SlideShare a Scribd company logo
1 of 11
Download to read offline
I




                                                                        112TH CONGRESS
                                                                           1ST SESSION
                                                                                                             H. R. 3523
                                                                        To provide for the sharing of certain cyber threat intelligence and cyber
                                                                            threat information between the intelligence community and cybersecurity
                                                                            entities, and for other purposes.




                                                                                      IN THE HOUSE OF REPRESENTATIVES
                                                                                                    NOVEMBER 30, 2011
                                                                        Mr. ROGERS of Michigan (for himself, Mr. RUPPERSBERGER, Mr. KING of
                                                                            New York, Mr. UPTON, Mrs. MYRICK, Mr. LANGEVIN, Mr. CONAWAY,
                                                                            Mr. MILLER of Florida, Mr. BOREN, Mr. LOBIONDO, Mr. CHANDLER,
                                                                            Mr. NUNES, Mr. GUTIERREZ, Mr. WESTMORELAND, Mrs. BACHMANN,
                                                                            Mr. ROONEY, Mr. HECK, Mr. DICKS, Mr. MCCAUL, Mr. WALDEN, Mr.
                                                                            CALVERT, Mr. SHIMKUS, Mr. TERRY, Mr. BURGESS, Mr. GINGREY of
                                                                            Georgia, Mr. THOMPSON of California, Mr. KINZINGER of Illinois, Mr.
                                                                            AMODEI, and Mr. POMPEO) introduced the following bill; which was re-
                                                                            ferred to the Select Committee on Intelligence (Permanent Select)




                                                                                                                  A BILL
                                                                        To provide for the sharing of certain cyber threat intelligence
                                                                           and cyber threat information between the intelligence
                                                                           community and cybersecurity entities, and for other pur-
                                                                           poses.

                                                                          1              Be it enacted by the Senate and House of Representa-
                                                                          2 tives of the United States of America in Congress assembled,
                                                                          3     SECTION 1. SHORT TITLE.
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                          4              This Act may be cited as the ‘‘Cyber Intelligence
                                                                          5 Sharing and Protection Act of 2011’’.


                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00001   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
2
                                                                          1     SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION

                                                                          2                             SHARING.

                                                                          3              (a) IN GENERAL.—Title XI of the National Security
                                                                          4 Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding
                                                                          5 at the end the following new section:
                                                                          6           ‘‘CYBER         THREAT INTELLIGENCE AND INFORMATION

                                                                          7                                                  SHARING

                                                                          8              ‘‘SEC. 1104. (a) INTELLIGENCE COMMUNITY SHAR-
                                                                          9     ING OF           CYBER THREAT INTELLIGENCE WITH PRIVATE
                                                                        10 SECTOR.—
                                                                        11                         ‘‘(1) IN        GENERAL.—The                     Director of National
                                                                        12               Intelligence shall establish procedures to allow ele-
                                                                        13               ments of the intelligence community to share cyber
                                                                        14               threat intelligence with private-sector entities and to
                                                                        15               encourage the sharing of such intelligence.
                                                                        16                         ‘‘(2) SHARING              AND USE OF CLASSIFIED INTEL-

                                                                        17               LIGENCE.—The                   procedures established under para-
                                                                        18               graph (1) shall provide that classified cyber threat
                                                                        19               intelligence may only be—
                                                                        20                                  ‘‘(A) shared by an element of the intel-
                                                                        21                         ligence community with—
                                                                        22                                         ‘‘(i) certified entities; or
                                                                        23                                         ‘‘(ii) a person with an appropriate se-
                                                                        24                                  curity clearance to receive such cyber
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        25                                  threat intelligence;


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00002   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
3
                                                                          1                                 ‘‘(B) shared consistent with the need to
                                                                          2                        protect the national security of the United
                                                                          3                        States; and
                                                                          4                                 ‘‘(C) used by a certified entity in a manner
                                                                          5                        which protects such cyber threat intelligence
                                                                          6                        from unauthorized disclosure.
                                                                          7                        ‘‘(3) SECURITY                  CLEARANCE APPROVALS.—The

