<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-KEN24564-96J-16-66Y"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>118 S5390 IS: Health Care Cybersecurity and Resiliency Act of 2024</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2024-11-21</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>118th CONGRESS</congress><session>2d Session</session><legis-num>S. 5390</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20241121">November 21, 2024</action-date><action-desc><sponsor name-id="S373">Mr. Cassidy</sponsor> (for himself, <cosponsor name-id="S388">Ms. Hassan</cosponsor>, <cosponsor name-id="S287">Mr. Cornyn</cosponsor>, and <cosponsor name-id="S327">Mr. Warner</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSHR00">Committee on Health, Education, Labor, and Pensions</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To require the Secretary of Health and Human Services and the Director of the Cybersecurity and Infrastructure Security Agency to coordinate to improve cybersecurity in the health care and public health sectors, and for other purposes.</official-title></form><legis-body><section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title></quote>.</text></section><section id="id6aaf8d8f506c4aca8f5fa766ffc150e2"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="id6a5ff9d46b414065ad7cb82853f9aa96" commented="no"><enum>(1)</enum><header>Agency</header><text>The term <term>Agency</term> means the Cybersecurity and Infrastructure Security Agency.</text></paragraph><paragraph id="id558fe5996ac640cf8539d7bbadf974ae" commented="no"><enum>(2)</enum><header>Cybersecurity incident</header><text>The term <term>cybersecurity incident</term> has the meaning given the term <term>incident</term> in section 3552 of title 44, United States Code.</text></paragraph><paragraph id="idb59828726fd143dca1c0b5d549f41c37" commented="no"><enum>(3)</enum><header>Cybersecurity State Coordinator</header><text>The term <term>Cybersecurity State Coordinator</term> means a Cybersecurity State Coordinator appointed under section 2217(a) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/665c">6 U.S.C. 665c(a)</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2f0243b71ff847dfa9f74e38f68a969b"><enum>(4)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Agency.</text></paragraph><paragraph id="id56f49129f5d04e978a608d847a730ae3" commented="no"><enum>(5)</enum><header>Healthcare and Public Health Sector</header><text>The term <term>Healthcare and Public Health Sector</term> means the Healthcare and Public Health sector, as identified in Presidential Policy Directive 21 (February 12, 2013; relating to critical infrastructure security and resilience).</text></paragraph><paragraph id="id0f3d65e1680e4a968efa9eae7a276874" commented="no"><enum>(6)</enum><header>Information Sharing and Analysis Organization</header><text>The term <term>Information Sharing and Analysis Organization</term> has the meaning given such term in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>).</text></paragraph><paragraph id="id1a7e81258c5a47ba97ea3f093d37513c" commented="no"><enum>(7)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given such term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph><paragraph id="id855708b0f89242f09bad50f9ebcfcea6" commented="no"><enum>(8)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Health and Human Services.</text></paragraph></section><section id="id6cf9071da8c946278694bb66b77fe256"><enum>3.</enum><header>Department coordination with the Agency</header><subsection id="id306f8a011d7b4b9d95b581382ca8f74e"><enum>(a)</enum><header>In general</header><text>The Secretary and the Director shall coordinate, including by entering into a cooperative agreement, as appropriate, to improve cybersecurity in the Healthcare and Public Health Sector.</text></subsection><subsection id="iddae310890d164910b9261647cc0f8eaf"><enum>(b)</enum><header>Assistance</header><paragraph id="idd7db1d520b80475e9c48772fe36fb142"><enum>(1)</enum><header>In general</header><text>The Secretary shall coordinate with the Director to make resources available to entities that are receiving information shared through programs managed by the Director or the Secretary, including Information Sharing and Analysis Organizations, information sharing and analysis centers, and non-Federal entities.</text></paragraph><paragraph id="idc9acbcd913bf4057a33c5e2701b697d3"><enum>(2)</enum><header>Scope</header><text>The coordination under paragraph (1) shall include—</text><subparagraph id="idc370a8c471bd47578589dbd80418ae90"><enum>(A)</enum><text>developing products specific to the needs of Healthcare and Public Health Sector entities; and</text></subparagraph><subparagraph id="id0f5a9c5cab0147c99887379a128c8240"><enum>(B)</enum><text>sharing information relating to cyber threat indicators and appropriate defensive measures.