<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-DUN21616-8H5-N0-3V1"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>107 S2585 IS: State and Local Cybersecurity Improvement Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-08-03</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 2585</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210803">August 3, 2021</action-date><action-desc><sponsor name-id="S388">Ms. Hassan</sponsor> (for herself, <cosponsor name-id="S287">Mr. Cornyn</cosponsor>, <cosponsor name-id="S403">Ms. Sinema</cosponsor>, and <cosponsor name-id="S384">Mr. Tillis</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Homeland Security Act of 2002 to authorize a grant program relating to the cybersecurity of State, local, Tribal, and territorial governments, and for other purposes.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>State and Local Cybersecurity Improvement Act</short-title></quote>.</text></section><section id="H5EDBF54ADF374A3B806DE5FEA4B25E7D"><enum>2.</enum><header>State and Local Cybersecurity Grant Program</header><subsection commented="no" id="H525198C526F549EF9EE98657620B2B28"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle A of title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id175684B44A624744B4197E03B1166818"><section commented="no" id="H61BDEA09AF4946BEB7124CAAF2264540"><enum>2218.</enum><header>State and Local Cybersecurity Grant Program</header><subsection commented="no" id="id7FB934F70E8D47AF8B4C4BA247A2A931"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id7cba10d348ba4f3ea5b13e163ba5fc39"><enum>(1)</enum><header>Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph id="ide1229419989f47299e7af15e7ed37433"><enum>(A)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate; and</text></subparagraph><subparagraph id="ida5671a0c4c464ff39a14f4cfdb804e82"><enum>(B)</enum><text>the Committee on Homeland Security of the House of Representatives. </text></subparagraph></paragraph><paragraph commented="no" id="id027E7E5FA0CA4E2F824D269526B7B322"><enum>(2)</enum><header>Cyber threat indicator</header><text>The term <term>cyber threat indicator</term> has the meaning given the term in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>). </text></paragraph><paragraph commented="no" id="id4AC5B6CCC7EE40898E81DF560D5B2B11"><enum>(3)</enum><header>Cybersecurity Plan</header><text>The term <term>Cybersecurity Plan</term> means a plan submitted by an eligible entity under subsection (e)(1).</text></paragraph><paragraph commented="no" id="id4C542CA557FF42FC9A8349F2EFFAAB3D"><enum>(4)</enum><header>Eligible entity</header><text>The term <term>eligible entity</term> means a—</text><subparagraph commented="no" id="id892B577288754467B20C7C7A830307FA"><enum>(A)</enum><text>State; or</text></subparagraph><subparagraph commented="no" id="id4A5C2551551A4EB78CBCAC91D5112645"><enum>(B)</enum><text>Tribal government.</text></subparagraph></paragraph><paragraph commented="no" id="id806A45217CC84E03A05A7223295F4EAC"><enum>(5)</enum><header>Incident</header><text>The term <term>incident</term> has the meaning given the term in section 2209.</text></paragraph><paragraph commented="no" id="id5DFF3E2414C24E1F946A452CCF978CB2"><enum>(6)</enum><header>Information sharing and analysis organization</header><text>The term <term>information sharing and analysis organization</term> has the meaning given the term in section 2222.</text></paragraph><paragraph commented="no" id="H0C998DF5FEFC4ECDA995BD4715532A1B"><enum>(7)</enum><header>Information system</header><text display-inline="yes-display-inline">The term <term>information system</term> has the meaning given the term in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph><paragraph commented="no" id="idBCB358FEF6F0445D87045D5CF05560DB"><enum>(8)</enum><header>Multi-entity group</header><text>The term <term>multi-entity group</term> means a group of 2 or more eligible entities desiring a grant under this section.</text></paragraph><paragraph id="H06291506D02645309DEEA32C4541FEFE"><enum>(9)</enum><header>Online service</header><text display-inline="yes-display-inline">The term <term>online service</term> means any internet-facing service, including a website, email, virtual private network, or custom application.</text></paragraph><paragraph id="id13154ddab7564c17a390b373b428c8d3"><enum>(10)</enum><header>Rural area</header><text>The term <term>rural area</term> has the meaning given the term in section 5302 of title 49, United States Code. </text></paragraph><paragraph commented="no" id="idA4DC67F0AB34445AB1537C8F7023DD70"><enum>(11)</enum><header>State and Local Cybersecurity Grant Program</header><text>The term <term>State and Local Cybersecurity Grant Program</term> means the program established under subsection (b).</text></paragraph><paragraph id="idb745e57eb49744ebbfac798e381add8f"><enum>(12)</enum><header>Tribal government</header><text>The term <term>Tribal government</term> means the recognized governing body of any Indian or Alaska Native Tribe, band, nation, pueblo, village, community, component band, or component reservation, that is individually identified (including parenthetically) in the most recent list published pursuant to Section 104 of the Federally Recognized Indian Tribe List Act of 1994 (<external-xref legal-doc="usc" parsable-cite="usc/25/5131">25 U.S.C. 5131</external-xref>). </text></paragraph></subsection><subsection commented="no" id="H1E6FC8EF7A2B4986BEFAB4304653BCB2"><enum>(b)</enum><header>Establishment</header><paragraph commented="no" id="id9EFCC77535EF49D884869B0C8F9CCE71"><enum>(1)</enum><header>In general</header><text>There is established within the Department a program to award grants to eligible entities to address cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments.</text></paragraph><paragraph commented="no" id="id8218CEB84C8A456E86F9C7A7A5A13A52"><enum>(2)</enum><header>Application</header><text>An eligible entity desiring a grant under the State and Local Cybersecurity Grant Program shall submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require.</text></paragraph></subsection><subsection commented="no" id="H0CDB5C778BB04DCE8582F77A8AEA9F80"><enum>(c)</enum><header>Administration</header><text display-inline="yes-display-inline">The State and Local Cybersecurity Grant Program shall be administered in the same office of the Department that administers grants made under sections 2003 and 2004.</text></subsection><subsection commented="no" id="H06714C6B0BD14D2C85E08E9E5D306547"><enum>(d)</enum><header>Use of funds</header><text display-inline="yes-display-inline">An eligible entity that receives a grant under this section and a local government that receives funds from a grant under this section, as appropriate, shall use the grant to—</text><paragraph commented="no" id="id6DB4DC0FA8874654BA29CF0FC14F980D"><enum>(1)</enum><text display-inline="yes-display-inline">implement the Cybersecurity Plan of the eligible entity;</text></paragraph><paragraph commented="no" id="id34C57AD604B74ED993DB3B67B33228FA"><enum>(2)</enum><text display-inline="yes-display-inline">develop or revise the Cybersecurity Plan of the eligible entity;</text></paragraph><paragraph commented="no" id="id86295BE982AA4E859B23FC8DCD564A2B"><enum>(3)</enum><text display-inline="yes-display-inline">pay expenses directly relating to the administration of the grant, which shall not exceed 5 percent of the amount of the grant;</text></paragraph><paragraph commented="no" id="idD276DD4929D744F7AE22D15FD0C4A90E"><enum>(4)</enum><text display-inline="yes-display-inline">assist with activities that address imminent cybersecurity threats, as confirmed by the Secretary, acting through the Director, to the information systems owned or operated by, or on behalf of, the eligible entity or a local government within the jurisdiction of the eligible entity; or</text></paragraph><paragraph commented="no" id="id8AD7A245DE55467E9C1EF50A20CA5719"><enum>(5)</enum><text>fund any other appropriate activity determined by the Secretary, acting through the Director.