Hearing Information
Meeting Information
Tuesday, April 21, 2015 - 5:00pm in H-313 The Capitol View Announcement »
Amendment Deadline
Monday, April 20, 2015 - 3:00pm View Announcement »
Tuesday, April 21, 2015 - 5:00pm in H-313 The Capitol View Announcement »
Monday, April 20, 2015 - 3:00pm View Announcement »
COMMITTEE ACTION:
REPORTED BY VOICE VOTE on Tuesday, April 21, 2015.
FLOOR ACTION ON H. RES. 212
Agreed to by record vote of 238-182, after agreeing to the previous question by record vote of 237-179, on Wednesday, April 22, 2015
MANAGERS: Collins (GA)/Polis
1. Structured rule for H.R. 1560.
2. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence.
3. Waives all points of order against consideration of the bill.
4. Makes in order as original text for the purposes of amendment the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence now printed in the bill and provides that it shall be considered as read.
5. Waives all points of order against the amendment in a nature of a substitute.
6. Makes in order only those further amendments printed in part A of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.
7. Waives all points of order against the amendments printed in part A of the report.
8. Provides one motion to recommit with or without instructions.
9. Structured rule for H.R. 1731.
10. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Committee on Homeland Security.
11. Waives all points of order against consideration of the bill.
12. Makes in order as original text for the purpose of amendment an amendment in the nature of a substitute consisting of the text of Rules Committee Print 114-12 and provides that it shall be considered as read.
13. Waives all points of order against that amendment in the nature of a substitute.
14. Makes in order only those further amendments printed in part B of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.
15. Waives all points of order against the amendments printed in part B of the report.
16. Provides one motion to recommit with or without instructions.
17. Section 3 of the rule directs the Clerk to, in the engrossment of H.R. 1560, add the text of H.R. 1731, as passed by the House, as a new matter at the end of H.R. 1560 and make conforming modifications in the engrossment.
18. Provides that upon the addition of the text of H.R. 1731, as passed by the House, to the engrossment of H.R. 1560, H.R. 1731 shall be laid on the table.
# | Version # | Sponsor(s) | Party | Summary | Status |
---|---|---|---|---|---|
23 | Version 2 | Crdenas , Tony (CA) | Democrat | Revised Instructs the SBA to provide assistance to small businesses and small financial institutions to participate under this section, instruct the SBA to generate a report about such entities participation and instruct the federal government to engage in out reach to encourage small business and small financial institution participation. | Made In Order |
6 | Version 1 | Carson (IN) | Democrat | Sunsets the bill after four years. | Submitted |
7 | Version 3 | Carson (IN) | Democrat | Revised Adds the requirement that the Inspector General report on current procedures pertaining to the sharing of information, removal procedures for personal information or information identifying a specific person, and any incidents pertaining to the improper treatment of information. | Made In Order |
8 | Version 1 | Carson (IN) | Democrat | Clarifies that a company’s defensive measures cannot impact or damage other networks, even unintentionally. | Submitted |
9 | Version 1 | Carson (IN), Quigley (IL) | Democrat | Clarifies that information can be shared with other federal agencies only after the receiving entity removes Personally Identifiable Information (PII). It also clarifies that the receiving entity is responsible for determining which federal agencies are relevant to receive that information. | Submitted |
16 | Version 1 | Castro (TX) | Democrat | Requires Inspectors General to secure online systems with encryption technologies for whistle-blower reports to thereby protect at a greater extent the identities of those who report federal waste, fraud, abuse, corruption or terrorism online | Submitted |
10 | Version 1 | Connolly (VA), Blumenauer (OR) | Democrat | Requires the Director of National Intelligence to submit a report to Congress examining how the ability of the Federal Government and private entities to recruit talented cybersecurity professionals is impacted by the scheduling of marijuana (cannabis) as a schedule I drug with respect to granting security clearances to such personnel. | Submitted |
