/  H.R. 1560—Protecting Cyber Networks Act

H.R. 1560 - Protecting Cyber Networks Act

Bill Text

  • Text of H.R. 1560 PDF XML

    Protecting Cyber Networks Act (as reported)

  • H. Rept. 114-63 PDF

    Report from the Permanent Select Committee on Intelligence

Rule Information

COMMITTEE ACTION:
REPORTED BY VOICE VOTE on Tuesday, April 21, 2015.

FLOOR ACTION ON H. RES. 212 
Agreed to by record vote of 238-182, after agreeing to the previous question by record vote of 237-179, on Wednesday, April 22, 2015

MANAGERS: Collins (GA)/Polis

1. Structured rule for H.R. 1560.

2. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence.

3. Waives all points of order against consideration of the bill.

4. Makes in order as original text for the purposes of amendment the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence now printed in the bill and provides that it shall be considered as read.

5. Waives all points of order against the amendment in a nature of a substitute.

6. Makes in order only those further amendments printed in part A of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.

7. Waives all points of order against the amendments printed in part A of the report.

8. Provides one motion to recommit with or without instructions.

9. Structured rule for H.R. 1731.

10. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Committee on Homeland Security.

11. Waives all points of order against consideration of the bill.

12. Makes in order as original text for the purpose of amendment an amendment in the nature of a substitute consisting of the text of Rules Committee Print 114-12 and provides that it shall be considered as read.

13. Waives all points of order against that amendment in the nature of a substitute.

14. Makes in order only those further amendments printed in part B of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.

15. Waives all points of order against the amendments printed in part B of the report.

16. Provides one motion to recommit with or without instructions.

17. Section 3 of the rule directs the Clerk to, in the engrossment of H.R. 1560, add the text of H.R. 1731, as passed by the House, as a new matter at the end of H.R. 1560 and make conforming modifications in the engrossment.

18. Provides that upon the addition of the text of H.R. 1731, as passed by the House, to the engrossment of H.R. 1560, H.R. 1731 shall be laid on the table.

Amendments

#Version #Sponsor(s)PartySummaryStatus
23Version 2Crdenas , Tony (CA)DemocratRevised Instructs the SBA to provide assistance to small businesses and small financial institutions to participate under this section, instruct the SBA to generate a report about such entities participation and instruct the federal government to engage in out reach to encourage small business and small financial institution participation.Made In Order
6Version 1Carson (IN)DemocratSunsets the bill after four years.Submitted
7Version 3Carson (IN)DemocratRevised Adds the requirement that the Inspector General report on current procedures pertaining to the sharing of information, removal procedures for personal information or information identifying a specific person, and any incidents pertaining to the improper treatment of information.Made In Order
8Version 1Carson (IN)DemocratClarifies that a company’s defensive measures cannot impact or damage other networks, even unintentionally.Submitted
9Version 1Carson (IN), Quigley (IL)DemocratClarifies that information can be shared with other federal agencies only after the receiving entity removes Personally Identifiable Information (PII). It also clarifies that the receiving entity is responsible for determining which federal agencies are relevant to receive that information.Submitted
16Version 1Castro (TX)DemocratRequires Inspectors General to secure online systems with encryption technologies for whistle-blower reports to thereby protect at a greater extent the identities of those who report federal waste, fraud, abuse, corruption or terrorism online Submitted
10Version 1Connolly (VA), Blumenauer (OR)DemocratRequires the Director of National Intelligence to submit a report to Congress examining how the ability of the Federal Government and private entities to recruit talented cybersecurity professionals is impacted by the scheduling of marijuana (cannabis) as a schedule I drug with respect to granting security clearances to such personnel. Submitted
11Version 1Connolly (VA)DemocratLimits the scope of the “notwithstanding any other provision of law” exemption to ensure that the Executive Branch and the Judicial Branch do not interpret this Act to authorize a private entity to disregard all other existing laws not related to those laws that impact the effective operation of a defensive measure by a private entity for a cybersecurity purpose, and to disregard the Computer Fraud and Abuse Act, in carrying out the provision authorizing the private entity to operate a defensive measure for a cybersecurity purpose. Submitted
12Version 1Connolly (VA)DemocratLimits the scope of the "notwithstanding any other provision of law" exemption to prohibit authorizing a private entity to violate the Computer Fraud and Abuse Act. Submitted
19Version 1Farenthold (TX), Issa (CA), Lofgren (CA), Polis (CO)Bi-PartisanSunsets the Act on September 30, 2020Submitted
1Version 2Hahn (CA)DemocratRevised Directs the Secretary of Homeland Security to submit a report to Congress containing assessments of risks and shortfalls along with recommendations regarding cybersecurity at tier 1 ports. Submitted
2Version 1Hahn (CA)DemocratRequires that ports conduct a cybersecurity risk assessment to be eligible to receive grants from the Port Security Grant program. Ports may also apply for a Port Security Grant for the expressed purpose of conducting a cybersecurity risk assessment. Submitted
24Version 1Himes (CT)DemocratLate Modifies the disclosure, retention, and use section of the bill to prevent the use of cyber threat indicators for the investigation and prosecution of non-computer related crimes. Submitted
13Version 1Jackson Lee (TX), Polis (CO)DemocratDirects the Government Accountability Office (GAO) to provide a report to Congress on the actions taken by the Federal Government to remove personal information from data shared through the programs established by this statute. Made In Order
14Version 1Jackson Lee (TX)DemocratProvides a report Congressional oversight committees regarding civic participation in electronic public commenting activities that significantly impact the digital resources of Federal agencies, which could be misinterpreted by automated cyber defense mechanisms as cyber threats. Submitted
17Version 1Lofgren (CA), Issa (CA), Polis (CO), Farenthold (TX)Bi-PartisanAmends the government use provision to conform with H.R. 1731 by limiting the use of cyber threat indicators and defensive measures for cybersecurity purposes only. Submitted
18Version 2Lofgren (CA), Polis (CO)DemocratRevised Prohibits agencies that receive cyber threat indicators from making requests that private entities alter their information systems in a way that weakens or allows circumvention of security functions.Submitted
22Version 1Mulvaney (SC)RepublicanSunsets the provisions of the bill after 7 years.Made In Order
5Version 2Nunes (CA)RepublicanMANAGER’S AMENDMENT Revised Makes technical changes to several sections of the bill. Clarifies the authorization for the use of defensive measures. Further clarifies the liability protections for network monitoring and sharing and receipt of cyber threat indicators and defensive measures.Made In Order
15Version 1Polis (CO), Lofgren (CA)DemocratRequires a Federal entity in receipt of cyber threat indicators to remove any information it reasonably believes can identify a specific person unless the information is necessary to describe or mitigate a cybersecurity threat. Amends the Act's biennial reporting requirements to require an assessment of whether Federal entities have limited the sharing of personally identifiable information in accordance with this new standard.Submitted
20Version 1Richmond (LA)DemocratStrikes immunizing companies that fail to act on timely threat information and clarifies that the Act has no impact on a duty to act on shared information.Submitted
21Version 1Richmond (LA)DemocratRemoves any and all potential exemptions from liability for willful misconduct by government actors.Submitted
4Version 1Rothfus (PA)RepublicanSunsets the legislation’s authorizations three years after enactment.Submitted
25Version 1Wilson, Joe (SC)RepublicanLate Requires a study to determine quantifiable metrics for cyber incidents. Submitted
3Version 1Yoder (KS), Polis (CO)Bi-PartisanAmends the Electronic Communications Privacy Act, to update the privacy protections for electronic communications information that is stored by third-party service providers in order to protect consumer privacy interests while meeting law enforcement needs.Submitted