                                                                          8              Director of National Intelligence shall issue guide-
                                                                          9              lines providing that the head of an element of the
                                                                        10               intelligence community may, as the head of such ele-
                                                                        11               ment considers necessary to carry out this sub-
                                                                        12               section—
                                                                        13                                  ‘‘(A) grant a security clearance on a tem-
                                                                        14                         porary or permanent basis to an employee or
                                                                        15                         officer of a certified entity;
                                                                        16                                  ‘‘(B) grant a security clearance on a tem-
                                                                        17                         porary or permanent basis to a certified entity
                                                                        18                         and approval to use appropriate facilities; and
                                                                        19                                  ‘‘(C) expedite the security clearance proc-
                                                                        20                         ess for a person or entity as the head of such
                                                                        21                         element considers necessary, consistent with the
                                                                        22                         need to protect the national security of the
                                                                        23                         United States.
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         ‘‘(4) NO        RIGHT OR BENEFIT.—The                              provision of
                                                                        25               information to a private-sector entity under this sub-


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00003   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
4
                                                                          1              section shall not create a right or benefit to similar
                                                                          2              information by such entity or any other private-sec-
                                                                          3              tor entity.
                                                                          4              ‘‘(b) PRIVATE SECTOR USE OF CYBERSECURITY SYS-
                                                                          5     TEMS AND             SHARING            OF   CYBER THREAT INFORMATION.—
                                                                          6                        ‘‘(1) IN      GENERAL.—

                                                                          7                                 ‘‘(A) CYBERSECURITY                          PROVIDERS.—Not-

                                                                          8                        withstanding any other provision of law, a cy-
                                                                          9                        bersecurity provider, with the express consent
                                                                        10                         of a protected entity for which such cybersecu-
                                                                        11                         rity provider is providing goods or services for
                                                                        12                         cybersecurity purposes, may, for cybersecurity
                                                                        13                         purposes—
                                                                        14                                         ‘‘(i) use cybersecurity systems to iden-
                                                                        15                                  tify and obtain cyber threat information to
                                                                        16                                  protect the rights and property of such
                                                                        17                                  protected entity; and
                                                                        18                                         ‘‘(ii) share such cyber threat informa-
                                                                        19                                  tion with any other entity designated by
                                                                        20                                  such protected entity, including, if specifi-
                                                                        21                                  cally designated, the Federal Government.
                                                                        22                                  ‘‘(B) SELF-PROTECTED                            ENTITIES.—Not-

                                                                        23                         withstanding any other provision of law, a self-
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         protected entity may, for cybersecurity pur-
                                                                        25                         poses—


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00004   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
5
                                                                          1                                        ‘‘(i) use cybersecurity systems to iden-
                                                                          2                                 tify and obtain cyber threat information to
                                                                          3                                 protect the rights and property of such
                                                                          4                                 self-protected entity; and
                                                                          5                                        ‘‘(ii) share such cyber threat informa-
                                                                          6                                 tion with any other entity, including the
                                                                          7                                 Federal Government.
                                                                          8                        ‘‘(2) USE             AND           PROTECTION                  OF      INFORMA-

                                                                          9              TION.—Cyber                threat information shared in accord-
                                                                        10               ance with paragraph (1)—
                                                                        11                                  ‘‘(A) shall only be shared in accordance
                                                                        12                         with any restrictions placed on the sharing of
                                                                        13                         such information by the protected entity or self-
                                                                        14                         protected entity authorizing such sharing, in-
                                                                        15                         cluding,                if           requested,                      appropriate
                                                                        16                         anonymization or minimization of such informa-
                                                                        17                         tion;
                                                                        18                                  ‘‘(B) may not be used by an entity to gain
                                                                        19                         an unfair competitive advantage to the det-
                                                                        20                         riment of the protected entity or the self-pro-
                                                                        21                         tected entity authorizing the sharing of infor-
                                                                        22                         mation; and
                                                                        23                                  ‘‘(C) if shared with the Federal Govern-
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         ment—




