<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-ALB21C54-L2F-C9-WV7"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>116 S2540 IS: CISA Technical Corrections and Improvements Act of 2021</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-07-29</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 2540</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210729">July 29, 2021</action-date><action-desc><sponsor name-id="S349">Mr. Portman</sponsor> (for himself and <cosponsor name-id="S380">Mr. Peters</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To make technical corrections to title XXII of the Homeland Security Act of 2002, and for other purposes.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>CISA Technical Corrections and Improvements Act of 2021</short-title></quote>.</text></section><section id="id40AC375D1E084D9487F19E6E026A60A5"><enum>2.</enum><header>Redesignations</header><subsection id="idC748EE7F590E4560BB3D8B4DED8C339E"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651 et seq.</external-xref>) is amended—</text><paragraph id="id2366157002734B5BB5F3C75F27BD9959"><enum>(1)</enum><text>by striking section 2201 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>); </text></paragraph><paragraph id="id08205D7F39E143D0855FF2048D91F6B8"><enum>(2)</enum><text>by redesignating sections 2202 through 2214 as sections 2201 through 2213, respectively; </text></paragraph><paragraph id="id4722151B6A5B41148AACE6D126D3AC63"><enum>(3)</enum><text>by redesignating section 2217 (<external-xref legal-doc="usc" parsable-cite="usc/6/665f">6 U.S.C. 665f</external-xref>) as section 2219; </text></paragraph><paragraph id="idF061BFFB10664B0CA807CB05E0A0EC23"><enum>(4)</enum><text>by redesignating section 2216 (<external-xref legal-doc="usc" parsable-cite="usc/6/665e">6 U.S.C. 665e</external-xref>) as section 2218; </text></paragraph><paragraph id="id9EC988C8AEE746499FC2993ED49C0EC6"><enum>(5)</enum><text>by redesignating the fourth section 2215 (relating to Sector Risk Management Agencies) (<external-xref legal-doc="usc" parsable-cite="usc/6/665d">6 U.S.C. 665d</external-xref>) as section 2217; </text></paragraph><paragraph id="idF0917339ADEC4D3CBD2004DE3B016A8A"><enum>(6)</enum><text>by redesignating the third section 2215 (relating to the Cybersecurity State Coordinator) (<external-xref legal-doc="usc" parsable-cite="usc/6/665c">6 U.S.C. 665c</external-xref>) as section 2216; and</text></paragraph><paragraph id="id65EE9199826547B7979C8476F09EB026"><enum>(7)</enum><text>by redesignating the first section 2215 (relating to Duties and Authorities Relating to .GOV Internet Domain) (<external-xref legal-doc="usc" parsable-cite="usc/6/665">6 U.S.C. 665</external-xref>) as section 2214. </text></paragraph></subsection><subsection id="idD99BB56A59CD42218C8540332807F06E"><enum>(b)</enum><header>Technical and conforming amendments</header><text>The Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101 et seq.</external-xref>) is amended—</text><paragraph id="idE71D76BE0CAB4BBFB92A8FB0E345B7C7"><enum>(1)</enum><text>in section 320(d)(3)(C) (<external-xref legal-doc="usc" parsable-cite="usc/6/195f">6 U.S.C. 195f(d)(3)(C)</external-xref>) by striking <quote>section 2201</quote> and inserting <quote>section 2200</quote>; </text></paragraph><paragraph id="idAB31DA89F9F549B69351F078A30E133F"><enum>(2)</enum><text>in section 846(1) (<external-xref legal-doc="usc" parsable-cite="usc/6/417">6 U.S.C. 417(1)</external-xref>), by striking <quote>section 2209</quote> and inserting <quote>section 2208</quote>; </text></paragraph><paragraph id="id781A647CB4A4493B84467F756F22E7DD"><enum>(3)</enum><text>in section 1801(c)(16) (<external-xref legal-doc="usc" parsable-cite="usc/6/571">6 U.S.C. 571(c)(16)</external-xref>) by striking <quote>section 2202(c)(7)</quote> and inserting <quote>section 2201(c)(7)</quote>; </text></paragraph><paragraph id="idB95467E7EC2F4E988045A94624CEF993"><enum>(4)</enum><text>in section 2001(4)(A)(iii)(II) (<external-xref legal-doc="usc" parsable-cite="usc/6/601">6 U.S.C. 601(4)(A)(iii)(II)</external-xref>), by striking <quote>section 2214(a)(2)</quote> and inserting <quote>section 2213(a)(2)</quote>; </text></paragraph><paragraph id="id8980045673CA4334A509760990F34E70" commented="no" display-inline="no-display-inline"><enum>(5)</enum><text>in section 2008(a)(3) (<external-xref legal-doc="usc" parsable-cite="usc/6/609">6 U.S.C. 609(a)(3)</external-xref>), by striking <quote>section 2214(a)(2)</quote> and inserting <quote>section 2213(a)(2);</quote></text></paragraph><paragraph id="idBC5F95A6A6684691AA983297FB6F6E20"><enum>(6)</enum><text>in section 2201, as so redesignated—</text><subparagraph id="id674B6E3AC6A242FA9CA9828A255C7AEA"><enum>(A)</enum><text>in subsection (c)—</text><clause id="idC43DAC0B13054219ACC8B88167ABDFEA"><enum>(i)</enum><text>in the first paragraph (12), by striking <quote>section 2215</quote> and inserting <quote>section 2216</quote>; </text></clause><clause id="id372F20102A41449AAB470122F75AE42F"><enum>(ii)</enum><text>by redesignating the second and third paragraphs (12) as paragraphs (13) and (14), respectively; and</text></clause><clause id="id55064AB8EAA8488E89AB8BDFDCCEF5D2"><enum>(iii)</enum><text>in paragraph (13), as so redesignated, by striking <quote>section 2215</quote> and inserting <quote>section 2214</quote>; and</text></clause></subparagraph><subparagraph id="id0E2C256F0071421983D666FD0C5FA587"><enum>(B)</enum><text>in subsection (e)(2), by striking <quote>sections 2203(b) and 2204(b)</quote> and inserting <quote>sections 2202(b) and 2203(b)</quote>; </text></subparagraph></paragraph><paragraph id="id3DF6BC372AD84073809A89CCF079C692"><enum>(7)</enum><text>in section 2202(b)(3), as so redesignated, by striking <quote>section 2202(c)(7)</quote> and inserting <quote>section 2201(c)(7)</quote>; </text></paragraph><paragraph id="id1DD28FCE89994F5C8E9980AFA754CECD"><enum>(8)</enum><text>in section 2203(b)(3), as so redesignated, by striking <quote>section 2202(c)(7)</quote> and inserting <quote>section 2201(c)(7)</quote>;</text></paragraph><paragraph id="id3D53D7186D4E470289DA42E7502BA01E"><enum>(9)</enum><text>in section 2204, as so redesignated, in the matter preceding paragraph (1), by striking <quote>section 2202</quote> and inserting <quote>section 2201</quote>;</text></paragraph><paragraph id="idD5D506275ED64490808203A12696E51D"><enum>(10)</enum><text>in section 2210(b)(2)(A), as so redesignated, by striking <quote>section 2209</quote> and inserting <quote>section 2208</quote>; and</text></paragraph><paragraph id="idE33578DA4F9446F284803969F2F18F6A"><enum>(11)</enum><text>in section 2217(c)(4)(A), by striking <quote>section 2209</quote> and inserting <quote>section 2208</quote>.