H.R. 756: Cybersecurity Enhancement Act of 2013

Introduced:
Feb 15, 2013
Status:
Passed House
Prognosis
25% chance of being enacted
Track this bill
Sponsor
Michael McCaul
Representative for Texas's 10th congressional district
Party
Republican
Text
Read Text »
Last Updated
Apr 17, 2013
Length
34 pages
Related Bills
H.R. 2096 (112th) was a previous version of this bill.

Passed House
Last Action: Apr 27, 2012

 
Status

This bill passed in the House on April 16, 2013 and goes to the Senate next for consideration.

Progress
Introduced Feb 15, 2013
Referred to Committee Feb 15, 2013
Reported by Committee Mar 14, 2013
Passed House Apr 16, 2013
Passed Senate ...
Signed by the President ...
Prognosis

25% chance of being enacted.

Only about 23% of bills that made it past committee in 2011–2013 were enacted. [show factors | methodology]

 
Full Title

To advance cybersecurity research, development, and technical standards, and for other purposes.

Summary

No summaries available.

Votes
On Motion to Suspend the Rules and Pass, as Amended
Apr 16, 2013 2:13 p.m.
Passed 402/16

Cosponsors
13 cosponsors (8R, 5D) (show)
Committees

House Science, Space, and Technology

Senate Commerce, Science, and Transportation

The committee chair determines whether a bill will move past the committee stage.

 
Primary Source

THOMAS.gov (The Library of Congress)

GovTrack gets most information from THOMAS, which is updated generally one day after events occur. Activity since the last update may not be reflected here. Data comes via the congress project.

Widget

Get a bill status widget for your website »

Citation

Click a format for a citation suggestion:

Notes

H.R. stands for House of Representatives bill.

A bill must be passed by both the House and Senate in identical form and then be signed by the president to become law.

The bill’s title was written by its sponsor.

GovTrack’s Bill Summary

We don’t have a summary available yet.

Library of Congress Summary

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.


