<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MIR23A92-WJT-W1-2G0"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>118 S2740 IS: Small Business Cyber Resiliency Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2023-09-07</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>118th CONGRESS</congress><session>1st Session</session><legis-num>S. 2740</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20230907">September 7, 2023</action-date><action-desc><sponsor name-id="S323">Mr. Risch</sponsor> (for himself, <cosponsor name-id="S324">Mrs. Shaheen</cosponsor>, <cosponsor name-id="S266">Mr. Crapo</cosponsor>, and <cosponsor name-id="S385">Ms. Cortez Masto</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSSB00">Committee on Small Business and Entrepreneurship</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To help small businesses prepare for and combat cybersecurity threats, and for other purposes.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause"><section section-type="section-one" id="S1"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Small Business Cyber Resiliency Act</short-title></quote>.</text></section><section id="id1967e9fc09bc43eea3ad7951eb84bedc"><enum>2.</enum><header>Small business cybersecurity</header><subsection commented="no" display-inline="no-display-inline" id="id242ca8f63a914fa8931ab86a8e06f77c"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/631">15 U.S.C. 631 et seq.</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="idD38D9EA875D8429F9B73D57A9A05DEDE"><enum>(1)</enum><text>by redesignating section 49 (<external-xref legal-doc="usc" parsable-cite="usc/15/631">15 U.S.C. 631</external-xref> note) as section 52; and</text></paragraph><paragraph id="idB751DB93E9CF4485838BEFE87B27564E" commented="no" display-inline="no-display-inline"><enum>(2)</enum><text>by inserting after section 48 (<external-xref legal-doc="usc" parsable-cite="usc/15/657u">15 U.S.C. 657u</external-xref>) the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="idB67EA42E7F39421F83AFDB04A1274D23"><section id="id21ADE19423C049599AF5A131D5B4EE4A"><enum>49.</enum><header>Small business cybersecurity</header><subsection commented="no" display-inline="no-display-inline" id="id61da50e0f58044e59a9640636740fa60"><enum>(a)</enum><header display-inline="yes-display-inline">Definitions</header><text>In this section:</text><paragraph commented="no" display-inline="no-display-inline" id="id5EAFBD9C7F7A4FF2B2398CD5039C5AFD"><enum>(1)</enum><header>Cybersecurity risk; cyber threat indicator; defensive measure; incident</header><text display-inline="yes-display-inline">The terms <term>cybersecurity risk</term>, <term>cyber threat indicator</term>, <term>defense measure</term>, and <term>incident</term> have the meanings given those terms in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idC73672B69B5F4278B564D77B7917B60F"><enum>(2)</enum><header>Resource partner</header><text>The term <term>resource partner</term> means— </text><subparagraph id="id09F0C789FCD1444F8B7D2F0161A01552"><enum>(A)</enum><text>a small business development center;</text></subparagraph><subparagraph id="id42789CAF46524FEFBA677AC777545912"><enum>(B)</enum><text>a women’s business center described in section 29; and</text></subparagraph><subparagraph id="id5695C5D5C06148ABB8FEEFC5E60F8A59"><enum>(C)</enum><text>a chapter of the Service Corps of Retired Executives described in section 8(a)(1)(A). </text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id9184ac33f8c44445a21b9481d8c4cbf2"><enum>(b)</enum><header display-inline="yes-display-inline">Interagency agreement</header><text>The Administration shall enter into an interagency agreement with the Cybersecurity and Infrastructure Security Agency to collaborate and increase information sharing with the Administration to improve cybersecurity resources and defenses for small business concerns, including cybersecurity products tailored to the needs of small business concerns.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id0A7DF7D498244F38A8F671ECD99F4E3B"><enum>(c)</enum><header>Assistance through resource partners</header><paragraph commented="no" display-inline="no-display-inline" id="id113d00533878411d9c666574308d14cd"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Department of Homeland Security, and any other Federal agency in coordination with the Department of Homeland Security, shall leverage resource partners to provide assistance to small business concerns with cybersecurity tools, such as the Cyber Security Evaluation Tool and the Cyber Resilience Review, and by disseminating information relating to cybersecurity risks and other homeland security matters to help small business concerns in developing or enhancing cybersecurity infrastructure, awareness of cyber threat indicators, cybersecurity incident response planning, and cyber training programs for employees.