</text></paragraph></subsection><subsection id="idED51AE24600F44668C3EFC1880249D21"><enum>(c)</enum><header>Table of contents</header><text>The table of contents in section 1(b) of the Homeland Security Act of 2002 (<external-xref legal-doc="public-law" parsable-cite="pl/107/296">Public Law 107–296</external-xref>; 116 Stat. 2135) is amended—</text><paragraph id="id63EDB805F60D44F5A27C301173F877B0"><enum>(1)</enum><text>by striking inserting before the item relating to subtitle A of title XXII the following:</text><quoted-block style="OLC" id="idb1be89ef-708d-42c9-a77b-50fb26dac9c7"><toc><toc-entry level="section" idref="H98C5E8CF033B4BCD9DB19EC8CA2B1FE4">Sec. 2200. Definitions.</toc-entry></toc><after-quoted-block>;</after-quoted-block></quoted-block><continuation-text continuation-text-level="paragraph">and</continuation-text></paragraph><paragraph id="idC01BF99F826F4156A8E63011010CAC72"><enum>(2)</enum><text>by striking the items relating to sections 2201 through 2217 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id2FD61505612F4C7585B14530B25BA1B3"><toc><toc-entry level="section" bold="off">Sec. 2201. Cybersecurity and Infrastructure Security Agency.</toc-entry><toc-entry level="section" bold="off">Sec. 2202. Cybersecurity Division.</toc-entry><toc-entry level="section" bold="off">Sec. 2203. Infrastructure Security Division.</toc-entry><toc-entry level="section" bold="off">Sec. 2204. Enhancement of Federal and non-Federal cybersecurity. </toc-entry><toc-entry level="section" bold="off">Sec. 2205. Net guard.</toc-entry><toc-entry level="section" bold="off">Sec. 2206. Cyber Security Enhancement Act of 2002.</toc-entry><toc-entry level="section" bold="off">Sec. 2207. Cybersecurity recruitment and retention.</toc-entry><toc-entry level="section" bold="off">Sec. 2208. National cybersecurity and communications integration center.</toc-entry><toc-entry level="section" bold="off">Sec. 2209. Cybersecurity plans.</toc-entry><toc-entry level="section" bold="off">Sec. 2210. Cybersecurity strategy.</toc-entry><toc-entry level="section" bold="off">Sec. 2211. Clearances.</toc-entry><toc-entry level="section" bold="off">Sec. 2212. Federal intrusion detection and prevention system.</toc-entry><toc-entry level="section" bold="off">Sec. 2213. National Asset Database.</toc-entry><toc-entry level="section" bold="off">Sec. 2214. Duties and authorities relating to .gov internet domain.</toc-entry><toc-entry level="section" bold="off">Sec. 2215. Joint Cyber Planning Office. </toc-entry><toc-entry level="section" bold="off">Sec. 2216. Cybersecurity State Coordinator.</toc-entry><toc-entry level="section" bold="off">Sec. 2217. Sector Risk Management Agencies. </toc-entry><toc-entry level="section" bold="off">Sec. 2218. Cybersecurity Advisory Committee.</toc-entry><toc-entry level="section" bold="off">Sec. 2219. Cybersecurity education and training programs.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id5CF8E08F455B46AFA620820F1B20DE23"><enum>(d)</enum><header>Additional technical amendment</header><paragraph id="id86494CE83A554429A33651274B11117C"><enum>(1)</enum><header>Amendment</header><text>Section 904(b)(1) of the DOTGOV Act of 2020 (title IX of division U of <external-xref legal-doc="public-law" parsable-cite="pl/116/260">Public Law 116–260</external-xref>) is amended, in the matter preceding subparagraph (A), by striking <quote>Homeland Security Act</quote> and inserting <quote>Homeland Security Act of 2002</quote>.</text></paragraph><paragraph id="id3846B8D697834C1CB6EE7ABED09DDCD1" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Effective date</header><text>The amendment made by paragraph (1) shall take effect as if enacted as part of the DOTGOV Act of 2020 (title IX of division U of <external-xref legal-doc="public-law" parsable-cite="pl/116/260">Public Law 116–260</external-xref>).</text></paragraph></subsection></section><section id="idF735DDA92F5B4B0596CE8D9EEE66E7B4"><enum>3.</enum><header>Consolidation of definitions</header><subsection id="id4855CA9557EA46E9BEF4C039CBE12A35"><enum>(a)</enum><header>In general</header><text>Title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>) is amended—</text><paragraph id="id4DC9F3E1E85542129DADD7FF841B4DD9"><enum>(1)</enum><text>by striking section 2201; and</text></paragraph><paragraph id="id137263CAA4064AFE8A6B7F05BF065E58"><enum>(2)</enum><text>by inserting before the subtitle A heading the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id051E4E277DB3413B9D83AF8A681DCA19"><section commented="no" display-inline="no-display-inline" id="H98C5E8CF033B4BCD9DB19EC8CA2B1FE4" section-type="subsequent-section"><enum>2200.