Académique Documents
Professionnel Documents
Culture Documents
XML
.....................................................................
(Original Signature of Member)
H. R. ll
114TH CONGRESS
1ST SESSION
A BILL
To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity
threats, and for other purposes.
1
(b) TABLE
OF
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00001
Fmt 6652
Sfmt 6211
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
2
Sec. 2. Sharing of cyber threat indicators and defensive measures by the Federal Government with non-Federal entities.
Sec. 3. Authorizations for preventing, detecting, analyzing, and mitigating
cybersecurity threats.
Sec. 4. Sharing of cyber threat indicators and defensive measures with appropriate Federal entities other than the Department of Defense
or the National Security Agency.
Sec. 5. Federal Government liability for violations of privacy or civil liberties.
Sec. 6. Protection from liability.
Sec. 7. Oversight of Government activities.
Sec. 8. Report on cybersecurity threats.
Sec. 9. Construction and preemption.
Sec. 10. Conforming amendments.
Sec. 11. Definitions.
5 Act of 1947 (50 U.S.C. 3021 et seq.) is amended by in6 serting after section 110 (50 U.S.C. 3045) the following
7 new section:
8
DEFENSIVE
10
11
BY
THE
FEDERAL
12
(1) IN
GENERAL.Consistent
13
14
15
16
17
18
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
MEASURES
Jkt 000000
(592121|24)
PO 00000
Frm 00002
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
3
1
curity clearances;
10
11
12
13
14
15
16
17
18
cybersecurity threats.
19
(2) DEVELOPMENT
PROCEDURES.The
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OF
Jkt 000000
(592121|24)
PO 00000
Frm 00003
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
4
1
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
threat indicator, to
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00004
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
5
1
10
11
formation; or
12
13
14
15
16
to a cybersecurity threat.
17
18 propriate Federal entities, cyber threat indicator, defen19 sive measure, Federal entity, and non-Federal entity
20 have the meaning given such terms in section 11 of the
21 Protecting Cyber Networks Act..
22
(b) SUBMITTAL
TO
23 days after the date of the enactment of this Act, the Direc24 tor of National Intelligence, in consultation with the heads
25 of the other appropriate Federal entities, shall submit to
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00005
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
6
1 Congress the procedures required by section 111(a) of the
2 National Security Act of 1947, as inserted by subsection
3 (a) of this section.
4
(c) TABLE
OF
ANALYZING,
10
(a) AUTHORIZATION
FOR
PRIVATE-SECTOR DEFEN-
MONITORING.
SIVE
13
(1) IN
GENERAL.Notwithstanding
any other
14
15
16
17
entity;
18
19
20
21
22
23
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
MITIGATING
CYBERSECURITY THREATS.
11
12
AND
Jkt 000000
(592121|24)
PO 00000
Frm 00006
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
7
1
graph.
10
11
12
FOR
OPERATION
OF
DEFENSIVE
13 MEASURES.
14
(1) IN
as provided in para-
15
16
17
18
and limited to
19
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
GENERAL.Except
Jkt 000000
(592121|24)
PO 00000
Frm 00007
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
8
1
10
11
12
to
13
14
fensive measure; or
15
16
17
18
19
20
21
22
23
section; or
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00008
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
9
1
(c) AUTHORIZATION
FOR
OR
RECEIVING
OR
DEFENSIVE MEAS-
GENERAL.Except
as provided in para-
URES.
(1) IN
10
11
12
13
14
15
16
17
18
19
20
21
(2) LAWFUL
RESTRICTION.A
non-Federal en-
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
SHARING
Jkt 000000
(592121|24)
PO 00000
Frm 00009
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
10
1
3
4
10
11
12
13
14
15
providing
16
17
of such an entity;
18
to
address
20
22
(1) SECURITY
OF INFORMATION.A
non-Fed-
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
assistance
19
21
technical
Jkt 000000
(592121|24)
PO 00000
Frm 00010
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
11
1
sive measure.
