<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MIR21E04-KC7-MJ-WH1">
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S2875 IS: Cyber Incident Reporting Act of 2021</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-09-28</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code>
<congress>117th CONGRESS</congress><session>1st Session</session>
<legis-num>S. 2875</legis-num>
<current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber>
<action>
<action-date date="20210928">September 28, 2021</action-date>
<action-desc><sponsor name-id="S380">Mr. Peters</sponsor> (for himself and <cosponsor name-id="S349">Mr. Portman</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc>
</action>
<legis-type>A BILL</legis-type>
<official-title>To amend the Homeland Security Act of 2002 to establish the Cyber Incident Review Office in the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes.</official-title>
</form>
<legis-body id="HB6243A5BB5044498B1C2BD7715135276">
<section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cyber Incident Reporting Act of 2021</short-title></quote>.</text></section> <section id="idCB6982D9061C47A8942AFEBFAC06C9CF"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
<paragraph id="id76828BFD9937419BB6F11532B3225098"><enum>(1)</enum><header>Covered cyber incident; covered entity; cyber incident</header><text>The terms <term>covered cyber incident</term>, <term>covered entity</term>, and <term>cyber incident</term> have the meanings given those terms in section 2230 of the Homeland Security Act of 2002, as added by section 3(b) of this Act.</text></paragraph> <paragraph id="id8141D645A2F94F53A99533EB4BBDC5BE" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Cyber attack; ransom payment; ransomware attack</header><text>The terms <term>cyber attack</term>, <term>ransom payment</term>, and <term>ransomware attack</term> have the meanings given those terms in section 2201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>), as amended by section 3(a) of this Act. </text></paragraph>
<paragraph id="id74D8925405E343E6B08EB2C424512919"><enum>(3)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Cybersecurity and Infrastructure Security Agency.</text></paragraph> <paragraph id="id5900B9C264524F7D863727D024D12ADC" commented="no" display-inline="no-display-inline"><enum>(4)</enum><header>Information system; security vulnerability</header><text>The terms <term>information system</term> and <term>security vulnerability</term> have the meanings given those terms in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>). </text></paragraph></section>
<section id="id6baaf8d3b9674358b555b3c7cd4c9fe2"><enum>3.</enum><header>Cyber incident reporting</header>
<subsection id="id01FFE004F4A44E40896326A58A097ED6"><enum>(a)</enum><header>Definitions</header>
<paragraph id="id86A24B24D4A84A7F8AE6D5749CBAD92E"><enum>(1)</enum><header>In general</header><text>Section 2201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>) is amended—</text> <subparagraph id="id4F4F4482E5C443BEBB602AB6C2543EB4"><enum>(A)</enum><text>by redesignating paragraphs (1), (2), (3), (4), (5), and (6) as paragraphs (2), (4), (5), (7), (10), and (11), respectively;</text></subparagraph>
<subparagraph id="id59D8ACED5B8E4F61A773F36823143F89"><enum>(B)</enum><text>by inserting before paragraph (2), as so redesignated, the following:</text> <quoted-block style="OLC" display-inline="no-display-inline" id="id1CD51F451BD74AA8AA940A3088492432"> <paragraph id="id7aed8ec8df254b69920db54ea123a50f"><enum>(1)</enum><header>Cloud service provider</header><text>The term <term>cloud service provider</term> means an entity offering products or services related to cloud computing, as defined by the National Institutes of Standards and Technology in NIST Special Publication 800–145 and any amendatory or superseding document relating thereto.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph>
<subparagraph id="id352B4DA9DB5A430FAEDC99483D4F24BD"><enum>(C)</enum><text>by inserting after paragraph (2), as so redesignated, the following:</text> <quoted-block style="OLC" display-inline="no-display-inline" id="idA28D1354DF054CAEA36DE7D986B7488A"> <paragraph id="id19bb1a8b24db42d7b5d8f3e8bbf3f270"><enum>(3)</enum><header>Cyber attack</header><text>The term <term>cyber attack</term> means the use of unauthorized or malicious code on an information system, or the use of another digital mechanism such as a denial of service attack, to interrupt or disrupt the operations of an information system or compromise the confidentiality, availability, or integrity of electronic data stored on, processed by, or transiting an information system.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph>
<subparagraph id="id28568B440F944ECCBBDD1835A1629A7E"><enum>(D)</enum><text>by inserting after paragraph (5), as so redesignated, the following:</text> <quoted-block style="OLC" display-inline="no-display-inline" id="id7479B09CD62D4D73922AE82ABF6E4533"> <paragraph id="idb0d9ff50fa3f4eb98482189e10edcb1a"><enum>(6)</enum><header>Managed service provider</header><text>The term <term>managed service provider</term> means an entity that delivers services, such as network, application, infrastructure, or security services, via ongoing and regular support and active administration on the premises of a customer, in the data center of the entity (such as hosting), or in a third-party data center. </text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph>
<subparagraph id="idE0C2A6DFDB8049F99324527D64CD7979"><enum>(E)</enum><text>by inserting after paragraph (7), as so redesignated, the following:</text> <quoted-block style="OLC" display-inline="no-display-inline" id="id64069EC699C7472EBB79A19061BC6A4A"> <paragraph id="id4bdba52ba1114a01b711fe37643a3029"><enum>(8)</enum><header>Ransom payment</header><text>The term <term>ransom payment</term> means the transmission of any money or other property or asset, including virtual currency, or any portion thereof, which has at any time been delivered as ransom in connection with a ran­som­ware attack.</text></paragraph>
<paragraph id="idcefec022ce4b42caa2d2004f68f0c057"><enum>(9)</enum><header>Ransomware attack</header><text>The term <term>ran­som­ware attack</term>—</text> <subparagraph id="id5951140403904299BA7699FEAD52F0E2"><enum>(A)</enum><text>means a cyber attack that includes the threat of use of unauthorized or malicious code on an information system, or the threat of use of another digital mechanism such as a denial of service attack, to interrupt or disrupt the operations of an information system or compromise the confidentiality, availability, or integrity of electronic data stored on, processed by, or transiting an information system to extort a demand for a ransom payment; and</text></subparagraph>
<subparagraph id="id305760eafe1945e3a8d9c26fec0b27c1"><enum>(B)</enum><text>does not include any such event where the demand for payment is made by a Federal Government entity, good-faith security research, or in response to an invitation by the owner or operator of the information system for third parties to identify vulnerabilities in the information system.</text></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph> <subparagraph id="idE79694490983476DB79D5E513ECB5B36"><enum>(F)</enum><text>by adding at the end the following:</text>
<quoted-block style="OLC" display-inline="no-display-inline" id="idEDA5EF1538F746EE995140FD89AFAC26">
<paragraph id="idd5a0d4c457b34e32a4c9c4401b4b6d25"><enum>(13)</enum><header>Supply chain compromise</header><text>The term <term>supply chain compromise</term> means a cyber attack that allows an adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, or manipulate information technology hardware, software, operating systems, peripherals (such as information technology products), or services at any point during the life cycle.</text></paragraph> <paragraph id="id952700ED624F4A11B927A54B744D692A"><enum>(14)</enum><header>Virtual currency</header><text>The term <term>virtual currency</term> means the digital representation of value that functions as a medium of exchange, a unit of account, or a store of value.</text></paragraph>
<paragraph id="id97FCB8EE0B654CCFBA74EC21F9E91EC9"><enum>(15)</enum><header>Virtual currency address</header><text>The term <term>virtual currency address</term> means a unique public cryptographic key identifying the location to which a virtual currency payment can be made.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph> <paragraph id="id3DDC445A16AA43A7A6CF8DB61DB16BBD"><enum>(2)</enum><header>Conforming amendment</header><text>Section 9002(A)(7) of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/652a">6 U.S.C. 652a(a)(7)</external-xref>) is amended to read as follows:</text>
<quoted-block style="OLC" display-inline="no-display-inline" id="id5BEF1F08FA2C4949AB1848A03BD7A7FD">
<paragraph id="idA27C961B4CEC42F9974E74EA6B62F9F2"><enum>(7)</enum><header>Sector Risk Management Agency</header><text>The term <term>Sector Risk Management Agency</term> has the meaning given the term in section 2201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>).</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection> <subsection id="ida5bc6f5884ca410386d07269fa440fb7"><enum>(b)</enum><header>Cyber incident reporting</header><text>Title XXII of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651 et seq.</external-xref>) is amended by adding at the end the following: </text>
<quoted-block style="OLC" display-inline="no-display-inline" id="id61FF3D3D22F6419AA52A356AD52D820D">
<subtitle id="idAC8163744E2544D9AD237569DF8D181F" style="OLC"><enum>C</enum><header>Cyber Incident Reporting</header>
<section id="id1fe43d43f0bd40b181d2ce124da5b75e"><enum>2230.</enum><header>Definitions</header>
<subsection id="idf94a943b5b6445c2bfafdf84278242d6"><enum>(a)</enum><header>In general</header><text>Except as provided in subsection (b), the definitions under section 2201 shall apply to this subtitle.</text></subsection> <subsection id="id5A0469A88E6948F0A8193B992E6EB28C"><enum>(b)</enum><header>Additional definitions</header><text>In this subtitle: </text>