                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00005   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
6
                                                                          1                                        ‘‘(i) shall be exempt from disclosure
                                                                          2                                 under section 552 of title 5, United States
                                                                          3                                 Code;
                                                                          4                                        ‘‘(ii) shall be considered proprietary
                                                                          5                                 information and shall not be disclosed to
                                                                          6                                 an entity outside of the Federal Govern-
                                                                          7                                 ment except as authorized by the entity
                                                                          8                                 sharing such information; and
                                                                          9                                        ‘‘(iii) shall not be used by the Federal
                                                                        10                                  Government for regulatory purposes.
                                                                        11                         ‘‘(3) EXEMPTION                     FROM LIABILITY.—No                  civil or
                                                                        12               criminal cause of action shall lie or be maintained in
                                                                        13               Federal or State court against a protected entity,
                                                                        14               self-protected entity, cybersecurity provider, or an
                                                                        15               officer, employee, or agent of a protected entity, self-
                                                                        16               protected entity, or cybersecurity provider, acting in
                                                                        17               good faith—
                                                                        18                                  ‘‘(A) for using cybersecurity systems or
                                                                        19                         sharing information in accordance with this sec-
                                                                        20                         tion; or
                                                                        21                                  ‘‘(B) for not acting on information ob-
                                                                        22                         tained or shared in accordance with this sec-
                                                                        23                         tion.
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         ‘‘(4) RELATIONSHIP                     TO OTHER LAWS REQUIR-

                                                                        25               ING THE DISCLOSURE OF INFORMATION.—The                                               sub-


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00006   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
7
                                                                          1              mission of information under this subsection to the
                                                                          2              Federal Government shall not satisfy or affect any
                                                                          3              requirement under any other provision of law for a
                                                                          4              person or entity to provide information to the Fed-
                                                                          5              eral Government.
                                                                          6              ‘‘(c) REPORT             ON INFORMATION                     SHARING.—The Pri-
                                                                          7 vacy and Civil Liberties Oversight Board established
                                                                          8 under section 1061 of the Intelligence Reform and Ter-
                                                                          9 rorism Prevention Act of 2004 (5 U.S.C. 601 note) shall
                                                                        10 annually submit to Congress a report in unclassified form
                                                                        11 containing—
                                                                        12                         ‘‘(1) a review of the sharing and use of infor-
                                                                        13               mation by the Federal Government under this sec-
                                                                        14               tion and the procedures and guidelines established
                                                                        15               or issued by the Director of National Intelligence
                                                                        16               under subsection (a); and
                                                                        17                         ‘‘(2) any recommendations of the Board for im-
                                                                        18               provements or modifications to such authorities to
                                                                        19               address privacy and civil liberties concerns.
                                                                        20               ‘‘(d) FEDERAL PREEMPTION.—This section super-
                                                                        21 sedes any statute of a State or political subdivision of a
                                                                        22 State that restricts or otherwise expressly regulates an ac-
                                                                        23 tivity authorized under subsection (b).
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24               ‘‘(e) SAVINGS CLAUSE.—Nothing in this section shall
                                                                        25 be construed to limit any other authority to use a cyberse-


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00007   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
8
                                                                          1 curity system or to identify, obtain, or share cyber threat
                                                                          2 intelligence or cyber threat information.
                                                                          3              ‘‘(f) DEFINITIONS.—In this section:
                                                                          4                        ‘‘(1) CERTIFIED                     ENTITY.—The                 term ‘certified
                                                                          5              entity’ means a protected entity, self-protected enti-
                                                                          6              ty, or cybersecurity provider that—
                                                                          7                                 ‘‘(A) possesses or is eligible to obtain a se-
                                                                          8                        curity clearance, as determined by the Director
                                                                          9                        of National Intelligence; and
                                                                        10                                  ‘‘(B) is able to demonstrate to the Director
                                                                        11                         of National Intelligence that such provider or
                                                                        12                         such entity can appropriately protect classified
                                                                        13                         cyber threat intelligence.
                                                                        14                         ‘‘(2)      CYBER            THREAT              INTELLIGENCE.—The

