2000
[DOCID: f:s1900is.txt]






107th CONGRESS
  2d Session
                                S. 1900

    To protect against cyberterrorism and cybercrime, and for other 
                               purposes.


_______________________________________________________________________


                   IN THE SENATE OF THE UNITED STATES

                            January 28, 2002

  Mr. Edwards introduced the following bill; which was read twice and 
   referred to the Committee on Commerce, Science, and Transportation

_______________________________________________________________________

                                 A BILL


 
    To protect against cyberterrorism and cybercrime, and for other 
                               purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Cyberterrorism Preparedness Act of 
2002''.

SEC. 2. GRANT FOR PROGRAM FOR PROTECTION OF INFORMATION INFRASTRUCTURE 
              AGAINST DISRUPTION.

    (a) In General.--The National Institute of Standards and Technology 
shall, using amounts authorized to be appropriated by section 5, award 
a grant to a qualifying nongovernmental entity for purposes of a 
program to support the development of appropriate cybersecurity best 
practices, support long-term cybersecurity research and development, 
and perform functions relating to such activities. The purpose of the 
program shall be to provide protection for the information 
infrastructure of the United States against terrorist or other 
disruption or attack or other unwarranted intrusion.
    (b) Qualifying Nongovernmental Entity.--For purposes of this 
section, a qualifying nongovernmental entity is any entity that--
            (1) is a nonprofit, nongovernmental consortium composed of 
        at least three academic centers of expertise in cybersecurity 
        and at least three private sector centers of expertise in 
        cybersecurity;
            (2) has a board of directors of at least 12 members who 
        include senior administrators of academic centers of expertise 
        in cybersecurity and senior managers of private sector centers 
        of expertise in cybersecurity and of whom not more than one 
        third are affiliated with the centers comprising the 
        consortium;
            (3) is operated by individuals from academia, the private 
        sector, or both who have--
                    (A) a demonstrated expertise in cybersecurity; and
                    (B) the capacity to carry out the program required 
                under subsection (g);
            (4) has in place a set of rules to ensure that conflicts of 
        interest involving officers, employees, and members of the 
        board of directors of the entity do not undermine the 
        activities of the entity;
            (5) has developed a detailed plan for the program required 
        under subsection (g); and
            (6) meets any other requirements established by the 
        National Institute of Standards and Technology for purposes of 
        this Act.
    (c) Application.--Any entity seeking a grant under this section 
shall submit to the National Institute of Standards and Technology an 
application therefor, in such form and containing such information as 
the National Institute for Standards and Technology shall require.
    (d) Selection of Grantee.--The entity awarded a grant under this 
section shall be selected after full and open competition among 
qualifying nongovernmental entities.
    (e) Dispersal of Grant Amount.--Amounts available for the grant 
under this section pursuant to the authorization of appropriations in 
section 5 shall be dispersed on a fiscal year basis over the five 
fiscal years beginning with fiscal year 2003.
    (f) Consultation.--In carrying out activities under this section, 
including selecting an entity for the award of a grant, dispersing 
grant amounts, and overseeing activities of the entity receiving the 
grant, the National Institute of Standards and Technology--
            (1) shall consult with an existing interagency entity, or 
        new interagency entity, consisting of the elements of the 
        Federal Government having a substantial interest and expertise 
        in cybersecurity and designated by the President for purposes 
        of this Act; and
            (2) may consult separately with any such element of the 
        Federal Government.
    (g) Program Using Grant Amount.--
            (1) In general.--The entity awarded a grant under this 
        section shall carry out a national program for the purpose of 
        protecting the information infrastructure of the United States 
        against disruption. The program shall consist of--
                    (A) multi-disciplinary research and development to 
                identify appropriate cybersecurity best practices, to 
                measure the effectiveness of cybersecurity best 
                practices that are put into use, and to identify sound 
                means to achieve widespread use of appropriate 
                cybersecurity best practices that have proven 
                effective;
                    (B) multi-disciplinary, long-term, or high-risk 
                research and development (including associated human 
                resource development) to improve cybersecurity; and
                    (C) the activities required under paragraphs (3) 
                and (4).
            (2) Conduct of research and development.--
                    (A) In general.--Except as provided in subparagraph 
                (B), research and development under subparagraphs (A) 
                and (B) of paragraph (1) shall be carried out using 
                funds and other support provided by the grantee to 
                entities selected by the grantee after full and open 
                competition among entities determined by the grantee to 
                be qualified to carry out such research and 
                development.
                    (B) Conduct by grantee.--The grantee may carry out 
                research and development referred to in subparagraph 
                (A) in any fiscal year using not more than 15 percent 
                of the amount dispersed to the grantee under this Act 
                in such fiscal year by the National Institute of 
Standards and Technology.
            (3) Recommendations on cybersecurity best practices.--
                    (A) Recommendations.--Not later than 18 months 
                after the selection of the grantee under this section, 
                the grantee shall prepare a report containing 
                recommendations for appropriate cybersecurity best 
                practices.
                    (B) Updates.--The grantee shall update the 
                recommendations made under subparagraph (A) not less 
                often than once every six months, and may update any 
                portion of such recommendations more frequently if the 
                grantee determines that circumstances so require.
                    (C) Considerations.--In making recommendations 
                under subparagraph (A), and any update of such 
                recommendations under subparagraph (B), the grantee 
                shall--
                            (i) review the most current cybersecurity 
                        best practices identified by the National 
                        Institute of Standards and Technology under 
                        section 3(a); and
                            (ii) consult with--
                                    (I) the entities carrying out 
                                research and development under 
                                paragraph (1)(A);
                                    (II) entities employing 
                                cybersecurity best practices; and
                                    (III) a wide range of academic, 
                  