<paragraph id="id9AB6CBAB26CE499EA5B5A86147157FC1"><enum>(1)</enum><header>Council</header><text>The term <term>Council</term> means the Cyber Incident Reporting Council described in section 1752(c)(1)(H) of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/1500">6 U.S.C. 1500(c)(1)(H)</external-xref>). </text></paragraph> <paragraph id="idD7CC5AD60D2E45EA8E4FF8DDDCD3A466"><enum>(2)</enum><header>Covered cyber incident</header><text>The term <term>covered cyber incident</term> means a substantial cyber incident experienced by a covered entity that satisfies the definition and criteria established by the Director in the interim final rule and final rule issued pursuant to section 2232.</text></paragraph>
<paragraph id="id7ACF20F7017D4B94BF41CFD1B74E8CDF"><enum>(3)</enum><header>Covered entity</header><text>The term <term>covered entity</term> means an entity that owns or operates critical infrastructure that satisfies the definition established by the Director in the interim final rule and final rule issued pursuant to section 2232. </text></paragraph> <paragraph id="id8d5bb3092f394f7a8235d1ea16888363"><enum>(4)</enum><header>Cyber incident</header><text>The term <term>cyber incident</term> has the meaning given the term <term>incident</term> in section 2209(a). </text></paragraph>
<paragraph id="id6eb00722b761467c951cbcc8310675e6"><enum>(5)</enum><header>Cyber threat</header><text>The term <term>cyber threat</term>—</text> <subparagraph id="idA7CB3140E347442D9B15CA5575BD20C1"><enum>(A)</enum><text>has the meaning given the term <term>cybersecurity threat</term> in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>); and</text></subparagraph>
<subparagraph id="idE087FB5F220A47E39C4C1665B60E1994"><enum>(B)</enum><text>does not include any activity related to good faith security research, including participation in a bug-bounty program or a vulnerability disclosure program. </text></subparagraph></paragraph> <paragraph id="idf708b9ba27c6470594523cd66c738e27"><enum>(6)</enum><header>Cyber threat indicator; cybersecurity purpose; defensive measure; Federal entity; information system; security control; security vulnerability</header><text>The terms <term>cyber threat indicator</term>, <term>cybersecurity purpose</term>, <term>defensive measure</term>, <term>Federal entity</term>, <term>information system</term>, <term>security control</term>, and <term>security vulnerability</term> have the meanings given those terms in section 102 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph>
<paragraph id="id59db3c0ccdde41c0974c7ccb2d5bb954"><enum>(7)</enum><header>Small business</header><text>The term <term>small business</term>—</text> <subparagraph id="id4a3f0499706e4b81b96429893e2072a9"><enum>(A)</enum><text>means a business with fewer than 50 employees (determined on a full-time equivalent basis); and</text></subparagraph>
<subparagraph id="ide2eeabafd5664105b501e2589d7bb100"><enum>(B)</enum><text>does not include—</text> <clause id="id8CB80102E2024E818B72CEE888D59411"><enum>(i)</enum><text>a business that is a covered entity; or</text></clause>
<clause id="idf8341d849cd141d9994343051690894d"><enum>(ii)</enum><text>a business that holds a government contract, unless that contractor is a party only to—</text> <subclause id="idaa8c5eff4f874434a66a1f38bd2dd2b2"><enum>(I)</enum><text>a service contract to provide housekeeping or custodial services; or</text></subclause>
<subclause id="id866b376ba2e443448b71429f51c5693c"><enum>(II)</enum><text>a contract to provide products or services unrelated to information technology that is below the micro-purchase threshold, as defined in section 2.101 of title 48, Code of Federal Regulations, or any successor regulation.</text></subclause></clause></subparagraph></paragraph></subsection></section> <section id="id5FD7BFC5965C45B194BD0EE014480ADC"><enum>2231.</enum><header>Cyber Incident Review Office</header> <subsection id="id4471215946204d96bc93d3c0b7233844"><enum>(a)</enum><header>Cyber Incident Review Office</header><text>There is established in the Agency a Cyber Incident Review Office (in this section referred to as the <quote>Office</quote>) to receive, aggregate, and analyze reports related to covered cyber incidents submitted by covered entities in furtherance of the activities specified in subsection (c) of this section and sections 2202(e), 2203, and 2209(c) and any other authorized activity of the Director to enhance the situational awareness of cyber threats across critical infrastructure sectors.</text></subsection>
<subsection id="id06f3bb2133db485e8c7962ba101405c2"><enum>(b)</enum><header>Activities</header><text>The Office shall, in furtherance of the activities specified in sections 2202(e), 2203, and 2209(c)—</text> <paragraph id="idd976685f90954ff89a2864ad15f6cc86"><enum>(1)</enum><text>receive, aggregate, analyze, and secure, consistent with the requirements under the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501 et seq.</external-xref>) reports from covered entities related to a covered cyber incident to assess the effectiveness of security controls and identify tactics, techniques, and procedures adversaries use to overcome those controls;</text></paragraph>
<paragraph id="idf03dd04647d74d4dbde4a121edb439ca"><enum>(2)</enum><text>receive, aggregate, analyze, and secure reports related to ransom payments to identify tactics, techniques, and procedures, including identifying and tracking ransom payments utilizing virtual currencies, adversaries use to perpetuate ransomware attacks and facilitate ransom payments;</text></paragraph> <paragraph id="id48b57466a3a7412c83c403ae16403be0"><enum>(3)</enum><text>leverage information gathered about cybersecurity incidents to—</text>
<subparagraph id="id6786457e90104212a952ec924300c59c"><enum>(A)</enum><text>enhance the quality and effectiveness of information sharing and coordination efforts with appropriate entities, including agencies, sector coordinating councils, information sharing and analysis organizations, technology providers, cybersecurity and incident response firms, and security researchers; and</text></subparagraph> <subparagraph id="idfdefdb9d57bd40149a84b8725273e2a1"><enum>(B)</enum><text>provide appropriate entities, including agencies, sector coordinating councils, information sharing and analysis organizations, technology providers, cybersecurity and incident response firms, and security researchers, with timely, actionable, and anonymized reports of cyber attack campaigns and trends, including, to the maximum extent practicable, related contextual information, cyber threat indicators, and defensive measures; </text></subparagraph></paragraph>
<paragraph id="id3bfedadfefbc4a63a87fd3c8f172d27a"><enum>(4)</enum><text>establish mechanisms to receive feedback from stakeholders on how the Agency can most effectively receive covered cyber incident reports, ransom payment reports, and other voluntarily provided information; </text></paragraph> <paragraph id="ide686de2bca4c4b8091901b050e5a6936"><enum>(5)</enum><text>facilitate the timely sharing, on a voluntary basis, between relevant critical infrastructure owners and operators of information relating to covered cyber incidents and ransom payments, particularly with respect to ongoing cyber threats or security vulnerabilities and identify and disseminate ways to prevent or mitigate similar incidents in the future;</text></paragraph>
<paragraph id="id968519e192ea4672a28a4040cc61035c"><enum>(6)</enum><text>for a covered cyber incident, including a ransomware attack, that also satisfies the definition of a substantial cyber incident, or is part of a group of related cyber incidents that together satisfy such definition, conduct a review of the details surrounding the covered cyber incident or group of those incidents and identify and disseminate ways to prevent or mitigate similar incidents in the future;</text></paragraph> <paragraph id="idc3b5ea8d60e8463497770bd36e290800"><enum>(7)</enum><text>with respect to covered cyber incident reports under subsection (c) involving an ongoing cyber threat or security vulnerability, immediately review those reports for cyber threat indicators that can be anonymized and disseminated, with defensive measures, to appropriate stakeholders, in coordination with other divisions within the Agency, as appropriate; </text></paragraph>
<paragraph id="id01882d00550846d6b234ec822d839385"><enum>(8)</enum><text>publish quarterly unclassified, public reports that may be based on the unclassified information contained in the reports required under subsection (c);</text></paragraph> <paragraph id="id2787c51bb3f241a4b9d845808b880cc6"><enum>(9)</enum><text>proactively identify opportunities and perform analyses, consistent with the protections in section 2235, to leverage and utilize data on ransom attacks to support law enforcement operations to identify, track, and seize ransom payments utilizing virtual currencies, to the greatest extent practicable;</text></paragraph>
<paragraph id="id7008537247ba413b990c74a80a3e7177"><enum>(10)</enum><text>proactively identify opportunities, consistent with the protections in section 2235, to leverage and utilize data on cyber incidents in a manner that enables and strengthens cybersecurity research carried out by academic institutions and other private sector organizations, to the greatest extent practicable; </text></paragraph> <paragraph id="id3fe70320b30b42e0bd2e9d3a517f5bf0"><enum>(11)</enum><text>on a not less frequently than annual basis, analyze public disclosures made pursuant to parts 229 and 249 of title 17, Code of Federal Regulations, or any subsequent document submitted to the Securities and Exchange Commission by entities experiencing cyber incidents and compare such disclosures to reports received by the Office; and</text></paragraph>
<paragraph id="idce68a49ae8b1406ea3f11bf927349450"><enum>(12)</enum><text>in accordance with section 2235, not later than 24 hours after receiving a covered cyber incident report or ransom payment report, share the reported information with appropriate Sector Risk Management Agencies and other appropriate agencies as determined by the Director of Office Management and Budget, in consultation with the Director and the National Cyber Director. </text></paragraph></subsection> <subsection id="id9c3232325e04443fa6a5329eadf28dc2"><enum>(c)</enum><header>Periodic reporting</header><text>Not later than 60 days after the effective date of the interim final rule required under section 2232(b)(1), and on the first day of each month thereafter, the Director, in consultation with the Attorney General and the Director of National Intelligence, shall submit to the National Cyber Director, the majority leader of the Senate, the minority leader of the Senate, the Speaker of the House of Representatives, the minority leader of the House of Representatives, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Homeland Security of the House of Representatives a report that characterizes the cyber threat facing Federal agencies and covered entities, including applicable intelligence and law enforcement information, covered cyber incidents, and ran­som­ware attacks, as of the date of the report, which shall—</text>