                                                                        15               term ‘cyber threat intelligence’ means information in
                                                                        16               the possession of an element of the intelligence com-
                                                                        17               munity directly pertaining to a vulnerability of, or
                                                                        18               threat to, a system or network of a government or
                                                                        19               private entity, including information pertaining to
                                                                        20               the protection of a system or network from—
                                                                        21                                  ‘‘(A) efforts to degrade, disrupt, or destroy
                                                                        22                         such system or network; or
                                                                        23                                  ‘‘(B) theft or misappropriation of private
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         or government information, intellectual prop-
                                                                        25                         erty, or personally identifiable information.


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00008   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
9
                                                                          1                        ‘‘(3) CYBERSECURITY                          PROVIDER.—The                  term
                                                                          2              ‘cybersecurity provider’ means a non-governmental
                                                                          3              entity that provides goods or services intended to be
                                                                          4              used for cybersecurity purposes.
                                                                          5                        ‘‘(4) CYBERSECURITY                     PURPOSE.—The                    term ‘cy-
                                                                          6              bersecurity purpose’ means the purpose of ensuring
                                                                          7              the integrity, confidentiality, or availability of, or
                                                                          8              safeguarding, a system or network, including pro-
                                                                          9              tecting a system or network from—
                                                                        10                                  ‘‘(A) efforts to degrade, disrupt, or destroy
                                                                        11                         such system or network; or
                                                                        12                                  ‘‘(B) theft or misappropriation of private
                                                                        13                         or government information, intellectual prop-
                                                                        14                         erty, or personally identifiable information.
                                                                        15                         ‘‘(5) CYBERSECURITY                         SYSTEM.—The                 term ‘cy-
                                                                        16               bersecurity system’ means a system designed or em-
                                                                        17               ployed to ensure the integrity, confidentiality, or
                                                                        18               availability of, or safeguard, a system or network,
                                                                        19               including protecting a system or network from—
                                                                        20                                  ‘‘(A) efforts to degrade, disrupt, or destroy
                                                                        21                         such system or network; or
                                                                        22                                  ‘‘(B) theft or misappropriation of private
                                                                        23                         or government information, intellectual prop-
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24                         erty, or personally identifiable information.




                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00009   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
10
                                                                          1                        ‘‘(6) CYBER            THREAT INFORMATION.—The                          term
                                                                          2              ‘cyber threat information’ means information di-
                                                                          3              rectly pertaining to a vulnerability of, or threat to a
                                                                          4              system or network of a government or private entity,
                                                                          5              including information pertaining to the protection of
                                                                          6              a system or network from—
                                                                          7                                 ‘‘(A) efforts to degrade, disrupt, or destroy
                                                                          8                        such system or network; or
                                                                          9                                 ‘‘(B) theft or misappropriation of private
                                                                        10                         or government information, intellectual prop-
                                                                        11                         erty, or personally identifiable information.
                                                                        12                         ‘‘(7) PROTECTED                 ENTITY.—The                 term ‘protected
                                                                        13               entity’ means an entity, other than an individual,
                                                                        14               that contracts with a cybersecurity provider for
                                                                        15               goods or services to be used for cybersecurity pur-
                                                                        16               poses.
                                                                        17                         ‘‘(8) SELF-PROTECTED                             ENTITY.—The            term
                                                                        18               ‘self-protected entity’ means an entity, other than an
                                                                        19               individual, that provides goods or services for cyber-
                                                                        20               security purposes to itself.’’.
                                                                        21               (b) PROCEDURES                     AND       GUIDELINES.—The Director
                                                                        22 of National Intelligence shall—
                                                                        23                         (1) not later than 60 days after the date of the
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                        24               enactment of this Act, establish procedures under
                                                                        25               paragraph (1) of section 1104(a) of the National Se-


