<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MIR21B27-SPM-G2-S8M"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 S2483 IS: Improving Cybersecurity of Small Organizations Act of 2021</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-07-27</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 2483</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210727">July 27, 2021</action-date><action-desc><sponsor name-id="S402">Ms. Rosen</sponsor> (for herself and <cosponsor name-id="S287">Mr. Cornyn</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To require the Director of the Cybersecurity and Infrastructure Security Agency to establish cybersecurity guidance for small organizations, and for other purposes.</official-title></form><legis-body><section id="id73ce31397e254895b112333cb5e5470e" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Improving Cybersecurity of Small Organizations Act of 2021</short-title></quote>.</text></section><section id="id72f48d8ce08d4d589a02db8122e02dde"><enum>2.</enum><header>Improving cybersecurity of small organizations</header><subsection id="id83b9e831114246cda8442c328df94b66"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id6b84566173564252a4427a6c171a82d4"><enum>(1)</enum><header>Administration</header><text>The term <term>Administration</term> means the Small Business Administration.</text></paragraph><paragraph id="id30065d85b61d4e66a895f1fee818ed75"><enum>(2)</enum><header>Administrator</header><text>The term <term>Administrator</term> means the Administrator of the Administration.</text></paragraph><paragraph id="id3d2f7f19f2c549558b6ecf1bcf276bb9"><enum>(3)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph id="idbf73993cc4f542df9e13b493ea7f0d24"><enum>(4)</enum><header>Connected device</header><text>The term <term>connected device</term> means any electronic equipment that is—</text><subparagraph id="id34feea8eac7e4771a2f39fc3b7673869"><enum>(A)</enum><text>primarily designed for or marketed to consumers;</text></subparagraph><subparagraph id="id45bb69c9bbb64116a8ce79633b9f04da"><enum>(B)</enum><text>capable of connecting to the internet or another communication network; and</text></subparagraph><subparagraph id="id40c70957d8294daebd28f9bfe4998b45"><enum>(C)</enum><text>capable of sending, receiving, or processing personal information.</text></subparagraph></paragraph><paragraph id="ida1d457d057a34315b8af51073cc4ad27"><enum>(5)</enum><header>Cybersecurity guidance</header><text>The term <term>cybersecurity guidance</term> means the cybersecurity guidance maintained and promoted under subsections (b) and (c), respectively.</text></paragraph><paragraph id="id90c06c34670144fabf395408e91d8681"><enum>(6)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Cybersecurity and Infrastructure Security Agency.</text></paragraph><paragraph id="id2b11afdc614448f7bf318eed01021bc5"><enum>(7)</enum><header>NIST</header><text>The term <term>NIST</term> means the National Institute of Standards and Technology.</text></paragraph><paragraph id="id6217a297a4a24cc798165dde738f0844"><enum>(8)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Commerce.</text></paragraph><paragraph id="idc1de2c29753c489e8ce46fc005aea624"><enum>(9)</enum><header>Small business</header><text>The term <term>small business</term> has the meaning given the term <term>small business concern</term> in section 3 of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632</external-xref>).</text></paragraph><paragraph id="id9e4d9fcfc93f4ea58af7eb2e9162dd13"><enum>(10)</enum><header>Small governmental jurisdiction</header><text>The term <term>small governmental jurisdiction</term> has the meaning given the term in section 601 of title 5, United States Code.</text></paragraph><paragraph id="id4996b7e804154dde9e5b20e75412cd5a"><enum>(11)</enum><header>Small nonprofit</header><text>The term <term>small nonprofit</term> has the meaning given the term <term>small organization</term> in section 601 of title 5, United States Code.</text></paragraph><paragraph id="id9f26dd310fc64526949c972d1a5df9ce"><enum>(12)</enum><header>Small organization</header><text>The term <term>small organization</term> means an organization that is unlikely to employ a specialist in cybersecurity, including—</text><subparagraph id="id58057693a7cf44f88ced11504ceae3d7"><enum>(A)</enum><text>a small business;</text></subparagraph><subparagraph id="idf3d734988411491d863e2ee8bb291ea9"><enum>(B)</enum><text>a small nonprofit; and</text></subparagraph><subparagraph id="id750b709496a04ced97111f8a46add733"><enum>(C)</enum><text>a small governmental jurisdiction.