</enum><header display-inline="yes-display-inline">Definitions</header><text display-inline="no-display-inline">Except as otherwise specifically provided, in this title:</text><paragraph display-inline="no-display-inline" commented="no" id="idCD7C05256C734A3480944765F41BD9C2"><enum>(1)</enum><header>Agency</header><text>The term <term>Agency</term> means the Cybersecurity and Infrastructure Security Agency. </text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="idC81C96B5E0304E29B91325FCEB07E8B1"><enum>(2)</enum><header>Agency information</header><text>The term <term>agency information</term> means information collected or maintained by or on behalf of an agency. </text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="idF75CFAAE77F74CA8AC0E82504D5D1767"><enum>(3)</enum><header>Agency information system</header><text>The term <term>agency information system</term> means an information system used or operated by an agency or by another entity on behalf of an agency. </text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="idBE634100DB6D4E7BB4B124B0FFC4F3B2"><enum>(4)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text><subparagraph display-inline="no-display-inline" commented="no" id="idEF1A71842C9A44FCA21C316D175D6C65"><enum>(A)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate; and</text></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="id150EF09214E44FC592F00C3D31DF12DD"><enum>(B)</enum><text>the Committee on Homeland Security of the House of Representatives.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id56DAEA53297143D99AD10FFF75CB09BB"><enum>(5)</enum><header>Critical infrastructure information</header><text>The term <term>critical infrastructure information</term> means information not customarily in the public domain and related to the security of critical infrastructure or protected systems—</text><subparagraph id="idc04d741a7b2646c5bc5cb64a4f175e22"><enum>(A)</enum><text>actual, potential, or threatened interference with, attack on, compromise of, or incapacitation of critical infrastructure or protected systems by either physical or computer-based attack or other similar conduct (including the misuse of or unauthorized access to all types of communications and data transmission systems) that violates Federal, State, or local law, harms interstate commerce of the United States, or threatens public health or safety;</text></subparagraph><subparagraph id="iddb3adb151dd346dbba761e8bbd46769d"><enum>(B)</enum><text>the ability of any critical infrastructure or protected system to resist such interference, compromise, or incapacitation, including any planned or past assessment, projection, or estimate of the vulnerability of critical infrastructure or a protected system, including security testing, risk evaluation thereto, risk management planning, or risk audit; or</text></subparagraph><subparagraph id="id08f19e769a19422cab8da181f92ee150"><enum>(C)</enum><text>any planned or past operational problem or solution regarding critical infrastructure or protected systems, including repair, recovery, reconstruction, insurance, or continuity, to the extent it is related to such interference, compromise, or incapacitation.</text></subparagraph></paragraph><paragraph id="id6046FA2BD48143B9BF39410698D599A4"><enum>(6)</enum><header>Cyber threat indicator</header><text>The term <term>cyber threat indicator</term> means information that is necessary to describe or identify—</text><subparagraph id="idbaefa249bd8b4508aaa64ae4c22bfa8b"><enum>(A)</enum><text>malicious reconnaissance, including anomalous patterns of communications that appear to be transmitted for the purpose of gathering technical information related to a cybersecurity threat or security vulnerability;</text></subparagraph><subparagraph id="id16ebf4bad3d74c6b9662159e7d03abfc"><enum>(B)</enum><text>a method of defeating a security control or exploitation of a security vulnerability;</text></subparagraph><subparagraph id="id34dfc08cf53c473b9c3650c09656b96b"><enum>(C)</enum><text>a security vulnerability, including anomalous activity that appears to indicate the existence of a security vulnerability;</text></subparagraph><subparagraph id="id07636a1b33e240f888be3c81a7583fe9"><enum>(D)</enum><text>a method of causing a user with legitimate access to an information system or information that is stored on, processed by, or transiting an information system to unwittingly enable the defeat of a security control or exploitation of a security vulnerability;</text></subparagraph><subparagraph id="id7c4633593670469b93bf0c74201db82a"><enum>(E)</enum><text>malicious cyber command and control;</text></subparagraph><subparagraph id="idb208946599644c9cb84fd011b3d192d1"><enum>(F)</enum><text>the actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat;</text></subparagraph><subparagraph id="id2dfcc8a9b0774f478ea1f815a63dd465"><enum>(G)</enum><text>any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law; or</text></subparagraph><subparagraph id="idb71ff0cb24c7431190ef7ff2d85e851f"><enum>(H)</enum><text>any combination thereof.</text></subparagraph></paragraph><paragraph id="id878007F237904D4E839FA6F0E3C530C4"><enum>(7)</enum><header>Cybersecurity purpose</header><text>The term <term>cybersecurity purpose</term> means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H535549FC090F4B4E916D8B3AED0A78F6"><enum>(8)</enum><header>Cybersecurity risk</header><text>The term <term>cybersecurity risk</term>—</text><subparagraph id="id4b0788d254e14a34ba4ba71b79054533"><enum>(A)</enum><text>means threats to and vulnerabilities of information or information systems and any related consequences caused by or resulting from unauthorized access, use, disclosure, degradation, disruption, modification, or destruction of such information or information systems, including such related consequences caused by an act of terrorism; and</text></subparagraph><subparagraph id="ide674584ed7e2464fafefea14487b45bf"><enum>(B)</enum><text>does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HBBBCAB6472B647428175E0542D9BD560"><enum>(9)</enum><header>Cybersecurity threat</header><subparagraph commented="no" display-inline="no-display-inline" id="id750E7A3A87D442B5A939B8C4B9762AD9"><enum>(A)</enum><header>In general</header><text>Except as provided in subparagraph (B), the term <term>cybersecurity threat</term> means an action, not protected by the First Amendment to the Constitution of the United States, on or through an information system that may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system.