<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-KEL23428-7Y1-VM-9J4"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>118 S1500 IS: Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2023-05-09</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>118th CONGRESS</congress><session>1st Session</session><legis-num>S. 1500</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20230509">May 9, 2023</action-date><action-desc><sponsor name-id="S327">Mr. Warner</sponsor> (for himself and <cosponsor name-id="S252">Ms. Collins</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSRA00">Committee on Rules and Administration</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Help America Vote Act of 2002 to require the Election Assistance Commission to provide for the conduct of penetration testing as part of the testing and certification of voting systems and to provide for the establishment of an Independent Security Testing and Coordinated Vulnerability Disclosure Pilot Program for Election Systems.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Strengthening Election Cybersecurity to Uphold Respect for Elections through Independent Testing Act</short-title></quote> or the <quote><short-title>SECURE IT Act</short-title></quote>.</text></section><section id="id80242ACB81024B19BBF361D6A77147BC"><enum>2.</enum><header>Requiring penetration testing as part of the testing and certification of voting systems</header><text display-inline="no-display-inline">Section 231 of the Help America Vote Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/52/20971">52 U.S.C. 20971</external-xref>) is amended by adding at the end the following new subsection:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8B32C005E5C84AC8997555196BB45395"><subsection id="idD61B9142F3C440C289D75E0F8836A39A"><enum>(e)</enum><header>Required penetration testing</header><paragraph id="id0DB5EA091BE042D0B03F652D3650B6AF"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this subsection, the Commission shall provide for the conduct of penetration testing as part of the testing, certification, decertification, and recertification of voting system hardware and software by accredited laboratories under this section.</text></paragraph><paragraph id="id82AFB38C406144659A0014BC03E4B08F"><enum>(2)</enum><header>Accreditation</header><text>The Director of the National Institute of Standards and Technology shall recommend to the Commission entities the Director proposes be accredited to carry out penetration testing under this subsection and certify compliance with the penetration testing-related guidelines required by this subsection. The Commission shall vote on the accreditation of any entity recommended. The requirements for such accreditation shall be a subset of the requirements for accreditation of laboratories under subsection (b) and shall only be based on consideration of an entity's competence to conduct penetration testing under this subsection.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="id32BE894921DC4B5FBB68DFBD2BEE0B8D"><enum>3.</enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems</header><subsection id="id20BEAE2E37344492853EC1D7206BDDDF"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Subtitle D of title II of the Help America Vote Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/42/15401">42 U.S.C. 15401 et seq.</external-xref>) is amended by adding at the end the following new part:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1967F6660AB54ED4A1FEB1F02CD5A25B"><part id="idC4B65112F87D4936B32608B4581D1263" style="OLC"><enum>7</enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure pilot program for election systems</header><section id="idE46BC6059C754CB097A417EFC1C429C0" section-type="subsequent-section"><enum>297.</enum><header>Independent security testing and coordinated cybersecurity vulnerability disclosure pilot program for election systems</header><subsection id="idE4F6FD5C1DBE4F6A983F6A231387A91B"><enum>(a)</enum><header>In general</header><paragraph id="id749FC3F13EF546B7A140D3CD7BBF5FAF"><enum>(1)</enum><header>Establishment</header><text>The Commission, in consultation with the Secretary, shall establish an Independent Security Testing and Coordinated Vulnerability Disclosure Pilot Program for Election Systems (VDP–E) (in this section referred to as the <quote>program</quote>) in order to test for and disclose cybersecurity vulnerabilities in election systems.</text></paragraph><paragraph id="id4815db4d070f4744b8b5297526ad94e2"><enum>(2)</enum><header>Duration</header><text>The program shall be conducted for a period of 5 years.