</text></paragraph></subsection><subsection commented="no" id="HEDF055DA3DAA476B82CA921AD1F104DD"><enum>(e)</enum><header>Cybersecurity plans</header><paragraph commented="no" id="H6CDD30E29FCA404A9F870F310CCB7209"><enum>(1)</enum><header>In general</header><text>An eligible entity applying for a grant under this section shall submit to the Secretary a Cybersecurity Plan for review in accordance with subsection (i).</text></paragraph><paragraph commented="no" id="id448E9DC0D79046909411C96E5077550E"><enum>(2)</enum><header>Required elements</header><text>A Cybersecurity Plan of an eligible entity shall—</text><subparagraph commented="no" id="H16FAC8C3B52546409A91454E6E95EBD3"><enum>(A)</enum><text>incorporate, to the extent practicable—</text><clause commented="no" id="idFA2F5BC0430F4AE38AA33D9DBF9F86B8"><enum>(i)</enum><text>any existing plans of the eligible entity to protect against cybersecurity risks and cybersecurity threats to information systems owned or operated by, or on behalf of, State, local, or Tribal governments; and</text></clause><clause commented="no" id="id28C4CB9D0D17439AACA61A59407371C2"><enum>(ii)</enum><text>if the eligible entity is a State, consultation and feedback from local governments and associations of local governments within the jurisdiction of the eligible entity;</text></clause></subparagraph><subparagraph commented="no" id="H78005E5F66A54EC79775B414D9B5D063"><enum>(B)</enum><text>describe, to the extent practicable, how the eligible entity will—</text><clause commented="no" id="id2F5EDC3D74C649CF9F0077C767B52082"><enum>(i)</enum><text>manage, monitor, and track information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, and the information technology deployed on those information systems, including legacy information systems and information technology that are no longer supported by the manufacturer of the systems or technology;</text></clause><clause commented="no" id="idDA9A2CA39E2C496BB979D16A044D543D"><enum>(ii)</enum><text>monitor, audit, and, track network traffic and activity transiting or traveling to or from information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity;</text></clause><clause commented="no" id="H61BBFB72459D45B9B6BC59FE0A685409"><enum>(iii)</enum><text>enhance the preparation, response, and resiliency of information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, against cybersecurity risks and cybersecurity threats;</text></clause><clause commented="no" id="HC125A985C8AE4A44A5479964052E51D0"><enum>(iv)</enum><text display-inline="yes-display-inline">implement a process of continuous cybersecurity vulnerability assessments and threat mitigation practices prioritized by degree of risk to address cybersecurity risks and cybersecurity threats on information systems, applications, and user accounts owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity;</text></clause><clause commented="no" id="H0B2C31CE9F88495CB2962D01180B0958"><enum>(v)</enum><text>ensure that the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, adopt and use best practices and methodologies to enhance cybersecurity, such as—</text><subclause commented="no" id="idB163BE4FE78B4AC4A2A2FD444D24649F"><enum>(I)</enum><text>the practices set forth in the cybersecurity framework developed by the National Institute of Standards and Technology;</text></subclause><subclause commented="no" id="idCA3048434036489AB23C73D303F16D7F"><enum>(II)</enum><text>cyber chain supply chain risk management best practices identified by the National Institute of Standards and Technology; and</text></subclause><subclause commented="no" id="id0A7126F4D2784FD9AA4BDA0F8044CDE4"><enum>(III)</enum><text>knowledge bases of adversary tools and tactics;</text></subclause></clause><clause id="HDE98ABF564864556A427889E28F05069"><enum>(vi)</enum><text display-inline="yes-display-inline">promote the delivery of safe, recognizable, and trustworthy online services by the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including through the use of the .gov internet domain;</text></clause><clause id="id95C62D78074942C9885544116410831C"><enum>(vii)</enum><text>ensure continuity of operations of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, in the event of a cybersecurity incident, including by conducting exercises to practice responding to a cybersecurity incident;</text></clause><clause commented="no" id="HBC8C4A47D9AF4EF6ACFFB05E259E4759"><enum>(viii)</enum><text>use the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity developed by the National Institute of Standards and Technology to identify and mitigate any gaps in the cybersecurity workforces of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, enhance recruitment and retention efforts for those workforces, and bolster the knowledge, skills, and abilities of personnel of the eligible entity and, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, to address cybersecurity risks and cybersecurity threats, such as through cybersecurity hygiene training;</text></clause><clause commented="no" id="H500CCADB13E24CA3B816EE64E4358E0B"><enum>(ix)</enum><text>if the eligible entity is a State, ensure continuity of communications and data networks within the jurisdiction of the eligible entity between the eligible entity and local governments within the jurisdiction of the eligible entity in the event of an incident involving those communications or data networks;</text></clause><clause commented="no" id="H7FF65A6CBC6E4E8EBF07E990F86D729F"><enum>(x)</enum><text>assess and mitigate, to the greatest degree possible, cybersecurity risks and cybersecurity threats relating to critical infrastructure and key resources, the degradation of which may impact the performance of information systems within the jurisdiction of the eligible entity;</text></clause><clause commented="no" id="HD424F647CE8D404685F03B5979BB5A13"><enum>(xi)</enum><text>enhance capabilities to share cyber threat indicators and related information between the eligible entity and—</text><subclause commented="no" id="id6C18F68112C8446FB51DFAAF37C6957D"><enum>(I)</enum><text>if the eligible entity is a State, local governments within the jurisdiction of the eligible entity, including by expanding information sharing agreements with the Department; and</text></subclause><subclause commented="no" id="id01C6F446FB71414D9B85A972385ABE88"><enum>(II)</enum><text>the Department;</text></subclause></clause><clause commented="no" id="id720B31D9EA0045E5A36B09EB5FA537A5"><enum>(xii)</enum><text>leverage cybersecurity services offered by the Department;</text></clause><clause commented="no" id="id3E8C0C046C7443019BF755F17D6CC32F"><enum>(xiii)</enum><text>implement an information technology and operational technology modernization cybersecurity review process that ensures alignment between information technology and operational technology cybersecurity objectives;</text></clause><clause commented="no" id="HDB757A5591D54879A381593F70DE16B4"><enum>(xiv)</enum><text>develop and coordinate strategies to address cybersecurity risks and cybersecurity threats in consultation with—</text><subclause commented="no" id="HB4F179A8E99B4810B2E62014C7ED751C"><enum>(I)</enum><text>if