<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-Senate" bill-type="olc" dms-id="H6E3CBD4E7FC245E78685EA0999205B6B" key="S" public-private="public" stage-count="1"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 HR 3776 RS: Cyber Diplomacy Act of 2017</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2018-01-18</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 495</calendar><congress>115th CONGRESS</congress><session>2d Session</session><legis-num display="yes">H. R. 3776</legis-num><current-chamber display="yes">IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20180118">January 18, 2018</action-date><action-desc>Received; read twice and referred to the <committee-name added-display-style="italic" committee-id="SSFR00" deleted-display-style="strikethrough">Committee on Foreign Relations</committee-name></action-desc></action><action stage="Reported-in-Senate"><action-date>June 28, 2018</action-date><action-desc>Reported by <sponsor name-id="S310">Mr. Corker</sponsor>, with an amendment</action-desc><action-instruction>Strike out all after the enacting clause and insert the part printed in italic</action-instruction></action><legis-type>AN ACT</legis-type><official-title display="yes">To support United States international cyber diplomacy, and for other purposes.</official-title></form>
	<legis-body display-enacting-clause="yes-display-enacting-clause" id="H36CB7A832385465186DE530C92E9923D" style="OLC">
 <section changed="deleted" committee-id="SSFR00" id="H8AE1C0AD4A9C448D855D49A2ADBFC454" reported-display-style="strikethrough" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Cyber Diplomacy Act of 2017</short-title></quote>.</text> </section><section changed="deleted" committee-id="SSFR00" id="H91CD8E8DFEB44BE88AE50969353AAC7D" reported-display-style="strikethrough"><enum>2.</enum><header>Findings</header><text display-inline="no-display-inline">Congress finds the following:</text>
 <paragraph id="H7F93E95800734229B7C2FCC2A8FA5B8D"><enum>(1)</enum><text>The stated goal of the United States International Strategy for Cyberspace, launched on May 16, 2011, is to <quote>work internationally to promote an open, interoperable, secure, and reliable information and communications infrastructure that supports international trade and commerce, strengthens international security, and fosters free expression and innovation * * * in which norms of responsible behavior guide States’ actions, sustain partnerships, and support the rule of law in cyberspace.</quote>.</text>
 </paragraph><paragraph id="H6C2B8A6A507147699C91E7C2F08670FA"><enum>(2)</enum><text>The Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security, established by the United Nations General Assembly, concluded in its June 24, 2013, report <quote>that State sovereignty and the international norms and principles that flow from it apply to States’ conduct of [information and communications technology or ICT] related activities and to their jurisdiction over ICT infrastructure with their territory.</quote>.</text>
 </paragraph><paragraph id="H9742C8DCDB4E4B33B10BDFCB2351F94B"><enum>(3)</enum><text>On January 13, 2015, China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan proposed a troubling international code of conduct for information security which defines responsible State behavior in cyberspace to include <quote>curbing the dissemination of information</quote> and the <quote>right to independent control of information and communications technology</quote> when a country’s political security is threatened.</text>
 </paragraph><paragraph id="H88031334EA264527A00B973CF035FD15"><enum>(4)</enum><text>The July 22, 2015, GGE consensus report found that, <quote>norms of responsible State behavior can reduce risks to international peace, security and stability.</quote>.</text>
 </paragraph><paragraph id="H55AEE6B62A7643AE82335C46F23E00EA"><enum>(5)</enum><text>On September 25, 2015, the United States and China announced a commitment <quote>that neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.</quote>.</text>
 </paragraph><paragraph id="H9680948FD64745CDB081214498ADE9A4"><enum>(6)</enum><text>At the Antalya Summit from November 15–16, 2015, the Group of 20 (G20) Leaders’ Communique affirmed the applicability of international law to State behavior in cyberspace, called on States to refrain from cyber-enabled theft of intellectual property for commercial gain, and endorsed the view that all States should abide by norms of responsible behavior.</text>
 </paragraph><paragraph id="HB0AAB25FB2A8472580C3B6154F4655A8"><enum>(7)</enum><text>The March 2016 Department of State International Cyberspace Policy Strategy noted that, <quote>the Department of State anticipates a continued increase and expansion of our cyber-focused diplomatic efforts for the foreseeable future.</quote>.</text>
 </paragraph><paragraph id="H78014DBD74A34AF3ACDCFA716B6D4D6C"><enum>(8)</enum><text>On December 1, 2016, the Commission on Enhancing National Cybersecurity established within the Department of Commerce recommended <quote>the President should appoint an Ambassador for Cybersecurity to lead U.S. engagement with the international community on cybersecurity strategies, standards, and practices.</quote>.</text>
 </paragraph><paragraph id="H96D31680C6634BC382E466A6CB1896FD"><enum>(9)</enum><text>The 2017 Group of 7 (G7) Declaration on Responsible States Behavior in Cyberspace recognized on April 11, 2017, <quote>the urgent necessity of increased international cooperation to promote security and stability in cyberspace * * * consisting of the applicability of existing international law to State behavior in cyberspace, the promotion of voluntary, non-binding norms of responsible State behavior during peacetime</quote> and reaffirmed <quote>that the same rights that people have offline must also be protected online.</quote>.</text>
 </paragraph><paragraph id="H3F20EFE1CD584BF0A0829DAD92DF1F2A"><enum>(10)</enum><text display-inline="yes-display-inline">In testimony before the Select Committee on Intelligence of the Senate on May 11, 2017, the Director of National Intelligence identified six cyber threat actors, including Russia for <quote>efforts to influence the 2016 US election</quote>; China, for <quote>actively targeting the US Government, its allies, and US companies for cyber espionage</quote>; Iran for <quote>leverage[ing] cyber espionage, propaganda, and attacks to support its security priorities, influence events and foreign perceptions, and counter threats</quote>; North Korea for <quote>previously conduct[ing] cyber-attacks against US commercial entities—specifically, Sony Pictures Entertainment in 2014</quote>; terrorists, who <quote>use the Internet to organize, recruit, spread propaganda, raise funds, collect intelligence, inspire action by followers, and coordinate operations</quote>; and criminals who <quote>are also developing and using sophisticated cyber tools for a variety of purposes including theft, extortion, and facilitation of other criminal activities</quote>.</text>
 </paragraph><paragraph id="H2D341C5271A5498B896FC7BA0502D328"><enum>(11)</enum><text display-inline="yes-display-inline">On May 11, 2017, President Trump issued Presidential Executive Order No. 13800 on Strengthening the Cybersecurity of Federal Networks and Infrastructure which designated the Secretary of State to lead an interagency effort to develop strategic options for the President to deter adversaries from cyber threats and an engagement strategy for international cooperation in cybersecurity, noting that <quote>the United States is especially dependent on a globally secure and resilient internet and must work with allies and other partners</quote> toward maintaining <quote>the policy of the executive branch to promote an open, interoperable, reliable, and secure internet that fosters efficiency, innovation, communication, and economic prosperity, while respecting privacy and guarding against deception, fraud, and theft.</quote>.</text>
			</paragraph></section><section changed="deleted" committee-id="SSFR00" id="HBD50CCB070794E4F8049A86EFDCC9A9F" reported-display-style="strikethrough"><enum>3.</enum><header>United States international cyberspace policy</header>
 <subsection id="HE43249B221C240B49D80B72D30E54397"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Congress declares that it is the policy of the United States to work internationally with allies and other partners to promote an open, interoperable, reliable, unfettered, and secure internet governed by the multistakeholder model which promotes human rights, democracy, and rule of law, including freedom of expression, innovation, communication, and economic prosperity, while respecting privacy and guarding against deception, fraud, and theft.</text>
 </subsection><subsection id="HDF2F89EB0EE048B2A0B7340C9CF3ADC7"><enum>(b)</enum><header>Implementation</header><text display-inline="yes-display-inline">In implementing the policy described in subsection (a), the President, in consultation with outside actors, including technology companies, nongovernmental organizations, security researchers, and other relevant stakeholders, shall pursue the following objectives in the conduct of bilateral and multilateral relations:</text>
 <paragraph id="HA6138DF86AD0402C93374BDB677DD99C"><enum>(1)</enum><text display-inline="yes-display-inline">Clarifying the applicability of international laws and norms, including the law of armed conflict, to the use of ICT.</text>
 </paragraph><paragraph id="HFC9B98E8F2334595AE8161AA034AC705"><enum>(2)</enum><text display-inline="yes-display-inline">Clarifying that countries that fall victim to malicious cyber activities have the right to take proportionate countermeasures under international law, provided such measures do not violate a fundamental human right or peremptory norm.</text>
 </paragraph><paragraph id="HABD288F40C90426EA9829D4137D67D31"><enum>(3)</enum><text>Reducing and limiting the risk of escalation and retaliation in cyberspace, such as massive denial-of-service attacks, damage to critical infrastructure, or other malicious cyber activity that impairs the use and operation of critical infrastructure that provides services to the public.</text>
 </paragraph><paragraph id="HB7B081ACF392404284FD6A570C24DA13"><enum>(4)</enum><text display-inline="yes-display-inline">Cooperating with like-minded democratic countries that share common values and cyberspace policies with the United States, including respect for human rights, democracy, and rule of law, to advance such values and policies internationally.</text>
 </paragraph><paragraph id="H2FE7CC01D38148A0848DE9E43B591D55"><enum>(5)</enum><text display-inline="yes-display-inline">Securing and implementing commitments on responsible country behavior in cyberspace based upon accepted norms, including the following:</text>
 <subparagraph id="HDB2AE48CB8F240269F5AB19D23E2847C"><enum>(A)</enum><text>Countries should not conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.</text>
