114 th Congress March, 2015. Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS



Similar documents
When Can We Expect a Federal Data Breach Notification Law?

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Legislative Language

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Preservation of longstanding, roles and missions of civilian and intelligence agencies

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

DIVISION N CYBERSECURITY ACT OF 2015

S. ll IN THE SENATE OF THE UNITED STATES A BILL

How To Protect Yourself From Cyber Crime

Updated Administration Proposal: Law Enforcement Provisions

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

Cybersecurity: Authoritative Reports and Resources

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

Cybersecurity and Information Sharing: Comparison of H.R and H.R. 1731

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

PUBLIC LAW JUNE 18, 1997 VOLUNTEER PROTECTION ACT OF 1997

Cybersecurity: Authoritative Reports and Resources

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cybersecurity: Authoritative Reports and Resources

Corporate Perspectives On Cybersecurity: A Survey Of Execs

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

S. ll IN THE SENATE OF THE UNITED STATES

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

Cybersecurity: Authoritative Reports and Resources

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

COMPUTER FRAUD AND ABUSE ACT. US Code as of: 01/05/99 Title 18 Sec Fraud and related activity in connection with computers

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

What are you trying to secure against Cyber Attack?

How To Create A Blue Alert

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

WRITTEN TESTIMONY OF

TITLE I FORMER VICE PRESIDENT PROTECTION ACT

KRS Chapter 61. Personal Information Security and Breach Investigations

Cybercrime: A Sketch of 18 U.S.C and Related Federal Criminal Laws

Cybersecurity Primer

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

[STAFF WORKING DRAFT]

Cybersecurity: Authoritative Reports and Resources

Legislative Language

In an age where so many businesses and systems are reliant on computer systems,

Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.

APPENDIX: OVERVIEW OF PUBLIC INTEREST WORK

Cybersecurity: Authoritative Reports and Resources

CRS Report for Congress

28 USC 532. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

An Overview of Cybersecurity and Cybercrime in Taiwan

Florida Senate SB 872

How To Write A National Cybersecurity Act

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Data Breach Reporting: Summary of Governing Bodies with Reporting Requirements in the United States

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Transcription:

114 th Congress March, 2015 Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS On January 13, 2015, the Administration wrote a letter to Congress urging action on the following three priorities: 1) enhancing cyber threat information sharing within the private sector and between the private sector and the Federal Government; 2) protecting individuals by requiring businesses to notify consumers if personal information is compromised; and 3) strengthening and clarifying the ability of law enforcement to investigate and prosecute cybercrimes. The FY2016 Budget provides $14 billion to support cybersecurity efforts. 1. Updated Department of Homeland Security Cybersecurity Authority and Information Sharing A. The Administration proposes to update the Department of Homeland Security Cybersecurity Authority and information sharing by codifying mechanisms for enabling cybersecurity information between private and government entities, as well as among private entities, to better protect information systems and more effectively respond to cybersecurity incidents. 2. Updated Law Enforcement Provisions Related to Computer Security. The major changes are as follows: A. Prosecuting Organized Crime Groups That Utilize Cyber Attacks. This change adds offenses under the Computer Fraud and Abuse Act (18 U.S.C. 1030) to the list of racketeering activities in the Racketeering Influenced and Corrupt Organizations Act (RICO at 18 U.S.C. 1961(1)). This change would increase certain penalties and make it easier to prosecute organized criminal groups that engage in computer network and similar attacks. B. Deterring the Development and Sale of Computer and Cell Phone Spying Devices. These provisions provide additional tools to address violations of 18 U.S.C. 2512, which criminalizes the sale, distribution, and advertising of surreptitious interception devices. C. Modernizing the Computer Fraud and Abuse Act. This updates and clarifies several provisions of the Computer 1