</text></subparagraph></paragraph></subsection></section><section id="ida75c08a1608744788586755748dc71ba"><enum>4.</enum><header>Clarifying cybersecurity responsibilities at the Department of Health and Human Services</header><text display-inline="no-display-inline">Part A of title III of the Public Health Service Act (<external-xref legal-doc="usc" parsable-cite="usc/42/241">42 U.S.C. 241 et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id052C1B94BFFE411DAF7EACF1B9D61F5C"><section id="id41f45f3e8825454cad1c56d66de38715"><enum>310C.</enum><header>Oversight of cybersecurity activities</header><text display-inline="no-display-inline">The Secretary, acting through the Assistant Secretary for Preparedness and Response, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency pursuant to section 2218 of the Homeland Security Act of 2002, shall lead oversight and coordination of activities within the Department of Health and Human Services to support cybersecurity resiliency within the Healthcare and Public Health Sector (as defined in section 2 of the <short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title>), including coordination and communication with other public and private entities related to preparedness for, and responses to, cybersecurity incidents, consistent with applicable provisions of this Act, other applicable laws, and Presidential Policy Directive 21 (February 12, 2013; relating to critical infrastructure security and resilience). </text></section><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="id9b4be9072ca644d4becaeccd5b0c942d" commented="no"><enum>5.</enum><header>Cybersecurity incident response plan</header><text display-inline="no-display-inline">Section 405 of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1533">6 U.S.C. 1533</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id1f64d2d3e8964adc87e853ff4a6a4636"><enum>(1)</enum><text>in subsection (a)—</text><subparagraph commented="no" display-inline="no-display-inline" id="id35c4ab213aeb49f5b8a30d1316c6fc5a"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (4)—</text><clause commented="no" display-inline="no-display-inline" id="id1be689135ce64588bd309a0f7fd8a924"><enum>(i)</enum><text display-inline="yes-display-inline">in the paragraph heading, by inserting <quote><header-in-text style="OLC" level="paragraph">information system;</header-in-text></quote> after <quote><header-in-text style="OLC" level="paragraph">Federal entity;</header-in-text></quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ida20860f2fd9b4785a0f2d85b45b9f33a"><enum>(ii)</enum><text>by inserting <quote><term>information system</term>,</quote> after <quote><term>Federal entity</term>,</quote>;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id7ef499d136c74c78864e59173d7e3dff"><enum>(B)</enum><text display-inline="yes-display-inline">by redesignating paragraphs (4) through (7) as paragraphs (6) through (9), respectively; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id576df52f2a014cb2aefb57efac4591bb"><enum>(C)</enum><text display-inline="yes-display-inline">by inserting after paragraph (3) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idD732D971E8F34BA68070A5C5B23091FD"><paragraph id="idc8e875ad4f90402eb9d8e6b3ecfe3228" commented="no"><enum>(4)</enum><header>Cybersecurity incident</header><text>The term <term>cybersecurity incident</term> has the meaning given the term <term>incident</term> in section 3552 of title 44, United States Code.</text></paragraph><paragraph id="idf6ffaebd1748477081677f04231de32e" commented="no"><enum>(5)</enum><header>Cybersecurity risk</header><text>The term <term>cybersecurity risk</term> has the meaning given such term in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>).</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb67771ee7dfe4f6daccc64adad49b2f9"><enum>(2)</enum><text>in subsection (d), by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id31537A2EF3D84FDEB5055FEDB2011E33"><paragraph id="id5dce412fc4f44e73a33ff0f62a0ddb7f" commented="no"><enum>(4)</enum><header>Plan</header><subparagraph commented="no" display-inline="no-display-inline" id="id40bc1640889047f3a4b534d94e4ec6cc"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of the <short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title>, the Secretary shall develop and implement a cybersecurity incident response plan to inform applicable personnel within the Department of Health and Human Services of processes and protocols to prepare for, and respond to, cybersecurity incidents involving information, including hardware, software, databases, and networks, maintained by, or on behalf of, the Department, including strategies—</text><clause id="idf0764f6fecc848ff9a0a93cf65118998" commented="no"><enum>(i)</enum><text>to assess cybersecurity