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id16699AA868E44A668EC4DEA550C58FC1"><enum>(2)</enum><header>Annual publication</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of the <short-title>Small Business Cyber Resiliency Act</short-title> and annually thereafter, the Administrator shall publish on the website of the Administration the number of small business concerns that resource partners assisted in providing assistance described in paragraph (1) during the year covered by the publication. </text></paragraph></subsection><subsection id="id048393C06D51417CA67DD755AD740F52"><enum>(d)</enum><header>Central small business cybersecurity assistance unit</header><paragraph commented="no" display-inline="no-display-inline" id="idCCEE3C54B0AD41018FE24E03908EBF62"><enum>(1)</enum><header display-inline="yes-display-inline">Establishment</header><text>The Administrator, in coordination with the Secretary of Commerce, and in consultation with the Secretary of Homeland Security and the Attorney General, shall establish a central small business cybersecurity assistance unit within the Administration, which shall serve as a central clearinghouse for cybersecurity resources for small business concerns across the Federal Government, such as those developed by the Department of Homeland Security.</text></paragraph><paragraph id="id72BAF22D742149F185B49EDF6A852395"><enum>(2)</enum><header>Duties</header><text display-inline="yes-display-inline">The central small business cybersecurity assistance unit established under paragraph (1) shall—</text><subparagraph id="id2837EE7692EF4FB8A9A90F1F354F709C"><enum>(A)</enum><text>coordinate internal cybersecurity efforts within the Administration to reduce duplication of effort and resources; </text></subparagraph><subparagraph id="idCBDC5D2019AE4861ADBF88E9C4998B68"><enum>(B)</enum><text>establish and maintain a publicly available website that is a clearinghouse of cybersecurity information for small business concerns, including information on—</text><clause commented="no" display-inline="no-display-inline" id="id0103D3C76F144757BC359CB52EE39B35"><enum>(i)</enum><text display-inline="yes-display-inline">how to find guidance material on best cyber hygiene practices;</text></clause><clause commented="no" display-inline="no-display-inline" id="id0055007DB6FB42B09E0C5F0CC044CE32"><enum>(ii)</enum><text display-inline="yes-display-inline">where to report cybersecurity breaches or incidents; </text></clause><clause commented="no" display-inline="no-display-inline" id="id7c3556558dfc4ab8a3ea5f9cce1d80da"><enum>(iii)</enum><text>how to respond to cybersecurity breaches or incidents;</text></clause><clause commented="no" display-inline="no-display-inline" id="id1B9618C6A0154409A500E710D57D3175"><enum>(iv)</enum><text display-inline="yes-display-inline">the cybersecurity efforts of the Administration; </text></clause><clause commented="no" display-inline="no-display-inline" id="id17A84000FC9E4CFD98BC865752AC1261"><enum>(v)</enum><text display-inline="yes-display-inline">how to contact the certified employees described in section 21(o); and</text></clause><clause commented="no" display-inline="no-display-inline" id="id7F36FC0FB48940CFAE091A2F2D5E5750"><enum>(vi)</enum><text>standard incident response procedures for leading cyber crimes;</text></clause></subparagraph><subparagraph id="idFF6F8AD65F2E4727BFA92C7A6072163E"><enum>(C)</enum><text>work with the certified employees described in section 21(o) to provide cybersecurity assistance to small business concerns;</text></subparagraph><subparagraph id="id84885416E4444139A5F75EBFB251F212"><enum>(D)</enum><text>coordinate with the Department of Homeland Security and any other Federal agency as the Administrator determines appropriate to identify and disseminate cybersecurity information and resources to small business concerns in a form that is accessible and actionable by small business concerns;</text></subparagraph><subparagraph id="id10A729B31564476F84B283AC902E7A00"><enum>(E)</enum><text>redirect small business cybersecurity inquiries, such as reporting of cyber threat indicators and defensive measures, to the appropriate Federal agencies;</text></subparagraph><subparagraph id="idE02F8E2FD59A469B9C50DC2778C58904"><enum>(F)</enum><text>coordinate with the National Institute of Standards and Technology to identify and disseminate information to small business concerns on the most cost-effective methods for implementing elements of the cybersecurity framework of the National Institute of Standards and Technology applicable to improving the cybersecurity posture of small business concerns;</text></subparagraph><subparagraph id="id09E6203FBFAB464CB3FFB57A3351AA9F"><enum>(G)</enum><text>coordinate with the Department of Defense to identify and disseminate information to small business concerns on satisfying the applicable requirements of the Cybersecurity Maturity Model Certification of the Department of Defense or any other successor cybersecurity requirements