 </subparagraph><subparagraph id="HBC6A959367494DB0B007BAAC5A247BB0"><enum>(B)</enum><text>Countries should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security.</text>
 </subparagraph><subparagraph id="H9FA5F3D706344DEEBEB9B3F6C878BD15"><enum>(C)</enum><text display-inline="yes-display-inline">Countries should take all appropriate and reasonable efforts to keep their territories clear of intentionally wrongful acts using ICTs in violation of international commitments.</text>
 </subparagraph><subparagraph id="HFE784748448E478A95748CE80FC62D1B"><enum>(D)</enum><text display-inline="yes-display-inline">Countries should not conduct or knowingly support ICT activity that, contrary to international law, intentionally damages or otherwise impairs the use and operation of critical infrastructure, and should take appropriate measures to protect their critical infrastructure from ICT threats.</text>
 </subparagraph><subparagraph commented="no" id="H2972CB27704746B68C146431DF0B963E"><enum>(E)</enum><text display-inline="yes-display-inline">Countries should not conduct or knowingly support malicious international activity that, contrary to international law, harms the information systems of authorized emergency response teams (sometimes known as <quote>computer emergency response teams</quote> or <quote>cybersecurity incident response teams</quote>) or related private sector companies of another country.</text>
 </subparagraph><subparagraph id="HC059D1B892DB487EBB929B1EA9C08199"><enum>(F)</enum><text display-inline="yes-display-inline">Countries should identify economic drivers and incentives to promote securely-designed ICT products and to develop policy and legal frameworks to promote the development of secure internet architecture.</text>
 </subparagraph><subparagraph id="HFA5AC47B224A4D71B00410B52FBA2880"><enum>(G)</enum><text>Countries should respond to appropriate requests for assistance to mitigate malicious ICT activity aimed at the critical infrastructure of another country emanating from their territory.</text>
 </subparagraph><subparagraph id="H25F396AFF0924AC7A8DCAFE1D5535324"><enum>(H)</enum><text>Countries should not restrict cross-border data flows or require local storage or processing of data.</text>
 </subparagraph><subparagraph id="HAD87E0CD4A9D4E47A3AC23266FC99224"><enum>(I)</enum><text>Countries should protect the exercise of human rights and fundamental freedoms on the Internet and commit to the principle that the human rights that people have offline enjoy the same protections online.</text>
					</subparagraph></paragraph></subsection></section><section changed="deleted" committee-id="SSFR00" id="H6C8FD0F20F6349648862C2369DC7DF15" reported-display-style="strikethrough"><enum>4.</enum><header>Department of State responsibilities</header>
 <subsection id="HF115277A30EC4EB49CDB3395353F2BB9"><enum>(a)</enum><header>Office of Cyber Issues</header><text>Section 1 of the State Department Basic Authorities Act of 1956 (<external-xref legal-doc="usc" parsable-cite="usc/22/2651a">22 U.S.C. 2651a</external-xref>) is amended—</text> <paragraph id="HCDBCF33241154A47913B1B291A586F55"><enum>(1)</enum><text>by redesignating subsection (g) as subsection (h); and</text>
 </paragraph><paragraph id="H636701C3239B4841A5897BAF48EA143E"><enum>(2)</enum><text>by inserting after subsection (f) the following new subsection:</text> <quoted-block changed="deleted" committee-id="SSFR00" id="H71D17601C68C4766BB600F73647AFF55" reported-display-style="strikethrough" style="OLC"> <subsection id="HFD4C057F2240462BAE1772BA75D4F51F"><enum>(g)</enum><header>Office of Cyber Issues</header> <paragraph id="H9D52E660457441BA8498391B16C3F085"><enum>(1)</enum><header>In general</header><text>There is established an Office of Cyber Issues (in this subsection referred to as the <quote>Office</quote>). The head of the Office shall have the rank and status of ambassador and be appointed by the President, by and with the advice and consent of the Senate.</text>
							</paragraph><paragraph id="H6BD770FD9F744875B42D7B8DBD4CECB5"><enum>(2)</enum><header>Duties</header>
 <subparagraph id="H89D7EFE02EE2470E9E63A843CC82BBFE"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">The head of the Office shall perform such duties and exercise such powers as the Secretary of State shall prescribe, including implementing the policy of the United States described in section 3 of the Cyber Diplomacy Act of 2017.</text>
 </subparagraph><subparagraph id="HCF857F9FC45C4208BFD336FDD0153D9D"><enum>(B)</enum><header>Duties described</header><text>The principal duties of the head of the Office shall be to—</text> <clause id="H5A1E519FE8FF4344B128CD50ECB84F41"><enum>(i)</enum><text>serve as the principal cyber-policy official within the senior management of the Department of State and advisor to the Secretary of State for cyber issues;</text>
 </clause><clause id="H5B4112F2136A4964BDC4460B8DF6A0B4"><enum>(ii)</enum><text>lead the Department of State’s diplomatic cyberspace efforts generally, including relating to international cybersecurity, internet access, internet freedom, digital economy, cybercrime, deterrence and international responses to cyber threats;</text>
 </clause><clause id="HA4BFE3C7549346E4A136504533568647"><enum>(iii)</enum><text>promote an open, interoperable, reliable, unfettered, and secure information and communications technology infrastructure globally;</text>
 </clause><clause id="HCC61DE1E14DE4A80B721DAEA6877D00A"><enum>(iv)</enum><text>represent the Secretary of State in interagency efforts to develop and advance the United States international cyberspace policy;</text>
 </clause><clause id="H13158A8FB92F4CB5873F22CC6A10F6A7"><enum>(v)</enum><text display-inline="yes-display-inline">coordinate within the Department of State and with other components of the United States Government cyberspace efforts and other relevant functions, including countering terrorists’ use of cyberspace; and</text>
 </clause><clause id="H03AF543321F54596B50573CC7F071683"><enum>(vi)</enum><text>act as liaison to public and private sector entities on relevant cyberspace issues.</text> </clause></subparagraph></paragraph><paragraph id="H2ED6783394974C5885270A8CBDF0C8D1"><enum>(3)</enum><header>Qualifications</header><text>The head of the Office should be an individual of demonstrated competency in the field of—</text>
 <subparagraph id="H8B93AC156C7D4ADE901DEDFEA57E98D7"><enum>(A)</enum><text>cybersecurity and other relevant cyber issues; and</text> </subparagraph><subparagraph id="H2AD8368DC70B4B1D82C6147D3325962F"><enum>(B)</enum><text>international diplomacy.</text>
 </subparagraph></paragraph><paragraph commented="no" id="HAFCCFC5A050346BE8CC5F18D262A89EF"><enum>(4)</enum><header>Organizational placement</header><text display-inline="yes-display-inline">The head of the Office shall report to the Under Secretary for Political Affairs or official holding a higher position in the Department of State.</text>
 </paragraph><paragraph id="HE1824CEFAB2F461C9CDBA4F7F78D6AC4"><enum>(5)</enum><header>Rule of construction</header><text>Nothing in this subsection may be construed as precluding—</text> <subparagraph id="H79567CB8504D4932B0C6ABA067D11BB1"><enum>(A)</enum><text>the Office from being elevated to a Bureau of the Department of State; and</text>
 </subparagraph><subparagraph id="HC86D12FDB87644A0BF1E75625083591F"><enum>(B)</enum><text>the head of the Office from being elevated to an Assistant Secretary, if such an Assistant Secretary position does not increase the number of Assistant Secretary positions at the Department above the number authorized under subsection (c)(1).</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph></subsection><subsection commented="no" id="HE95307857B894EE89B04F9F554EFEBC2"><enum>(b)</enum><header>Sense of Congress</header><text display-inline="yes-display-inline">It is the sense of Congress that the Office of Cyber Issues established under section 1(g) of the State Department Basic Authorities Act of 1956 (as amended by subsection (a) of this section) should be a Bureau of the Department of State headed by an Assistant Secretary, subject to the rule of construction specified in paragraph (5)(B) of such section 1(g).</text>
 </subsection><subsection id="HD70B825A51C74C42A0D6F0B38FC25DD5"><enum>(c)</enum><header>United Nations</header><text>The Permanent Representative of the United States to the United Nations shall use the voice, vote, and influence of the United States to oppose any measure that is inconsistent with the United States international cyberspace policy described in section 3.</text>
			</subsection></section><section changed="deleted" committee-id="SSFR00" id="H7FD5C159ADE74081AD6285ADDB4A0AF6" reported-display-style="strikethrough"><enum>5.</enum><header>International cyberspace executive arrangements</header>
 <subsection commented="no" id="H232397EFC11F448BB6BCEF0511FFC1BC"><enum>(a)</enum><header>In general</header><text>The President is encouraged to enter into executive arrangements with foreign governments that support the United States international cyberspace policy described in section 3.</text>
 </subsection><subsection id="H3F70BD4F988B484CA5EF091F5A7A8781"><enum>(b)</enum><header>Transmission to Congress</header><text>The text of any executive arrangement (including the text of any oral arrangement, which shall be reduced to writing) entered into by the United States under subsection (a) shall be transmitted to the Committee on Foreign Affairs of the House of Representatives and the Committee on Foreign Relations of the Senate not later than 5 days after such arrangement is signed or otherwise agreed to, together with an explanation of such arrangement, its purpose, how such arrangement is consistent with the United States international cyberspace policy described in section 3, and how such arrangement will be implemented.</text>
 </subsection><subsection id="HBBF05B5775DF4A7C9FF6CBB8414571DF"><enum>(c)</enum><header>Status report</header><text display-inline="yes-display-inline">Not later than 1 year after the text of an executive arrangement is transmitted to Congress pursuant to subsection (b) and annually thereafter for 7 years, or until such an arrangement has been discontinued, the President shall report to the Committee on Foreign Affairs of the House of Representatives and the Committee on Foreign Relations of the Senate on the status of such arrangement, including an evidence-based assessment of whether all parties to such arrangement have fulfilled their commitments under such arrangement and if not, what steps the United States has taken or plans to take to ensure all such commitments are fulfilled, whether the stated purpose of such arrangement is being achieved, and whether such arrangement positively impacts building of cyber norms internationally. Each such report shall include metrics to support its findings.</text>
 </subsection><subsection id="HBD3713534E9B49B4B38B4C6FBA184A02"><enum>(d)</enum><header>Existing executive arrangements</header><text>Not later than 60 days after the date of the enactment of this Act, the President shall satisfy the requirements of subsection (c) for the following executive arrangements already in effect:</text>