</text></subparagraph><subparagraph id="ide5a58012a1d24b04866a993e5b5bb7aa"><enum>(B)</enum><header>Exclusion</header><text>The term <term>cybersecurity threat</term> does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement.</text></subparagraph></paragraph><paragraph id="idB21ACD2537E94D6FA891F28C043EBF21"><enum>(10)</enum><header>Defensive measure</header><subparagraph id="id1BFB6983A27C4BD4BAE2EE7207037C14"><enum>(A)</enum><header>In general</header><text>Except as provided in subparagraph (B), the term <term>defensive measure</term> means an action, device, procedure, signature, technique, or other measure applied to an information system or information that is stored on, processed by, or transiting an information system that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability.</text></subparagraph><subparagraph id="idBAE3E9DCBC654BDAB3761BC0C2F40222"><enum>(B)</enum><header>Exclusion</header><text>The term <term>defensive measure</term> does not include a measure that destroys, renders unusable, provides unauthorized access to, or substantially harms an information system or information stored on, processed by, or transiting such information system not owned by—</text><clause id="id537E2B3950C4443B99278314FBAD8DDF"><enum>(i)</enum><text>the entity operating the measure; or</text></clause><clause id="id1B50EC83C7FC4D6BA162F01C7CC83E1B"><enum>(ii)</enum><text>another entity or Federal entity that is authorized to provide consent and has provided consent to that private entity for operation of such measure. </text></clause></subparagraph></paragraph><paragraph id="id13449357C4814BFC8425746198EA2471"><enum>(11)</enum><header>Homeland Security Enterprise</header><text>The term <term>Homeland Security Enterprise</term> means relevant governmental and nongovernmental entities involved in homeland security, including Federal, State, local, and tribal government officials, private sector representatives, academics, and other policy experts.</text></paragraph><paragraph id="id3E106DF30C954F33A1690F4545422E30"><enum>(12)</enum><header>Incident</header><text>The term <term>incident</term> means an occurrence that actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system, or actually or imminently jeopardizes, without lawful authority, an information system. </text></paragraph><paragraph id="idEF0241A1B04C4AD691D807326CD0AC97"><enum>(13)</enum><header>Information sharing and analysis organization</header><text>The term <term>Information Sharing and Analysis Organization</term> means any formal or informal entity or collaboration created or employed by public or private sector organizations, for purposes of—</text><subparagraph id="idb8b518760f344dc9832178e2bbb2592f"><enum>(A)</enum><text>gathering and analyzing critical infrastructure information, including information related to cybersecurity risks and incidents, in order to better understand security problems and interdependencies related to critical infrastructure, including cybersecurity risks and incidents, and protected systems, so as to ensure the availability, integrity, and reliability thereof;</text></subparagraph><subparagraph id="id03cdff16b664424e88a9a5a3429cea9c"><enum>(B)</enum><text>communicating or disclosing critical infrastructure information, including cybersecurity risks and incidents, to help prevent, detect, mitigate, or recover from the effects of a interference, compromise, or a incapacitation problem related to critical infrastructure, including cybersecurity risks and incidents, or protected systems; and</text></subparagraph><subparagraph id="idd77fbdb72f5d47eb862b051b445e4e2a"><enum>(C)</enum><text>voluntarily disseminating critical infrastructure information, including cybersecurity risks and incidents, to its members, State, local, and Federal Governments, or any other entities that may be of assistance in carrying out the purposes specified in subparagraphs (A) and (B).</text></subparagraph></paragraph><paragraph id="idDE418136440F4DC1BA83A21173E1C3F6"><enum>(14)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code. </text></paragraph><paragraph id="id5547113AA0E142088ABE299B31297B27"><enum>(15)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given the term in section 3(4) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)</external-xref>). </text></paragraph><paragraph id="id4C3B84FD6E09418A82EC2FB66E6C4A65"><enum>(16)</enum><header>Monitor</header><text>The term <term>monitor</term> means to acquire, identify, or scan, or to possess, information that is stored on, processed by, or transiting an information system.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HC64C8F999913462C8D570672B6E3473A"><enum>(17)</enum><header>National cybersecurity asset response activities</header><text>The term <term>national cybersecurity asset response activities</term> means—</text><subparagraph commented="no" display-inline="no-display-inline" id="H66E7029AB32949B2A8E62C5CD5EFDB4B"><enum>(A)</enum><text>furnishing cybersecurity technical assistance to entities affected by cybersecurity risks to protect assets, mitigate vulnerabilities, and reduce impacts of cyber incidents;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H866F8C3C75514D588C4129E549C19158"><enum>(B)</enum><text>identifying other entities that may be at risk of an incident and assessing risk to the same or similar vulnerabilities;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H26177B05BC774178A75A4AB1C2C8F58C"><enum>(C)</enum><text>assessing potential cybersecurity risks to a sector or region, including potential cascading effects, and developing courses of action to mitigate such risks;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HFD5B3C2267E74A0C98E9F63D7ECD1A89"><enum>(D)</enum><text>facilitating information sharing and operational coordination with threat response; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HD7DE9EC4BC004FD994F57EA973767A7C"><enum>(E)</enum><text>providing guidance on how best to utilize Federal resources and capabilities in a timely, effective manner to speed recovery from cybersecurity risks.