119-hr5079

HR
✓ Complete Data

Widespread Information Management for the Welfare of Infrastructure and Government Act

Login to track bills
Introduced:
Sep 2, 2025
Policy Area:
Science, Technology, Communications

Bill Statistics

12
Actions
1
Cosponsors
0
Summaries
8
Subjects
1
Text Versions
Yes
Full Text

AI Summary

No AI Summary Available

Click the button above to generate an AI-powered summary of this bill using Claude.

The summary will analyze the bill's key provisions, impact, and implementation details.

Latest Action

Sep 3, 2025
Ordered to be Reported (Amended) by the Yeas and Nays: 25 - 0.

Actions (12)

Ordered to be Reported (Amended) by the Yeas and Nays: 25 - 0.
Type: Committee | Source: House committee actions | Code: H19000
Sep 3, 2025
Committee Consideration and Mark-up Session Held
Type: Committee | Source: House committee actions | Code: H15001
Sep 3, 2025
Subcommittee on Cybersecurity and Infrastructure Protection Discharged
Type: Committee | Source: House committee actions | Code: H25000
Sep 3, 2025
Referred to the Subcommittee on Cybersecurity and Infrastructure Protection.
Type: Committee | Source: House committee actions | Code: H11000
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Referred to the Committee on Homeland Security, and in addition to the Committees on Oversight and Government Reform, Intelligence (Permanent Select), Energy and Commerce, Armed Services, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.
Type: IntroReferral | Source: House floor actions | Code: H11100
Sep 2, 2025
Introduced in House
Type: IntroReferral | Source: Library of Congress | Code: Intro-H
Sep 2, 2025
Introduced in House
Type: IntroReferral | Source: Library of Congress | Code: 1000
Sep 2, 2025

Subjects (8)

Advanced technology and technological innovations Computer security and identity theft Computers and information technology Infrastructure development Intergovernmental relations Science, Technology, Communications (Policy Area) State and local government operations Subversive activities

Cosponsors (1)

Text Versions (1)

Introduced in House

Sep 2, 2025

Full Bill Text

Length: 15,478 characters Version: Introduced in House Version Date: Sep 2, 2025 Last Updated: Nov 14, 2025 6:08 AM
[Congressional Bills 119th Congress]
[From the U.S. Government Publishing Office]
[H.R. 5079 Introduced in House

(IH) ]

<DOC>

119th CONGRESS
1st Session
H. R. 5079

To reauthorize the Cybersecurity Act of 2015, and for other purposes.

_______________________________________________________________________

IN THE HOUSE OF REPRESENTATIVES

September 2, 2025

Mr. Garbarino (for himself and Mr. McCaul) introduced the following
bill; which was referred to the Committee on Homeland Security, and in
addition to the Committees on Oversight and Government Reform,
Intelligence (Permanent Select), Energy and Commerce, Armed Services,
and the Judiciary, for a period to be subsequently determined by the
Speaker, in each case for consideration of such provisions as fall
within the jurisdiction of the committee concerned

_______________________________________________________________________

A BILL

To reauthorize the Cybersecurity Act of 2015, and for other purposes.

Be it enacted by the Senate and House of Representatives of the
United States of America in Congress assembled,
SECTION 1.

This Act may be cited as the ``Widespread Information Management
for the Welfare of Infrastructure and Government Act''.
SEC. 2.

(a) In General.--The Cybersecurity Act of 2015 (6 U.S.C. 1501 et
seq.; enacted as division N of the Consolidated Appropriations Act,
2016; Public Law 114-113) is amended--

(1) in
section 102 (6 U.
definitions)--
(A) by redesignating paragraphs

(4) ,

(5) ,

(6) ,

(7) ,

(8) ,

(9) ,

(10) ,

(11) ,

(12) ,

(13) ,

(14) ,

(15) ,

(16) ,

(17) , and

(18) as paragraphs

(6) ,

(7) ,

(8) ,

(9) ,

(10) ,

(11) ,

(12) ,

(13) ,

(14) ,

(15) ,

(16) ,

(17) ,

(19) ,

(20) ,
and

(21) , respectively;
(B) by inserting after paragraph

(3) the following
new paragraphs:
``

(4) Artificial intelligence.--The term `artificial
intelligence' has the meaning given such term in
section 5002 of the National Artificial Intelligence Initiative Act of 2020 (15 U.
of the National Artificial Intelligence Initiative Act of 2020
(15 U.S.C. 9401).
``

(5) Critical infrastructure.--The term `critical
infrastructure' has the meaning given such term in
section 1016 (e) of Public Law 107-56 (42 U.

