link to page 1 
 
March 1, 2017
Cybersecurity Legislation in the 113th and 114th Congresses
The legislative framework for cybersecurity is complex, 
  the Department of State to produce an international 
with more than 50 federal laws affecting various aspects of 
cyberspace policy and engage in international 
it. Nevertheless, since the 111th Congress, more than 300 
consultations on measures against cybercriminals, and 
bills have been introduced that would address a range of 
  various federal agencies to report to Congress on 
cybersecurity issues. Several that were enacted in the 113th 
specified cybersecurity topics and activities. 
and 114th Congresses are discussed below. Those bills 
addressed five main topics: 
The provisions summarized above are in the bills cited in 
Table 1. 
Protection of Federal Information Systems: updating 
federal agency requirements to reflect changes in 
Table 1. Cybersecurity Laws Enacted in 2014 and 2015 
technology and the threat landscape, and establishing 
Public Law 
Title 
Department of Homeland Security (DHS) authorities to 
P.L. 113-246  Cybersecurity Workforce Assessment Act 
protect federal systems.  
P.L. 113-274  Cybersecurity Enhancement Act of 2014 
Information Sharing: facilitating public- and private-
P.L. 113-277  Border Patrol Agent Pay Reform Act of 2014 
sector sharing of information on cyberthreats and defensive 
P.L. 113-282  National Cybersecurity Protection Act of 2014—
measures and permitting private-sector entities to monitor 
NCPA 
and operate defenses on their information systems. 
P.L. 113-283  Federal Information Security Modernization Act 
of 2014—FISMA 2014 
Statutory Authorization of Ongoing Activities:  
P.L. 114-113  Cybersecurity Act of 2015 (Division N)—CSA 
 
Cybersecurity Information Sharing Act (Title I)—
  DHS—the National Cybersecurity and Communications 
CISA 
Integration Center (NCCIC) and the intrusion-protection 
 
National Cybersecurity Protection Advancement 
system known as EINSTEIN. 
Act of 2015 (Subtitle A of Title II)—NCPPA 
  National Institute of Standards and Technology 
 
Federal Cybersecurity Enhancement Act of 2015 
(NIST)—relating to the  Framework for Improving 
(Subtitle B of Title II)—FCEA 
Critical Infrastructure (CI) Cybersecurity and the 
 
Federal Cybersecurity Workforce Assessment 
National Initiative for Cybersecurity Education (NICE). 
Act of 2015 (Title III) 
  National Science Foundation (NSF)—the CyberCorps: 
 