</text></subparagraph></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id6D754A1E664E485ABF295C5F87502CC1"><enum>(18)</enum><header>National security system</header><text>The term <term>national security system</term> has the meaning given the term in section 11103 of title 40, United States Code. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H4AB8FD6998A0435C8CE9AC83297CC3DA"><enum>(19)</enum><header>Sector risk management agency</header><text>The term <term>Sector Risk Management Agency</term> means a Federal department or agency, designated by law or Presidential directive, with responsibility for providing institutional knowledge and specialized expertise of a sector, as well as leading, facilitating, or supporting programs and associated activities of its designated critical infrastructure sector in the all hazards environment in coordination with the Department.</text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id808705D9DEB143F4A437129435F77569"><enum>(20)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H66BE49D5A6644B5E8726027AD3D94A65"><enum>(21)</enum><header>Sharing</header><text>The term <term>sharing</term> (including all conjugations thereof) means providing, recieving, and disseminating (including all conjugations of each such terms).</text></paragraph></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="idC51BACC668354A4CBC79F9260E0DA748"><enum>(b)</enum><header>Technical and conforming amendments</header><text>The Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101 et seq.</external-xref>) is amended—</text><paragraph id="id87F15EB26F2A427DADA14BDB14770BEE"><enum>(1)</enum><text>in section 2201, as so redesignated—</text><subparagraph id="id5DB05CAC77C14E3FAA265F7A59866F25"><enum>(A)</enum><text>in subsection (a)(1), by striking <quote>(in this subtitle referred to as the Agency)</quote>; </text></subparagraph><subparagraph id="id41BF956D55D14B728192BC4C41000C3E"><enum>(B)</enum><text>in subsection (f)—</text><clause id="id761857B478554C96888415CC0BFC96B1"><enum>(i)</enum><text>in paragraph (1), by inserting <quote>Executive</quote> before <quote>Assistant Director</quote>; and</text></clause><clause id="id5E0686CD3403483DAF17B3A3DCC384F6"><enum>(ii)</enum><text>in paragraph (2), by inserting <quote>Executive</quote> before <quote>Assistant Director</quote>; </text></clause></subparagraph></paragraph><paragraph id="id15D49429F717490A9198E9479E702CC8"><enum>(2)</enum><text>in section 2202(a)(2), as so redesignated, by striking <quote>as the <quote>Assistant Director</quote></quote> and inserting <quote>as the <quote>Executive Assistant Director</quote></quote>; </text></paragraph><paragraph id="id16ED2524975D4E0F9FAEAD4751829B6A"><enum>(3)</enum><text>in section 2203(a)(2), as so redesignated, by striking <quote>as the <quote>Assistant Director</quote></quote> and inserting <quote>as the <quote>Executive Assistant Director</quote></quote>; </text></paragraph><paragraph id="idAA6B228ECB3942DB91256442EE9F904C"><enum>(4)</enum><text>in section 2208, as so redesignated—</text><subparagraph id="idBB4079A488DC467DBB5CCB4F5E6F1A36"><enum>(A)</enum><text>by striking subsection (a); </text></subparagraph><subparagraph id="id03EDC0ECB2DE4B7185C816120BFE399C"><enum>(B)</enum><text>by redesignating subsections (b) through subsection (o) as subsections (a) through (n), respectively; </text></subparagraph><subparagraph id="id701A3CCEEB94480FA87D40DBC2AA2DB0"><enum>(C)</enum><text>in subsection (c)(1)(A)(iii), as so redesignated, by striking <quote>, as that term is defined under section 3(4) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003(4)</external-xref>)</quote>; </text></subparagraph><subparagraph id="id8FDB01CF95704C369BACCF2BCD0A7D77"><enum>(D)</enum><text>in subsection (d), as so redesignated, in the matter preceding paragraph (1), by striking <quote>subsection (c)</quote> and inserting <quote>subsection (b)</quote>; </text></subparagraph><subparagraph id="id556E26A1A7A34E9B8E52CCCAF6CFA3C7"><enum>(E)</enum><text>in subsection (j), as so redesignated, by striking <quote>subsection (c)(8)</quote> and inserting <quote>subsection (b)(8)</quote>; and</text></subparagraph><subparagraph id="id31C1042115F74E0EA737ADB82FC64BAF"><enum>(F)</enum><text>in subsection (n), as so redesignated—</text><clause id="idAE9B49B6D5CA4DE9A6074E9E87D8ED99"><enum>(i)</enum><text>in paragraph (2)(A), by striking <quote>subsection (c)(12)</quote> and inserting <quote>subsection (b)(12)</quote>; and</text></clause><clause id="id3F4AE5A78AA24B3EBF3897BD0366D4C8"><enum>(ii)</enum><text>in paragraph (3)(B)(i), by striking <quote>subsection (c)(12)</quote> and inserting <quote>subsection (b)(12)</quote>; </text></clause></subparagraph></paragraph><paragraph id="idA89BF787B52746D09A0A6DA63CE9B498"><enum>(5)</enum><text>in section 2209, as so redesignated—</text><subparagraph id="id62A508CDB6EB41C08B4BAFC78D6B817C"><enum>(A)</enum><text>by striking subsection (a); </text></subparagraph><subparagraph id="id8B784811197841C592FA96ECDED2D0C7"><enum>(B)</enum><text>by redesignating subsections (b) through (d) as subsections (a) through (c), respectively; </text></subparagraph><subparagraph id="idBBB01A6FD1874B70A30B605A529AD832"><enum>(C)</enum><text>in subsection (b), as so redesignated—</text><clause id="id1DB220CBF3E94E878A85A2F81DCB60AC"><enum>(i)</enum><text>by striking <quote>information