{ "id": "R43317", "type": "CRS Report", "typeId": "REPORTS", "number": "R43317", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 597898, "date": "2019-05-02", "retrieved": "2020-01-02T15:59:49.894419", "title": "Cybersecurity: Legislation and Hearings, 115th-116th Congresses", "summary": "Most major cybersecurity legislative provisions were enacted prior to 2002, despite many recommendations having been made over the past decade. More recently, in the 115th and 116th Congresses, cybersecurity legislation has received either committee or floor action or final passage, and both chambers have held multiple hearings.\nIn the 116th Congress, a number of House and Senate bills have received consideration, and hearings have been held by committees in each chamber. \nIn the 115th Congress, 31 bills received some type of action (committee consideration or passage by one or both chambers). Five bills became public law. The House held 54 hearings on cybersecurity issues and the Senate held 40 hearings.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "https://www.crs.gov/Reports/R43317", "sha1": "676dcb7f913ab19778472f25cbb79b5c073375f4", "filename": "files/20190502_R43317_676dcb7f913ab19778472f25cbb79b5c073375f4.html", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 594358, "date": "2019-03-20", "retrieved": "2019-04-17T13:59:27.829029", "title": "Cybersecurity: Legislation and Hearings, 115th-116th Congresses", "summary": "Most major cybersecurity legislative provisions were enacted prior to 2002, despite many recommendations having been made over the past decade. More recently, in the 115th and 116th Congresses, cybersecurity legislation has received either committee or floor action or final passage, and various hearings have been held.\nIn the 116th Congress, five House and four Senate bills have received committee consideration. Seven Senate hearings and nine House hearings have been held. \nIn the 115th Congress, 31 bills received some type of action (committee consideration or passage by one or both chambers). Five bills became public law. The House held 54 hearings on cybersecurity issues and the Senate held 40 hearings.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "https://www.crs.gov/Reports/R43317", "sha1": "86a2c5cb931b387d10fbc41c8dc3297e2e37089f", "filename": "files/20190320_R43317_86a2c5cb931b387d10fbc41c8dc3297e2e37089f.html", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 587389, "date": "2018-11-08", "retrieved": "2018-11-10T16:04:26.367009", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity were enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills from the 113th Congress changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nIn the 114th Congress, the House passed eight cyber-related bills:\nH.R. 1073, Critical Infrastructure Protection Act;\nH.R. 1560, Protecting Cyber Networks Act;\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015;\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act;\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015;\nH.R. 3869, State and Local Cyber Protection Act of 2015;\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015; and\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one cyber-related bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nIn addition to congressional passage of these cyber-specific bills, on December 18, 2015, H.R. 2029, the Consolidated Appropriations Act, was signed into law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing; Title II, National Cybersecurity Advancement; Title III, Federal Cybersecurity Workforce Assessment; and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House in April 2015, and S. 754, passed by the Senate in October 2015. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nIn the 115th Congress, 27 bills have received committee consideration or passed one or both chambers.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "624dd1b6a064f012d2c6378be4ff79b64e8d09c3", "filename": "files/20181108_R43317_624dd1b6a064f012d2c6378be4ff79b64e8d09c3.html", "images": {} }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "e3db82db5946f3afa5dc6113659d9a7e2350982f", "filename": "files/20181108_R43317_e3db82db5946f3afa5dc6113659d9a7e2350982f.pdf", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 581498, "date": "2018-05-24", "retrieved": "2018-10-05T23:44:04.306315", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity were enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills from the 113th Congress changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nIn the 114th Congress, the House passed eight cyber-related bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one cyber-related bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nIn addition to congressional passage of these cyber-specific bills, on December 18, 2015, H.R. 2029, the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing; Title II, National Cybersecurity Advancement; Title III, Federal Cybersecurity Workforce Assessment; and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House in April 2015, and S. 754, passed by the Senate in October 2015. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nIn the 115th Congress, 27 bills have received committee consideration or passed one or both chambers.\nThis report links to cybersecurity legislation and hearings in the 113th, 114th, and 115th Congresses. In addition it provides a list of executive orders and presidential directives pertaining to information and computer security from 1990-present.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "405a7954c33f8550728a41a8f34bef6b03a51fcf", "filename": "files/20180524_R43317_405a7954c33f8550728a41a8f34bef6b03a51fcf.html", "images": {} }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "c8614c5f1e50aa82d4612226acf9b798ddfcec05", "filename": "files/20180524_R43317_c8614c5f1e50aa82d4612226acf9b798ddfcec05.pdf", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 578031, "date": "2018-02-01", "retrieved": "2018-02-05T14:00:49.501471", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses. \nIn the 115th Congress, 12 bills have received committee consideration or passed one or both chambers.