</text></paragraph><paragraph id="idD894459F683E4BA98C38D57A61FC7B8C"><enum>(3)</enum><header>Requirements</header><text>In carrying out the program, the Commission, in consultation with the Secretary, shall—</text><subparagraph id="id2f4e16439f944630bc94618d2c61f311"><enum>(A)</enum><text>establish a mechanism by which an election systems vendor may make their election system (including voting machines and source code) available to cybersecurity researchers participating in the program;</text></subparagraph><subparagraph id="id63eac7d9225f40fc8bfdaad0a007d531"><enum>(B)</enum><text>provide for the vetting of cybersecurity researchers prior to their participation in the program, including the conduct of background checks;</text></subparagraph><subparagraph id="id5FB7F2B47C2346A18BF95CF4920AA247"><enum>(C)</enum><text>establish terms of participation that—</text><clause id="id8EA558AE9771451C9477C6D107CF3166"><enum>(i)</enum><text>describe the scope of testing permitted under the program;</text></clause><clause id="id63C63C4CD1344E3BBA750C4D51439CC7"><enum>(ii)</enum><text>require researchers to—</text><subclause id="idE674D343B50B40FFBE792717A4DF29DD"><enum>(I)</enum><text>notify the vendor, the Commission, and the Secretary of any cybersecurity vulnerability they identify with respect to an election system; and</text></subclause><subclause id="id23E152D6376B4DF48E5C67CD10C5B804"><enum>(II)</enum><text>otherwise keep such vulnerability confidential for 180 days after such notification; </text></subclause></clause><clause id="id07BE6294A9414F1098C873BD01A4B55D"><enum>(iii)</enum><text>require the good faith participation of all participants in the program; and</text></clause><clause id="idDA3E13B44B1E42238DB1A339B12467C0"><enum>(iv)</enum><text>require an election system vendor, after receiving notification of a critical or high vulnerability (as defined by the National Institute of Standards and Technology) in an election system of the vendor, to—</text><subclause id="id7FFDE897F7F24D06A519E03B00194E43"><enum>(I)</enum><text>send a patch or propound some other fix or mitigation for such vulnerability to the appropriate State and local election officials, in consultation with the researcher who discovered it; and</text></subclause><subclause id="idBEC840AD033B442A978868C9D4E2CA57"><enum>(II)</enum><text>notify the Commission and the Secretary that such patch has been sent to such officials;</text></subclause></clause></subparagraph><subparagraph id="id2a66fa50678042ce8f4529e58c857acb"><enum>(D)</enum><text>in the case where a patch or fix to address a vulnerability disclosed under subparagraph (C)(ii)(I) is intended to be applied to a system certified by the Commission, provide—</text><clause commented="no" display-inline="no-display-inline" id="id04618584586548749c9978a4a1225099"><enum>(i)</enum><text display-inline="yes-display-inline">for the expedited review of such patch or fix within 90 days after receipt by the Commission; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idb8b8498c7d444c0abd4f1b9256f4519a"><enum>(ii)</enum><text>if such review is not completed by the last day of such 90 day period, that such patch or fix shall be deemed to be certified by the Commission; and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2c92b0eb5765461e92074a45fa406e75"><enum>(E)</enum><text>180 days after the disclosure of a vulnerability under subparagraph (C)(ii)(I), notify the Director of the Cybersecurity and Infrastructure Security Agency of the vulnerability for inclusion in the database of Common Vulnerabilities and Exposures.</text></subparagraph></paragraph><paragraph id="id4B54E119144D43EFA2623BF6F36D9F6E"><enum>(4)</enum><header>Voluntary participation; safe harbor</header><subparagraph commented="no" display-inline="no-display-inline" id="id7f96b81aa51643f3b1971bc1dafd4d6c"><enum>(A)</enum><header display-inline="yes-display-inline">Voluntary participation</header><text>Participation in the program shall be voluntary for election systems vendors and researchers.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb1022794c1bc4af58a545b7dec04b2cd"><enum>(B)</enum><header>Safe harbor</header><text>When conducting research under this program, such research and subsequent publication shall be considered to be:</text><clause commented="no" display-inline="no-display-inline" id="idc188bdef62c54a09815dbf29c02870a5"><enum>(i)</enum><text display-inline="yes-display-inline">Authorized in accordance with section 1030 of title 18, United States Code (commonly known as the <quote>Computer Fraud and Abuse Act</quote>), (and similar State laws), and the election system vendor will not initiate or support legal action against the researcher for accidental, good faith violations of the program.</text></clause><clause commented="no" display-inline="no-display-inline" id="id2868a474eab6466b8657e70f769fe2f9"><enum>(ii)</enum><text display-inline="yes-display-inline">Exempt from the anti-circumvention rule of section 1201 of title 17, United States Code (commonly known as the <quote>Digital Millennium Copyright Act</quote>), and the election system vendor will not bring a claim against a researcher for circumvention of technology controls.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idd55d3c1fad464bd2b9a067815ca7d600"><enum>(C)</enum><header>Rule of construction</header><text display-inline="yes-display-inline">Nothing in this paragraph may be construed to limit or otherwise affect any exception to the general prohibition against the circumvention of technological measures under subparagraph (A) of section 1201(a)(1) of title 17, United States Code, including with respect to any use that is excepted from that general prohibition by the Librarian of Congress under subparagraphs (B) through (D) of such section 1201(a)(1).