[Congressional Record Volume 161, Number 185 (Friday, December 18, 2015)]
[Senate]
[Pages S8844-S8859]



  Mr. BURR. Madam President, I ask unanimous consent that the Joint 
Explanatory Statement for Division N--Cybersecurity Act of 2015 be 
printed in the Record.
  There being no objection, the material was ordered to be printed in 
the Record, as follows:

 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

       The following consists of the joint explanatory statement 
     to accompany the Cybersecurity Act of 2015.
       This joint explanatory statement reflects the status of 
     negotiations and disposition of issues reached between the 
     Senate Select Committee on Intelligence, the House Permanent 
     Select Committee on Intelligence, the Senate Committee on 
     Homeland Security and Governmental Affairs, and the House 
     Committee on Homeland Security. The joint explanatory 
     statement shall have the same effect with respect to the 
     implementation of this Act as if it were a joint explanatory 
     statement of a committee of conference.
       The joint explanatory statement comprises an overview of 
     the bill's background and objectives, and a section-by-
     section analysis of the legislative text.

              Part I: Background and Need for Legislation

       Cybersecurity threats continue to affect our nation's 
     security and its economy, as losses to consumers, businesses, 
     and the government from cyber attacks, penetrations, and 
     disruptions total billions of dollars. This legislation is 
     designed to create a voluntary cybersecurity information 
     sharing process that will encourage public and private sector 
     entities to share cyber threat information, without legal 
     barriers and the threat of unfounded litigation--while 
     protecting private information. This in turn should foster 
     greater cooperation and collaboration in the face of growing 
     cybersecurity threats to national and economic security.
       This legislation also includes provisions to improve 
     Federal network and information system security, provide 
     assessments on the Federal cybersecurity workforce, and 
     provide reporting and strategies on cybersecurity industry-
     related and criminal-related matters. The increased 
     information sharing enabled by this bill is a critical step 
     toward improving cybersecurity in America.

  Part II: Section-by-Section Analysis and Explanation of Legislative 
                                  Text

       The following is a section-by-section analysis and 
     explanation of the Cybersecurity Act of 2015.

               Title I--Cybersecurity Information Sharing

     Section 101. Short title.
       Section 101 states that Title I may be cited as the 
     ``Cybersecurity Information Sharing Act of 2015.''
     Section 102. Definitions.
       Section 102 defines for purposes of this title key terms 
     such as ``cybersecurity purpose,'' ``cybersecurity threat,'' 
     ``cyber threat indicator,'' ``defensive measure,'' and 
     ``monitor.'' The definition of ``cybersecurity purpose'' is 
     meant to include a broad range of

[[Page S8848]]

