<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-ELL22533-H52-HS-X70"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>114 S4985 IS: Cryptocurrency Cybersecurity Information Sharing Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2022-09-28</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>2d Session</session><legis-num>S. 4985</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20220928">September 28, 2022</action-date><action-desc><sponsor name-id="S396">Mrs. Blackburn</sponsor> (for herself and <cosponsor name-id="S410">Ms. Lummis</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSBK00">Committee on Banking, Housing, and Urban Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Cybersecurity Information Sharing Act of 2015 to include voluntary information sharing of cyber threat indicators among cryptocurrency companies, and for other purposes.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cryptocurrency Cybersecurity Information Sharing Act</short-title></quote>.</text></section><section id="id4D0DFF8AACA14183B9E73699A059DDC1" section-type="subsequent-section"><enum>2.</enum><header>Sharing of cyber threat indicators by covered companies</header><subsection id="id677A0E6E6B9344DBBE04B2E099C2DDAC"><enum>(a)</enum><header>In general</header><text>The Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501 et seq.</external-xref>) is amended—</text><paragraph id="id7C382D46B79A404DAA04901801EF0385"><enum>(1)</enum><text>in section 102(15)(A) (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501(15)(A)</external-xref>) by inserting <quote>covered company (as defined in section 110),</quote> after <quote>cooperative,</quote>;</text></paragraph><paragraph id="idB18C68578B2448E9A961C096A2F6F12F"><enum>(2)</enum><text display-inline="yes-display-inline">by redesignating sections 110 and 111 (<external-xref legal-doc="usc" parsable-cite="usc/6/1509">6 U.S.C. 1509</external-xref>, 1510) as sections 111 and 112, respectively; and</text></paragraph><paragraph id="id3DCB4138EAA847A385ED6BEEDA79BBEF"><enum>(3)</enum><text>by inserting after section 109 (<external-xref legal-doc="usc" parsable-cite="usc/6/1508">6 U.S.C. 1508</external-xref>) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id104B873325224F6591C860C4E02DB53F"><section section-type="subsequent-section" id="id9C9FF9E531D34476B56809F9F84A5E45"><enum>110.</enum><header>Sharing of cyber threat indicators by covered companies</header><subsection id="idB4F69E2CBFF446DFB3CBFB210A8F8884"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idf42313c28b3e458fb18cf75d2a244799" commented="no" display-inline="no-display-inline"><enum>(1)</enum><header>Covered company</header><subparagraph commented="no" display-inline="no-display-inline" id="idF93D54824D5B457A94797378D09D1519"><enum>(A)</enum><header>In general</header><text>Subject to subparagraph (B), the term <term>covered company</term> means an entity—</text><clause commented="no" display-inline="no-display-inline" id="idB860B5E5CDC44D538D2002E2AC57C3BD"><enum>(i)</enum><text>that is—</text><subclause commented="no" display-inline="no-display-inline" id="idDBEA59EBED2345DBAC920082F81CA76C"><enum>(I)</enum><text>engaged in the business of validating distributed ledger technology transactions;</text></subclause><subclause display-inline="no-display-inline" commented="no" id="id69D64B2D02BF4281ADE43B50E2000FE7"><enum>(II)</enum><text>engaged in the business of developing digital assets or the corresponding protocols for use of digital assets by other persons;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idAD6C1BDEFE1942DE9E417DAFDE64BA00"><enum>(III)</enum><text>an association of entities that manage digital assets or distributed ledger technologies; or</text></subclause><subclause display-inline="no-display-inline" commented="no" id="id1E765335DDA34BA89826D1B9970FB326"><enum>(IV)</enum><text>a commercial general liability insurance provider or property insurance provider offering products designed to mitigate losses from a variety of cyber incidents, including—</text><item display-inline="no-display-inline" commented="no" id="id9B42B441933645FFA641A219CD2F6BD1"><enum>(aa)</enum><text>data breaches;</text></item><item display-inline="no-display-inline" commented="no" id="id14B7D2489F12472199AF9523CDEC7A8E"><enum>(bb)</enum><text>ransomware attacks;</text></item><item display-inline="no-display-inline" commented="no" id="idF69E343BF381468C82590397657F1A32"><enum>(cc)</enum><text>business interruption; and</text></item><item display-inline="no-display-inline" commented="no" id="id1D8A1783726D4C8EB5FAEFD8B88B485A"><enum>(dd)</enum><text>network damage; and</text></item></subclause></clause><clause commented="no" display-inline="no-display-inline" id="id09D9C65D84A841328294BDD87B692D42"><enum>(ii)</enum><text>that shares or receives information under this section.