 <paragraph id="H3480BF1589694C1B96D2EA88E038504F"><enum>(1)</enum><text>The arrangement announced between the United States and Japan on April 25, 2014.</text> </paragraph><paragraph id="H87A2C83993BB4EC68F7441FA6394B92D"><enum>(2)</enum><text>The arrangement announced between the United States and the United Kingdom on January 16, 2015.</text>
 </paragraph><paragraph id="H8ECA30DFCD2945F98E2A2770164CA626"><enum>(3)</enum><text>The arrangement announced between the United States and China on September 25, 2015.</text> </paragraph><paragraph id="HFC64AB52726E48A783F08E1C37938836"><enum>(4)</enum><text>The arrangement announced between the United States and Korea on October 16, 2015.</text>
 </paragraph><paragraph id="HF03439865DE243F295F88701B9646E71"><enum>(5)</enum><text>The arrangement announced between the United States and Australia on January 19, 2016.</text> </paragraph><paragraph id="H0601F430B9394D92B9A66498933EE3D1"><enum>(6)</enum><text>The arrangement announced between the United States and India on June 7, 2016.</text>
 </paragraph><paragraph id="H3F878E2CAE164A289B4F1830F84E72EB"><enum>(7)</enum><text>The arrangement announced between the United States and Argentina on April 27, 2017.</text> </paragraph><paragraph id="HAFB7B876081A45A89EF373A9B7B21853"><enum>(8)</enum><text>The arrangement announced between the United States and Kenya on June 22, 2017.</text>
 </paragraph><paragraph id="H89F6348073734D3AB6ED761FD4A756CD"><enum>(9)</enum><text>The arrangement announced between the United States and Israel on June 26, 2017.</text> </paragraph><paragraph id="HD8248BECA58F45C9AEC475329ECDA829"><enum>(10)</enum><text>Any other similar bilateral or multilateral arrangement announced before the date of the enactment of this Act.</text>
				</paragraph></subsection></section><section changed="deleted" committee-id="SSFR00" id="HF4FD920A1F594AAE9CF5B1DDFA2BA977" reported-display-style="strikethrough"><enum>6.</enum><header>International strategy for cyberspace</header>
 <subsection id="HD543EA2D30A1461E904AF714EE389089"><enum>(a)</enum><header>Strategy required</header><text display-inline="yes-display-inline">Not later than 1 year after the date of the enactment of this Act, the Secretary of State, in coordination with the heads of other relevant Federal departments and agencies, shall produce a strategy relating to United States international policy with regard to cyberspace.</text>
 </subsection><subsection id="HE7C2796126174BA59840F3E68284F1C7"><enum>(b)</enum><header>Elements</header><text>The strategy required under subsection (a) shall include the following:</text> <paragraph id="HF812F100A35044A0BD61E0D246B8183B"><enum>(1)</enum><text>A review of actions and activities undertaken to support the United States international cyberspace policy described in section 3.</text>
 </paragraph><paragraph id="H3722EB6C3D374A83B3CFBD1E367AA563"><enum>(2)</enum><text display-inline="yes-display-inline">A plan of action to guide the diplomacy of the Department of State with regard to foreign countries, including conducting bilateral and multilateral activities to develop the norms of responsible international behavior in cyberspace, and status review of existing efforts in multilateral fora to obtain agreements on international norms in cyberspace.</text>
 </paragraph><paragraph id="H6803C6196A4B411A99C2ECE838C1C914"><enum>(3)</enum><text>A review of alternative concepts with regard to international norms in cyberspace offered by foreign countries.</text>
 </paragraph><paragraph id="HBE1D4E6AD44240C887FFE6ED1E72D38E"><enum>(4)</enum><text display-inline="yes-display-inline">A detailed description of new and evolving threats to United States national security in cyberspace from foreign countries, State-sponsored actors, and private actors to Federal and private sector infrastructure of the United States, intellectual property in the United States, and the privacy of citizens of the United States.</text>
 </paragraph><paragraph id="HF733EECB146B4F0DB511B2F6FC47496A"><enum>(5)</enum><text display-inline="yes-display-inline">A review of policy tools available to the President to deter and de-escalate tensions with foreign countries, State-sponsored actors, and private actors regarding threats in cyberspace, and to what degree such tools have been used and whether or not such tools have been effective.</text>
 </paragraph><paragraph id="H673226C4E1F54ED88B9E68BAADFD80AE"><enum>(6)</enum><text>A review of resources required to conduct activities to build responsible norms of international cyber behavior.</text>
 </paragraph><paragraph id="H62835719E0194C198E7D625AF2989A44"><enum>(7)</enum><text>A clarification of the applicability of international laws and norms, including the law of armed conflict, to the use of ICT.</text>
 </paragraph><paragraph id="H2C5DFF8385EB46E0B35EDF206767C38A"><enum>(8)</enum><text display-inline="yes-display-inline">A clarification that countries that fall victim to malicious cyber activities have the right to take proportionate countermeasures under international law, including exercising the right to collective and individual self-defense.</text>
 </paragraph><paragraph id="H83DF40BFB89C45978EEEA5855ED95665"><enum>(9)</enum><text>A plan of action to guide the diplomacy of the Department of State with regard to existing mutual defense agreements, including the inclusion in such agreements of information relating to the applicability of malicious cyber activities in triggering mutual defense obligations.</text>
				</paragraph></subsection><subsection commented="no" id="H381B569EC77543809E0340FE0790389D"><enum>(c)</enum><header>Form of strategy</header>
 <paragraph commented="no" id="HDD25F7DF849D486DB9EB5D7092393183"><enum>(1)</enum><header>Public availability</header><text display-inline="yes-display-inline">The strategy required under subsection (a) shall be available to the public in unclassified form, including through publication in the Federal Register.</text>
				</paragraph><paragraph commented="no" id="H5BD94A39DAE74316AED46C8935BF3692"><enum>(2)</enum><header>Classified annex</header>
 <subparagraph commented="no" id="H525D0B03E20E4E32B5BA4DCC84CE0AD9"><enum>(A)</enum><header>In general</header><text display-inline="yes-display-inline">If the Secretary of State determines that such is appropriate, the strategy required under subsection (a) may include a classified annex consistent with United States national security interests.</text>
 </subparagraph><subparagraph commented="no" id="H821446BD18E043299ABE522710C853E6"><enum>(B)</enum><header>Rule of construction</header><text>Nothing in this subsection may be construed as authorizing the public disclosure of an unclassified annex under subparagraph (A).</text>
 </subparagraph></paragraph></subsection><subsection id="HD46140ED16DE4B97AD23A6CBD6444A8D"><enum>(d)</enum><header>Briefing</header><text>Not later than 30 days after the production of the strategy required under subsection (a), the Secretary of State shall brief the Committee on Foreign Affairs of the House of Representatives and the Committee on Foreign Relations of the Senate on such strategy, including any material contained in a classified annex.</text>
 </subsection><subsection id="H538E4EEE240C4BA9873ABB851719FCA9"><enum>(e)</enum><header>Updates</header><text>The strategy required under subsection (a) shall be updated—</text> <paragraph id="H787CACAE49EE4FF689B55F4B3A4BF27E"><enum>(1)</enum><text display-inline="yes-display-inline">not later than 90 days after there has been any material change to United States policy as described in such strategy; and</text>
 </paragraph><paragraph id="H89C42F290E5C447991728225F93E250A"><enum>(2)</enum><text>not later than 1 year after each inauguration of a new President.</text> </paragraph></subsection><subsection id="H51AF9166FA7B49A9876045D56A0C8BBC"><enum>(f)</enum><header>Preexisting requirement</header><text>Upon the production and publication of the report required under section 3(c) of the Presidential Executive Order No. 13800 on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure on May 11, 2017, such report shall be considered as satisfying the requirement under subsection (a) of this section.</text>
			</subsection></section><section changed="deleted" committee-id="SSFR00" id="H12FD029943904CDEA64263676065EC12" reported-display-style="strikethrough"><enum>7.</enum><header>Annual country reports on human rights practices</header>
 <subsection id="H5E96B85BFF8F4FBCAAD40679C9C38E81"><enum>(a)</enum><header>Report relating to economic assistance</header><text>Section 116 of the Foreign Assistance Act of 1961 (<external-xref legal-doc="usc" parsable-cite="usc/22/2151n">22 U.S.C. 2151n</external-xref>) is amended by adding at the end the following new subsection:</text>
				<quoted-block changed="deleted" committee-id="SSFR00" id="H69109B9045764F25AADB2A34D90115B6" reported-display-style="strikethrough" style="OLC">
 <subsection id="HFA79451C7AC5479BBEBC700843ACDFFF"><enum>(h)</enum><paragraph commented="no" display-inline="yes-display-inline" id="H300B671FFF9D4438A6BC59FDB64DFC34"><enum>(1)</enum><text>The report required by subsection (d) shall include an assessment of freedom of expression with respect to electronic information in each foreign country. Such assessment shall consist of the following:</text>
 <subparagraph changed="deleted" committee-id="SSFR00" id="H6933ECC8B0AD493BAA17493396DF783D" indent="up1" reported-display-style="strikethrough"><enum>(A)</enum><text display-inline="yes-display-inline">An assessment of the extent to which government authorities in each country inappropriately attempt to filter, censor, or otherwise block or remove nonviolent expression of political or religious opinion or belief via the internet, including electronic mail, as well as a description of the means by which such authorities attempt to block or remove such expression.</text>
 </subparagraph><subparagraph changed="deleted" committee-id="SSFR00" id="H7E94C58B7903493AAD9EF817314BDFF1" indent="up1" reported-display-style="strikethrough"><enum>(B)</enum><text>An assessment of the extent to which government authorities in each country have persecuted or otherwise punished an individual or group for the nonviolent expression of political, religious, or ideological opinion or belief via the internet, including electronic mail.</text>
 </subparagraph><subparagraph changed="deleted" committee-id="SSFR00" id="H71A9C56D765F45EABEA9993D26AFA465" indent="up1" reported-display-style="strikethrough"><enum>(C)</enum><text display-inline="yes-display-inline">An assessment of the extent to which government authorities in each country have sought to inappropriately collect, request, obtain, or disclose personally identifiable information of a person in connection with such person’s nonviolent expression of political, religious, or ideological opinion or belief, including expression that would be protected by the International Covenant on Civil and Political Rights.</text>