sharing and analysis organizations (as defined in section 2222(5))</quote> and inserting <quote>Information Sharing and Analysis Organizations</quote>; and</text></clause><clause id="idF2DE9DC1457E4951B9E251813E7D1D2D"><enum>(ii)</enum><text>by striking <quote>(as defined in section 2209)</quote>; and</text></clause></subparagraph><subparagraph id="idC222F115AD4F4F8AA5EEF0072EF81E97"><enum>(D)</enum><text>in subsection (c), as so redesignated, by striking <quote>subsection (c)</quote> and inserting <quote>subsection (b)</quote>;</text></subparagraph></paragraph><paragraph id="id38B27637B9B847D9860701917666FCD3"><enum>(6)</enum><text>in section 2210, as so redesignated, by striking subsection (h); </text></paragraph><paragraph id="id04C44DD8AEE3490AA72164E445134AD2"><enum>(7)</enum><text>in section 2211, as so redesignated, by striking <quote>information sharing and analysis organizations (as defined in section 2222(5))</quote> and inserting <quote>Information Sharing and Analysis Organizations</quote>; </text></paragraph><paragraph id="id94F6D47E348B46528FEE073A062CE25A"><enum>(8)</enum><text>in section 2212, as so redesignated—</text><subparagraph id="id1C4B4E36F5174ED183DB4F6EC85F70F3"><enum>(A)</enum><text>by striking subsection (a); </text></subparagraph><subparagraph id="id7E560F49E2B348B291C3B8461FABEA9C"><enum>(B)</enum><text>by redesignating subsections (b) through (f) as subsections (a) through (e); respectively; </text></subparagraph><subparagraph id="id81040535B0BC454D87CA29757DCD7CC9"><enum>(C)</enum><text>in subsection (b), as so redesignated, by striking <quote>subsection (b)</quote> each place it appears and inserting <quote>subsection (a)</quote>; </text></subparagraph><subparagraph id="id6AC70B40A11C45E69559BB910C0B36BE"><enum>(D)</enum><text>in subsection (c), as so redesignated, in the matter preceding paragraph (1), by striking <quote>subsection (b)</quote> and inserting <quote>subsection (a)</quote>; and</text></subparagraph><subparagraph id="id5963F0786B26466B994E27EDF94A2E84"><enum>(E)</enum><text>in subsection (d), as so redesignated—</text><clause id="idA3F29E65BBD2469E87AF6C2945BA553B"><enum>(i)</enum><text>in paragraph (1)—</text><subclause id="idFACFBFDC0A4A43D8B8B195A840DC89F6"><enum>(I)</enum><text>in the matter preceding subparagraph (A), by striking <quote>subsection (c)(2)</quote> and inserting <quote>subsection (b)(2)</quote>; </text></subclause><subclause id="idEFDDA5A66006418DB4A461BEE305D51C"><enum>(II)</enum><text>in subparagraph (A), by striking <quote>subsection (c)(1)</quote> and inserting <quote>subsection (b)(1)</quote>; and</text></subclause><subclause id="idBB1D55A7842E41388895AA4506F4E407"><enum>(III)</enum><text>in subparagraph (B), by striking <quote>subsection (c)(2)</quote> and inserting <quote>subsection (b)(2)</quote>; and</text></subclause></clause><clause id="id7C54F9F9271C4E6C943787517127CBA1"><enum>(ii)</enum><text>in paragraph (2), by striking <quote>subsection (c)(2)</quote> and inserting <quote>subsection (b)(2)</quote>; </text></clause></subparagraph></paragraph><paragraph id="id4D63BF2560CC44CA95A00AC91C9707AD"><enum>(9)</enum><text>in section 2215 (<external-xref legal-doc="usc" parsable-cite="usc/6/665b">6 U.S.C. 665b</external-xref>)—</text><subparagraph id="id715BD3AA0D3F4575967535C4007EBE36"><enum>(A)</enum><text>by striking subsection (a); </text></subparagraph><subparagraph id="idB778EA0EC37449DBAA9162F67709330E"><enum>(B)</enum><text>by redesignating subsections (b) through (h) as subsections (a) through (g), respectively; </text></subparagraph><subparagraph id="idD017113E4B654A399615006F3608C9C7"><enum>(C)</enum><text>in subsection (a), as so redesignated—</text><clause id="idD189665CEAB34A1897EAEEE76B6015B6"><enum>(i)</enum><text>in the matter preceding paragraph (1), by striking <quote>subsection (e)</quote> and inserting <quote>subsection (d)</quote>; </text></clause><clause id="id6FA38A00C176494CB4B33CE5BFE2BFC5"><enum>(ii)</enum><text>in paragraph (1), by striking <quote>subsection (c)</quote> and inserting <quote>subsection (b)</quote>; and</text></clause><clause id="id80DAFAF50BB44FADBC237A299C7248AD"><enum>(iii)</enum><text>in paragraph (2), by striking <quote>subsection (c)</quote> and inserting <quote>subsection (b)</quote>; </text></clause></subparagraph><subparagraph id="id1E664341EBDF490D92F5E75FBE572D37"><enum>(D)</enum><text>in subsection (b)(4), as so redesignated—</text><clause id="idBEE62841E81C4F2AA8FC3E0DFCDF5592"><enum>(i)</enum><text>by striking <quote>subsection (e)</quote> and inserting <quote>subsection (d)</quote>; and</text></clause><clause id="idD4B7D2B90C6A46E2B033BF91CC73F134"><enum>(ii)</enum><text>by striking <quote>subsection (h)</quote> and inserting <quote>subsection (g)</quote>; </text></clause></subparagraph><subparagraph id="id76623A29294741E3B4474993F39335D5"><enum>(E)</enum><text>in subsection (d), as so redesignated, by striking <quote>subsection (b)(1)</quote> each place it appears and inserting <quote>subsection (a)(1)</quote>; </text></subparagraph><subparagraph id="id2BD55BA0D92947DE9B537C6E7BA7CDB9"><enum>(F)</enum><text>in subsection (e), as so redesignated—</text><clause id="id799546CDF8C948AB8791B3F7B138A1C1"><enum>(i)</enum><text>by striking <quote>subsection (b)</quote> and inserting <quote>subsection (a)</quote>; </text></clause><clause id="id6807DD85F065442EA0ECA58D61BEDDE3"><enum>(ii)</enum><text>by striking <quote>subsection (e)</quote> and inserting <quote>subsection (d)</quote>; and</text></clause><clause id="idD70E01F3A11E4F81A30194796AC1784E"><enum>(iii)</enum><text>by striking <quote>subsection (b)(1)</quote> and inserting <quote>subsection (a)(1)</quote>; and</text></clause></subparagraph><subparagraph id="id186DF0D39B2C4850AC6C66E757E08B96"><enum>(G)</enum><text>in subsection (f), as so redesignated, by striking <quote>subsection (c)</quote> and inserting <quote>subsection (b)</quote>; </text></subparagraph></paragraph><paragraph id="id769D407874494AF6A8FDA51099EB479F"><enum>(10)</enum><text>in section 2216, as so redesignated, by striking subsection (f) and inserting the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="idC1877AE9096042E9BC47BA29B03C84E0"><subsection id="id925F8F16273B424CBDDC931F6D740BD5"><enum>(f)</enum><header>Cyber defense operation defined</header><text>In this section, the term <term>cyber defense operation</term> means the use of a defensive measure.