1 | 1 | | fI |
---|
2 | 2 | | 118THCONGRESS |
---|
3 | 3 | | 2 |
---|
4 | 4 | | DSESSION H. R. 7447 |
---|
5 | 5 | | To amend the Help America Vote Act of 2002 to require the Election |
---|
6 | 6 | | Assistance Commission to provide for the conduct of penetration testing |
---|
7 | 7 | | as part of the testing and certification of voting systems and to provide |
---|
8 | 8 | | for the establishment of an Independent Security Testing and Coordi- |
---|
9 | 9 | | nated Vulnerability Disclosure Pilot Program for Election Systems. |
---|
10 | 10 | | IN THE HOUSE OF REPRESENTATIVES |
---|
11 | 11 | | FEBRUARY23, 2024 |
---|
12 | 12 | | Ms. S |
---|
13 | 13 | | PANBERGER(for herself and Mr. VALADAO) introduced the following bill; |
---|
14 | 14 | | which was referred to the Committee on House Administration, and in |
---|
15 | 15 | | addition to the Committee on Science, Space, and Technology, for a pe- |
---|
16 | 16 | | riod to be subsequently determined by the Speaker, in each case for con- |
---|
17 | 17 | | sideration of such provisions as fall within the jurisdiction of the com- |
---|
18 | 18 | | mittee concerned |
---|
19 | 19 | | A BILL |
---|
20 | 20 | | To amend the Help America Vote Act of 2002 to require |
---|
21 | 21 | | the Election Assistance Commission to provide for the |
---|
22 | 22 | | conduct of penetration testing as part of the testing |
---|
23 | 23 | | and certification of voting systems and to provide for |
---|
24 | 24 | | the establishment of an Independent Security Testing |
---|
25 | 25 | | and Coordinated Vulnerability Disclosure Pilot Program |
---|
26 | 26 | | for Election Systems. |
---|
27 | 27 | | Be it enacted by the Senate and House of Representa-1 |
---|
28 | 28 | | tives of the United States of America in Congress assembled, 2 |
---|
29 | 29 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
30 | 30 | | ssavage on LAPJG3WLY3PROD with BILLS 2 |
---|
31 | 31 | | •HR 7447 IH |
---|
32 | 32 | | SECTION 1. SHORT TITLE. 1 |
---|
33 | 33 | | This Act may be cited as the ‘‘Strengthening Election 2 |
---|
34 | 34 | | Cybersecurity to Uphold Respect for Elections through 3 |
---|
35 | 35 | | Independent Testing Act’’ or the ‘‘SECURE IT Act’’. 4 |
---|
36 | 36 | | SEC. 2. REQUIRING PENETRATION TESTING AS PART OF 5 |
---|
37 | 37 | | THE TESTING AND CERTIFICATION OF VOT-6 |
---|
38 | 38 | | ING SYSTEMS. 7 |
---|
39 | 39 | | Section 231 of the Help America Vote Act of 2002 8 |
---|
40 | 40 | | (52 U.S.C. 20971) is amended by adding at the end the 9 |
---|
41 | 41 | | following new subsection: 10 |
---|
42 | 42 | | ‘‘(e) R |
---|
43 | 43 | | EQUIREDPENETRATIONTESTING.— 11 |
---|
44 | 44 | | ‘‘(1) I |
---|
45 | 45 | | N GENERAL.—Not later than 180 days 12 |
---|
46 | 46 | | after the date of the enactment of this subsection, 13 |
---|
47 | 47 | | the Commission shall provide for the conduct of pen-14 |
---|
48 | 48 | | etration testing as part of the testing, certification, 15 |
---|
49 | 49 | | decertification, and recertification of voting system 16 |
---|
50 | 50 | | hardware and software by accredited laboratories 17 |
---|
51 | 51 | | under this section. 18 |
---|
52 | 52 | | ‘‘(2) A |
---|
53 | 53 | | CCREDITATION.—The Director of the 19 |
---|
54 | 54 | | National Institute of Standards and Technology 20 |
---|