(e) of Public Law 107-56 (42 U.S.C. 5195c

(e) ).''; and
(C) by inserting after paragraph

(17) , as so
redesignated, the following new paragraph:
``

(18) Sector risk management agency.--The term `Sector
Risk Management Agency' has the meaning given such term in
section 2200 of the Homeland Security Act of 2002 (6 U.
650).'';

(2) in
section 103 (6 U.
information by the Federal Government)--
(A) in subsection

(a) , in the matter preceding
paragraph

(1) , by striking ``develop and issue'' and
inserting ``develop, issue, and, as appropriate,
update'';
(B) in subsection

(b) --
(i) in paragraph

(1) --
(I) in the matter preceding
subparagraph
(A) , by inserting ``and,
as appropriate, updated,'' after
``developed'';
(II) by amending subparagraph
(A) to read as follows:
``
(A) ensure the Federal Government maintains the
capability to provide technical assistance, on a
voluntary basis, to non-Federal entities in utilizing
cyber threat indicators and defensive measures for
cybersecurity purposes;'';
(III) in subparagraph
(E)
(ii) , by
striking ``and'' after the semicolon;
(IV) in subparagraph
(F) , by
striking the period and inserting ``;
and''; and
(V) by adding at the end the
following new subparagraph:
``
(G) pursuant to
section 2212 of the Homeland Security Act of 2002 (6 U.
Security Act of 2002 (6 U.S.C. 662), provide one-time
read-ins, as appropriate, to select individuals
identified by non-Federal entities that own or operate
critical infrastructure;''; and
(ii) in paragraph

(2) --
(I) by inserting ``and, as
appropriate, updating,'' after
``developing''; and
(II) by inserting ``and defensive
measures'' after ``promote the sharing
of cyber threat indicators''; and
(C) in subsection
(c) --
(i) by inserting ``and not later than 60
days after any update, as appropriate, of
procedures required by subsection

(a) ,'' after
``Act,''; and
(ii) by inserting ``(or update, as
appropriate)'' after ``procedures'';

(3) in
section 104 (6 U.
authorizations for preventing, detecting, analyzing, and
mitigating cybersecurity threats)--
(A) in subsection
(c) --
(i) in paragraph

(1) , by inserting ``,
including Sector Risk Management Agencies that
are agencies and the majority of the systems of
which are not covered under subsection
(d) or

(e) of
section 3553 of title 44, United States Code,'' after ``Federal Government''; (ii) in paragraph (3) -- (I) in the matter preceding subparagraph (A) , by striking ``shall be'' and inserting ``may be''; (II) in subparagraph (A) , by striking ``or'' after the semicolon; (III) in subparagraph (B) , by striking the period and inserting ``; or''; and (IV) by adding at the end the following new subparagraph: `` (C) to preclude the use of artificial intelligence that is developed or strictly deployed for cybersecurity purposes in carrying out the activities authorized under paragraph (1) .
Code,'' after ``Federal Government'';
(ii) in paragraph

(3) --
(I) in the matter preceding
subparagraph
(A) , by striking ``shall
be'' and inserting ``may be'';
(II) in subparagraph
(A) , by
striking ``or'' after the semicolon;
(III) in subparagraph
(B) , by
striking the period and inserting ``;
or''; and
(IV) by adding at the end the
following new subparagraph:
``
(C) to preclude the use of artificial
intelligence that is developed or strictly deployed for
cybersecurity purposes in carrying out the activities
authorized under paragraph

(1) .''; and
(iii) in subparagraph
(B) of subsection
(d) (2) , by inserting ``, which may utilize
artificial intelligence that is developed or
strictly deployed for cybersecurity purposes,''
after ``technical capability'';