</text></clause></subparagraph><subparagraph display-inline="no-display-inline" commented="no" id="id7EF5250D06944205BC13096B67E4DBB5"><enum>(B)</enum><header>Money services businesses and financial institutions</header><text>For purposes of paragraphs (1), (2), and (3) of subsection (b), the term <term>covered company</term> includes an entity that is a money services business, or that otherwise is a financial institution, as defined in section 5312 of title 31, United States Code, for purposes of digital asset activity engaged in by the entity. </text></subparagraph></paragraph><paragraph id="id894ce59c2b7f4ed1aac534511ecd63fc" commented="no" display-inline="no-display-inline"><enum>(2)</enum><header>Digital asset</header><text>The term <term>digital asset</term> means a natively electronic asset that—</text><subparagraph commented="no" display-inline="no-display-inline" id="idFFC767162BB24E5FAE09808182BB4EFF"><enum>(A)</enum><text>confers economic, proprietary, or access rights or powers; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idC5085BD983644C8AB4C64F7371CFA800"><enum>(B)</enum><text>is recorded using cryptographically secured distributed ledger technology, or any similar analogue.</text></subparagraph></paragraph><paragraph id="ida36f11bf64934df3b0e5970b60a5f545"><enum>(3)</enum><header>Distributed ledger technology</header><text>The term <term>distributed ledger technology</term> means technology that enables the operation and use of a ledger that—</text><subparagraph id="id7E6258CFF38A4CFDADCD29287E886C21"><enum>(A)</enum><text>is shared across a set of distributed nodes that participate in a network and store a complete or partial replica of the ledger;</text></subparagraph><subparagraph id="id94D383001C784A6DB7D2B5D4B5AB0766"><enum>(B)</enum><text>is synchronized between the nodes;</text></subparagraph><subparagraph id="id268A202B60224EF7896EEA59D3991AD5"><enum>(C)</enum><text>has data appended to the ledger by following the specified consensus mechanism of the ledger;</text></subparagraph><subparagraph id="id7EA52133A27B4D0E9C6C4E9D653CDBA4"><enum>(D)</enum><text>may be accessible to anyone or restricted to a subset of participants; and</text></subparagraph><subparagraph id="idB5F43A5BB5584BD98B79EDC79DB5F691"><enum>(E)</enum><text>may require participants to have authorization to perform certain actions or require no authorization. </text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id6A004BC6B63F48C9B7ADD1C5DB10C91B"><enum>(b)</enum><header>Voluntary information sharing among covered companies</header><paragraph id="id6606fe75e0f4403f92f3ccc77f797ab3"><enum>(1)</enum><header>In general</header><text>Subject to paragraphs (2), (3), and (4), a covered company may, under the protection of the safe harbor from liability described in subsection (d), transmit, receive, or otherwise share information with any other covered company regarding individuals, entities, organizations, and countries for purposes of identifying and, as appropriate, reporting activities that the covered company suspects may involve possible cyber threat indicators.</text></paragraph><paragraph id="id1228d9be45a5489ab47aab06e761f0e6"><enum>(2)</enum><header>Information sharing between covered companies</header><subparagraph id="idB3A244C032EA45E7BF7E758F967ED7DD"><enum>(A)</enum><header>Notice requirement</header><clause id="id33E6BB3A0EA444A4A80C7AF65A4C90A0"><enum>(i)</enum><header>In general</header><text>A covered company that intends to share information as described in paragraph (1) shall submit a notice of intent to the Financial Crimes Enforcement Network and the Cybersecurity and Infrastructure Security Agency, which shall contain, at a minimum, a list of each other company the covered company intends to share information with.</text></clause><clause id="idD9F582E69BB54AB6B00D2C05C22DAD21"><enum>(ii)</enum><header>Effective period</header><text>Each notice provided under clause (i) shall be effective for the 1-year period beginning on the date of the notice.</text></clause><clause id="id05EF3165CE6643A8B59635A73FB21AC6"><enum>(iii)</enum><header>Additional notices</header><text>Upon expiration of the 1-year period described in subclause (ii), a covered company shall submit an additional notice of intent at the beginning of each year during which the covered company intends to share information as described in paragraph (1).</text></clause><clause id="id322296E0604E4698AC9D7AB0E6A54710"><enum>(iv)</enum><header>List of covered companies that have submitted notice</header><text>The Financial Crimes Enforcement Network shall periodically make available a list of covered companies that have submitted a notice under this subparagraph.</text></clause></subparagraph><subparagraph id="id7D622AED27724AAEA6E94CE747DA7121"><enum>(B)</enum><header>Verification requirement</header><text>Prior to sharing information as described in paragraph (1), a covered company shall take reasonable steps to verify that the company with which the covered company intends to share information is listed in a notice required under subparagraph (A).