the eligible entity is a State, local governments and associations of local governments within the jurisdiction of the eligible entity; and</text></subclause><subclause commented="no" id="H14932F4761834DF8B15B062F42694AB4"><enum>(II)</enum><text>as applicable—</text><item commented="no" id="H164E4D87ED0B4ABEB0C44B8815B9805A"><enum>(aa)</enum><text>eligible entities that neighbor the jurisdiction of the eligible entity or, as appropriate, members of an information sharing and analysis organization; and</text></item><item commented="no" id="HE99A7189D2E04C60977741EA79F15A06"><enum>(bb)</enum><text>countries that neighbor the jurisdiction of the eligible entity;</text></item></subclause></clause><clause commented="no" id="id5ED25F47A7A24BD5AA8F75D2C15375F8"><enum>(xv)</enum><text>ensure adequate access to, and participation in, the services and programs described in this subparagraph by rural areas within the jurisdiction of the eligible entity; and</text></clause><clause commented="no" id="id97E747367FE948CDBE1B7EC641EBD2F3"><enum>(xvi)</enum><text>distribute funds, items, services, capabilities, or activities to local governments under subsection (n)(2)(A), including the fraction of that distribution the eligible entity plans to distribute to rural areas under subsection (n)(2)(B);</text></clause></subparagraph><subparagraph commented="no" id="id234E834C2CA046CFA39B7EB77B6FA911"><enum>(C)</enum><text>assess the capabilities of the eligible entity relating to the actions described in subparagraph (B);</text></subparagraph><subparagraph commented="no" id="idC2D00E3621FE42098A9B13CC5DCD7E11"><enum>(D)</enum><text>describe, as appropriate and to the extent practicable, the individual responsibilities of the eligible entity and local governments within the jurisdiction of the eligible entity in implementing the plan;</text></subparagraph><subparagraph commented="no" id="H745EC1B8FA594BE8B7A19E11AAC86DC9"><enum>(E)</enum><text>outline, to the extent practicable, the necessary resources and a timeline for implementing the plan; and</text></subparagraph><subparagraph commented="no" id="id3C745BC113554BDF81B1BB883ED10676"><enum>(F)</enum><text>describe the metrics the eligible entity will use to measure progress towards—</text><clause commented="no" id="id7C1F1159CED44D87B4E52098CC72E62F"><enum>(i)</enum><text>implementing the plan; and</text></clause><clause commented="no" id="idF5D9DC776C9344069132188DC05E6F61"><enum>(ii)</enum><text>reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.</text></clause></subparagraph></paragraph><paragraph id="HB7DDBE159770434CBA1FBCD3447260E0"><enum>(3)</enum><header>Discretionary elements</header><text display-inline="yes-display-inline">In drafting a Cybersecurity Plan, an eligible entity may—</text><subparagraph id="idad2d4c58e6d5476e930eb8833677c1df"><enum>(A)</enum><text>consult with the Multi-State Information Sharing and Analysis Center; </text></subparagraph><subparagraph id="HDBFE3EC30B444B808A0BEA3489E44EBD"><enum>(B)</enum><text display-inline="yes-display-inline">include a description of cooperative programs developed by groups of local governments within the jurisdiction of the eligible entity to address cybersecurity risks and cybersecurity threats; and</text></subparagraph><subparagraph id="H12A087961BFE4556B16DC92807CF9285"><enum>(C)</enum><text display-inline="yes-display-inline">include a description of programs provided by the eligible entity to support local governments and owners and operators of critical infrastructure to address cybersecurity risks and cybersecurity threats.</text></subparagraph></paragraph></subsection><subsection id="id701A0C0117DF417BBD7719759D5BF561"><enum>(f)</enum><header>Multi-Entity grants</header><paragraph id="id3F7EA0D552A74F8E84DB1547A118749B"><enum>(1)</enum><header>In general</header><text>The Secretary may award grants under this section to a multi-entity group to support multi-entity efforts to address cybersecurity risks and cybersecurity threats to information systems within the jurisdictions of the eligible entities that comprise the multi-entity group.</text></paragraph><paragraph id="idCDF63FE58046449BA12F6FDE0BCAE706"><enum>(2)</enum><header>Satisfaction of other requirements</header><text>In order to be eligible for a multi-entity grant under this subsection, each eligible entity that comprises a multi-entity group shall have—</text><subparagraph id="id47C582CADE6D46FC994F9E6BFC1623A4"><enum>(A)</enum><text>a Cybersecurity Plan that has been reviewed by the Secretary in accordance with subsection (i); and</text></subparagraph><subparagraph id="id262AC00F3F13418A8ACE9B2AA351486A"><enum>(B)</enum><text>a cybersecurity planning committee established in accordance with subsection (g).</text></subparagraph></paragraph><paragraph id="idD77EE00C368D403B949D197A0D8B93DA"><enum>(3)</enum><header>Application</header><subparagraph id="id8EBF59300C454ABEA25AB1EEF228875B"><enum>(A)</enum><header>In general</header><text>A multi-entity group applying for a multi-entity grant under paragraph (1) shall submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require.</text></subparagraph><subparagraph id="idC3D467AAAF2D4634BE95B58551194123"><enum>(B)</enum><header>Multi-entity project plan</header><text>An application for a grant under this section of a multi-entity group under subparagraph (A) shall include a plan describing—</text><clause id="idB627256171C145558042EC6C30710F11"><enum>(i)</enum><text>the division of responsibilities among the eligible entities that comprise the multi-entity group;</text></clause><clause id="idC550BF830C2D478DBEEA36F2023D93C4"><enum>(ii)</enum><text>the distribution of funding from the grant among the eligible entities that comprise the multi-entity group; and</text></clause><clause id="id297D93F992744A479ECDB8ADAB1DA2ED"><enum>(iii)</enum><text>how the eligible entities that comprise the multi-entity group will work together to implement the Cybersecurity Plan of each of those eligible entities.</text></clause></subparagraph></paragraph></subsection><subsection id="id2fe867a6a21a4b89ac9a1917ae023a26"><enum>(g)</enum><header>Planning committees</header><paragraph id="id369bbaca96d04fdca0cf037db3053095"><enum>(1)</enum><header>In general</header><text>An eligible entity that receives a grant under this section shall establish a cybersecurity planning committee to—</text><subparagraph id="id1ebe22b3367840b6afa7ecd5e9a187ac"><enum>(A)</enum><text>assist with the development, implementation, and revision of the Cybersecurity Plan of the eligible entity;</text></subparagraph><subparagraph id="idec1bcf11fa3b44f097dd575c34d9898f"><enum>(B)</enum><text>approve the Cybersecurity Plan of the eligible entity; and</text></subparagraph><subparagraph id="id859590a08c2244af839a530e2d009f7f"><enum>(C)</enum><text>assist with the determination of effective funding priorities for a grant under this section in accordance with subsections (d) and (j).</text></subparagraph></paragraph><paragraph id="id83691994859445dbb71eb52a3e03b6b4"><enum>(2)</enum><header>Composition</header><text>A committee of an eligible entity established under paragraph (1) shall—</text><subparagraph id="ida745e73ee5954c4ea36596450e48e19c"><enum>(A)</enum><text>be comprised of representatives from—</text><clause id="idE5362C60458343F8BF2C3500E069DB6F"><enum>(i)</enum><text>the eligible entity; </text></clause><clause id="idE3244F7E6E7940F7A5E1A641C7F343B7"><enum>(ii)</enum><text>if the eligible entity is a State, counties, cities, and towns within the jurisdiction of the eligible entity; and </text></clause><clause id="id7459DC266BF0496187A59021E4FDD729"><enum>(iii)</enum><text>institutions of public education and health within the jurisdiction of the eligible entity; and</text></clause></subparagraph><subparagraph id="idc5287af38c204b59aa2d61b1430b11d3"><enum>(B)</enum><text>include, as appropriate, representatives of rural, suburban, and high-population jurisdictions.