     activities taken to protect information and information 
     systems from cybersecurity threats. The authorizations under 
     this Act are tied to conduct undertaken for a ``cybersecurity 
     purpose,'' which both clarifies their scope and ensures that 
     the authorizations cover activities that can be performed in 
     conjunction with one another. For instance, a private entity 
     conducting monitoring activities to determine whether it 
     should use an authorized ``defensive measure'' would be 
     monitoring for a ``cybersecurity purpose.'' Significantly, 
     the authorization for ``defensive measures'' does not include 
     activities that are generally considered ``offensive'' in 
     nature, such as unauthorized access of, or execution of 
     computer code on, another entity's information systems, such 
     as ``hacking back'' activities, or any actions that would 
     substantially harm another private entity's information 
     systems, such as violations of section 1030, of title 18, 
     United States Code.
     Section 103. Sharing of information by the Federal 
         Government.
       Section 103 requires the Director of National Intelligence, 
     the Secretary of Homeland Security, the Secretary of Defense, 
     and the Attorney General to jointly develop and issue 
     procedures for the timely sharing of classified and 
     unclassified cyber threat indicators and defensive measures 
     (hereinafter referenced collectively in this joint 
     explanatory statement as, ``cyber threat information'') with 
     relevant entities.
       These procedures must also ensure the Federal Government 
     maintains: a real-time sharing capability; a process for 
     notifying entities that have received cyber threat 
     information in error; protections against unauthorized 
     access; and procedures to review and remove, prior to sharing 
     cyber threat information, any information not directly 
     related to a cybersecurity threat known at the time of 
     sharing to be personal information of a specific individual 
     or that identifies a specific individual, or to implement a 
     technical capability to do the same. These procedures must be 
     developed in consultation with appropriate Federal entities, 
     including the Small Business Administration and the National 
     Laboratories.
     Section 104. Authorizations for preventing, detecting, 
         analyzing, and mitigating cybersecurity threats.
       Section 104 authorizes private entities to monitor their 
     information systems, operate defensive measures, and share 
     and receive cyber threat information. Private entities must, 
     prior to sharing cyber threat information, review and remove 
     any information not directly related to a cybersecurity 
     threat known at the time of sharing to be personal 
     information of a specific individual or that identifies a 
     specific individual, or to implement and utilize a technical 
     capability to do the same.
       Section 104 permits non-Federal entities to use cyber 
     threat information for cybersecurity purposes, to monitor, or 
     to operate defensive measures on their information systems or 
     on those of another entity (upon written consent). Cyber 
     threat information shared by an entity with a State, tribal, 
     or local department or agency may be used for the purpose of 
     preventing, investigating, or prosecuting any of the offenses 
     described in Section 105, below. Cyber threat information is 
     exempt from disclosure under any State, tribal, local, or 
     freedom of information or similar law.
       Section 104 further provides that two or more private 
     entities are not in violation of antitrust laws for 
     exchanging or providing cyber threat information, or for 
     assisting with the prevention, investigation, or mitigation 
     of a cybersecurity threat.
     Section 105. Sharing of cyber threat indicators and defensive 
         measures with the Federal Government.
       Section 105 directs the Attorney General and Secretary of 
     Homeland Security to jointly develop policies and procedures 
     to govern how the Federal Government shares information about 
     cyber threats, including via an automated real-time process 
     that allows for information systems to exchange identified 
     cyber threat information without manual efforts, subject to 
     limited exceptions that must be agreed upon in advance. 
     Section 105 also directs the Attorney General and Secretary 
     of Homeland Security, in coordination with heads of 
     appropriate Federal entities and in consultation with certain 
     privacy officials and relevant private entities, to jointly 
     issue and make publicly available final privacy and civil 
     liberties guidelines for Federal entity-based cyber 
     information sharing.
       Section 105 directs the Secretary of Homeland Security, in 
     coordination with heads of appropriate Federal entities, to 
     develop, implement, and certify the capability and process 
     through which the Federal Government receives cyber threat 
     information shared by a non-Federal entity with the Federal 
     Government. This section also provides the President with the 
     authority to designate an appropriate Federal entity, other 