11 | Version 1 | Connolly (VA) | Democrat | Limits the scope of the “notwithstanding any other provision of law” exemption to ensure that the Executive Branch and the Judicial Branch do not interpret this Act to authorize a private entity to disregard all other existing laws not related to those laws that impact the effective operation of a defensive measure by a private entity for a cybersecurity purpose, and to disregard the Computer Fraud and Abuse Act, in carrying out the provision authorizing the private entity to operate a defensive measure for a cybersecurity purpose. | Submitted |
12 | Version 1 | Connolly (VA) | Democrat | Limits the scope of the "notwithstanding any other provision of law" exemption to prohibit authorizing a private entity to violate the Computer Fraud and Abuse Act. | Submitted |
19 | Version 1 | Farenthold (TX), Issa (CA), Lofgren (CA), Polis (CO) | Bi-Partisan | Sunsets the Act on September 30, 2020 | Submitted |
1 | Version 2 | Hahn (CA) | Democrat | Revised Directs the Secretary of Homeland Security to submit a report to Congress containing assessments of risks and shortfalls along with recommendations regarding cybersecurity at tier 1 ports. | Submitted |
2 | Version 1 | Hahn (CA) | Democrat | Requires that ports conduct a cybersecurity risk assessment to be eligible to receive grants from the Port Security Grant program. Ports may also apply for a Port Security Grant for the expressed purpose of conducting a cybersecurity risk assessment. | Submitted |
24 | Version 1 | Himes (CT) | Democrat | Late Modifies the disclosure, retention, and use section of the bill to prevent the use of cyber threat indicators for the investigation and prosecution of non-computer related crimes. | Submitted |
13 | Version 1 | Jackson Lee (TX), Polis (CO) | Democrat | Directs the Government Accountability Office (GAO) to provide a report to Congress on the actions taken by the Federal Government to remove personal information from data shared through the programs established by this statute. | Made In Order |
14 | Version 1 | Jackson Lee (TX) | Democrat | Provides a report Congressional oversight committees regarding civic participation in electronic public commenting activities that significantly impact the digital resources of Federal agencies, which could be misinterpreted by automated cyber defense mechanisms as cyber threats. | Submitted |
17 | Version 1 | Lofgren (CA), Issa (CA), Polis (CO), Farenthold (TX) | Bi-Partisan | Amends the government use provision to conform with H.R. 1731 by limiting the use of cyber threat indicators and defensive measures for cybersecurity purposes only. | Submitted |
18 | Version 2 | Lofgren (CA), Polis (CO) | Democrat | Revised Prohibits agencies that receive cyber threat indicators from making requests that private entities alter their information systems in a way that weakens or allows circumvention of security functions. | Submitted |
22 | Version 1 | Mulvaney (SC) | Republican | Sunsets the provisions of the bill after 7 years. | Made In Order |
5 | Version 2 | Nunes (CA) | Republican | MANAGER’S AMENDMENT Revised Makes technical changes to several sections of the bill. Clarifies the authorization for the use of defensive measures. Further clarifies the liability protections for network monitoring and sharing and receipt of cyber threat indicators and defensive measures. | Made In Order |
15 | Version 1 | Polis (CO), Lofgren (CA) | Democrat | Requires a Federal entity in receipt of cyber threat indicators to remove any information it reasonably believes can identify a specific person unless the information is necessary to describe or mitigate a cybersecurity threat. Amends the Act's biennial reporting requirements to require an assessment of whether Federal entities have limited the sharing of personally identifiable information in accordance with this new standard. | Submitted |
20 | Version 1 | Richmond (LA) | Democrat | Strikes immunizing companies that fail to act on timely threat information and clarifies that the Act has no impact on a duty to act on shared information. | Submitted |
21 | Version 1 | Richmond (LA) | Democrat | Removes any and all potential exemptions from liability for willful misconduct by government actors. | Submitted |
4 | Version 1 | Rothfus (PA) | Republican | Sunsets the legislation’s authorizations three years after enactment. | Submitted |
25 | Version 1 | Wilson, Joe (SC) | Republican | Late Requires a study to determine quantifiable metrics for cyber incidents. | Submitted |
3 | Version 1 | Yoder (KS), Polis (CO) | Bi-Partisan | Amends the Electronic Communications Privacy Act, to update the privacy protections for electronic communications information that is stored by third-party service providers in order to protect consumer privacy interests while meeting law enforcement needs. | Submitted |