</text></subparagraph></paragraph><paragraph id="id0448adc4a15b4c478f27b375843c8ea7"><enum>(3)</enum><header>Cybersecurity expertise</header><text>Not less than one-half of the representatives of a committee established under paragraph (1) shall have professional experience relating to cybersecurity or information technology.</text></paragraph><paragraph id="idfaf12ae2070c4255b405508528581332"><enum>(4)</enum><header>Rule of construction regarding existing planning committees</header><text>Nothing in this subsection shall be construed to require an eligible entity to establish a cybersecurity planning committee if the eligible entity has established and uses a multijurisdictional planning committee or commission that—</text><subparagraph id="id116f6022d511495e8976617a9cd32238"><enum>(A)</enum><text>meets the requirements of this subsection; or</text></subparagraph><subparagraph id="id34d67b7fa61e425c8dc614f09e9fa823"><enum>(B)</enum><text>may be expanded or leveraged to meet the requirements of this subsection, including through the formation of a cybersecurity planning subcommittee.</text></subparagraph></paragraph><paragraph id="idb4871ec0cef54672a3aa2873c9502f43"><enum>(5)</enum><header>Rule of construction regarding control of information systems of eligible entities</header><text>Nothing in this subsection shall be construed to permit a cybersecurity planning committee of an eligible entity that meets the requirements of this subsection to make decisions relating to information systems owned or operated by, or on behalf of, the eligible entity.</text></paragraph></subsection><subsection id="id2C4DC5866AF84314A697F11FA64060ED"><enum>(h)</enum><header>Special rule for Tribal governments</header><text>With respect to any requirement under subsection (e) or (g), the Secretary, in consultation with the Secretary of the Interior and Tribal governments, may prescribe an alternative substantively similar requirement for Tribal governments if the Secretary finds that the alternative requirement is necessary for the effective delivery and administration of grants to Tribal governments under this section.</text></subsection><subsection commented="no" id="H1763656A4F53461EA91C947035AE20CF"><enum>(i)</enum><header>Review of plans</header><paragraph commented="no" id="H18A6A6024E12420BBEACAAB28AFE10CB"><enum>(1)</enum><header>Review as condition of grant</header><subparagraph commented="no" id="id95DB00E0877940C095D0A343E84F9B6F"><enum>(A)</enum><header>In general</header><text>Subject to paragraph (3), before an eligible entity may receive a grant under this section, the Secretary, acting through the Director, shall—</text><clause commented="no" id="idF77154CC3CE8431BA4BF898719833703"><enum>(i)</enum><text>review the Cybersecurity Plan of the eligible entity, including any revised Cybersecurity Plans of the eligible entity; and</text></clause><clause commented="no" id="id88858D9ACDCD448C91261AC812EBF17D"><enum>(ii)</enum><text>determine that the Cybersecurity Plan reviewed under clause (i) satisfies the requirements under paragraph (2). </text></clause></subparagraph><subparagraph commented="no" id="idA8F8398825D84628AF1D9B8C0B08F396"><enum>(B)</enum><header>Duration of determination</header><text>In the case of a determination under subparagraph (A)(ii) that a Cybersecurity Plan satisfies the requirements under paragraph (2), the determination shall be effective for the 2-year period beginning on the date of the determination.</text></subparagraph><subparagraph commented="no" id="idF6C79F83E4EA4BD2AA3D614D652B9190"><enum>(C)</enum><header>Annual renewal</header><text>Not later than 2 years after the date on which the Secretary determines under subparagraph (A)(ii) that a Cybersecurity Plan satisfies the requirements under paragraph (2), and annually thereafter, the Secretary, acting through the Director, shall—</text><clause commented="no" id="idE4074472A4C8490396C44E735B60A9D3"><enum>(i)</enum><text>determine whether the Cybersecurity Plan and any revisions continue to meet the criteria described in paragraph (2); and</text></clause><clause commented="no" id="idAA9784714EF14668A00EEE2C4E5A6757"><enum>(ii)</enum><text>renew the determination if the Secretary, acting through the Director, makes a positive determination under clause (i).</text></clause></subparagraph></paragraph><paragraph commented="no" id="H13743A8FD86242F79D085B17C247D8C3"><enum>(2)</enum><header>Plan requirements</header><text>In reviewing a Cybersecurity Plan of an eligible entity under this subsection, the Secretary, acting through the Director, shall ensure that the Cybersecurity Plan—</text><subparagraph commented="no" id="HD927D727D98643F5BACD5D27AD234E36"><enum>(A)</enum><text>satisfies the requirements of subsection (e)(2); and</text></subparagraph><subparagraph commented="no" id="idEEEA07F7ED494E9286A577559B36E11E"><enum>(B)</enum><text>has been approved by—</text><clause commented="no" id="idEE9731B44DC74D75BCACEE75BA177D83"><enum>(i)</enum><text>the cybersecurity planning committee of the eligible entity established under subsection (g); and</text></clause><clause commented="no" id="id3BFF23573A7447FCBD7D7DC318FB1C21"><enum>(ii)</enum><text>the Chief Information Officer, the Chief Information Security Officer, or an equivalent official of the eligible entity.</text></clause></subparagraph></paragraph><paragraph commented="no" id="H47F1BEF337D54EC9814FD4EF914A9C6E"><enum>(3)</enum><header>Exception</header><text>Notwithstanding subsection (e) and paragraph (1) of this subsection, the Secretary may award a grant under this section to an eligible entity that does not submit a Cybersecurity Plan to the Secretary for review before September 30, 2023, if the eligible entity certifies to the Secretary that—</text><subparagraph commented="no" id="H3D7AA97D28EE4E4E9E76EB3E71374032"><enum>(A)</enum><text display-inline="yes-display-inline">the activities that will be supported by the grant are—</text><clause commented="no" id="id31A91847A1A5473480C27E4940C2BEA8"><enum>(i)</enum><text display-inline="yes-display-inline">integral to the development of the Cybersecurity Plan of the eligible entity; or</text></clause><clause commented="no" id="idC758A9F4D9FC40AEAE60E8B68EEF1B7D"><enum>(ii)</enum><text>necessary to assist with activities described in subsection (d)(4), as confirmed by the Director; and</text></clause></subparagraph><subparagraph commented="no" id="HDFD92FE83B124B7CB8DDC8ECF890E5DD"><enum>(B)</enum><text>the eligible entity will submit to the Secretary a Cybersecurity Plan for review under this subsection by September 30, 2023.