</text></subparagraph></paragraph><paragraph id="idcd56d50c9e0745c0beaf9b1260bb9252"><enum>(3)</enum><header>Protection and use of information by covered companies</header><subparagraph id="idD7157C808BC9441EA218A6FDD2205098"><enum>(A)</enum><header>Purpose</header><text>Information received by a covered company under this section may not be used for any purpose other than—</text><clause id="id5cd5a1cc1d3e487caa1fbdfb28a02c07"><enum>(i)</enum><text>identifying and, as appropriate, reporting on cyber threat indicators; or</text></clause><clause id="id8bd29bac3e7a48ef83d34824f31b6955"><enum>(ii)</enum><text>assisting the covered company in complying with any requirement of this title.</text></clause></subparagraph><subparagraph id="id048343D08CEC4E4C8753D93278BF325B"><enum>(B)</enum><header>Procedures for protection of information</header><text>Each covered company that engages in the sharing of information under this section shall maintain adequate procedures to protect the security and confidentiality of the information in accordance with the policies and guidelines established under subsection (c).</text></subparagraph></paragraph><paragraph id="id1A53B257AAAA498D85AF7CE176C79D27"><enum>(4)</enum><header>Reporting requirements for covered companies</header><subparagraph id="id714b308e6e2d4017bd7694f57e4b57fd"><enum>(A)</enum><header>Cybersecurity threat information</header><text>A covered company that identifies cybersecurity threat information requiring immediate attention, such as suspected terrorist activity, shall, as soon as practicable but not later than 36 hours after identifying the information—</text><clause id="idff9ffc03758042bc8c3b2df53176e5c2"><enum>(i)</enum><text>notify an appropriate law enforcement authority and the Cybersecurity and Infrastructure Security Agency Incident Reporting System; and</text></clause><clause id="id40a24e99980e474eac786505361ab82b"><enum>(ii)</enum><text>comply with any other Federal requirements for reporting suspicious activity.</text></clause></subparagraph><subparagraph id="id041318a8b09a4f19bc8b7d2c8b9ca7e7"><enum>(B)</enum><header>Suspicious activity</header><clause id="id49e5e8df164b4518ac20db592925bfd7"><enum>(i)</enum><header>Voluntary reporting to federal agencies</header><text>A covered company may voluntarily report suspicious activity to the Financial Crimes Enforcement Network and the Cybersecurity and Infrastructure Security Agency under this section.</text></clause><clause id="id911817c75bfd4a009e19d685f73f9ecb"><enum>(ii)</enum><header>Rule of construction</header><text>Nothing in this subparagraph shall be construed to—</text><subclause id="idd50ba0b41a1a4d2b87f1250335c950d7"><enum>(I)</enum><text>modify the requirements for reporting suspicious activity if a covered company is subject to such regulations; or</text></subclause><subclause id="id8c5814cd119c4f57b62e1c15b090cff4"><enum>(II)</enum><text>create new suspicious activity reporting requirements for a covered company that is not currently subject to such a regulation.</text></subclause></clause></subparagraph><subparagraph id="id87943BAFF4364AB2A187D182C3170D7A" commented="no"><enum>(C)</enum><header>Exemption from disclosure</header><text>Information shared under this paragraph shall be exempt from disclosure under any provision of State, Tribal, or local freedom of information law, open government law, open meetings law, open records law, sunshine law, or similar law requiring disclosure of information or records, in accordance with section 104(d)(4)(B).</text></subparagraph></paragraph></subsection><subsection id="id5B70D990F9974B8EADA212D463FA36B2"><enum>(c)</enum><header>Information sharing between covered companies and the Federal Government</header><paragraph id="id535E0C8AC3044F77B9D9F8CD41DFAAD4"><enum>(1)</enum><header>Policies and procedures</header><subparagraph id="idF63ABC0F989E4589A28CA4B6D7C31577"><enum>(A)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of the Cryptocurrency Cybersecurity Information Sharing Act, the Director of the Financial Crimes Enforcement Network and the Director of the Cybersecurity and Infrastructure Security Agency shall, in consultation with the National Cyber Director and the heads of the appropriate Federal entities, jointly develop and make publicly available policies and procedures relating to the receipt by the Federal Government of cyber threat indicators shared by covered companies. </text></subparagraph><subparagraph id="id7381360039EB43B7B66D626A15B89102"><enum>(B)</enum><header>Considerations</header><text>In developing the policies and procedures required under subparagraph (A), the Director of the Financial Crimes Enforcement Network and the Director of the Cybersecurity and Infrastructure Security Agency shall take into account the requirements described in subsections (a)(3) and (b)(3) of section 105.