<paragraph id="id916cc9d28dc24e8a8dcc7289350b0a94"><enum>(1)</enum><text>include the total number of reports submitted under sections 2232 and 2233 during the preceding month, including a breakdown of required and voluntary reports;</text></paragraph> <paragraph id="idf3afec3fb64d44a5b8dc94a0e5fa6b7b"><enum>(2)</enum><text>include any identified trends in covered cyber incidents and ransomware attacks over the course of the preceding month and as compared to previous reports, including any trends related to the information collected in the reports submitted under sections 2232 and 2233, including—</text>
<subparagraph id="idf3cb48e2e420425bbbb1c1c197840d10"><enum>(A)</enum><text>the infrastructure, tactics, and techniques malicious cyber actors commonly use; and</text></subparagraph> <subparagraph id="id78de424dce7c438b9184e5689e2458d7"><enum>(B)</enum><text>intelligence gaps that have, or currently are, impeding the ability to counter covered cyber incidents and ransomware threats;</text></subparagraph></paragraph>
<paragraph id="id0cd361031352416dac8a12e10a5cf051"><enum>(3)</enum><text>include a summary of the known uses of the information in reports submitted under sections 2232 and 2233; and</text></paragraph> <paragraph id="id1fbdb5184c7d46638ac25e0eeb81c1f6"><enum>(4)</enum><text>be unclassified, but may include a classified annex. </text></paragraph></subsection>
<subsection id="id4407c393c22547e7a00e4b7c82482293"><enum>(d)</enum><header>Organization</header><text>The Director may organize the Office within the Agency as the Director deems appropriate, including harmonizing the functions of the Office with other authorized activities. </text></subsection></section> <section id="id11F1158AAC614447A9B2EE9C80D81283"><enum>2232.</enum><header>Required reporting of certain cyber incidents</header> <subsection id="idcc8c06d8491a4123863c778efe33e1ac"><enum>(a)</enum><header>In general</header> <paragraph id="id63DAA8DC178843C087050CCA8F11F671"><enum>(1)</enum><header>Covered cyber incident reports</header><text>A covered entity shall report a covered cyber incident to the Director not later than 72 hours after the covered entity reasonably believes that a covered cyber incident has occurred.</text></paragraph>
<paragraph id="idb4d0e6557eb0428e83159b9020104014"><enum>(2)</enum><header>Ransom payment reports</header><text>An entity, including a covered entity and except for an individual or a small business, that makes a ransom payment as the result of a ransomware attack against the entity shall report the payment to the Director not later than 24 hours after the ransom payment has been made.</text></paragraph> <paragraph id="id789de9dc96904364adfdb47b57ee5190"><enum>(3)</enum><header>Supplemental reports</header><text>A covered entity shall promptly submit to the Director an update or supplement to a previously submitted covered cyber incident report if new or different information becomes available or if the covered entity makes a ransom payment after submitting a covered cyber incident report required under paragraph (1).</text></paragraph>
<paragraph id="id57e1a0b32c6940498f1d0e09e08578bf"><enum>(4)</enum><header>Preservation of information</header><text>Any entity subject to requirements of paragraph (1), (2), or (3) shall preserve data relevant to the covered cyber incident or ransom payment in accordance with procedures established in the interim final rule and final rule issued pursuant to subsection (b).</text></paragraph> <paragraph id="id2685bd2739764fee8f7f619924e9fb5a"><enum>(5)</enum><header>Exceptions</header> <subparagraph id="idbb065854b27741e692062aed70479eb2"><enum>(A)</enum><header>Reporting of covered cyber incident with ransom payment</header><text>If a covered cyber incident includes a ransom payment such that the reporting requirements under paragraphs (1) and (2) apply, the covered entity may submit a single report to satisfy the requirements of both paragraphs in accordance with procedures established in the interim final rule and final rule issued pursuant to subsection (b).</text></subparagraph>
<subparagraph id="ida01b0d9be17c4b5ab14cdc8f004e1c46"><enum>(B)</enum><header>Substantially similar reported information</header><text>The requirements under paragraphs (1), (2), and (3) shall not apply to an entity required by law, regulation, or contract to report substantially similar information to another Federal agency within a substantially similar timeframe.</text></subparagraph></paragraph> <paragraph id="id1130a78559be44c9b3fd2d128fd070dc"><enum>(6)</enum><header>Manner, timing, and form of reports</header><text>Reports made under paragraphs (1), (2), and (3) shall be made in the manner and form, and within the time period in the case of reports made under paragraph (3), prescribed according to the interim final rule and final rule issued pursuant to subsection (b).</text></paragraph>
<paragraph id="id2abe2f41eb664cb3a434af563ab58a8e"><enum>(7)</enum><header>Effective date</header><text>Paragraphs (1) through (4) shall take effect on the dates prescribed in the interim final rule and the final rule issued pursuant to subsection (b), except that the requirements of paragraph (1) through (4) shall not be effective for a period for more than 18 months after the effective date of the interim final rule if the Director has not issued a final rule pursuant to subsection (b)(2). </text></paragraph></subsection> <subsection id="idcc2cba92e0894707924b6f8e1cc79024"><enum>(b)</enum><header>Rulemaking</header> <paragraph id="id687995d0280a468ba772b4ab922590fc"><enum>(1)</enum><header>Interim final rule</header><text>Not later than 270 days after the date of enactment of this section, and after a 60-day consultative period, followed by a 90-day comment period with appropriate stakeholders, the Director, in consultation with Sector Risk Management Agencies and the heads of other Federal agencies, shall publish in the Federal Register an interim final rule to implement subsection (a).</text></paragraph>
<paragraph id="id5ad7036ff9e04907a5ce5c442cc08465"><enum>(2)</enum><header>Final rule</header><text>Not later than 1 year after publication of the interim final rule under paragraph (1), the Director shall publish a final rule to implement subsection (a).</text></paragraph> <paragraph id="id561c1f7623d449118aae6c6b9f007d56"><enum>(3)</enum><header>Subsequent rulemakings</header><text>Any rule to implement subsection (a) issued after publication of the final rule under paragraph (2), including a rule to amend or revise the final rule issued under paragraph (2), shall comply with the requirements under <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/5/5">chapter 5</external-xref> of title 5, United States Code, including the issuance of a notice of proposed rulemaking under section 553 of such title. </text></paragraph></subsection>
<subsection id="id8a6f8c95266c4b4c9c092b13d3669908"><enum>(c)</enum><header>Elements</header><text>The interim final rule and final rule issued pursuant to subsection (b) shall be composed of the following elements:</text> <paragraph id="id7cefe69a7af0497aa03bf92c750f0608"><enum>(1)</enum><text>A clear description of the types of entities that constitute covered entities, based on—</text>
<subparagraph id="id4c329f5a30c44e04bcdd240f5ebecb8e"><enum>(A)</enum><text>the consequences that disruption to or compromise of such an entity could cause to national security, economic security, or public health and safety;</text></subparagraph> <subparagraph id="id854d0e3f1dca4d94b478cadd930849f1"><enum>(B)</enum><text>the likelihood that such an entity may be targeted by a malicious cyber actor, including a foreign country; and</text></subparagraph>
<subparagraph id="idc4a4348beeb6464e9d529994fb4f63e8"><enum>(C)</enum><text>the extent to which damage, disruption, or unauthorized access to such an entity, including the accessing of sensitive cybersecurity vulnerability information or penetration testing tools or techniques, will likely enable the disruption of the reliable operation of critical infrastructure.</text></subparagraph></paragraph> <paragraph id="id21f4f14e36784ff48a48fdc22f4b890b"><enum>(2)</enum><text>A clear description of the types of substantial cyber incidents that constitute covered cyber incidents, which shall—</text>
<subparagraph id="id09ae844f4c00468692dfd1f81975268f"><enum>(A)</enum><text>at a minimum, require the occurrence of—</text> <clause id="id2e33588378ba456ba45e3bea7edacec5"><enum>(i)</enum><text>the unauthorized access to an information system or network with a substantial loss of confidentiality, integrity, or availability of such information system or network, or a serious impact on the safety and resiliency of operational systems and processes;</text></clause>
<clause id="idc6ae98de2aa74011aac99b5e49ac22e5"><enum>(ii)</enum><text>a disruption of business or industrial operations due to a cyber incident; or</text></clause> <clause id="id12cb5b0f720a488a8739a0f7d9c6e877"><enum>(iii)</enum><text>an occurrence described in clause (i) or (ii) due to loss of service facilitated through, or caused by, a compromise of a cloud service provider, managed service provider, or other third-party data hosting provider or by a supply chain compromise;</text></clause></subparagraph>
<subparagraph id="idda16c6659d114f15be4c738fef80e540"><enum>(B)</enum><text>consider—</text> <clause id="idc65f6dc1d70248a8ac0c07eef989c70d"><enum>(i)</enum><text>the sophistication or novelty of the tactics used to perpetrate such an incident, as well as the type, volume, and sensitivity of the data at issue;</text></clause>
<clause id="id5f13211f209042969b86fe5ea3c854fb"><enum>(ii)</enum><text>the number of individuals directly or indirectly affected or potentially affected by such an incident; and</text></clause> <clause id="idb6624ad911ac42adb36a37a88e11075c"><enum>(iii)</enum><text>potential impacts on industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers; and</text></clause></subparagraph>
