Monday, April 13, 2015 - 3:00pm View Announcement »
Tuesday, April 21, 2015 - 5:00pm in H-313 The Capitol View Announcement »
Monday, April 13, 2015 - 3:00pm View Announcement »
Tuesday, April 21, 2015 - 5:00pm in H-313 The Capitol View Announcement »
REPORTED BY VOICE VOTE on Tuesday, April 21, 2015.
FLOOR ACTION ON H. RES. 212
Agreed to by record vote of 238-182, after agreeing to the previous question by record vote of 237-179, on Wednesday, April 22, 2015
MANAGERS: Collins (GA)/Polis
1. Structured rule for H.R. 1560.
2. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence.
3. Waives all points of order against consideration of the bill.
4. Makes in order as original text for the purposes of amendment the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence now printed in the bill and provides that it shall be considered as read.
5. Waives all points of order against the amendment in a nature of a substitute.
6. Makes in order only those further amendments printed in part A of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.
7. Waives all points of order against the amendments printed in part A of the report.
8. Provides one motion to recommit with or without instructions.
9. Structured rule for H.R. 1731.
10. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Committee on Homeland Security.
11. Waives all points of order against consideration of the bill.
12. Makes in order as original text for the purpose of amendment an amendment in the nature of a substitute consisting of the text of Rules Committee Print 114-12 and provides that it shall be considered as read.
13. Waives all points of order against that amendment in the nature of a substitute.
14. Makes in order only those further amendments printed in part B of the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.
15. Waives all points of order against the amendments printed in part B of the report.
16. Provides one motion to recommit with or without instructions.
17. Section 3 of the rule directs the Clerk to, in the engrossment of H.R. 1560, add the text of H.R. 1731, as passed by the House, as a new matter at the end of H.R. 1560 and make conforming modifications in the engrossment.
18. Provides that upon the addition of the text of H.R. 1731, as passed by the House, to the engrossment of H.R. 1560, H.R. 1731 shall be laid on the table.
|23||Version 1||Amash (MI)||Republican||Clarifies that an entity may still provide through enforceable contract that it will not share personally identifiable information with the federal government.||Submitted|
|24||Version 1||Amash (MI), Thompson, Bennie (MS)||Bi-Partisan||Sunsets the bill 3 years after enactment.||Submitted|
|25||Version 1||Amash (MI)||Republican||Ensures cyber threat information shared under the bill cannot be used for law enforcement purposes unrelated to cybersecurity.||Submitted|
|26||Version 1||Amash (MI)||Republican||Strengthens the bill’s reporting requirements to include information on how Federal agencies handle cyber threat information shared under the bill and how much personal information is shared that’s unnecessary to protect a network or information system from cybersecurity risks.||Submitted|
|27||Version 1||Amash (MI)||Republican||Ensures non-Federal entities remain liable for acting in reckless disregard of the bill’s requirements concerning the removal of personally identifiable information that’s unrelated to a cybersecurity threat.||Submitted|
|28||Version 1||Amash (MI)||Republican||Ensures common law remedies are still available.||Submitted|
|29||Version 1||Amash (MI)||Republican||Ensures entities need not have acted intentionally to achieve a wrongful purpose to be liable under the bill and allows plaintiffs to show through preponderance of the evidence that an entity is guilty of willful misconduct.||Submitted|
|30||Version 1||Amash (MI)||Republican||Strengthens the protection against the federal government’s use of cyber threat information for regulatory purposes and clarifies the restriction on coercing entities to share such information.||Submitted|
|31||Version 1||Amash (MI)||Republican||Removes the liability waiver.||Submitted|
|32||Version 1||Amash (MI)||Republican||Ensures the federal government is liable for recklessly violating the bill’s restrictions on the use and protection of information shared under the bill.||Submitted|
|22||Version 2||Carter, Buddy (GA)||Republican||Withdrawn Provides enhanced protection and certainty to companies serving as vital commercial infrastructure and handling sensitive information that could be used against the interests of the United States.||Withdrawn|
|6||Version 1||Castro (TX)||Democrat||Makes self-assessment tools available to small and medium-sized businesses to determine their level of cybersecurity readiness||Made In Order|
|7||Version 1||Castro (TX), Cuellar (TX), Doggett (TX), Hurd (TX), Smith, Lamar (TX)||Bi-Partisan||Codifies the establishment of the National Cybersecurity Preparedness Consortium (NCPC) made up of university partners and other stakeholders who proactively coordinate to assist state and local officials in cyber security preparation and prevention of cyber attacks||Made In Order|
|8||Version 1||Connolly (VA), Blumenauer (OR)||Democrat||Requires the Director of National Intelligence to submit a report to Congress examining how the ability of the Federal Government and private entities to recruit talented cybersecurity professionals is impacted by the scheduling of marijuana (cannabis) as a schedule I drug with respect to granting security clearances to such personnel.||Submitted|
|9||Version 1||Connolly (VA)||Democrat||Limits the scope of the “notwithstanding any other provision of law” exemption to explicitly prohibit the authorization of a non-Federal entity to violate the Computer Fraud and Abuse Act.||Submitted|
