<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/css" href="uslm.css"?><statuteCompilation xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:gpo="http://www.gpo.gov/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.10.xsd" xml:lang="en" style="-uslm-dtd:statute">
    <meta style="-uslm-dtd:compilation-act-form">
        <dc:title>K-12 Cybersecurity Act of 2021</dc:title>
        <citableAs>Public Law 117–47</citableAs>
        <citableAsShortTitle>K-12 Cybersecurity Act of 2021</citableAsShortTitle>
        <docNumber>47</docNumber>
        <currentThroughPublicLaw>117–47</currentThroughPublicLaw>
        <dc:type>Statute Compilation</dc:type>
        <dc:creator>United States House of Representatives</dc:creator>
        <dc:creator>Office of the Legislative Counsel</dc:creator>
        <dc:format>text/xml</dc:format>
        <dc:language>EN</dc:language>
        <dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
        <processedBy>GPO Statute Compilations USLM converter, version 20210527.1</processedBy>
        <processedDate>2021-10-22</processedDate>
        <containsShortTitle>K-12 Cybersecurity Act of 2021</containsShortTitle>
        <property role="fileId">16542</property>
        <congress>117</congress>
        <approvedDate>2021-10-08</approvedDate>
    </meta>
    <preface style="-uslm-dtd:compilation-act-form">
        <property style="-uslm-dtd:comp-short-title" role="compShortTitle">K-12 Cybersecurity Act of 2021</property>
        <citationNote style="-uslm-dtd:public-law">[(<citableAs>Public Law 117–47</citableAs>)]</citationNote>
        <editionNote style="-uslm-dtd:updated-through-note">[This law has not been amended]</editionNote>
        <explanationNote style="-uslm-dtd:explanatory-note"><b>[</b>Currency: This publication is a compilation of the text of Public Law 117–47. It was last amended by the public law listed in the As Amended Through note above and below at the bottom of each page of the pdf version and reflects current law through the date of the enactment of the public law listed at https://www.govinfo.gov/app/collection/comps/<b>]</b></explanationNote>
        <explanationNote style="-uslm-dtd:explanatory-note"><b>[</b>Note: While this publication does  not represent an official version of any Federal statute, substantial efforts have been made to ensure the accuracy of its contents. The official version of Federal law is found in the United States Statutes at Large and in the United States Code. The legal effect to be given to the Statutes at Large and the United States Code is established by statute (1 U.S.C. 112, 204).<b>]</b></explanationNote>
    </preface>
    <main style="-uslm-dtd:legis-body"><longTitle><docTitle style="-uslm-dtd:legis-type">AN ACT</docTitle><officialTitle style="-uslm-dtd:official-title">To establish a K-12 education cybersecurity initiative, and for other purposes.</officialTitle></longTitle><enactingFormula style="-uslm-dtd:enacting-clause">Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,</enactingFormula>
        <section style="-uslm-dtd:section" identifier="/us/sComp/117/47/s1" styleType="OLC">
            <num style="-uslm-dtd:enum" value="1">SECTION 1. </num><editorialNote style="-uslm-dtd:usc-reference" role="uscRef"><b>[</b><ref href="/us/usc/t6/s652">6 U.S.C. 652 note</ref><b>]</b> </editorialNote><heading style="-uslm-dtd:header">SHORT TITLE. </heading>
            <content style="-uslm-dtd:text" class="block">This Act may be cited as the “<shortTitle style="-uslm-dtd:quote">K-12 Cybersecurity Act of 2021</shortTitle>”.</content>
        </section>
        <section style="-uslm-dtd:section" identifier="/us/sComp/117/47/s2" styleType="OLC">
            <num style="-uslm-dtd:enum" value="2">SEC. 2. </num><heading style="-uslm-dtd:header">FINDINGS. </heading>
            <chapeau style="-uslm-dtd:text" class="block">Congress finds the following:</chapeau>
            <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s2/1" styleType="OLC">
                <num style="-uslm-dtd:enum" value="1">(1) </num><content style="-uslm-dtd:text">K-12 educational institutions across the United States are facing cyber attacks.</content>
            </paragraph>
            <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s2/2" styleType="OLC">
                <num style="-uslm-dtd:enum" value="2">(2) </num><chapeau style="-uslm-dtd:text">Cyber attacks place the information systems of K-12 educational institutions at risk of possible disclosure of sensitive student and employee information, including—</chapeau>
                <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s2/2/A" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="A">(A) </num><content style="-uslm-dtd:text">grades and information on scholastic development;</content>
                </subparagraph>
                <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s2/2/B" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="B">(B) </num><content style="-uslm-dtd:text">medical records;</content>
                </subparagraph>
                <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s2/2/C" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="C">(C) </num><content style="-uslm-dtd:text">family records; and</content>
                </subparagraph>
                <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s2/2/D" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="D">(D) </num><content style="-uslm-dtd:text">personally identifiable information.</content>
                </subparagraph>
            </paragraph>
            <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s2/3" styleType="OLC">
