H. Res. 1051: H.R. 4061 - Cybersecurity Enhancement Act of 2009

COMMITTEE ACTION: REPORTED BY A VOICE VOTE on Tuesday February 2, 2010.
FLOOR ACTION: ADOPTED BY A RECORD VOTE OF 237-176 AFTER AGREEING TO THE PREVIOUS QUESTION BY A RECORD VOTE OF 238-175 on Wednesday, February 3, 2010. 

MANAGERS: Arcuri/Foxx
111th Congress 
2nd Session

H.RES 1051

[Report No. 111-410]

H.R. 4061 - Cybersecurity Enhancement Act of 2009

1.

Structured rule. 

2.

Waives all points of order against consideration of the bill except those arising under clause 9 or 10 of rule XXI.

3.

Provides 1 hour of general debate equally divided and controlled by the chair and ranking minority member of the Science and Technology Committee.

4.

Provides that the amendment in the nature of a substitute recommended by the Science and Technology Committee shall be considered as an original bill for the purpose of amendment and shall be considered as read.

5.

Waives all points of order against the amendment in the nature of a substitute except those arising under clause 10 of rule XXI. This waiver does not affect the point of order available under clause 9 of rule XXI (regarding earmark disclosure).

6.

No amendments shall be in order except those amendments printed in the Rules Committee report accompanying the resolution.  Provides that the amendments made in order may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.

7.

Waives all points of order against the amendments printed in the report except those arising under clause 9 or 10 of rule XXI.

8.

Provides one motion to recommit with or without instructions.

9.

Provides that the Chair may entertain a motion that the Committee rise only if offered by the chair of the Science and Technology Committee or his designee.

10.

Provides that the Chair may not entertain a motion to strike out the enacting words of the bill.

   
 
RESOLUTION
   
  Resolved, That at any time after the adoption of this resolution the Speaker may, pursuant to clause 2(b) of rule XVIII, declare the House resolved into the Committee of the Whole House on the state of the Union for consideration of the bill (H.R. 4061) to advance cybersecurity research, development, and technical standards, and for other purposes. The first reading of the bill shall be dispensed with. All points of order against consideration of the bill are waived except those arising under clause 9 or 10 of rule XXI. General debate shall be confined to the bill and shall not exceed one hour equally divided and controlled by the chair and ranking minority member of the Committee on Science and Technology. After general debate the bill shall be considered for amendment under the five-minute rule. It shall be in order to consider as an original bill for the purpose of amendment under the five-minute rule the amendment in the nature of a substitute recommended by the Committee on Science and Technology now printed in the bill. The committee amendment in the nature of a substitute shall be considered as read. All points of order against the committee amendment in the nature of a substitute are waived except those arising under clause 10 of rule XXI. Notwithstanding clause 11 of rule XVIII, no amendment to the committee amendment in the nature of a substitute shall be in order except those printed in the report of the Committee on Rules accompanying this resolution. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question. All points of order against such amendments are waived except those arising under clause 9 or 10 of rule XXI. At the conclusion of consideration of the bill for amendment the Committee shall rise and report the bill to the House with such amendments as may have been adopted. The previous question shall be considered as ordered on the bill and amendments thereto to final passage without intervening motion except one motion to recommit with or without instructions.

Sec. 2. The Chair may entertain a motion that the Committee rise only if offered by the chair of the Committee on Science and Technology or his designee. The Chair may not entertain a motion to strike out the enacting words of the bill (as described in clause 9 of rule XVIII).

   
 
SUMMARY OF AMENDMENTS PROPOSED TO BE MADE IN ORDER

(summaries derived from information provided by sponsors)
   

Sponsor

#

Description

Debate Time

1. Hastings, Alcee (FL), Rodriguez (TX)

#23

Would address the lack of minority representation in the cybersecurity industry—including women and African-Americans, Hispanics, and Native Americans. The amendment adds language in Sec. 107 to describe how successful programs are engaging said minorities and in Sec. 108 to include minority-serving institutions on the Cybersecurity University-Industry Task Force.

(10 minutes)

2. Polis (CO)

#2

Would allow participants in the Federal Cyber Scholarship for Service program to seek out opportunities for internships, or other meaningful appointments, in the private sector.

(10 minutes)

3. Flake, Jeff (AZ)

#31

Would prohibit the earmarking of funds authorized for grants in the bill.

(10 minutes)

4. Matheson (UT)

#1

Would require the National Science Foundation to study ways to improve detection, investigation, and prosecution of cyber crimes including piracy of intellectual property, crimes against children, and organized crime.

