﻿<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/xslt/billres.xsl" type="text/xsl"?>
<!DOCTYPE amendment-doc PUBLIC "-//US Congress//DTDs/amend v2.8 20020720//EN" "http://xml.house.gov/amend.dtd"[]>
<amendment-doc amend-stage="proposed" amend-type="house-amendment" amend-degree="first">
  <pre-form>
    <meta-house>
      <holc-filename>L:\XML\CPRT-113-HPRT-RU00-HR624.XML</holc-filename>
      <holc-attorney>XML</holc-attorney>
      <holc-last-author>mchinn</holc-last-author>
      <holc-last-saved>4/11/2013 12:41</holc-last-saved>
      <holc-creator>mchinn</holc-creator>
      <holc-creation-date>04/11/2013 12:21</holc-creation-date>
      <version>
        <version-filename>L:\vr\041113\R041113.003.xml</version-filename>
        <version-date>04/11/2013 12:41:47</version-date>
        <version-creator>mchinn</version-creator>
      </version>
      <version>
        <version-filename>x:\xx\xxxxxx\xxxxxx.xxx.xml</version-filename>
        <version-date>xx/xx/xxxx xx:xx:xx xx</version-date>
        <version-creator>mchinn</version-creator>
      </version>
    </meta-house>
    <author-note display="no">
      <?xm-replace_text {author-note}?>
    </author-note>
    <running-header display="no">[Discussion Draft]</running-header>
    <legis-counsel>
    </legis-counsel>
    <first-page-header display="no">[Discussion Draft]</first-page-header>
    <first-page-date display="yes">April 11, 2013</first-page-date>
    <first-page-desc display="no">
      <?xm-replace_text {first-page-desc}?>
    </first-page-desc>
  </pre-form>
  <amendment-form>
    <purpose display="no">
      <?xm-replace_text {purpose}?>
    </purpose>
    <congress display="no">113th CONGRESS</congress>
    <session display="no">1st Session</session>
    <legis-num>Rules Committee Print 113-7</legis-num>
    <action>
      <action-desc blank-lines-after="1">Text of H.R. 624, Cyber Intelligence Sharing and Protection Act</action-desc>
      <action-instruction>[Showing the text of H.R. 624 as ordered reported by the Permanent Select Committee on Intellignce with a modification.]</action-instruction>
    </action>
  </amendment-form>
  <amendment-body>
    <amendment>
      <amendment-instruction line-numbers="off">
        <text>
          <?xm-replace_text {amendment-instruction}?>
        </text>
      </amendment-instruction>
      <amendment-block id="H88D411134E884F839F1211596907677A" style="OLC">
        <legis-body id="HA5ABC095AE1E4EBC9BC3388D31CAD54A" style="OLC" display-enacting-clause="no-display-enacting-clause">
          <section id="H04087461EB22408A894E8A2B4F1CA381" section-type="section-one">
            <enum>1.</enum>
            <header>Short title</header>
            <text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cyber Intelligence Sharing and Protection Act</short-title></quote>.</text>
          </section>
          <section id="H967C1D81927B4943997E59044AD23BFA">
            <enum>2.</enum>
            <header>Cyber threat intelligence and information sharing</header>
            <subsection id="H9135CACE42CA4A93820C1171FF5425E6">
              <enum>(a)</enum>
              <header>In general</header>
              <text display-inline="yes-display-inline">Title XI of the National Security Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding at the end the following new section:</text>
              <quoted-block display-inline="no-display-inline" id="H254F19369EEB4AD887AA0D67F7C3EEA6" style="traditional">
                <section id="HF0BF676F40C24D06B6B05EB24AD2EF0E">
                  <enum>1104.</enum>
                  <header>Cyber threat intelligence and information sharing</header>
                  <subsection commented="no" display-inline="yes-display-inline" id="HD37C7E67A25D4AA3AC59171FBACD1877">
                    <enum>(a)</enum>
                    <header>Intelligence community sharing of cyber threat intelligence with private sector and utilities</header>
                    <paragraph id="HED20D8742C4D428B871A05E4A987AFE8">
                      <enum>(1)</enum>
                      <header>In general</header>
                      <text display-inline="yes-display-inline">The Director of National Intelligence shall establish procedures to allow elements of the intelligence community to share cyber threat intelligence with private-sector entities and utilities and to encourage the sharing of such intelligence.</text>
                    </paragraph>
                    <paragraph id="HCE0FC7FC5A644C3984A7AADE12C123B5">
                      <enum>(2)</enum>
                      <header>Sharing and use of classified intelligence</header>
                      <text>The procedures established under paragraph (1) shall provide that classified cyber threat intelligence may only be—</text>
                      <subparagraph commented="no" id="HDA4A5601839F44E0B8A78C33283131B7">
                        <enum>(A)</enum>
                        <text display-inline="yes-display-inline">shared by an element of the intelligence community with—</text>
                        <clause id="H9165E8A26E714B5A956526D87B96EE5D">
                          <enum>(i)</enum>
                          <text>a certified entity; or</text>
                        </clause>
                        <clause id="HBC70AD6D733C40D09327C31385EA2D84">
                          <enum>(ii)</enum>
                          <text>a person with an appropriate security clearance to receive such cyber threat intelligence;</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H40459AC2D8A548B5A8F7278ED05FB1D8">
                        <enum>(B)</enum>
                        <text>shared consistent with the need to protect the national security of the United States; and</text>
                      </subparagraph>
                      <subparagraph id="H24ECAFB5EA5F4CE1AD9922FB3BEF18ED">
                        <enum>(C)</enum>
                        <text display-inline="yes-display-inline">used by a certified entity in a manner which protects such cyber threat intelligence from unauthorized disclosure.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph commented="no" id="HF5A0A1E645CC429E8EF0753C76620B84">
                      <enum>(3)</enum>
                      <header>Security clearance approvals</header>
                      <text>The Director of National Intelligence shall issue guidelines providing that the head of an element of the intelligence community may, as the head of such element considers necessary to carry out this subsection—</text>
                      <subparagraph id="H61FEB8FDB0E24F0ABD0AEF97DBA82EB7">
                        <enum>(A)</enum>
                        <text>grant a security clearance on a temporary or permanent basis to an employee or officer of a certified entity;</text>
                      </subparagraph>
                      <subparagraph id="H9B0AC918FC6A4616B9A1DD70D37476C9">
                        <enum>(B)</enum>
                        <text>grant a security clearance on a temporary or permanent basis to a certified entity and approval to use appropriate facilities; and</text>
                      </subparagraph>
                      <subparagraph id="H09168CF6AAD84BEBBE9E8C0E768225D8">
                        <enum>(C)</enum>
                        <text>expedite the security clearance process for a person or entity as the head of such element considers necessary, consistent with the need to protect the national security of the United States.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HF2B0A07E09BB4072A94278D88D0404B1">
                      <enum>(4)</enum>
                      <header>No right or benefit</header>
                      <text display-inline="yes-display-inline">The provision of information to a private-sector entity or a utility under this subsection shall not create a right or benefit to similar information by such entity or such utility or any other private-sector entity or utility.</text>
                    </paragraph>
                    <paragraph id="HDBD38D2D98384CFB968F865C1B1D0229">
                      <enum>(5)</enum>
                      <header>Restriction on disclosure of cyber threat intelligence</header>
