<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Reported-in-Senate" dms-id="A1" public-private="public"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>115 S1281 RS: Hack DHS Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2017-05-25</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><calendar>Calendar No. 335</calendar><congress>115th CONGRESS</congress><session>2d Session</session><legis-num>S. 1281</legis-num><associated-doc role="report">[Report No. 115–209]</associated-doc><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20170525">May 25, 2017</action-date><action-desc><sponsor name-id="S388">Ms. Hassan</sponsor> (for herself, <cosponsor name-id="S349">Mr. Portman</cosponsor>, <cosponsor name-id="S312">Mrs. McCaskill</cosponsor>, <cosponsor name-id="S387">Ms. Harris</cosponsor>, and <cosponsor name-id="S377">Mr. Gardner</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name added-display-style="italic" committee-id="SSGA00" deleted-display-style="strikethrough">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><action stage="Reported-in-Senate"><action-date>February 26, 2018</action-date><action-desc>Reported by <sponsor name-id="S345">Mr. Johnson</sponsor>, with an amendment</action-desc><action-instruction>Strike out all after the enacting clause and insert the part printed in italic</action-instruction></action><legis-type>A BILL</legis-type><official-title>To establish a bug bounty pilot program within the Department of Homeland Security, and for other
			 purposes.</official-title></form>
	<legis-body>
 <section changed="deleted" committee-id="SSGA00" id="S1" reported-display-style="strikethrough" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Hack the Department of Homeland Security Act of 2017</short-title></quote> or the <quote>Hack DHS Act</quote>.</text>
		</section><section changed="deleted" committee-id="SSGA00" id="idEA27F335A84F42A08642EDB228787548" reported-display-style="strikethrough"><enum>2.</enum><header>Department of Homeland Security Bug Bounty Pilot Program</header>
 <subsection id="id115BBE328C614293A6E8FF7DA2861E85"><enum>(a)</enum><header>Definitions</header><text>In this section:</text> <paragraph id="id8B27CB149BB44E90B03B382218C653B6"><enum>(1)</enum><header>Bug bounty program</header><text>The term <term>bug bounty program</term> means a program under which an approved computer security specialist or security researcher is temporarily authorized to identify and report vulnerabilities within the information system of the Department in exchange for cash payment.</text>
 </paragraph><paragraph id="idC99386F4F25B4B60A8DFD3E73B331B55"><enum>(2)</enum><header>Department</header><text>The term <term>Department</term> means the Department of Homeland Security.</text> </paragraph><paragraph commented="no" id="id2FB14EBC542942CBBC3C35EDF44F42EA"><enum>(3)</enum><header>Information system</header><text>The term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text>
 </paragraph><paragraph commented="no" id="id43588700CC1C4EFA8E07DA08B51E7546"><enum>(4)</enum><header>Pilot program</header><text>The term <term>pilot program</term> means the bug bounty pilot program required to be established under subsection (b)(1).</text> </paragraph><paragraph id="id0E083A44AB5F40D8AA57C895D39D5B39"><enum>(5)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Homeland Security.</text>
				</paragraph></subsection><subsection commented="no" id="idB5433D0F0BE74733960FE0F8B71AF5F3"><enum>(b)</enum><header>Establishment of pilot program</header>
 <paragraph commented="no" id="id16D7D0DEBB824F89BCD92CCD20554519"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this Act, the Secretary shall establish a bug bounty pilot program to minimize vulnerabilities to the information systems of the Department.</text>
 </paragraph><paragraph commented="no" id="id07B638CABC5A4B698046C94422AF5C26"><enum>(2)</enum><header>Requirements</header><text>In establishing the pilot program, the Secretary shall—</text> <subparagraph id="id36995c6677604fd0b3392887af319b90"><enum>(A)</enum><text>provide monetary compensation for reports of previously unidentified security vulnerabilities within the websites, applications, and other information systems of the Department that are accessible to the public;</text>
 </subparagraph><subparagraph id="idd11fa0578ae14c8f857b3cde9c64b463"><enum>(B)</enum><text>develop an expeditious process by which computer security researchers can register with the Department, submit to a background check as determined by the Department, and receive a determination as to approval for participation in the pilot program;</text>
 </subparagraph><subparagraph id="idc8d9eec6d3ae4764a5a3d5aa8bd69c6e"><enum>(C)</enum><text>designate mission-critical operations within the Department that should be excluded from the pilot program;</text>
 </subparagraph><subparagraph commented="no" id="id01b06c12739a4883bd78d03324cb64fb"><enum>(D)</enum><text>consult with the Attorney General on how to ensure that computer security specialists and security researchers who participate in the pilot program are protected from prosecution under section 1030 of title 18, United States Code, and similar provisions of law for specific activities authorized under the pilot program;</text>