     than the Department of Defense (including the National 
     Security Agency), to develop and implement an additional 
     capability and process following a certification and 
     explanation to Congress, as described in this section. The 
     capability and process at the Department of Homeland 
     Security, or at any additional appropriate Federal entity 
     designated by the President, does not prohibit otherwise 
     lawful disclosures of information related to criminal 
     activities, Federal investigations, or statutorily or 
     contractually required disclosures. However, this section 
     does not preclude the Department of Defense, including the 
     National Security Agency from assisting in the development 
     and implementation of a capability and process established 
     consistent with this title. It also shall not be read to 
     preclude any department or agency from requesting technical 
     assistance or staffing a request for technical assistance.
       Section 105 further provides that cyber threat information 
     shared with the Federal Government does not waive any 
     privilege or protection, may be deemed proprietary 
     information by the originating entity, and is exempt from 
     certain disclosure laws. Cyber threat information may be used 
     by the Federal government for: cybersecurity purposes; 
     identifying a cybersecurity threat or vulnerability; 
     responding to, preventing, or mitigating a specific threat of 
     death, a specific threat of serious bodily harm, or a 
     specific threat of serious economic harm, including a 
     terrorist act or a use of a weapon of mass destruction; 
     responding to, investigating, prosecuting, preventing, or 
     mitigating a serious threat to a minor; or preventing, 
     investigating, disrupting, or prosecuting an offense 
     arising out of certain cyber-related criminal activities.
       Finally, Section 105 provides that cyber threat information 
     shared with the Federal Government shall not be used by any 
     Federal, State, tribal, or local government to regulate non-
     Federal entities' lawful activities.
     Section 106. Protection from liability.
       Section 106 provides liability protection for private 
     entities that monitor, share, or receive cyber threat 
     information in accordance with Title I, notwithstanding any 
     other provision of Federal, State, local, or tribal law. 
     Section 106 further clarifies that nothing in Title I creates 
     a duty to share cyber threat information or a duty to warn or 
     act based on receiving cyber threat information. At the same 
     time, nothing in Title I broadens, narrows, or otherwise 
     affects any existing duties that might be imposed by other 
     law; Title I also does not limit any common law or statutory 
     defenses.
     Section 107. Oversight of Government activities.
       Section 107 requires reports and recommendations on 
     implementation, compliance, and privacy assessments by agency 
     heads, Inspectors General, and the Comptroller General of the 
     United States, to ensure that cyber threat information is 
     properly received, handled, and shared by the Federal 
     Government.
     Section 108. Construction and preemption.
       Section 108 contains Title I construction provisions 
     regarding lawful disclosures; whistleblower protections; 
     protection of sources and methods; relationship to other 
     laws; prohibited conduct, such as anti-competitive 
     activities; information sharing relationships; preservation 
     of contractual rights and obligations; anti-tasking 
     restrictions, including conditions on cyber threat 
     information sharing; information use and retention; Federal 
     preemption of State laws that restrict or regulate Title I 
     activities, excluding those concerning the use of authorized 
     law enforcement practices and procedures; regulatory 
     authorities; the Secretary of Defense's authorities to 
     conduct certain cyber operations; and Constitutional 
     protections in criminal prosecutions.
     Section 109. Report on cybersecurity threats.
       Section 109 requires the Director of National Intelligence, 
     with the heads of other appropriate Intelligence Community 
     elements, to submit a report to the congressional 
     intelligence committees on cybersecurity threats, including 
     cyber attacks, theft, and data breaches.
     Section 110. Exception to limitation on authority of 
         Secretary of Deftnse to disseminate certain information.
       Section 110 clarifies that, notwithstanding Section 
     393(c)(3) of title 10, United States Code, the Secretary of 
     Defense may authorize the sharing of cyber threat indicators 
     and defensive measures pursuant to the policies, procedures, 
     and guidelines developed or issued under this title.
     Section 111. Effective period.
       Section 111 establishes Title I and the amendments therein 
     are effective during the period beginning on the date of 
     enactment of this Act and ending on September 30, 2025. The 
     provisions of Title I will remain in effect however, for 
     action authorized by Title I or information obtained pursuant 
     to action authorized by Title I, prior to September 30, 2025.