Other Cyber Matters (Title IV) 
Scholarship-for-Service program to train new 
cybersecurity professionals. 
Source: CRS. 
Research and Development (R&D): requiring a 
The Cybersecurity Workforce Assessment Act required 
multiagency strategic plan for cybersecurity R&D and 
an assessment by DHS of its cybersecurity workforce and 
specifying areas of research for NSF. 
development of a workforce strategy. The Border Patrol 
Agent Pay Reform Act of 2014 provided additional hiring 
Federal Cybersecurity Workforce: requiring the Office of 
and compensation authorities to DHS and required a DHS 
Personnel Management (OPM) to establish and implement 
assessment of workforce needs. 
an employment-code structure for federal cybersecurity 
personnel and improving the size, skills, and preparation of 
The Cybersecurity Enhancement Act contained the 
the DHS cybersecurity workforce, including recruitment.  
provisions on R&D and on NIST and NSF program 
authorizations described above.  
Other Provisions required the following: 
NCPA provided statutory authority for the DHS NCCIC, 
  DHS to develop and exercise incident-response plans for  and specified both public- and private-sector members. The 
cybersecurity risks to CI,  
act gave NCCIC responsibility for sharing timely and 
  DHS and NIST to assist states in improving 
actionable cybersecurity information, providing situational 
cybersecurity for emergency response networks,  
awareness and coordination of information across sectors, 
  the Department of Health and Human Services (HHS) to  performing integration and analysis of risks and incidents, 
assist the healthcare sector in reducing cybersecurity 
providing technical assistance upon request, and making 
risks,  
recommendations for improving cybersecurity. 
  the Office of Management and Budget (OMB) to 
establish procedures for notification and other responses 
The act also requires DHS to develop and exercise incident-
to federal agency data breaches of personal information, 
response plans for cybersecurity risks to CI and to provide 
security clearances to appropriate representatives.  
https://crsreports.congress.gov 
Cybersecurity Legislation in the 113th and 114th Congresses 
NCPA also has a provision on OMB data-breach 
and rights, obligations for nonfederal entities to share 
notification policies similar to that in FISMA 2014 (see 
information with the federal government, liability for not 
below).  
sharing, otherwise legal disclosure in criminal prosecutions, 
regulatory authority except as provided in the title, and the 
FISMA 2014 updated the Federal Information Security 
authority of the Secretary of Defense to respond to 
Management Act (FISMA 2002). FISMA 2014 retains, 
malicious cyber-activities by foreign powers. Provisions in 
with some amendments, most provisions of the earlier law. 
the title expire at the end of FY2025. 
Notable changes include providing statutory authority to 
DHS for overseeing operational cybersecurity of federal 
NCPAA (Title II, Subtitle A) expands NCCIC 
civilian information systems, as well as requiring agencies 
responsibilities to include CISA implementation and other 
to implement DHS-issued directives and to use DHS 
information sharing responsibilities across CI sectors and 
automated tools for cybersecurity protection.  
internationally. It permits DHS to enter into voluntary 
information-sharing agreements with nonfederal entities. It 
It requires OMB to update periodically data-breach 
also requires DHS to (1) support and develop automated 
notification policies and guidelines for agencies, including 
information-sharing mechanisms, (2) implement direct 
notification of Congress and affected individuals.  
reporting by the NCCIC to the Secretary of Homeland 
Security of significant risks and incidents, (3) engage in 
The four titles of the CSA address information sharing, the 
public outreach on information sharing, and (4) regularly 
security of federal systems, the federal cybersecurity 
update and exercise the annex on cybersecurity of the DHS 
workforce, international cybercrime and cyberspace policy, 
National Response Framework. DHS may also implement 
and cybersecurity in the healthcare and emergency services 
ways to coordinate vulnerability disclosures. The act also 
sectors, as well as other issues, and it includes a number of 
specifies sharing cybersecurity information as a function of 
reporting requirements.  
Information Sharing and Analysis Organizations (ISAOs). 
CISA (Title I) requires the Director of National Intelligence 
FCEA (Title II, Subtitle B) provides statutory authorization 
(DNI), the Secretaries of Homeland Security and Defense, 
for the DHS EINSTEIN program, requires agency adoption 
and the Attorney General (AG), in consultation with federal 
of it and implementation of additional cybersecurity 
agencies, to jointly establish procedures for sharing 
measures. It also gives DHS authority, in the event of a 
classified and unclassified cybersecurity information with 
substantial threat to federal systems, to issue emergency 
relevant federal and nonfederal entities. 
directives for their protection, and, in the event of an 
imminent threat, to use intrusion-protection capabilities. 
It gives private entities the authority to monitor and defend 
Agencies must identify sensitive and mission-critical data 
their own systems, and others where authorized, and to 
on their systems, make such data indecipherable to 
voluntarily share threat information and defensive measures 
unauthorized users, assess access needs and controls, and 
with each other and the federal government, with 
implement identity management.  
protections for security, privacy, nondisclosure, and 
correction of errors. Covered activities are exempted from 
The Federal Cybersecurity Workforce Assessment Act 
antitrust laws, and entities performing them are protected 
(Title III) requires OPM to develop personnel codes for 
from liability. However, the act also specifies actions that 
federal cybersecurity positions, and agencies must apply 
are not permitted under the antitrust exemption. 
those codes as appropriate.  
As required by CISA, DHS and the Department of Justice 
Other Cyber Matters (Title IV)—The Department of State 
(DOJ) issued procedures and guidelines for sharing 
produced a required comprehensive international strategy 
between federal and nonfederal entities, with protection of 
for U.S. cyberspace policy under this title. It also requires 
privacy and civil liberties, and prevention of unauthorized 
the agency to consult with countries that have 
disclosure. DHS, which the act named as the main federal 
cybercriminals who are not likely to be extradited to the 
portal for information sharing, established a process within 
United States, to determine what crime-fighting actions the 
the department for receiving and sharing information. 
countries have taken against such criminals. It requires 
Receipt of information must be through that process except 
DHS to establish processes to enhance cybersecurity and 
for regulatory and law enforcement purposes. The President 
information sharing among state emergency responders and 
may subsequently establish an additional process if needed. 
to develop best practices for reducing cybersecurity risks to 
them. HHS created a required public/private taskforce to 
Government entities may use shared information for 
improve cybersecurity in the healthcare sector. The title 
specified purposes relating to cybersecurity, prevention of 
also requires HHS to collaborate with other federal and 
serious personal or economic harm, and law enforcement, 
sector entities to develop guidelines for reducing risks. 
but not for regulatory purposes except as related to 
Another provision extended criminal penalties for fraud 
prevention or mitigation of cyberthreats. CISA supersedes 
against a U.S. entity involving devices used to access 
nonfederal laws on authorized activities, except for law 
financial accounts to such uses occurring outside U.S. 
enforcement. It limits the effect of its provisions on 
territory. 
otherwise lawful disclosures, whistleblower protections, 
protection of sources and methods, other law on 
Eric A. Fischer, Senior Specialist in Science and 
information shared with the federal government, other 
Technology   
information sharing relationships, contractual obligations 
https://crsreports.congress.gov 
Cybersecurity Legislation in the 113th and 114th Congresses 
 
IF10610
 
 
Disclaimer 
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to 
congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress. 
Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has 
been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the 
United States Government, are not subject to copyright protection in the United States. Any CRS Report may be 
reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include 
copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you 
wish to copy or otherwise use copyrighted material. 
 
https://crsreports.congress.gov | IF10610 · VERSION 2 · NEW