                      <text display-inline="yes-display-inline">Notwithstanding any other provision of law, a certified entity receiving cyber threat intelligence pursuant to this subsection shall not further disclose such cyber threat intelligence to another entity, other than to a certified entity or other appropriate agency or department of the Federal Government authorized to receive such cyber threat intelligence.</text>
                    </paragraph>
                  </subsection>
                  <subsection id="H428A9ED18B0D4F4AB62F93454193EF34">
                    <enum>(b)</enum>
                    <header>Use of cybersecurity systems and sharing of cyber threat information</header>
                    <paragraph id="H3A382DF6C6D74E228E324BF01A420E3D">
                      <enum>(1)</enum>
                      <header>In general</header>
                      <subparagraph commented="no" id="H38A6F8F11BC1442B82E4F479C7DE7C63">
                        <enum>(A)</enum>
                        <header>Cybersecurity providers</header>
                        <text>Notwithstanding any other provision of law, a cybersecurity provider, with the express consent of a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes, may, for cybersecurity purposes—</text>
                        <clause commented="no" id="HAAF2BAA2868441418B139F9FC79D617C">
                          <enum>(i)</enum>
                          <text display-inline="yes-display-inline">use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such protected entity; and</text>
                        </clause>
                        <clause commented="no" id="H9D3336C8B3BB42C7ACBDEF02C5774DE6">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">share such cyber threat information with any other entity designated by such protected entity, including, if specifically designated, the Federal Government.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H5E22176BBEE1468484088C4B73C4330F">
                        <enum>(B)</enum>
                        <header>Self-protected entities</header>
                        <text>Notwithstanding any other provision of law, a self-protected entity may, for cybersecurity purposes—</text>
                        <clause id="H0AF134840707491485575B00E3300B12">
                          <enum>(i)</enum>
                          <text display-inline="yes-display-inline">use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such self-protected entity; and</text>
                        </clause>
                        <clause id="HD1C73819519B47B4B1E6C4667567F524">
                          <enum>(ii)</enum>
                          <text>share such cyber threat information with any other entity, including the Federal Government.</text>
                        </clause>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H3393BF06BB9540079A2FBB76B1F54557" display-inline="no-display-inline">
                      <enum>(2)</enum>
                      <header>Sharing with the Federal Government</header>
                      <subparagraph id="HEFC22034524B455A9781528CAECD5781">
                        <enum>(A)</enum>
                        <header>Information shared with the National Cybersecurity and Communications Integration Center of the Department of Homeland Security</header>
                        <text>Subject to the use and protection of information requirements under paragraph (3), the head of a department or agency of the Federal Government receiving cyber threat information in accordance with paragraph (1) shall provide such cyber threat information in as close to real time as possible to the National Cybersecurity and Communications Integration Center of the Department of Homeland Security.</text>
                      </subparagraph>
                      <subparagraph id="HC5943F7447FB467DA5009029B47134F5">
                        <enum>(B)</enum>
                        <header>Request to share with another department or agency of the Federal Government</header>
                        <text>An entity sharing cyber threat information that is provided to the National Cybersecurity and Communications Integration Center of the Department of Homeland Security under subparagraph (A) or paragraph (1) may request the head of such Center to, and the head of such Center may, provide such information in as close to real time as possible to another department or agency of the Federal Government.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HD899AEA148434FB9B375C9F3880E341A">
                      <enum>(3)</enum>
                      <header>Use and protection of information</header>
                      <text>Cyber threat information shared in accordance with paragraph (1)—</text>
                      <subparagraph id="HF68A737AAFA54EC39E831CCAC070A013">
                        <enum>(A)</enum>
                        <text display-inline="yes-display-inline">shall only be shared in accordance with any restrictions placed on the sharing of such information by the protected entity or self-protected entity authorizing such sharing, including appropriate anonymization or minimization of such information and excluding limiting a department or agency of the Federal Government from sharing such information with another department or agency of the Federal Government in accordance with this section;</text>
                      </subparagraph>
                      <subparagraph id="HF8621033CC6C44FCBE4E40615C1AA90F">
                        <enum>(B)</enum>
                        <text>may not be used by an entity to gain an unfair competitive advantage to the detriment of the protected entity or the self-protected entity authorizing the sharing of information;</text>
                      </subparagraph>
                      <subparagraph id="H90562B9EEEAD48E9AB87B614D2F38D94" display-inline="no-display-inline">
                        <enum>(C)</enum>
                        <text display-inline="yes-display-inline">may only be used by a non-Federal recipient of such information for a cybersecurity purpose;</text>
                      </subparagraph>
                      <subparagraph id="H9411F47DD811412F8D8265E4210837D0">
                        <enum>(D)</enum>
                        <text>if shared with the Federal Government—</text>
                        <clause id="HC7ABB630F8B24383A2965086A0F3DBE1">
                          <enum>(i)</enum>
                          <text display-inline="yes-display-inline">shall be exempt from disclosure under section 552 of title 5, United States Code (commonly known as the <quote>Freedom of Information Act</quote>);</text>
                        </clause>
                        <clause commented="no" id="HC81FE61316E34F9093AD6A87782BF464">
                          <enum>(ii)</enum>
                          <text>shall be considered proprietary information and shall not be disclosed to an entity outside of the Federal Government except as authorized by the entity sharing such information;</text>
                        </clause>
                        <clause id="H4ACE48C0D5C54B1F81FD6090B501296F">
                          <enum>(iii)</enum>
                          <text>shall not be used by the Federal Government for regulatory purposes;</text>
                        </clause>
                        <clause id="H50892C2CF90D4F18AC541A63B9B2D75A">
                          <enum>(iv)</enum>
                          <text display-inline="yes-display-inline">shall not be provided by the department or agency of the Federal Government receiving such cyber threat information to another department or agency of the Federal Government under paragraph (2)(A) if—</text>
                          <subclause id="HC085204C770A419EAE68096557003225">
                            <enum>(I)</enum>
                            <text display-inline="yes-display-inline">the entity providing such information determines that the provision of such information will undermine the purpose for which such information is shared; or</text>
                          </subclause>
                          <subclause id="H446CB864456049CCB4D89E2CB1814604">
                            <enum>(II)</enum>