</text></subparagraph><subparagraph id="id5D92F09616294ECEBF32E7BEF017199D"><enum>(C)</enum><header>Compliance with similar procedures</header><text>In the case of a covered company that is required to comply with section 501 of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6801">15 U.S.C. 6801</external-xref>) and the Payment Card Industry Data Security Standard, and applicable regulations issued thereunder, the covered company shall be considered to be acting in compliance with the requirements developed under this subsection if the covered company applies the procedures required under such section 501 to information shared under this section.</text></subparagraph></paragraph><paragraph id="id3FA08CA6CEB4434F8D676FBBBB20D492"><enum>(2)</enum><header>Guidelines</header><subparagraph id="id56562879D507463292039EBF4271ACCA"><enum>(A)</enum><header>In general</header><text>Not later than 60 days after the date of enactment of the Cryptocurrency Cybersecurity Information Sharing Act, the Director of the Financial Crimes Enforcement Network and the Director of the Cybersecurity and Infrastructure Security Agency shall jointly develop and make publicly available guidance— </text><clause id="idBA9B1666A175496583414DD6F3758EB8"><enum>(i)</enum><text>to assist covered companies and promote sharing of cyber threat indicators with Federal entities under this section; and</text></clause><clause id="id961433574697411BB87D9F2E4891CDC2"><enum>(ii)</enum><text>relating to adequate procedures to protect the security and confidentiality of information shared under this section, as required under subsection (b)(3)(B).</text></clause></subparagraph><subparagraph id="ide46da4ec14fa47929bf778cbe059718f"><enum>(B)</enum><header>Contents</header><text>The guidelines required under subparagraph (A) shall include guidance relating to the following:</text><clause id="id211DD79608B643B2A774B76A293FAEB6"><enum>(i)</enum><text>Identification of types of information that would qualify as a cyber threat indicator under this title and that would be unlikely to include information that—</text><subclause id="id0fafa40bf25d47dc9c4a02670518778b"><enum>(I)</enum><text>is not directly related to a cybersecurity threat; and </text></subclause><subclause id="id48E7AB3E6AC240B1A3E4F6DC5B47E288"><enum>(II)</enum><text>is personal information of a specific individual or information that identifies a specific individual.</text></subclause></clause><clause id="idb340316bfbb541ebb9f4190b73d9eb3c"><enum>(ii)</enum><text>Identification of types of information protected under otherwise applicable privacy laws that are unlikely to be directly related to a cybersecurity threat.</text></clause><clause id="id46fe75604e944b7ba1a54de5ac512895"><enum>(iii)</enum><text>Such other matters as the Director of the Financial Crimes Enforcement Network and the Director of the Cybersecurity and Infrastructure Security Agency consider appropriate for entities sharing cyber threat indicators with Federal entities under this title.</text></clause></subparagraph></paragraph><paragraph commented="no" id="id418221E726B943C48D1ECC6B94217441"><enum>(3)</enum><header>Compliance with the Paperwork Reduction Act</header><text>In establishing requirements under this subsection, the Secretary shall ensure that the requirements comply with <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code (commonly known as the “Paperwork Reduction Act”). </text></paragraph></subsection><subsection id="idc6f06fe2a02b45378499efff29c64a70"><enum>(d)</enum><header>Safe harbor from certain liability</header><text>The liability protections in section 106 shall not apply to a covered company to the extent the company fails to comply with paragraphs (2), (3), and (4) of subsection (b).</text></subsection><subsection id="id72EB270A5C74448694C6C3BB364B30E7" commented="no"><enum>(e)</enum><header>Exemption from disclosure</header><text>In accordance with paragraphs (3) and (8) of section 502(e) of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6802">15 U.S.C. 6802</external-xref>), if a covered company voluntarily shares information pursuant to this section, the covered company shall not be required to provide any affected consumer the notice required under section 503 of the Gramm-Leach-Bliley Act (<external-xref legal-doc="usc" parsable-cite="usc/15/6803">15 U.S.C. 6803</external-xref>).</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="idBFBEC416CF294E4194C66E89BC74CAF6"><enum>(b)</enum><header>Conforming amendment</header><text display-inline="yes-display-inline">The table of contents in section 1(b) of division N of the Consolidated Appropriations Act, 2016 (<external-xref legal-doc="public-law" parsable-cite="pl/114/113">Public Law 114–113</external-xref>; 129 Stat. 2935) is amended by striking the items relating to sections 110 and 111 and inserting the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id8444D5DC6BE046EFBD378BB01FDB5CA8"><toc><toc-entry bold="off" level="section">Sec. 110. Sharing of cyber threat indicators by covered companies.</toc-entry><toc-entry level="section" bold="off">Sec. 111. Exception to limitation on authority of Secretary of Defense to disseminate certain information.</toc-entry><toc-entry level="section" bold="off">Sec. 112. Effective period.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></legis-body></bill> 