<subparagraph id="ide51b4fa80c5f411e99ff76f1c73e846f"><enum>(C)</enum><text>exclude—</text> <clause id="idb95f1c8cf28942d8843e2c6cc4b246f4"><enum>(i)</enum><text>any event where the cyber incident is perpetuated by a United States Government entity, good-faith security research, or in response to an invitation by the owner or operator of the information system for third parties to find vul­ner­a­bil­i­ties in the information system, such as through a vulnerability disclosure program or the use of authorized penetration testing services; and</text></clause>
<clause id="id57b79c0292384f12bd20b8e37ca4b4b6"><enum>(ii)</enum><text>the threat of disruption as extortion, as described in section 2201(8)(B).</text></clause></subparagraph></paragraph> <paragraph id="id6CC66CB999614150A152F71B22A2CBC0"><enum>(3)</enum><text>A requirement that, if a covered cyber incident or a ransom payment occurs following an exempted threat described in paragraph (2)(C)(ii), the entity shall comply with the requirements in this subtitle in reporting the covered cyber incident or ransom payment. </text></paragraph>
<paragraph id="id00d41ab5c56048c489b20628bdc1bc18"><enum>(4)</enum><text>A clear description of the specific required contents of a report pursuant to subsection (a)(1), which shall include the following information, to the extent applicable and available, with respect to a covered cyber incident:</text> <subparagraph id="id235193b8873046408fa22957a5857c91"><enum>(A)</enum><text>A description of the covered cyber incident, including—</text>
<clause id="id76e7d69b40b648c6846639ff99a2edb2"><enum>(i)</enum><text>identification and a description of the function of the affected information systems, networks, or devices that were, or are reasonably believed to have been, affected by such incident;</text></clause> <clause id="idecedadbe0a1e464b85c8c744e610ad8a"><enum>(ii)</enum><text>a description of the unauthorized access with substantial loss of confidentiality, integrity, or availability of the affected information system or network or disruption of business or industrial operations;</text></clause>
<clause id="id0a86c305f9934f748c9580c806dc11b9"><enum>(iii)</enum><text>the estimated date range of such incident; and</text></clause> <clause id="idf6eb334c4efa4ee98ce5e48934d40f77"><enum>(iv)</enum><text>the impact to the operations of the covered entity.</text></clause></subparagraph>
<subparagraph id="idae15e36fe7704dddbbe0629ea6892f99"><enum>(B)</enum><text>Where applicable, a description of the vulnerabilities, tactics, techniques, and procedures used to perpetuate the covered cyber incident.</text></subparagraph> <subparagraph id="id9799df0245f146a6bf879a24d8e95a77"><enum>(C)</enum><text>Where applicable, any identifying or contact information related to each actor reasonably believed to be responsible for such incident.</text></subparagraph>
<subparagraph id="id319f777f01634c3cb0f1370a71b516e7"><enum>(D)</enum><text>Where applicable, identification of the category or categories of information that was, or is reasonably believed to have been, accessed or acquired by an unauthorized person.</text></subparagraph> <subparagraph id="id9a562af7dc044cb4bfac934770d69d09"><enum>(E)</enum><text>The name and, if applicable, taxpayer identification number or other unique identifier of the entity impacted by the covered cyber incident.</text></subparagraph>
<subparagraph id="id11be9d1cd1e842948459a0cec11a3803"><enum>(F)</enum><text>Contact information, such as telephone number or electronic mail address, that the Office may use to contact the covered entity or an authorized agent of such covered entity, or, where applicable, the service provider of such covered entity acting with the express permission, and at the direction, of the covered entity to assist with compliance with the requirements of this subtitle.</text></subparagraph></paragraph> <paragraph id="ida3ef66b9f63846d2b807558eaf39240b"><enum>(5)</enum><text>A clear description of the specific required contents of a report pursuant to subsection (a)(2), which shall be the following information, to the extent applicable and available, with respect to a ransom payment:</text>
<subparagraph id="id67e953879df04d2ca75a85c491be1aad"><enum>(A)</enum><text>A description of the ransomware attack, including the estimated date range of the attack.</text></subparagraph> <subparagraph id="id8088409ffef44929abefe8bd185edf5a"><enum>(B)</enum><text>Where applicable, a description of the vulnerabilities, tactics, techniques, and procedures used to perpetuate the ransomware attack.</text></subparagraph>
<subparagraph id="id09b662622cf04ad79716ba3d192e400c"><enum>(C)</enum><text>Where applicable, any identifying or contact information related to the actor or actors reasonably believed to be responsible for the ransomware attack.</text></subparagraph> <subparagraph id="id23e9dce192194c5b99bac2146d9873c1"><enum>(D)</enum><text>The name and, if applicable, taxpayer identification number or other unique identifier of the entity that made the ransom payment.</text></subparagraph>
<subparagraph id="id1fadd4e2ff2745efabb3e265fddff2e8"><enum>(E)</enum><text>Contact information, such as telephone number or electronic mail address, that the Office may use to contact the entity that made the ransom payment or an authorized agent of such covered entity, or, where applicable, the service provider of such covered entity acting with the express permission, and at the direction of, that entity to assist with compliance with the requirements of this subtitle.</text></subparagraph> <subparagraph id="id5f2db9e3e1ca4d0882e6619b511a2706"><enum>(F)</enum><text>The date of the ransom payment.</text></subparagraph>
<subparagraph id="id735bf97fafbe488e85a0094507cf7c5a"><enum>(G)</enum><text>The ransom payment demand, including the type of virtual currency or other commodity requested, if applicable.</text></subparagraph> <subparagraph id="idf433a183bb3e48728e6964aef3ee8d99"><enum>(H)</enum><text>The ransom payment instructions, including information regarding where to send the payment, such as the virtual currency address or physical address the funds were requested to be sent to, if applicable.</text></subparagraph>
<subparagraph id="id6a464b0f561b44b2b4fafea27a21524a"><enum>(I)</enum><text>The amount of the ransom payment.</text></subparagraph> <subparagraph id="id83fa1b550b5d42cbb6e5873f22d38ecd"><enum>(J)</enum><text>A summary of the due diligence review required under subsection (e).</text></subparagraph></paragraph>
<paragraph id="id0bfd04af9943406ca21d756488b1c5aa"><enum>(6)</enum><text>A clear description of the types of data required to be preserved pursuant to subsection (a)(4) and the period of time for which the data is required to be preserved.</text></paragraph> <paragraph id="idd2b50566f6224902806b0a0a9b52ae11"><enum>(7)</enum><text>Deadlines for submitting reports to the Director required under subsection (a)(3), which shall—</text>
<subparagraph id="idcfd951ab6e954689bdc0041fec7bca80"><enum>(A)</enum><text>be established by the Director in consultation with the Council;</text></subparagraph> <subparagraph id="id820e9b8aab9f4731b2cdc92736cdf9ad"><enum>(B)</enum><text>consider any existing regulatory reporting requirements similar in scope, purpose, and timing to the reporting requirements to which such a covered entity may also be subject, and make efforts to harmonize the timing and contents of any such reports to the maximum extent practicable; and</text></subparagraph>
<subparagraph id="idab15e016dcd34602befaf01fda321078"><enum>(C)</enum><text>balance the need for situational awareness with the ability of the covered entity to conduct incident response and investigations.</text></subparagraph></paragraph> <paragraph id="idffd93058cba0415180834ef90aac0454"><enum>(8)</enum><text>Procedures for—</text>
<subparagraph id="id73f7f0c5e1084c95995f9a71a1a65640"><enum>(A)</enum><text>entities to submit reports required by paragraphs (1), (2), and (3) of subsection (a), which shall include, at a minimum, a concise, user-friendly web-based form;</text></subparagraph> <subparagraph id="id52a3a56c585b43d6b97501a33471e138"><enum>(B)</enum><text>the Office to carry out the enforcement provisions of section 2233, including with respect to the issuance of subpoenas and other aspects of noncompliance;</text></subparagraph>
<subparagraph id="id5bde88a0209f4a25a1dbc07d8ae77bd9"><enum>(C)</enum><text>implementing the exceptions provided in subparagraphs (A), (B), and (D) of subsection (a)(5); and</text></subparagraph> <subparagraph id="id4e74c4de26574ad690581a44f38542b0"><enum>(D)</enum><text>anonymizing and safeguarding information received and disclosed through covered cyber incident reports and ransom payment reports that is known to be personal information of a specific individual or information that identifies a specific individual that is not directly related to a cybersecurity threat.</text></subparagraph></paragraph></subsection>
<subsection id="idca20959f4ff8426b849e3b585e0cc5ea"><enum>(d)</enum><header>Third-Party report submission and ransom payment</header>
<paragraph id="id480061d9a79446ad8e0c74770acb840f"><enum>(1)</enum><header>Report submission</header><text>An entity, including a covered entity, that is required to submit a covered cyber incident report or a ransom payment report may use a third party, such as an incident response company, insurance provider, service provider, information sharing and analysis organization, or law firm, to submit the required report under subsection (a).</text></paragraph> <paragraph id="idc05bdd4bcddb4dd7ad799dd2cdebff2b"><enum>(2)</enum><header>Ransom payment</header><text>If an entity impacted by a ransomware attack uses a third party to make a ransom payment, the third party shall not be required to submit a ransom payment report for itself under subsection (a)(2).</text></paragraph>
<paragraph id="idfabf7b6a705342a28cbaf2b51121d690"><enum>(3)</enum><header>Duty to report</header><text>Third-party reporting under this subparagraph does not relieve a covered entity or an entity that makes a ransom payment from the duty to comply with the requirements for covered cyber incident report or ransom payment report submission.</text></paragraph> <paragraph id="id3e49e8dfef5842879a9cb126cf893bae"><enum>(4)</enum><header>Responsibility to advise</header><text>Any third party used by an entity that knowingly makes a ransom payment on behalf of an entity impacted by a ransomware attack shall advise the impacted entity of the responsibilities of the impacted entity regarding a due diligence review under subsection (e) and reporting ransom payments under this section.</text></paragraph></subsection>
