Hearing Information
Meeting Time
Tuesday, April 16, 2013 - 3:00pm in H-313, The Capitol View Announcement »
Amendment Deadline
Tuesday, April 16, 2013 - 10:00am View Announcement »
Tuesday, April 16, 2013 - 3:00pm in H-313, The Capitol View Announcement »
Tuesday, April 16, 2013 - 10:00am View Announcement »
Cyber Intelligence Sharing and Protection Act (as introduced in House)
Rules Committee Print 113-7 PDF XML
Showing the text of H.R. 624 as ordered reported by the Permanent Select Committee on Intelligence with a modification
Text of H. Rept. 113-39 PDF XML
Report from the Permanent Select Committee on Intelligence
Rule PDF
:: Text of Amendment to H. Res. 164 (adopted on 04/17/2013) PDF
This amendment to the rule allows for consideration fo a revised McCaul amendment that reflects compromise language agreed to by relevant committees; it will be debated before final passage at the end of amendment debate.
COMMITTEE ACTION:
REPORTED BY VOICE VOTE on Tuesday, April 16, 2013.
FLOOR ACTION ON H. RES. 164:
Agreed to by record vote of 227-192, after agreeing to H. Amnt. 41 by voice vote, on Wednesday, April 17, 2013.
MANAGERS: Woodall/Hastings (FL)
1. Structured rule.
2. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence.
3. Waives all points of order against consideration of the bill.
4. Makes in order as original text for the purpose of amendment an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113-7 and provides that it shall be considered as read.
5. Waives all points of order against the amendment in the nature of a substitute.
6. Makes in order only those further amendments printed in the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, shall not be subject to a demand for division of the question.
7. Waives all points of order against the amendments printed in the report.
8. Provides one motion to recommit with or without instructions.
Click headers to sort.
# | Version # | Sponsor(s) | Party | Summary | Status |
---|---|---|---|---|---|
31 | Version 1 | Amash (MI), Massie (KY), Polis (CO), Radel, Trey (FL), Broun (GA), DeSantis, Ron (FL) | Bi-Partisan | Permits an entity to provide through enforceable contract that it will not share personally identifiable information with the federal government. | Submitted |
32 | Version 1 | Amash (MI), Massie (KY), Polis (CO), Broun (GA) | Bi-Partisan | Prohibits the federal government from using, inter alia, library records, firearms sales records, and tax returns that it receives from private entities under CISPA. | Made in Order |
8 | Version 1 | Barton (TX) | Republican | Clarifies that companies sharing cyber threat information with other companies cannot treat this sharing relationship as a loophole to sell a consumer's personal information for a marketing purpose. | Made in Order |
24 | Version 1 | Bustos, Cheri (IL) | Democrat | Requires an annual report to Congress with recommendations on workforce needs and related education and training needs to meet future cybersecurity threats, as well as an annual report on recommendations for retraining Veterans and members of the Armed Forces into roles combating cyber threats. | Submitted |
26 | Version 1 | Crdenas, Tony (CA) | Democrat | Requires the Director of National Intelligence to establish an outreach program to assist small businesses in cyber threat education. | Submitted |
33 | Version 1 | Connolly (VA) | Democrat | Further defines how classified cyber threat intelligence may be shared and used. Adds an additional provision stipulating that classified threat intelligence may only be used, retained, or further disclosed by a certified entity only for cybersecurity purposes. | Made in Order |
39 | Version 1 | Connolly (VA) | Democrat | Late Strengthens the policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the Federal Government. | Submitted |
40 | Version 1 | Connolly (VA) | Democrat | Late Stipulates that the liability provisions for private sector entities are contingent upon the Privacy and Civil Liberties Oversight Board being operational. | Submitted |
41 | Version 1 | Connolly (VA) | Democrat | Late Prohibits an internet service provider from being granted immunity if acting as an agent of the Federal government. | Submitted |
7 | Version 1 | Conyers (MI), Schakowsky (IL), Jackson Lee (TX), Johnson, Hank (GA), Holt (NJ) | Democrat | Amends liabilty exemption to exclude "decisions made" from coverage. | Made in Order |
30 | Version 1 | Enyart, William (IL) | Democrat | Requires the Inspector General (IG) of the Intelligence Community, in consultation with each IG of each federal government department or agency to submit to Congress a report reviewing cyber threats to manufacturing and agricultural production in the U.S. The report is due within 180 days of CISPA’s enactment, and then semiannually thereafter. | Submitted |
1 | Version 1 | Franks (AZ) | Republican | Withdrawn Broadens the definitions of Cyber Threat Information, Cyber Threat Intelligence, Cybersecurity Purpose, and Cybersecurity System within CISPA to ensure these terms include vulnerabilities to natural and manmade electromagnetic pulse. | Withdrawn |
