[Congressional Record Volume 158, Number 61 (Thursday, April 26, 2012)]
[Daily Digest]
[Pages D413-D415]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]





                        House of Representatives


Chamber Action
Public Bills and Resolutions Introduced: 148 public bills, H.R. 4817-
4964; and 1 resolution, H. Res. 634 were introduced.     
  Pages H2203-06
Additional Cosponsors:                                   
  Pages H2211-12
Report Filed: A report was filed today as follows:
  H.R. 4257, to amend chapter 35 of title 44, United States Code, to 
revise requirements relating to Federal information security, and for 
other purposes, with an amendment (H. Rept. 112-455).        
Page H2203
Speaker: Read a letter from the Speaker wherein he appointed 
Representative Flores to act as Speaker pro tempore for today. 
                                                             Page H2137
Recess: The House recessed at 11:05 a.m. and reconvened at 12 noon. 
                                                             Page H2144
Suspensions--Proceedings Resumed: The House agreed to suspend the rules 
and pass the following measures which were debated on April 24th:
  Lowell National Historical Park Land Exchange Act of 2012: H.R. 2240, 
amended, to authorize the exchange of land or interest in land between 
Lowell National Historical Park and the city of Lowell in the 
Commonwealth of Massachusetts and                            
  Page H2156
  Idaho Wilderness Water Resources Protection Act: H.R. 2050, to 
authorize the continued use of certain water diversions located on 
National Forest System land in the Frank Church-River of No Return 
Wilderness and the Selway-Bitterroot Wilderness in the State of Idaho. 
                                                             Page H2186
Cyber Intelligence Sharing and Protection Act: The House passed H.R. 
3523, to provide for the sharing of certain cyber threat intelligence 
and cyber threat information between the intelligence community and 
cybersecurity entities, by a recorded vote of 248 ayes to 168 noes, 
Roll No. 192.                                  
  Pages H2147-56, H2156-86
  Rejected the Perlmutter motion to recommit the bill to the Permanent 
Select Committee on Intelligence with instructions to report the same 
back to the House forthwith with amendments, by a yea-and-nay vote of 
183 yeas to 233 nays, Roll No. 191.                      
Pages H2184-86
  Pursuant to the rule, an amendment in the nature of a substitute 
consisting of the text of Rules Committee Print 112-20 shall be 
considered as an original bill for the purpose of amendment under the 
five-minute rule, in lieu of the amendment in the nature of a 
substitute recommended by the Permanent Select Committee on 
Intelligence now printed in the bill.                        
Page H2166
  Agreed by unanimous consent that, during further consideration of 
H.R. 3523 pursuant to H. Res. 631, amendments No. 10 and No. 5 in H. 
Rept. 112-454 may be considered out of sequence.             
Page H2175
Agreed to:
  Pompeo amendment (No. 3 printed in H. Rept. 112-454) that makes clear 
in the bill's liability provision that the reference to the use of 
cybersecurity systems is the use of such systems to identify and obtain 
cyber threat information;                                    
Page H2169
  Flake amendment (No. 9 printed in H. Rept. 112-454) that adds a 
requirement to include a list of all Federal agencies receiving 
information shared with the Government in the report by the Inspector 
General of the Intelligence Community required under the legislation; 
                                                             Page H2173
  Pompeo amendment (No. 11 printed in H. Rept. 112-454) that clarifies 
that nothing in the bill would alter existing authorities or provide 
new authority to any Federal agency, including DOD, NSA,

[[Page D414]]