Fraud and Abuse Act (18 U.S.C. 1030) to enhance effectiveness against attacks on computers and computer networks, including those by insiders. D. Ensuring Authority for Courts to Shut Down Botnets. This proposal would empower courts to issue injunctions to disrupt or shut down botnets. The amendment would also create liability protection for companies that act in compliance with court orders under the section, and allow courts to order reimbursement where companies incur reasonably necessary compliance costs. II. BILLS INTRODUCED IN ONE CHAMBER 1. HOUSE A. H.R. 60 Cyber Defense National Guard Act Sponsor: Rep Jackson Lee, Sheila [TX-18] (introduced 1/6/2015) Latest Major Action: 1/6/2015 Referred to the House Committee on Intelligence (Permanent Select). 0 cosponsors Requires the Director of National Intelligence to report to Congress regarding the feasibility of establishing a Cyber Defense National Guard. Requires the report to address: (1) the number of persons who would be needed to defend the critical infrastructure of the United States from a cyber-attack or man-made intentional or unintentional catastrophic incident; (2) elements of the federal government that would be best equipped to recruit, train, and manage such a National Guard; (3) resources that can be pre-positioned and training that can be instilled to assure responsiveness if an incident disrupts communications in a region or area; (4) logistics of allowing governors to use such a National Guard in states during times of cyber emergency; and (5) whether a force trained to defend U.S. networks in a major attack or natural or man-made disaster will benefit overall efforts to defend the interests of the United States. B. H.R. 53 Cyber Security Education and Federal Workforce Enhancement Act Sponsor: Rep. Jackson Lee, Sheila [TX-18] (introduced 1/6/2015) Latest Major Action: 1/23/2015 Referred to House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. 0 cosponsors Amends the Homeland Security Act of 2002 to establish within the Department of Homeland Security (DHS) an Office of Cybersecurity Education and Awareness Branch to make recommendations to DHS regarding: (1) recruitment of information assurance, cybersecurity, and 2

computer security professionals; (2) grants, training programs, and other support for kindergarten through grade 12, secondary, and post-secondary computer security education programs; (3) guest lecturer programs in which professional computer security experts lecture computer science students at institutions of higher education; (4) youth training programs for students to work in part-time or summer positions at federal agencies; and (5) programs to support underrepresented minorities in computer security fields with programs at minority-serving institutions, including historically black colleges and universities, Hispanic-serving institutions, native American colleges, Asian-American institutions, and rural colleges and universities. Requires the NSF to report to Congress regarding the causes of the high dropout rates of women and minority students enrolled in science, technology, engineering, and mathematics programs. C. H.R. 104 Cyber Privacy Fortification Act (2015) Sponsored: Rep. Conyers, John, Jr. [MI-13] (Introduced 1/6/2015) Latest Action: 1/22/2015 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. 1 cosponsor Amends the federal criminal code to provide criminal penalties for intentional failures to provide required notices of a security breach involving sensitive personally identifiable information and requires those with knowledge of a major security breach to provide prompt notice to the U.S. Secret Service or the Federal Bureau of Investigation. D. H.R. 283 Electronic Communications Privacy Act Amendments Act of 2015 Sponsor: Rep. Salmon, Matt [AZ-5] (Introduced 1/12/2015) Latest Action: 2/2/2015- Referred to the Subcommittee on Crime, Terrorism, Homeland Security and Investigations This legislation states that a provider of remote computing service or electronic communication service to the public shall not knowingly divulge to any governmental entity the contents of certain communications without a warrant. E. H.R. 234 Cyber Intelligence Sharing and Protection Act Sponsor: Rep. Dutch Ruppersberger [D-MD-2] Latest Action: 2/2/2015- Referred to the Subcommittee on the Constitution and Civil Justice 3

Directs the federal government to provide for real-time sharing of cyber threat information between all designated federal cyber operations centers and requires the Director of National Intelligence (DNI) to allow the intelligence community to share cyber threat intelligence with privatesector entities and utilities possessing appropriate certifications or security clearances. Directs DHS, the Attorney General, the DNI, and the Department of Defense to establish procedures governing the receipt, retention, use, and disclosure of non-publicly available cyber threat information shared with the federal government and sets forth requirements for the use and protection of shared information. Provides civil and criminal liability protections to cybersecurity providers, contracting entities, and self-protected entities acting in good faith to obtain or share threat information or to safeguard systems from threats and allows the federal government to use shared cyber threat information to deter attacks and investigate criminal activity. F. Draft of Data Security and Breach Notification Act of 2015 Sponsors: Rep. Peter Welch [D-VT], Rep. Marsha Blackburn [R-Tenn.]. : To require certain entities who collect and maintain personal information of individuals to secure such information and to provide notice to such individuals in the case of a breach of security involving such information, and for other purposes. The new legislation would hold companies to a new national digital security standard that the authors claim is flexible enough not to restrain companies. It would also require that companies who have been breached notify people whose data may have been stolen within 30 days, unless there isn t a reasonable risk of identity theft of financial harm. HR 1560 (Nunes, R-CA), Protecting Cyber Networks Act, to improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats; to Intelligence (Permanent Select). 8 cosponsors HR 1704 (Langevin, D-RI), to establish a nation data breach notification standard; to Energy and Commerce, and Judiciary. 2. SENATE S. 177 Data Security and Breach Notification Act of 2015 4

