Collapse to view only § 1531. Apprehension and prosecution of international cyber criminals

§ 1531. Apprehension and prosecution of international cyber criminals
(a) International cyber criminal definedIn this section, the term “international cyber criminal” means an individual—
(1) who is believed to have committed a cybercrime or intellectual property crime against the interests of the United States or the citizens of the United States; and
(2) for whom—
(A) an arrest warrant has been issued by a judge in the United States; or
(B) an international wanted notice (commonly referred to as a “Red Notice”) has been circulated by Interpol.
(b) Consultations for noncooperationThe Secretary of State, or designee, shall consult with the appropriate government official of each country from which extradition is not likely due to the lack of an extradition treaty with the United States or other reasons, in which one or more international cyber criminals are physically present, to determine what actions the government of such country has taken—
(1) to apprehend and prosecute such criminals; and
(2) to prevent such criminals from carrying out cybercrimes or intellectual property crimes against the interests of the United States or its citizens.
(c) Annual report
(1) In generalThe Secretary of State shall submit to the appropriate congressional committees an annual report that includes—
(A) the number of international cyber criminals located in other countries, disaggregated by country, and indicating from which countries extradition is not likely due to the lack of an extradition treaty with the United States or other reasons;
(B) the nature and number of significant discussions by an official of the Department of State on ways to thwart or prosecute international cyber criminals with an official of another country, including the name of each such country; and
(C) for each international cyber criminal who was extradited to the United States during the most recently completed calendar year—
(i) his or her name;
(ii) the crimes for which he or she was charged;
(iii) his or her previous country of residence; and
(iv) the country from which he or she was extradited into the United States.
(2) Form
(3) Appropriate congressional committeesFor purposes of this subsection, the term “appropriate congressional committees” means—
(A) the Committee on Foreign Relations, the Committee on Appropriations, the Committee on Homeland Security and Governmental Affairs, the Committee on Banking, Housing, and Urban Affairs, the Select Committee on Intelligence, and the Committee on the Judiciary of the Senate; and
(B) the Committee on Foreign Affairs, the Committee on Appropriations, the Committee on Homeland Security, the Committee on Financial Services, the Permanent Select Committee on Intelligence, and the Committee on the Judiciary of the House of Representatives.
(Pub. L. 114–113, div. N, title IV, § 403, Dec. 18, 2015, 129 Stat. 2979.)
§ 1532. Enhancement of emergency services
(a) Collection of data
(b) Analysis of data
(c) Best practices
(1) In general
(2) Report
(d) Rule of constructionNothing in this section shall be construed to—
(1) require a State to report data under subsection (a); or
(2) require a non-Federal entity (as defined in section 1501 of this title) to—
(A) adopt a recommended measure developed under subsection (b); or
(B) follow the result of the activities carried out under subsection (c), including any methods developed under such subsection.
(Pub. L. 114–113, div. N, title IV, § 404, Dec. 18, 2015, 129 Stat. 2980; Pub. L. 115–278, § 2(h)(1)(H), Nov. 16, 2018, 132 Stat. 4183.)
§ 1533. Improving cybersecurity in the health care industry
(a) DefinitionsIn this section:
(1) Appropriate congressional committeesThe term “appropriate congressional committees” means—
(A) the Committee on Health, Education, Labor, and Pensions, the Committee on Homeland Security and Governmental Affairs, and the Select Committee on Intelligence of the Senate; and
(B) the Committee on Energy and Commerce, the Committee on Homeland Security, and the Permanent Select Committee on Intelligence of the House of Representatives.
(2) Business associate
(3) Covered entity
(4) Cybersecurity threat; cyber threat indicator; defensive measure; Federal entity; non-Federal entity; private entity
(5) Health care clearinghouse; health care provider; health plan
(6) Health care industry stakeholderThe term “health care industry stakeholder” means any—
(A) health plan, health care clearinghouse, or health care provider;
(B) advocate for patients or consumers;
(C) pharmacist;
(D) developer or vendor of health information technology;
(E) laboratory;
(F) pharmaceutical or medical device manufacturer; or
(G) additional stakeholder the Secretary determines necessary for purposes of subsection (b)(1), (c)(1), (c)(3), or (d)(1).