              Title II--National Cybersecurity Advancement


   SUBTITLE A--NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION 
                                 CENTER

     Section 201. Short title.
       Section 201 establishes that Title II, Subtitle A may be 
     cited as the ``National Cybersecurity Protection Advancement 
     Act of 2015''.
     Section 202. Definitions.
       Section 202 defines for purposes of Title II, Subtitle A, 
     the terms ``appropriate congressional committees,'' 
     ``cybersecurity risk,'' ``incident,'' ``cyber threat 
     indicator,'' ``defensive measure,'' ``Department,'' and 
     ``Secretary.''
     Section 203. Information sharing structure and processes.
       Section 203 enhances the functions of the Department of 
     Homeland Security's National Cybersecurity and Communications

[[Page S8849]]

     Integration Center, established in section 227 of the 
     Homeland Security Act of 2002 (redesignated by this Act). It 
     designates the Center as a Federal civilian interface for 
     multi-directional and cross-sector information sharing 
     related to cybersecurity risks, incidents, analysis and 
     warnings for Federal and non-Federal entities, including the 
     implementation of Title I of this Act. This section requires 
     the Center to engage with international partners; conduct 
     information sharing with Federal and non-Federal entities; 
     participate in national exercises; and assess and evaluate 
     consequence, vulnerability and threat information regarding 
     cyber incidents to public safety communications. 
     Additionally, this section requires the Center to collaborate 
     with state and local governments on cybersecurity risks and 
     incidents. The Center will comply with all policies, 
     regulations, and laws that protect the privacy and civil 
     liberties of United States persons, including by working with 
     the Privacy Officer to ensure the Center follows the privacy 
     policies and procedures established by title I of this Act.
       Section 203 requires the Department of Homeland Security, 
     in coordination with industry and other stakeholders, to 
     develop an automated capability for the timely sharing of 
     cyber threat indicators and defensive measures. It is 
     critical for the Department to develop an automated system 
     and supporting processes for the Center to disseminate cyber 
     threat indicators and defensive measures in a timely manner.
       This section permits the Center to enter into voluntary 
     information sharing relationships with any consenting non-
     Federal entity for the sharing of cyber threat indicators, 
     defensive measures, and information for cybersecurity 
     purposes. This section is intended to provide the Department 
     of Homeland Security additional options to enter into 
     streamlined voluntary information sharing agreements. This 
     section allows the Center to utilize standard and negotiated 
     agreements as the types of agreements that non-Federal 
     entities may enter into with the Center. However, it makes 
     clear that agreements are not limited to just these types, 
     and preexisting agreements between the Center and the non-
     Federal entity will be in compliance with this section.
       Section 203 requires the Director of the Center to report 
     directly to the Secretary for significant cybersecurity risks 
     and incidents. This section requires the Secretary to submit 
     to Congress a report on the range of efforts underway to 
     bolster cybersecurity collaboration with international 
     partners. Section 203 allows the Secretary to develop and 
     adhere to Department policies and procedures for coordinating 
     vulnerability disclosures.
     Section 204. Information sharing and analysis organizations.
       Section 204 amends Section 212 of the Homeland Security Act 
     to clarify the functions of Information Sharing and Analysis 
     Organizations (ISAOs) to include cybersecurity risk and 
     incident information beyond that pertaining to critical 
     infrastructure. ISAOs, including Information Sharing and 
     Analysis Centers (ISAOs) have an important role to play in 
     facilitating information sharing going forward and has 
     clarified their functions as defined in the Homeland Security 
     Act.
     Section 205. National response framework.
       Section 205 amends the Homeland Security Act of 2002 to 
     require the Secretary of the Department of Homeland Security, 
     with proper coordination, to regularly update the Cyber 
     Incident Annex to the National Response Framework of the 
     Department of Homeland Security.
     Section 206. Report on reducing cybersecurity risks in DHS 
         data centers.
       Section 206 requires the Secretary of the Department of 
     Homeland Security to submit a report to Congress not later 
     than 1 year after the date of the enactment of this Act on 
     the feasibility of using compartmentalization between systems 
     to create conditions conducive to reduced cybersecurity risks 
     in data centers.
     Section 207. Assessment.
       Section 207 requires the Comptroller General of the United 
     States not later than 2 years after the date of enactment of 
     this Act to submit a report on the implementation of Title 
     II, including increases in the sharing of cyber threat 
     indicators at the National Cybersecurity and Communications 
     Integration Center and throughout the United States.
     Section 208. Multiple simultaneous cyber incidents at 
         critical infrastructure.
       Section 208 requires the appropriate Department of Homeland 
     Security Under Secretary to draft and submit to Congress not 
     later than 1 year after the date of enactment of this Act a 
     report on the feasibility of producing a risk-informed plan 
     to address the risks of multiple simultaneous cyber incidents 
     affecting critical infrastructure as well as cascade effects.
     Section 209. Report on cybersecurity vulnerabilities of 
         United States ports.
       Section 209 requires the Secretary of Homeland Security not 
     later than 180 days after the date of enactment of this Act 
     to submit to Congress a report on the vulnerability of United 
     States ports to cybersecurity incidents, as well as potential 
     mitigations.
     Section 210. Prohibition on new regulatory authority.
       Section 210 clarifies that the Secretary of Homeland 
     Security does not gain any additional regulatory authorities 
     in this subtitle.
     Section 211. Termination of reporting requirements.
       Section 211 adds a 7-year sunset on the reporting 
     requirements in Title II, Subtitle A.


