H.Res. 164: H.R. 624 - Cyber Intelligence Sharing and Protection Act

COMMITTEE ACTION: REPORTED BY A VOICE VOTE on Tuesday, April 16, 2013.
FLOOR ACTION: ADOPTED BY A RECORD VOTE OF 227-192 AFTER BEING AMENDED BY A VOICE VOTE on Wednesday, April 17, 2013 (text of the amendment). THE AMENDMENT WAS MODIFIED BY UNANIMOUS CONSENT on Thursday, April 18, 2013 (text of the modification to the amendment).     

MANAGERS: Hastings/Woodall

113th Congress 
1st Session

H.RES. 164

[Report No. 113-41]

 

H.R. 624 - Cyber Intelligence Sharing and Protection Act

1. Structured rule.

2. Provides one hour of general debate equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence.

3. Waives all points of order against consideration of the bill.

4. Makes in order as original text for the purpose of amendment an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113-7 and provides that it shall be considered as read.

5. Waives all points of order against the amendment in the nature of a substitute.

6. Makes in order only those further amendments printed in the Rules Committee report. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question.

7. Waives all points of order against the amendments printed in the report.

8. Provides one motion to recommit with or without instructions.

RESOLUTION

Resolved, That at any time after the adoption of this' resolution the Speaker may, pursuant to clause 2(b) of rule XVIII, declare the House resolved into the Committee of the Whole House on the state of the Union for consideration of the bill (H.R. 624) to provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes. The first reading of the bill shall be dispensed with. All points of order against consideration of the bill are waived. General debate shall be confined to the bill and shall not exceed one hour equally divided and controlled by the chair and ranking minority member of the Permanent Select Committee on Intelligence. After general debate the bill shall be considered for amendment under the five minute rule. In lieu of the amendment in the nature of a substitute recommended by the Permanent Select Committee on Intelligence now printed in the bill, it shall be in order to consider as an original bill for the purpose of amendment under the five minute rule an amendment in the nature of a substitute consisting of the text of Rules Committee Print 113~ 7. That amendment in the nature of a substitute shall be considered as read. All points of order against that amendment in the nature of a substitute are waived. No amendment to that amendment in the nature of a substitute shall be in order except those printed in the report of the Committee on Rules accompanying this resolution. Each such amendment may be offered only in the order printed in the report, may be offered only by a Member designated in the report, shall be considered as read, shall be debatable for the time specified in the report equally divided and controlled by the proponent and an opponent, shall not be subject to amendment, and shall not be subject to a demand for division of the question in the House or in the Committee of the Whole. All points of order against such amendments are waived. At the conclusion of consideration of the bill for amendment the Committee shall rise and report the bill to the House with such amendments as may have been adopted. Any Member may demand a separate vote in the House on any amendment adopted in the Committee of the Whole to the bill or to the amendment in the nature of a substitute made in order as original text. The previous question shall be considered as ordered on the bill and amendments thereto to final passage without intervening motion except one motion to recommit with or without instructions.

SUMMARY OF AMENDMENTS PROPOSED TO BE MADE IN ORDER

(summaries derived from information provided by sponsors)

Sponsor

#

Description

Debate Time

1. Rogers, Mike (MI)

#28

MANAGER'S AMENDMENT. Corrects reported language concerning a reference in subsection (c)( 4) to the procedures created in (c)(7).

(10 minutes)

2. Connolly (VA)

#33

Further defines how classified cyber threat intelligence may be shared and used. Adds an additional provision stipulating that classified threat intelligence may only be used, retained, or further disclosed by a certified entity only for cybersecurity purposes.

(10 minutes)

3. Schneider, Bradley (IL)

#9

Clarifies that independent contractors are eligible for security clearances for purposes of employment to handle cyber threat intelligence and cyber threat information.

(10 minutes)

4. Langevin (RI)

#35

Replaces the term "local" with "political subdivision", which allows the inclusion of utility "districts" that would not otherwise be covered but that are intended to be covered in the bill.

(10 minutes)

5. Conyers (MI), Schakowsky (IL), Jackson Lee (TX), Johnson, Hank (GA), Holt (NJ)

#7

Amends liability exemption to exclude "decisions made" from coverage.

(10 minutes)

6. Amash (MI), Massie (KY), Polis (CO), Broun (GA)

#32

Prohibits the federal government from using, inter alia, library records, firearms sales records, and tax returns that it receives from private entities under CISP A.

(10 minutes)

7. Sinema, Kyrsten (AZ)

#37

(LATE) Adds the Inspector General (IG) of DHS to the omnibus IG reporting requirement. Adds the DHS IG to rest of the group responsible for submitting an annual report to Congress. Adds the House Committee on Homeland Security and the Senate Committee on Homeland Security and Governmental Affairs to the recipients of the report.

(10 minutes)

8. Sanchez, Loretta (CA)

#5

Inserts language that would include the Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department of Homeland Security in issuing a report on assessing the privacy and civil liberties impact of this bill.

(10 minutes)

9. LaMalfa, Doug (CA), Rogers, Mike (MI)

#29

Makes clear that nothing in this bill authorizes the government to target a US person for surveillance.

(10 minutes)

10. Paulsen (MN)

#6

Establishes the sense of congress that international cooperation should be encouraged where possible in regards to cyber security.

(10 minutes)

11. Barton (TX)

#8

Clarifies that companies sharing cyber threat information with other companies cannot treat this sharing relationship as a loophole to sell a consumer's personal information for a marketing purpose.

(10 minutes)

12. Jackson Lee (TX)

#17

Clarifies that cyber security service providers need only provide information about cyber security incidents if they pose a threat to the government's information and protects individuals' private data from being accessed by the government solely because it is stored by a company that provides information services to a government agency

(10 minutes)