(7) Secretary
(b) Report
(1) In general
(2) Contents of reportWith respect to the internal response of the Department of Health and Human Services to emerging cybersecurity threats, the report under paragraph (1) shall include—
(A) a clear statement of the official within the Department of Health and Human Services to be responsible for leading and coordinating efforts of the Department regarding cybersecurity threats in the health care industry; and
(B) a plan from each relevant operating division and subdivision of the Department of Health and Human Services on how such division or subdivision will address cybersecurity threats in the health care industry, including a clear delineation of how each such division or subdivision will divide responsibility among the personnel of such division or subdivision and communicate with other such divisions and subdivisions regarding efforts to address such threats.
(c) Health care industry cybersecurity task force
(1) In generalNot later than 90 days after December 18, 2015, the Secretary, in consultation with the Director of the National Institute of Standards and Technology and the Secretary of Homeland Security, shall convene health care industry stakeholders, cybersecurity experts, and any Federal agencies or entities the Secretary determines appropriate to establish a task force to—
(A) analyze how industries, other than the health care industry, have implemented strategies and safeguards for addressing cybersecurity threats within their respective industries;
(B) analyze challenges and barriers private entities (excluding any State, tribal, or local government) in the health care industry face securing themselves against cyber attacks;
(C) review challenges that covered entities and business associates face in securing networked medical devices and other software or systems that connect to an electronic health record;
(D) provide the Secretary with information to disseminate to health care industry stakeholders of all sizes for purposes of improving their preparedness for, and response to, cybersecurity threats affecting the health care industry;
(E) establish a plan for implementing subchapter I of this chapter, so that the Federal Government and health care industry stakeholders may in real time, share actionable cyber threat indicators and defensive measures; and
(F) report to the appropriate congressional committees on the findings and recommendations of the task force regarding carrying out subparagraphs (A) through (E).
(2) Termination
(3) Dissemination
(d) Aligning health care industry security approaches
(1) In generalThe Secretary shall establish, through a collaborative process with the Secretary of Homeland Security, health care industry stakeholders, the Director of the National Institute of Standards and Technology, and any Federal entity or non-Federal entity the Secretary determines appropriate, a common set of voluntary, consensus-based, and industry-led guidelines, best practices, methodologies, procedures, and processes that—
(A) serve as a resource for cost-effectively reducing cybersecurity risks for a range of health care organizations;
(B) support voluntary adoption and implementation efforts to improve safeguards to address cybersecurity threats;
(C) are consistent with—
(i) the standards, guidelines, best practices, methodologies, procedures, and processes developed under section 272(c)(15) of title 15;
(ii) the security and privacy regulations promulgated under section 264(c) of the Health Insurance Portability and Accountability Act of 1996 (42 U.S.C. 1320d–2 note); and
(iii) the provisions of the Health Information Technology for Economic and Clinical Health Act (title XIII of division A, and title IV of division B, of Public Law 111–5), and the amendments made by such Act; and
(D) are updated on a regular basis and applicable to a range of health care organizations.
(2) LimitationNothing in this subsection shall be interpreted as granting the Secretary authority to—
(A) provide for audits to ensure that health care organizations are in compliance with this subsection; or
(B) mandate, direct, or condition the award of any Federal grant, contract, or purchase, on compliance with this subsection.
(3) No liability for nonparticipation
(e) Incorporating ongoing activities
(f) Rule of construction
(Pub. L. 114–113, div. N, title IV, § 405, Dec. 18, 2015, 129 Stat. 2981.)
§ 1534. Cybercrime
Subject to the availability of appropriations, and in accordance with the comparable level of the General Schedule, the Attorney General and the Secretary of Homeland Security shall provide incentive pay, in an amount that is not more than 25 percent of the basic pay of the individual, to an individual appointed to a position in the Department of Justice (including the Federal Bureau of Investigation) or the Department of Homeland Security (including positions in Homeland Security Investigations), respectively, requiring significant cyber skills, including to aid in—
(1) the protection of trafficking victims;
(2) the prevention of trafficking in persons; or
(3) the prosecution of technology-facilitated crimes against children by buyers or traffickers in persons.
(Pub. L. 117–347, title IV, § 401, Jan. 5, 2023, 136 Stat. 6207.)