</text></subparagraph></paragraph><paragraph id="idb5dcc3f082ad4cfdba13d998ef86a6fe"><enum>(4)</enum><header>Rule of construction</header><text>Nothing in this subsection shall be construed to provide authority to the Secretary to—</text><subparagraph id="id43E23158B5CD4AA183DA1F6B90168378"><enum>(A)</enum><text>regulate the manner by which an eligible entity or local government improves the cybersecurity of the information systems owned or operated by, or on behalf of, the eligible entity or local government; or</text></subparagraph><subparagraph id="idF94311EDDA77432F9ADA0181F0811388"><enum>(B)</enum><text> condition the receipt of grants under this section on—</text><clause id="id20b6110fa75d4a5ab1b5c42f05f96899"><enum>(i)</enum><text>participation in a particular Federal program; or</text></clause><clause id="id7153333c19f64e5082415c923f21cca7"><enum>(ii)</enum><text>the use of a specific product or technology. </text></clause></subparagraph></paragraph></subsection><subsection commented="no" id="H0600A9EB69064F40B79AE23E899C5528"><enum>(j)</enum><header>Limitations on uses of funds</header><paragraph commented="no" id="H72F4721E75F3445B8B9C70AC4DC7ED0E"><enum>(1)</enum><header>In general</header><text>Any entity that receives funds from a grant under this section may not use the grant—</text><subparagraph commented="no" id="HBA27B75BB8B7483BA66A67025519F939"><enum>(A)</enum><text>to supplant State or local funds;</text></subparagraph><subparagraph commented="no" id="H6988DF276E90474EB9040717FF47FD4B"><enum>(B)</enum><text>for any recipient cost-sharing contribution;</text></subparagraph><subparagraph commented="no" id="H0AFB356D227A4AF88B42A78C07AAD4FE"><enum>(C)</enum><text display-inline="yes-display-inline">to pay a ransom;</text></subparagraph><subparagraph commented="no" id="HD5660F5182C94F46B3EBCA546EF33F8C"><enum>(D)</enum><text>for recreational or social purposes; or</text></subparagraph><subparagraph commented="no" id="H6DE5E3173118402695AD382994B8A331"><enum>(E)</enum><text>for any purpose that does not address cybersecurity risks or cybersecurity threats on information systems owned or operated by, or on behalf of, the eligible entity that receives the grant or a local government within the jurisdiction of the eligible entity.</text></subparagraph></paragraph><paragraph commented="no" id="HE22C5808A660478E89553933275E82BB"><enum>(2)</enum><header>Compliance oversight</header><text>In addition to any other remedy available, the Secretary may take such actions as are necessary to ensure that a recipient of a grant under this section uses the grant for the purposes for which the grant is awarded.</text></paragraph><paragraph commented="no" id="id3C1E07D09E9646EEAFD31964DD51BDD7"><enum>(3)</enum><header>Rule of construction</header><text>Nothing in paragraph (1)(A) shall be construed to prohibit the use of funds from a grant under this section awarded to a State, local, or Tribal government for otherwise permissible uses under this section on the basis that the State, local, or Tribal government has previously used State, local, or Tribal funds to support the same or similar uses. </text></paragraph></subsection><subsection commented="no" id="H562C0AAD7CF5406786E90429B9F985FC"><enum>(k)</enum><header>Opportunity To amend applications</header><text>In considering applications for grants under this section, the Secretary shall provide applicants with a reasonable opportunity to correct any defects in those applications before making final awards, including by allowing applicants to revise a submitted Cybersecurity Plan.</text></subsection><subsection commented="no" id="H0F6E1DF9592843EA814ACB812318B2A8"><enum>(l)</enum><header>Apportionment</header><text>For fiscal year 2022 and each fiscal year thereafter, the Secretary shall apportion amounts appropriated to carry out this section among eligible entities as follows:</text><paragraph commented="no" id="HEF725947149946FEA05585A0AA424C04"><enum>(1)</enum><header>Baseline amount</header><text>The Secretary shall first apportion—</text><subparagraph commented="no" id="idA58868B3395D424DBE871467CB38DE7F"><enum>(A)</enum><text>0.25 percent of such amounts to each of American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, and the United States Virgin Islands;</text></subparagraph><subparagraph commented="no" id="id4D7F16CDE9BC44A0A2BDEA7C704C7534"><enum>(B)</enum><text>1 percent of such amounts to each of the remaining States; and</text></subparagraph><subparagraph commented="no" id="idFA91A25189734C5ABC5064A41BE59908"><enum>(C)</enum><text>3 percent of such amounts to Tribal governments.</text></subparagraph></paragraph><paragraph id="idaadb12e38d6a4b6ead50c03008faeb40"><enum>(2)</enum><header>Remainder</header><text>The Secretary shall apportion the remainder of such amounts to States as follows:</text><subparagraph id="idd24a8d2a0bf84ba9a7d342967a3cc9be"><enum>(A)</enum><text>50 percent of such remainder in the ratio that the population of each State, bears to the population of all States; and</text></subparagraph><subparagraph id="id163b611fbf3b4d48949f18f1e31c4b52"><enum>(B)</enum><text>50 percent of such remainder in the ratio that the population of each State that resides in rural areas, bears to the population of all States that resides in rural areas.</text></subparagraph></paragraph><paragraph commented="no" id="id1EEC95CF818E411F80A103A8A9EE0986"><enum>(3)</enum><header>Apportionment among Tribal governments</header><text>In determining how to apportion amounts to Tribal governments under paragraph (1)(C), the Secretary shall consult with the Secretary of the Interior and Tribal governments.</text></paragraph><paragraph commented="no" id="idA6CC8B3167794C3AB96A467D66BCE14F"><enum>(4)</enum><header>Multi-entity grants</header><text>An amount received from a multi-entity grant awarded under subsection (f)(1) by a State or Tribal government that is a member of the multi-entity group shall qualify as an apportionment for the purpose of this subsection.</text></paragraph></subsection><subsection commented="no" id="H2FAF2B8A36FC44638978882F02BF1EEB"><enum>(m)</enum><header>Federal share</header><paragraph commented="no" id="id62358AADADF94D7A85568F59C3F2FF6F"><enum>(1)</enum><header>In general</header><text>The Federal share of the cost of an activity carried out using funds made available with a grant under this section may not exceed—</text><subparagraph commented="no" id="id55FBB5D96EC847809CE3FE0D6407D33E"><enum>(A)</enum><text>in the case of a grant to an eligible entity—</text><clause commented="no" id="H74C7D5431C27416A9B9BF87FDAD3F129"><enum>(i)</enum><text>for fiscal year 2022, 90 percent;</text></clause><clause commented="no" id="H45C36BE73EC9476786F77425A4F33E92"><enum>(ii)</enum><text>for fiscal year 2023, 80 percent;</text></clause><clause commented="no" id="H1CAE4010E9D14A76ADB7C69126E70173"><enum>(iii)</enum><text>for fiscal year 2024, 70 percent; and</text></clause><clause commented="no" id="H588CFC75612045488F8DA8EBA432D68D"><enum>(iv)</enum><text>for fiscal year 2025, 60 percent; and</text></clause></subparagraph><subparagraph commented="no" id="id695E1961AB59482F8E98097F1C3CA7AF"><enum>(B)</enum><text>in the case of a grant to a multi-entity group—</text><clause commented="no" id="id630B3558F8F44021B8D51552B0D8EC72"><enum>(i)</enum><text>for fiscal year 2022, 100 percent;</text></clause><clause commented="no" id="id6D9F103B19864B1283556982C180A734"><enum>(ii)</enum><text>for fiscal year 2023, 90 percent;</text></clause><clause commented="no" id="id719177FA078542928E5D916FE3BD70D9"><enum>(iii)</enum><text>for fiscal year 2024, 80 percent; and</text></clause><clause commented="no" id="id636E91E934A84FBEA8519EA695E12E74"><enum>(iv)</enum><text>for fiscal year 2025, 70 percent.</text></clause></subparagraph></paragraph><paragraph commented="no" id="idD6CFDEA44F0E40DFB029B8B1ACA3261A"><enum>(2)</enum><header>Waiver</header><subparagraph commented="no" id="id23AD277D13964C648603E6C0B5161B13"><enum>(A)</enum><header>In general</header><text>The Secretary may waive or modify the requirements of paragraph (1) if an eligible entity or multi-entity group demonstrates economic hardship.