DHS or the Intelligence Community to install, employ, or otherwise use 
cybersecurity systems on private sector networks;            
Page H2173
  Woodall amendment (No. 12 printed in H. Rept. 112-454) that ensures 
that those who choose not to participate in the voluntary program 
authorized by this bill are not subject to new liabilities; 
                                                         Pages H2173-74
  Turner amendment (No. 14 printed in H. Rept. 112-454) that makes a 
technical correction to definitions in section 2(g) to provide 
consistency with other cyber security policies within the Executive 
branch and the Department of Defense;                    
Pages H2175-76
  Rogers (MI) amendment (No. 4 printed in H. Rept. 112-454) that makes 
clear that regulatory information already required to be provided 
remains FOIAable under current law (by a recorded vote of 412 ayes with 
none voting ``no'', Roll No. 185);                
Pages H2169-70, H2180
  Quayle amendment (No. 6 printed in H. Rept. 112-454) that limits 
government use of shared cyber threat information to only 5 purposes: 
1) cybersecurity; 2) investigation and prosecution of cybersecurity 
crimes; 3) protection of individuals from the danger of death or 
physical injury; 4) protection of minors from physical or psychological 
harm; and 5) protection of the national security of the United States 
(by a recorded vote of 410 ayes to 3 noes, Roll No. 186); 
                                               Pages H2170-71, H2180-81
  Amash amendment (No. 7 printed in H. Rept. 112-454) that prohibits 
the Federal Government from using, inter alia, library records, 
firearms sales records, and tax returns that it receives from private 
entities under CISPA (by a recorded vote of 415 ayes with none voting 
``no'', Roll No. 187);                            
Pages H2171-72, H2181
  Mulvaney amendment (No. 8 printed in H. Rept. 112-454) that provides 
clear authority to the Government to create reasonable procedures to 
protect privacy and civil liberties, consistent with the need of the 
Government to protect Federal systems and cybersecurity. Also prohibits 
the Federal Government from retaining or using information shared 
pursuant to paragraph (b)(1) for anything other than a use permitted 
under paragraph (c)(1) (by a recorded vote of 416 ayes with none voting 
``no'', Roll No. 188);                         
Pages H2172-73, H2181-82
  Goodlatte amendment (No. 13 printed in H. Rept. 112-454) that narrows 
definitions in the bill regarding what information may be identified, 
obtained, and shared (by a recorded vote of 414 ayes to 1 no, Roll No. 
189); and                                      
Pages H2174-75, H2182-83
  Mulvaney amendment (No. 15 printed in H. Rept. 112-454) that sunsets 
the provisions of the bill five years after the date of enactment (by a 
recorded vote of 413 ayes to 3 noes, Roll No. 190). 
                                                     Pages H2176, H2183
Rejected:
  Richardson amendment (No. 10 printed in H. Rept. 112-454) that sought 
to make explicit that nothing in the legislation would prohibit a 
department or agency of the Federal Government from providing cyber 
threat information to owners and operators of critical infrastructure 
and                                                      
Pages H2177-79
  Langevin amendment (No. 1 printed in H. Rept. 112-454) that sought to 
expand eligibility to participate in the voluntary information sharing 
program created in the bill to include critical infrastructure owners 
and operators, which allows entities that are not entirely privately 
owned, such as airports, utilities, and public transit systems, to 
receive vital cybersecurity information and better secure their 
networks against cyber threats (by a recorded vote of 167 ayes to 243 
noes, Roll No. 184).                              
Pages H2167-69, H2179
Withdrawn:
  Jackson Lee (TX) amendment (No. 5 printed in H. Rept. 112-454) that 
was offered and subsequently withdrawn that would have authorized the 
Secretary to intercept and deploy countermeasure with regard to system 
traffic for cybersecurity purposes in effect identification of 
cybersecurity risks to Federal systems.                  
Pages H2176-77
  Agreed that the Clerk be authorized to make technical and conforming 
changes to reflect the actions of the House.                 
Page H2186
  Agreed that in the engrossment of H.R. 3523, the Clerk be authorized 
to make the change that was placed at the desk.              
Page H2186
  H. Res. 631, the rule providing for consideration of the bills (H.R. 
3523) and (H.R. 4628), was agreed to by a yea-and-nay vote of 236 yeas 
to 185 nays, Roll No. 183, after the previous question was ordered by a 
yea-and-nay vote of 241 yeas to 179 nays, Roll No. 182. 
                                                         Pages H2147-56
Suspension: The House agreed to suspend the rules and pass the 
following measure:
  Federal Information Security Amendments Act of 2012: H.R. 4257, 
amended, to amend chapter 35 of title 44, United States Code, to revise 
requirements relating to Federal information security.   
  Pages H2187-92
Senate Message: Message received from the Senate today appears on page 
H2144.
Senate Referral: S. 1789 was held at the desk.               
  Page H2144

[[Page D415]]

Quorum Calls--Votes: Three yea-and-nay votes and eight recorded votes 
developed during the proceedings of today and appear on pages H2155-56, 
H2156, H2179, H2180, H2180-81, H2181, H2182, H2182-83, H2183, H2185, 
H2186. There were no quorum calls.
Adjournment: The House met at 10 a.m. and adjourned at 8:35 p.m.