<subsection id="id66eb1451918d428e972418d9d41c968d"><enum>(e)</enum><header>Due diligence review</header><text>Before the date on which a covered entity, or an entity that would be required to submit a ransom payment report under this section if that entity makes a ransom payment, makes a ransom payment relating to a ransomware attack, the covered entity or entity shall conduct a due diligence review of alternatives to making the ransom payment, including an analysis of whether the covered entity or entity can recover from the ransomware attack through other means.</text></subsection> <subsection id="id460d614ceb914fb78ce36ff5a41e6e87"><enum>(f)</enum><header>Outreach to covered entities</header> <paragraph id="id5147c9e40f1a47c986df45a190a3b49a"><enum>(1)</enum><header>In general</header><text>The Director shall conduct an outreach and education campaign to inform likely covered entities, entities that offer or advertise as a service to customers to make or facilitate ransom payments on behalf of entities impacted by ran­som­ware attacks, potential ransomware attack victims, and other appropriate entities of the requirements of paragraphs (1), (2), and (3) of subsection (a).</text></paragraph>
<paragraph id="idf3c48f1ed54048fc85b05fc43cb0751f"><enum>(2)</enum><header>Elements</header><text>The outreach and education campaign under paragraph (1) shall include the following:</text> <subparagraph id="id21f668d2702341dbb12e7523a8ae2ab4"><enum>(A)</enum><text>An overview of the interim final rule and final rule issued pursuant to subsection (b).</text></subparagraph>
<subparagraph id="id6e4582baba0f438f9c5b07977c3a993e"><enum>(B)</enum><text>An overview of mechanisms to submit to the Office covered cyber incident reports and information relating to the disclosure, retention, and use of incident reports under this section.</text></subparagraph> <subparagraph id="id88e4a432255d4f20badf2c23618dd423"><enum>(C)</enum><text>An overview of the protections afforded to covered entities for complying with the requirements under paragraphs (1), (2), and (3) of subsection (a).</text></subparagraph>
<subparagraph id="idfb52a5f656eb41f1a376fe8945a390ed"><enum>(D)</enum><text>An overview of the steps taken under section 2234 when a covered entity is not in compliance with the reporting requirements under subsection (a).</text></subparagraph> <subparagraph id="idedbc414aeab245eb9aa0b802280db428"><enum>(E)</enum><text>Specific outreach to cybersecurity vendors, incident response providers, cybersecurity insurance entities, and other entities that may support covered entities or ransomware attack victims.</text></subparagraph>
<subparagraph id="id7d02b2854b434aee93885066a5b12e53"><enum>(F)</enum><text>An overview of the privacy and civil liberties requirements in this subtitle.</text></subparagraph></paragraph> <paragraph id="id10913a063d6c4160b56d56ab11b4d338"><enum>(3)</enum><header>Coordination</header><text>In conducting the outreach and education campaign required under paragraph (1), the Director may coordinate with—</text>
<subparagraph id="idbed3731553754272a0584f096a726356"><enum>(A)</enum><text>the Critical Infrastructure Partnership Advisory Council established under section 871;</text></subparagraph> <subparagraph id="id1f7bf21b2da3461794a650dfa113828e"><enum>(B)</enum><text>information sharing and analysis organizations;</text></subparagraph>
<subparagraph id="id292d1490e4924b4e927a8efe08e91f35"><enum>(C)</enum><text>trade associations;</text></subparagraph> <subparagraph id="id20cb8bf43f5b43408cc0e7c28046d1a5"><enum>(D)</enum><text>information sharing and analysis centers;</text></subparagraph>
<subparagraph id="id560d531cb9404ae2bbfe1399734a3a70"><enum>(E)</enum><text>sector coordinating councils; and</text></subparagraph> <subparagraph id="idc025a951ae6c4358be2b60416c2c2dcb"><enum>(F)</enum><text>any other entity as determined appropriate by the Director.</text></subparagraph></paragraph></subsection>
<subsection id="id0e82ffe7adea42f4b0c751bfde88fe05"><enum>(g)</enum><header>Evaluation of standards</header>
<paragraph id="id3d9a160c00b54ba7b695d879c4578c99"><enum>(1)</enum><header>In general</header><text>Before issuing the final rule pursuant to subsection (b)(2), the Director shall review the data collected by the Office, and in consultation with other appropriate entities, assess the effectiveness of the rule with respect to—</text> <subparagraph id="id405b976ecb834be3a83f45dffba33157"><enum>(A)</enum><text>the number of reports received;</text></subparagraph>
<subparagraph id="id408944c2be8147ed9f4bad46c53bbc86"><enum>(B)</enum><text>the utility of the reports received;</text></subparagraph> <subparagraph id="id2c114024e1c94bb2b8f8c0ef096c63d0"><enum>(C)</enum><text>the number of supplemental reports required to be submitted; and</text></subparagraph>
<subparagraph id="id997d6aabbe3e4b619470427e3537315b"><enum>(D)</enum><text>any other factor determined appropriate by the Director.</text></subparagraph></paragraph> <paragraph id="id457df879c09a427ba810b20392a986a4"><enum>(2)</enum><header>Submission to Congress</header><text>The Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives the results of the evaluation described in paragraph (1) and may thereafter, in accordance with the requirements under subsection (b), publish in the Federal Register a final rule implementing this section.</text></paragraph></subsection>
<subsection id="id06be1d7ae2ab4a0e81631d1c5dfb4e32"><enum>(h)</enum><header>Organization of reports</header><text>Notwithstanding <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code (commonly known as the <quote>Paperwork Reduction Act</quote>), the Director may reorganize and reformat the means by which covered cyber incident reports, ransom payment reports, and any other voluntarily offered information is submitted to the Office.</text></subsection></section> <section id="id60a7cdc376e2478cb045029d66ba0541"><enum>2233.</enum><header>Voluntary reporting of other cyber incidents</header> <subsection id="idf5af20971a93434bb5218fb18e89dce7"><enum>(a)</enum><header>In general</header><text>Entities may voluntarily report incidents or ransom payments to the Director that are not required under paragraph (1), (2), or (3) of section 2232(a), but may enhance the situational awareness of cyber threats.</text></subsection>
<subsection id="idd164484661684ebdb1fe3daa68e5b5ad"><enum>(b)</enum><header>Voluntary provision of additional information in required reports</header><text>Entities may voluntarily include in reports required under paragraph (1), (2), or (3) of section 2232(a) information that is not required to be included, but may enhance the situational awareness of cyber threats.</text></subsection> <subsection id="idf9ca10dd3d8a471eab7c8ed2c805b39d"><enum>(c)</enum><header>Application of protections</header><text>The protections under section 2235 applicable to covered cyber incident reports shall apply in the same manner and to the same extent to reports and information submitted under subsections (a) and (b).</text></subsection></section>
<section id="id74822accea8b4925bbe4b2b09b9ac290"><enum>2234.</enum><header>Noncompliance with required reporting</header>
<subsection id="id687c132d51594c0a869cf550ceba241e"><enum>(a)</enum><header>Purpose</header><text>In the event that an entity that is required to submit a report under section 2232(a) fails to comply with the requirement to report, the Director may obtain information about the incident or ransom payment by engaging the entity directly to request information about the incident or ransom payment, and if the Director is unable to obtain information through such engagement, by issuing a subpoena to the entity, pursuant to subsection (c), to gather information sufficient to determine whether a covered cyber incident or ransom payment has occurred, and, if so, whether additional action is warranted pursuant to subsection (d).</text></subsection> <subsection id="idc0d887fab8554029b1bb1c4c9b9a459b"><enum>(b)</enum><header>Initial request for information</header> <paragraph id="idfd2295017bd4436087392daa9aa9b29d"><enum>(1)</enum><header>In general</header><text>If the Director has reason to believe, whether through public reporting or other information in the possession of the Federal Government, including through analysis performed pursuant to paragraph (1) or (2) of section 2231(b), that an entity has experienced a covered cyber incident or made a ransom payment but failed to report such incident or payment to the Office within 72 hours in accordance to section 2232(a), the Director shall request additional information from the entity to confirm whether or not a covered cyber incident or ransom payment has occurred.</text></paragraph>
<paragraph id="id6d8242e1f8164281aa94a64634ccec85"><enum>(2)</enum><header>Treatment</header><text>Information provided to the Office in response to a request under paragraph (1) shall be treated as if it was submitted through the reporting procedures established in section 2232.</text></paragraph></subsection> <subsection id="id452091a48dd3456ca2e2671993a09fdd"><enum>(c)</enum><header>Authority To issue subpoenas and debar</header> <paragraph id="id4fd09238f9914586ad393a3caa3cc6a5"><enum>(1)</enum><header>In general</header><text>If, after the date that is 72 hours from the date on which the Director made the request for information in subsection (b), the Director has received no response from the entity from which such information was requested, or received an inadequate response, the Director may issue to such entity a subpoena to compel disclosure of information the Director deems necessary to determine whether a covered cyber incident or ransom payment has occurred.</text></paragraph>
<paragraph id="id361f5cb3f94c4c3e9fbbb123332c90a5"><enum>(2)</enum><header>Civil action</header>