2000
              private sector, and public entities.
                    (D) Dissemination.--The grantee shall submit the 
                report under subparagraph (A), and any update of the 
                report under paragraph (B), to the bodies and officials 
                specified in paragraph (5), and shall widely 
                disseminate the report, and any such update, among 
                government (including State and local government), 
                private, and academic entities.
            (4) Activities relating to widespread use of cybersecurity 
        best practices.--
                    (A) In general.--Not later than two years after the 
                selection of the grantee under this section, the 
                grantee shall submit to the bodies and officials 
                specified in paragraph (5) a report containing--
                            (i) an assessment of the advisability of 
                        requiring the contractors and grantees of the 
                        Federal Government to use appropriate 
                        cybersecurity best practices; and
                            (ii) recommendations for sound means to 
                        achieve widespread use of appropriate 
                        cybersecurity best practices that have proven 
                        effective.
                    (B) Report elements.--The report under subparagraph 
                (A) shall set forth--
                            (i) whether or not the requirement 
                        described in subparagraph (A)(i) is advisable, 
                        including whether the requirement would impose 
                        undue or inappropriate burdens, or other 
                        inefficiencies, on contractors and grantees of 
                        the Federal Government;
                            (ii) if the requirement is determined 
                        advisable--
                                    (I) whether, and to what extent, 
                                the requirement should be subject to 
                                exceptions or limitations for 
                                particular contractors or grantees, 
                                including the types of contractors or 
                                grantees and the nature of the 
                                exceptions or limitations; and
                                    (II) which cybersecurity best 
                                practices should be covered by the 
                                requirement and with what, if any, 
                                exceptions or limitations; and
                            (iii) any other matters that the grantee 
                        considers appropriate.
            (5) Specified bodies and officials.--The bodies and 
        officials specified in this paragraph are as follows:
                    (A) The appropriate committees of Congress.
                    (B) The President.
                    (C) The Director of the Office of Management and 
                Budget.
                    (D) The National Institute of Standards and 
                Technology.
                    (E) The interagency entity designated by the 
                President under subsection (f)(1).
    (h) Grant Administration.--
            (1) Use of grant competition and management systems.--The 
        National Institute of Standards and Technology may permit the 
        entity awarded the grant under this section to utilize the 
        grants competition system and grants management system of the 
        National Institute of Standards and Technology for purposes of 
        the efficient administration of activities by the entity under 
        subsection (g).
            (2) Rules.--The National Institute of Standards and 
        Technology shall establish any rules and procedures that the 
        National Institute of Standards and Technology considers 
        appropriate to further the purposes of this section. Such rules 
        may include provisions relating to the ownership of any 
        intellectual property created by the entity awarded the grant 
        under this section or funded by the entity under subsection 
        (g).
    (i) Supplement Not Supplant.--The National Institute of Standards 
and Technology shall take appropriate actions to ensure that activities 
under this section supplement, rather than supplant, other current 
governmental and nongovernmental efforts to protect the information 
infrastructure of the United States.

SEC. 3. APPROPRIATE CYBERSECURITY BEST PRACTICES FOR THE FEDERAL 
              GOVERNMENT.