risks;</text></clause><clause id="id9f106a839b284c0eb478e54baeb52749" commented="no"><enum>(ii)</enum><text>to prevent cybersecurity incidents;</text></clause><clause id="id8a7d9e2a93ec4a8780c0c4640da199e9" commented="no"><enum>(iii)</enum><text>to detect and identify cybersecurity incidents;</text></clause><clause id="id464af278e00340629ccf946003de6746" commented="no"><enum>(iv)</enum><text>to minimize damage in the event of a cybersecurity incident;</text></clause><clause id="idbbf2d0a229ca4eaf8ca094d2d2ae720e" commented="no"><enum>(v)</enum><text>to protect data; and</text></clause><clause id="id7a045782fbfe4b5c82eebb5dd99c3f83" commented="no"><enum>(vi)</enum><text>to recover from any cybersecurity incidents expeditiously.</text></clause></subparagraph><subparagraph id="idc071c63e2a0b48998fddf40948ef1a6e" commented="no"><enum>(B)</enum><header>Consultation</header><text>In developing the plan under subparagraph (A), the Secretary shall consult with the Director of the Cybersecurity and Infrastructure Security Agency, the Director of the Office of Management and Budget, and the Director of the National Institute of Standards and Technology, and relevant experts, as appropriate.</text></subparagraph><subparagraph id="id232c2997c02a45e7a4e9d82ab280dea1" commented="no"><enum>(C)</enum><header>Report</header><text>Not later than 60 days before the date on which the Secretary begins implementing the plan under subparagraph (A), the Secretary shall submit to the Committee on Health, Education, Labor, and Pensions and the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Energy and Commerce, the Committee on Oversight and Reform, and the Committee on Homeland Security of the House of Representatives a report that describes such plan.</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></section><section id="idad59458925f6431285d3b57c15bb2162"><enum>6.</enum><header>Breach reporting portal</header><subsection id="id4831f79d2c824697b7827d6532d5896a"><enum>(a)</enum><header>Updates to breach reporting portal</header><text>Section 13402 of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17932">42 U.S.C. 17932</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idBF1E69DB61C44167868818117161BE0C"><subsection id="id39d496705aaf4f29a718ecd0d2c1d6a6"><enum>(k)</enum><header>Updates to regulations</header><text>Not later than 1 year after the date of enactment of the <short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title>, the Secretary shall update the regulations promulgated pursuant to subsection (j) to require that information required to be publicly displayed in the breach reporting portal established pursuant to this section includes—</text><paragraph commented="no" display-inline="no-display-inline" id="id16456f60793748fa86ece07ae34638fd"><enum>(1)</enum><text display-inline="yes-display-inline">information on any corrective action taken against a covered entity that provided notification of a breach under this section; </text></paragraph><paragraph id="id9417372d1c68456090b87c3ac878880c"><enum>(2)</enum><text>information on whether and to what extent, as appropriate, recognized security practices (as defined in section 13412(b)(1)) were considered in the investigation of such a breach; and </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id290519f3e9c849c682cedd0b49ea4c7d"><enum>(3)</enum><text display-inline="yes-display-inline">such additional information about such a breach as the Secretary may require.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id8571b23215364dd58a913a0f0bd2a6e7"><enum>7.</enum><header>Clarifying breach reporting obligations</header><text display-inline="no-display-inline">Section 13402(f) of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17932">42 U.S.C. 17932(f)</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id0cf6061ef1684186b4f2a7442bc2aa19"><paragraph id="idb5c0090f7ae441548bc9b6243b9c7663"><enum>(6)</enum><text>The number of individuals affected by the breach.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="id6aa53a37f8aa44a18a67aaa8f9351a77"><enum>8.</enum><header>Enhancing recognition of security practices</header><subsection id="id18bf4403e33a4d889c46728bdddd963c"><enum>(a)</enum><header>Recognized security practices</header><text>Section 13412(b)(1) of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17941">42 U.S.C. 17941(b)(1)</external-xref>) is amended, in the first sentence, by inserting <quote>, investments,</quote> after <quote>other programs</quote>.