                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00010   Fmt 6652   Sfmt 6201   E:BILLSH3523.IH   H3523
11
                                                                          1              curity Act of 1947, as added by subsection (a) of
                                                                          2              this section, and issue guidelines under paragraph
                                                                          3              (3) of such section 1104(a); and
                                                                          4                        (2) following the establishment of such proce-
                                                                          5              dures and the issuance of such guidelines, expedi-
                                                                          6              tiously distribute such procedures and such guide-
                                                                          7              lines to appropriate Federal Government and pri-
                                                                          8              vate-sector entities.
                                                                          9              (c) INITIAL REPORT.—The first report required to be
                                                                        10 submitted under subsection (c) of section 1104 of the Na-
                                                                        11 tional Security Act of 1947, as added by subsection (a)
                                                                        12 of this section, shall be submitted not later than one year
                                                                        13 after the date of the enactment of this Act.
                                                                        14               (d) TABLE             OF       CONTENTS AMENDMENT.—The table
                                                                        15 of contents in the first section of such Act is amended
                                                                        16 by adding at the end the following new item:
                                                                                ‘‘Sec. 1104. Cyber threat intelligence and information sharing.’’.

                                                                                                                                   Æ
emcdonald on DSK5VPTVN1PROD with BILLS




                                                                                    •HR 3523 IH

                                         VerDate Mar 15 2010   23:17 Nov 30, 2011   Jkt 019200   PO 00000   Frm 00011   Fmt 6652   Sfmt 6301   E:BILLSH3523.IH   H3523

More Related Content

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CISPA (Cyber Intelligence Sharing and Protection Act)