(2) REMOVAL
TION.A
10
11
12
13
14
15
16
tion; or
17
18
19
20
21
22
23
cybersecurity threat.
24
(3) USE
25
DEFENSIVE
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
BY
NON-FEDERAL
ENTI-
(592121|24)
PO 00000
Frm 00011
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
12
1
TIES.A
cybersecurity purpose
non-Federal
may,
for
on
Federal entity; or
10
11
12
13
entity; and
14
15
16
measure subject to
17
18
19
20
21
22
of law.
23
24
(4) USE
(A) LAW
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
19:24 Mar 22, 2015
25
entity
Jkt 000000
ENFORCEMENT USE.
(592121|24)
PO 00000
Frm 00012
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
13
1
(i) PRIOR
10
nal act.
11
(ii) ORAL
CONSENT.If
exigent cir-
12
13
14
15
16
(B) EXEMPTION
FROM DISCLOSURE.A
17
18
19
be
20
21
tion; and
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
WRITTEN CONSENT.Ex-
Jkt 000000
(592121|24)
PO 00000
Frm 00013
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
14
1
(e) NO RIGHT
OR
FENSIVE
WITH
APPROPRIATE
10
11
12
SECURITY AGENCY.
13
14
(a) REQUIREMENT
FOR
POLICIES
AND
PROCE-
DURES.
15
(1) IN
GENERAL.Section
16
17
Act, is amended by
18
19
20
21
22
PROCEDURES
AND
FOR
SHARING
23 WITH
THE
24 THAN
THE
DEPARTMENT
25
TIONAL
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
MEASURES
Jkt 000000
OF
DEFENSE
OR THE
NA-
SECURITY AGENCY.
(592121|24)
PO 00000
Frm 00014
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
15
1
ment.
(2) REQUIREMENTS
AND PROCEDURES.The
POLICIES
10
11
12
works Act;
13
14
15
16
17
18
19
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
CONCERNING
Jkt 000000
(592121|24)
PO 00000
Frm 00015
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
16
1
evant; and
10
11
12
13
14
15
16
17
18
such Act..
19
20
21
22
23
and
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
procedures
required
under
section
(592121|24)
PO 00000
Frm 00016
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
17
1
and
(1) GUIDELINES
10
11
12
13
14
15
16
17
18
19
20
21
22
threats
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OF ATTORNEY GENERAL.The
Jkt 000000
(592121|24)
PO 00000
Frm 00017
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
18
1
Act;
10
11
lishing
12
13
14
15
cybersecurity purpose;
16
17
18
19
20
21
a cybersecurity purpose;
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00018
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
19
1
threat indicator;
10
11
12
13
document
14
15
National
Strategy
for
16
17
18
19
20
formation.
21
22
CENTER.
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
entitled
Jkt 000000
(592121|24)
PO 00000
Frm 00019
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
20
1
ed
6
7
8
9
CENTER.
10 the Director of National Intelligence a Cyber Threat Intel11 ligence Integration Center.
12
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00020
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
21
1
committees of Congress;
Government; and
10
11
12
16
17
18
19
20
21
(1); and
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00021
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
22
1
(4) TABLE
OF CONTENTS AMENDMENTS.The
new items:
Sec. 119B. Cyber Threat Intelligence Integration Center.
Sec. 119C. National intelligence centers..
7
8
PROVIDED
TO
FEDERAL GOVERNMENT.
(1) NO
10
TION.The
11
12
13
14
15
(2) PROPRIETARY
INFORMATION.Consistent
16
17
18
19
20
21
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OR
Jkt 000000
(592121|24)
PO 00000
Frm 00022
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
23
1
(3) EXEMPTION
cyber
10
11
12
13
14
15
16
17
18
prosecution.