55 | 55 | | shall recommend to the Commission entities the Di-21 |
---|
56 | 56 | | rector proposes be accredited to carry out penetra-22 |
---|
57 | 57 | | tion testing under this subsection and certify compli-23 |
---|
58 | 58 | | ance with the penetration testing-related guidelines 24 |
---|
59 | 59 | | required by this subsection. The Commission shall 25 |
---|
60 | 60 | | vote on the accreditation of any entity recommended. 26 |
---|
61 | 61 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
62 | 62 | | ssavage on LAPJG3WLY3PROD with BILLS 3 |
---|
63 | 63 | | •HR 7447 IH |
---|
64 | 64 | | The requirements for such accreditation shall be a 1 |
---|
65 | 65 | | subset of the requirements for accreditation of lab-2 |
---|
66 | 66 | | oratories under subsection (b) and shall only be 3 |
---|
67 | 67 | | based on consideration of an entity’s competence to 4 |
---|
68 | 68 | | conduct penetration testing under this subsection.’’. 5 |
---|
69 | 69 | | SEC. 3. INDEPENDENT SECURITY TESTING AND COORDI-6 |
---|
70 | 70 | | NATED CYBERSECURITY VULNERABILITY 7 |
---|
71 | 71 | | DISCLOSURE PROGRAM FOR ELECTION SYS-8 |
---|
72 | 72 | | TEMS. 9 |
---|
73 | 73 | | (a) I |
---|
74 | 74 | | NGENERAL.—Subtitle D of title II of the Help 10 |
---|
75 | 75 | | America Vote Act of 2002 (42 U.S.C. 15401 et seq.) is 11 |
---|
76 | 76 | | amended by adding at the end the following new part: 12 |
---|
77 | 77 | | ‘‘PART 7—INDEPENDENT SECURITY TESTING AND 13 |
---|
78 | 78 | | COORDINATED CYBERSECURITY VULNER-14 |
---|
79 | 79 | | ABILITY DISCLOSURE PILOT PROGRAM FOR 15 |
---|
80 | 80 | | ELECTION SYSTEMS 16 |
---|
81 | 81 | | ‘‘SEC. 297. INDEPENDENT SECURITY TESTING AND COORDI-17 |
---|
82 | 82 | | NATED CYBERSECURITY VULNERABILITY 18 |
---|
83 | 83 | | DISCLOSURE PILOT PROGRAM FOR ELEC-19 |
---|
84 | 84 | | TION SYSTEMS. 20 |
---|
85 | 85 | | ‘‘(a) E |
---|
86 | 86 | | STABLISHMENT.—The Commission, in con-21 |
---|
87 | 87 | | sultation with the Secretary, shall establish an Inde-22 |
---|
88 | 88 | | pendent Security Testing and Coordinated Vulnerability 23 |
---|
89 | 89 | | Disclosure Pilot Program for Election Systems (VDP–E) 24 |
---|
90 | 90 | | (in this section referred to as the ‘program’) in order to 25 |
---|
91 | 91 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
92 | 92 | | ssavage on LAPJG3WLY3PROD with BILLS 4 |
---|
93 | 93 | | •HR 7447 IH |
---|
94 | 94 | | test for and disclose cybersecurity vulnerabilities in elec-1 |
---|
95 | 95 | | tion systems. 2 |
---|
96 | 96 | | ‘‘(b) D |
---|
97 | 97 | | URATION.—The program shall be conducted 3 |
---|
98 | 98 | | for a period of 5 years. 4 |
---|
99 | 99 | | ‘‘(c) R |
---|
100 | 100 | | EQUIREMENTS.—In carrying out the program, 5 |
---|
101 | 101 | | the Commission, in consultation with the Secretary, 6 |
---|
102 | 102 | | shall— 7 |
---|
103 | 103 | | ‘‘(1) establish a mechanism by which an elec-8 |
---|
104 | 104 | | tion systems vendor may make their election system 9 |
---|
105 | 105 | | (including voting machines and source code) avail-10 |
---|
106 | 106 | | able to cybersecurity researchers participating in the 11 |
---|
107 | 107 | | program; 12 |
---|
108 | 108 | | ‘‘(2) provide for the vetting of cybersecurity re-13 |
---|
109 | 109 | | searchers prior to their participation in the program, 14 |
---|
110 | 110 | | including the conduct of background checks; 15 |
