HR.624 - Cispa Bill

Send your vote to Congress

My Vote

{{ my_vote|capitalize }}

My Vote

{{ bill_vote.meta.gov_vote|capitalize }}

Congress Vote

{{ bill_vote.meta.user_vote|capitalize }}

People's Vote

{{ bill_vote.meta.outcome|capitalize }}

Outcome

4/18/2013--Passed House amended. Cyber Intelligence Sharing and Protection Act -

(Sec. 2) Directs the federal government to conduct cybersecurity activities to provide shared situational awareness enabling integrated operational actions to protect, prevent, mitigate, respond to, and recover from cyber incidents. Defines "shared situational awareness" as an environment where cyber threat information is shared in real time between all designated federal cyber operations centers to provide actionable information about all known cyber threats. Directs the President, with respect to information shared by a cybersecurity provider (a non-federal entity that provides goods or services intended to be used for cybersecurity purposes) or self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), to designate: (1) an entity within the Department of Homeland Security (DHS) as the civilian federal entity to receive cyber threat information under prescribed procedures and subject to specified exceptions, and (2) an entity within the Department of Justice (DOJ) as the civilian federal entity to receive information related to cybersecurity crimes. Requires federal agencies receiving shared cyber threat information to establish procedures to: (1) ensure that specified information is also shared in real time with appropriate federal agencies with a national security mission; (2) ensure real-time information distribution to other federal agencies; and (3) facilitate information sharing, interaction, and collaboration among and between federal, state, local, tribal, and territorial governments, cybersecurity providers, and self-protected entities. Directs the DHS, Attorney General, Director of National Intelligence (DNI), and Department of Defense (DOD) to jointly establish and periodically review policies and procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the federal government. Requires such procedures, consistent with the need to protect against and mitigate cyber threats in a timely manner, to: (1) minimize the impact on privacy and civil liberties; (2) reasonably limit the receipt, retention, use, and disclosure of cyber threat information associated with specific persons that is unnecessary to protect against or mitigate cyber threats in a timely manner; (3) include requirements to safeguard non-publicly available cyber threat information that may be used to identify specific persons from unauthorized access or acquisition; (4) protect the confidentiality of cyber threat information associated with specific persons; and (5) not delay or impede the flow of cyber threat information necessary to defend against or mitigate a cyber threat. Instructs: (1) the DHS, Attorney General, DNI, and DOD to submit such procedures to Congress and establish a program to monitor and oversee the compliance of federal agencies; and (2) federal agencies to implement such procedures and notify such officials and Congress of any significant violations. Prohibits such procedures from being construed to prohibit any federal agency from engaging in technical discussions regarding cyber threat information with a cybersecurity provider or self-protected entity or from providing technical assistance to address vulnerabilities or mitigate threats at their request. Requires any such activity to be coordinated with DHS and other agencies. Directs the President's designated DHS entity to share with all appropriate federal agencies all significant information resulting from: (1) technical discussions with a cybersecurity provider or self-protected entity about cyber threat information, or (2) any technical assistance it provides to such cybersecurity provider or such self-protected entity to address vulnerabilities or mitigate threats. Directs the DHS Inspector General to submit annually to Congress a review of the use of such information shared with the federal government, as well as recommendations for improvements and modifications to address privacy and civil liberties concerns. Requires the DHS Officer for Civil Rights and Civil Liberties to submit to Congress an annual report assessing the privacy and civil liberties impact of the federal government's cyber threat information sharing activities.