                            <text>unless otherwise directed by the President, the head of the department or agency of the Federal Government receiving such cyber threat information determines that the provision of such information will undermine the purpose for which such information is shared; and</text>
                          </subclause>
                        </clause>
                        <clause id="HE61AFCDC2CD24A6890B0B67596DAF517">
                          <enum>(v)</enum>
                          <text>shall be handled by the Federal Government consistent with the need to protect sources and methods and the national security of the United States; and</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H8346320B47C349D5AC03AC7FFC88C218" display-inline="no-display-inline">
                        <enum>(E)</enum>
                        <text display-inline="yes-display-inline">shall be exempt from disclosure under a State, local, or tribal law or regulation that requires public disclosure of information by a public or quasi-public entity.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H9369D756BC5F4EF69FF81DBDB399B637">
                      <enum>(4)</enum>
                      <header>Exemption from liability</header>
                      <subparagraph id="H0437A6DECB244200BA8F9164C417386F">
                        <enum>(A)</enum>
                        <header>Exemption</header>
                        <text>No civil or criminal cause of action shall lie or be maintained in Federal or State court against a protected entity, self-protected entity, cybersecurity provider, or an officer, employee, or agent of a protected entity, self-protected entity, or cybersecurity provider, acting in good faith—</text>
                        <clause id="H8A849222B4364B178994E1C311A8FE26">
                          <enum>(i)</enum>
                          <text display-inline="yes-display-inline">for using cybersecurity systems to identify or obtain cyber threat information or for sharing such information in accordance with this section; or</text>
                        </clause>
                        <clause id="H54BC084C2713476D840F9D14FBB93033">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">for decisions made for cybersecurity purposes and based on cyber threat information identified, obtained, or shared under this section.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="HA253471C6E4C4EA7B3290776D4543DF4" display-inline="no-display-inline">
                        <enum>(B)</enum>
                        <header>Lack of good faith</header>
                        <text display-inline="yes-display-inline">For purposes of the exemption from liability under subparagraph (A), a lack of good faith includes any act or omission taken with intent to injure, defraud, or otherwise endanger any individual, government entity, private entity, or utility.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph commented="no" id="H48CFF1B0D0AA46E88407C42931D56678">
                      <enum>(5)</enum>
                      <header>Relationship to other laws requiring the disclosure of information</header>
                      <text>The submission of information under this subsection to the Federal Government shall not satisfy or affect—</text>
                      <subparagraph id="HD77592586F95440788D37D9F7338B258">
                        <enum>(A)</enum>
                        <text display-inline="yes-display-inline">any requirement under any other provision of law for a person or entity to provide information to the Federal Government; or</text>
                      </subparagraph>
                      <subparagraph id="H7029D62D35DA4DFA9C22984D48CC750C">
                        <enum>(B)</enum>
                        <text display-inline="yes-display-inline">the applicability of other provisions of law, including section 552 of title 5, United States Code (commonly known as the <quote>Freedom of Information Act</quote>), with respect to information required to be provided to the Federal Government under such other provision of law.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HEB2A11C893EB4EC39FE03425F07271B4">
                      <enum>(6)</enum>
                      <header>Rule of construction</header>
                      <text display-inline="yes-display-inline">Nothing in this subsection shall be construed to provide new authority to—</text>
                      <subparagraph id="HC166FFF217F5451EBDB1A750C3A24987">
                        <enum>(A)</enum>
                        <text>a cybersecurity provider to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes; or</text>
                      </subparagraph>
                      <subparagraph id="H8BEB17E64BA24C12AFA78DE8EBF8696A">
                        <enum>(B)</enum>
                        <text display-inline="yes-display-inline">a self-protected entity to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by such self-protected entity.</text>
                      </subparagraph>
                    </paragraph>
                  </subsection>
                  <subsection id="H12BD4CBED0724BA4BD455F43A271636E">
                    <enum>(c)</enum>
                    <header>Federal Government use of information</header>
                    <paragraph id="H5976DF279AD94C50A5384E11E7772DD0">
                      <enum>(1)</enum>
                      <header>Limitation</header>
                      <text display-inline="yes-display-inline">The Federal Government may use cyber threat information shared with the Federal Government in accordance with subsection (b)—</text>
                      <subparagraph id="HCD9FCEE599F64A76B147E7A415F5F6BC">
                        <enum>(A)</enum>
                        <text>for cybersecurity purposes;</text>
                      </subparagraph>
                      <subparagraph id="HCB2FC7714EEF471C897139D38B1B0D87">
                        <enum>(B)</enum>
                        <text>for the investigation and prosecution of cybersecurity crimes;</text>
                      </subparagraph>
                      <subparagraph id="H3CE14AAA78C34DA4B7D6C6895619FC48">
                        <enum>(C)</enum>
                        <text>for the protection of individuals from the danger of death or serious bodily harm and the investigation and prosecution of crimes involving such danger of death or serious bodily harm; or</text>
                      </subparagraph>
                      <subparagraph id="HF7A666E9F1074A7F9ABCEA103B5E553E">
                        <enum>(D)</enum>
                        <text display-inline="yes-display-inline">for the protection of minors from child pornography, any risk of sexual exploitation, and serious threats to the physical safety of minors, including kidnapping and trafficking and the investigation and prosecution of crimes involving child pornography, any risk of sexual exploitation, and serious threats to the physical safety of minors, including kidnapping and trafficking, and any crime referred to in section 2258A(a)(2) of title 18, United States Code.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H278A22AD239244488FB9BBBDC89C6FB4">
                      <enum>(2)</enum>
                      <header>Affirmative search restriction</header>
                      <text>The Federal Government may not affirmatively search cyber threat information shared with the Federal Government under subsection (b) for a purpose other than a purpose referred to in paragraph (1).</text>
                    </paragraph>
                    <paragraph id="H6B2DFE0F7CFC414C92F2F66F3F6292C4">
                      <enum>(3)</enum>
                      <header>Anti-tasking restriction</header>
                      <text>Nothing in this section shall be construed to permit the Federal Government to—</text>
                      <subparagraph id="H359417DEDEC3408EBE12436C4407C4D3">
                        <enum>(A)</enum>
                        <text>require a private-sector entity or utility to share information with the Federal Government; or</text>
                      </subparagraph>
                      <subparagraph id="HFA873667F46A4DCBBCE62EFB6CF4A8C4">