</text></subsection><subsection id="id6235b7a182034ff2ad8b2f75ba154087"><enum>(b)</enum><header>Guidance</header><text>Not later than 1 year after the date of enactment of this Act, the Secretary shall issue guidance on the implementation of section 13412 of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17941">42 U.S.C. 17941</external-xref>), which shall include—</text><paragraph id="id1c91e64d938849cda948071b4e7da5bc"><enum>(1)</enum><text>recognized security practices (as defined in subsection (b)(1) of such section) that the Secretary may consider when determining fines under such section;</text></paragraph><paragraph id="id91cb3e6a68e945678c56fd18f0855aec"><enum>(2)</enum><text>the extent to which such recognized security practices should be in place for consideration by the Secretary; and</text></paragraph><paragraph id="id7351ca16d5b54811a46710b35f14fcc7"><enum>(3)</enum><text>procedural requirements or information that shall be submitted by a covered entity or business associate (as such terms are defined in section 13400 of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17921">42 U.S.C. 17921</external-xref>)) to the Secretary for consideration.</text></paragraph></subsection><subsection id="id2e5b3d94c5414d6ab5e156df799fa3b3"><enum>(c)</enum><header>Annual report</header><text>Not later than 2 years after the date of enactment of this Act, and annually thereafter, the Secretary shall include in the annual report required under section 13424(a) of the HITECH Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17953">42 U.S.C. 17953(a)</external-xref>) information on implementation of section 13412 of such Act (<external-xref legal-doc="usc" parsable-cite="usc/42/17941">42 U.S.C. 17941</external-xref>), including an accounting of every case in which the Secretary considered recognized security practices (as defined in subsection (b)(1) of such section) when effectuating audits and assessing fines under such section.</text></subsection></section><section id="idd5bb7f1fb9e4497989d1d4a7da3f228c" commented="no"><enum>9.</enum><header>Required cybersecurity standards</header><subsection commented="no" display-inline="no-display-inline" id="idfc877d67c8f14c7a9ba129b4638804d2"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Secretary shall update the privacy, security, and breach notification regulations under parts 160 and 164 of title 45, Code of Federal Regulations (or any successor regulation) to require covered entities and business associates to adopt the following cybersecurity practices:</text><paragraph id="idefec05738b9642c9a210f6b70576c426" commented="no"><enum>(1)</enum><text>Multifactor authentication, or a successor technology, for access to any information systems that may include protected health information.</text></paragraph><paragraph id="id5f46aeb5a30147b89d08092e9e6e48fb" commented="no"><enum>(2)</enum><text>Safeguards to encrypt protected health information.</text></paragraph><paragraph id="idb59e580beb6446b49ac8b9e06e6d4bf8" commented="no"><enum>(3)</enum><text>Requirements to conduct audits, including penetration testing, to maintain the protections of information systems.</text></paragraph><paragraph id="idff65fd823ec5464ba03505d3fdf6c941" commented="no"><enum>(4)</enum><text>Other minimum cybersecurity standards, as determined by the Secretary, in consultation with private sector entities, based on landscape analysis of emerging and existing cybersecurity vulnerabilities and consensus-based best practices.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id1dd235764ff746bcb3d0cbbb966f7415"><enum>(b)</enum><header>Effective dates</header><text display-inline="yes-display-inline">The Secretary shall specify in the regulations the effective date for each of the new requirements under the regulations updated in accordance with subsection (a). Each such effective date shall provide reasonable time for the entities subject to the requirement to come into compliance.</text></subsection></section><section id="id516028d7683a42d4aa5cbfd87911e62b"><enum>10.</enum><header>Guidance on rural cybersecurity readiness</header><text display-inline="no-display-inline">Section 405(d) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1533">6 U.S.C. 1533(d)</external-xref>) (as amended by section 5(2)) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id363D9F4BF60B4A9BAAB7172C7E5B98DA"><paragraph id="idd919d33371c949ef87beb66cf71630e1"><enum>(5)</enum><header>Rural cybersecurity guidance</header><subparagraph id="idad6f4671081e43a2b66aafeb315f0df8" commented="no"><enum>(A)</enum><header>Definition of rural</header><text>In this paragraph, the term <term>rural</term> has the meaning given such term by the Health Resources and Services Administration. </text></subparagraph><subparagraph id="id6e9fcad9725c4bc1b076e7ebee7060f2"><enum>(B)</enum><header>Guidance on rural cybersecurity readiness</header><text>Not later than 1 year after the date of enactment of the <short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title>, the Secretary shall issue guidance to rural entities on best practices to improve cyber readiness, including strategies—</text><clause