as established by the Department of Defense; and</text></subparagraph><subparagraph id="id5EFC83D618564C28AED7DF8C492D39E7"><enum>(H)</enum><text>seek input from the Office of Advocacy of the Administration to identify any policies or procedures adopted by any department, agency, or instrumentality of the Federal Government that will hamper the improvement of the cybersecurity posture of those small business concerns. </text></subparagraph></paragraph><paragraph id="id51111D2756CB4BC5A120CD0A6A4DAFAF"><enum>(3)</enum><header>Enhanced cybersecurity protections for small businesses</header><subparagraph id="id8146D83B3C8744FAA4CDF3497E5852FB"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Notwithstanding any other provision of law, no cause of action shall lie or be maintained in any court against any small business concern, and such action shall be promptly dismissed, if such action is related to or arises out of—</text><clause id="id3CEC667498FF4733AA7D98B92732CD3A"><enum>(i)</enum><text display-inline="yes-display-inline">any activity authorized under this paragraph or the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501 et seq.</external-xref>); or</text></clause><clause id="id25BFC141C9AA49A58F028EF4538AFEE9"><enum>(ii)</enum><text>any action or inaction in response to any cyber threat indicator, defensive measure, or other information shared or received pursuant to this paragraph or the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501 et seq.</external-xref>).</text></clause></subparagraph><subparagraph id="id24016A01E84E4C189EEAEC29ACD06E19"><enum>(B)</enum><header>Rule of construction</header><text>Nothing in this paragraph shall be construed to affect the applicability or merits of any defense, motion, or argument in any cause of action in a court brought against an entity that is not a small business concern. </text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id91a1bac7452b4c24bccacdf5848cd05e"><enum>(e)</enum><header>Report</header><paragraph commented="no" display-inline="no-display-inline" id="id43e8eb8c589f474db4145269adff2dac"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of the <short-title>Small Business Cyber Resiliency Act</short-title>, and every year thereafter, the Administrator and the head of each Federal agency that collects or shares information under this section shall submit to the Committee on Small Business and Entrepreneurship of the Senate and the Committee on Small Business of the House of Representatives a joint report on actions taken by the Administration and relevant Federal agencies to protect personally identifiable information, business identifiable information, sensitive financial information, and cybersecurity information received by those Federal agencies as a result of the requirements under this section. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8716f180dcc84442ac2bfdd6f2aba98b"><enum>(2)</enum><header>Form</header><text display-inline="yes-display-inline">Each report required under paragraph (1) shall be unclassified, but may include a classified annex.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="H56488382C0C34398A12A3277B54206A6"><enum>(b)</enum><header>Prohibition on new appropriations</header><paragraph id="id6643E40FEF5D4C028E1B956D3FE61FAB"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">No additional funds are authorized to be appropriated to carry out this section and the amendments made by this section.</text></paragraph><paragraph id="idD515F96A04D8434FAE46F3ECBFA6A95B"><enum>(2)</enum><header>Existing funding</header><text display-inline="yes-display-inline">This section and the amendments made by this section shall be carried out using amounts made available to the Small Business Administration under the heading <quote>Entrepreneurial Development Programs</quote>.</text></paragraph></subsection><subsection id="id01FE58F174854DCD8E57F7CC55298CCC" commented="no" display-inline="no-display-inline"><enum>(c)</enum><header>Implementation</header><text>Not later than 180 days after the date of enactment of this Act, the Administrator of the Small Business Administration shall implement this section and the amendments made by this section. </text></subsection></section><section id="id8e4a69e759284d77ad6e5830c54b74c2"><enum>3.</enum><header>Study and report on cybersecurity risks of small businesses</header><subsection id="idD46AB5267EF14D91B63EB112E2AA5B28"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id277E256724304BA1915EC82FA8C02BB2"><enum>(1)</enum><header>Administration</header><text>The term <term>Administration</term> means the Small Business Administration.