                <num style="-uslm-dtd:enum" value="3">(3) </num><content style="-uslm-dtd:text">Providing K-12 educational institutions with resources to aid cybersecurity efforts will help K-12 educational institutions prevent, detect, and respond to cyber events.</content>
            </paragraph>
        </section>
        <section style="-uslm-dtd:section" identifier="/us/sComp/117/47/s3" styleType="OLC">
            <num style="-uslm-dtd:enum" value="3">SEC. 3. </num><heading style="-uslm-dtd:header">K-12 EDUCATION CYBERSECURITY INITIATIVE. </heading>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/a" styleType="OLC">
                <num style="-uslm-dtd:enum" value="a">(a) </num><heading style="-uslm-dtd:header">Definitions.—</heading><chapeau style="-uslm-dtd:text">In this section:</chapeau>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/a/1" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="1">(1) </num><heading style="-uslm-dtd:header">Cybersecurity risk.—</heading><content style="-uslm-dtd:text">The term “<quotedText style="-uslm-dtd:quote">cybersecurity risk</quotedText>” has the meaning given the term in section 2209 of the Homeland Security Act of 2002 (6 U.S.C. 659).</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/a/2" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="2">(2) </num><heading style="-uslm-dtd:header">Director.—</heading><content style="-uslm-dtd:text">The term “<quotedText style="-uslm-dtd:quote">Director</quotedText>” means the Director of Cybersecurity and Infrastructure Security.</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/a/3" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="3">(3) </num><heading style="-uslm-dtd:header">Information system.—</heading><content style="-uslm-dtd:text">The term “<quotedText style="-uslm-dtd:quote">information system</quotedText>” has the meaning given the term in section 3502 of title 44, United States Code.</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/a/4" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="4">(4) </num><heading style="-uslm-dtd:header">K-12 educational institution.—</heading><content style="-uslm-dtd:text">The term “<quotedText style="-uslm-dtd:quote">K-12 educational institution</quotedText>” means an elementary school or a secondary school, as those terms are defined in section 8101 of the Elementary and Secondary Education Act of 1965 (20 U.S.C. 7801).</content>
                </paragraph>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/b" styleType="OLC">
                <num style="-uslm-dtd:enum" value="b">(b) </num><heading style="-uslm-dtd:header">Study.—</heading>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/b/1" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="1">(1) </num><heading style="-uslm-dtd:header">In general.—</heading><chapeau style="-uslm-dtd:text">Not later than 120 days after the date of enactment of this Act, the Director, in accordance with subsection (g)(1), shall conduct a study on the specific cybersecurity risks facing K-12 educational institutions that—</chapeau>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/b/1/A" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="A">(A) </num><content style="-uslm-dtd:text">analyzes how identified cybersecurity risks specifically impact K-12 educational institutions;</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/b/1/B" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="B">(B) </num><chapeau style="-uslm-dtd:text">includes an evaluation of the challenges K-12 educational institutions face in—</chapeau>
                        <clause style="-uslm-dtd:clause" identifier="/us/sComp/117/47/s3/b/1/B/i" styleType="OLC">
                            <num style="-uslm-dtd:enum" value="i">(i) </num><chapeau style="-uslm-dtd:text">securing—</chapeau>
                            <subclause style="-uslm-dtd:subclause" identifier="/us/sComp/117/47/s3/b/1/B/i/I" styleType="OLC">
                                <num style="-uslm-dtd:enum" value="I">(I) </num><content style="-uslm-dtd:text">information systems owned, leased, or relied upon by K-12 educational institutions; and</content>
                            </subclause>
                            <subclause style="-uslm-dtd:subclause" identifier="/us/sComp/117/47/s3/b/1/B/i/II" styleType="OLC">
                                <num style="-uslm-dtd:enum" value="II">(II) </num><content style="-uslm-dtd:text">sensitive student and employee records; and</content>
                            </subclause>
                        </clause>
                        <clause style="-uslm-dtd:clause" identifier="/us/sComp/117/47/s3/b/1/B/ii" styleType="OLC">
                            <num style="-uslm-dtd:enum" value="ii">(ii) </num><content style="-uslm-dtd:text">implementing cybersecurity protocols;</content>
                        </clause>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/b/1/C" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="C">(C) </num><content style="-uslm-dtd:text">identifies cybersecurity challenges relating to remote learning; and</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/b/1/D" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="D">(D) </num><content style="-uslm-dtd:text">evaluates the most accessible ways to communicate cybersecurity recommendations and tools.</content>
                    </subparagraph>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/b/2" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="2">(2) </num><heading style="-uslm-dtd:header">Congressional briefing.—</heading><content style="-uslm-dtd:text">Not later than 120 days after the date of enactment of this Act, the Director shall provide a Congressional briefing on the study conducted under paragraph (1).</content>