</text></subparagraph><subparagraph commented="no" id="id14AEA10FED2F448BB4485B0874C1B25B"><enum>(B)</enum><header>Guidelines</header><text>The Secretary shall establish and publish guidelines for determining what constitutes economic hardship for the purposes of this subsection.</text></subparagraph><subparagraph commented="no" id="idE1D27097548C4D18ABB9E77694CAD4F9"><enum>(C)</enum><header>Considerations</header><text>In developing guidelines under subparagraph (B), the Secretary shall consider, with respect to the jurisdiction of an eligible entity—</text><clause commented="no" id="id40FAD541392C4372A078AF0273D758CE"><enum>(i)</enum><text>changes in rates of unemployment in the jurisdiction from previous years;</text></clause><clause commented="no" id="id2346FBB38BD440F0B2104338AF8B8236"><enum>(ii)</enum><text>changes in the percentage of individuals who are eligible to receive benefits under the supplemental nutrition assistance program established under the Food and Nutrition Act of 2008 (<external-xref legal-doc="usc" parsable-cite="usc/7/2011">7 U.S.C. 2011 et seq.</external-xref>) from previous years; and </text></clause><clause commented="no" id="idF43C2AB255BC4EE2A0A11F0A4DC3635C"><enum>(iii)</enum><text>any other factors the Secretary considers appropriate.</text></clause></subparagraph></paragraph><paragraph commented="no" id="id5653612D7B9044C28BF960E38245F14F"><enum>(3)</enum><header>Waiver for Tribal governments</header><text>Notwithstanding paragraph (2), the Secretary, in consultation with the Secretary of the Interior and Tribal governments, may waive or modify the requirements of paragraph (1) for 1 or more Tribal governments if the Secretary determines that the waiver is in the public interest.</text></paragraph></subsection><subsection commented="no" id="HF694915FF3C844F49E8B4402A4190DCF"><enum>(n)</enum><header>Responsibilities of grantees</header><paragraph commented="no" id="H0122882F9C2044A3AA25DC1FABB6960D"><enum>(1)</enum><header>Certification</header><text>Each eligible entity or multi-entity group that receives a grant under this section shall certify to the Secretary that the grant will be used—</text><subparagraph commented="no" id="idDAE06CDB550A4D6A8A21C2B84187A6FC"><enum>(A)</enum><text>for the purpose for which the grant is awarded; and</text></subparagraph><subparagraph commented="no" id="id5F6D945943244F1EA27ED7354DAF7267"><enum>(B)</enum><text>in compliance with subsections (d) and (j).</text></subparagraph></paragraph><paragraph commented="no" id="H105190D548214785B02CEC5C4D2E504F"><enum>(2)</enum><header>Availability of funds to local governments and rural areas</header><subparagraph commented="no" id="idC94617B44E62432BBD2BB1AA4514E352"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Subject to subparagraph (C), not later than 45 days after the date on which an eligible entity or multi-entity group receives a grant under this section, the eligible entity or multi-entity group shall, without imposing unreasonable or unduly burdensome requirements as a condition of receipt, obligate or otherwise make available to local governments within the jurisdiction of the eligible entity or the eligible entities that comprise the multi-entity group, consistent with the Cybersecurity Plan of the eligible entity or the Cybersecurity Plans of the eligible entities that comprise the multi-entity group—</text><clause commented="no" id="H0F0C965A511E48C4BB50881E76D24B7B"><enum>(i)</enum><text>not less than 80 percent of funds available under the grant;</text></clause><clause commented="no" id="HA42CA8D120F049D38A84BAE3BA97F396"><enum>(ii)</enum><text>with the consent of the local governments, items, services, capabilities, or activities having a value of not less than 80 percent of the amount of the grant; or</text></clause><clause commented="no" id="H772967CA24114885AFFB47C1007B243A"><enum>(iii)</enum><text display-inline="yes-display-inline">with the consent of the local governments, grant funds combined with other items, services, capabilities, or activities having the total value of not less than 80 percent of the amount of the grant.</text></clause></subparagraph><subparagraph id="id7a61ffc6f571429c92b77829b5fb69fd"><enum>(B)</enum><header>Availability to rural areas</header><text>In obligating funds, items, services, capabilities, or activities to local governments under subparagraph (A), the eligible entity or eligible entities that comprise the multi-entity group shall ensure that rural areas within the jurisdiction of the eligible entity or the eligible entities that comprise the multi-entity group receive not less than—</text><clause id="id72CDA28238FF4B3AB5DC1AC04F2445BB"><enum>(i)</enum><text>25 percent of the amount of the grant awarded to the eligible entity;</text></clause><clause id="id858A58FEF12C45F8A21CD35DE6BAEA9F"><enum>(ii)</enum><text>items, services, capabilities, or activities having a value of not less than 25 percent of the amount of the grant awarded to the eligible entity; or</text></clause><clause id="idEEA06557124443189A4A3433E078DC77"><enum>(iii)</enum><text>grant funds combined with other items, services, capabilities, or activities having the total value of not less than 25 percent of the grant awarded to the eligible entity.</text></clause></subparagraph><subparagraph commented="no" id="idF35084BC658B4ED2A31FE013504FB7DC"><enum>(C)</enum><header>Exceptions</header><text>This paragraph shall not apply to—</text><clause commented="no" id="id19D90E8CD97840CBB7B3421B8417E132"><enum>(i)</enum><text>any grant awarded under this section that solely supports activities that are integral to the development or revision of the Cybersecurity Plan of the eligible entity; or</text></clause><clause commented="no" id="H05D2BD66CC784A0DB45A81B75A9862E4"><enum>(ii)</enum><text>the District of Columbia, the Commonwealth of Puerto Rico, American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, the United States Virgin Islands, or a Tribal government. </text></clause></subparagraph></paragraph><paragraph commented="no" id="H295B86A018C845E2B5A0D54C7F6E4E72"><enum>(3)</enum><header>Certifications regarding distribution of grant funds to local governments</header><text>An eligible entity or multi-entity group shall certify to the Secretary that the eligible entity or multi-entity group has made the distribution to local governments required under paragraph (2).</text></paragraph><paragraph commented="no" id="HE4E1DF36A5FF42C8B10C888511AD5028"><enum>(4)</enum><header>Extension of period</header><subparagraph commented="no" id="id29B38BBA090B44AB8952E241152E403B"><enum>(A)</enum><header>In general</header><text>An eligible entity or multi-entity group may request in writing that the Secretary extend the period of time specified in paragraph (2) for an additional period of time.</text></subparagraph><subparagraph commented="no" id="id785D94DB514849DDAE1C7BD22729DCCA"><enum>(B)</enum><header>Approval</header><text>The Secretary may approve a request for an extension under subparagraph (A) if the Secretary determines the extension is necessary to ensure that the obligation and expenditure of grant funds align with the purpose of the State and Local Cybersecurity Grant Program.</text></subparagraph></paragraph><paragraph commented="no" id="HC7E1DB4C61BF4B26B2737ED102E5B6BC"><enum>(5)</enum><header>Direct funding</header><text>If an eligible entity does not make a distribution to a local government required under paragraph (2) in a timely fashion, the local government may petition the Secretary to request the Secretary to provide funds directly to the local government.