</text></subparagraph></paragraph></subsection><subsection id="id724c6f9dfa294258bc004ee95fa5f5f4"><enum>(b)</enum><header>Cybersecurity guidance</header><paragraph id="id771a649230b34518b3174b5c2a1ce663"><enum>(1)</enum><header>In general</header><text>The Director shall maintain cybersecurity guidance that documents and promotes evidence-based cybersecurity policies and controls for use by small organizations, which shall—</text><subparagraph id="id76c970dda72d4897b118514a2b06aa49"><enum>(A)</enum><text>include simple, basic controls that have the most impact in protecting small organizations against common cybersecurity threats and risks;</text></subparagraph><subparagraph id="id68253a53b4e443ee9ea1d5e715412d73"><enum>(B)</enum><text>include guidance to address common cybersecurity threats and risks posed by connected devices that are personal to the employees and contractors of small organizations, as well as connected devices that are issued to those employees and contractors by small organizations; and</text></subparagraph><subparagraph id="idf6b3d67582cc40bd80ec42acccf19947"><enum>(C)</enum><text>recommend—</text><clause id="idee805b66fed8448b83a8e79a1d31f3cb"><enum>(i)</enum><text>measures to improve the cybersecurity of small organizations; and</text></clause><clause id="id70fef69a9d034ffa940253c57a49f909"><enum>(ii)</enum><text>configurations and settings for some of the most commonly used software that can improve the cybersecurity of small organizations.</text></clause></subparagraph></paragraph><paragraph id="id8259a758d14842dc886be3ec26a95153"><enum>(2)</enum><header>Consistency</header><text>The Director shall ensure the cybersecurity guidance maintained under paragraph (1) is consistent with—</text><subparagraph id="id7cf50b4c98ca4bb78b10aa56eec89831"><enum>(A)</enum><text>cybersecurity resources developed by NIST, as required by the NIST Small Business Cybersecurity Act (<external-xref legal-doc="public-law" parsable-cite="pl/115/236">Public Law 115–236</external-xref>); and</text></subparagraph><subparagraph id="id0b96efab07f74e99bd7762dfd3a02774"><enum>(B)</enum><text>the most recent version of the Cybersecurity Framework, or successor resource, maintained by NIST.</text></subparagraph></paragraph><paragraph id="id4bdd93aea14a4369849b69074b795d64"><enum>(3)</enum><header>Guidance for specific types of small organizations</header><text>The Director may include cybersecurity guidance, as required under paragraph (1), appropriate for specific types of small organizations in addition to guidance applicable for all small organizations.</text></paragraph><paragraph id="idd385efc1a982487e9d3019b4ec50e199"><enum>(4)</enum><header>Updates</header><subparagraph id="id30bfc9e968bc46f78ef4d0b0a82501f2"><enum>(A)</enum><header>In general</header><text>The Director shall review the cybersecurity guidance maintained under paragraph (1) not less frequently than annually and update the cybersecurity guidance as appropriate.</text></subparagraph><subparagraph id="id59311e33a8d14dcaa1335d1c29cd7c64"><enum>(B)</enum><header>Consultation</header><text>In updating the cybersecurity guidance under subparagraph (A), the Director shall, to the degree practicable and as appropriate, consult with—</text><clause id="idc24ebfd68e284da7a85ca8e7c989d302"><enum>(i)</enum><text>the Administrator, the Secretary, and the Commission;</text></clause><clause id="id9089e1945d4f4e8da927ecf086ea8473"><enum>(ii)</enum><text>small organizations, insurers, State governments, companies that work with small organizations, and academic and Federal and non-Federal experts in cybersecurity; and</text></clause><clause id="idc8fb3cddace242e4a3dcc6ea6c19a16b"><enum>(iii)</enum><text>any other entity as determined by the Director.</text></clause></subparagraph></paragraph><paragraph id="idac22d7dd4c644770b6fa7efbdbfb40c0"><enum>(5)</enum><header>User interface</header><text>As appropriate, the Director shall consult with experts regarding the design of a user interface for the cybersecurity guidance.</text></paragraph></subsection><subsection id="id9219669ee55f491a9e6e83f78f91079a"><enum>(c)</enum><header>Promotion of cybersecurity guidance for small businesses</header><paragraph id="idaafeca0edad64d8b8fbb8988469614a6"><enum>(1)</enum><header>Public availability</header><text>The cybersecurity guidance maintained under subsection (b)(1) shall be—</text><subparagraph id="id2a58c45e76604432ae89804d3ea0ef88"><enum>(A)</enum><text>made available, prominently and free of charge, on the public website of the Cybersecurity Infrastructure Security Agency; and</text></subparagraph><subparagraph id="idefa10472aec3408b91f7209f5606bb8f"><enum>(B)</enum><text>linked to from relevant portions of the websites of the Administration and the Minority Business Development Agency.</text></subparagraph></paragraph><paragraph id="id9d5e2793b9544f58958a2b1c9cd28eea"><enum>(2)</enum><header>Promotion generally</header><text>The Director, the Administrator, and the Secretary shall, to the degree practicable, promote the cybersecurity guidance through relevant resources that are intended for or known to be regularly used by small organizations, including agency documents, websites, and events.</text></paragraph></subsection><subsection id="idc8f8103da6f747e690a4f62ca8d097b9"><enum>(d)</enum><header>Report on incentivizing cybersecurity for small organizations</header><paragraph id="id48687ac27e4f411c81815c96f9917041"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act, the Secretary shall submit to Congress a report describing methods to incentivize small organizations to improve their cybersecurity, including through the adoption of policies, controls, products and services that have been demonstrated to reduce cybersecurity risk.