                        <enum>(B)</enum>
                        <text>condition the sharing of cyber threat intelligence with a private-sector entity or utility on the provision of cyber threat information to the Federal Government.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H0D1EAE6A6E5D43B6A14463F4FD53BBD2" commented="no">
                      <enum>(4)</enum>
                      <header>Protection of sensitive personal documents</header>
                      <text display-inline="yes-display-inline">The Federal Government may not use the following information, containing information that identifies a person, shared with the Federal Government in accordance with subsection (b) unless such information is used in accordance with the policies and procedures established under paragraph (7):</text>
                      <subparagraph id="H72B73956CD1E4FD78368142FD9CB6C08" commented="no">
                        <enum>(A)</enum>
                        <text>Library circulation records.</text>
                      </subparagraph>
                      <subparagraph id="HCDB646EC595446BF8B071C46AB2F2E07" commented="no">
                        <enum>(B)</enum>
                        <text>Library patron lists.</text>
                      </subparagraph>
                      <subparagraph id="H500EA31D4FB14C74878EDB609EBA8A52" commented="no">
                        <enum>(C)</enum>
                        <text>Book sales records.</text>
                      </subparagraph>
                      <subparagraph id="HC7924C772B5E4164AF5C1549E4E1C082" commented="no">
                        <enum>(D)</enum>
                        <text>Book customer lists.</text>
                      </subparagraph>
                      <subparagraph id="H879F8FF0D8AA478BBCF27BD528AA77EB" commented="no">
                        <enum>(E)</enum>
                        <text>Firearms sales records.</text>
                      </subparagraph>
                      <subparagraph id="H03930ED5E04F419AB0DBDF017A6283A7" commented="no">
                        <enum>(F)</enum>
                        <text>Tax return records.</text>
                      </subparagraph>
                      <subparagraph id="H3A6CCC9E6F9D448D931BFACB86017643" commented="no">
                        <enum>(G)</enum>
                        <text>Educational records.</text>
                      </subparagraph>
                      <subparagraph id="H3C99D1EED9764726887AEED1FC7418F9" commented="no">
                        <enum>(H)</enum>
                        <text>Medical records.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H48EC0F0CD2404F8989063A2CFA943C8F">
                      <enum>(5)</enum>
                      <header>Notification of non-cyber threat information</header>
                      <text display-inline="yes-display-inline">If a department or agency of the Federal Government receiving information pursuant to subsection (b)(1) determines that such information is not cyber threat information, such department or agency shall notify the entity or provider sharing such information pursuant to subsection (b)(1).</text>
                    </paragraph>
                    <paragraph id="HE620FB03DA394A9183FE89293968C864">
                      <enum>(6)</enum>
                      <header>Retention and use of cyber threat information</header>
                      <text display-inline="yes-display-inline">No department or agency of the Federal Government shall retain or use information shared pursuant to subsection (b)(1) for any use other than a use permitted under subsection (c)(1). </text>
                    </paragraph>
                    <paragraph id="H5DEBE659EA544C47BAAB5B6F8FFE839A">
                      <enum>(7)</enum>
                      <header>Privacy and civil liberties</header>
                      <subparagraph id="HBE5C37EEC1B7423C9193F0CEBA272C2C">
                        <enum>(A)</enum>
                        <header>Policies and procedures</header>
                        <text>The Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, shall establish and periodically review policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the Federal Government in accordance with subsection (b)(1). Such policies and procedures shall, consistent with the need to protect systems and networks from cyber threats and mitigate cyber threats in a timely manner—</text>
                        <clause id="H16CB72416C1E4C36A59752B3EE941E79">
                          <enum>(i)</enum>
                          <text>minimize the impact on privacy and civil liberties;</text>
                        </clause>
                        <clause id="H2762E0EB9BC24F07BFF3B749CC5D7310">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">reasonably limit the receipt, retention, use, and disclosure of cyber threat information associated with specific persons that is not necessary to protect systems or networks from cyber threats or mitigate cyber threats in a timely manner;</text>
                        </clause>
                        <clause id="H3CDA992635844E77B5A2F7630099268C">
                          <enum>(iii)</enum>
                          <text>include requirements to safeguard non-publicly available cyber threat information that may be used to identify specific persons from unauthorized access or acquisition;</text>
                        </clause>
                        <clause id="HF1A65E688E2E4FC1A52C29458EC8B10B">
                          <enum>(iv)</enum>
                          <text>protect the confidentiality of cyber threat information associated with specific persons to the greatest extent practicable; and</text>
                        </clause>
                        <clause id="HF96A374223274B7CB8AC21B464668577">
                          <enum>(v)</enum>
                          <text display-inline="yes-display-inline">not delay or impede the flow of cyber threat information necessary to defend against or mitigate a cyber threat.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H67EA779E91E0479D8CCDC3AA66E23BB6">
                        <enum>(B)</enum>
                        <header>Submission to Congress</header>
                        <text>The Director of National Intelligence shall, consistent with the need to protect sources and methods, submit to Congress the policies and procedures required under subparagraph (A) and any updates to such policies and procedures.</text>
                      </subparagraph>
                      <subparagraph id="HF81803B324F44179B36034DB037ECBB4">
                        <enum>(C)</enum>
                        <header>Implementation</header>
                        <text>The head of each department or agency of the Federal Government receiving cyber threat information shared with the Federal Government under subsection (b)(1) shall—</text>
                        <clause id="H94D49D29A9504492B8F411DFDB59A051">
                          <enum>(i)</enum>
                          <text>implement the policies and procedures established under subparagraph (A); and</text>
                        </clause>
                        <clause id="HDD865AF88F1A46838F68677FBEF37C10">
                          <enum>(ii)</enum>
                          <text>promptly notify the Director of National Intelligence, the Attorney General, and the congressional intelligence committees of any significant violations of such policies and procedures.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H28E9362DE58241B5B48681B80696C025">
                        <enum>(D)</enum>
                        <header>Oversight</header>
                        <text>The Director of National Intelligence, in consultation with the Attorney General, the Secretary of Homeland Security, and the Secretary of Defense, shall establish a program to monitor and oversee compliance with the policies and procedures established under subparagraph (A).</text>
                      </subparagraph>
                    </paragraph>
                  </subsection>
                  <subsection id="HBAA5400BA7BC428CA778798F37526A1E" display-inline="no-display-inline">
