<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-EHF21007-G2N-2H-1CY"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S808 IS: Cybersecurity Disclosure Act of 2021</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2021-03-17</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>1st Session</session><legis-num>S. 808</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20210317" legis-day="20210316">March 17 (legislative day, March 16), 2021</action-date><action-desc><sponsor name-id="S259">Mr. Reed</sponsor> (for himself, <cosponsor name-id="S252">Ms. Collins</cosponsor>, <cosponsor name-id="S327">Mr. Warner</cosponsor>, <cosponsor name-id="S398">Mr. Cramer</cosponsor>, <cosponsor name-id="S385">Ms. Cortez Masto</cosponsor>, and <cosponsor name-id="S247">Mr. Wyden</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSBK00">Committee on Banking, Housing, and Urban Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Securities Exchange Act of 1934 to promote transparency in the oversight of cybersecurity risks at publicly traded companies.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cybersecurity Disclosure Act of 2021</short-title></quote>.</text></section><section id="id60D1689FA6274DE4833E0800EC86EE9C"><enum>2.</enum><header>Cybersecurity transparency</header><text display-inline="no-display-inline">The Securities Exchange Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/15/78a">15 U.S.C. 78a</external-xref> et seq.) is amended by inserting after section 14B (<external-xref legal-doc="usc" parsable-cite="usc/15/78n-2">15 U.S.C. 78n–2</external-xref>) the following:</text><quoted-block style="OLC" act-name="" id="id8D45BC0E9B3448C0BFAA8E3F2621A502"><section id="id1CB99DBC90F4425FB1D738FA644AE8DC"><enum>14C.</enum><header>Cybersecurity transparency</header><subsection id="idE742631902E24CBCB719A16D5BB718D0"><enum>(a)</enum><header>Definitions</header><text>In this section—</text><paragraph id="idC8862CE28A2F40DB84F605D7DAEE418A"><enum>(1)</enum><text>the term <term>cybersecurity</term> means any action, step, or measure to detect, prevent, deter, mitigate, or address any cybersecurity threat or any potential cybersecurity threat;</text></paragraph><paragraph id="id306ADE7B6C0B4C298382E5961FC5C765"><enum>(2)</enum><text>the term <term>cybersecurity threat</term>—</text><subparagraph id="idcabb6284b46041e6a82750f8822f2a4c"><enum>(A)</enum><text>means an action, not protected by the First Amendment to the Constitution of the United States, on or through an information system that may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system; and</text></subparagraph><subparagraph id="id283b509461d241b9a9f611e5c86c10f6"><enum>(B)</enum><text>does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement;</text></subparagraph></paragraph><paragraph id="idDE837298A55C4138A3A8660223719A7B"><enum>(3)</enum><text>the term <term>information system</term>—</text><subparagraph id="id5a05027a6487461c85ea6b550ae8394e"><enum>(A)</enum><text>has the meaning given the term in section 3502 of title 44, United States Code; and</text></subparagraph><subparagraph id="idddfc94e68d154b25933a6ee97560ac7a"><enum>(B)</enum><text>includes industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers;</text></subparagraph></paragraph><paragraph id="id98F09CDAB7BA4C2E89E6DBA375F6AF19"><enum>(4)</enum><text>the term <term>NIST</term> means the National Institute of Standards and Technology; and</text></paragraph><paragraph id="id2C54AA7ED7944C21AD3FA9E78CC7C484"><enum>(5)</enum><text>the term <term>reporting company</term> means any company that is an issuer—</text><subparagraph id="id07D11AD85015406199461C0B29D30459"><enum>(A)</enum><text>the securities of which are registered under section 12; or</text></subparagraph><subparagraph id="id81C8FC308A704A0FAD1C14EB135D1790"><enum>(B)</enum><text>that is required to file reports under section 15(d).</text></subparagraph></paragraph></subsection><subsection id="idC24DDE059EC84D059DC3E3993A7AA97A"><enum>(b)</enum><header>Requirement To issue rules</header><text>Not later than 360 days after the date of enactment of this section, the Commission shall issue final rules to require each reporting company, in the annual report of the reporting company submitted under section 13 or section 15(d) or in the annual proxy statement of the reporting company submitted under section 14(a)—</text><paragraph id="idEBCAA8466ED04187A488E4BF43AC4213"><enum>(1)</enum><text>to disclose whether any member of the governing body, such as the board of directors or general partner, of the reporting company has expertise or experience in cybersecurity and in such detail as necessary to fully describe the nature of the expertise or experience; and</text></paragraph><paragraph id="id9227794A5CF041E6B5C6E43446934209"><enum>(2)</enum><text>if no member of the governing body of the reporting company has expertise or experience in cybersecurity, to describe what other aspects of the reporting company’s cybersecurity were taken into account by any person, such as an official serving on a nominating committee, that is responsible for identifying and evaluating nominees for membership to the governing body.</text></paragraph></subsection><subsection id="id32B825D988B04F63A158270D5B133F0C"><enum>(c)</enum><header>Cybersecurity expertise or experience</header><text>For purposes of subsection (b), the Commission, in consultation with NIST, shall define what constitutes expertise or experience in cybersecurity using commonly defined roles, specialties, knowledge, skills, and abilities, such as those provided in NIST Special Publication 800–181, entitled <quote>National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework</quote>, or any successor thereto.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></section></legis-body></bill>