(Sec. 3) Amends the National Security Act of 1947 to add provisions concerning cyber threat intelligence and information sharing. Defines "cyber threat intelligence" as intelligence in the possession of an element of the intelligence community directly pertaining to: (1) a vulnerability of a system or network of a government or private entity or utility; (2) a threat to the integrity, confidentiality, or availability of such a system or network or any information stored on, processed on, or transiting such a system or network; (3) efforts to deny access to or degrade, disrupt, or destroy such a system or network; or (4) efforts to gain unauthorized access to such a system or network, including for the purpose of exfiltrating information. Excludes intelligence pertaining to efforts to gain unauthorized access to such a system or network that solely involve violations of consumer terms of service or consumer licensing agreements and do not otherwise constitute unauthorized access. Requires the DNI to: (1) establish procedures to allow intelligence community elements to share cyber threat intelligence with private-sector entities and utilities, and (2) encourage the sharing of such intelligence. Requires the procedures established to ensure that such intelligence is only: (1) shared with certified entities or a person with an appropriate security clearance; (2) shared consistent with the need to protect U.S. national security; (3) used in a manner that protects such intelligence from unauthorized disclosure; and (4) used, retained, or further disclosed by a certified entity for cybersecurity purposes. Provides guidelines for the granting of security clearance approvals to certified entities or officers, employees, or independent contractors of such entities. Prohibits a certified entity receiving such intelligence from further disclosing the information to any entity other than another certified entity or a federal agency authorized to receive such intelligence. Authorizes a cybersecurity provider, with the express consent of a protected entity (an entity that contracts with a cybersecurity provider), to: (1) use cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and (2) share cyber threat information with any other entity designated by the protected entity, including, if specifically designated, the DHS and DOJ entities designated by the President. Provides cybersecurity system use and threat information sharing authority to self-protected entities. Sets forth requirements with respect to the use and protection of shared information, including anonymization or minimization of such information and prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure and prohibits the use of such information for regulatory purposes. Specifies that a non-federal recipient may only use such information for a cybersecurity purpose. Prohibits a civil or criminal cause of action against a protected entity, a self-protected entity, or a cybersecurity provider acting in good faith under the above circumstances. Prohibits such shared information requirements from being construed to provide new authority to: (1) a cybersecurity provider to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes, or (2) a self-protected entity to use a cybersecurity system to identify or obtain cyber threat information from a system or network other than a system or network owned or operated by such self-protected entity. Allows the federal government to use shared cyber threat information for: (1) cybersecurity purposes to ensure the integrity, confidentiality, availability, or safeguarding of a system or network; (2) the investigation of cybersecurity crimes; or (3) the protection of individuals from the danger of death or serious bodily harm and the prosecution of crimes involving such dangers (including the protection of minors from child pornography, sexual exploitation, kidnapping, and trafficking). Prohibits the federal government from affirmatively searching such information for any other purpose. Prohibits the federal government from using certain personally identifiable information shared from sensitive personal documents such as library records, firearms sales records, educational records, tax returns, and medical records. Requires a federal agency receiving information that is not cyber threat information to so notify the entity or provider of such information. Prohibits federal agencies from retaining shared information for any unauthorized use. Outlines federal government liability for violations of restrictions on the disclosure, use, and protection of voluntarily shared information. Preempts any state statute that restricts or otherwise regulates specified activity authorized by this Act. States that nothing in this section shall be construed to: (1) provide additional authority to, or modify existing authority of, any element of the intelligence community to control or direct the cybersecurity efforts of a private-sector entity or a component of the federal government or a state, local, or tribal government; (2) limit or affect existing information sharing relationships of the federal government; (3) preclude the federal government from requiring an entity to report significant cyber incidents under another provision of law; or (4) provide additional authority to, or modify existing authority of, any entity to use a cybersecurity system owned or controlled by the federal government on a private-sector system or network to protect the latter system or network. Prohibits this section from being construed to authorize the DOD, National Security Agency (NSA), or any other intelligence community element to target a U.S. person for Surveillance.

(Sec. 4) Repeals amendments made by this Act five years aftEr enactment of this Act.

(Sec. 5) Expresses the sense of Congress that international cooperation with regard to cybersecurity shOuld be encouraged wherever possible.

(Sec. 6) Prohibits this Act from being construed to provide new or alter any existing authority for an entity to sell personal information of a cOnsumer to another entity for marketing purposes.

(Sec. 7) Prohibits this Act from being construed to authorize a federal agency to require a federally contracted cybersecurity provider to provide information about cybersecurity incidents that do not pose a threat to the federal government's information.

Received In The Senate And Read Twice And Referred To The Select Committee On Intelligence.
April 22nd 2013 @ 12:00 AM

The Clerk Was Authorized To Correct Section Numbers, Punctuation, And Cross References, And To Make Other Necessary Technical And Conforming Corrections In The Engrossment Of H.r. 624.
April 18th 2013 @ 1:00 PM

Motion To Reconsider Laid On The Table Agreed To Without Objection.
April 18th 2013 @ 12:59 PM

On Passage Passed By The Yeas And Nays: 288 - 127 (roll No. 117).
April 18th 2013 @ 12:59 PM