 </subparagraph><subparagraph changed="deleted" committee-id="SSFR00" id="H909D67782FCB446E9FC3A72EC0A81726" indent="up1" reported-display-style="strikethrough"><enum>(D)</enum><text display-inline="yes-display-inline">An assessment of the extent to which wire communications and electronic communications are monitored without regard to the principles of privacy, human rights, democracy, and rule of law.</text>
 </subparagraph></paragraph><paragraph changed="deleted" committee-id="SSFR00" id="H6BBDC99BF9F84C44922DED77CDB70BEE" indent="up1" reported-display-style="strikethrough"><enum>(2)</enum><text>In compiling data and making assessments for the purposes of paragraph (1), United States diplomatic personnel shall consult with human rights organizations, technology and internet companies, and other appropriate nongovernmental organizations.</text>
 </paragraph><paragraph changed="deleted" commented="no" committee-id="SSFR00" id="H49D7911D9C014922A42F8E62FABA6808" indent="up1" reported-display-style="strikethrough"><enum>(3)</enum><text>In this subsection—</text> <subparagraph commented="no" id="H48DCB59BAEDE4686AC46A2104B6DAAAE"><enum>(A)</enum><text>the term <quote>electronic communication</quote> has the meaning given such term in section 2510 of title 18, United States Code;</text>
 </subparagraph><subparagraph commented="no" id="H20F294410F024784831D535CAD5470EC"><enum>(B)</enum><text>the term <quote>internet</quote> has the meaning given such term in section 231(e)(3) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/231">47 U.S.C. 231(e)(3)</external-xref>);</text>
 </subparagraph><subparagraph commented="no" id="HC41B8BB9A1CF4C5BB540EDC5749AF8D2"><enum>(C)</enum><text>the term <quote>personally identifiable information</quote> means data in a form that identifies a particular person; and</text> </subparagraph><subparagraph commented="no" id="H021115A02188453F917D7CC6B3B93E70"><enum>(D)</enum><text>the term <quote>wire communication</quote> has the meaning given such term in section 2510 of title 18, United States Code.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </subsection><subsection id="HBC07C03CDB5A46BCB76219AB24FF850D"><enum>(b)</enum><header>Report relating to security assistance</header><text>Section 502B of the Foreign Assistance Act of 1961 (<external-xref legal-doc="usc" parsable-cite="usc/22/2304">22 U.S.C. 2304</external-xref>) is amended—</text> <paragraph id="H63874ABBABCB4974B727F45848D46C27"><enum>(1)</enum><text>by redesignating the second subsection (i) (relating to child marriage status) as subsection (j); and</text>
 </paragraph><paragraph id="H34E2D7B3C39044A5AC65370C4CABEDE5"><enum>(2)</enum><text>by adding at the end the following new subsection:</text> <quoted-block changed="deleted" committee-id="SSFR00" id="HB7A45D43AC98404B8C55F900BDE47D82" reported-display-style="strikethrough" style="OLC"> <subsection id="H79C8E9797FDB46F4922B3CB3892512EC"><enum>(k)</enum><paragraph commented="no" display-inline="yes-display-inline" id="HAD50D3EFA2134B1E9617526F0820B9F9"><enum>(1)</enum><text>The report required by subsection (b) shall include an assessment of freedom of expression with respect to electronic information in each foreign country. Such assessment shall consist of the following:</text>
 <subparagraph changed="deleted" committee-id="SSFR00" id="HFE1B9109DEA840F1ACBA486B2B779838" indent="up1" reported-display-style="strikethrough"><enum>(A)</enum><text display-inline="yes-display-inline">An assessment of the extent to which government authorities in each country inappropriately attempt to filter, censor, or otherwise block or remove nonviolent expression of political or religious opinion or belief via the internet, including electronic mail, as well as a description of the means by which such authorities attempt to block or remove such expression.</text>
 </subparagraph><subparagraph changed="deleted" committee-id="SSFR00" id="H89975930864E47A182388DB84F10D7FA" indent="up1" reported-display-style="strikethrough"><enum>(B)</enum><text display-inline="yes-display-inline">An assessment of the extent to which government authorities in each country have persecuted or otherwise punished an individual or group for the nonviolent expression of political, religious, or ideological opinion or belief via the internet, including electronic mail.</text>
 </subparagraph><subparagraph changed="deleted" commented="no" committee-id="SSFR00" id="H7A2E99E9BCF44624BB418F596D509669" indent="up1" reported-display-style="strikethrough"><enum>(C)</enum><text display-inline="yes-display-inline">An assessment of the extent to which government authorities in each country have sought to inappropriately collect, request, obtain, or disclose personally identifiable information of a person in connection with such person’s nonviolent expression of political, religious, or ideological opinion or belief, including expression that would be protected by the International Covenant on Civil and Political Rights.</text>
 </subparagraph><subparagraph changed="deleted" committee-id="SSFR00" id="H154CE8AD70EF4066A6A0327F86843FC5" indent="up1" reported-display-style="strikethrough"><enum>(D)</enum><text display-inline="yes-display-inline">An assessment of the extent to which wire communications and electronic communications are monitored without regard to the principles of privacy, human rights, democracy, and rule of law.</text>
 </subparagraph></paragraph><paragraph changed="deleted" committee-id="SSFR00" id="H4463AA5393CA4FFDAF2272606C04BC3E" indent="up1" reported-display-style="strikethrough"><enum>(2)</enum><text>In compiling data and making assessments for the purposes of paragraph (1), United States diplomatic personnel shall consult with human rights organizations, technology and internet companies, and other appropriate nongovernmental organizations.</text>
 </paragraph><paragraph changed="deleted" committee-id="SSFR00" id="H1A2FD1F32F994B26B4B7F95A2D6CEF5D" indent="up1" reported-display-style="strikethrough"><enum>(3)</enum><text>In this subsection—</text> <subparagraph id="HA03A6FDDD1604EFA86F5084262C780EA"><enum>(A)</enum><text>the term <quote>electronic communication</quote> has the meaning given such term in section 2510 of title 18, United States Code;</text>
 </subparagraph><subparagraph id="H6683CB03D0E74CCA8E66F4F30DE15CAD"><enum>(B)</enum><text>the term <quote>internet</quote> has the meaning given such term in section 231(e)(3) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/231">47 U.S.C. 231(e)(3)</external-xref>);</text>
 </subparagraph><subparagraph id="HB172E53A61C14C82B2C9E25DAEB692FE"><enum>(C)</enum><text>the term <quote>personally identifiable information</quote> means data in a form that identifies a particular person; and</text> </subparagraph><subparagraph id="H9F4DDC55979F461B8DF95F8A9EBCC3CF"><enum>(D)</enum><text>the term <quote>wire communication</quote> has the meaning given such term in section 2510 of title 18, United States Code.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section></legis-body>
	<legis-body display-enacting-clause="no-display-enacting-clause">
		<section changed="added" committee-id="SSFR00" id="id7bc78c6d443c48878353075cc275cb13" reported-display-style="italic" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header>
 <subsection id="idF499B9A29E10464890520F42DFA6B945"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Cyber Diplomacy Act of 2018</short-title></quote>.</text> </subsection><subsection id="idA7A38379CC6A41349539F643484267B1"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text><toc changed="added" committee-id="SSFR00" reported-display-style="italic"><toc-entry idref="id7bc78c6d443c48878353075cc275cb13" level="section">Sec. 1. Short title; table of contents.</toc-entry><toc-entry idref="id1949505db8fb4372ace364acc0208705" level="section">Sec. 2. Findings.</toc-entry><toc-entry idref="id970b7298470147a980fa5be0b1c6c8bf" level="section">Sec. 3. Definitions.</toc-entry><toc-entry idref="idb4fa2a1e63b847589a76113453c412cc" level="section">Sec. 4. United States International Cyberspace Policy.</toc-entry><toc-entry idref="id419ee6b3200f4430bf70301389584861" level="section">Sec. 5. Department of State responsibilities.</toc-entry><toc-entry idref="id4a0028923fd14c4caf5f2db46cdc39ac" level="section">Sec. 6. International cyberspace executive arrangements.</toc-entry><toc-entry idref="id011cfa54b1264494a79c6e690ba69930" level="section">Sec. 7. International strategy for cyberspace.</toc-entry><toc-entry idref="id0638da1838224ed385ed076b40e55a90" level="section">Sec. 8. Annual country reports on human rights practices.</toc-entry><toc-entry idref="idbc89516ddf4e4913a26100a9efab35f3" level="section">Sec. 9. GAO report on cyber threats and data misuse.</toc-entry><toc-entry idref="id83AC8AA9544B4227959CEB7D9205A559" level="section">Sec. 10. Sense of Congress on cybersecurity sanctions against North Korea and cybersecurity
			 legislation in Vietnam.</toc-entry></toc>
 </subsection></section><section changed="added" committee-id="SSFR00" id="id1949505db8fb4372ace364acc0208705" reported-display-style="italic"><enum>2.</enum><header>Findings</header><text display-inline="no-display-inline">Congress makes the following findings:</text> <paragraph id="idf63db5e75d224a86868592df1c5213bb"><enum>(1)</enum><text>The stated goal of the United States International Strategy for Cyberspace, launched on May 16, 2011, is to <quote>work internationally to promote an open, interoperable, secure, and reliable information and communications infrastructure that supports international trade and commerce, strengthens international security, and fosters free expression and innovation … in which norms of responsible behavior guide states' actions, sustain partnerships, and support the rule of law in cyberspace</quote>.</text>
 </paragraph><paragraph id="idc9c73fe6f7204ba7a7c1dac223c1f1b0"><enum>(2)</enum><text>In its June 24, 2013 report, the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (referred to in this section as <quote>GGE</quote>), established by the United Nations General Assembly, concluded that <quote>State sovereignty and the international norms and principles that flow from it apply to States' conduct of [information and communications technology] ICT-related activities and to their jurisdiction over ICT infrastructure with their territory</quote>.</text>
 </paragraph><paragraph id="idde33feb5656542238723fa0ea3b508c9"><enum>(3)</enum><text>In January 2015, China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan proposed a troubling international code of conduct for information security, which could be used as a pretext for restricting political dissent, and includes <quote>curbing the dissemination of information that incites terrorism, separatism or extremism or that inflames hatred on ethnic, racial or religious grounds</quote>.</text>