|10||Version 1||Connolly (VA)||Democrat||Limits the scope of the “notwithstanding any other provision of law” exemption to ensure that the Executive Branch and the Judicial Branch do not interpret this Act to authorize a non-Federal entity to disregard all laws not related to those laws that impact the effective operation of a defensive measure by a non-Federal entity for a cybersecurity purpose, and to disregard the Computer Fraud and Abuse Act, in carrying out the provision authorizing the non-Federal entity to operate a defensive measure for a cybersecurity purpose.||Submitted|
|39||Version 2||Hahn (CA)||Democrat||Late Revised Directs the Secretary of Homeland Security to submit a report to Congress containing assessments of risks and shortfalls along with recommendations regarding cybersecurity at most at risk ports.||Made In Order|
|35||Version 1||Hurd (TX)||Republican||Authorizes the existing Einstein 3A (E3A) program.||Made In Order|
|19||Version 1||Issa (CA), Lofgren (CA), Farenthold (TX), Thompson, Bennie (MS)||Bi-Partisan||Sunsets provisions of the bill in 2020.||Submitted|
|11||Version 1||Jackson Lee (TX)||Democrat||Amends the reports' sunset provision in the bill by providing a 90 day notice to Congressional oversight committees and the public prior to sunset of all required written reports to Congress in this bill.||Submitted|
|12||Version 4||Jackson Lee (TX), Polis (CO)||Democrat||Revised Provides for a Government Accountability Office (GAO) report to Congress 5 years after enactment to assess the impact of this act on privacy and civil liberties.||Made In Order|
|13||Version 1||Jackson Lee (TX)||Democrat||Seeks a GAO report to Congressional oversight committees on the definition of personally identifiable information (PII) in the context of digital communications. PII is information that on its own or in conjunction with other information can uniquely identify a person.||Submitted|
|14||Version 1||Jackson Lee (TX)||Democrat||Provides a definition for “resilience,” which is “the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions, including the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents.”||Submitted|
|15||Version 1||Jackson Lee (TX)||Democrat||Adds additional emphasis on industrial control systems that are essential to mass production, processing and delivery of food, medicines and medical devices. Industrial control systems are prevalent in mass production of a wide range of consumer and industry products.||Submitted|
|16||Version 1||Jackson Lee (TX)||Democrat||Ensures that federal agencies supporting cybersecurity efforts of private sector entities remain current on innovation; industry adoption of new technologies; and industry best practices as they relate to industrial control systems.||Made In Order|
|17||Version 1||Jackson Lee (TX)||Democrat||Requires a report to Congress on the best means for aligning federally funded cybersecurity research and development with private sector efforts to protect privacy and civil liberties while assuring security and resilience of the Nation’s critical infrastructure.||Made In Order|
|33||Version 1||Katko (NY), Lofgren (CA), Eshoo (CA), McClintock (CA)||Bi-Partisan||Amends Section 226 of the Homeland Security Act of 2002 by refining the definition of cyber ‘incident’ to explicitly restrict information sharing to incidents that are directly related to protecting information systems.||Made In Order|
|21||Version 1||Langevin (RI)||Democrat||Clarifies that the term "cybersecurity risk" does not apply to actions solely involving violations of consumer terms of service or consumer licensing agreements.||Made In Order|
|20||Version 2||Lofgren (CA), Polis (CO)||Democrat||Revised Prohibits agencies that receive cyber threat indicators from making requests that private entities alter their information systems in a way that weakens or allows circumvention of security functions.||Submitted|
|34||Version 1||McCaul (TX), Ratcliffe (TX)||Republican||MANAGER’S AMENDMENT Makes technical corrections and further clarifies the provisions of the bill.||Made In Order|
|5||Version 1||McClintock (CA)||Republican||Replaces the overly broad definition of "incident" in Homeland Security Act with narrow language that ensures that activities triggering the sharing provisions are true cyber security threats.||Submitted|
|38||Version 1||Mulvaney (SC), Thompson (MS)||Bi-Partisan||Sunsets the provisions of the bill after 7 years||Made In Order|
|18||Version 1||Polis (CO), Amash (MI), Lofgren (CA)||Bi-Partisan||Prohibits a Federal entity or state, local, or tribal government from sharing any personally identifiable information it receives unless it is necessary to describe or mitigate a cybersecurity threat.||Submitted|
|36||Version 1||Richmond (LA)||Democrat||Removes all potential exemptions from liability for willful misconduct by government actors.||Submitted|
|37||Version 1||Richmond (LA)||Democrat||Strikes immunizing companies that fail to act on timely threat information and clarifies that the Act has no impact on a duty to act on shared information.||Submitted|
|4||Version 1||Rothfus (PA), Thompson, Bennie (MS)||Bi-Partisan||Sunsets the legislation’s authorizations three years after enactment.||Submitted|
|1||Version 1||Sanchez, Loretta (CA)||Democrat||Adds a provision that would ensure the Center informs the public of any violations of the privacy and civil liberties protections.||Submitted|
|2||Version 1||Thompson, Bennie (MS)||Democrat||Sunsets the Act seven years after enactment.||Submitted|
|3||Version 1||Yoder (KS), Polis (CO)||Bi-Partisan||Amends the Electronic Communications Privacy Act, to update the privacy protections for electronic communications information that is stored by third-party service providers in order to protect consumer privacy interests while meeting law enforcement needs.||Submitted|