             SUBTITLE B--FEDERAL CYBERSECURITY ENHANCEMENT

     Section 221. Short title.
       Section 221 establishes that Title II, Subtitle B may be 
     cited as the ``Federal Cybersecurity Enhancement Act of 
     2015''.
     Section 222. Definitions.
       Section 222 defines for purposes of Title II, Subtitle B, 
     the terms ``agency,'' ``agency information system,'' 
     ``appropriate congressional committees,'' ``cybersecurity 
     risk,'' ``information system,'' ``Director,'' ``intelligence 
     community,'' ``national security system,'' and ``Secretary.''
     Section 223. Improved Federal network security.
       Section 223 amends the Homeland Security Act of 2002 by 
     amending Section 228, as redesignated, to require an 
     intrusion assessment plan for Federal agencies and adding a 
     Section 230 to authorize a federal intrusion detection and 
     prevention capabilities'' for Federal agencies.
       Section 230 of the Homeland Security Act of 2002, as added 
     by Section 223(a) of the bill, authorizes the Secretary of 
     Homeland Security to employ the Department's intrusion 
     detection and intrusion prevention capabilities, 
     operationally implemented under the ``EINSTEIN'' programs, to 
     scan agencies' network traffic for malicious activity and 
     block it. The Secretary and agencies with sensitive data are 
     expected to confer regarding the sensitivity of, and 
     statutory protections otherwise applicable to, information on 
     agency information systems. The Secretary is expected to 
     ensure that the policies and procedures developed under 
     section 230 appropriately restrict and limit Department 
     access, use, retention, and handling of such information to 
     protect the privacy and confidentiality of such information, 
     including ensuring that the Department protects such 
     sensitive data from disclosure, and trains appropriate staff 
     accordingly.
       Section 223(b) mandates that agencies deploy and adopt 
     those capabilities within one year for all network traffic 
     traveling to or from each information system owned or 
     operated by the agency, or two months after the capabilities 
     are first made available to the agency, whichever is later. 
     The subsection also requires that agencies adopt improvements 
     added to the intrusion detection and prevention capabilities 
     six months after they are made available. Improvements is 
     intended to be read broadly to describe expansion of the 
     capabilities, new systems, and added technologies, for 
     example: non-signature based detection systems such as 
     heuristic- and behavior-based detection, new countermeasures 
     to block malicious traffic beyond e-mail filtering and Domain 
     Name System (DNS)-sinkholing, and scanning techniques that 
     allow scanning of encrypted traffic.
     Section 224. Advanced internal defenses.
       Section 224 directs the Secretary of Homeland Security to 
     add advanced network security tools to the Continuous 
     Diagnostics and Mitigation program; develop and implement a 
     plan to ensure agency use of advanced network security tools; 
     and, with the Director of the Office of Management and 
     Budget, prioritize advanced security tools and update metrics 
     used to measure security under the Federal Information 
     Security Management Act of 2002.
     Section 225. Federal cybersecurity requirements.
       Section 225 adds a statutory requirement for the head of 
     each agency not later than 1 year after the date of the 
     enactment of this Act to implement several standards on their 
     networks to include identification of sensitive and mission 
     critical data, use of encryption, and multi-factor 
     authentication.
     Section 226. Assessment; reports.
       Section 226 includes a requirement for a Government 
     Accountability Office study to be conducted on the 
     effectiveness of this approach and strategy. It also requires 
     reports from the Department of Homeland Security, Federal 
     Chief Information Officer, and the Office of Management and 
     Budget. Required reporting includes an annual report from the 
     Department of Homeland Security on the effectiveness and 
     privacy controls of the intrusion detection and prevention 
     capabilities; information on adoption of the intrusion 
     detection and capabilities at agencies in the Office of 
     Management and Budget's annual Federal Information Security 
     Management Act report; an assessment by the Federal Chief 
     Information Officer within two years of enactment as to 
     continued value of the intrusion detection and prevention 
     capabilities; and a Government Accountability report in three 
     years on the effectiveness of Federal agencies' approach to 
     securing agency information systems.
     Section 227. Termination.
       Section 227 creates a 7-year sunset for the authorization 
     of the intrusion detection and prevention capabilities in 
     Section 230 of the Homeland Security Act of 2002, as added by 
     Section 223(a).
     Section 228. Identification of information systems relating 
         to national security.
       Section 228 requires the Director of National Intelligence 
     and the Director of the Office of Management, in coordination 
     with

[[Page S8850]]

     other agencies, not later than 180 days after the date of 
     enactment of this Act to identify unclassified information 
     systems that could reveal classified information, and submit 
     a report assessing the risks associated with a breach of such 
     systems and the costs and impact to designate such systems as 
     national security systems.
     Section 229. Direction to agencies.
       Section 229 authorizes the Secretary of Homeland Security 
     to issue an emergency directive to the head of an agency to 
     take any lawful action with respect to the operation of an 
     information system for the purpose of protecting such system 
     from an information security threat. In situations in which 
     the Secretary has determined there is an imminent threat to 
     an agency, the Secretary may authorize the use of intrusion 
     detection and prevention capabilities in accordance with 
     established procedures, including notice to the affected 
     agency.

