Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
S3414 Cybersecurity

S3414 Cybersecurity

Ratings: (0)|Views: 19 |Likes:
Published by ginamcnaughton

More info:

Published by: ginamcnaughton on Jul 25, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/09/2014

pdf

text

original

 
 ALB12541 S.L.C.
112
TH
CONGRESS2
D
S
ESSION
 
S.
 ll 
To enhance the security and resiliency of the cyber and communicationsinfrastructure of the United States.
IN THE SENATE OF THE UNITED STATES
 llllllllll 
Mr. L
IEBERMAN
(for himself, Ms. C
OLLINS
, Mr. R
OCKEFELLER
, Mrs. F
EIN
-
STEIN
, and Mr. C
 ARPER
) introduced the following bill; which was readtwice and referred to the Committee on
 llllllllll 
A BILL
To enhance the security and resiliency of the cyber andcommunications infrastructure of the United States.
 Be it enacted by the Senate and House of Representa-
1
tives of the United States of America in Congress assembled,
2
SECTION 1. SHORT TITLE; TABLE OF CONTENTS.
3
(a) S
HORT
T
ITLE
.—This Act may be cited as the
4
‘‘Cybersecurity Act of 2012’’ or the ‘‘CSA2012’’.
5
(b) T
 ABLE OF
C
ONTENTS
.—The table of contents for
6
this Act is as follows:
7
Sec.1.Short title; table of contents.Sec.2.Definitions.TITLE I—PUBLIC-PRIVATE PARTNERSHIP TO PROTECT CRITICALINFRASTRUCTURE
 
2
 ALB12541 S.L.C.Sec.101.National Cybersecurity Council.Sec.102.Inventory of critical infrastructure.Sec.103.Voluntary cybersecurity practices.Sec.104.Voluntary cybersecurity program for critical infrastructure.Sec.105.Rules of construction.Sec.106.Protection of information.Sec.107.Annual assessment of cybersecurity.Sec.108.International cooperation.Sec.109.Effect on other laws.Sec.110.Definitions.TITLE II—FEDERAL INFORMATION SECURITY MANAGEMENT ANDCONSOLIDATING RESOURCESSec.201.FISMA Reform.Sec.202.Management of information technology.Sec.203.Savings provisions.Sec.204.Consolidation of existing departmental cyber resources and authori-ties.TITLE III—RESEARCH AND DEVELOPMENTSec.301.Federal cybersecurity research and development.Sec.302.Homeland security cybersecurity research and development.Sec.303.Research centers for cybersecurity.Sec.304.Centers of excellence.TITLE IV—EDUCATION, WORKFORCE, AND AWARENESSSec.401.Definitions.Sec.402.Education and awareness.Sec.403.National cybersecurity competition and challenge.Sec.404.Federal Cyber Scholarship-for-Service program.Sec.405.Assessment of cybersecurity Federal workforce.Sec.406.Federal cybersecurity occupation classifications.Sec.407.Training and education of Federal employees.Sec.408.National Center for Cybersecurity and Communications acquisitionauthorities.Sec.409.Reports on cyber incidents against Government networks.Sec.410.Reports on prosecution for cybercrime.Sec.411.Report on research relating to secure domain.Sec.412.Report on preparedness of Federal courts to promote cybersecurity.Sec.413.Report on impediments to public awareness.Sec.414.Report on protecting the electrical grid of the United States.Sec.415.Marketplace information.TITLE V—FEDERAL ACQUISITION RISK MANAGEMENT STRATEGY Sec.501.Federal acquisition risk management strategy.Sec.502.Amendments to Clinger-Cohen provisions to enhance agency planning for information security needs.TITLE VI—INTERNATIONAL COOPERATIONSec.601.Definitions.Sec.602.Findings.Sec.603.Sense of Congress.
 
3
 ALB12541 S.L.C.Sec.604.Coordination of international cyber issues within the United StatesGovernment.Sec.605.Consideration of cybercrime in foreign policy and foreign assistanceprograms.TITLE VII—INFORMATION SHARINGSec.701.Affirmative authority to monitor and defend against cybersecurity threats.Sec.702.Voluntary disclosure of cybersecurity threat indicators among privateentities.Sec.703.Cybersecurity exchanges.Sec.704.Voluntary disclosure of cybersecurity threat indicators to a cybersecu-rity exchange.Sec.705.Sharing of classified cybersecurity threat indicators.Sec.706.Limitation on liability and good faith defense for cybersecurity activi-ties.Sec.707.Construction and federal preemption.Sec.708.Definitions.
SEC. 2. DEFINITIONS.
1
In this Act:
2
(1) C
 ATEGORY OF CRITICAL CYBER INFRA 
-
3
STRUCTURE
.—The term ‘‘category of critical cyber
4
infrastructure’’ means a category identified by the
5
Council as critical cyber infrastructure in accordance
6
 with the procedure established under section 102.
7
(2) C
OMMERCIAL INFORMATION TECHNOLOGY 
 
8
PRODUCT
.—The term ‘‘commercial information tech-
9
nology product’’ means a commercial item that orga-
10
nizes or communicates information electronically.
11
(3) C
OMMERCIAL ITEM
.—The term ‘‘commer-
12
cial item’’ has the meaning given the term in section
13
103 of title 41, United States Code.
14
(4) C
OUNCIL
.—The term ‘‘Council’’ means the
15
National Cybersecurity Council established under
16
section 101.
17

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->