Institute for Legal, Legislative and Educational Action
Cyber threat intelligence guidelines and limitations.
Title: Cyber Intelligence Sharing and Protection Act
Subject: Administrative law and regulatory procedures: Business records: Civil actions and liability: Computer security and identity theft: Congressional oversight: Crimes against children: Criminal investigation, prosecution, interrogation: Criminal justice information and records: Department of Defense: Department of Homeland Security: Department of Justice: Director of National Intelligence: Executive agency funding and structure: Federal preemption: Government information and archives: Government liability: Health information and medical records: Homeland security: Human trafficking: Intelligence activities, surveillance, classified information: International organizations and cooperation: Pornography: Public-private cooperation: Right of privacy: Sex offenses: Armed forces and national security
Description: Cyber Intelligence Sharing and Protection Act Directs the federal government to provide for the real-time sharing of actionable, situational cyber threat information between all designated federal cyber operations centers to enable integrated actions to protect, prevent, mitigate, respond to, and recover from cyber incidents. Directs the President, with respect to information shared by a cybersecurity provider (a non-federal entity that provides goods or services intended to be used for cybersecurity purposes) or self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), to designate: (1) an entity within the Department of Homeland Security (DHS) as the civilian federal entity to receive cyber threat information, and (2) an entity within the Department of Justice (DOJ) as the civilian federal entity to receive cybersecurity crime information. Amends the National Security Act of 1947 to require the Director of National Intelligence (DNI) to allow the intelligence community to share cyber threat intelligence with private-sector entities and utilities possessing appropriate certifications or security clearances. Authorizes a cybersecurity provider, with the consent of an entity that contracts with the provider, to: (1) use cybersecurity systems to obtain threat information to protect the rights and property of the contracting entity; and (2) share threat information with any other entity designated by the contracting entity, including DHS and DOJ. Requires federal agencies receiving shared cyber threat information to establish procedures to: (1) ensure that real-time information is shared with appropriate national security agencies and distributed to other federal agencies; and (2) facilitate collaboration among federal, state, local, tribal, and territorial governments, cybersecurity providers, and self-protected entities. Directs DHS, the Attorney General, the DNI, and the Department of Defense to establish procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the federal government. Sets forth requirements for the use and protection of shared information, including: (1) anonymization or minimization procedures, (2) prohibitions on gaining a competitive advantage, (3) exemptions from public disclosure requirements if information is shared with the government, and (4) prohibitions on the use of such information for regulatory purposes. States that shared information may only be used by a non-federal recipient for a cybersecurity purpose. Provides civil and criminal liability protections to cybersecurity providers, contracting entities, and self-protected entities acting in good faith to obtain or share threat information or to safeguard systems from threats. Allows the federal government to use shared cyber threat information for: (1) cybersecurity purposes to ensure the integrity, confidentiality, availability, or safeguarding of a system or network; (2) cybersecurity crime investigations; or (3) protection of individuals from the danger of death or serious bodily harm and the prosecution of crimes involving such danger, including child pornography, sexual exploitation, kidnapping, and trafficking. Prohibits the federal government from affirmatively searching such information for any other purpose. Repeals amendments made by this Act five years after enactment of this Act. Expresses the sense of Congress that international cooperation with regard to cybersecurity should be encouraged.
Session: 114th Congress
Last Action: Referred to the Subcommittee on the Constitution and Civil Justice.
Last Action Date: February 2, 2015
Link: https://www.congress.gov/bill/114th-congress/house-bill/234/all-info
Note: the first sponsor listed is normally the primary sponsor. If a sponsor's name is a hyperlink you can click on it to 'follow the money'.
4 sponsors: C.A. Ruppersberger (D); Edward Royce (R); Robert Pittenger (R); Corrine Brown (D)
Chamber | Date | Action |
House | Feb 2 2015 | Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. |
House | Feb 2 2015 | Referred to the Subcommittee on the Constitution and Civil Justice. |
House | Jan 8 2015 | Referred to the Committee on Intelligence (Permanent Select), and in addition to the Committees on the Judiciary, Armed Services, and Homeland Security, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned. |
House | Jan 8 2015 | Referred to House Judiciary |
House | Jan 8 2015 | Introduced in House |
House | Jan 8 2015 | Referred to House Homeland Security |
House | Jan 8 2015 | Referred to House Armed Services |
House | Jan 8 2015 | Referred to House Intelligence (Permanent) |
Type | Date | Federal Link | Text |
Introduced | Jan 16 2015 | federal bill text | bill text |
Title | Description | Date | State Link | Text | Adopted |
There are no amendments to this bill at this time |
Chamber: H
Committee Name: Subcommittee on the Constitution And Civil Justice
There have not been any votes on this bill