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id085a56134fd24562a61bd12795e17d21"><enum>(2)</enum><header display-inline="yes-display-inline">Appropriate committees of Congress</header><text>The term <term>appropriate committees of Congress</term> means—</text><subparagraph id="idB3059097105D4D828CD9599FDF91A856"><enum>(A)</enum><text>the Committee on Small Business and Entrepreneurship of the Senate;</text></subparagraph><subparagraph id="ida9678dada70d4d42911e631a9228bc50"><enum>(B)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></subparagraph><subparagraph id="idd07474c292c943d095e216eca367dc69"><enum>(C)</enum><text>the Committee on Small Business of the House of Representatives; and</text></subparagraph><subparagraph id="id50c839172b9440e7bac92bc035b1815d"><enum>(D)</enum><text>the Committee on Homeland Security of the House of Representatives. </text></subparagraph></paragraph><paragraph id="idD06FD625F2DE401387EDCCEE16285CC2"><enum>(3)</enum><header>Cybersecurity risk</header><text>The term <term>cybersecurity risk</term> has the meaning given the term in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>).</text></paragraph><paragraph id="id3BDE983A71354963B466366FD7544891"><enum>(4)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></paragraph><paragraph id="idB2BFD884D9C44BEFB6E5B3221FF1B811"><enum>(5)</enum><header>Rural area</header><text>The term <term>rural area</term> means any county or other political subdivision of a State, the District of Columbia, or a territory or possession of the United States that is designated as a rural area by the Bureau of the Census.</text></paragraph><paragraph id="idFFF388E6096A4051A258B75EB7BE3A96"><enum>(6)</enum><header>Small business concern</header><text>The term <term>small business concern</term> has the meaning given the term in section 3 of the Small Business Act (<external-xref legal-doc="usc" parsable-cite="usc/15/632">15 U.S.C. 632</external-xref>).</text></paragraph></subsection><subsection id="idC7B85917ED29433DAB8F0A598FBB9CFA"><enum>(b)</enum><header>Study and Report</header><text>Not later than 1 year after the date of enactment of this Act, the Chief Counsel for Advocacy of the Administration and the Comptroller General of the United States shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id7a8de7de28d44d6ebc5ce95cbb8b8010"><enum>(1)</enum><text display-inline="yes-display-inline">conduct a joint study assessing the impact of small business concerns turning to online marketplaces as a result of shutdowns imposed by the COVID–19 pandemic, specifically in regards to the cybersecurity of those small business concerns; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida4d5b58a3b1d45bca2d73a2f40cc3edc"><enum>(2)</enum><text display-inline="yes-display-inline">submit to the appropriate committees of Congress and make publicly available a report on—</text><subparagraph id="id6c556cf02542429ea75333077c3bb03e"><enum>(A)</enum><text>how identified cybersecurity risks specifically impact small business concerns that established an online presence during the period beginning on February 1, 2020, and ending on December 31, 2021; </text></subparagraph><subparagraph id="idd11107ae56f34d2399a943c5c556e77f"><enum>(B)</enum><text>the challenges that the small business concerns described in subparagraph (A) face in—</text><clause id="ida24d0a7da69b46b88f2866892cd549d2"><enum>(i)</enum><text>securing updated information systems;</text></clause><clause id="id98b38f8df5f0404190885ca6ed478e92"><enum>(ii)</enum><text>implementing cybersecurity protocols; and</text></clause><clause id="idbaa16db9a2df44348bdefd1e196b4dea"><enum>(iii)</enum><text>responding to data breaches or cyber attacks;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida040c5043d07416e84f89306cea55b6c"><enum>(C)</enum><text>the Federal resources that the small business concerns described in subparagraph (A) used in establishing the online presence described in that paragraph;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id8adfa779698e46538661085f372d223b"><enum>(D)</enum><text>as of the date of the report, the cybersecurity status of the small business concerns described in subparagraph (A) based on a representative sample of those small business concerns; </text></subparagraph><subparagraph id="idd3817ee9bea6410d9854f8b31cd386e7"><enum>(E)</enum><text>how the Department of Homeland Security and the Administration can improve their existing partnership to better train small business concerns regarding cybersecurity threats; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5b27bbedcc064e5896d741390d6fdb25"><enum>(F)</enum><text>as of the date of the report—</text><clause commented="no" display-inline="no-display-inline" id="ida455fd4af4564707839092bfcd2cce9b"><enum>(i)</enum><text display-inline="yes-display-inline">the frequency of each type of cyber attack suffered by small business concerns described in subparagraph (A); and</text></clause><clause commented="no" display-inline="no-display-inline" id="id7fb00e080a2445fa93be87cc9386017c"><enum>(ii)</enum><text>an estimated average cost to those small business concerns of each type of cyber attack.</text></clause></subparagraph></paragraph></subsection></section></legis-body></bill> 