---|
111 | 111 | | ‘‘(3) establish terms of participation that— 16 |
---|
112 | 112 | | ‘‘(A) describe the scope of testing per-17 |
---|
113 | 113 | | mitted under the program; 18 |
---|
114 | 114 | | ‘‘(B) require researchers to— 19 |
---|
115 | 115 | | ‘‘(i) notify the vendor, the Commis-20 |
---|
116 | 116 | | sion, and the Secretary of any cybersecu-21 |
---|
117 | 117 | | rity vulnerability they identify with respect 22 |
---|
118 | 118 | | to an election system; and 23 |
---|
119 | 119 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
120 | 120 | | ssavage on LAPJG3WLY3PROD with BILLS 5 |
---|
121 | 121 | | •HR 7447 IH |
---|
122 | 122 | | ‘‘(ii) otherwise keep such vulnerability 1 |
---|
123 | 123 | | confidential for 180 days after such notifi-2 |
---|
124 | 124 | | cation; 3 |
---|
125 | 125 | | ‘‘(C) require the good faith participation of 4 |
---|
126 | 126 | | all participants in the program; and 5 |
---|
127 | 127 | | ‘‘(D) require an election system vendor, 6 |
---|
128 | 128 | | after receiving notification of a critical or high 7 |
---|
129 | 129 | | vulnerability (as defined by the National Insti-8 |
---|
130 | 130 | | tute of Standards and Technology) in an elec-9 |
---|
131 | 131 | | tion system of the vendor, to— 10 |
---|
132 | 132 | | ‘‘(i) send a patch or propound some 11 |
---|
133 | 133 | | other fix or mitigation for such vulner-12 |
---|
134 | 134 | | ability to the appropriate State and local 13 |
---|
135 | 135 | | election officials, in consultation with the 14 |
---|
136 | 136 | | researcher who discovered it; and 15 |
---|
137 | 137 | | ‘‘(ii) notify the Commission and the 16 |
---|
138 | 138 | | Secretary that such patch has been sent to 17 |
---|
139 | 139 | | such officials; 18 |
---|
140 | 140 | | ‘‘(4) in the case where a patch or fix to address 19 |
---|
141 | 141 | | a vulnerability disclosed under paragraph (3)(B)(i) 20 |
---|
142 | 142 | | is intended to be applied to a system certified by the 21 |
---|
143 | 143 | | Commission, provide— 22 |
---|
144 | 144 | | ‘‘(A) for the expedited review of such patch 23 |
---|
145 | 145 | | or fix within 90 days after receipt by the Com-24 |
---|
146 | 146 | | mission; and 25 |
---|
147 | 147 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
148 | 148 | | ssavage on LAPJG3WLY3PROD with BILLS 6 |
---|
149 | 149 | | •HR 7447 IH |
---|
150 | 150 | | ‘‘(B) if such review is not completed by the 1 |
---|
151 | 151 | | last day of such 90-day period, that such patch 2 |
---|
152 | 152 | | or fix shall be deemed to be certified by the 3 |
---|
153 | 153 | | Commission; and 4 |
---|
154 | 154 | | ‘‘(5) 180 days after the disclosure of a vulner-5 |
---|
155 | 155 | | ability under paragraph (3)(B)(i), notify the Direc-6 |
---|
156 | 156 | | tor of the Cybersecurity and Infrastructure Security 7 |
---|
157 | 157 | | Agency of the vulnerability for inclusion in the data-8 |
---|
158 | 158 | | base of Common Vulnerabilities and Exposures. 9 |
---|
159 | 159 | | ‘‘(d) V |
---|
160 | 160 | | OLUNTARYPARTICIPATION; SAFEHARBOR.— 10 |
---|
161 | 161 | | ‘‘(1) V |
---|
162 | 162 | | OLUNTARY PARTICIPATION .—Participa-11 |
---|
163 | 163 | | tion in the program shall be voluntary for election 12 |
---|
164 | 164 | | systems vendors and researchers. 13 |
---|
165 | 165 | | ‘‘(2) S |
---|