<subparagraph id="id9b0aa91afa68419f83211ef37c234ec7"><enum>(A)</enum><header>In general</header><text>If an entity fails to comply with a subpoena, the Director may refer the matter to the Attorney General to bring a civil action in a district court of the United States to enforce such subpoena.</text></subparagraph> <subparagraph id="id3f035913f68449b39dbb7a9a30c0ae40"><enum>(B)</enum><header>Venue</header><text>An action under this paragraph may be brought in the judicial district in which the entity against which the action is brought resides, is found, or does business.</text></subparagraph>
<subparagraph id="idadcaae76d7e440769bb6f4a214c81b94"><enum>(C)</enum><header>Contempt of court</header><text>A court may punish a failure to comply with a subpoena issued under this subsection as a contempt of court.</text></subparagraph></paragraph> <paragraph id="idc1e6bddb733d4bc7bbfe7096f9c71871"><enum>(3)</enum><header>Non-delegation</header><text>The authority of the Director to issue a subpoena under this subsection may not be delegated.</text></paragraph>
<paragraph id="idB1DF3E7598FE470CA343B8011552EEB6"><enum>(4)</enum><header>Debarment of Federal contractors</header><text>If a covered entity with a Federal Government contract, grant, or cooperative agreement fails to comply with a subpoena issued under this subsection—</text> <subparagraph id="id597FCB3B412448608FA7F574EC933B07"><enum>(A)</enum><text>the Director may refer the matter to the Administrator of General Services; and</text></subparagraph>
<subparagraph id="id51BEC1CBC47E4139AECBD0B274EF3C91"><enum>(B)</enum><text>upon receiving a referral from the Director, the Administrator of General Services may impose additional available penalties, including suspension or debarment.</text></subparagraph></paragraph></subsection> <subsection id="idac0a3f2431694490b3fb67e2fc423043"><enum>(d)</enum><header>Provision of certain information to Attorney General</header> <paragraph id="idb40af8f58ca54a11b04a44eb0c3a89ab"><enum>(1)</enum><header>In general</header><text>Notwithstanding section 2235(a) and subsection (b)(2) of this section, if the Director determines, based on the information provided in response to the subpoena issued pursuant to subsection (c), that the facts relating to the covered cyber incident or ransom payment at issue may constitute grounds for a regulatory enforcement action or criminal prosecution, the Director may provide that information to the Attorney General or the appropriate regulator, who may use that information for a regulatory enforcement action or criminal prosecution.</text></paragraph>
<paragraph id="id8dc4ad12f4754d30bb4d09aa3c1b2feb"><enum>(2)</enum><header>Application to certain entities and third parties</header><text>A covered cyber incident or ransom payment report submitted to the Office by an entity that makes a ransom payment or third party under section 2232 shall not be used by any Federal, State, Tribal, or local government to investigate or take another law enforcement action against the entity that makes a ransom payment or third party.</text></paragraph> <paragraph id="idf2c5dda6eea94c8abf8e027aa32d71a6"><enum>(3)</enum><header>Rule of construction</header><text>Nothing in this subtitle shall be construed to provide an entity that submits a covered cyber incident report or ransom payment report under section 2232 any immunity from law enforcement action for making a ransom payment otherwise prohibited by law.</text></paragraph></subsection>
<subsection id="idc1f06efc5444492d8dc3a1fcc50ae793"><enum>(e)</enum><header>Considerations</header><text>When determining whether to exercise the authorities provided under this section, the Director shall take into consideration—</text> <paragraph id="id68faebd7cb39485ea72386e647a462d3"><enum>(1)</enum><text>the size and complexity of the entity;</text></paragraph>
<paragraph id="iddb2d875c769d4bf0b4da7f77f39ce1d4"><enum>(2)</enum><text>the complexity in determining if a covered cyber incident has occurred;</text></paragraph> <paragraph id="id148324ae942a4e18b0fc52b192e97d9e"><enum>(3)</enum><text>prior interaction with the Agency or awareness of the entity of the policies and procedures of the Agency for reporting covered cyber incidents and ransom payments; and</text></paragraph>
<paragraph id="idddaf4dbce0194aa49fd0db478cc2a74d"><enum>(4)</enum><text>for non-covered entities required to submit a ransom payment report, the ability of the entity to perform a due diligence review pursuant to section 2232(e).</text></paragraph></subsection> <subsection id="ide69021ec72e34bedb79f0278806ab2f5"><enum>(f)</enum><header>Exclusions</header><text>This section shall not apply to a State, local, Tribal, or territorial government entity.</text></subsection>
<subsection id="idb407626ac64c418d82566c20a64d25ab"><enum>(g)</enum><header>Report to Congress</header><text>The Director shall submit to Congress an annual report on the number of times the Director—</text> <paragraph id="idb294aeea735144249ed20b97f8e29815"><enum>(1)</enum><text>issued an initial request for information pursuant to subsection (b);</text></paragraph>
<paragraph id="id0c818bb4d6b244dcb4d80b579f954f9d"><enum>(2)</enum><text>issued a subpoena pursuant to subsection (c);</text></paragraph> <paragraph id="idd322d46357fe48ff999fbd7eda443374"><enum>(3)</enum><text>brought a civil action pursuant to subsection (c)(2); or</text></paragraph>
<paragraph id="id1fbe87e9a45d4118b46fb17f9b932f04"><enum>(4)</enum><text>conducted additional actions pursuant to subsection (d).</text></paragraph></subsection></section> <section id="id47a0574a60944423a5ab86949793a596"><enum>2235.</enum><header>Information shared with or provided to the Federal Government</header> <subsection id="id23f46eb487454d588329e95c55a0c599"><enum>(a)</enum><header>Disclosure, retention, and use</header> <paragraph id="id857f3b53a62a4348878c0a1b761faf84"><enum>(1)</enum><header>Authorized activities</header><text>Information provided to the Office or Agency pursuant to section 2232 may be disclosed to, retained by, and used by, consistent with otherwise applicable provisions of Federal law, any Federal agency or department, component, officer, employee, or agent of the Federal Government solely for—</text>
<subparagraph id="idf48abbce72334a6d8a6c2c14dbdcb7fa"><enum>(A)</enum><text>a cybersecurity purpose;</text></subparagraph> <subparagraph id="idff282c94764044bbbd682314bb951c34"><enum>(B)</enum><text>the purpose of identifying—</text>
<clause id="idb90e95bfada2446689b5e54a3186aa08"><enum>(i)</enum><text>a cyber threat, including the source of the cyber threat; or</text></clause> <clause id="id02e60bdbe29442939b2fcc4947b1c169"><enum>(ii)</enum><text>a security vulnerability;</text></clause></subparagraph>
<subparagraph id="idac77df40d84d49cd8969f8a9a7767444"><enum>(C)</enum><text>the purpose of responding to, or otherwise preventing or mitigating, a specific threat of death, a specific threat of serious bodily harm, or a specific threat of serious economic harm, including a terrorist act or a use of a weapon of mass destruction; </text></subparagraph> <subparagraph id="ideca89139411344bea6eeef04d62638f2"><enum>(D)</enum><text>the purpose of responding to, investigating, prosecuting, or otherwise preventing or mitigating, a serious threat to a minor, including sexual exploitation and threats to physical safety; or</text></subparagraph>
<subparagraph id="id2aefef7290724c7e9779773fdb08ab0e"><enum>(E)</enum><text>the purpose of preventing, investigating, disrupting, or prosecuting an offense arising out of a covered cyber incident or any of the offenses listed in section 105(d)(5)(A)(v) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1504">6 U.S.C. 1504(d)(5)(A)(v)</external-xref>).</text></subparagraph></paragraph> <paragraph id="idac40f0aa59c84111bb4101891fde574e"><enum>(2)</enum><header>Agency actions after receipt</header> <subparagraph id="id80174e36c41248f794f79c5c133b53f5"><enum>(A)</enum><header>Rapid, confidential sharing of cyber threat indicators</header><text>Upon receiving a covered cyber incident or ransom payment report submitted pursuant to this section, the Office shall immediately review the report to determine whether the incident that is the subject of the report is connected to an ongoing cyber threat or security vulnerability and where applicable, use such report to identify, develop, and rapidly disseminate to appropriate stakeholders actionable, anonymized cyber threat indicators and defensive measures.</text></subparagraph>
<subparagraph id="id089dfc2364464a01a570cac3e87f0299"><enum>(B)</enum><header>Standards for sharing security vulnerabilities</header><text>With respect to information in a covered cyber incident or ransom payment report regarding a security vulnerability referred to in paragraph (1)(B)(ii), the Director shall develop principles that govern the timing and manner in which information relating to security vulnerabilities may be shared, consistent with common industry best practices and United States and international standards.</text></subparagraph></paragraph> <paragraph id="id5da526a5eb854f09af188cd2c369efbe"><enum>(3)</enum><header>Privacy and civil liberties</header><text>Information contained in covered cyber incident and ransom payment reports submitted to the Office pursuant to section 2232 shall be retained, used, and disseminated, where permissible and appropriate, by the Federal Government in accordance with processes to be developed for the protection of personal information adopted pursuant to section 105 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1504">6 U.S.C. 1504</external-xref>) and in a manner that protects from unauthorized use or disclosure any information that may contain—</text>
<subparagraph id="iddaceac9278a74eae9b56d82b94ca065e"><enum>(A)</enum><text>personal information of a specific individual; or</text></subparagraph> <subparagraph id="ida6feaed43a774dd597592fa62a3b80a1"><enum>(B)</enum><text>information that identifies a specific individual that is not directly related to a cybersecurity threat.</text></subparagraph></paragraph>
<paragraph id="id7dba8cc81d3e4d738f62179a7783d83f"><enum>(4)</enum><header>Digital security</header><text>The Office shall ensure that reports submitted to the Office pursuant to section 2232, and any information contained in those reports, are collected, stored, and protected at a minimum in accordance with the requirements for moderate impact Federal information systems, as described in Federal Information Processing Standards Publication 199, or any successor document.</text></paragraph> <paragraph id="idea5a67349f7e45d69fdb0a69880494e7"><enum>(5)</enum><header>Prohibition on use of information in regulatory actions</header><text>A Federal, State, local, or Tribal government shall not use information about a covered cyber incident or ransom payment obtained solely through reporting directly to the Office in accordance with this subtitle to regulate, including through an enforcement action, the lawful activities of any non-Federal entity.</text></paragraph></subsection>