id="id0f019e62979e4e4fba2336da1b2cdcd2"><enum>(i)</enum><text>to improve cyber infrastructure, including any technical safeguards to mitigate cybersecurity risk;</text></clause><clause id="id885e729ba0f44f6fb6ff7c2b26a35b4e"><enum>(ii)</enum><text>to integrate best practices issued by the Secretary to improve cybersecurity preparedness;</text></clause><clause id="id3546ac4d9cdf44bba1577b4d26fdbb4f"><enum>(iii)</enum><text>to improve employee preparation to mitigate any cybersecurity risks, including existing public-private programs to support educational initiatives; and</text></clause><clause id="idb5adb8e42ecb4bfca22cdc618595c880"><enum>(iv)</enum><text>to implement policies to facilitate mandatory cybersecurity incident reporting requirements under law.</text></clause></subparagraph><subparagraph id="id2e754a8466b24a4d8ea5be26cc62dab8"><enum>(C)</enum><header>GAO study and report</header><clause commented="no" display-inline="no-display-inline" id="idfe350db4cb4642ab851c56a7dd8d72dd"><enum>(i)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 3 years after the date of enactment of the <short-title>Health Care Cybersecurity and Resiliency Act of 2024</short-title>, the Comptroller General of the United States shall conduct, and submit to the Committee on Health, Education, Labor, and Pensions of the Senate and the Committee on Energy and Commerce of the House of Representatives a report that describes the results of, a study to examine how rural entities have implemented the recommendations included in the guidance under subparagraph (B).</text></clause><clause id="id69e7be93bb7a4040b2f6bc0036724988" commented="no"><enum>(ii)</enum><header>Requirements</header><text>The study under clause (i) shall assess—</text><subclause id="id4acf268fabd94c2c8983aa95345294b2" commented="no"><enum>(I)</enum><text>how rural entities have implemented any technical safeguards and any challenges faced by such rural entities in areas for which safeguards were not implemented;</text></subclause><subclause id="id177afaaaf7d44618a75198b496bd72af" commented="no"><enum>(II)</enum><text>steps to further support cyber resilience for rural entities;</text></subclause><subclause id="idb26a307ff063421599e8f9dbbfbb77ac" commented="no"><enum>(III)</enum><text>areas to improve coordination between Federal agencies, including for the purposes of required cyber reporting; and</text></subclause><subclause id="idef30fabcfa6b4c188cc246cc4c3dba5a" commented="no"><enum>(IV)</enum><text>any opportunities to support public-private collaboration in the area of cyber readiness.</text></subclause></clause></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="ideefbc94173354531934aa61616e91dde"><enum>11.</enum><header>Grants to enhance cybersecurity in the health and public health sectors</header><text display-inline="no-display-inline">Part P of title III of the Public Health Service Act (<external-xref legal-doc="usc" parsable-cite="usc/42/280g">42 U.S.C. 280g et seq.</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id270F14A5B5144E46A38AE9388652C546"><section id="id52dd3dd69d22421cbc626b4aea941a76"><enum>399V–8.</enum><header>Grants</header><subsection id="idf1555cc30e10458582e716e3af174a4d"><enum>(a)</enum><header>In general</header><text>The Secretary may award grants to eligible entities for the adoption and use of cybersecurity best practices.</text></subsection><subsection id="iddef640cc7b1d4ab4b20882b7b61abb2d"><enum>(b)</enum><header>Eligible entity</header><text>To be eligible to receive a grant under subsection (a) an entity shall be—</text><paragraph commented="no" display-inline="no-display-inline" id="idf2876722d89a464ca9da929104dd15f3"><enum>(1)</enum><text display-inline="yes-display-inline">a public or nonprofit private health center (including a Federally qualified health center (as defined in section 1861(aa)(4) of the Social Security Act));</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd10397c6ac6e4f73bbba4a9db2451ef9"><enum>(2)</enum><text display-inline="yes-display-inline">a health facility operated by or pursuant to a contract with the Indian Health Service; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4008c497efbd48bfae7c6af558d04e82"><enum>(3)</enum><text display-inline="yes-display-inline">a hospital; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc31220fd002f4dcc9f04aa54fe769a26"><enum>(4)</enum><text display-inline="yes-display-inline">a cancer center;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd19fd75cea6944b88ff58ff9f0297577"><enum>(5)</enum><text display-inline="yes-display-inline">a rural health clinic; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idda46c64e08ee44d78749ff34cd7ccff3"><enum>(6)</enum><text display-inline="yes-display-inline">an academic health center; or</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idb5ebc35e549a40f08500321613f49a10"><enum>(7)</enum><text