                    <enum>(d)</enum>
                    <header>Federal Government liability for violations of restrictions on the disclosure, use, and protection of voluntarily shared information</header>
                    <paragraph id="H6622765D105E4CAF9204E4A96A2736A4">
                      <enum>(1)</enum>
                      <header>In general</header>
                      <text>If a department or agency of the Federal Government intentionally or willfully violates subsection (b)(3)(D) or subsection (c) with respect to the disclosure, use, or protection of voluntarily shared cyber threat information shared under this section, the United States shall be liable to a person adversely affected by such violation in an amount equal to the sum of—</text>
                      <subparagraph id="H09E2D3A30AE9448CBB162CD6A9B1E723">
                        <enum>(A)</enum>
                        <text>the actual damages sustained by the person as a result of the violation or $1,000, whichever is greater; and</text>
                      </subparagraph>
                      <subparagraph id="H6147A5EFC55A4841BB1FA088BC87F596">
                        <enum>(B)</enum>
                        <text>the costs of the action together with reasonable attorney fees as determined by the court.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HF5AB41C474F4439D9CFFD424B6382D60">
                      <enum>(2)</enum>
                      <header>Venue</header>
                      <text>An action to enforce liability created under this subsection may be brought in the district court of the United States in—</text>
                      <subparagraph id="H9194A258FAFF4940BEC19B4556EF5278">
                        <enum>(A)</enum>
                        <text>the district in which the complainant resides;</text>
                      </subparagraph>
                      <subparagraph id="H76E78238153B48CB885395765CCA4CE7">
                        <enum>(B)</enum>
                        <text>the district in which the principal place of business of the complainant is located;</text>
                      </subparagraph>
                      <subparagraph id="H38F248136BC940B28D1B67D0DE4891CB">
                        <enum>(C)</enum>
                        <text>the district in which the department or agency of the Federal Government that disclosed the information is located; or</text>
                      </subparagraph>
                      <subparagraph id="HBB1C7C34822240DFBD6D4FA8914084DC">
                        <enum>(D)</enum>
                        <text>the District of Columbia.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H1EE57B1A03344CF292380C84AD4C8C87">
                      <enum>(3)</enum>
                      <header>Statute of limitations</header>
                      <text display-inline="yes-display-inline">No action shall lie under this subsection unless such action is commenced not later than two years after the date of the violation of subsection (b)(3)(D) or subsection (c) that is the basis for the action.</text>
                    </paragraph>
                    <paragraph id="HDFAA6A88C81E40A7841FACBA026D4BD7">
                      <enum>(4)</enum>
                      <header>Exclusive cause of action</header>
                      <text display-inline="yes-display-inline">A cause of action under this subsection shall be the exclusive means available to a complainant seeking a remedy for a violation of subsection (b)(3)(D) or subsection (c).</text>
                    </paragraph>
                  </subsection>
                  <subsection id="H5BBC3DF28DA54CCE8EB700C52AEA5F82">
                    <enum>(e)</enum>
                    <header>Reports on information sharing</header>
                    <paragraph id="HE3986B0BB60C406DA408404FBA703F22">
                      <enum>(1)</enum>
                      <header>Inspector General report</header>
                      <text display-inline="yes-display-inline">The Inspector General of the Intelligence Community, in consultation with the Inspector General of the Department of Justice, the Inspector General of the Department of Defense, and the Privacy and Civil Liberties Oversight Board, shall annually submit to the congressional intelligence committees a report containing a review of the use of information shared with the Federal Government under this section, including—</text>
                      <subparagraph id="HFE74C054BFD341E29B422B4A26695A0F">
                        <enum>(A)</enum>
                        <text>a review of the use by the Federal Government of such information for a purpose other than a cybersecurity purpose;</text>
                      </subparagraph>
                      <subparagraph id="HA1EE3F3F30074AD488EF2592DC5C826D">
                        <enum>(B)</enum>
                        <text>a review of the type of information shared with the Federal Government under this section;</text>
                      </subparagraph>
                      <subparagraph id="H6D21FCF3923F4BC2A5570FC30C8A6610">
                        <enum>(C)</enum>
                        <text>a review of the actions taken by the Federal Government based on such information;</text>
                      </subparagraph>
                      <subparagraph id="H195A3AC30A3D4C188EBA27160F6CE16C">
                        <enum>(D)</enum>
                        <text>appropriate metrics to determine the impact of the sharing of such information with the Federal Government on privacy and civil liberties, if any;</text>
                      </subparagraph>
                      <subparagraph id="H8D71CF0DFEA7406CA529DE14BE034FCA" commented="no">
                        <enum>(E)</enum>
                        <text display-inline="yes-display-inline">a list of the departments or agencies receiving such information;</text>
                      </subparagraph>
                      <subparagraph id="H8DA31EF961F1417C8CAEA1FFC6F9E3B3">
                        <enum>(F)</enum>
                        <text>a review of the sharing of such information within the Federal Government to identify inappropriate stovepiping of shared information; and</text>
                      </subparagraph>
                      <subparagraph id="H926C63114901424EB7A2C5CC23C45CD2">
                        <enum>(G)</enum>
                        <text>any recommendations of the Inspector General for improvements or modifications to the authorities under this section.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HFBB9CEC3BE47438DAFE4604740509E60">
                      <enum>(2)</enum>
                      <header>Privacy and civil liberties officers report</header>
                      <text display-inline="yes-display-inline">The Civil Liberties Protection Officer of the Office of the Director of National Intelligence and the Chief Privacy and Civil Liberties Officer of the Department of Justice, in consultation with the Privacy and Civil Liberties Oversight Board, the Inspector General of the Intelligence Community, and the senior privacy and civil liberties officer of each department or agency of the Federal Government that receives cyber threat information shared with the Federal Government under this section, shall annually and jointly submit to Congress a report assessing the privacy and civil liberties impact of the activities conducted by the Federal Government under this section. Such report shall include any recommendations the Civil Liberties Protection Officer and Chief Privacy and Civil Liberties Officer consider appropriate to minimize or mitigate the privacy and civil liberties impact of the sharing of cyber threat information under this section.</text>
                    </paragraph>
                    <paragraph id="H9C676C09D50346588B8857CB37A361BF">
                      <enum>(3)</enum>
                      <header>Form</header>
                      <text>Each report required under paragraph (1) or (2) shall be submitted in unclassified form, but may include a classified annex.</text>
                    </paragraph>
                  </subsection>
                  <subsection id="H4802E9B3D5B14F4FBECD76BB2BF71C19">