<subsection id="id1ba08e4a67074c1c82de57853ea9c2aa"><enum>(b)</enum><header>No waiver of privilege or protection</header><text>The submission of a report under section 2232 to the Office shall not constitute a waiver of any applicable privilege or protection provided by law, including trade secret protection and attorney-client privilege.</text></subsection> <subsection id="id7268ef8b78e147e69e55781ff01d5af1"><enum>(c)</enum><header>Exemption from disclosure</header><text>Information contained in a report submitted to the Office under section 2232 shall be exempt from disclosure under section 552(b)(3)(B) of title 5, United States Code (commonly known as the <quote>Freedom of Information Act</quote>) and any State, Tribal, or local provision of law requiring disclosure of information or records.</text></subsection>
<subsection id="id2be7a9e9b7004282a2283d69cdc1db7f"><enum>(d)</enum><header>Ex parte communications</header><text>The submission of a report to the Agency under section 2232 shall not be subject to a rule of any Federal agency or department or any judicial doctrine regarding ex parte communications with a decision-making official.</text></subsection> <subsection id="id35c75a9a976845f2b39665e924949ce0"><enum>(e)</enum><header>Liability protections</header> <paragraph id="id997B8124AD4A44D19CE5536235B10398"><enum>(1)</enum><header>In general</header><text>No cause of action shall lie or be maintained in any court by any person or entity and any such action shall be promptly dismissed for the submission of a report pursuant to section 2232(a) that is submitted in conformance with this subtitle and the rules promulgated under section 2232(b), except that this subsection shall not apply with regard to an action by the Federal Government pursuant to section 2234(c)(2).</text></paragraph>
<paragraph id="id75078fe6ae83400588382a119ba0bc9c"><enum>(2)</enum><header>Scope</header><text>The liability protections provided in subsection (e) shall only apply to or affect litigation that is solely based on the submission of a covered cyber incident report or ransom payment report to the Office, and nothing in this subtitle shall create a defense to a discovery request, or otherwise limit or affect the discovery of information from a cause of action authorized under any Federal, State, local, or Tribal law. </text></paragraph></subsection> <subsection id="id2800E1CC25214350AAC6166CBCC21113"><enum>(f)</enum><header>Sharing with Federal and non-Federal entities</header><text>The Agency shall anonymize the victim who reported the information when making information provided in reports received under section 2232 available to critical infrastructure owners and operators and the general public.</text></subsection>
<subsection id="id62559c7d399f430fa0807e98d77dbd55"><enum>(g)</enum><header>Proprietary information</header><text>Information contained in a report submitted to the Agency under section 2232 shall be considered the commercial, financial, and proprietary information of the covered entity when so designated by the covered entity.</text></subsection></section></subtitle><after-quoted-block>.</after-quoted-block></quoted-block></subsection> <subsection id="id2E9C5E783F7449B3A7EED57CAEE328AF"><enum>(c)</enum><header>Technical and conforming amendment</header><text>The table of contents in section 1(b) of the Homeland Security Act of 2002 (<external-xref legal-doc="public-law" parsable-cite="pl/107/296">Public Law 107–296</external-xref>; 116 Stat. 2135) is amended by inserting after the items relating to subtitle B of title XXII the following:</text>
<quoted-block style="OLC" display-inline="no-display-inline" id="idEA26F4D944DF43D1AC72C3B4E868C1AD">
<toc>
<toc-entry level="subtitle" bold="off">Subtitle C—Cyber Incident Reporting</toc-entry>
<toc-entry level="section" bold="off">Sec. 2230. Definitions.</toc-entry>
<toc-entry level="section" bold="off">Sec. 2231. Cyber Incident Review Office.</toc-entry>
<toc-entry level="section" bold="off">Sec. 2232. Required reporting of certain cyber incidents.</toc-entry>
<toc-entry level="section" bold="off">Sec. 2233. Voluntary reporting of other cyber incidents.</toc-entry>
<toc-entry level="section" bold="off">Sec. 2234. Noncompliance with required reporting.</toc-entry>
<toc-entry level="section" bold="off">Sec. 2235. Information shared with or provided to the Federal Government.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section>
<section id="ida30ad209332a41728974743c46cd307f"><enum>4.</enum><header>Federal sharing of incident reports</header>
<subsection id="id5485B4271D704B02BB288B970BB1E135"><enum>(a)</enum><header>Cyber incident reporting sharing</header><text>Notwithstanding any other provision of law or regulation, any Federal agency that receives a report from an entity of a cyber attack, including a ransomware attack, shall provide all such information to the Director of the Cybersecurity Infrastructure Security Agency not later than 24 hours after receiving the report, unless a shorter period is required by an agreement made between the Cyber Incident Review Office established under section 2231 of the Homeland Security Act of 2002, as added by section 3(b) of this Act, and another Federal entity.</text></subsection> <subsection id="id868cf83ef7d8486d87da38b7bf8bcee6"><enum>(b)</enum><header>Creation of Council</header><text>Section 1752(c)(1) of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/1500">6 U.S.C. 1500(c)(1)</external-xref>) is amended—</text>
<paragraph id="id0C1F3B769A0E46B5990BCAF156862877"><enum>(1)</enum><text>in subparagraph (G), by striking <quote>and</quote> at the end;</text></paragraph> <paragraph id="id28A40AF4D2394C5291D59B52204BA03A"><enum>(2)</enum><text>by redesignating subparagraph (H) as subparagraph (I); and</text></paragraph>
<paragraph id="id02624F7A4421436285D8CA4E12B6B023"><enum>(3)</enum><text>by inserting after subparagraph (G) the following:</text> <quoted-block style="OLC" display-inline="no-display-inline" id="id506951D6F99943369B2DCF114A158B35"> <subparagraph id="idCBC65CDA36674382BFD33B09427FA6E3" commented="no"><enum>(H)</enum><text>lead an intergovernmental Cyber Incident Reporting Council, in coordination with the Director of the Office of Management and Budget and the Director of the Cybersecurity and Infrastructure Security Agency and in consultation with Sector Risk Management Agencies (as defined in section 2201 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>)) and other appropriate Federal agencies, to coordinate, deconflict, and harmonize Federal incident reporting requirements, including those issued through regulations, for covered entities (as defined in section 2230 of such Act) and entities that make a ransom payment (as defined in such section 2201 (<external-xref legal-doc="usc" parsable-cite="usc/6/651">6 U.S.C. 651</external-xref>)); and</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection>
<subsection id="ida8eccca3618745429ad39cbe5fc32bd1"><enum>(c)</enum><header>Harmonizing reporting requirements</header><text>The National Cyber Director shall, in consultation with the Director, the Cyber Incident Reporting Council described in section 1752(c)(1)(H) of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/1500">6 U.S.C. 1500(c)(1)(H)</external-xref>), and the Director of the Office of Management and Budget, to the maximum extent practicable—</text> <paragraph id="id6427bf0622704126abf301d3661944c6"><enum>(1)</enum><text>review existing regulatory requirements, including the information required in such reports, to report cyber incidents and ensure that any such reporting requirements and procedures avoid conflicting, duplicative, or burdensome requirements; and</text></paragraph>
<paragraph id="idae9df80d3b1e4066924b5dc8155a8074"><enum>(2)</enum><text>coordinate with the Director and regulatory authorities that receive reports relating to cyber incidents to identify opportunities to streamline reporting processes, and where feasible, facilitate interagency agreements between such authorities to permit the sharing of such reports, consistent with applicable law and policy, without impacting the ability of such agencies to gain timely situational awareness of a covered cyber incident or ransom payment.</text></paragraph></subsection></section> <section id="idfcbc389bcba54303aee6f216fb6c682d"><enum>5.</enum><header>Ransomware vulnerability warning pilot program</header> <subsection id="id1a230b46687e4f0f92b005b76efa0ce1"><enum>(a)</enum><header>Program</header><text>Not less than 90 days after the date of enactment of this Act, the Director shall establish a ransomware vulnerability warning program to leverage existing authorities and technology to specifically develop processes and procedures, and to dedicate resources, to identifying information systems that contain security vulnerabilities associated with common ransomware attacks, and to notify the owners of those vulnerable systems of their security vulnerability.</text></subsection>
<subsection id="id85a3ff4a74164e27be23f7a631cbdf18"><enum>(b)</enum><header>Identification of vulnerable systems</header><text>The pilot program established under subsection (a) shall—</text> <paragraph id="id4af696ebe4a249358cf138e1315f6b7a"><enum>(1)</enum><text>identify the most common security vul­ner­a­bil­i­ties utilized in ransomware attacks and mitigation techniques; and</text></paragraph>
<paragraph id="id830beb8ec3e645d48ec8edb80038deaa"><enum>(2)</enum><text>utilize existing authorities to identify Federal and other relevant information systems that contain the security vulnerabilities identified in paragraph (1).</text></paragraph></subsection> <subsection id="id9eec4878d86c44bb82f4d513cfa6b708"><enum>(c)</enum><header>Entity notification</header> <paragraph id="id94f2b276ab6048a0a4c54c13fe4f5bb3"><enum>(1)</enum><header>Identification</header><text>If the Director is able to identify the entity at risk that owns or operates a vulnerable information system identified in subsection (b), the Director may notify the owner of the information system.</text></paragraph>