display-inline="yes-display-inline">a nonprofit entity that enters into a partnership or coordinates referrals with an entity described in any of paragraphs (1) through (6). </text></paragraph></subsection><subsection id="id79d53d4cd9144c2baf7a267dde082b4e"><enum>(c)</enum><header>Use of funds</header><text>In adopting and using cybersecurity best practices pursuant to a grant under subsection (a), an eligible entity may use grant funds—</text><paragraph id="id279d947553b34e279978586cd328a942"><enum>(1)</enum><text>to hire and train personnel in such cybersecurity best practices;</text></paragraph><paragraph id="id221c4e09c9b94bf8bdaf564346842a44"><enum>(2)</enum><text>to update electronic data systems, such as by migrating to cloud based platforms;</text></paragraph><paragraph id="id4318cbf6b9c044e18e24b3d1a8bb9bf0"><enum>(3)</enum><text>to join and participate in health cybersecurity threat information sharing organizations;</text></paragraph><paragraph id="idc19845b7183c449fb1624e3259aa3260"><enum>(4)</enum><text>to reduce the use of legacy systems; and</text></paragraph><paragraph id="id8c37208c52b24e0c853e97f4d8003d18"><enum>(5)</enum><text>to contract with third parties to assist with the activities described in paragraphs (1) through (5).</text></paragraph></subsection><subsection id="id473aaa43ec4649c58df178f42623f531"><enum>(d)</enum><header>Grant period</header><text>The Secretary may award a grant under this section for a period of not more than 3 years.</text></subsection><subsection id="id395f791e94f44afe8204797a59dd7b53"><enum>(e)</enum><header>Application</header><text>An eligible entity seeking a grant under subsection (a) shall submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require including, at a minimum a description of how the eligible entity will establish baseline measures and benchmarks that meet the Secretary’s requirements to evaluate program outcomes.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id03bdda7ffee0445dbf21e857af9f072e"><enum>(f)</enum><header>Authorization of appropriations</header><text display-inline="yes-display-inline">There are authorized to be appropriated to carry out this section such sums as may be necessary for each of fiscal years 2025 through 2030.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></section><section id="id333a9a2f6ceb42fea138bc6b70065589"><enum>12.</enum><header>Healthcare cybersecurity workforce</header><subsection id="id9952434688f3400886459db8fb4323ce"><enum>(a)</enum><header>Training for healthcare experts</header><text>The Secretary, in coordination with the Cybersecurity State Coordinators of the Agency and private sector health care experts, as appropriate, shall provide training to Healthcare and Public Health Sector asset owners and operators on—</text><paragraph id="id3f70718bd1ac43108522065c9a0d874a"><enum>(1)</enum><text>cybersecurity risks to information systems within the Healthcare and Public Health Sector; and</text></paragraph><paragraph id="idcb1f111febdd477083078e2a5f21f18b"><enum>(2)</enum><text>ways to mitigate the risks to information systems in the Healthcare and Public Health Sector.</text></paragraph></subsection><subsection id="idb5be40e8e79c4a0a8f2e4ba283a55221" commented="no"><enum>(b)</enum><header>Cross-Agency educational tools</header><paragraph commented="no" display-inline="no-display-inline" id="id1511f43ad83143289bf5dd7861d60495"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of this Act, the Secretary, acting through the Administrator of the Health Resources and Services Administration, in coordination with the Agency, shall develop a strategic plan to support growing the cybersecurity workforce for health care entities. </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id67258ccd0626466e952e028f74d16adb"><enum>(2)</enum><header>Inclusions</header><text display-inline="yes-display-inline">The strategic plan under paragraph (1) shall include—</text><subparagraph id="id25df4529f9404461905d46c6123db8a2" commented="no"><enum>(A)</enum><text>recommendations for existing educational programs that can be used to support cybersecurity training;</text></subparagraph><subparagraph id="id9a68d077191a44b8a9bfd8c76371b632" commented="no"><enum>(B)</enum><text>dissemination and development of educational materials on how to improve cybersecurity resilience;</text></subparagraph><subparagraph id="id78cf0fdf51874d54a6cade248774a8b9" commented="no"><enum>(C)</enum><text>development of best practices to train the health care workforce on cybersecurity best practices; and</text></subparagraph><subparagraph id="idee437dbe1f0742cb9a33412e1b4bab19" commented="no"><enum>(D)</enum><text>opportunities for public-private collaboration to strengthen the cybersecurity workforce.</text></subparagraph></paragraph></subsection></section></legis-body></bill> 