10 | Version 1 | Grayson (FL) | Democrat | Requires the federal government to obtain a warrant before it conducts an affirmative search on information shared with it under the authority of this bill. Specifically, strikes “for a purpose other than a purpose referred to in paragraph (1)” on p. 11, beginning on line 23, and inserts “without a warrant obtained in accordance with the fourth amendment to the Constitution of the United States”. | Submitted |
13 | Version 1 | Jackson Lee (TX) | Democrat | Protects Internet users by promoting responsible actions by private entities and individuals seeking to address cyber security threats. The amendment limits liability protection to steps taken to secure an entity's network while under cyber attack, but would not extend protection to offensive actions taken against external networks or perceived threats. | Submitted |
14 | Version 1 | Jackson Lee (TX) | Democrat | Expresses the Sense of the Congress that the United States should work for international cooperative agreements to protect critical infrastructure and institutions from cyber threats. Electric Utility grids, refineries, oil and gas extraction systems, pipelines, water treatment systems, sewage systems, medical devices and hospitals should be among the systems that are protected. | Submitted |
15 | Version 1 | Jackson Lee (TX) | Democrat | Enhances privacy protection by preventing unnecessary disclosures of personal information by limiting reporting in cases involving an imminent threat of harm or death. Assists agencies in focusing resources on matters of greatest threat to national cyber security. | Submitted |
16 | Version 1 | Jackson Lee (TX) | Democrat | Expresses the Sense of the Congress that all Federal Government computing devices should be protected by strong encryption to secure information while at rest and in transit and digital information stored on computers and on network, and information sent over the Internet should be secured against abuse or misuse. | Submitted |
17 | Version 1 | Jackson Lee (TX) | Democrat | Clarifies that cyber security service providers need only provide information about cyber security incidents if they pose a threat to the government’s information and protects individuals’ private data from being accessed by the government solely because it is stored by a company that provides information services to a government agency | Made in Order |
18 | Version 1 | Jackson Lee (TX) | Democrat | Expresses the Sense of the Congress that the United States should work for international cooperative agreements to protect critical infrastructure and institutions from cyber threats, and ensure that all Federal Government computing devices use strong encryption to secure government information against abuse or misuse. | Submitted |
34 | Version 2 | Jackson Lee (TX) | Democrat | Revised Designates the Department of Homeland Security as the lead agency on cybersecurity. | Submitted |
25 | Version 1 | Johnson, Hank (GA) | Democrat | Limits information sharing with law enforcement agencies to only include imminent cybersecurity threats. Strikes other forms of information sharing with law enforcement. | Submitted |
27 | Version 1 | Kilmer, Derek (WA) | Democrat | Establishes a Cybersecurity Technology Commercialization Office. | Submitted |
35 | Version 1 | Langevin (RI) | Democrat | Replaces the term “local” with “political subdivision”, which allows the inclusion of utility “districts” that would not otherwise be covered but that are intended to be covered in the bill. | Made in Order |
42 | Version 1 | McCaul (TX), Rogers, Mike (MI), Ruppersberger (MD), Thompson, Bennie (MS) | Bi-Partisan | Late Establishs a primary point of receipt in the Federal Government for cyber threat information sharing at the Department of Homeland Security. | Submitted |
12 | Version 1 | McNerney (CA) | Democrat | Requires the Secretary of Homeland Security, instead of the Director of National Intelligence, to establish and review the policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the federal government. | Submitted |
6 | Version 1 | Paulsen (MN) | Republican | Establishes the sense of congress that international cooperation should be encouraged where possible in regards to cyber security. | Made in Order |
36 | Version 1 | Perlmutter (CO), Welch (VT) | Democrat | Withdrawn Prohibits the requirement of access to an employee's personal social media accounts by an employer as a means of obtaining or retaining employment. Exceptions to this access include when classified information, or an employee has explicitly shared private organizational information. | Withdrawn |
38 | Version 1 | Peters, Scott (CA) | Democrat | Late Establishes a National Economic and Critical Industry Intelligence Center. Requires the Director of National Intelligence to establish a National Economic and Critical Industry Intelligence Center that assesses the impact of cyber attacks on industries of national importance and how those attacks threaten national security. | Submitted |
20 | Version 2 | Polis (CO) | Democrat | Revised Limits the federal government’s use of data only for cybersecurity purposes pursuant to the title and purpose of the bill. The amendment also narrows the law enforcement exception to only instances of “imminent” danger. | Submitted |
28 | Version 1 | Rogers, Mike (MI) | Republican | Corrects reported language concerning a reference in subsection (c)(4) to the procedures created in (c)(7). | Made in Order |