</text></paragraph><paragraph commented="no" id="idA6E298B69C9441EC9F0EC1A6F6670205"><enum>(6)</enum><header>Limitation on construction</header><text>A grant awarded under this section may not be used to acquire land or to construct, remodel, or perform alterations of buildings or other physical facilities.</text></paragraph><paragraph id="id4964771EDBE049AD8F83A9A7E4F06275"><enum>(7)</enum><header>Consultation in allocating funds</header><text>An eligible entity applying for a grant under this section shall agree to consult the Chief Information Officer, the Chief Information Security Officer, or an equivalent official of the eligible entity in allocating funds from a grant awarded under this section.</text></paragraph><paragraph commented="no" id="HDE3672277C0141469A2E40F24B53198D"><enum>(8)</enum><header>Penalties</header><text>In addition to other remedies available to the Secretary, if an eligible entity violates a requirement of this subsection, the Secretary may—</text><subparagraph commented="no" id="idAF9C61FCAB0D460AAE7189650A708158"><enum>(A)</enum><text>terminate or reduce the amount of a grant awarded under this section to the eligible entity; or</text></subparagraph><subparagraph commented="no" id="idB3AAA9CBE60E4E90B747327F60B696A2"><enum>(B)</enum><text>distribute grant funds previously awarded to the eligible entity—</text><clause commented="no" id="id8000F2D5119B43C78507B9D249EF7BEF"><enum>(i)</enum><text>in the case of an eligible entity that is a State, directly to the appropriate local government as a replacement grant in an amount determined by the Secretary; or</text></clause><clause commented="no" id="idD5EBC67A90B247FE84EAFF691B592081"><enum>(ii)</enum><text>in the case of an eligible entity that is a Tribal government, to another Tribal government or Tribal governments as a replacement grant in an amount determined by the Secretary.</text></clause></subparagraph></paragraph></subsection><subsection id="id4d4965aae77a4561af5459bb1573f0f8"><enum>(o)</enum><header>Consultation with state, local, and tribal representatives</header><text>In carrying out this section, the Secretary shall consult with State, local, and Tribal representatives with professional experience relating to cybersecurity, including representatives of associations representing State, local, and Tribal governments, to inform—</text><paragraph id="idb92165ef30f34749bbe417efda606512"><enum>(1)</enum><text>guidance for applicants for grants under this section, including guidance for Cybersecurity Plans;</text></paragraph><paragraph id="id8c386beaa1d04145a284b819a0ad705b"><enum>(2)</enum><text>the study of risk-based formulas required under subsection (q)(4);</text></paragraph><paragraph id="id8a69d3efb6be4d299da85453ff9a845a"><enum>(3)</enum><text>the development of guidelines required under subsection (m)(2)(B); and</text></paragraph><paragraph id="id370a416a95ec493e84b83dde8c2dc249"><enum>(4)</enum><text>any modifications described in subsection (q)(2)(D). </text></paragraph></subsection><subsection id="id836952b1d078469ca43f7a92c21c1e5e"><enum>(p)</enum><header>Notification to Congress</header><text>Not later than 3 business days before the date on which the Department announces the award of a grant to an eligible entity under this section, including an announcement to the eligible entity, the Secretary shall provide to the appropriate committees of Congress notice of the announcement. </text></subsection><subsection commented="no" id="HEB6CC22608B8474DA32D263F014AB9FB"><enum>(q)</enum><header>Reports, study, and review</header><paragraph commented="no" id="HD35E48788EA444BFA655FEE01728AD72"><enum>(1)</enum><header>Annual reports by grant recipients</header><subparagraph commented="no" id="idAE512DBAC30049B088D6309A0FC860AD"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date on which an eligible entity receives a grant under this section for the purpose of implementing the Cybersecurity Plan of the eligible entity, including an eligible entity that comprises a multi-entity group that receives a grant for that purpose, and annually thereafter until 1 year after the date on which funds from the grant are expended or returned, the eligible entity shall submit to the Secretary a report that, using the metrics described in the Cybersecurity Plan of the eligible entity, describes the progress of the eligible entity in—</text><clause commented="no" id="id1EA9F3DE92674C7F9696120AC03CE41E"><enum>(i)</enum><text display-inline="yes-display-inline">implementing the Cybersecurity Plan of the eligible entity; and</text></clause><clause commented="no" id="id3A3C97DD71454EFAB2E83D4B568EAC58"><enum>(ii)</enum><text>reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, the eligible entity or, if the eligible entity is a State, local governments within the jurisdiction of the eligible entity.</text></clause></subparagraph><subparagraph commented="no" id="id4D9EF795C5764DD5BFA88584BC185506"><enum>(B)</enum><header>Absence of plan</header><text display-inline="yes-display-inline">Not later than 1 year after the date on which an eligible entity that does not have a Cybersecurity Plan receives funds under this section, and annually thereafter until 1 year after the date on which funds from the grant are expended or returned, the eligible entity shall submit to the Secretary a report describing how the eligible entity obligated and expended grant funds to—</text><clause commented="no" id="idC21F61D2473F441E987D238814A10092"><enum>(i)</enum><text display-inline="yes-display-inline">develop or revise a Cybersecurity Plan; or</text></clause><clause commented="no" id="id0EBFF170E61F4E24B743E5B0E57F2984"><enum>(ii)</enum><text display-inline="yes-display-inline">assist with the activities described in subsection (d)(4).</text></clause></subparagraph></paragraph><paragraph commented="no" id="H03E924C73D584E159EE33969D4C39A3A"><enum>(2)</enum><header>Annual reports to Congress</header><text display-inline="yes-display-inline">Not less frequently than annually, the Secretary, acting through the Director, shall submit to Congress a report on—</text><subparagraph commented="no" id="id71AE8247CB1947019B7E59A8299087CA"><enum>(A)</enum><text display-inline="yes-display-inline">the use of grants awarded under this section;</text></subparagraph><subparagraph id="idb26eaf906d6e4d63b0fa61f9b4a8f2b9"><enum>(B)</enum><text>the proportion of grants used to support cybersecurity in rural areas; </text></subparagraph><subparagraph commented="no" id="id78D549CC0A9D423399F32C1947E3FDB9"><enum>(C)</enum><text display-inline="yes-display-inline">the effectiveness of the State and Local Cybersecurity Grant Program;</text></subparagraph><subparagraph commented="no" id="id9DCFBA834E1141B4A5AC012A5EE251DE"><enum>(D)</enum><text display-inline="yes-display-inline">any necessary modifications to the State and Local Cybersecurity Grant Program; and</text></subparagraph><subparagraph commented="no" id="id874427EF5B634AFEADDEE821B215874A"><enum>(E)</enum><text display-inline="yes-display-inline">any progress made toward—</text><clause commented="no" id="H16A1C702D35E43DE90CB8AD256778851"><enum>(i)</enum><text>developing, implementing, or revising Cybersecurity Plans; and</text></clause><clause commented="no" id="H04C16EECA71F4FEE80638CDA9216C02B"><enum>(ii)</enum><text>reducing cybersecurity risks to, and identifying, responding to, and recovering from cybersecurity threats to, information systems owned or operated by, or on behalf of, State, local, or Tribal governments as a result of the award of grants under this section.