On Motion To Recommit With Instructions Failed By Recorded Vote: 189 - 224 (roll No. 116).
April 18th 2013 @ 12:50 PM

The Previous Question On The Motion To Recommit With Instructions Was Ordered Without Objection.
April 18th 2013 @ 12:42 PM

Debate - The House Proceeded With 10 Minutes Of Debate On The Perlmutter Motion To Recommit With Instructions. The Instructions Contained In The Motion Seek To Require The Bill To Be Reported Back To The House With An Amendment To Prohibit Employers, Prospective Employers, Or The Federal Government From Requiring The Disclosure Of Social Networking Or Personal Account Passwords By An Employee Or Job Applicant Without A Court Order. The Motion Would Also Prohibit The Federal Government From Establishing A Mechanism By Which It Could Control Citizen's Access To The Internet With A National Firewall Similar To The "Great Internet Firewall Of China." Lastly, The Motion Would Make Changes To The Mccaul Amendment, Adding A Section That Requires Reporting Of Information On The Number Of Americans Who Have Been Forced To Disclose Passwords And Had Information Released To The Federal Government Or Obtained In Connection
April 18th 2013 @ 12:30 PM

Mr. Perlmutter Moved To Recommit With Instructions To Intelligence (permanent).
April 18th 2013 @ 12:30 PM

The House Adopted The Amendment In The Nature Of A Substitute As Agreed To By The Committee Of The Whole House On The State Of The Union.
April 18th 2013 @ 12:29 PM

The Previous Question Was Ordered Pursuant To The Rule.
April 18th 2013 @ 12:28 PM

The House Rose From The Committee Of The Whole House On The State Of The Union To Report H.r. 624.
April 18th 2013 @ 12:27 PM

Unfinished Business - The Chair Announced That The Unfinished Business Was On The Adoption Of Amendments Which Had Been Debated Earlier And On Which Further Proceedings Had Been Postponed.
April 18th 2013 @ 11:45 AM

The House Resolved Into Committee Of The Whole House On The State Of The Union For Further Consideration.
April 18th 2013 @ 11:45 AM

Considered As Unfinished Business.
April 18th 2013 @ 11:45 AM

Committee Of The Whole House On The State Of The Union Rises Leaving H.r. 624 As Unfinished Business.
April 18th 2013 @ 11:27 AM

On Motion That The Committee Rise Agreed To By Voice Vote.
April 18th 2013 @ 11:27 AM

Mr. Rogers (mi) Moved That The Committee Rise.
April 18th 2013 @ 11:26 AM

Postponed Proceedings - At The Conclusion Of Debate On The Mccaul Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Mr. Mccaul Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 18th 2013 @ 11:26 AM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Mccaul Amendment No. 13.
April 18th 2013 @ 11:10 AM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Jackson Lee Amendment No. 12.
April 18th 2013 @ 11:02 AM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Barton Amendment No. 11.
April 18th 2013 @ 10:55 AM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Paulsen Amendment No. 10.
April 18th 2013 @ 10:49 AM

Postponed Proceedings - At The Conclusion Of Debate On The Lamalfa Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Mr. Rogers (mi) Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 18th 2013 @ 10:49 AM

Debate - Pursuant To The Provisions Of H.res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Lamalfa Amendment No. 9.
April 18th 2013 @ 10:40 AM

Debate - Pursuant To The Provisions Of H.res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Loretta Sanchez Amendment No. 8.
April 18th 2013 @ 10:34 AM

Postponed Proceedings - At The Conclusion Of Debate On The Sinema Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Ms. Sinema Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 18th 2013 @ 10:34 AM

Debate - Pursuant To The Provisions Of H.res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Sinema Amendment No. 7.
April 18th 2013 @ 10:24 AM

The House Resolved Into Committee Of The Whole House On The State Of The Union For Further Consideration.
April 18th 2013 @ 10:23 AM

Considered As Unfinished Business.
April 18th 2013 @ 10:22 AM

Order Of Procedure - Mr. Sessions Asked Unanimous Consent That, During Further Consideration Of H.r. 624 In The Committee Of The Whole And Pursuant To The Provisions Of H.res. 164, Amendment Numbered 13 Offered By Mr. Mccaul Of Texas Be Modified In The Form That Was Placed At The Desk. Agreed To Without Objection.
April 18th 2013 @ 10:21 AM

Committee Of The Whole House On The State Of The Union Rises Leaving H.r. 624 As Unfinished Business.
April 17th 2013 @ 5:09 PM