166 | 166 | | AFE HARBOR .—Research conducted 14 |
---|
167 | 167 | | under the program, and any subsequent publication 15 |
---|
168 | 168 | | of such research, shall be treated as follows: 16 |
---|
169 | 169 | | ‘‘(A) The research and publication shall be 17 |
---|
170 | 170 | | treated as authorized in accordance with section 18 |
---|
171 | 171 | | 1030 of title 18, United States Code (commonly 19 |
---|
172 | 172 | | known as the ‘Computer Fraud and Abuse 20 |
---|
173 | 173 | | Act’), (and similar State laws), and the election 21 |
---|
174 | 174 | | system vendor will not initiate or support legal 22 |
---|
175 | 175 | | action against the researcher for accidental, 23 |
---|
176 | 176 | | good faith violations of the program. 24 |
---|
177 | 177 | | VerDate Sep 11 2014 01:33 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
178 | 178 | | ssavage on LAPJG3WLY3PROD with BILLS 7 |
---|
179 | 179 | | •HR 7447 IH |
---|
180 | 180 | | ‘‘(B) The research and publication shall be 1 |
---|
181 | 181 | | exempt from the anti-circumvention rule of sec-2 |
---|
182 | 182 | | tion 1201 of title 17, United States Code (com-3 |
---|
183 | 183 | | monly known as the ‘Digital Millennium Copy-4 |
---|
184 | 184 | | right Act’), and the election system vendor will 5 |
---|
185 | 185 | | not bring a claim against a researcher for cir-6 |
---|
186 | 186 | | cumvention of technology controls. 7 |
---|
187 | 187 | | ‘‘(3) R |
---|
188 | 188 | | ULE OF CONSTRUCTION .—Nothing in 8 |
---|
189 | 189 | | this subsection may be construed to limit or other-9 |
---|
190 | 190 | | wise affect any exception to the general prohibition 10 |
---|
191 | 191 | | against the circumvention of technological measures 11 |
---|
192 | 192 | | under subparagraph (A) of section 1201(a)(1) of 12 |
---|
193 | 193 | | title 17, United States Code, including with respect 13 |
---|
194 | 194 | | to any use that is excepted from that general prohi-14 |
---|
195 | 195 | | bition by the Librarian of Congress under subpara-15 |
---|
196 | 196 | | graphs (B) through (D) of such section 1201(a)(1). 16 |
---|
197 | 197 | | ‘‘(4) E |
---|
198 | 198 | | XEMPT FROM DISCLOSURE .—Cybersecu-17 |
---|
199 | 199 | | rity vulnerabilities discovered under the program 18 |
---|
200 | 200 | | shall be exempt from section 552 of title 5, United 19 |
---|
201 | 201 | | States Code (commonly referred to as the Freedom 20 |
---|
202 | 202 | | of Information Act). 21 |
---|
203 | 203 | | ‘‘(e) D |
---|
204 | 204 | | EFINITIONS.—In this section: 22 |
---|
205 | 205 | | ‘‘(1) C |
---|
206 | 206 | | YBERSECURITY VULNERABILITY .—The 23 |
---|
207 | 207 | | term ‘cybersecurity vulnerability’ means, with re-24 |
---|
208 | 208 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
209 | 209 | | ssavage on LAPJG3WLY3PROD with BILLS 8 |
---|
210 | 210 | | •HR 7447 IH |
---|
211 | 211 | | spect to an election system, any security vulner-1 |
---|
212 | 212 | | ability that affects the election system. 2 |
---|
213 | 213 | | ‘‘(2) E |
---|
214 | 214 | | LECTION INFRASTRUCTURE .—The term 3 |
---|
215 | 215 | | ‘election infrastructure’ means— 4 |
---|
216 | 216 | | ‘‘(A) storage facilities, polling places, and 5 |
---|
217 | 217 | | centralized vote tabulation locations used to 6 |
---|
218 | 218 | | support the administration of elections for pub-7 |