</text></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="id32458D3C8ABD4750BBEECE66F81D1009"><enum>(11)</enum><text>in section 2222—</text><subparagraph id="idD825E4D2FC694C7AB71ACADFCB07C3AB"><enum>(A)</enum><text>by striking paragraphs (3), (5), and (8); </text></subparagraph><subparagraph id="id11248E06A7D84D30A441E186EBE74302"><enum>(B)</enum><text>by redesignating paragraph (4) as paragraph (3); and </text></subparagraph><subparagraph id="id14B8332EB33E4CB29155631F3620DA1E"><enum>(C)</enum><text>by redesignating paragraphs (6) and (7) as paragraphs (4) and (5), respectively. </text></subparagraph></paragraph></subsection><subsection id="id9B21BA4DE0FF4D52931B54017E35EFBF"><enum>(c)</enum><header>Cybersecurity Act of 2015 definitions</header><text>Section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>) is amended—</text><paragraph id="id33948DCCCAC04FD483B94905951530E3"><enum>(1)</enum><text>by striking paragraphs (4) through (7) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id02BE26B4794041B9A095A93F82EF0D16"><paragraph id="id1831B68BE96840C7B850737A6D3A671B"><enum>(4)</enum><header>Cybersecurity purpose</header><text>The term <term>cybersecurity purpose</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><paragraph id="id770BC53366344F3098B74888CAAEC02E"><enum>(5)</enum><header>Cybersecurity threat</header><text>The term <term>cybersecurity threat</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><paragraph id="idBABD6FD008E042158DBB56C761059625"><enum>(6)</enum><header>Cyber theat indicator</header><text>The term <term>cyber threat indicator</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><paragraph id="id96D23686BEE64B80A2F4287B5DF45D0F"><enum>(7)</enum><header>Defensive measure</header><text>The term <term>defensive measure</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><after-quoted-block>; </after-quoted-block></quoted-block></paragraph><paragraph id="id744C08EFA07744DB8D1FC8958ABFDF50"><enum>(2)</enum><text>by striking paragraph (13) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9564F7810EF349D29D1CDA4F65CBA9AA"><paragraph id="id75D18014D50E4430A2FE549825B23ED6"><enum>(13)</enum><header>Monitor</header><text> The term <term>monitor</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="id5E415A4E6A6A4CDC80B167E45B3F6E06"><enum>(3)</enum><text>by striking paragraph (17) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idD830813EC04E4660A06AEDD3E4E1312D"><paragraph id="id8924679A14684C9FB189676132B40D7C"><enum>(17)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id87C8578F1B7B4DFEBF991D78E8964A1D"><enum>4.</enum><header>Additional technical and conforming amendments</header><subsection id="id575D321D9BC84FE58CACFF74F2E63D27"><enum>(a)</enum><header>Federal Cybersecurity Enhancement Act of 2015</header><text>The Federal Cybersecurity Enhancement Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1521">6 U.S.C. 1521 et seq.</external-xref>) is amended—</text><paragraph id="id35E16BB482264DA9AB8C96B25545E21B"><enum>(1)</enum><text>in section 222 (<external-xref legal-doc="usc" parsable-cite="usc/6/1521">6 U.S.C. 1521</external-xref>)—</text><subparagraph id="id5CCF280ACD1C40AB9A2FB55C8DB1A52A"><enum>(A)</enum><text>in paragraph (2), by striking <quote>section 2210</quote> and inserting <quote>section 2200</quote>; and</text></subparagraph><subparagraph id="id296A9BB248DE4BF4AE8440E4854802A4" commented="no" display-inline="no-display-inline"><enum>(B)</enum><text>in paragraph (4), by striking <quote>section 2209</quote> and inserting <quote>section 2200</quote>;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idEB765279AE974AE2AC16B914B47E887E"><enum>(2)</enum><text>in section 223 (<external-xref legal-doc="usc" parsable-cite="usc/6/151">6 U.S.C. 151</external-xref> note) is amended by striking <quote>section 2213(b)(1)</quote> each place it appears and inserting <quote>section 2212(a)(1)</quote>; and</text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id468822481DF445B9BBCF9A696B99A2B1"><enum>(3)</enum><text>in section 226—</text><subparagraph display-inline="no-display-inline" commented="no" id="id37BDC9F91ABE4BF09D311F7F8FBAE2A1"><enum>(A)</enum><text>in subsection (a)—</text><clause display-inline="no-display-inline" commented="no" id="id049477D10E6647AE83878BAB3B9EBFE3"><enum>(i)</enum><text>in paragraph (1), by striking <quote>section 2213</quote> and inserting <quote>section 2200</quote>; </text></clause><clause display-inline="no-display-inline" commented="no" id="idE77C7FB488AD427BA64D63A9357C393D"><enum>(ii)</enum><text>in paragraph (4), by striking <quote>section 2210(b)(1)</quote> and inserting <quote>section 2209(a)(1)</quote>; and</text></clause><clause display-inline="no-display-inline" commented="no" id="idE3F2D6286C344533BF64B694E04E4D61"><enum>(iii)</enum><text>in paragraph (5), by striking <quote>section 2213(b)</quote> and inserting <quote>section 2212(a)</quote>; and</text></clause></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="idC98674F7B1D14F04B2729D22CCFA7763"><enum>(B)</enum><text>in subsection (c)(1)(A)(vi), by striking <quote>section 2213(c)(5)</quote> and inserting <quote>section 2212(b)(5)</quote>; and</text></subparagraph></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id2238370336DA4EFFA1CFD329A960F9CF"><enum>(4)</enum><text>in section 227 (<external-xref legal-doc="usc" parsable-cite="usc/6/1525">6 U.S.C. 1525</external-xref>)—</text><subparagraph display-inline="no-display-inline" commented="no" id="id119708F458B646EDB0F983BAC9F7F677"><enum>(A)</enum><text>in subsection (a), by striking <quote>section 2213</quote> and inserting <quote>section 2212</quote>; and</text></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="id5EFAF5CEF19947A1BE760A213100AFE3"><enum>(B)</enum><text>in subsection (b), by striking <quote>section 2213(d)(2)</quote> and inserting <quote>section 2212(c)(2)</quote>.