(4) in
section 105 (6 U.
cyber threat indicators and defensive measures with the Federal
Government--
(A) in subsection

(a) --
(i) in paragraph

(2) , by adding at the end
the following new sentences: ``As appropriate,
the Attorney General and the Secretary of
Homeland Security shall, in consultation with
the heads of the appropriate Federal entities,
jointly update such policies and procedures,
and issue and make publicly available such
updated policies and procedures. Such updates
shall prioritize rapid dissemination to State,
local, Tribal, and territorial governments and
owners and operators of non-Federal critical
infrastructure of relevant and actionable cyber
threat indicators and defensive measures.'';
(ii) in paragraph

(3) , in the matter
preceding subparagraph
(A) , by striking
``developed or issued'' and inserting
``developed, issued, or, as appropriate,
updated,''; and
(iii) in paragraph

(4) --
(I) in subparagraph
(A) , by adding
at the end the following new sentence:
``As appropriate, the Attorney General
and the Secretary of Homeland Security
shall jointly update and make publicly
available such guidance to so assist
entities and promote such sharing of
cyber threat indicators and defensive
measures with such Federal entities
under this title.''; and
(II) in subparagraph
(B) , in the
matter preceding clause
(i) , by
inserting ``and, as appropriate,
updated,'' after ``developed'';
(B) in subsection

(b) --
(i) in paragraph

(2)
(B) , by inserting ``,
and, as appropriate, update,'' after
``review''; and
(ii) in paragraph

(3) , in the matter
preceding subparagraph
(A) , by inserting ``and,
as appropriate, updated,'' after ``required'';
(C) in subsection
(c) --
(i) in paragraph

(1)
(D) , by inserting ``,
including if such capability and process
employs artificial intelligence'' before the
semicolon;
(ii) in paragraph

(2) , by adding at the end
the following new subparagraph:
``
(C) Outreach.--Not later than 90 days after the
date of the enactment of this subparagraph, the
Secretary of Homeland Security shall develop and
continuously implement an outreach plan, including
targeted engagement, to ensure Federal and non-Federal
entities, particularly small or rural owners or
operators of critical infrastructure which often lack
dedicated cybersecurity staff but remain vital to
national security--
``
(i) are aware of the capability and
process required by paragraph

(1) to share
cyber threat indicators and defensive measures,
including the benefits real-time information
sharing provides;
``
(ii) understand how to share cyber threat
indicators and defensive measures;
``
(iii) understand the obligation to remove
certain personal information in accordance with
section 104 (d) (7) prior to sharing a cyber threat indicator; `` (iv) understand how cyber threat indicators and defensive measures are received, processed, used, and protected; `` (v) understand the protections they are afforded in sharing any cyber threat indicators and defensive measures; and `` (vi) can provide feedback to the Secretary when policies, procedures, and guidelines that are unclear or unintentionally prohibitive to sharing cyber threat indicators and defensive measures.
(d) (7) prior to sharing a cyber
threat indicator;
``
(iv) understand how cyber threat
indicators and defensive measures are received,
processed, used, and protected;
``
(v) understand the protections they are
afforded in sharing any cyber threat indicators
and defensive measures; and
``
(vi) can provide feedback to the
Secretary when policies, procedures, and
guidelines that are unclear or unintentionally
prohibitive to sharing cyber threat indicators
and defensive measures.''; and
(iii) by adding at the end the following
new subparagraph:
``
(D) Briefings on outreach.--The Secretary of
Homeland Security shall annually provide to the
Committee on Homeland Security of the House of
Representatives and the Committee on Homeland Security
and Governmental Affairs of the Senate a briefing on
the implementation of outreach pursuant to subparagraph
(B) .''; and
(D) in subsection
(d) --
(i) in paragraph

(1) , by inserting
``copyright or'' before ``trade secret
protection''; and
(ii) in paragraph

(5)
(A) ,
(I) in clause
(iv) , by striking
``or'' after the semicolon;
(II) in clause
(v)
(III) , by
striking the period and inserting ``;
or''; and
(III) by adding at the end the
following new clause:
``
(vi) the purpose of rapidly providing
other Federal entities, including Sector Risk
Management Agencies, awareness of a
cybersecurity threat that may impact the
information systems of such Agencies.'';