                    <enum>(f)</enum>
                    <header>Federal preemption</header>
                    <text>This section supersedes any statute of a State or political subdivision of a State that restricts or otherwise expressly regulates an activity authorized under subsection (b).</text>
                  </subsection>
                  <subsection id="HD2AC02CBA1C94B63A296E6980DE10D8C">
                    <enum>(g)</enum>
                    <header>Savings clauses</header>
                    <paragraph id="H5DAAAFF77B95407681AF5A02499971F4">
                      <enum>(1)</enum>
                      <header>Existing authorities</header>
                      <text>Nothing in this section shall be construed to limit any other authority to use a cybersecurity system or to identify, obtain, or share cyber threat intelligence or cyber threat information.</text>
                    </paragraph>
                    <paragraph id="H16F4692C163E473D8500F0EC05C16C10">
                      <enum>(2)</enum>
                      <header>Limitation on military and intelligence community involvement in private and public sector cybersecurity efforts</header>
                      <text display-inline="yes-display-inline">Nothing in this section shall be construed to provide additional authority to, or modify an existing authority of, the Department of Defense or the National Security Agency or any other element of the intelligence community to control, modify, require, or otherwise direct the cybersecurity efforts of a private-sector entity or a component of the Federal Government or a State, local, or tribal government.</text>
                    </paragraph>
                    <paragraph id="H2F348675CB0D4958B6A90168EC9DC703">
                      <enum>(3)</enum>
                      <header>Information sharing relationships</header>
                      <text>Nothing in this section shall be construed to—</text>
                      <subparagraph id="H78FEB88DAE274EE6AF7B4696AA5DA1CC">
                        <enum>(A)</enum>
                        <text>limit or modify an existing information sharing relationship;</text>
                      </subparagraph>
                      <subparagraph id="HD0130CDD162E443D849438BFA08CB4EC">
                        <enum>(B)</enum>
                        <text>prohibit a new information sharing relationship;</text>
                      </subparagraph>
                      <subparagraph id="H96544CD640464B8E8E7743324C895DCD">
                        <enum>(C)</enum>
                        <text>require a new information sharing relationship between the Federal Government and a private-sector entity or utility;</text>
                      </subparagraph>
                      <subparagraph id="H2F8E5E0DBD5F46D596715E730B9D0E9C">
                        <enum>(D)</enum>
                        <text>modify the authority of a department or agency of the Federal Government to protect sources and methods and the national security of the United States; or</text>
                      </subparagraph>
                      <subparagraph id="H218C879A284D4DF79096E1F56C7EA306">
                        <enum>(E)</enum>
                        <text display-inline="yes-display-inline">preclude the Federal Government from requiring an entity to report significant cyber incidents if authorized or required to do so under another provision of law.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H0FE5FFEDC102427FB5FEB27EFEB55640">
                      <enum>(4)</enum>
                      <header>Limitation on Federal Government use of cybersecurity systems</header>
                      <text display-inline="yes-display-inline">Nothing in this section shall be construed to provide additional authority to, or modify an existing authority of, any entity to use a cybersecurity system owned or controlled by the Federal Government on a private-sector system or network to protect such private-sector system or network.</text>
                    </paragraph>
                    <paragraph id="HFD1B3C7613854F209E2E97B8D54DD708" commented="no">
                      <enum>(5)</enum>
                      <header>No liability for non-participation</header>
                      <text display-inline="yes-display-inline">Nothing in this section shall be construed to subject a protected entity, self-protected entity, cyber security provider, or an officer, employee, or agent of a protected entity, self-protected entity, or cybersecurity provider, to liability for choosing not to engage in the voluntary activities authorized under this section.</text>
                    </paragraph>
                    <paragraph id="HD05A1C9E71CD4F23BC6632CA4C41C6CE">
                      <enum>(6)</enum>
                      <header>Use and retention of information</header>
                      <text display-inline="yes-display-inline">Nothing in this section shall be construed to authorize, or to modify any existing authority of, a department or agency of the Federal Government to retain or use information shared pursuant to subsection (b)(1) for any use other than a use permitted under subsection (c)(1).</text>
                    </paragraph>
                  </subsection>
                  <subsection id="H560FD44B560943D1B5CBC64575764EDE">
                    <enum>(h)</enum>
                    <header>Definitions</header>
                    <text>In this section:</text>
                    <paragraph id="H475A9F0F156E4714B56F4396C9A96666">
                      <enum>(1)</enum>
                      <header>Availability</header>
                      <text display-inline="yes-display-inline">The term <quote>availability</quote> means ensuring timely and reliable access to and use of information.</text>
                    </paragraph>
                    <paragraph id="HD53AED7437094AA6ACEE67814D66BE0E">
                      <enum>(2)</enum>
                      <header>Certified entity</header>
                      <text>The term <term>certified entity</term> means a protected entity, self-protected entity, or cybersecurity provider that—</text>
                      <subparagraph commented="no" id="H04AD88567ADB427E9C373B91858B1232">
                        <enum>(A)</enum>
                        <text>possesses or is eligible to obtain a security clearance, as determined by the Director of National Intelligence; and</text>
                      </subparagraph>
                      <subparagraph id="HBD8ACFC00A65426D9875F9820604D8E9">
                        <enum>(B)</enum>
                        <text>is able to demonstrate to the Director of National Intelligence that such provider or such entity can appropriately protect classified cyber threat intelligence.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HFD25B85806814650BD31DB23FDDE14DE">
                      <enum>(3)</enum>
                      <header>Confidentiality</header>
                      <text display-inline="yes-display-inline">The term <quote>confidentiality</quote> means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.</text>
                    </paragraph>
                    <paragraph id="HBE210486CE8A45C3AD5839EFBA11B7A4">
                      <enum>(4)</enum>
                      <header>Cyber threat information</header>
                      <subparagraph id="HCD1122E4EA6E40D19A31CCC05732E76F">
                        <enum>(A)</enum>
                        <header>In General</header>
                        <text>The term <quote>cyber threat information</quote> means information directly pertaining to—</text>
                        <clause id="H7FB35917939B4B8EBF993FD518FEBF6E">
                          <enum>(i)</enum>
                          <text>a vulnerability of a system or network of a government or private entity or utility;</text>
                        </clause>
                        <clause id="H5F80996EC9834F38BEBFDA192A765108">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity or utility or any information stored on, processed on, or transiting such a system or network;</text>
                        </clause>
                        <clause id="HEBF1F31512C44EF8B81BDA7AE6ED148F">