                </paragraph>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/c" styleType="OLC">
                <num style="-uslm-dtd:enum" value="c">(c) </num><heading style="-uslm-dtd:header">Cybersecurity Recommendations.—</heading><content style="-uslm-dtd:text">Not later than 60 days after the completion of the study required under subsection (b)(1), the Director, in accordance with subsection (g)(1), shall develop recommendations that include cybersecurity guidelines designed to assist K-12 educational institutions in facing the cybersecurity risks described in subsection (b)(1), using the findings of the study.</content>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/d" styleType="OLC">
                <num style="-uslm-dtd:enum" value="d">(d) </num><heading style="-uslm-dtd:header">Online Training Toolkit.—</heading><chapeau style="-uslm-dtd:text">Not later than 120 days after the completion of the development of the recommendations required under subsection (c), the Director shall develop an online training toolkit designed for officials at K-12 educational institutions to—</chapeau>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/d/1" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="1">(1) </num><content style="-uslm-dtd:text">educate the officials about the cybersecurity recommendations developed under subsection (c); and</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/d/2" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="2">(2) </num><content style="-uslm-dtd:text">provide strategies for the officials to implement the recommendations developed under subsection (c).</content>
                </paragraph>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/e" styleType="OLC">
                <num style="-uslm-dtd:enum" value="e">(e) </num><heading style="-uslm-dtd:header">Public Availability.—</heading><chapeau style="-uslm-dtd:text">The Director shall make available on the website of the Department of Homeland Security with other information relating to school safety the following:</chapeau>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/e/1" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="1">(1) </num><content style="-uslm-dtd:text">The findings of the study conducted under subsection (b)(1).</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/e/2" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="2">(2) </num><content style="-uslm-dtd:text">The cybersecurity recommendations developed under subsection (c).</content>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/e/3" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="3">(3) </num><content style="-uslm-dtd:text">The online training toolkit developed under subsection (d).</content>
                </paragraph>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/f" styleType="OLC">
                <num style="-uslm-dtd:enum" value="f">(f) </num><heading style="-uslm-dtd:header">Voluntary Use.—</heading><content style="-uslm-dtd:text">The use of the cybersecurity recommendations developed under (c) by K-12 educational institutions shall be voluntary.</content>
            </subsection>
            <subsection style="-uslm-dtd:subsection" identifier="/us/sComp/117/47/s3/g" styleType="OLC">
                <num style="-uslm-dtd:enum" value="g">(g) </num><heading style="-uslm-dtd:header">Consultation.—</heading>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/g/1" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="1">(1) </num><heading style="-uslm-dtd:header">In general.—</heading><chapeau style="-uslm-dtd:text">In the course of the conduction of the study required under subsection (b)(1) and the development of the recommendations required under subsection (c), the Director shall consult with individuals and entities focused on cybersecurity and education, as appropriate, including—</chapeau>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/g/1/A" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="A">(A) </num><content style="-uslm-dtd:text">teachers;</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/g/1/B" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="B">(B) </num><content style="-uslm-dtd:text">school administrators;</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/g/1/C" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="C">(C) </num><content style="-uslm-dtd:text">Federal agencies;</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/g/1/D" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="D">(D) </num><content style="-uslm-dtd:text">non-Federal cybersecurity entities with experience in education issues; and</content>
                    </subparagraph>
                    <subparagraph style="-uslm-dtd:subparagraph" identifier="/us/sComp/117/47/s3/g/1/E" styleType="OLC">
                        <num style="-uslm-dtd:enum" value="E">(E) </num><content style="-uslm-dtd:text">private sector organizations.</content>
                    </subparagraph>
                </paragraph>
                <paragraph style="-uslm-dtd:paragraph" identifier="/us/sComp/117/47/s3/g/2" styleType="OLC">
                    <num style="-uslm-dtd:enum" value="2">(2) </num><heading style="-uslm-dtd:header">Inapplicability of faca.—</heading><content style="-uslm-dtd:text">The Federal Advisory Committee Act (5 U.S.C App.) shall not apply to any consultation under paragraph (1).</content>
                </paragraph>
            </subsection>
        </section>
    </main>
</statuteCompilation>
