{ "id": "R42409", "type": "CRS Report", "typeId": "REPORT", "number": "R42409", "active": false, "source": "University of North Texas Libraries Government Documents Department", "versions": [ { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc463294/", "id": "R42409_2013Apr17", "date": "2013-04-17", "retrieved": "2014-12-05T09:57:41", "title": "Cybersecurity: Selected Legal Issues", "summary": "This report discusses selected legal issues that frequently arise in the context of legislation to address vulnerabilities of private critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also provides an overview of the ways in which federal laws of these types may preempt or affect the applicability of state law.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20130417_R42409_1d237e0d0eca75eb20e470652c5dee8c083a098c.pdf" }, { "format": "HTML", "filename": "files/20130417_R42409_1d237e0d0eca75eb20e470652c5dee8c083a098c.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer networks", "name": "Computer networks" }, { "source": "LIV", "id": "Internet", "name": "Internet" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc821877/", "id": "R42409_2012Jul23", "date": "2012-07-23", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Selected Legal Issues", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120723_R42409_c676b325397bae82bb0db9714a382bb1373a8476.pdf" }, { "format": "HTML", "filename": "files/20120723_R42409_c676b325397bae82bb0db9714a382bb1373a8476.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc809974/", "id": "R42409_2012May03", "date": "2012-05-03", "retrieved": "2016-03-19T13:57:26", "title": "Cybersecurity: Selected Legal Issues", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120503_R42409_6288f7755f5606fa4c6d549fbf791b775b65b8ec.pdf" }, { "format": "HTML", "filename": "files/20120503_R42409_6288f7755f5606fa4c6d549fbf791b775b65b8ec.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc86608/", "id": "R42409_2012Apr20", "date": "2012-04-20", "retrieved": "2012-06-15T10:07:48", "title": "Cybersecurity: Selected Legal Issues", "summary": "This report discusses selected legal issues that frequently arise in the context of legislation to address vulnerabilities of private critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also provides an overview of the ways in which federal laws of these types may preempt or affect the applicability of state law.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120420_R42409_7d9832991bf5801eb01f9abdee8984b7c1aeaf82.pdf" }, { "format": "HTML", "filename": "files/20120420_R42409_7d9832991bf5801eb01f9abdee8984b7c1aeaf82.html" } ], "topics": [ { "source": "LIV", "id": "Cyberspace", "name": "Cyberspace" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer networks", "name": "Computer networks" }, { "source": "LIV", "id": "Internet", "name": "Internet" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc86609/", "id": "R42409_2012Mar14", "date": "2012-03-14", "retrieved": "2012-06-15T10:07:48", "title": "Cybersecurity: Selected Legal Issues", "summary": "This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information amongst private sector and government entities. This report also discusses the degree to which federal law may preempt state law.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20120314_R42409_b2109d35948da021ff4d71446f627003cff8e574.pdf" }, { "format": "HTML", "filename": "files/20120314_R42409_b2109d35948da021ff4d71446f627003cff8e574.html" } ], "topics": [ { "source": "LIV", "id": "Intelligence activities", "name": "Intelligence activities" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Right of privacy", "name": "Right of privacy" } ] } ], "topics": [ "Intelligence and National Security", "National Defense" ] }