 </paragraph><paragraph id="id08aa6acb53894e3ca12b0dfa2f5c4c5f"><enum>(4)</enum><text>In its July 22, 2015 consensus report, GGE found that <quote>norms of responsible State behavior can reduce risks to international peace, security and stability</quote>.</text>
 </paragraph><paragraph id="idb11d75f00d00414cb5f1b43d284aa9fb"><enum>(5)</enum><text>On September 25, 2015, the United States and China announced a commitment that neither country's government <quote>will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors</quote>.</text>
 </paragraph><paragraph id="idd0662bd816c64c5d939933ab3a584ea0"><enum>(6)</enum><text>At the Antalya Summit on November 15 and 16, 2015, the Group of 20 Leaders’ communiqué—</text> <subparagraph id="id2A71709D39BA46FFBAB25F323F9B360C"><enum>(A)</enum><text>affirmed the applicability of international law to state behavior in cyberspace;</text>
 </subparagraph><subparagraph id="id33EB22E34952481CA660FF1B7C16819C"><enum>(B)</enum><text>called on states to refrain from cyber-enabled theft of intellectual property for commercial gain; and</text>
 </subparagraph><subparagraph id="id0306935EAF5B4F238AEE3DFB1D6D3FFF"><enum>(C)</enum><text>endorsed the view that all states should abide by norms of responsible behavior.</text>
 </subparagraph></paragraph><paragraph id="idd64968ced1524e9287621f87ed025028"><enum>(7)</enum><text>The March 2016 Department of State International Cyberspace Policy Strategy noted that <quote>the Department of State anticipates a continued increase and expansion of our cyber-focused diplomatic efforts for the foreseeable future</quote>.</text>
 </paragraph><paragraph id="id3fc57f3dab3b473ea200a3e5ee06d215"><enum>(8)</enum><text>On December 1, 2016, the Commission on Enhancing National Cybersecurity, which was established within the Department of Commerce by Executive Order 13718 (81 Fed. Reg. 7441), recommended that <quote>the President should appoint an Ambassador for Cybersecurity to lead U.S. engagement with the international community on cybersecurity strategies, standards, and practices</quote>.</text>
 </paragraph><paragraph id="ida23223420b5243c681a569845641a7c2"><enum>(9)</enum><text>On April 11, 2017, the 2017 Group of 7 Declaration on Responsible States Behavior in Cyberspace—</text>
 <subparagraph id="id97051723F09B4B028692672DE27ABDBD"><enum>(A)</enum><text>recognized <quote>the urgent necessity of increased international cooperation to promote security and stability in cyberspace</quote>;</text>
 </subparagraph><subparagraph id="id109F6499B03C4E24BE736C827C22E611"><enum>(B)</enum><text>expressed commitment to <quote>promoting a strategic framework for conflict prevention, cooperation and stability in cyberspace, consisting of the recognition of the applicability of existing international law to State behavior in cyberspace, the promotion of voluntary, non-binding norms of responsible State behavior during peacetime, and the development and the implementation of practical cyber confidence building measures (CBMs) between States</quote>; and</text>
 </subparagraph><subparagraph id="id3D3FB2B714C74DB7904B40C0EAE3BC5B"><enum>(C)</enum><text>reaffirmed that <quote>the same rights that people have offline must also be protected online</quote>.</text>
 </subparagraph></paragraph><paragraph id="idF92182820DA24D839C7493B2F30263DA"><enum>(10)</enum><text>In testimony before the <committee-name committee-id="SLIN00">Select Committee on Intelligence of the Senate</committee-name> on May 11, 2017, Director of National Intelligence Daniel R. Coats identified 6 cyber threat actors, including—</text>
 <subparagraph id="idC9C24611897B481A8361ED8C6930DDA6"><enum>(A)</enum><text>Russia, for <quote>efforts to influence the 2016 US election</quote>;</text> </subparagraph><subparagraph id="id8C4CB4F7FE7246098CEFDBEADB09D0B1"><enum>(B)</enum><text>China, for <quote>actively targeting the US Government, its allies, and US companies for cyber espionage</quote>;</text>
 </subparagraph><subparagraph id="id55474EB7C86241819159833B44AB2346"><enum>(C)</enum><text>Iran, for <quote>leverag[ing] cyber espionage, propaganda, and attacks to support its security priorities, influence events and foreign perceptions, and counter threats</quote>;</text>
 </subparagraph><subparagraph id="id99F19758A52C428282D43E847741DF12"><enum>(D)</enum><text>North Korea, for <quote>previously conduct[ing] cyber-attacks against US commercial entities—specifically, Sony Pictures Entertainment in 2014</quote>;</text>
 </subparagraph><subparagraph id="idDFFEDC9A4E13481881ADF57669BAFF17"><enum>(E)</enum><text>terrorists, who <quote>use the Internet to organize, recruit, spread propaganda, raise funds, collect intelligence, inspire action by followers, and coordinate operations</quote>; and</text>
 </subparagraph><subparagraph id="id942335D799F845EF97CF37B25EA4F443"><enum>(F)</enum><text>criminals, who <quote>are also developing and using sophisticated cyber tools for a variety of purposes including theft, extortion, and facilitation of other criminal activities</quote>.</text>
 </subparagraph></paragraph><paragraph id="id61edcdc46eae4ffa930bac714455e630"><enum>(11)</enum><text>On May 11, 2017, President Donald J. Trump issued Executive Order 13800 (82 Fed. Reg. 22391), entitled <quote>Strengthening the Cybersecurity of Federal Networks and Infrastructure</quote>, which—</text>
 <subparagraph id="id2598172B13884B45A7A48ADC0577549F"><enum>(A)</enum><text>designates the Secretary of State to lead an interagency effort to develop an engagement strategy for international cooperation in cybersecurity; and</text>
 </subparagraph><subparagraph id="idC15610A19D8A428EBA37D79F04C17218"><enum>(B)</enum><text>notes that <quote>the United States is especially dependent on a globally secure and resilient internet and must work with allies and other partners toward maintaining ... the policy of the executive branch to promote an open, interoperable, reliable, and secure internet that fosters efficiency, innovation, communication, and economic prosperity, while respecting privacy and guarding against disruption, fraud, and theft</quote>.</text>
 </subparagraph></paragraph></section><section changed="added" committee-id="SSFR00" id="id970b7298470147a980fa5be0b1c6c8bf" reported-display-style="italic"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text> <paragraph id="idef6b80177b1b4066ad0a770272f481e1"><enum>(1)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means the <committee-name committee-id="SSFR00">Committee on Foreign Relations of the Senate</committee-name> and the <committee-name committee-id="">Committee on Foreign Affairs of the House of Representatives</committee-name>.</text>
 </paragraph><paragraph id="id15af873f1686400395bde51f00d6f881"><enum>(2)</enum><header>Information and communications technology; ICT</header><text>The terms <term>information and communications technology</term> and <term>ICT</term> include hardware, software, and other products or services primarily intended to fulfill or enable the function of information processing and communication by electronic means, including transmission and display, including via the Internet.</text>
			</paragraph></section><section changed="added" committee-id="SSFR00" id="idb4fa2a1e63b847589a76113453c412cc" reported-display-style="italic"><enum>4.</enum><header>United States International Cyberspace Policy</header>
 <subsection id="id0b7c9d0505da4447b888414dc40cd3c9"><enum>(a)</enum><header>In general</header><text>It is the policy of the United States to work internationally to promote an open, interoperable, reliable, unfettered, and secure Internet governed by the multi-stakeholder model, which—</text>
 <paragraph id="idB589B30D5EBE4D4F84947901C6E42CFE"><enum>(1)</enum><text>promotes human rights, democracy, and rule of law, including freedom of expression, innovation, communication, and economic prosperity; and</text>
 </paragraph><paragraph id="idCE6377B29C4545DAADF6EDFEE14E32E7"><enum>(2)</enum><text>respects privacy and guards against deception, fraud, and theft.</text>
 </paragraph></subsection><subsection id="id031ea0cf2f7d45a2a5a865bb50ed864a"><enum>(b)</enum><header>Implementation</header><text>In implementing the policy described in subsection (a), the President, in consultation with outside actors, including private sector companies, nongovernmental organizations, security researchers, and other relevant stakeholders, in the conduct of bilateral and multilateral relations, shall pursue the following objectives:</text>
 <paragraph id="idd8ccbea447dd44809d1bce1f082c0b17"><enum>(1)</enum><text>Clarifying the applicability of international laws and norms to the use of ICT.</text> </paragraph><paragraph id="id92f95868f27c4abdb905afed5ae90cd0"><enum>(2)</enum><text>Reducing and limiting the risk of escalation and retaliation in cyberspace, damage to critical infrastructure, and other malicious cyber activity that impairs the use and operation of critical infrastructure that provides services to the public.</text>
 </paragraph><paragraph id="ida15c6fbab6d842abb0280262a355a4a3"><enum>(3)</enum><text>Cooperating with like-minded democratic countries that share common values and cyberspace policies with the United States, including respect for human rights, democracy, and the rule of law, to advance such values and policies internationally.</text>
 </paragraph><paragraph id="idEC00DBFC55FF4E85A84D08ABD7B837BD"><enum>(4)</enum><text>Encouraging the responsible development of new, innovative technologies and ICT products that strengthen a secure Internet architecture that is accessible to all.</text>
 </paragraph><paragraph id="id7f030ba7a6fa48a6aefba9ab6a433826"><enum>(5)</enum><text>Securing and implementing commitments on responsible country behavior in cyberspace based upon accepted norms, including the following:</text>
 <subparagraph id="id656cde66d31142208d83dbb7c710ce7b"><enum>(A)</enum><text>Countries should not conduct, or knowingly support, cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.</text>
 </subparagraph><subparagraph id="ide3039c2273d349b9a19a53b0fb2840ba"><enum>(B)</enum><text>Countries should take all appropriate and reasonable efforts to keep their territories clear of intentionally wrongful acts using ICTs in violation of international commitments.</text>
 </subparagraph><subparagraph id="idcc74c955204d46e2a6e64f02ded6ea63"><enum>(C)</enum><text>Countries should not conduct or knowingly support ICT activity that, contrary to international law, intentionally damages or otherwise impairs the use and operation of critical infrastructure providing services to the public, and should take appropriate measures to protect their critical infrastructure from ICT threats.</text>
 </subparagraph><subparagraph id="id0a20f5666602458283552765ee67539e"><enum>(D)</enum><text>Countries should not conduct or knowingly support malicious international activity that, contrary to international law, harms the information systems of authorized emergency response teams (also known as <quote>computer emergency response teams</quote> or <quote>cybersecurity incident response teams</quote>) of another country or authorize emergency response teams to engage in malicious international activity.</text>