</text></paragraph><paragraph id="id76f6c78b7c034f849a4e975264ce860c"><enum>(2)</enum><header>Matters to be included</header><text>The report required under paragraph (1) shall—</text><subparagraph id="id017137be4dc14ca2aefe5a9e6cf4fad4"><enum>(A)</enum><text>identify barriers or challenges for small organizations in purchasing or acquiring products and services that promote the cybersecurity;</text></subparagraph><subparagraph id="idad50742f385642f5a58b32576e4714be"><enum>(B)</enum><text>assess market availability, market pricing, and affordability of products and services that promote the cybersecurity for small organizations, with particular attention to identifying high-risk and underserved sectors or regions;</text></subparagraph><subparagraph id="idec91d606f7014fd8a313744085fa4379"><enum>(C)</enum><text>estimate the cost of tax breaks, grants, subsidies, or other incentives to increase the adoption of policies and controls or acquisition of products and services that promote the cybersecurity of small organizations;</text></subparagraph><subparagraph id="id48a2b8b1e3364010af236f8bab15b0cd"><enum>(D)</enum><text>as practicable, consult the certifications and requirement for cloud services described in the final report of the Cyberspace Solarium Commission established under section 1652 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 (<external-xref legal-doc="public-law" parsable-cite="pl/115/232">Public Law 115–232</external-xref>; 132 Stat. 2140);</text></subparagraph><subparagraph id="idf5e17726bfc14174a0415968d64ca8a9"><enum>(E)</enum><text>describe evidence-based cybersecurity controls and policies that improve cybersecurity for small organizations;</text></subparagraph><subparagraph id="id2ad1d78e74f44df6aa9f42a00015f86e"><enum>(F)</enum><text>with respect to the incentives described in subparagraph (C), recommend measures that can effectively improve cybersecurity at scale for small organizations; and</text></subparagraph><subparagraph id="id0af6b3fe21024f24b4d95b76bd15e145"><enum>(G)</enum><text>include any other matters as the Secretary determines relevant.</text></subparagraph></paragraph><paragraph id="id7be0d8067b614ae3ae8575c1ec8c1dd5"><enum>(3)</enum><header>Guidance for specific types of small organizations</header><text>In preparing the report required under paragraph (1), the Secretary may include matters applicable for specific types of small organizations in addition to matters applicable to all small organizations.</text></paragraph><paragraph id="id34d54dacfd084cc09a435bc7ded2a6b0"><enum>(4)</enum><header>Consultation</header><text>In preparing the report required under paragraph (1), the Secretary shall consult with—</text><subparagraph id="idfaaa887be069416ab0dbffbe646be7ec"><enum>(A)</enum><text>the Administrator, the Director, and the Commission; and</text></subparagraph><subparagraph id="id1a484b5dbd134c65abd18db756d42dec"><enum>(B)</enum><text>small organizations, insurers of risks related to cybersecurity, State governments, cybersecurity and information technology companies that work with small organizations, and academic and Federal and non-Federal experts in cybersecurity.</text></subparagraph></paragraph></subsection><subsection id="idf3fc4ced885b43a1b8a20339a185ff9a"><enum>(e)</enum><header>Periodic census on state of cybersecurity of small businesses</header><paragraph id="id13a79a9c73c44120a83c281e9ff31e38"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act and not less frequently than every 24 months thereafter for not more than 10 years, the Administrator shall submit to Congress and make publicly available data on the state of cybersecurity of small businesses, including—</text><subparagraph id="id7664f769ff9a414896e1346bdb04a0ee"><enum>(A)</enum><text>adoption of the cybersecurity guidance among small businesses;</text></subparagraph><subparagraph id="id3e530e1b0bff4b23ac58583427134e47"><enum>(B)</enum><text>the most significant and widespread cybersecurity threats facing small businesses;</text></subparagraph><subparagraph id="id39358634fd414d4ab1e7dacf095ff35e"><enum>(C)</enum><text>the amount small businesses spend on cybersecurity products and services; and</text></subparagraph><subparagraph id="idce1c8d98c8e94507a49acb92ab9cefe2"><enum>(D)</enum><text>the personnel small businesses dedicate to cybersecurity (including the amount of total personnel time, whether by employees or contractors, dedicated to cybersecurity efforts).</text></subparagraph></paragraph><paragraph id="idcd4de2a087aa4e21b8f4e8b41486f57c"><enum>(2)</enum><header>Form</header><text>The report required under paragraph (1) shall be produced in unclassified form but may contain a classified annex.</text></paragraph><paragraph id="id40db04fb962a41f49056dea128f32903"><enum>(3)</enum><header>Consultation</header><text>In preparing the report required under paragraph (1), the Administrator shall consult with—</text><subparagraph id="ide161cf2c2a5e40458eedb6a7a54ec7d9"><enum>(A)</enum><text>the Secretary, the Director, and the Commission; and</text></subparagraph><subparagraph id="idf75832a3bcc249598b35b1284f9e59c5"><enum>(B)</enum><text>small businesses, insurers of risks related to cybersecurity, cybersecurity and information technology companies that work with small businesses, and academic and Federal and non-Federal experts in cybersecurity. </text></subparagraph></paragraph></subsection></section></legis-body></bill> 