(5) in
section 108 (6 U.
and preemption)--
(A) in subsection
(c) --
(i) in the matter preceding paragraph

(1) ,
by striking ``shall be'' and inserting ``may
be'';
(ii) in paragraph

(2) , by striking ``or''
after the semicolon;
(iii) in paragraph

(3) , by striking the
period and inserting ``; or''; and
(iv) by adding at the end the following new
paragraph:
``

(4) to preclude the use of artificial intelligence that
is developed or strictly deployed for cybersecurity purposes in
carrying out activities authorized by this title.''; and
(B) in subsection

(f) --
(i) in paragraph

(3) --
(I) by inserting ``to share cyber
threat indicators or defensive
measures'' after ``relationship''; and
(II) by striking ``or'' after the
semicolon;
(ii) in paragraph

(4) , by striking the
period and inserting ``; or''; and
(iii) by adding at the end the following
new paragraph:
``

(5) to limit or modify, notwithstanding any other
provision of law, the authorization to share pursuant to
section 104 (c) (1) with Sector Risk Management Agencies described in such section.
(c) (1) with Sector Risk Management Agencies
described in such section.'';

(6) in
section 109 (6 U.
cybersecurity threats)--
(A) in subsection

(a) --
(i) by inserting ``and not later than
September 30 of every two years thereafter,''
after ``Act,'';
(ii) by inserting ``the Secretary of
Homeland Security and'' after ``in coordination
with'';
(iii) by inserting ``and the Committee on
Homeland Security and Governmental Affairs''
before ``of the Senate'';
(iv) by inserting ``and the Committee on
Homeland Security'' before ``of the House'';
and
(v) by inserting ``prepositioning
activities, ransomware,'' after ``attacks,'';
and
(B) in subsection

(b) --
(i) in paragraph

(1) , by inserting
``prepositioning activities, ransomware,''
after ``attacks,'';
(i) in paragraph

(2) , by inserting
``prepositioning activity, ransomware,'' after
``attack,'';
(i) in paragraph

(3) , by inserting
``prepositioning activities, ransomware,''
after ``attacks,'' each place it appears; and
(i) in paragraph

(4) , by inserting
``prepositioning activities, ransomware,''
after ``attacks,''; and

(7) in
section 111 (a) (6 U.

(a) (6 U.S.C. 1510

(a) , relating to
effective period), by striking ``2025'' and inserting ``2035''.

(b) Conforming Amendments.--
Section 2200 of the Homeland Security Act of 2002 (6 U.
Act of 2002 (6 U.S.C. 650; relating to definitions) is amended--

(1) in paragraph

(5) --
(A) in subparagraph
(B) , by inserting ``or
compromising'' after ``defeating'';
(B) in subparagraph
(C) , by inserting ``including a
security vulnerability affecting an information system
or a technology included in the critical and emerging
technologies list of the Office of Science and
Technology Policy or successor list, such as artificial
intelligence (as such term is defined in
section 5002 of the National Artificial Intelligence Initiative Act of 2020 (15 U.
of the National Artificial Intelligence Initiative Act
of 2020 (15 U.S.C. 9401)), which may be in a Federal
entity's or non-Federal entity's software or hardware
supply chain,'' after ``security vulnerability,'';
(C) in subparagraph
(D) , by inserting ``or
compromise'' after ``defeat''; and
(D) in subparagraph
(F) , by inserting ``or
compromised'' after ``exfiltrated'';

(2) in paragraph

(14) , by amending subparagraph
(B) to read
as follows:
``
(B) includes, in accordance with
section 104 (d) (2) of the Cybersecurity Sharing Act of 2015 (6 U.
(d) (2) of the Cybersecurity Sharing Act of 2015 (6
U.S.C. 1503
(d) (2) )--
``
(i) operational technology, including
industrial control systems, such as supervisory
control and data acquisition systems,
distributed control systems, and programmable
logic controllers;
``
(ii) edge devices; and
``
(iii) internet of things devices,
including digital and physical infrastructure
impacted by ransomware.''; and

(3) in paragraph

(25) , by inserting ``or compromise'' after
``defeat''.
<all>