         Title III--Federal Cybersecurity Workforce Assessment

     Section 301. Short title.
       Section 301 establishes Title III may be cited as the 
     ``Federal Cybersecurity Workforce Assessment Act of 2015''.
     Section 302. Definitions.
       Section 302 defines for purposes of Title III the terms 
     ``appropriate congressional committees,'' ``Director,'' 
     ``National Initiative for Cybersecurity Education,'' and 
     ``work roles.''
     Section 303. National cybersecurity workforce measurement 
         initiative.
       Section 303 requires the head of each Federal agency to 
     identify all positions within the agency that require the 
     performance of cybersecurity or other cyber-related 
     functions, and report the percentage of personnel in such 
     positions holding the appropriate certifications, the level 
     of preparedness of personnel without certifications to take 
     certification exams, and a strategy for mitigating any 
     identified certification and training gaps.
     Section 304. Identification of cyber-related work roles of 
         critical need
       Section 304 requires the head of each Federal agency to 
     identify information technology, cybersecurity, or other 
     cyber-related roles of critical need in the agency's 
     workforce, and substantiate as such in a report to the 
     Director of the Office of Personnel Management. Section 304 
     also requires the Director of the Office of Personnel 
     Management to submit a subsequent report not later than 2 
     years after the date of the enactment of this Act, on 
     critical needs for information technology, cybersecurity, or 
     other cyber-related workforce across all Federal agencies, 
     and the implementation of this section.
     Section 305. Government Accountability Office status reports.
       Section 305 requires the Comptroller General of the United 
     States to analyze and monitor the implementation of sections 
     303 and 304 and not later than 3 years after the date of the 
     enactment of this Act submit a report on the status of such 
     implementation.

                     Title IV--Other Cyber Matters

     Section 401. Study on mobile device security.
       Section 401 requires the Secretary of Homeland Security not 
     later than 1 year after the date of the enactment of this Act 
     to conduct a study on threats relating to the security of the 
     mobile devices used by the Federal Government, and submit a 
     report detailing the findings and recommendations arising 
     from such study.
     Section 402. Department of State international cyberspace 
         policy strategy.
       Section 402 requires the Secretary of State not later than 
     90 days after the date of the enactment of this Act to 
     produce a comprehensive strategy relating to United States 
     international policy with regard to cyberspace, to include a 
     review of actions taken by the Secretary of State in support 
     of the President's International Strategy for Cyberspace and 
     a description of threats to United States national security 
     in cyberspace.
     Section 403. Apprehension and prosecution of international 
         cyber criminals.
       Section 403 requires the Secretary of State, or a designee, 
     to consult with countries in which international cyber 
     criminals are physically present and extradition to the 
     United States is unlikely, to determine what efforts the 
     foreign country has taken to apprehend, prosecute, or 
     otherwise prevent the carrying out of cybercrimes against 
     United States persons or interests. Section 403 further 
     requires an annual report that includes statistics and 
     extradition status about such international cyber criminals.
     Section 404. Enhancement of emergency services.
       Section 404 requires the Secretary of Homeland Security not 
     later than 90 days after the date of the enactment of this 
     Act to establish a process by which a Statewide 
     Interoperability Coordinator may report data on any 
     cybersecurity risk or incident involving any information 
     system or network used by emergency response providers within 
     the state. Reported data will be analyzed and used in 
     developing information and recommendations on security and 
     resilience on measures for information systems and networks 
     used by state emergency response providers.
     Section 405. Improving cybersecurity in the health care 
         industry.
       Section 405 requires the Secretary of Health and Human 
     Services to establish a task force and not later than 1 year 
     after the date of enactment of the task force to submit a 
     report on the Department of Health and Human Services and the 
     health care industry's preparedness to respond to 
     cybersecurity threats. In support of the report, the 
     Secretary of Health and Human Services will convene health 
     care industry stakeholders, cybersecurity experts, and other 
     appropriate entities, to establish a task force for analyzing 
     and disseminating information on industry-specific 
     cybersecurity challenges and solutions.
       Consistent with subsection (e), it is Congress's intention 
     to allow Health and Human Services the flexibility to 
     leverage and incorporate ongoing activities as of the day 
     before the date of enactment of this act to accomplish the 
     goals set forth for this task force.
     Section 406. Federal computer security.
       Section 406 requires the Inspector General of any agency 
     operating a national security system, or a Federal computer 
     system that provides access to personally identifiable 
     information, not later than 240 days after the date of 
     enactment of this Act to submit a report regarding the 
     federal computer systems of such agency, to include 
     information on the standards and processes for granting or 
     denying specific requests to obtain and use information and 
     related information processing services, and a description of 
     the data security management practices used by the agency.
     Section 407. Stopping the fraudulent sale of financial 
         information of people of the United States.
       Section 407 amends 18 U.S. Code Sec. 1029 by enabling the 
     Federal Government to prosecute overseas criminals who profit 
     from financial information that has been stolen from 
     Americans.

[...]