  • 1. I 112TH CONGRESS 1ST SESSION H. R. 3523 To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes. IN THE HOUSE OF REPRESENTATIVES NOVEMBER 30, 2011 Mr. ROGERS of Michigan (for himself, Mr. RUPPERSBERGER, Mr. KING of New York, Mr. UPTON, Mrs. MYRICK, Mr. LANGEVIN, Mr. CONAWAY, Mr. MILLER of Florida, Mr. BOREN, Mr. LOBIONDO, Mr. CHANDLER, Mr. NUNES, Mr. GUTIERREZ, Mr. WESTMORELAND, Mrs. BACHMANN, Mr. ROONEY, Mr. HECK, Mr. DICKS, Mr. MCCAUL, Mr. WALDEN, Mr. CALVERT, Mr. SHIMKUS, Mr. TERRY, Mr. BURGESS, Mr. GINGREY of Georgia, Mr. THOMPSON of California, Mr. KINZINGER of Illinois, Mr. AMODEI, and Mr. POMPEO) introduced the following bill; which was re- ferred to the Select Committee on Intelligence (Permanent Select) A BILL To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other pur- poses. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, 3 SECTION 1. SHORT TITLE. emcdonald on DSK5VPTVN1PROD with BILLS 4 This Act may be cited as the ‘‘Cyber Intelligence 5 Sharing and Protection Act of 2011’’. VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 2. 2 1 SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION 2 SHARING. 3 (a) IN GENERAL.—Title XI of the National Security 4 Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding 5 at the end the following new section: 6 ‘‘CYBER THREAT INTELLIGENCE AND INFORMATION 7 SHARING 8 ‘‘SEC. 1104. (a) INTELLIGENCE COMMUNITY SHAR- 9 ING OF CYBER THREAT INTELLIGENCE WITH PRIVATE 10 SECTOR.— 11 ‘‘(1) IN GENERAL.—The Director of National 12 Intelligence shall establish procedures to allow ele- 13 ments of the intelligence community to share cyber 14 threat intelligence with private-sector entities and to 15 encourage the sharing of such intelligence. 16 ‘‘(2) SHARING AND USE OF CLASSIFIED INTEL- 17 LIGENCE.—The procedures established under para- 18 graph (1) shall provide that classified cyber threat 19 intelligence may only be— 20 ‘‘(A) shared by an element of the intel- 21 ligence community with— 22 ‘‘(i) certified entities; or 23 ‘‘(ii) a person with an appropriate se- 24 curity clearance to receive such cyber emcdonald on DSK5VPTVN1PROD with BILLS 25 threat intelligence; •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 3. 3 1 ‘‘(B) shared consistent with the need to 2 protect the national security of the United 3 States; and 4 ‘‘(C) used by a certified entity in a manner 5 which protects such cyber threat intelligence 6 from unauthorized disclosure. 7 ‘‘(3) SECURITY CLEARANCE APPROVALS.—The 8 Director of National Intelligence shall issue guide- 9 lines providing that the head of an element of the 10 intelligence community may, as the head of such ele- 11 ment considers necessary to carry out this sub- 12 section— 13 ‘‘(A) grant a security clearance on a tem- 14 porary or permanent basis to an employee or 15 officer of a certified entity; 16 ‘‘(B) grant a security clearance on a tem- 17 porary or permanent basis to a certified entity 18 and approval to use appropriate facilities; and 19 ‘‘(C) expedite the security clearance proc- 20 ess for a person or entity as the head of such 21 element considers necessary, consistent with the 22 need to protect the national security of the 23 United States. emcdonald on DSK5VPTVN1PROD with BILLS 24 ‘‘(4) NO RIGHT OR BENEFIT.—The provision of 25 information to a private-sector entity under this sub- •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 4. 4 1 section shall not create a right or benefit to similar 2 information by such entity or any other private-sec- 3 tor entity. 4 ‘‘(b) PRIVATE SECTOR USE OF CYBERSECURITY SYS- 5 TEMS AND SHARING OF CYBER THREAT INFORMATION.— 6 ‘‘(1) IN GENERAL.— 7 ‘‘(A) CYBERSECURITY PROVIDERS.—Not- 8 withstanding any other provision of law, a cy- 9 bersecurity provider, with the express consent 10 of a protected entity for which such cybersecu- 11 rity provider is providing goods or services for 12 cybersecurity purposes, may, for cybersecurity 13 purposes— 14 ‘‘(i) use cybersecurity systems to iden- 15 tify and obtain cyber threat information to 16 protect the rights and property of such 17 protected entity; and 18 ‘‘(ii) share such cyber threat informa- 19 tion with any other entity designated by 20 such protected entity, including, if specifi- 21 cally designated, the Federal Government. 