Sponsor: Sen. Nelson, Bill [FL] (Introduced 1/13/2015) Latest Action: 1/13/2015 Read twice and referred to the Committee on Commerce, Science, and Transportation. 0 cosponsors Protects consumers by requiring reasonable security policies and procedures to protect data containing personal information, and provides for nationwide notice in the event of a breach. CISA The Senate Intelligence Committee passed the Cybersecurity Information Sharing Act on March 12, 2015 by a vote of 14-1. Senator Wyden objected citing privacy concerns. The legislation would help facilitate information sharing between and among the public and private sectors. Senator Tom Carper (D-DE), ranking member of the Homeland Security and Governmental Affairs Committee, introduced the Cyber Threat Sharing Act of 2015, which incorporates many of President Obama s legislative proposals. S. 456 S 754 (Burr, R-NC), to improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats; from the Select Committee on Intelligence. III. IV. SECURITY BREACH NOTIFCATION LAWS 1. Forty-seven states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or government entities to notify individuals of security breaches of information involving personally identifiable information. BARRIERS TO LEGISLATION 1. On January 27, the Subcommittee on Research and Technology, of the House Science, Space and Technology Committee, held a hearing to discuss national data breach notification laws. On February 4, the Senate Committee on Commerce, Science, & Transportation, held a hearing to examine private sector experience with the NIST Framework. Although there seems to be much bipartisan support, some lawmakers fear that there are still major barriers to reform. Three major barriers arose during the hearings: A. Winning support for pre-emption, in which a federal law would supersede all or parts of the 47 state data breach notification statutes; B. Deciding whether evidence of harm to breach victims is needed before requiring companies to notify consumers, and defining the type of harm that would trigger notification; and C. Defining personally identifiable information that, if breached, would trigger notification. 5

V. Creation of Cyber Threat Intelligence Integration Center (CTIIC) On February 25, 2015, President Obama directed the Director of National Intelligence to establish the Cyber Threat Intelligence Integration Center. The CTIIC will provide integrated all-source intelligence analysis related to foreign cyber threats and cyber incidents affecting U.S. national interests; support the U.S. government centers responsible for cybersecurity and network defense; and facilitate and support efforts by the government to counter foreign cyber threats. Once established, the CTIIC will join the National Cybersecurity and Communications Integration Center (NCCIC), the National Cyber Investigative Joint Task Force (NCIJTF), and U.S. Cyber Command as integral parts of the United States Government s capability to protect our citizens, our companies, and our Nation from cyber threats. 1 The CTIIC will not be an operational center but will collect intelligence to assist other agencies like the NCCIC and the NCIJTF as they carry out their cybersecurity missions. No destination for the center has been established yet, but there current plan is to have the center located in metro Washington, DC. HR 1918 (Lofgren, D-CA), to amend Title 18, United States Code, to provide for clarification as to the meaning of access without authorization in regard to computer crime; to Judiciary. CR 4/21/15, H2354. S 1027 (Kirk, R-IL), to require notification of information security breaches and to enhance penalties for cyber criminals; to Commerce, Science, and Transportation. CR 4/21/15, S2300. S 1030 (Wyden, D-OR), to amend Title 18, United States Code, to provide for clarification as to the meaning of access without authorization in regard to computer crime; to Judiciary. CR 4/21/15, S2301. 1 www.whitehouse.gov 6