</text></clause></subparagraph></paragraph><paragraph commented="no" id="idBF99E42ECC7B4742AF1F6C6A7D867F48"><enum>(3)</enum><header>Public availability</header><subparagraph commented="no" id="id4F617F0675EB43F6B2224BED44C56A24"><enum>(A)</enum><header>In general</header><text>The Secretary, acting through the Director, shall make each report submitted under paragraph (2) publicly available, including by making each report available on the website of the Agency.</text></subparagraph><subparagraph commented="no" id="id031CC7AADE0A42A79B694BF3CBE2A680"><enum>(B)</enum><header>Redactions</header><text>In making each report publicly available under subparagraph (A), the Director may make redactions that the Director, in consultation with each eligible entity, determines necessary to protect classified or other information exempt from disclosure under section 552 of title 5, United States Code (commonly referred to as the <quote>Freedom of Information Act</quote>).</text></subparagraph></paragraph><paragraph id="id4d0d0689065c4492a4570869daf5ae71"><enum>(4)</enum><header>Study of risk-based formulas</header><subparagraph id="id426e41871148442490384d74e0e65351"><enum>(A)</enum><header>In general</header><text>Not later than September 30, 2024, the Secretary, acting through the Director, shall submit to the appropriate committees of Congress a study and legislative recommendations on the potential use of a risk-based formula for apportioning funds under this section, including—</text><clause id="idb70830583d2746e1aff1670f4a04160b"><enum>(i)</enum><text>potential components that could be included in a risk-based formula, including the potential impact of those components on support for rural areas under this section;</text></clause><clause id="id807e0ecf32134a488ab8720395a9fbb9"><enum>(ii)</enum><text>potential sources of data and information necessary for the implementation of a risk-based formula;</text></clause><clause id="id6c1b5869ec2e4667a8be881bc0a60671"><enum>(iii)</enum><text>any obstacles to implementing a risk-based formula, including obstacles that require a legislative solution;</text></clause><clause id="id2cb0506fcc7a4f37bd4fafa0ba39d430"><enum>(iv)</enum><text>if a risk-based formula were to be implemented for fiscal year 2026, a recommended risk-based formula for the State and Local Cybersecurity Grant Program; and</text></clause><clause id="id116aab80821f41a4bc8c1fae4553a5b2"><enum>(v)</enum><text>any other information that the Secretary, acting through the Director, determines necessary to help Congress understand the progress towards, and obstacles to, implementing a risk-based formula.</text></clause></subparagraph><subparagraph id="id555b55b1130c4b49bc48265bc393a927"><enum>(B)</enum><header>Inapplicability of Paperwork Reduction Act</header><text>The requirements of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code (commonly referred to as the <quote>Paperwork Reduction Act</quote>), shall not apply to any action taken to carry out this paragraph. </text></subparagraph></paragraph><paragraph id="idB7DC50018E0C4771BA1796D53F73B76F"><enum>(5)</enum><header>Tribal cybersecurity needs report</header><text>Not later than 2 years after the date of enactment of this section, the Secretary, acting through the Director, shall submit to Congress a report that—</text><subparagraph id="id37277FFBAFF94C23B1ED18DCA8BE04EC"><enum>(A)</enum><text>describes the cybersecurity needs of Tribal governments, which shall be determined in consultation with the Secretary of the Interior and Tribal governments; and</text></subparagraph><subparagraph id="idB1DDBB9B5E924D79A72646968CF34A3C"><enum>(B)</enum><text>includes any recommendations for addressing the cybersecurity needs of Tribal governments, including any necessary modifications to the State and Local Cybersecurity Grant Program to better serve Tribal governments. </text></subparagraph></paragraph><paragraph id="id739b8ad334904791a1752bbde39b4f2f"><enum>(6)</enum><header>GAO review</header><text>Not later than 3 years after the date of enactment of this section, the Comptroller General of the United States shall conduct a review of the State and Local Cybersecurity Grant Program, including—</text><subparagraph id="ided4dfddf8e0c4b14b12f88399ecbdf64"><enum>(A)</enum><text>the grant selection process of the Secretary; and</text></subparagraph><subparagraph id="id841dfadc6d1d479b8f4ff97bc496d2e6"><enum>(B)</enum><text>a sample of grants awarded under this section.</text></subparagraph></paragraph></subsection><subsection id="idc7e36cf5dfe542038bec6a5330bd16d5"><enum>(r)</enum><header>Authorization of appropriations</header><paragraph id="id2FC995745D7C4913926D7C64E740DA44"><enum>(1)</enum><header>In general</header><text>There are authorized to be appropriated for activities under this section—</text><subparagraph id="id04909df2c72340e58acc3a8166c10d66"><enum>(A)</enum><text>for fiscal year 2022, $200,000,000;</text></subparagraph><subparagraph id="id020bd111fa114d1b92a03fbbd0f16b42"><enum>(B)</enum><text>for fiscal year 2023, $400,000,000;</text></subparagraph><subparagraph id="id6f6f57d17fd241798d6d4a1c4ceab1dc"><enum>(C)</enum><text>for fiscal year 2024, $300,000,000; and</text></subparagraph><subparagraph id="id4048660C16554DF0BB9A505C86C9D63B"><enum>(D)</enum><text>for fiscal year 2025, $100,000,000.</text></subparagraph></paragraph><paragraph id="idD6FED342A8D943F4BBE2B0BA50471CFB"><enum>(2)</enum><header>Transfers authorized</header><subparagraph id="idF8A66A1867754C2F8508774568E43D58"><enum>(A)</enum><header>In general</header><text>During a fiscal year, the Secretary or the head of any component of the Department that administers the State and Local Cybersecurity Grant Program may transfer not more than 5 percent of the amounts appropriated pursuant to paragraph (1) or other amounts appropriated to carry out the State and Local Cybersecurity Grant Program for that fiscal year to an account of the Department for salaries, expenses, and other administrative costs incurred for the management, administration, or evaluation of this section.</text></subparagraph><subparagraph id="idE7CC032E68854538890E5491B96580CC"><enum>(B)</enum><header>Additional appropriations</header><text>Any funds transferred under subparagraph (A) shall be in addition to any funds appropriated to the Department or the components described in subparagraph (A) for salaries, expenses, and other administrative costs.</text></subparagraph></paragraph></subsection><subsection id="id9258b1c07d2a46b7aaf57f1bb9f45782"><enum>(s)</enum><header>Termination</header><paragraph id="idF956E8A6951A4402885ECB62193C535E"><enum>(1)</enum><header>In general</header><text>Subject to paragraph (2), the requirements of this section shall terminate on September 30, 2025.</text></paragraph><paragraph id="idE277DDAFAA1541FB9448BB7604C39E48"><enum>(2)</enum><header>Exception</header><text>The reporting requirements under subsection (q) shall terminate on the date that is 1 year after the date on which the final funds from a grant under this section are expended or returned.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H8826A00C15FE409287F73B36DC4422DC"><enum>(b)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of the Homeland Security Act of 2002 (<external-xref legal-doc="public-law" parsable-cite="pl/107/296">Public Law 107–296</external-xref>; 116 Stat. 2135), is amended by inserting after the item relating to section 2217 the following:</text><quoted-block style="OLC" id="H2421DB84C6F14570B88DC44FF2351A62" display-inline="no-display-inline"><toc regeneration="no-regeneration"><toc-entry level="section">Sec. 2218. State and Local Cybersecurity Grant Program.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></legis-body></bill> 