On Motion That The Committee Rise Agreed To By Voice Vote.
April 17th 2013 @ 5:09 PM

Mr. Sessions Moved That The Committee Rise.
April 17th 2013 @ 5:08 PM

Unfinished Business - The Chair Announced That The Unfinished Business Was On Adoption Of Amendments Which Had Been Debated And On Which Further Proceedings Had Been Postponed.
April 17th 2013 @ 4:30 PM

The House Resolved Into Committee Of The Whole House On The State Of The Union For Further Consideration.
April 17th 2013 @ 4:30 PM

Considered As Unfinished Business.
April 17th 2013 @ 4:30 PM

Committee Of The Whole House On The State Of The Union Rises Leaving H.r. 624 As Unfinished Business.
April 17th 2013 @ 4:01 PM

On Motion That The Committee Rise Agreed To By Voice Vote.
April 17th 2013 @ 4:00 PM

Mr. Rogers (mi) Moved That The Committee Rise.
April 17th 2013 @ 4:00 PM

Postponed Proceedings - At The Conclusion Of Debate On The Langevin Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Mr. Rogers (mi) Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 17th 2013 @ 3:59 PM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Langevin Amendment No. 4.
April 17th 2013 @ 3:52 PM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Schneider Amendment No. 3.
April 17th 2013 @ 3:43 PM

Postponed Proceedings - At The Conclusion Of Debate On The Connolly Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Mr. Rogers (mi) Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 17th 2013 @ 3:42 PM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Connolly Amendment No. 2.
April 17th 2013 @ 3:34 PM

Postponed Proceedings - At The Conclusion Of Debate On The Rogers (mi) Amendment, The Chair Put The Question On Adoption Of The Amendment And By Voice Vote Announced That The Ayes Had Prevailed. Mr. Rogers (mi) Demanded A Recorded Vote And The Chair Postponed Further Proceedings On The Question Of Adoption Of The Amendment Until Later In The Legislative Day.
April 17th 2013 @ 3:34 PM

Debate - Pursuant To The Provisions Of H. Res. 164, The Committee Of The Whole Proceeded With 10 Minutes Of Debate On The Rogers (mi) Amendment No. 1.
April 17th 2013 @ 3:32 PM

General Debate - The Committee Of The Whole Proceeded With One Hour Of General Debate On H.r. 624.
April 17th 2013 @ 2:23 PM

The Speaker Designated The Honorable Ileana Ros-lehtinen To Act As Chairwoman Of The Committee.
April 17th 2013 @ 2:22 PM

House Resolved Itself Into The Committee Of The Whole House On The State Of The Union Pursuant To H. Res. 164 And Rule Xviii.
April 17th 2013 @ 2:22 PM

Rule Provides For Consideration Of H.r. 624 With 1 Hour Of General Debate. Previous Question Shall Be Considered As Ordered Without Intervening Motions Except Motion To Recommit With Or Without Instructions. Measure Will Be Considered Read. Specified Amendments Are In Order.
April 17th 2013 @ 2:21 PM

Considered Under The Provisions Of Rule H. Res. 164.
April 17th 2013 @ 2:21 PM

Rule H. Res. 164 Passed House.
April 17th 2013 @ 2:18 PM

Rules Committee Resolution H. Res. 164 Reported To House. Rule Provides For Consideration Of H.r. 624 With 1 Hour Of General Debate. Previous Question Shall Be Considered As Ordered Without Intervening Motions Except Motion To Recommit With Or Without Instructions. Measure Will Be Considered Read. Specified Amendments Are In Order.
April 16th 2013 @ 6:08 PM

Placed On The Union Calendar, Calendar No. 25.
April 15th 2013 @ 2:58 PM

Reported (amended) By The Committee On Intelligence. H. Rept. 113-39.
April 15th 2013 @ 2:57 PM

Referred To The House Committee On Intelligence (permanent Select).
February 13th 2013 @ 12:00 AM

VoteTocracy Voting & Activity
Votetocracy user
{{ error }}
Votetocracy user
{{ activity.user }} in {{ activity.state }} Voted on Bill {{ activity.bill_id|billName }} {{ activity.when|howLongAgo }} Reply
{{ error }}
Govtrack Data provided by Govtrack.us. Bill analysis provided by VoteTocracy.com’s analyst team.