22 ‘‘(B) SELF-PROTECTED ENTITIES.—Not- 23 withstanding any other provision of law, a self- emcdonald on DSK5VPTVN1PROD with BILLS 24 protected entity may, for cybersecurity pur- 25 poses— •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 5. 5 1 ‘‘(i) use cybersecurity systems to iden- 2 tify and obtain cyber threat information to 3 protect the rights and property of such 4 self-protected entity; and 5 ‘‘(ii) share such cyber threat informa- 6 tion with any other entity, including the 7 Federal Government. 8 ‘‘(2) USE AND PROTECTION OF INFORMA- 9 TION.—Cyber threat information shared in accord- 10 ance with paragraph (1)— 11 ‘‘(A) shall only be shared in accordance 12 with any restrictions placed on the sharing of 13 such information by the protected entity or self- 14 protected entity authorizing such sharing, in- 15 cluding, if requested, appropriate 16 anonymization or minimization of such informa- 17 tion; 18 ‘‘(B) may not be used by an entity to gain 19 an unfair competitive advantage to the det- 20 riment of the protected entity or the self-pro- 21 tected entity authorizing the sharing of infor- 22 mation; and 23 ‘‘(C) if shared with the Federal Govern- emcdonald on DSK5VPTVN1PROD with BILLS 24 ment— •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 6. 6 1 ‘‘(i) shall be exempt from disclosure 2 under section 552 of title 5, United States 3 Code; 4 ‘‘(ii) shall be considered proprietary 5 information and shall not be disclosed to 6 an entity outside of the Federal Govern- 7 ment except as authorized by the entity 8 sharing such information; and 9 ‘‘(iii) shall not be used by the Federal 10 Government for regulatory purposes. 11 ‘‘(3) EXEMPTION FROM LIABILITY.—No civil or 12 criminal cause of action shall lie or be maintained in 13 Federal or State court against a protected entity, 14 self-protected entity, cybersecurity provider, or an 15 officer, employee, or agent of a protected entity, self- 16 protected entity, or cybersecurity provider, acting in 17 good faith— 18 ‘‘(A) for using cybersecurity systems or 19 sharing information in accordance with this sec- 20 tion; or 21 ‘‘(B) for not acting on information ob- 22 tained or shared in accordance with this sec- 23 tion. emcdonald on DSK5VPTVN1PROD with BILLS 24 ‘‘(4) RELATIONSHIP TO OTHER LAWS REQUIR- 25 ING THE DISCLOSURE OF INFORMATION.—The sub- •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 7. 7 1 mission of information under this subsection to the 2 Federal Government shall not satisfy or affect any 3 requirement under any other provision of law for a 4 person or entity to provide information to the Fed- 5 eral Government. 6 ‘‘(c) REPORT ON INFORMATION SHARING.—The Pri- 7 vacy and Civil Liberties Oversight Board established 8 under section 1061 of the Intelligence Reform and Ter- 9 rorism Prevention Act of 2004 (5 U.S.C. 601 note) shall 10 annually submit to Congress a report in unclassified form 11 containing— 12 ‘‘(1) a review of the sharing and use of infor- 13 mation by the Federal Government under this sec- 14 tion and the procedures and guidelines established 15 or issued by the Director of National Intelligence 16 under subsection (a); and 17 ‘‘(2) any recommendations of the Board for im- 18 provements or modifications to such authorities to 19 address privacy and civil liberties concerns. 20 ‘‘(d) FEDERAL PREEMPTION.—This section super- 21 sedes any statute of a State or political subdivision of a 22 State that restricts or otherwise expressly regulates an ac- 23 tivity authorized under subsection (b). emcdonald on DSK5VPTVN1PROD with BILLS 24 ‘‘(e) SAVINGS CLAUSE.—Nothing in this section shall 25 be construed to limit any other authority to use a cyberse- •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 8. 8 1 curity system or to identify, obtain, or share cyber threat 2 intelligence or cyber threat information. 3 ‘‘(f) DEFINITIONS.—In this section: 4 ‘‘(1) CERTIFIED ENTITY.—The term ‘certified 5 entity’ means a protected entity, self-protected enti- 6 ty, or cybersecurity provider that— 7 ‘‘(A) possesses or is eligible to obtain a se- 8 curity clearance, as determined by the Director 9 of National Intelligence; and 10 ‘‘(B) is able to demonstrate to the Director 11 of National Intelligence that such provider or 12 such entity can appropriately protect classified 13 cyber threat intelligence. 