4/16/2013--Passed House amended.
(This measure has not been amended since it was reported to the House on April 11, 2013. The summary of that version is repeated here.)
Cybersecurity Enhancement Act of 2013 -
Title I - Research and Development
Section 103 -
Directs specified federal agencies participating in the National High-Performance Computing Program to:
(1) transmit to Congress a cybersecurity strategic research and development plan and triennial updates, and
(2) develop and annually update an implementation roadmap for such plan.
Instructs the participating agencies, in developing and updating the strategic plan, to solicit recommendations and advice from the advisory committee on high-performance computing and a wide range of specified stakeholders.
Directs such agencies to establish a mechanism to track ongoing and completed federal cybersecurity research and development projects and associated funding. Requires such information to be made available to the public.
Section 104 -
Provides for the award of computer and network security research grants by the National Science Foundation (NSF) in the research areas of social and behavioral factors, including human-computer interactions, identity management, as well as the detection, investigation, and prosecution of cyber-crimes involving organized crime and crimes against children. Authorizes appropriations for FY2014-FY2016 for such grants.
Section 105 -
Requires applications for the establishment of Computer and Network Security Research Centers to include a description of how such Centers will partner with government laboratories, for-profit entities, other institutions of higher education, or nonprofit research institutions. Authorizes appropriations for FY2014-FY2016 for such Centers.
Authorizes appropriations to NSF for FY2014-FY2016 for: (1) computer and network security capacity building grants, (2) grants under the Scientific and Advanced Technology Act for the national advanced scientific and technical education program and national centers of scientific and technical education, and (3) grants for graduate traineeships programs in computer and network security research.
Repeals the Cyber Security Faculty Development Traineeship Program.
Section 106 -
Requires the NSF Director to continue carrying out a Scholarship for Service program under the Cyber Security Research and Development Act to recruit and train the next generation of federal cybersecurity professionals and to increase the capacity of the higher education system to produce an information technology workforce with the skills necessary to enhance the security of the nation's communications and information infrastructure.
Requires the program to:
(1) provide scholarships for tuition, fees, and a stipend for up to two years to students pursuing a bachelor's or master's degree and up to three years to students pursuing a doctoral degree in a cybersecurity field upon condition that a scholarship recipient, upon the completion of the degree, serves as a cybersecurity professional within the federal workforce (or in another specified cybersecurity capacity) for a specified period of time;
(2) provide scholarship recipients with summer internships or other temporary appointments in the federal information technology workforce; and
(3) increase, through competitive grants, the capacity of U.S. higher education institutions to produce highly qualified cybersecurity professionals.
Section 107 -
Directs the President to transmit a report to Congress addressing the cybersecurity workforce needs of the federal government.
Section 108 -
Requires the Director of the Office of Science and Technology Policy to convene a cybersecurity university-industry task force to explore mechanisms for carrying out collaborative research, development, education, and training activities through a consortium or other appropriate entity. Terminates the task force upon transmittal of a report to Congress.
Section 109 -
Revises provisions under the Cyber Security Research and Development Act concerning the development and dissemination by the National Institute of Standards and Technology (NIST) of security risk checklists associated with computer systems that are, or are likely to become, widely used within the federal government.
Requires the NIST Director to establish priorities for the development, and revision as necessary, of security automation standards, associated reference materials (including protocols), and checklists associated with such systems in order to enable standardized and interoperable technologies, architectures, and frameworks to continuously monitor information security within the federal government.
Instructs the NIST Director to ensure that federal agencies are informed of the availability of any standard, reference material, checklist, or other item developed pursuant to this section.
Section 110 -
Requires NIST to conduct intramural security research activities under its computing standards program.
Section 111 -
Directs NSF and NIST to support research that will lead to the development of a scientific foundation for the field of cybersecurity, including research that increases understanding of securing complex networked systems, enables repeatable experimentation, and creates quantifiable security metrics.
Title II - Advancement of Cybersecurity Technical Standards
Section 202 -
Requires the NIST Director to ensure the coordination of federal agencies engaged in the development of international technical standards related to information system security. Requires the development and transmittal to Congress of a plan to ensure coordination by such federal agencies. Instructs the Director to ensure consultation with appropriate private sector stakeholders.
Section 203 -
Requires the NIST Director, in collaboration with the federal Chief Information Officers Council, to continue to develop and encourage implementation of a comprehensive strategy for the use and adoption of cloud computing services by the federal government.
Requires consideration to be given to activities that:
(1) accelerate the development, in collaboration with the private sector, of standards that address the interoperability and portability of cloud computing services;
(2) advance the development of conformance testing performed by the private sector in support of cloud computing standardization; and
(3) support, in consultation with the private sector, the development of appropriate security frameworks and reference materials, and the identification of best practices, for federal agencies to use in addressing security and privacy requirements.
Section 204 -
Requires the NIST Director, in collaboration with the National Coordination Office of the Networking and Information Technology Research and Development program, to continue the coordination of a cybersecurity awareness and education program for increasing the knowledge, skills, and awareness of cybersecurity risks, consequences, and best practices through:
(1) the widespread dissemination of cybersecurity technical standards and best practices identified by NIST;
(2) efforts to make cybersecurity best practices usable by individuals, small to medium-sized businesses, state, local, and tribal governments, and educational institutions;
(3) improving the state of cybersecurity education at all educational levels; and
(4) efforts to attract, recruit, and retain qualified professionals to the federal cybersecurity workforce and improve the skills and training of such workforce.
Requires the NIST Director to implement and transmit a strategic plan to Congress to guide federal programs and activities in support of a specified comprehensive cybersecurity awareness and education program.
Section 205 -
Requires the NIST Director to continue a program to support the development of technical standards, metrology, testbeds, and conformance criteria with regard to identity management research and development.
Section 206 -
Prohibits the authorization of any additional funds to carry out this Act and the amendments made by this Act. Requires this Act and the amendments made by this Act to be carried out using otherwise authorized or appropriated amounts.

House Republican Conference Summary

The summary below was written by the House Republican Conference, which is the caucus of Republicans in the House of Representatives.


No summary available.

House Democratic Caucus Summary

The House Democratic Caucus does not provide summaries of bills.

So, yes, we display the House Republican Conference’s summaries when available even if we do not have a Democratic summary available. That’s because we feel it is better to give you as much information as possible, even if we cannot provide every viewpoint.

We’ll be looking for a source of summaries from the other side in the meanwhile.

Use the comment space below for discussion of the merits of H.R. 756 with other GovTrack users.
Your comments are not read by Congressional staff.

comments powered by Disqus