19
(4) EX
PARTE COMMUNICATIONS.The
provi-
20
21
22
23
24
25
(5) DISCLOSURE,
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
FROM DISCLOSURE.A
Jkt 000000
(592121|24)
PO 00000
Frm 00023
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
24
1
(A) AUTHORIZED
cyber
10
11
12
13
14
such a threat;
15
16
17
18
19
20
21
22
23
24
(B) PROHIBITED
25
ACTIVITIES.A
cyber
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
ACTIVITIES.A
Jkt 000000
(592121|24)
PO 00000
Frm 00024
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
25
1
(C) PRIVACY
10
11
12
13
14
15
16
section; and
17
18
19
20
21
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00025
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
26
1 ble to a person injured by such violation in an amount
2 equal to the sum of
3
greater; and
13
14
15
16
17
18
19
OF
OF
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00026
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
27
1 available to a complainant seeking a remedy for a violation
2 by a department or agency of the Federal Government
3 under this Act.
4
5
(a) MONITORING
OF
INFORMATION SYSTEMS.No
(b) SHARING
CATORS.No
OR
RECEIPT
OF
14 in any court against any non-Federal entity, and such ac15 tion shall be promptly dismissed, for the sharing or receipt
16 of a cyber threat indicator or defensive measure under sec17 tion 3(c), or a good faith failure to act based on such shar18 ing or receipt, if such sharing or receipt is conducted in
19 good faith in accordance with this Act and the amend20 ments made by this Act.
21
22
23
(1) RULE
in this
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OF CONSTRUCTION.Nothing
Jkt 000000
(592121|24)
PO 00000
Frm 00027
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
28
1
by this Act; or
tory defenses.
(2) PROOF
any
10
11
12
13
14
15
16
(3) WILLFUL
MISCONDUCT DEFINED.In
this
17
18
19
20
purpose;
21
22
tification; and
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OF WILLFUL MISCONDUCT.In
Jkt 000000
(592121|24)
PO 00000
Frm 00028
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
29
1
2
(1) IN
(d); and
10
11
subsection:
12
13
(1) IN
GENERAL.Not
14
15
16
17
18
19
20
21
22
23
24
25
26
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
GENERAL.Section
Jkt 000000
(592121|24)
PO 00000
Frm 00029
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
30
1
10
Act.
11
12
13
14
following:
15
16
17
18
19
20
21
22
23
24
25
impact.
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00030
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
31
1
such Act.
10
11
12
13
14
15
16
17
18
19
20
21
22
23
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00031
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
32
1
(4) FORM
report required
(2) INITIAL
REPORT.The
(b) REPORTS
10
11
ON
PRIVACY
(1) BIENNIAL
AND
REPORT
CIVIL LIBERTIES.
FROM
PRIVACY
AND
12
(A) IN
GENERAL.Section
1061(e) of the
13
14
15
16
graph:
17
(3) BIENNIAL
18
TIVITIES.The
19
20
21
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
OF REPORT.Each
Jkt 000000
(592121|24)
PO 00000
Frm 00032
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
33
1
liberties concerns..
(B) INITIAL
10
11
12
13
14
(2) BIENNIAL
15
ERAL.
16
(A) IN
GENERAL.Not
17
18
19
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
REPORT.The
Jkt 000000
(592121|24)
PO 00000
Frm 00033
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
34
1
lowing:
10
11
ties.
12
13
14
15
16
17
18
19
20
sharing information.
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00034
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
35
1
8
9
(1) An assessment of
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00035
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
36
1
erty; and
improved.
10
11
12
13
14
15
16
17
18
19
20
21
22
and breaches.
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00036
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
37
1
(c) FORM
OF
11 section, the term intelligence community has the mean12 ing given that term in section 3 of the National Security
13 Act of 1947 (50 U.S.C. 3003).
14
15
(a) PROHIBITION
OF
SURVEILLANCE.Nothing in
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00037
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
38
1
Act.
(d) PROTECTION
OF
SOURCES
AND
METHODS.