 </subparagraph><subparagraph id="id9fcbad1f980a401e9eeeb396dbb886ee"><enum>(E)</enum><text>Countries should respond to appropriate requests for assistance to mitigate malicious ICT activity emanating from their territory and aimed at the critical infrastructure of another country.</text>
 </subparagraph><subparagraph id="id5309548d61be478a9efee0627ac4377d"><enum>(F)</enum><text>Countries should not restrict cross-border data flows or require local storage or processing of data.</text>
 </subparagraph><subparagraph id="id5c8eec64cd804dcb918c857023f031bc"><enum>(G)</enum><text>Countries should protect the exercise of human rights and fundamental freedoms on the Internet and commit to the principle that the human rights that people have offline should also be protected online.</text>
 </subparagraph></paragraph><paragraph id="id8025A07C9C8E493BA8B91876B2B808B9"><enum>(6)</enum><text>Advancing, encouraging, and supporting the development and adoption of internationally recognized technical standards and best practices.</text>
				</paragraph></subsection></section><section changed="added" committee-id="SSFR00" id="id419ee6b3200f4430bf70301389584861" reported-display-style="italic"><enum>5.</enum><header>Department of State responsibilities</header>
 <subsection id="idd69cdde6a40a4423823e80c532f7b614"><enum>(a)</enum><header>Office of Cyberspace and the Digital Economy</header><text>Section 1 of the State Department Basic Authorities Act of 1956 (<external-xref legal-doc="usc" parsable-cite="usc/22/2651a">22 U.S.C. 2651a</external-xref>) is amended—</text> <paragraph id="idbe7ea39fea1747fda6c24592c8b9fd07"><enum>(1)</enum><text>by redesignating subsection (g) as subsection (h); and</text>
 </paragraph><paragraph id="id893707d198c64e77a495b6a92d0fb71d"><enum>(2)</enum><text>by inserting after subsection (f) the following:</text> <quoted-block changed="added" committee-id="SSFR00" display-inline="no-display-inline" id="idb78c81f03a594565a80eeb88304393d3" reported-display-style="italic" style="OLC"> <subsection id="iddd5a787242334184b2bcd3ef1d63c667"><enum>(g)</enum><header>Office of Cyberspace and the Digital Economy</header> <paragraph id="idcf8b30aa67d64745861a00e384ac4770"><enum>(1)</enum><header>In general</header><text>There is established, within the Department of State, an Office of Cyberspace and the Digital Economy (referred to in this subsection as the <quote>Office</quote>). The head of the Office shall have the rank and status of ambassador and shall be appointed by the President, by and with the advice and consent of the Senate.</text>
							</paragraph><paragraph id="id162f649692034faa8939efe545ba020a"><enum>(2)</enum><header>Duties</header>
 <subparagraph id="idf39e36b9678c4c49a7c6cd8546aa6a31"><enum>(A)</enum><header>In general</header><text>The head of the Office shall perform such duties and exercise such powers as the Secretary of State shall prescribe, including implementing the policy of the United States described in section 4 of the <short-title>Cyber Diplomacy Act of 2018</short-title>.</text>
 </subparagraph><subparagraph id="idc4d6083aa2084ea6bab562e338dfa665"><enum>(B)</enum><header>Duties described</header><text>The principal duties and responsibilities of the head of the Office shall be—</text> <clause id="idd9b98c99ddc248a79bfdbbc14617bab0"><enum>(i)</enum><text>to serve as the principal cyber policy official within the senior management of the Department of State and as the advisor to the Secretary of State for cyber issues;</text>
 </clause><clause id="idb2732e9b1b8743988f9e35f506174764"><enum>(ii)</enum><text>to lead the Department of State’s diplomatic cyberspace efforts, including efforts relating to international cybersecurity, Internet access, Internet freedom, digital economy, cybercrime, deterrence and international responses to cyber threats, and other issues that the Secretary assigns to the Office;</text>
 </clause><clause id="idef043cf3832047a59dbca1a46a8d1368"><enum>(iii)</enum><text>to promote an open, interoperable, reliable, unfettered, and secure information and communications technology infrastructure globally;</text>
 </clause><clause id="id26714e1ef9254a2489a9c8f63f6e602c"><enum>(iv)</enum><text>to represent the Secretary of State in interagency efforts to develop and advance the policy described in section 4 of the <short-title>Cyber Diplomacy Act of 2018</short-title>;</text>
 </clause><clause id="ida4916fbe30734e98a9563c3171a88f8c"><enum>(v)</enum><text>to coordinate cyberspace efforts and other relevant functions, including countering terrorists' use of cyberspace, within the Department of State and with other components of the United States Government;</text>
 </clause><clause id="id1f3d9c9f9f534df89a1ef36b51d4891b"><enum>(vi)</enum><text>to act as a liaison to public and private sector entities on relevant cyberspace issues;</text> </clause><clause id="idc0ee8c912438445787a90bc4123688c6"><enum>(vii)</enum><text>to lead United States Government efforts to establish a global deterrence framework;</text>
 </clause><clause id="id404a09d9c98c47b0b233a3598b8823b0"><enum>(viii)</enum><text>to develop and execute adversary-specific strategies to influence adversary decisionmaking through the imposition of costs and deterrence strategies;</text>
 </clause><clause id="id9aeae96a9b1a4c6f801ecbcf6a469742"><enum>(ix)</enum><text>to advise the Secretary and coordinate with foreign governments on external responses to national-security-level cyber incidents, including coordination on diplomatic response efforts to support allies threatened by malicious cyber activity, in conjunction with members of the North Atlantic Treaty Organization and other like-minded countries;</text>
 </clause><clause id="ida94e61a468ca46e19901bd3929f06af0"><enum>(x)</enum><text>to promote the adoption of national processes and programs that enable threat detection, prevention, and response to malicious cyber activity emanating from the territory of a foreign country, including as such activity relates to the United States’ European allies, as appropriate;</text>
 </clause><clause id="idcb53bc25e0d14aea8578a44037502ec6"><enum>(xi)</enum><text>to promote the building of foreign capacity to protect the global network with the goal of enabling like-minded participation in deterrence frameworks;</text>
 </clause><clause id="id65813ca057ae47a6ba68fd83291e44c5"><enum>(xii)</enum><text>to promote the maintenance of an open and interoperable Internet governed by the multi-stakeholder model, instead of by centralized government control;</text>
 </clause><clause id="idb522b74f345a4b05aba48731bd607663"><enum>(xiii)</enum><text>to promote an international regulatory environment for technology investments and the Internet that benefits United States economic and national security interests;</text>
 </clause><clause id="ida7a6a4311bbb41bd94b3ef3ff69b8943"><enum>(xiv)</enum><text>to promote cross-border flow of data and combat international initiatives seeking to impose unreasonable requirements on United States businesses;</text>
 </clause><clause id="ida02e6c6930cf44b8ab348cec1bb6b031"><enum>(xv)</enum><text>to promote international policies to protect the integrity of United States and international telecommunications infrastructure from foreign-based, cyber-enabled threats;</text>
 </clause><clause id="ide9ce207382c84493beb7669dc64ac7c3"><enum>(xvi)</enum><text>to serve as the interagency coordinator for the United States Government on engagement with foreign governments on cyberspace and digital economy issues as described in the <short-title>Cyber Diplomacy Act of 2018</short-title>;</text>
 </clause><clause id="ida7787951a70e4aa3acb55c30e16117e7"><enum>(xvii)</enum><text>to promote international policies to secure radio frequency spectrum for United States businesses and national security needs;</text>
 </clause><clause id="idefcd5b223d5e40fba6c27320f4954802"><enum>(xviii)</enum><text>to promote and protect the exercise of human rights, including freedom of speech and religion, through the Internet;</text>
 </clause><clause id="id28988dcd353f4632b412de0f16c7558e"><enum>(xix)</enum><text>to build capacity of United States diplomatic officials to engage on cyber issues;</text> </clause><clause id="idAF6117C637D448FBBBE8A5C49CE4F328"><enum>(xx)</enum><text>to encourage the development and adoption by foreign countries of internationally recognized standards, policies, and best practices; and</text>
 </clause><clause id="idB373598A80A94104864A31EC4D01208C"><enum>(xxi)</enum><text>to promote and advance international policies that protect individuals’ private data.</text> </clause></subparagraph></paragraph><paragraph id="idbfd8889cc4424eb883799b2fb6b02182"><enum>(3)</enum><header>Qualifications</header><text>The head of the Office should be an individual of demonstrated competency in the fields of—</text>
 <subparagraph id="id8a4cb67a4fe0406385eaccf2f5973e05"><enum>(A)</enum><text>cybersecurity and other relevant cyber issues; and</text> </subparagraph><subparagraph id="ida11fdaa99bd74e478bce48cc4b381620"><enum>(B)</enum><text>international diplomacy.</text>
 </subparagraph></paragraph><paragraph id="ida05fc6ba0b5144589ee8e8844a861f0e"><enum>(4)</enum><header>Organizational placement</header><text>During the 4-year period beginning on the date of the enactment of the <short-title>Cyber Diplomacy Act of 2018</short-title>, the head of the Office shall report to the Under Secretary for Political Affairs or to an official holding a higher position than the Under Secretary for Political Affairs in the Department of State. After the conclusion of such period, the head of the Office shall report to an appropriate Under Secretary or to an official holding a higher position than Under Secretary.</text>
 </paragraph><paragraph id="id44ab4e2b5af34219aa30a3c0a4a06dab"><enum>(5)</enum><header>Rule of construction</header><text>Nothing in this subsection may be construed to preclude—</text> <subparagraph id="idf367857e58cc4dcbb9869a67473b9019"><enum>(A)</enum><text>the Office from being elevated to a Bureau within the Department of State; or</text>
 </subparagraph><subparagraph id="id98817329b5fc49aebf91bb85ef3c4897"><enum>(B)</enum><text>the head of the Office from being elevated to an Assistant Secretary, if such an Assistant Secretary position does not increase the number of Assistant Secretary positions at the Department above the number authorized under subsection (c)(1).</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph></subsection><subsection id="idefb623da008f4743bf7e9eb2117b0293"><enum>(b)</enum><header>Sense of Congress</header><text>It is the sense of Congress that the Office of Cyberspace and the Digital Economy established under section 1(g) of the State Department Basic Authorities Act of 1956, as added by subsection (a), should be a Bureau of the Department of State headed by an Assistant Secretary, subject to the rule of construction specified in paragraph (5)(B) of such section 1(g).</text>