 </subparagraph><subparagraph id="idd81d9452b2534434917dbb5455c3b55a"><enum>(E)</enum><text>consult with the relevant offices at the Department of Defense that were responsible for launching the 2016 <quote>Hack the Pentagon</quote> pilot program and subsequent Department of Defense bug bounty programs;</text>
 </subparagraph><subparagraph id="idd558953f14b24deba4b606814bc4f680"><enum>(F)</enum><text>award competitive contracts as necessary to manage the pilot program and for executing the remediation of vulnerabilities identified as a consequence of the pilot program; and</text>
 </subparagraph><subparagraph id="id8bb38eb43e01401484527bf0517d3049"><enum>(G)</enum><text>engage interested persons, including commercial sector representatives, about the structure of the pilot program as constructive and to the extent practicable.</text>
 </subparagraph></paragraph></subsection><subsection id="id1520FD653B8949CABB61B685C5F9D07C"><enum>(c)</enum><header>Report</header><text>Not later than 90 days after the date on which the pilot program is completed, the Secretary of Homeland Security shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the pilot program, which shall include—</text>
 <paragraph id="id9BDC86EB399949628F509DEE0B6FC75E"><enum>(1)</enum><text>the number of computer security researchers involved in the pilot program, broken down by the number of computer security researchers who—</text>
 <subparagraph id="id7CD06456EBD547ADABC8631F73BFE96C"><enum>(A)</enum><text>registered;</text> </subparagraph><subparagraph id="idF3825DCA2EA04B1DBFE69E28D122B2B4"><enum>(B)</enum><text>were approved;</text>
 </subparagraph><subparagraph id="id1FB978A9F14F41E3961D4E2DAD316D33"><enum>(C)</enum><text>submitted security vulnerabilities; and</text>
 </subparagraph><subparagraph id="id67874DDA0863447C886CF1631CD7706F"><enum>(D)</enum><text>received monetary compensation;</text> </subparagraph></paragraph><paragraph id="idb97c010a4f514fed8b94063b2ce2f94a"><enum>(2)</enum><text>the number and severity of previously unidentified vulnerabilities reported as part of the pilot program;</text>
 </paragraph><paragraph id="idfe17951ce4a6439a9aee5ca306fd9b7a"><enum>(3)</enum><text>the number of previously unidentified security vulnerabilities remediated as a result of the pilot program;</text>
 </paragraph><paragraph id="id6ce7ec13408743e38ef16427b05913d8"><enum>(4)</enum><text>the average length of time between the reporting of security vulnerabilities and remediation of the vulnerabilities;</text>
 </paragraph><paragraph id="id9E30D30FBA174B1EB5262080BB453C2B"><enum>(5)</enum><text>the average amount of monetary compensation paid per unique vulnerability submitted under the pilot program and the total amount of monetary compensation paid to computer security researchers under the pilot program; and</text>
 </paragraph><paragraph id="id68097a94b0ff42b69d4557c3a7491a0f"><enum>(6)</enum><text>the lessons learned from the pilot program.</text> </paragraph></subsection><subsection id="id39A9EA62F55F428A8673ADA13F94B4CE"><enum>(d)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated to the Department $250,000 for fiscal year 2018 to carry out this Act.</text></subsection></section></legis-body>
	<legis-body display-enacting-clause="no-display-enacting-clause">
 <section changed="added" committee-id="SSGA00" id="id31e93ab9b20d436ab9e0a235c06e095c" reported-display-style="italic" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Hack the Department of Homeland Security Act of 2017</short-title></quote> or the <quote><short-title>Hack DHS Act</short-title></quote>.</text> </section><section changed="added" committee-id="SSGA00" id="id5f2ebbb14f1b42e187b0ca64e4c80196" reported-display-style="italic"><enum>2.</enum><header>Department of Homeland Security bug bounty pilot program</header> <subsection id="id776118dc9c5a4293bfdb5b1259b0fe8a"><enum>(a)</enum><header>Definitions</header><text>In this section:</text>
 <paragraph id="id1de0c21906314320bec1791870aa87e9"><enum>(1)</enum><header>Bug bounty program</header><text>The term <term>bug bounty program</term> means a program under which an approved individual, organization, or company is temporarily authorized to identify and report vulnerabilities of Internet-facing information technology of the Department in exchange for compensation.</text>
 </paragraph><paragraph id="id2e94f0f73dd74e119586420a7d6e1146"><enum>(2)</enum><header>Department</header><text>The term <term>Department</term> means the Department of Homeland Security.</text> </paragraph><paragraph id="id5767e000b49d4374adedf40ddbb6b0dc"><enum>(3)</enum><header>Information technology</header><text>The term <term>information technology</term> has the meaning given the term in section 11101 of title 40, United States Code.</text>
 </paragraph><paragraph id="id3e9abad12a6441018de2d4e864823a79"><enum>(4)</enum><header>Pilot program</header><text>The term <term>pilot program</term> means the bug bounty pilot program required to be established under subsection (b)(1).</text> </paragraph><paragraph id="ide07508f18fec4e0582b16f4baded0292"><enum>(5)</enum><header>Secretary</header><text>The term <term>Secretary</term> means the Secretary of Homeland Security.</text>
				</paragraph></subsection><subsection id="id1b08cc448cc943cd896a30e5eef5bf58"><enum>(b)</enum><header>Establishment of pilot program</header>