                          <enum>(iii)</enum>
                          <text display-inline="yes-display-inline">efforts to deny access to or degrade, disrupt, or destroy a system or network of a government or private entity or utility; or</text>
                        </clause>
                        <clause id="HD1E7D29596C44FE9B3FCF096A9734B33">
                          <enum>(iv)</enum>
                          <text display-inline="yes-display-inline">efforts to gain unauthorized access to a system or network of a government or private entity or utility, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network of a government or private entity or utility.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="HF8D0590B136242588CB7B89E2EDFBBCF">
                        <enum>(B)</enum>
                        <header>Exclusion</header>
                        <text>Such term does not include information pertaining to efforts to gain unauthorized access to a system or network of a government or private entity or utility that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H201329DDEA4B48AAB9A7C2438FACE38A">
                      <enum>(5)</enum>
                      <header>Cyber threat intelligence</header>
                      <subparagraph id="H2216A22FA62C4EFB902E6C284AAD96B0">
                        <enum>(A)</enum>
                        <header>In general</header>
                        <text>The term <quote>cyber threat intelligence</quote> means intelligence in the possession of an element of the intelligence community directly pertaining to—</text>
                        <clause id="H2F343E64A86D403EA59B6978BCAEDF55">
                          <enum>(i)</enum>
                          <text>a vulnerability of a system or network of a government or private entity or utility;</text>
                        </clause>
                        <clause id="H01BEBCCB3C7D455CAF505852464DCD61">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity or utility or any information stored on, processed on, or transiting such a system or network;</text>
                        </clause>
                        <clause id="H2CECFE4E5D5243BAB87B8A1F5F16FCB6">
                          <enum>(iii)</enum>
                          <text display-inline="yes-display-inline">efforts to deny access to or degrade, disrupt, or destroy a system or network of a government or private entity or utility; or</text>
                        </clause>
                        <clause id="HC1F8C04D4DA344C5A5BCA6CA8A79A0DA">
                          <enum>(iv)</enum>
                          <text display-inline="yes-display-inline">efforts to gain unauthorized access to a system or network of a government or private entity or utility, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network of a government or private entity or utility.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="HCBF31A498BFF4642BE8023544D80E46B" display-inline="no-display-inline">
                        <enum>(B)</enum>
                        <header>Exclusion</header>
                        <text>Such term does not include intelligence pertaining to efforts to gain unauthorized access to a system or network of a government or private entity or utility that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H34CCAF3A0491483BB8D38C8AE9F25BFC">
                      <enum>(6)</enum>
                      <header>Cybersecurity crime</header>
                      <text display-inline="yes-display-inline">The term <quote>cybersecurity crime</quote> means—</text>
                      <subparagraph id="H77FE8BC84886470C8344A18D2DDE54F9">
                        <enum>(A)</enum>
                        <text>a crime under a Federal or State law that involves—</text>
                        <clause id="H3251E41AE2BE4C8CB016CB26D53475D9">
                          <enum>(i)</enum>
                          <text>efforts to deny access to or degrade, disrupt, or destroy a system or network;</text>
                        </clause>
                        <clause id="HAD57887087B34CC4950BB3DDB50A8917">
                          <enum>(ii)</enum>
                          <text>efforts to gain unauthorized access to a system or network; or</text>
                        </clause>
                        <clause id="HEB64CAE5427143CA90C3AFB17DC1F578">
                          <enum>(iii)</enum>
                          <text>efforts to exfiltrate information from a system or network without authorization; or</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H4618C2C6A52D48128C995E52426E715A">
                        <enum>(B)</enum>
                        <text>the violation of a provision of Federal law relating to computer crimes, including a violation of any provision of title 18, United States Code, created or amended by the Computer Fraud and Abuse Act of 1986 (Public Law 99–474).</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="H17405CD4130C44CC9BEA2919BE6701C7">
                      <enum>(7)</enum>
                      <header>Cybersecurity provider</header>
                      <text>The term <term>cybersecurity provider</term> means a non-Federal entity that provides goods or services intended to be used for cybersecurity purposes.</text>
                    </paragraph>
                    <paragraph id="H30ACDD0CE71D4827A282298FF64A804F">
                      <enum>(8)</enum>
                      <header>Cybersecurity purpose</header>
                      <subparagraph id="H01FD541660FF432581B246E56E29041F">
                        <enum>(A)</enum>
                        <header>In general</header>
                        <text display-inline="yes-display-inline">The term <quote>cybersecurity purpose</quote> means the purpose of ensuring the integrity, confidentiality, or availability of, or safeguarding, a system or network, including protecting a system or network from—</text>
                        <clause id="H05D4DAF17D5844CBA098A9D8C0133038">
                          <enum>(i)</enum>
                          <text>a vulnerability of a system or network;</text>
                        </clause>
                        <clause id="H3D16B92B8DCA467B8CD9F7DB94A088A3">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">a threat to the integrity, confidentiality, or availability of a system or network or any information stored on, processed on, or transiting such a system or network;</text>
                        </clause>
                        <clause id="H400D267E7151434F80410A3FFEBC8D70">
                          <enum>(iii)</enum>
                          <text display-inline="yes-display-inline">efforts to deny access to or degrade, disrupt, or destroy a system or network; or</text>
                        </clause>
                        <clause id="H00BB87A741984C41A153062478467BD3">
                          <enum>(iv)</enum>
                          <text display-inline="yes-display-inline">efforts to gain unauthorized access to a system or network, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="H9F706DA916AC4D3EA1E8B95E3BC48B12">
                        <enum>(B)</enum>
                        <header>Exclusion</header>
                        <text>Such term does not include the purpose of protecting a system or network from efforts to gain unauthorized access to such system or network that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HB647F401059E4162B376789CE9AAE09B" display-inline="no-display-inline">
                      <enum>(9)</enum>
                      <header>Cybersecurity system</header>
                      <subparagraph id="H2AA63FF70B7041A995C5F8CD33AB9BE4">
                        <enum>(A)</enum>
                        <header>In general</header>
                        <text display-inline="yes-display-inline">The term <quote>cybersecurity system</quote> means a system designed or employed to ensure the integrity, confidentiality, or availability of, or safeguard, a system or network, including protecting a system or network from—</text>
                        <clause id="H609844ABED514631B3E770F2A6F5B3AD">
                          <enum>(i)</enum>