29 | Version 1 | Rogers, Mike (MI) | Republican | Makes clear that nothing in this bill authorizes the government to target a US person for surveillance. | Made in Order |
21 | Version 1 | Ruiz, Raul (CA) | Democrat | Requires the Director of National Intelligence to establish a small business cyber technology office to assist small business concerns in providing cybersecurity solutions to the Government, with a preference toward Veteran-owned small businesses (51%+ Veteran-owned). | Submitted |
2 | Version 1 | Sanchez, Loretta (CA) | Democrat | Inserts language that would ensure that privacy and civil liberties groups would be part of the policy and procedures reviews. | Submitted |
3 | Version 1 | Sanchez, Loretta (CA) | Democrat | Inserts language that would notify the Secretary of Homeland Security if any violations of the policies and procedures occurred. | Submitted |
4 | Version 1 | Sanchez, Loretta (CA) | Democrat | Inserts language that would include the Inspector General of DHS in reporting the use of information shared by the federal government. | Submitted |
5 | Version 1 | Sanchez, Loretta (CA) | Democrat | Inserts language that would include the Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department of Homeland Security in issuing a report on assessing the privacy and civil liberties impact of this bill. | Made in Order |
23 | Version 1 | Schakowsky (IL), Schiff (CA), Thompson, Bennie (MS), Jackson Lee (TX), DeGette (CO), Polis (CO) | Democrat | Requires that the first point of sharing information with the federal government must be with a civilian agency, ensuring that the U.S. military or defense agencies do not directly collect or receive cyber information on American citizens. | Submitted |
11 | Version 1 | Schiff (CA), Schakowsky (IL), Holt (NJ), Eshoo (CA), Thompson, Bennie (MS) | Democrat | Requires that private entities sharing information with the government or other private entities under the bill make “reasonable efforts” to remove Personally Identifiable Information of persons unrelated to the cyber threat. | Submitted |
9 | Version 1 | Schneider, Bradley (IL) | Democrat | Clarifies that independent contractors are eligible for security clearances for purposes of employment to handle cyber threat intelligence and cyber threat information. | Made in Order |
37 | Version 1 | Sinema, Kyrsten (AZ) | Democrat | Late Adds the Inspector General (IG) of DHS to the omnibus IG reporting requirement. Adds the DHS IG to rest of the group responsible for submitting an annual report to Congress. Adds the House Committee on Homeland Security and the Senate Committee on Homeland Security and Governmental Affairs to the recipients of the report. | Made in Order |
19 | Version 1 | Thompson, Bennie (MS) | Democrat | Requires the Director of National Intelligence to consult with “privacy and civil liberties stakeholders” in developing the privacy and civil liberties policies and procedures; (2) extend coverage under these policies and procedures to information used to identify a person or information or communications, records or system traffic; and (3) require annual reporting on implementation to Congress in an unclassified format, to the greatest extent practicable. | Submitted |
22 | Version 1 | Wasserman Schultz (FL), Smith, Lamar (TX) | Bi-Partisan | Inserts the text of H.R. 744, the Stopping Tax Offenders and Prosecuting Identity Theft Act, which brings together several measures to strengthen criminal penalties and increase the prosecution rate of tax return identity thieves. | Submitted |
Motion by Ms. Slaughter to amend the rule to H.R. 624 to make in order and provide the appropriate waivers for amendment #11, offered by Rep. Schiff (CA), Rep. Eshoo (CA), Rep. Holt (NJ), Rep. Schakowsky (IL) and Rep. Thompson (MS), which requires that private entities sharing information with the government or other private entities under the bill make “reasonable efforts” to remove Personally Identifiable Information of persons unrelated to the cyber threat. Defeated: 4–9
Motion by Mr. Polis to amend the rule to H.R. 624 to make in order and provide the appropriate waivers for amendment #31, offered by Rep. Amash (MI), Rep. Radel (FL), Rep. Broun (GA), Rep. Massie (KY), Rep. Polis (CO) and Rep. DeSantis (FL), which permits an entity to provide through enforceable contract that it will not share personally identifiable information with the federal government. Defeated: 5–8
Motion by Mr. Polis to amend the rule to H.R. 624 to make in order and provide the appropriate waivers for amendment #20, offered by Rep. Polis (CO) and Rep. Amash (MI), which limits the federal government’s use of data only for cybersecurity purposes pursuant to the title and purpose of the bill. The amendment also narrows the law enforcement exception to only instances of “imminent” danger; and amendment # 23, offered by Rep. Schakowsky (IL), Rep. DeGette (CO), Rep. Jackson Lee (TX), Rep. Schiff (CA), Rep. Polis (CO) and Rep. Thompson (MS), which requires that the first point of sharing information with the federal government must be with a civilian agency, ensuring that the U.S. military or defense agencies do not directly collect or receive cyber information on American citizens. Defeated: 4–9