S. ll IN THE SENATE OF THE UNITED STATES



Similar documents
TUSKEGEE CYBER SECURITY PATH FORWARD

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

How To Codify A Cybersecurity Operations Center

S. ll IN THE SENATE OF THE UNITED STATES A BILL

How To Write A National Cybersecurity Act

Lessons from Defending Cyberspace

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Authoritative Reports and Resources

S. ll. To improve enforcement efforts related to prescription drug diversion and abuse, and for other purposes. IN THE SENATE OF THE UNITED STATES

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

How To Protect Yourself From Cyber Crime

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

H. R To enhance cybersecurity information sharing and coordination at ports in the United States, and for other purposes.

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Corporate Perspectives On Cybersecurity: A Survey Of Execs

When Can We Expect a Federal Data Breach Notification Law?

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

Cybersecurity: Authoritative Reports and Resources

CYBER SECURITY GUIDANCE

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

National Cyber Security Strategies: United States

The internet and digital technologies play an integral part

Middle Class Economics: Cybersecurity Updated August 7, 2015

Preventing and Defending Against Cyber Attacks November 2010

S. ll. To provide anti-retaliation protections for antitrust whistleblowers. IN THE SENATE OF THE UNITED STATES

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

How To Understand And Understand The European Priorities In Information Security

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Cyber Security Strategy

working group on foreign policy and grand strategy

Honourable members of the National Parliaments of the EU member states and candidate countries,

The Comprehensive National Cybersecurity Initiative

Cybersecurity: Authoritative Reports and Resources

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

U.S. Cyber Security Readiness

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Cybercrime Bedrohung, Intervention, Abwehr. Cybersecurity strategic-political aspects of this global challenge

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

WRITTEN TESTIMONY OF

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

PREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection

Cybercrime in the Automotive Industry How to improve your business cyber security

Privacy and Security in Healthcare

S. 900 IN THE SENATE OF THE UNITED STATES

Cybersecurity Primer

El Camino College Homeland Security Spring 2016 Courses

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

DIVISION N CYBERSECURITY ACT OF 2015

GLOBAL CONFERENCE ON CYBERSPACE 2015 CHAIR S STATEMENT

[STAFF WORKING DRAFT]

Cybersecurity: Authoritative Reports and Resources

Presidential Summit Reveals Cybersecurity Concerns, Trends

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

Cy berspace policy RevIew. Assuring a Trusted and Resilient Information and Communications Infrastructure

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

DHS, National Cyber Security Division Overview

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

Cybersecurity: Authoritative Reports and Resources

Transcription:

OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities and sensitive information of American citizens and businesses. IN THE SENATE OF THE UNITED STATES llllllllll Mr. ROCKEFELLER (for himself, Mr. CARPER, Mrs. FEINSTEIN, Mr. LEVIN, Ms. MIKULSKI, Mr. WHITEHOUSE, and Mr. COONS) introduced the following bill; which was read twice and referred to the Committee on llllllllll A BILL To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities and sensitive information of American citizens and businesses. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION. SHORT TITLE. This Act may be cited as the Cybersecurity and American Cyber Competitiveness Act of 0.

OLL0 8 0 8 0 SEC.. FINDINGS. Congress makes the following findings: () The country s leading officials in business, intelligence, and defense affairs agree that malicious state, terrorist, and criminal actors exploiting vulnerabilities in information and communications networks and gaps in cybersecurity pose one of the most serious and rapidly growing threats to both the national security and the economy of the United States. () With information technology now the backbone of the United States economy, a critical element of United States national security infrastructure and defense systems, the primary foundation of global communications, and a key enabler of most critical infrastructure, nearly every single United States citizen is touched by cyberspace and is threatened by cyber attacks. () Malicious actors in cyberspace have already caused significant damage to the United States Government, the United States economy, and United States citizens, and the threat continues to grow. () In its 00 Cyberspace Policy Review, the White House concluded, Ensuring that cyberspace is sufficiently resilient and trustworthy to support U.S. goals of economic growth, civil liberties and pri-

OLL0 vacy protections, national security, and the contin- ued advancement of democratic institutions requires making cybersecurity a national priority.. () Leading experts in the private sector and the government agree that the United States should establish a new model of public-private collaboration, which fits the realities of the st century, to secure 8 the country against cyber attack. 0 8 0 SEC.. SENSE OF CONGRESS. It is the sense of Congress that Congress should enact, and the President should sign, bipartisan legislation to improve communication and collaboration between the private sector and the Federal Government to secure the United States against cyber attack, to enhance the competitiveness of the United States and create jobs in the information technology industry, and to protect the identities and sensitive information of United States citizens and businesses by () enhancing the security and resiliency of public and private communications and information networks against cyber attack by nation-states, terrorists, and cyber criminals; () establishing mechanisms for sharing cyber threat and vulnerability information between the government and the private sector;

OLL0 8 0 8 0 () developing a coherent public-private system to improve the capability of the United States to assess cyber risk and prevent, detect, and robustly respond to cyber attacks against United States critical infrastructure, such as the electric grid, the financial sector, and telecommunications networks; () promoting research and development investments in the United States information technology sector that create and maintain good, well-paying jobs in the United States and help to enhance the economic competitiveness and cybersecurity of the United States; () promoting cybersecurity and information technology training to develop the country s next generation of cyber professionals; () preventing and mitigating identity theft and guarding against abuses or breaches of personally identifiable information; () enhancing United States diplomatic capacity and public-private international cooperation to respond to emerging cyber threats, including promoting security and freedom of access for communications and information networks around the world and battling global cyber crime through focused diplomacy;

OLL0 (8) expanding tools and resources for investigating and prosecuting cyber crimes in a manner that respects privacy rights and civil liberties and promotes United States innovation; and () maintaining robust protections of the privacy of United States citizens and their online activities and communications.