14 ‘‘(2) CYBER THREAT INTELLIGENCE.—The 15 term ‘cyber threat intelligence’ means information in 16 the possession of an element of the intelligence com- 17 munity directly pertaining to a vulnerability of, or 18 threat to, a system or network of a government or 19 private entity, including information pertaining to 20 the protection of a system or network from— 21 ‘‘(A) efforts to degrade, disrupt, or destroy 22 such system or network; or 23 ‘‘(B) theft or misappropriation of private emcdonald on DSK5VPTVN1PROD with BILLS 24 or government information, intellectual prop- 25 erty, or personally identifiable information. •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 9. 9 1 ‘‘(3) CYBERSECURITY PROVIDER.—The term 2 ‘cybersecurity provider’ means a non-governmental 3 entity that provides goods or services intended to be 4 used for cybersecurity purposes. 5 ‘‘(4) CYBERSECURITY PURPOSE.—The term ‘cy- 6 bersecurity purpose’ means the purpose of ensuring 7 the integrity, confidentiality, or availability of, or 8 safeguarding, a system or network, including pro- 9 tecting a system or network from— 10 ‘‘(A) efforts to degrade, disrupt, or destroy 11 such system or network; or 12 ‘‘(B) theft or misappropriation of private 13 or government information, intellectual prop- 14 erty, or personally identifiable information. 15 ‘‘(5) CYBERSECURITY SYSTEM.—The term ‘cy- 16 bersecurity system’ means a system designed or em- 17 ployed to ensure the integrity, confidentiality, or 18 availability of, or safeguard, a system or network, 19 including protecting a system or network from— 20 ‘‘(A) efforts to degrade, disrupt, or destroy 21 such system or network; or 22 ‘‘(B) theft or misappropriation of private 23 or government information, intellectual prop- emcdonald on DSK5VPTVN1PROD with BILLS 24 erty, or personally identifiable information. •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 10. 10 1 ‘‘(6) CYBER THREAT INFORMATION.—The term 2 ‘cyber threat information’ means information di- 3 rectly pertaining to a vulnerability of, or threat to a 4 system or network of a government or private entity, 5 including information pertaining to the protection of 6 a system or network from— 7 ‘‘(A) efforts to degrade, disrupt, or destroy 8 such system or network; or 9 ‘‘(B) theft or misappropriation of private 10 or government information, intellectual prop- 11 erty, or personally identifiable information. 12 ‘‘(7) PROTECTED ENTITY.—The term ‘protected 13 entity’ means an entity, other than an individual, 14 that contracts with a cybersecurity provider for 15 goods or services to be used for cybersecurity pur- 16 poses. 17 ‘‘(8) SELF-PROTECTED ENTITY.—The term 18 ‘self-protected entity’ means an entity, other than an 19 individual, that provides goods or services for cyber- 20 security purposes to itself.’’. 21 (b) PROCEDURES AND GUIDELINES.—The Director 22 of National Intelligence shall— 23 (1) not later than 60 days after the date of the emcdonald on DSK5VPTVN1PROD with BILLS 24 enactment of this Act, establish procedures under 25 paragraph (1) of section 1104(a) of the National Se- •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00010 Fmt 6652 Sfmt 6201 E:BILLSH3523.IH H3523
  • 11. 11 1 curity Act of 1947, as added by subsection (a) of 2 this section, and issue guidelines under paragraph 3 (3) of such section 1104(a); and 4 (2) following the establishment of such proce- 5 dures and the issuance of such guidelines, expedi- 6 tiously distribute such procedures and such guide- 7 lines to appropriate Federal Government and pri- 8 vate-sector entities. 9 (c) INITIAL REPORT.—The first report required to be 10 submitted under subsection (c) of section 1104 of the Na- 11 tional Security Act of 1947, as added by subsection (a) 12 of this section, shall be submitted not later than one year 13 after the date of the enactment of this Act. 14 (d) TABLE OF CONTENTS AMENDMENT.—The table 15 of contents in the first section of such Act is amended 16 by adding at the end the following new item: ‘‘Sec. 1104. Cyber threat intelligence and information sharing.’’. Æ emcdonald on DSK5VPTVN1PROD with BILLS •HR 3523 IH VerDate Mar 15 2010 23:17 Nov 30, 2011 Jkt 019200 PO 00000 Frm 00011 Fmt 6652 Sfmt 6301 E:BILLSH3523.IH H3523