(10 minutes)

5. Roskam (IL)

#16

Would strengthen the involvement of community colleges in the development and implementation of a national cybersecurity strategy.

(10 minutes)

6. Edwards, Donna (MD)

#37

(REVISED) Would direct NIST to work in cooperation with State, Federal, and private sector partners to develop a framework that States may follow in order to achieve effective cybersecurity practices in a timely and cost effective manner.

(10 minutes)

7. Paulsen (MN)

#9

(REVISED) Would include international cooperation where appropriate as part of the Cybersecurity Strategic Research and Development Plan.

(10 minutes)

8. Dahlkemper (PA)

#7

Would allow collaboration between and among community colleges, universities, and Manufacturing Extension Partnership Centers as an additional use for the Computer and Network Security Capacity Building Grants under the Cyber Security Research and Development Act.

(10 minutes)

9. Garamendi, John

#10

Would provide for regional workshops as part of the Cybersecurity Awareness and Education program.

(10 minutes)

10. McCarthy, Carolyn (NY), Kratovil (MD)

#30

(REVISED) Would emphasize that cybersecurity awareness and education efforts focus on novice computer users, young and elderly populations, low-income populations, and populations in areas of planned broadband expansion or deployment.

(10 minutes)

11. Smith, Adam (WA)

#24

Would add "job security clearance and suitability requirements" to the issues that are to be considered in the cybersecurity workforce assessment.

(10 minutes)

12. Langevin (RI)

#25

(REVISED) Would direct the Cybersecurity Workforce Assessment to examine expanding temporary assignments of private sector cybersecurity professionals to Federal agencies.

(10 minutes)

13. Sanchez, Loretta (CA)

#28

(REVISED) Would facilitate access to realistic threats and vulnerabilities for academic researchers during the development of the strategic plan in section 103 Cybersecurity Strategic Research and Development Program. Would also amend section 108 Cybersecurity University-Industry Task Force to propose guidelines for the sharing of lessons learned of the effectiveness of new technologies from the private sector to the public sector.

(10 minutes)

14. Cuellar (TX)

#29

Would add to the Cybersecurity Strategic Research and Development plan a requirement to determine how to strengthen all levels of cybersecurity education and training programs to secure an adequate, well-trained workforce.

(10 minutes)

15. Shea-Porter (NH)

#8

Would extend the service obligation for recipients of cybersecurity scholarships or fellowships on a sliding scale depending on the degree program.

(10 minutes)

16. Clarke (NY)

#17

(REVISED) Would enhance the existing cybersecurity workforce assessment by including contractors.

(10 minutes)

17. Bright (AL)

#11

Would require a National Academy of Sciences study on the role of community colleges in cybersecurity education. The study would also identify best practices related to cybersecurity education between community colleges and four-year educational institutions.

(10 minutes)

18. Connolly (VA)

#13

Would emphasize that promotion of cybersecurity education also must include "children and young adults" along with the other targeted audiences.

(10 minutes)

19. Halvorson (IL), Shea-Porter (NH)

#14

(REVISED) Would add veteran status as an additional item for consideration when selecting individuals for the Federal Cyber Scholarship for Service.

(10 minutes)

20. Kilroy (OH)

#15

Would amend the Federal Cyber Scholarship for Service program to include support for outreach activities that will improve the recruitment of high school and community college students into cybersecurity-related fields.

(10 minutes)

21. Kissell, Larry (NC)

#18

Would instruct the National Science Foundation Director to include language in its Computer and Network Security Capacity Building Grants mission statement highlighting importance of curriculum on the principles and techniques of designing secure software.

(10 minutes)

22. Kratovil (MD)

#32

Would instruct the Director of the National Science Foundation to establish, on a merit-reviewed and competitive basis, a National Center of Excellence for Cybersecurity as part of the Networking and Information Technology and Research Development Program.

(10 minutes)

23. Nye (VA)

#33

(REVISED) Would direct the Comptroller General to submit a report examining weaknesses within the current cybersecurity infrastructure.

(10 minutes)

24. Owens (NY)

#5

Would require the Cybersecurity Strategic Research and Development plan to include a component on technologies to secure sensitive information shared among Federal agencies.

(10 minutes)

25. Heinrich (NM)

#12

(REVISED) Would allow national laboratories to be included as stakeholders in the Cybersecurity Strategic Research and Development Plan.

(10 minutes)