 </subsection><subsection id="idf4d13aabdfe84bf1bc836d12b92beb4a"><enum>(c)</enum><header>United Nations</header><text>The Permanent Representative of the United States to the United Nations should use the voice, vote, and influence of the United States to oppose any measure that is inconsistent with the policy described in section 4.</text>
			</subsection></section><section changed="added" committee-id="SSFR00" id="id4a0028923fd14c4caf5f2db46cdc39ac" reported-display-style="italic"><enum>6.</enum><header>International cyberspace executive arrangements</header>
 <subsection id="ide566c1c7f6cf4af289d2a0b450c3c0a3"><enum>(a)</enum><header>In general</header><text>The President is encouraged to enter into executive arrangements with foreign governments that support the policy described in section 4.</text>
 </subsection><subsection id="idf18bfea65da74cdfb505dfed321076bf"><enum>(b)</enum><header>Transmission to Congress</header><text>Section 112b of title 1, United States Code, is amended—</text> <paragraph id="idd5b4baaba9b7464c873ee6583e2feb17"><enum>(1)</enum><text>in subsection (a) by striking <quote>International Relations</quote> and inserting <quote>Foreign Affairs</quote>;</text>
 </paragraph><paragraph id="idc4784f22d0d84cbf84f2a533a53be09c"><enum>(2)</enum><text>in subsection (e)(2)(B), by adding at the end the following:</text> <quoted-block changed="added" committee-id="SSFR00" display-inline="no-display-inline" id="id82D3A2FE2905449ABAF34C1C43E5613D" reported-display-style="italic" style="OLC"> <clause id="idd1d42f155ad94ed8829d2e211df5371c" indent="up2"><enum>(iii)</enum><text>A bilateral or multilateral cyberspace agreement.</text></clause><after-quoted-block>;</after-quoted-block></quoted-block>
 </paragraph><paragraph id="idf1eb3e5f184f4390ad990322c733bcc2"><enum>(3)</enum><text>by redesignating subsection (f) as subsection (g); and</text> </paragraph><paragraph id="idB7D80F40FBF4463390C772B59679E5EC"><enum>(4)</enum><text>by inserting after subsection (e) the following:</text>
					<quoted-block changed="added" committee-id="SSFR00" display-inline="no-display-inline" id="idbd58fa8000cf42c2b8e8ffd35fea8ca2" reported-display-style="italic" style="OLC">
 <subsection id="id7e564bc0736041a4b7fd624133f7a021"><enum>(f)</enum><text>With respect to any bilateral or multilateral cyberspace agreement under subsection (e)(2)(B)(iii) and the information required to be transmitted to Congress under subsection (a), or with respect to any arrangement that seeks to secure commitments on responsible country behavior in cyberspace consistent with section 4(b)(5) of the <short-title>Cyber Diplomacy Act of 2018</short-title>, the Secretary of State shall provide an explanation of such arrangement, including—</text>
 <paragraph id="id4173E5E340DE4FB9BFDA807676BF2A91"><enum>(1)</enum><text>the purpose of such arrangement;</text> </paragraph><paragraph id="idF5DF5AFEA2A447398276352AC4254FF1"><enum>(2)</enum><text>how such arrangement is consistent with the policy described in section 4 of such Act; and</text>
 </paragraph><paragraph id="idBF4262D52303469EA0D8B33C0A34C82A"><enum>(3)</enum><text>how such arrangement will be implemented.</text></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </paragraph></subsection><subsection id="id1fbec3e4ce0646b78c3ea57c1f47a0b1"><enum>(c)</enum><header>Status report</header><text>During the 5-year period immediately following the transmittal to Congress of an agreement described in section 112b(e)(2)(B)(iii) of title 1, United States Code, as added by subsection (b)(2), or until such agreement has been discontinued, if discontinued within 5 years, the President shall—</text>
 <paragraph id="idF5325F4EA78A43D49D3C74BF61710281"><enum>(1)</enum><text>notify the appropriate congressional committees if another country fails to meet the commitments contained in such agreement; and</text>
 </paragraph><paragraph id="id85A7E4B0AA3F4D3AB0929CFA1D2BAA08"><enum>(2)</enum><text>describe the steps that the United States has taken or plans to take to ensure that all such commitments are fulfilled.</text>
 </paragraph></subsection><subsection id="id615a6b16632045d8b396d81a2ac13cd7"><enum>(d)</enum><header>Existing executive arrangements</header><text>Not later than 180 days after the date of the enactment of this Act, the Secretary of State shall brief the appropriate congressional committees regarding any executive bilateral or multilateral cyberspace arrangement in effect before the date of enactment of this Act, including—</text>
 <paragraph id="id218aebf81eae4a93aacaab3b2a4a60e9"><enum>(1)</enum><text>the arrangement announced between the United States and Japan on April 25, 2014;</text> </paragraph><paragraph id="id2cc4ee347445497492e7417ec7735a97"><enum>(2)</enum><text>the arrangement announced between the United States and the United Kingdom on January 16, 2015;</text>
 </paragraph><paragraph id="id6e543a94283e402ea19d1b2ebc35529a"><enum>(3)</enum><text>the arrangement announced between the United States and China on September 25, 2015;</text> </paragraph><paragraph id="id8184fbf71a2247b0a10b9cc7d92acf83"><enum>(4)</enum><text>the arrangement announced between the United States and Korea on October 16, 2015;</text>
 </paragraph><paragraph id="idb94145db0420414fbd7eb2e3c4fd5907"><enum>(5)</enum><text>the arrangement announced between the United States and Australia on January 19, 2016;</text> </paragraph><paragraph id="idaafdb5be840d42e9a6f653cba821e7a0"><enum>(6)</enum><text>the arrangement announced between the United States and India on June 7, 2016;</text>
 </paragraph><paragraph id="id19182ff55e3b43319ee14959d5f96af4"><enum>(7)</enum><text>the arrangement announced between the United States and Argentina on April 27, 2017;</text> </paragraph><paragraph id="idda3e912e4d774dc491d89bd5dc82b842"><enum>(8)</enum><text>the arrangement announced between the United States and Kenya on June 22, 2017;</text>
 </paragraph><paragraph id="id9423e17fede24e8c94bc20cdbc432724"><enum>(9)</enum><text>the arrangement announced between the United States and Israel on June 26, 2017;</text> </paragraph><paragraph id="idd99365840dc94a99acf5beb34648d090"><enum>(10)</enum><text>the arrangement announced between the United States and France on February 9, 2018;</text>
 </paragraph><paragraph id="id286EB1C810D6447EB58D546957B1480A"><enum>(11)</enum><text>the arrangement announced between the United States and Brazil on May 14, 2018; and</text> </paragraph><paragraph id="id050ff59db3544cfda1e7fe346e299189"><enum>(12)</enum><text>any other similar bilateral or multilateral arrangement announced before such date of enactment.</text>
				</paragraph></subsection></section><section changed="added" committee-id="SSFR00" id="id011cfa54b1264494a79c6e690ba69930" reported-display-style="italic"><enum>7.</enum><header>International strategy for cyberspace</header>
 <subsection id="idf6adfeae086849e0b19f8a1623f860d5"><enum>(a)</enum><header>Strategy required</header><text>Not later than 1 year after the date of the enactment of this Act, the President, acting through the Secretary of State, and in coordination with the heads of other relevant Federal departments and agencies, shall develop a strategy relating to United States engagement with foreign governments on international norms with respect to responsible state behavior in cyberspace.</text>
 </subsection><subsection id="idc44035c5c7c2438e98774b9496454cb1"><enum>(b)</enum><header>Elements</header><text>The strategy required under subsection (a) shall include the following:</text> <paragraph id="idb4a6888bda1240bc94c5355c68850dc3"><enum>(1)</enum><text>A review of actions and activities undertaken to support the policy described in section 4.</text>
 </paragraph><paragraph id="id5fd04054717644c7a7326d294f7a2b4b"><enum>(2)</enum><text>A plan of action to guide the diplomacy of the Department of State with regard to foreign countries, including—</text>
 <subparagraph id="id50BCD9FF55BB4CBF8D9CE6B045C3C694"><enum>(A)</enum><text>conducting bilateral and multilateral activities to develop norms of responsible country behavior in cyberspace consistent with the objectives under section 4(b)(5); and</text>
 </subparagraph><subparagraph id="id103E4BA560144DA0A9C6C9AFFEC3A96C"><enum>(B)</enum><text>reviewing the status of existing efforts in relevant multilateral fora, as appropriate, to obtain commitments on international norms in cyberspace.</text>
 </subparagraph></paragraph><paragraph id="id193218cc744f42abbfa03cfc05612abe"><enum>(3)</enum><text>A review of alternative concepts with regard to international norms in cyberspace offered by foreign countries.</text>
 </paragraph><paragraph id="id340214bcf3de42aab16fd58298c72862"><enum>(4)</enum><text>A detailed description of new and evolving threats in cyberspace from foreign adversaries, state-sponsored actors, and private actors to—</text>
 <subparagraph id="id26147613D230469FB2867A7F2B48F761"><enum><added-phrase committee-id="SSFR00" reported-display-style="italic">(A)</added-phrase></enum><text>United States national security;</text> </subparagraph><subparagraph id="id8A0BF0133BAC4639B6A5602350E8D4FE"><enum>(B)</enum><text>Federal and private sector cyberspace infrastructure of the United States;</text>
 </subparagraph><subparagraph id="idCF47DE62D4D14DBD97B0EE5F56E6668F"><enum>(C)</enum><text>intellectual property in the United States; and</text> </subparagraph><subparagraph id="id4F7BD7F8F2DF42B7AF139DF869E30457"><enum>(D)</enum><text>the privacy of citizens of the United States.</text>
 </subparagraph></paragraph><paragraph id="idef454427b72847c7b773c8f1d26a4041"><enum>(5)</enum><text>A review of policy tools available to the President to deter and de-escalate tensions with foreign countries, state-sponsored actors, and private actors regarding threats in cyberspace, the degree to which such tools have been used, and whether such tools have been effective deterrents.</text>
 </paragraph><paragraph id="idcce81616e2114da08df73024f1ac46cc"><enum>(6)</enum><text>A review of resources required to conduct activities to build responsible norms of international cyber behavior.</text>
 </paragraph><paragraph id="iddfaf60927b6a4c9b8aff1d2faf1bc4b1"><enum>(7)</enum><text>A plan of action, developed in consultation with relevant Federal departments and agencies as the President may direct, to guide the diplomacy of the Department of State with regard to inclusion of cyber issues in mutual defense agreements.</text>
				</paragraph></subsection><subsection id="idde6760e85e17403f86c0f235ff7e80d7"><enum>(c)</enum><header>Form of strategy</header>
 <paragraph id="id0560dd91fbad40a6ac57058db9adb439"><enum>(1)</enum><header>Public availability</header><text>The strategy required under subsection (a) shall be available to the public in unclassified form, including through publication in the Federal Register.</text>
 </paragraph><paragraph id="idcedb7c2f25bf4d8391174da4e9be6a91"><enum>(2)</enum><header>Classified annex</header><text>The strategy required under subsection (a) may include a classified annex, consistent with United States national security interests, if the Secretary of State determines that such annex is appropriate.</text>