</text></subparagraph></paragraph><paragraph commented="no" id="id41AA04E0DA9042DFB0A3A833F00D3439"><enum>(5)</enum><header>Exempt from disclosure</header><text>Cybersecurity vulnerabilities discovered under the program shall be exempt from section 552 of title 5, United States Code (commonly referred to as the Freedom of Information Act).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id58a8e4dce25e44f3ab4fd03a4c1afe57"><enum>(6)</enum><header>Definitions</header><text>In this subsection:</text><subparagraph id="H29CE26ABA2154B5CB77D4BB643A5CC22"><enum>(A)</enum><header>Cybersecurity vulnerability</header><text display-inline="yes-display-inline">The term <term>cybersecurity vulnerability</term> means, with respect to an election system, any security vulnerability that affects the election system.</text></subparagraph><subparagraph commented="no" id="HEC66F793F07B40D18251B9E66DEC0C1F"><enum>(B)</enum><header>Election infrastructure</header><text display-inline="yes-display-inline">The term <term>election infrastructure</term> means—</text><clause commented="no" id="id1501B15D43344F8DA25CDDBE040F06D3"><enum>(i)</enum><text display-inline="yes-display-inline">storage facilities, polling places, and centralized vote tabulation locations used to support the administration of elections for public office; and</text></clause><clause commented="no" id="id24A8B5BF453645449CEAB8CDAD56F616"><enum>(ii)</enum><text display-inline="yes-display-inline">related information and communications technology, including—</text><subclause commented="no" id="id03B22D3FE6994904AB12675987883F7A"><enum>(I)</enum><text display-inline="yes-display-inline">voter registration databases;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idf11766c06b904120b64901172deed95b"><enum>(II)</enum><text display-inline="yes-display-inline">election management systems;</text></subclause><subclause commented="no" id="id7A007CA94D384083A8D270548164C6B8"><enum>(III)</enum><text display-inline="yes-display-inline">voting machines;</text></subclause><subclause commented="no" id="id829E472574394A1899DF4D3BEEAEB510"><enum>(IV)</enum><text display-inline="yes-display-inline">electronic mail and other communications systems (including electronic mail and other systems of vendors who have entered into contracts with election agencies to support the administration of elections, manage the election process, and report and display election results); and</text></subclause><subclause commented="no" id="idF4CD57941D7E4236A51EA359A5BC0B5E"><enum>(V)</enum><text display-inline="yes-display-inline">other systems used to manage the election process and to report and display election results on behalf of an election agency.</text></subclause></clause></subparagraph><subparagraph id="HC2290ADC0DB34E9099E7B2D975E7A251"><enum>(C)</enum><header>Election system</header><text display-inline="yes-display-inline">The term <term>election system</term> means any information system that is part of an election infrastructure, including any related information and communications technology described in subparagraph (B)(ii).</text></subparagraph><subparagraph commented="no" id="H98014B55AEF24DBDB7FBBD2AA74C2408"><enum>(D)</enum><header>Election system vendor</header><text display-inline="yes-display-inline">The term <term>election system vendor</term> means any person providing, supporting, or maintaining an election system on behalf of a State or local election official.</text></subparagraph><subparagraph id="H95F887D363304E129754ED0A1E0CBCEA"><enum>(E)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></subparagraph><subparagraph id="HAE0291EC655B4E5AA40DD0EDB67574CA"><enum>(F)</enum><header>Secretary</header><text display-inline="yes-display-inline">The term <term>Secretary</term> means the Secretary of Homeland Security.</text></subparagraph><subparagraph id="H46548B91E2A144F8AAE04CD37E34E6E5"><enum>(G)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> has the meaning given the term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></subparagraph></paragraph></subsection></section></part><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idBBBCFFB44D8B46F9A8391D21BDEBFD3B"><enum>(b)</enum><header>Clerical amendment</header><text>The table of contents of such Act is amended by adding at the end of the items relating to subtitle D of title II the following:</text><quoted-block style="OLC" id="idd4a895cb-e142-4756-a4aa-23f3c345c681"><toc><toc-entry level="part" idref="idC4B65112F87D4936B32608B4581D1263">PART 7—Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems </toc-entry><toc-entry level="section" idref="idE46BC6059C754CB097A417EFC1C429C0">Sec. 297. Independent security testing and coordinated cybersecurity vulnerability disclosure program for election systems.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section></legis-body></bill> 