    (a) NIST Recommendations.--
            (1) In general.--Not later than 180 days after the date of 
        the enactment of this Act, the National Institute of Standards 
        and Technology shall submit to the bodies and officials 
        specified in subsection (e) a report that--
                    (A) identifies appropriate cybersecurity best 
                practices that could reasonably be adopted by the 
departments and agencies of the Federal Government over the 24-month 
period beginning on the date of the report; and
                    (B) sets forth proposed demonstration projects for 
                the adoption of such best practices by various 
                departments and agencies of the Federal Government 
                beginning 90 days after the date of the report.
            (2) Updates.--The National Institute of Standards and 
        Technology may submit to the bodies and officials specified in 
        subsection (e) any updates of the report under paragraph (1) 
        that the National Institute of Standards and Technology 
        consider appropriate due to changes in circumstances.
            (3) Consultation.--In preparing the report under paragraph 
        (1), and any updates of the report under paragraph (2), the 
        National Institute of Standards and Technology shall consult 
        with departments and agencies of the Federal Government having 
        an interest in the report and such updates, and with academic 
        centers of expertise in cybersecurity and private sector 
        centers of expertise in cybersecurity.
    (b) Demonstration Projects for Implementation of Recommendations.--
            (1) In general.--Commencing not later than 90 days after 
        receipt of the report under subsection (a), the President shall 
        carry out the demonstration projects set forth in the report, 
        including any modification of any such demonstration project 
        that the President considers appropriate.
            (2) Updates.--If the National Institute of Standards and 
        Technology updates under subsection (a)(2) any recommendation 
        under subsection (a)(1)(A) that is relevant to a demonstration 
        project under paragraph (1), the President shall modify the 
        demonstration project to take into account such update.
            (3) Report.--Not later than nine months after commencement 
        of the demonstration projects under this subsection, the 
        President shall submit to the appropriate committees of 
        Congress a report on the demonstration projects. The report 
        shall set forth the following:
                    (A) An assessment of the extent to which the 
                adoption of appropriate cybersecurity best practices by 
                departments and agencies of the Federal Government 
                under the demonstration projects has improved 
                cybersecurity at such departments and agencies.
                    (B) An assessment whether or not the adoption of 
                appropriate cybersecurity best practices by departments 
                and agencies of the Federal Government under the 
                demonstration projects has affected the capability of 
                such departments and agencies to carry out their 
                missions.
                    (C) A description of the cost
f63
 of the adoption of 
                appropriate cybersecurity best practices by departments 
                and agencies of the Federal Government under the 
                demonstration projects.
                    (D) A description of a security-enhancing, 
                missions-compatible, cost-effective program, to the 
                extent such program is feasible, for the adoption of 
                appropriate cybersecurity best practices government-
                wide.
                    (E) Any other matters that the President considers 
                appropriate.
    (c) Adoption of Cybersecurity Best Practices Government-Wide.--The 
President shall implement a program for the adoption of appropriate 
cybersecurity best practices government-wide commencing not later than 
six months after the date of the report.
    (d) Incorporation of Recommendations.--If during the development or 
implementation of the program under subsection (c) the President 
receives any recommendations under paragraph (3) or (4) of section 
3(g), the President shall modify the program in order to take into 
account such recommendations.
    (e) Specified Bodies and Officials.--The bodies and officials 
specified in this subsection are as follows:
            (1) The appropriate committees of Congress.
            (2) The President.
            (3) The Director of the Office of Management and Budget.
            (4) The interagency entity designated by the President 
        under section 3(f)(1).

SEC. 4. DEFINITIONS.

    In this Act:
            (1) Appropriate committees of congress.--The term 
        ``appropriate committees of Congress'' means--
                    (A) the Committee on Commerce, Science, and 
                Transportation of the Senate; and
                    (B) the Committee on Science of the House of 
                Representatives.
            (2) Cybersecurity.--The term ``cybersecurity'' means 
        information assurance, including information security, 
        information technology disaster recovery, and information 
        privacy.
            (3) Cybersecurity best practice.--The term ``cybersecurity 
        best practice'' means a computer hardware or software 
        configuration, information system design, operational 
        procedure, or measure, structure, or method that most 
        effectively protects computer hardware, software, networks, or 
        network elements against an attack that would cause harm 
        through the installation of unauthorized computer software, 
        saturation of network traffic, alteration of data, disclosure 
        of confidential information, or other means.
            (4) Appropriate cybersecurity best practice.--The term 
        ``appropriate cybersecurity best practice'' means a 
        cybersecurity best practice that--
                    (A) permits, as needed, customization or expansion 
                for the computer hardware, software, network, or 
                network element to which the best practice applies;
                    (B) takes into account the need for security 
                protection that balances--
                            (i) the risk and magnitude of harm 
                        threatened by potential attack; and
                            (ii) the cost of imposing security 
                        protection; and
                    (C) takes into account the rapidly changing nature 
                of computer technology.

SEC. 5. AUTHORIZATION OF APPROPRIATIONS.

    There is hereby authorized to be appropriated for the National 
Institute of Standards and Technology for purposes of activities under 
this Act, amounts as follows:
            (1) For fiscal year 2003, $70,000,000.
            (2) For each of the fiscal years 2004 through 2007, such 
        sums as may be necessary.
                                 <all>

0