</text></subparagraph></paragraph></subsection><subsection display-inline="no-display-inline" commented="no" id="id89190327A6F7442CBDB093E2FF87F78B"><enum>(b)</enum><header>Public Health Service Act</header><text>Section 2811(b)(4)(D) of the Public Health Service Act (<external-xref legal-doc="usc" parsable-cite="usc/42/300hh-10">42 U.S.C. 300hh–10(b)(4)(D)</external-xref>) is amended by striking <quote>section 228(c) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/149">6 U.S.C. 149(c)</external-xref>)</quote> and inserting <quote>section 2209(c) of the Homeland Security Act of 2002</quote>. </text></subsection><subsection display-inline="no-display-inline" commented="no" id="idF88F99556E2B47D789841240A8B5B012"><enum>(c)</enum><header>William M. (Mac) Thornberry National Defense Authorization Act of Fiscal Year 2021</header><text>Section 9002 of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/652a">6 U.S.C. 652a</external-xref>) is amended—</text><paragraph display-inline="no-display-inline" commented="no" id="id1B9CDB57D5414FED9D5BCF9FF846DAD2"><enum>(1)</enum><text>in subsection (a)—</text><subparagraph display-inline="no-display-inline" commented="no" id="idF35F4C4F92934E0E8BC2793BF15ED54E"><enum>(A)</enum><text>in paragraph (5), by striking <quote>section 2222(5) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/671">6 U.S.C. 671(5)</external-xref>)</quote> and inserting <quote>section 2200 of the Homeland Security Act of 2002</quote>; and</text></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="idBA11CCE3DC02427FAC3B76BD216D676D"><enum>(B)</enum><text>in paragraph (7), by striking <quote>given the term</quote> and all that follows and inserting <quote>given the term in section 2200 of the Homeland Security Act of 2002</quote>; </text></subparagraph></paragraph><paragraph display-inline="no-display-inline" commented="no" id="idC1FCB237AF434E468826B766D1E0D84F"><enum>(2)</enum><text>in subsection (b)(1)(A), by striking <quote>section 2202(c)(4) of the Homeland Security Act (<external-xref legal-doc="usc" parsable-cite="usc/6/652">6 U.S.C. 652(c)(4)</external-xref>)</quote> and inserting <quote>section 2201(c)(4)</quote>; </text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="id51C0F3D501214A35875BC722E08C8695"><enum>(3)</enum><text>in subsection (c)(3)(B), by striking <quote>section 2201(5) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651(5)</external-xref>)</quote> and inserting <quote>section 2200 of the Homeland Security Act of 2002</quote>; and</text></paragraph><paragraph display-inline="no-display-inline" commented="no" id="idDDA3ADC614C54D9D8D4082C85815727C"><enum>(4)</enum><text>in subsection (d)—</text><subparagraph display-inline="no-display-inline" commented="no" id="id8D27583B838C4040A2698AC34CAB8040"><enum>(A)</enum><text>by striking <quote>section 2215</quote> and inserting <quote>2217</quote>; and</text></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="id6283CE4323094948817EFAB4C0A263CB"><enum>(B)</enum><text>by striking <quote>, as added by this section</quote>. </text></subparagraph></paragraph></subsection><subsection display-inline="no-display-inline" commented="no" id="id843BF1E5C4434F8BB785B6B83C286EF8"><enum>(d)</enum><header>National Security Act of 1947</header><text>Section 113B of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3049a">50 U.S.C. 3049a(b)(4)</external-xref>) is amended by striking section <quote>226 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/147">6 U.S.C. 147</external-xref>)</quote> and inserting <quote>section 2207 of the Homeland Security Act of 2002</quote>.</text></subsection><subsection display-inline="no-display-inline" commented="no" id="idC6F0773C58B74486A67676604678A9C6"><enum>(e)</enum><header>Cybersecurity Act of 2015</header><text>Section 404(a) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1532">6 U.S.C. 1532(a)</external-xref>) is amended by striking <quote>section 2209</quote> and inserting <quote>section 2208</quote>.</text></subsection><subsection display-inline="no-display-inline" commented="no" id="id8B91DD17F52345428EC5E5337393D309"><enum>(f)</enum><header>IoT Cybersecurity Improvement Act of 2020</header><text>Section 5(b)(3) of the IoT Cybersecurity Improvement Act of 2020 (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3c">15 U.S.C. 278g–3c</external-xref>) is amended by striking <quote>section 2209(m)</quote> and inserting <quote>section 2208(l)</quote>.</text></subsection><subsection display-inline="no-display-inline" commented="no" id="idF4AC0A821D4A405E80B4716A7694AC48"><enum>(g)</enum><header>Small Business Act</header><text>Section 21(a)(8)(B) of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/648">15 U.S.C. 648(a)(8)(B)</external-xref>) is amended by striking <quote>section 2209(a)</quote> and inserting <quote>section 2200</quote>.</text></subsection><subsection display-inline="no-display-inline" commented="no" id="id6B00DAF5C0914E08A49E9305BE454A15"><enum>(h)</enum><header>Title 46</header><text>Section 70101(2) of title 46, United States Code, is amended by striking <quote>section 227 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/148">6 U.S.C. 148</external-xref>)</quote> and inserting <quote>section 2200 of the Homeland Security Act of 2002</quote>. </text></subsection></section></legis-body></bill> 