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00038
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
39
1
3
4
(e) RELATIONSHIP
TO
OTHER LAWS.Nothing in
19
20
21
22
23
Federal Government.
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00039
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
40
1
2
(g) PRESERVATION
OF
CONTRACTUAL OBLIGATIONS
AND
10
11
tity.
12
13 Act or the amendments made by this Act shall be con14 strued to permit the Federal Government
15
16
17
18
19
20
21
22
23
24
(i) NO LIABILITY
FOR
NON-PARTICIPATION.Noth-
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00040
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
41
1 be construed to subject any non-Federal entity to liability
2 for choosing not to engage in a voluntary activiy author3 ized in this Act and the amendments made by this Act.
4
(j) USE
AND
RETENTION
OF
INFORMATION.Noth-
13
(1) IN
14
15
16
17
18
19
(2) STATE
LAW ENFORCEMENT.Nothing
in
20
21
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
GENERAL.This
Jkt 000000
(592121|24)
PO 00000
Frm 00041
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
42
1
10
11
12
13
14
15 amended
16
17
18
19
20
21
22
23
24
25
such Act..
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
Jkt 000000
(592121|24)
PO 00000
Frm 00042
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
43
1
In this Act:
(2) APPROPRIATE
ENTITIES.The
lowing:
10
11
12
13
rity.
14
15
16
17
Intelligence.
18
(3)
CYBERSECURITY
PURPOSE.The
term
19
20
21
22
23
24
25
(4) CYBERSECURITY
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
FEDERAL
Jkt 000000
THREAT.
(592121|24)
PO 00000
Frm 00043
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
44
1
(A) IN
as provided in
10
11
tem.
12
13
14
15
16
(5) CYBER
THREAT
INDICATOR.The
term
17
18
19
tify
20
21
22
23
ering
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
GENERAL.Except
Jkt 000000
technical
information
related
to
(592121|24)
PO 00000
Frm 00044
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
45
1
10
11
12
13
14
15
16
cybersecurity threat; or
17
18
19
20
(6) DEFENSIVE
term defen-
21
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
MEASURE.The
Jkt 000000
(592121|24)
PO 00000
Frm 00045
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
46
1
prevents
mitigates
(7) FEDERAL
known
ENTITY.The
or
suspected
agency.
7
8
(8) INFORMATION
SYSTEM.The
term infor-
mation system
10
11
12
13
14
15
(9) LOCAL
GOVERNMENT.The
term local
16
17
18
division of a State.
19
(10) MALICIOUS
20
TROL.The
21
22
23
24
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
or
Jkt 000000
(592121|24)
PO 00000
Frm 00046
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
47
1
(11) MALICIOUS
term
cybersecurity threat.
10
11
information system.
12
(13) NON-FEDERAL
13
(A) IN
ENTITY.
GENERAL.Except
as otherwise
14
15
16
17
18
19
20
21
22
23
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
RECONNAISSANCE.The
Jkt 000000
(592121|24)
PO 00000
Frm 00047
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
48
1
(14) PRIVATE
(A) IN
GENERAL.Except
as otherwise
10
11
12
13
14
or agent thereof.
15
16
17
18
services.
19
20
21
22
23
(15) REAL
TIME; REAL-TIME.The
terms real
24
25
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
ENTITY.
Jkt 000000
(592121|24)
PO 00000
Frm 00048
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM
F:\PKB\INT\114CYBER\CYBER_001.XML
49
1
practicable.
(16) SECURITY
term security
10
11
(17) SECURITY
VULNERABILITY.The
term
12
13
14
15
16
17
18
f:\VHLC\032215\032215.035.xml
March 22, 2015 (7:24 p.m.)
VerDate 0ct 09 2002
CONTROL.The
Jkt 000000
(592121|24)
PO 00000
Frm 00049
Fmt 6652
Sfmt 6201
C:\USERS\PKBAYER\APPDATA\ROAMING\SOFTQUAD\XMETAL\7.0\GEN\C\CYBER_~1.XM