 <paragraph id="idea5925151c1b4719942e10f3e39fd87d"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this Act, the Secretary shall establish, within the Office of the Chief Information Officer, a bug bounty pilot program to minimize vulnerabilities of Internet-facing information technology of the Department.</text>
 </paragraph><paragraph id="id75700562f6584fb1a72ce5400c2383ae"><enum>(2)</enum><header>Requirements</header><text>In establishing the pilot program, the Secretary shall—</text> <subparagraph id="idde035180a14f4de0aedbdf5c0d63e0c5"><enum>(A)</enum><text>provide compensation for reports of previously unidentified security vulnerabilities within the websites, applications, and other Internet-facing information technology of the Department that are accessible to the public;</text>
 </subparagraph><subparagraph id="ida085343a9caf46dc9bdba78ff00fa328"><enum>(B)</enum><text>award a competitive contract to an entity, as necessary, to manage the pilot program and for executing the remediation of vulnerabilities identified as a consequence of the pilot program;</text>
 </subparagraph><subparagraph id="idbe7a4bc101b243fa8842ccc4906961d6"><enum>(C)</enum><text>designate mission-critical operations within the Department that should be excluded from the pilot program;</text>
 </subparagraph><subparagraph id="id93b0bf231915415ab5b6d706e0255ff2"><enum>(D)</enum><text>consult with the Attorney General on how to ensure that approved individuals, organizations, or companies that comply with the requirements of the pilot program are protected from prosecution under section 1030 of title 18, United States Code, and similar provisions of law for specific activities authorized under the pilot program;</text>
 </subparagraph><subparagraph id="id4c5a71289ff7469eb85d17d82e454e43"><enum>(E)</enum><text>consult with the relevant offices at the Department of Defense that were responsible for launching the 2016 <quote>Hack the Pentagon</quote> pilot program and subsequent Department of Defense bug bounty programs;</text>
 </subparagraph><subparagraph id="idecab89c6b7554b9aa6e5f4b6ff89ceb6"><enum>(F)</enum><text>develop an expeditious process by which an approved individual, organization, or company can register with the entity described in subparagraph (B), submit to a background check as determined by the Department, and receive a determination as to eligibility for participation in the pilot program; and</text>
 </subparagraph><subparagraph id="id5d29ca35d2dc49729a5fa619c00d188f"><enum>(G)</enum><text>engage qualified interested persons, including non-government sector representatives, about the structure of the pilot program as constructive and to the extent practicable.</text>
 </subparagraph></paragraph></subsection><subsection id="id861fc2cc81b4416392398aeb747cad74"><enum>(c)</enum><header>Report</header><text>Not later than 90 days after the date on which the pilot program is completed, the Secretary of Homeland Security shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the pilot program, which shall include—</text>
 <paragraph id="idf1551b10613340d9aedb09ae513399d1"><enum>(1)</enum><text>the number of approved individuals, organizations, or companies involved in the pilot program, broken down by the number of approved individuals, organizations, or companies that—</text>
 <subparagraph id="id19f4db1bd3f2471182f70c73917bc8f9"><enum>(A)</enum><text>registered;</text> </subparagraph><subparagraph id="id2e708c7b0f024358896670b763dc258e"><enum>(B)</enum><text>were approved;</text>
 </subparagraph><subparagraph id="id0f4ac27b915544ed9ad4f4c4d953c0d5"><enum>(C)</enum><text>submitted security vulnerabilities; and</text> </subparagraph><subparagraph id="id932571bc30dc48ab8d572b61056ab79a"><enum>(D)</enum><text>received compensation;</text>
 </subparagraph></paragraph><paragraph id="ide3098f8f2fef4626a77e2e3c12ee4b52"><enum>(2)</enum><text>the number and severity of vulnerabilities reported as part of the pilot program;</text> </paragraph><paragraph id="id2c49c49f42344f52a050cc261370957a"><enum>(3)</enum><text>the number of previously unidentified security vulnerabilities remediated as a result of the pilot program;</text>
 </paragraph><paragraph id="id4050f5ebac5a4265a7ecdaea37a9078a"><enum>(4)</enum><text>the current number of outstanding previously unidentified security vulnerabilities and Department remediation plans;</text>
 </paragraph><paragraph id="id54d2d7811f7b4fff8247107a531afc1b"><enum>(5)</enum><text>the average length of time between the reporting of security vulnerabilities and remediation of the vulnerabilities;</text>
 </paragraph><paragraph id="iddff15c19c87945ae89cfdd1c38cf9060"><enum>(6)</enum><text>the types of compensation provided under the pilot program; and</text> </paragraph><paragraph id="id6bbf0f19691e44018e45bb9e3f78029b"><enum>(7)</enum><text>the lessons learned from the pilot program.</text>
 </paragraph></subsection><subsection id="id7cf6dedc85ab418897a840e7065c9a7a"><enum>(d)</enum><header>Authorization of appropriations</header><text>There are authorized to be appropriated to the Department $250,000 for fiscal year 2018 to carry out this Act.</text></subsection></section></legis-body><endorsement><action-date>February 26, 2018</action-date><action-desc>Reported with an amendment</action-desc></endorsement></bill>


