Bill Sponsor
House Bill 2774
115th Congress(2017-2018)
Hack DHS Act
Introduced
Introduced
Introduced in House on Jun 6, 2017
Overview
Text
Sponsor
Introduced
Jun 6, 2017
Latest Action
Jun 15, 2017
Origin Chamber
House
Type
Bill
Bill
The primary form of legislative measure used to propose law. Depending on the chamber of origin, bills begin with a designation of either H.R. or S. Joint resolution is another form of legislative measure used to propose law.
Bill Number
2774
Congress
115
Policy Area
Government Operations and Politics
Government Operations and Politics
Primary focus of measure is government administration, including agency organization, contracting, facilities and property, information management and services; rulemaking and administrative law; elections and political activities; government employees and officials; Presidents; ethics and public participation; postal service. Measures concerning agency appropriations and the budget process may fall under Economics and Public Finance policy area.
Sponsorship by Party
Democrat
California
Democrat
California
Democrat
Illinois
Democrat
Pennsylvania
Republican
Pennsylvania
Republican
Virginia
Democrat
Washington
Democrat
Washington
House Votes (0)
Senate Votes (0)
No House votes have been held for this bill.
Summary

Hack the Department of Homeland Security Act of 2017 or the Hack DHS Act

This bill directs the Department of Homeland Security (DHS) to establish a bug bounty pilot program to minimize vulnerabilities to DHS information systems.

"Bug bounty program" is a program under which an approved computer security specialist or security researcher is temporarily authorized to identify and report vulnerabilities within DHS information systems in exchange for cash payment.

Under such program, DHS shall:

  • provide monetary compensation for reports of previously unidentified security vulnerabilities within the websites, applications, and other DHS information systems that are accessible to the public;
  • develop an expeditious process by which computer security researchers can register for the program, submit to a background check, and receive a determination as to approval for program participation;
  • designate mission-critical operations within DHS that should be excluded;
  • consult with the Department of Justice on how to ensure that program participants are protected from prosecution for activities authorized under the program;
  • award competitive contracts to manage the program and for executing the remediation of identified vulnerabilities; and
  • engage interested persons, including commercial sector representatives, about the structure of the program.
Text (1)
Actions (3)
06/15/2017
Referred to the Subcommittee on Cybersecurity and Infrastructure Protection.
06/06/2017
Referred to the House Committee on Homeland Security.
06/06/2017
Introduced in House
Public Record
Record Updated
Jan 11, 2023 1:37:54 PM