<paragraph id="id2b66168bdf834e27bdd56fd836a1c24b"><enum>(2)</enum><header>No identification</header><text>If the Director is not able to identify the entity at risk that owns or operates a vulnerable information system identified in subsection (b), the Director may utilize the subpoena authority pursuant to section 2209 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/659">6 U.S.C. 659</external-xref>) to identify and notify the entity at risk pursuant to the procedures within that section.</text></paragraph> <paragraph id="idb38026ad608941e9b4f2c685e469bc08"><enum>(3)</enum><header>Required information</header><text>A notification made under paragraph (1) shall include information on the identified security vulnerability and mitigation techniques.</text></paragraph></subsection>
<subsection id="id6f9bbc22f1d148fe83d2a7b7318983fa"><enum>(d)</enum><header>Prioritization of notifications</header><text>To the extent practical, the Director shall prioritize covered entities for identification and notification activities under the pilot program established under this section.</text></subsection> <subsection id="id7279b8a72a574420b4914a2220a78402"><enum>(e)</enum><header>Limitation on procedures</header><text>No procedure, notification, or other authorities utilized in the execution of the pilot program established under subsection (a) shall require an owner or operator of a vulnerable information system to take any action as a result of a notice of a security vulnerability made pursuant to subsection (c).</text></subsection>
<subsection id="ida5b86ae0cf7b46979cd0c48fc9c42284"><enum>(f)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed to provide additional authorities to the Director to identify vulnerabilities or vulnerable systems.</text></subsection></section> <section id="id593fc92f3bba454583ebb8617382d7bd"><enum>6.</enum><header>Ransomware threat mitigation activities</header> <subsection id="idD7FB2866724B4E818B6E4C9D2CBFA8D7"><enum>(a)</enum><header>Joint ransomware task force</header> <paragraph id="idbfe55b26a86442f98c7859a4079f933d"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this section, the National Cyber Director shall establish and chair the Joint Ransomware Task Force to coordinate an ongoing, nationwide campaign against ransomware attacks, and identify and pursue opportunities for international cooperation.</text></paragraph>
<paragraph id="id5d3e6dddcf304f4fa5622534e86eef13"><enum>(2)</enum><header>Composition</header><text>The Joint Ransomware Task Force shall consist of participants from Federal agencies, as determined appropriate by the National Cyber Director in consultation with the Secretary of Homeland Security.</text></paragraph> <paragraph id="idaab22c8b1cd44cc78295c20e4f765a17"><enum>(3)</enum><header>Responsibilities</header><text>The Joint Ran­som­ware Task Force, utilizing only existing authorities of each participating agency, shall coordinate across the Federal Government the following activities:</text>
<subparagraph id="id208e1741077f46139ae77db70622208d"><enum>(A)</enum><text>Prioritization of intelligence-driven operations to disrupt specific ransomware actors.</text></subparagraph> <subparagraph id="id0ef38e4d8b2e4256997592f495e7f118"><enum>(B)</enum><text>Consult with relevant private sector, State, local, Tribal, and territorial governments and international stakeholders to identify needs and establish mechanisms for providing input into the Task Force.</text></subparagraph>
<subparagraph id="ide84c89a755984a81b0c474d8d873db9c"><enum>(C)</enum><text>Identifying, in consultation with relevant entities, a list of highest threat ran­som­ware entities updated on an ongoing basis, in order to facilitate—</text> <clause id="idc9c1d298383344568bd3d494e1ab06ea"><enum>(i)</enum><text>prioritization for Federal action by appropriate Federal agencies; and</text></clause>
<clause id="id0980a822f2ad40e0a329e9961b4ec9c7"><enum>(ii)</enum><text>identify metrics for success of said actions.</text></clause></subparagraph> <subparagraph id="idd50b00f54f1840dc86f6b397858089db"><enum>(D)</enum><text>Disrupting ransomware criminal actors, associated infrastructure, and their finances.</text></subparagraph>
<subparagraph id="idd06a16d7be46473ca65911c7e257f48c"><enum>(E)</enum><text>Facilitating coordination and collaboration between Federal entities and relevant entities, including the private sector, to improve Federal actions against ransomware threats.</text></subparagraph> <subparagraph id="iddee1370a0e7c46c68fc9a1c7036adf99"><enum>(F)</enum><text>Collection, sharing, and analysis of ransomware trends to inform Federal actions.</text></subparagraph>
<subparagraph id="id95bcdca4ff1542f8a49cafb598481d46"><enum>(G)</enum><text>Creation of after-action reports and other lessons learned from Federal actions that identify successes and failures to improve subsequent actions.</text></subparagraph> <subparagraph id="id8fdc18fb960d43b5ab3a3c22372716b4"><enum>(H)</enum><text>Any other activities determined appropriate by the task force to mitigate the threat of ransomware attacks against Federal and non-Federal entities.</text></subparagraph></paragraph></subsection>
<subsection id="id3adf2664d4884a39b5a3e67b41b8463b"><enum>(b)</enum><header>Clarifying private-Sector lawful defensive measures</header><text>Not later than 180 days after the date of enactment of this Act, the National Cyber Director, in coordination with the Secretary of Homeland Security and the Attorney General, shall submit to the Committee on Homeland Security and Governmental Affairs and the Committee on the Judiciary of the Senate and the Committee on Homeland Security, the Committee on the Judiciary, and the Committee on Oversight and Reform of the House of Representatives a report that describes defensive measures that private-sector actors can take when countering ransomware attacks and what laws need to be clarified to enable that action.</text></subsection> <subsection id="id2ae5285bb1064c1da2f0bd0d45c74db1"><enum>(c)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed as providing any additional authority to any Federal agency.</text></subsection></section>
<section id="id3e7991bb2dff454e9ccf9dec6802a755"><enum>7.</enum><header>Congressional reporting</header>
<subsection id="id223bb3e2011a47b9a684661ef5ca69c8" commented="no"><enum>(a)</enum><header>Report on stakeholder engagement</header><text>Not later than 30 days after the date on which the Director issues the interim final rule under section 2232(b)(1) of the Homeland Security Act of 2002, as added by section 3(b) of this Act, the Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report that describes how the Director engaged stakeholders in the development of the interim final rule.</text></subsection> <subsection id="id8fff7f7650a146cd9c907212feecb6f1" commented="no"><enum>(b)</enum><header>Report on opportunities To strengthen security research</header><text>Not later than 1 year after the date of enactment of this Act, the Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report describing how the Cyber Incident Review Office has carried out activities under section 2231(b)(9) of the Homeland Security Act of 2002, as added by section 3(b) of this Act, by proactively identifying opportunities to use cyber incident data to inform and enabling cybersecurity research within the academic and private sector. </text></subsection>
<subsection id="idf3e25a0819c3480e9b344384110d9dd3" commented="no"><enum>(c)</enum><header>Report on ransomware vulnerability warning pilot program</header><text>Not later than 1 year after the date of enactment of this Act, and annually thereafter for the duration of the pilot program established under section 5, the Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report, which may include a classified annex, on the effectiveness of the pilot program, which shall include a discussion of the following:</text> <paragraph id="ide29c1d2959e64648949956262d7c4566" commented="no"><enum>(1)</enum><text>The effectiveness of the notifications under section 5(c) to mitigate security vulnerabilities and the threat of ransomware.</text></paragraph>
<paragraph id="id639237e8e624438a94bb6bf7d67eefb1" commented="no"><enum>(2)</enum><text>The identification of most common vul­ner­a­bil­i­ties utilized in ransomware.</text></paragraph> <paragraph id="id3a0d560f98f24f20908d617ad022a44c" commented="no"><enum>(3)</enum><text>The number of notifications issued during the preceding year.</text></paragraph>
<paragraph id="ida95b942dca574959a2c4ce840ac49962" commented="no"><enum>(4)</enum><text>To the extent practicable, the number of vulnerable devices or systems mitigated under this pilot by the Agency during the preceding year.</text></paragraph></subsection> <subsection id="id64786d3cb24646e2b9c3d8a46faa4a99" commented="no"><enum>(d)</enum><header>Report on harmonization of reporting regulations</header><text>Not later than 180 days after the date on which the National Cyber Director convenes the Council described in section 1752(c)(1)(H) of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/1500">6 U.S.C. 1500(c)(1)(H)</external-xref>), the National Cyber Director shall submit to the appropriate congressional committees a report that includes—</text>
<paragraph id="id9b7884b2beff4d3fb181ad525b63cae9" commented="no"><enum>(1)</enum><text>a list of duplicative Federal cyber incident reporting requirements on covered entities and entities that make a ransom payment;</text></paragraph> <paragraph id="id9d3d932a0a23411db6baeecd9f059d05" commented="no"><enum>(2)</enum><text>any actions the National Cyber Director intends to take to harmonize the duplicative reporting requirements; and</text></paragraph>
<paragraph id="id0ec9b812f8d44ee197295c9b4c6e8b9c" commented="no"><enum>(3)</enum><text>any proposed legislative changes necessary to address the duplicative reporting.</text></paragraph></subsection> <subsection id="idca1e1333f3db4eef9f718ce9dcd96b40"><enum>(e)</enum><header>GAO report</header><text>Not later than 2 years after the date of enactment of this Act, the Comptroller General of the United States shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the implementation of this Act and the amendments made by this Act.</text></subsection></section>
</legis-body>
</bill> 