---|
219 | 219 | | lic office; and 8 |
---|
220 | 220 | | ‘‘(B) related information and communica-9 |
---|
221 | 221 | | tions technology, including— 10 |
---|
222 | 222 | | ‘‘(i) voter registration databases; 11 |
---|
223 | 223 | | ‘‘(ii) election management systems; 12 |
---|
224 | 224 | | ‘‘(iii) voting machines; 13 |
---|
225 | 225 | | ‘‘(iv) electronic mail and other com-14 |
---|
226 | 226 | | munications systems (including electronic 15 |
---|
227 | 227 | | mail and other systems of vendors who 16 |
---|
228 | 228 | | have entered into contracts with election 17 |
---|
229 | 229 | | agencies to support the administration of 18 |
---|
230 | 230 | | elections, manage the election process, and 19 |
---|
231 | 231 | | report and display election results); and 20 |
---|
232 | 232 | | ‘‘(v) other systems used to manage 21 |
---|
233 | 233 | | the election process and to report and dis-22 |
---|
234 | 234 | | play election results on behalf of an elec-23 |
---|
235 | 235 | | tion agency. 24 |
---|
236 | 236 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:\BILLS\H7447.IH H7447 |
---|
237 | 237 | | ssavage on LAPJG3WLY3PROD with BILLS 9 |
---|
238 | 238 | | •HR 7447 IH |
---|
239 | 239 | | ‘‘(3) ELECTION SYSTEM.—The term ‘election 1 |
---|
240 | 240 | | system’ means any information system that is part 2 |
---|
241 | 241 | | of an election infrastructure, including any related 3 |
---|
242 | 242 | | information and communications technology de-4 |
---|
243 | 243 | | scribed in paragraph (2)(B). 5 |
---|
244 | 244 | | ‘‘(4) E |
---|
245 | 245 | | LECTION SYSTEM VENDOR .—The term 6 |
---|
246 | 246 | | ‘election system vendor’ means any person providing, 7 |
---|
247 | 247 | | supporting, or maintaining an election system on be-8 |
---|
248 | 248 | | half of a State or local election official. 9 |
---|
249 | 249 | | ‘‘(5) I |
---|
250 | 250 | | NFORMATION SYSTEM .—The term ‘infor-10 |
---|
251 | 251 | | mation system’ has the meaning given the term in 11 |
---|
252 | 252 | | section 3502 of title 44, United States Code. 12 |
---|
253 | 253 | | ‘‘(6) S |
---|
254 | 254 | | ECRETARY.—The term ‘Secretary’ means 13 |
---|
255 | 255 | | the Secretary of Homeland Security. 14 |
---|
256 | 256 | | ‘‘(7) S |
---|
257 | 257 | | ECURITY VULNERABILITY .—The term 15 |
---|
258 | 258 | | ‘security vulnerability’ has the meaning given the 16 |
---|
259 | 259 | | term in section 102 of the Cybersecurity Information 17 |
---|
260 | 260 | | Sharing Act of 2015 (6 U.S.C. 1501).’’. 18 |
---|
261 | 261 | | (b) C |
---|
262 | 262 | | LERICALAMENDMENT.—The table of contents 19 |
---|
263 | 263 | | of such Act is amended by adding at the end of the items 20 |
---|
264 | 264 | | relating to subtitle D of title II the following: 21 |
---|
265 | 265 | | ‘‘PART 7—INDEPENDENT SECURITYTESTING ANDCOORDINATEDCYBERSE- |
---|
266 | 266 | | CURITYVULNERABILITYDISCLOSUREPROGRAM FORELECTIONSYSTEMS |
---|
267 | 267 | | ‘‘Sec. 297. Independent security testing and coordinated cybersecurity vulner- |
---|
268 | 268 | | ability disclosure program for election systems.’’. |
---|
269 | 269 | | Æ |
---|
270 | 270 | | VerDate Sep 11 2014 01:28 Feb 29, 2024 Jkt 049200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6301 E:\BILLS\H7447.IH H7447 |
---|
271 | 271 | | ssavage on LAPJG3WLY3PROD with BILLS |
---|