 </paragraph></subsection><subsection id="id1a457fdc5fa94c0aa40030504e7512a6"><enum>(d)</enum><header>Briefing</header><text>Not later than 30 days after the completion of the strategy required under subsection (a), the Secretary of State shall brief the appropriate congressional committees on the strategy, including any material contained in a classified annex.</text>
 </subsection><subsection id="id2fb86576721547a887ccb5f44848c7e0"><enum>(e)</enum><header>Updates</header><text>The strategy required under subsection (a) shall be updated—</text> <paragraph id="id9c190f62c17d48e18976ead3a99f151b"><enum>(1)</enum><text>not later than 90 days after any material change to United States policy described in such strategy; and</text>
 </paragraph><paragraph id="iddf1656faa507427cb9e12ee9e5a63ce8"><enum>(2)</enum><text>not later than 1 year after the inauguration of each new President.</text> </paragraph></subsection><subsection id="idee40adf5c759472094529acab0b5c960"><enum>(f)</enum><header>Preexisting requirement</header><text>The Recommendations to the President on Protecting American Cyber Interests through International Engagement, prepared by the Office of the Coordinator for Cyber Issues on May 31, 2018, pursuant to section 3(c) of Executive Order 13800 (82 Fed. Reg. 22391), shall be deemed to satisfy the requirement under subsection (a).</text>
 </subsection></section><section changed="added" committee-id="SSFR00" id="id0638da1838224ed385ed076b40e55a90" reported-display-style="italic"><enum>8.</enum><header>Annual country reports on human rights practices</header><text display-inline="no-display-inline">Section 116 of the Foreign Assistance Act of 1961 (<external-xref legal-doc="usc" parsable-cite="usc/22/2151n">22 U.S.C. 2151n</external-xref>) is amended by adding at the end the following:</text>
			<quoted-block changed="added" committee-id="SSFR00" display-inline="no-display-inline" id="id4189e9dffa2c47b1b0a043e297ff635c" reported-display-style="italic" style="OLC">
 <subsection id="id88e44035a38e45ad9da2f81a9da61cb4"><enum>(h)</enum><paragraph commented="no" display-inline="yes-display-inline" id="id8061B03847BD4925A00B34A8B40B2290"><enum>(1)</enum><text>The report required under subsection (d) shall include an assessment of freedom of expression with respect to electronic information in each foreign country that includes the following:</text>
 <subparagraph changed="added" committee-id="SSFR00" id="id7EE2AC41D591452A8DC771ED16FB25EC" indent="up1" reported-display-style="italic"><enum>(A)</enum><text>An assessment of the extent to which government authorities in the country inappropriately attempt to filter, censor, or otherwise block or remove nonviolent expression of political or religious opinion or belief through the Internet, including electronic mail, and a description of the means by which such authorities attempt to inappropriately block or remove such expression.</text>
 </subparagraph><subparagraph changed="added" committee-id="SSFR00" id="id97E7AE918F554D7B93690BD791A5D41C" indent="up1" reported-display-style="italic"><enum>(B)</enum><text>An assessment of the extent to which government authorities in the country have persecuted or otherwise punished, arbitrarily and without due process, an individual or group for the nonviolent expression of political, religious, or ideological opinion or belief through the Internet, including electronic mail.</text>
 </subparagraph><subparagraph changed="added" committee-id="SSFR00" id="id71557D335B824B66B0DE0C6BCA6B770A" indent="up1" reported-display-style="italic"><enum>(C)</enum><text>An assessment of the extent to which government authorities in the country have sought, inappropriately and with malicious intent, to collect, request, obtain, or disclose without due process personally identifiable information of a person in connection with that person’s nonviolent expression of political, religious, or ideological opinion or belief, including expression that would be protected by the International Covenant on Civil and Political Rights, adopted at New York December 16, 1966, and entered into force March 23, 1976, as interpreted by the United States.</text>
 </subparagraph><subparagraph changed="added" committee-id="SSFR00" id="id970951C727B449278B30364E4C48877F" indent="up1" reported-display-style="italic"><enum>(D)</enum><text>An assessment of the extent to which wire communications and electronic communications are monitored without due process and in contravention to United States policy with respect to the principles of privacy, human rights, democracy, and rule of law.</text>
 </subparagraph></paragraph><paragraph changed="added" committee-id="SSFR00" id="idD35107A1D1314860BB5A9B33BBC8F46A" indent="up1" reported-display-style="italic"><enum>(2)</enum><text>In compiling data and making assessments under paragraph (1), United States diplomatic personnel should consult with relevant entities, including human rights organizations, the private sector, the governments of like-minded countries, technology and Internet companies, and other appropriate nongovernmental organizations or entities.</text>
 </paragraph><paragraph changed="added" committee-id="SSFR00" id="idCBF1A1ABFE614FB3B24CCC2899FC7830" indent="up1" reported-display-style="italic"><enum>(3)</enum><text>In this subsection—</text> <subparagraph id="id74C305C7B4724074A48A6E6CF7EF8AF9"><enum>(A)</enum><text>the term <term>electronic communication</term> has the meaning given the term in section 2510 of title 18, United States Code;</text>
 </subparagraph><subparagraph id="id82964CA30AD04000B34FD3A86991C5D6"><enum>(B)</enum><text>the term <term>Internet</term> has the meaning given the term in section 231(e)(3) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/231">47 U.S.C. 231(e)(3)</external-xref>);</text>
 </subparagraph><subparagraph id="id4FB626D16AD84E6D8520BC575C339890"><enum>(C)</enum><text>the term <term>personally identifiable information</term> means data in a form that identifies a particular person; and</text> </subparagraph><subparagraph id="id04B7BC146B4D4800B2040150DDB3B011"><enum>(D)</enum><text>the term <term>wire communication</term> has the meaning given the term in section 2510 of title 18, United States Code.</text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block>
 </section><section changed="added" committee-id="SSFR00" id="idbc89516ddf4e4913a26100a9efab35f3" reported-display-style="italic"><enum>9.</enum><header>GAO report on cyber threats and data misuse</header><text display-inline="no-display-inline">Not later than 1 year after the date of the enactment of this Act, the Comptroller General of the United States shall submit a report and provide a briefing to the appropriate congressional committees that includes—</text>
 <paragraph id="idF0C46CA60B274A599F1BB8413D06C669"><enum>(1)</enum><text display-inline="yes-display-inline">a description of the primary threats to the personal information of United States citizens from international actors within the cyberspace domain;</text>
 </paragraph><paragraph id="idF32C473E0D0C4161BDBC3182E48897DC"><enum>(2)</enum><text display-inline="yes-display-inline">an assessment of the extent to which United States diplomatic processes and other efforts with foreign countries, including through multilateral fora, bilateral engagements, and negotiated cyberspace agreements, strengthen the protections of United States citizens’ personal information;</text>
 </paragraph><paragraph id="idB9F9C7F486F84785B684A7879C9C17C8"><enum>(3)</enum><text display-inline="yes-display-inline">an assessment of the Department of State’s report in response to Executive Order 13800 (82 Fed. Reg. 22391), which documents an engagement strategy for international cooperation in cybersecurity and the extent to which this strategy addresses protections of United States citizens’ personal information;</text>
 </paragraph><paragraph id="id5C50CFFF5D414392BFF58B9EB88DB179"><enum>(4)</enum><text display-inline="yes-display-inline">recommendations for United States policymakers on methods to properly address and strengthen the protections of United States citizens’ personal information from misuse by international actors; and</text>
 </paragraph><paragraph id="id8F9503F6A94246D8BE89F4ACE2D3DE6A"><enum>(5)</enum><text display-inline="yes-display-inline">any other matters deemed relevant by the Comptroller General.</text> </paragraph></section><section changed="added" commented="no" committee-id="SSFR00" display-inline="no-display-inline" id="id83AC8AA9544B4227959CEB7D9205A559" reported-display-style="italic" section-type="subsequent-section"><enum>10.</enum><header display-inline="yes-display-inline">Sense of Congress on cybersecurity sanctions against North Korea and cybersecurity legislation in Vietnam</header><text display-inline="no-display-inline">It is the sense of Congress that—</text>
 <paragraph commented="no" display-inline="no-display-inline" id="idE44D685FEFD148A389F9D0CA24BD66BF"><enum>(1)</enum><text display-inline="yes-display-inline">the President should designate all entities that knowingly engage in significant activities undermining cybersecurity through the use of computer networks or systems against foreign persons, governments, or other entities on behalf of the Government of North Korea, consistent with section 209(b) of the North Korea Sanctions and Policy Enhancement Act of 2016 (<external-xref legal-doc="usc" parsable-cite="usc/22/9229">22 U.S.C. 9229(b)</external-xref>);</text>
 </paragraph><paragraph commented="no" display-inline="no-display-inline" id="id32E1937393EC45AABA28DA3E071A6534"><enum>(2)</enum><text display-inline="yes-display-inline">the cybersecurity legislation approved by the National Assembly of Vietnam on June 12, 2018—</text> <subparagraph commented="no" display-inline="no-display-inline" id="idF0C60562EBCC406382562247A165A4C7"><enum>(A)</enum><text display-inline="yes-display-inline">may not be consistent with international trade standards; and</text>
 </subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id22E9C7AACE344CF8B5CDE51F6C149160"><enum>(B)</enum><text display-inline="yes-display-inline">may endanger the privacy of citizens of Vietnam; and</text>
 </subparagraph></paragraph><paragraph id="id4F4BAB0B6D89491AB85037C36825B88D"><enum>(3)</enum><text display-inline="yes-display-inline">the Government of Vietnam should—</text> <subparagraph id="idC5C04D1FED3444A7916B6BDF245E13D0"><enum>(A)</enum><text display-inline="yes-display-inline">delay the implementation of the legislation referred to in paragraph (2); and</text>
 </subparagraph><subparagraph id="idED27E99EB5FD4B7C953C1B83C9F07509"><enum>(B)</enum><text display-inline="yes-display-inline">work with the United States and other countries to ensure that such law meets all relevant international standards.</text></subparagraph></paragraph></section></legis-body><endorsement><action-date>June 28, 2018</action-date><action-desc>Reported with an amendment</action-desc></endorsement></bill>


