06E1BD1A94A9"><enum>(A)</enum><text>is free to use for small business concerns and covered vendors; and</text></subparagraph><subparagraph id="H15C3773BCBC74B39A305025FC90E7244"><enum>(B)</enum><text>provides a cooperative marketplace that facilitates the creation of mutual agreements under which small business concerns cooperatively purchase cybersecurity products and services from covered vendors; and</text></subparagraph></paragraph><paragraph commented="no" id="H02D4E152A92E49F2BB7719965A7458EE"><enum>(2)</enum><text display-inline="yes-display-inline">determine whether each covered vendor and each small business concern that participates in the marketplace described in paragraph (1) is legitimate, as determined by the Administrator.</text></paragraph></subsection><subsection id="H1A7BB4332F0B405B88B652AEFD6C6E55"><enum>(d)</enum><header>Sunset</header><text display-inline="yes-display-inline">This section ceases to be effective on September 30, 2024.</text></subsection></section><section id="HE69D30E6E4CC4E44BF48A11A0DE74713"><enum>4.</enum><header>GAO study on available Federal cybersecurity initiatives</header><subsection id="HE3466F78E5FF4DA2B4D2959696C733D8"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">The Comptroller General of the United States shall conduct a study that identifies any improvements that could be made to Federal initiatives that—</text><paragraph id="HC21DE19AB11E46D8B4DB6E343E8BBF89"><enum>(1)</enum><text display-inline="yes-display-inline">train small business concerns how to avoid cybersecurity threats; and</text></paragraph><paragraph id="HA586E1A26FE9441EA6E31D408C5DD886"><enum>(2)</enum><text display-inline="yes-display-inline">are in effect on the date on which the Comptroller General commences the study.</text></paragraph></subsection><subsection id="H5F5C63B267E541329DD6A7D368626D04"><enum>(b)</enum><header>Report</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Small Business and Entrepreneurship of the Senate and the Committee on Small Business of the House of Representatives a report that contains the results of the study required under subsection (a).</text></subsection></section></legis-body></bill> 