                          <text>a vulnerability of a system or network;</text>
                        </clause>
                        <clause id="HB4C47DB9A9834B69B4B22386F8EA1AB8">
                          <enum>(ii)</enum>
                          <text display-inline="yes-display-inline">a threat to the integrity, confidentiality, or availability of a system or network or any information stored on, processed on, or transiting such a system or network;</text>
                        </clause>
                        <clause id="HDC24AB936FCA46EEA1A36C72F666BD30">
                          <enum>(iii)</enum>
                          <text display-inline="yes-display-inline">efforts to deny access to or degrade, disrupt, or destroy a system or network; or</text>
                        </clause>
                        <clause id="H433929DD01C648B48232CC8E113570ED">
                          <enum>(iv)</enum>
                          <text display-inline="yes-display-inline">efforts to gain unauthorized access to a system or network, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network.</text>
                        </clause>
                      </subparagraph>
                      <subparagraph id="HE0AE6A52FA484F588913D1A42ABBD42F">
                        <enum>(B)</enum>
                        <header>Exclusion</header>
                        <text>Such term does not include a system designed or employed to protect a system or network from efforts to gain unauthorized access to such system or network that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access.</text>
                      </subparagraph>
                    </paragraph>
                    <paragraph id="HF9A7048A26F746ACB91336AD48C3E9FD">
                      <enum>(10)</enum>
                      <header>Integrity</header>
                      <text display-inline="yes-display-inline">The term <quote>integrity</quote> means guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.</text>
                    </paragraph>
                    <paragraph id="H1C100E56B438409196A65205974CDF7A">
                      <enum>(11)</enum>
                      <header>Protected entity</header>
                      <text>The term <term>protected entity</term> means an entity, other than an individual, that contracts with a cybersecurity provider for goods or services to be used for cybersecurity purposes.</text>
                    </paragraph>
                    <paragraph commented="no" id="H3B3F2A36002046E0BF4D2E9EFDA51AC1">
                      <enum>(12)</enum>
                      <header>Self-protected entity</header>
                      <text>The term <term>self-protected entity</term> means an entity, other than an individual, that provides goods or services for cybersecurity purposes to itself.</text>
                    </paragraph>
                    <paragraph id="H06A636FBEB824B0A830D884BCD3113BB" display-inline="no-display-inline">
                      <enum>(13)</enum>
                      <header>Utility</header>
                      <text display-inline="yes-display-inline">The term <term>utility</term> means an entity providing essential services (other than law enforcement or regulatory services), including electricity, natural gas, propane, telecommunications, transportation, water, or wastewater services.</text>
                    </paragraph>
                  </subsection>
                </section>
                <after-quoted-block>.</after-quoted-block>
              </quoted-block>
            </subsection>
            <subsection id="H5E9C55E692EF4B278152C27545F18377">
              <enum>(b)</enum>
              <header>Procedures and guidelines</header>
              <text>The Director of National Intelligence shall—</text>
              <paragraph id="HFFCEE23CCAC34BAAA78CAD2B20A6936A">
                <enum>(1)</enum>
                <text display-inline="yes-display-inline">not later than 60 days after the date of the enactment of this Act, establish procedures under paragraph (1) of section 1104(a) of the National Security Act of 1947, as added by subsection (a) of this section, and issue guidelines under paragraph (3) of such section 1104(a);</text>
              </paragraph>
              <paragraph id="H953F56C0639B4B4BBF013991454E30AE" display-inline="no-display-inline">
                <enum>(2)</enum>
                <text display-inline="yes-display-inline">in establishing such procedures and issuing such guidelines, consult with the Secretary of Homeland Security to ensure that such procedures and such guidelines permit the owners and operators of critical infrastructure to receive all appropriate cyber threat intelligence (as defined in section 1104(h)(5) of such Act, as added by subsection (a)) in the possession of the Federal Government; and</text>
              </paragraph>
              <paragraph commented="no" id="H1085893E437149D69147CC964CFB2482">
                <enum>(3)</enum>
                <text>following the establishment of such procedures and the issuance of such guidelines, expeditiously distribute such procedures and such guidelines to appropriate departments and agencies of the Federal Government, private-sector entities, and utilities (as defined in section 1104(h)(13) of such Act, as added by subsection (a)).</text>
              </paragraph>
            </subsection>
            <subsection id="H49F70BB1E3DB42AE87F3054AD76342BF" display-inline="no-display-inline">
              <enum>(c)</enum>
              <header>Privacy and civil liberties policies and procedures</header>
              <text>Not later than 60 days after the date of the enactment of this Act, the Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, shall establish the policies and procedures required under section 1104(c)(7)(A) of the National Security Act of 1947, as added by subsection (a) of this section.</text>
            </subsection>
            <subsection id="HEB194AA102144622A6DE4FA77887546B">
              <enum>(d)</enum>
              <header>Initial reports</header>
              <text>The first reports required to be submitted under paragraphs (1) and (2) of subsection (e) of section 1104 of the National Security Act of 1947, as added by subsection (a) of this section, shall be submitted not later than 1 year after the date of the enactment of this Act.</text>
            </subsection>
            <subsection id="H24883FCE732A41579AC9302BC05E7C7D">
              <enum>(e)</enum>
              <header>Table of contents amendment</header>
              <text display-inline="yes-display-inline">The table of contents in the first section of the National Security Act of 1947 is amended by adding at the end the following new item:</text>
              <quoted-block display-inline="no-display-inline" id="HA498D5B5ADB64508B5BD8759B895953A" style="traditional">
                <toc regeneration="no-regeneration">
                  <toc-entry level="section">Sec. 1104. Cyber threat intelligence and information sharing.</toc-entry>
                </toc>
                <after-quoted-block>.</after-quoted-block>
              </quoted-block>
            </subsection>
          </section>
          <section id="HA909D12E78764FEA9518434D635C02C9" commented="no">
            <enum>3.</enum>
            <header>Sunset</header>
            <text display-inline="no-display-inline">Effective on the date that is 5 years after the date of the enactment of this Act—</text>
            <paragraph id="HB2F52747AFF44307BDD065B9AE415B5C" commented="no">
              <enum>(1)</enum>
              <text>section 1104 of the National Security Act of 1947, as added by section 2(a) of this Act, is repealed; and</text>
            </paragraph>
            <paragraph id="H33C588D8B6E14EA187BA63A6194EB409" commented="no">
              <enum>(2)</enum>
              <text>the table of contents in the first section of the National Security Act of 1947, as amended by section 2(d) of this Act, is amended by striking the item relating to section 1104, as added by such section 2(d).</text>
            </paragraph>
          </section>
        </legis-body>
      </amendment-block>
    </amendment>
  </amendment-body>
</amendment-doc>