\nIn the 114th Congress, the House passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029, the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing; Title II, National Cybersecurity Advancement; Title III, Federal Cybersecurity Workforce Assessment; and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House in April 2015, and S. 754, passed by the Senate in October 2015. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "1a1677f7d9bbd1de0418e14ae68c5a34aef944e3", "filename": "files/20180201_R43317_1a1677f7d9bbd1de0418e14ae68c5a34aef944e3.html", "images": {} }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "883f734efefccdc382a065f6f2df4e2a8aecdc62", "filename": "files/20180201_R43317_883f734efefccdc382a065f6f2df4e2a8aecdc62.pdf", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 575430, "date": "2017-11-09", "retrieved": "2017-11-28T14:47:30.410073", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses. \nIn the 115th Congress, 12 bills have received committee consideration or passed one or both chambers.\nIn the 114th Congress, the House passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029, the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing; Title II, National Cybersecurity Advancement; Title III, Federal Cybersecurity Workforce Assessment; and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House in April 2015, and S. 754, passed by the Senate in October 2015. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "483dd4b1c3bedd3a8fb82fd19a6a761fb9e0ba8e", "filename": "files/20171109_R43317_483dd4b1c3bedd3a8fb82fd19a6a761fb9e0ba8e.html", "images": {} }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "da39a3ee5e6b4b0d3255bfef95601890afd80709", "filename": "files/20171109_R43317_da39a3ee5e6b4b0d3255bfef95601890afd80709.pdf", "images": {} } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 462140, "date": "2017-06-23", "retrieved": "2017-06-26T15:51:09.222928", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, 114th, and 115th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 113th, 114th, and 115th Congresses. \nIn the 115th Congress, eight bills have received committee consideration, floor consideration, or passed one or both chambers.\nIn the 114th Congress, the House passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029, the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing; Title II, National Cybersecurity Advancement; Title III, Federal Cybersecurity Workforce Assessment; and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House in April 2015, and S. 754, passed by the Senate in October 2015. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "574bcaebadf3ddce48a883dc0460914bae9fb59d", "filename": "files/20170623_R43317_574bcaebadf3ddce48a883dc0460914bae9fb59d.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "c3083f53b421f2d7986e8f6dd8f4659612049b58", "filename": "files/20170623_R43317_c3083f53b421f2d7986e8f6dd8f4659612049b58.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 461403, "date": "2017-05-18", "retrieved": "2017-05-24T16:18:44.717370", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills changed federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nIn the 115th Congress, eight bills have received committee consideration, floor consideration, or passed one or both chambers.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "f9b6edd32618893aa77a7918788fe944d549edbf", "filename": "files/20170518_R43317_f9b6edd32618893aa77a7918788fe944d549edbf.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "09f6f9438e50b204225f5f66cf943f37e55ecc73", "filename": "files/20170518_R43317_09f6f9438e50b204225f5f66cf943f37e55ecc73.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 461207, "date": "2017-05-12", "retrieved": "2017-05-16T14:28:49.550119", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nIn the 115th Congress, eight bills have received committee consideration, floor consideration, or passed one or both chambers.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "34e00b216b54e565e9c02bbf8c100e16146e0a62", "filename": "files/20170512_R43317_34e00b216b54e565e9c02bbf8c100e16146e0a62.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "ba233c3902dfbedfb8f96316a8050577022d7cfe", "filename": "files/20170512_R43317_ba233c3902dfbedfb8f96316a8050577022d7cfe.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 458188, "date": "2017-01-10", "retrieved": "2017-01-13T15:42:06.430146", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House has passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate has passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "fcf27162c5142e99b0b059b53012e48ea02da114", "filename": "files/20170110_R43317_fcf27162c5142e99b0b059b53012e48ea02da114.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "39a2aae9825ff5a592185ad5d78d990089b4088d", "filename": "files/20170110_R43317_39a2aae9825ff5a592185ad5d78d990089b4088d.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 456603, "date": "2016-10-21", "retrieved": "2016-11-28T21:19:40.205344", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House has passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate has passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "3b96b36037d0401030aa8ba6950fde8e86a445af", "filename": "files/20161021_R43317_3b96b36037d0401030aa8ba6950fde8e86a445af.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "f0db220f9ad422bd1a91cc0255c73eeaa30e98fe", "filename": "files/20161021_R43317_f0db220f9ad422bd1a91cc0255c73eeaa30e98fe.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 454507, "date": "2016-07-26", "retrieved": "2016-09-09T19:07:15.735817", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House has passed eight bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate has passed one bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "7f0fa35d374406b0cb2dd7bc5274e3e940f5cd4f", "filename": "files/20160726_R43317_7f0fa35d374406b0cb2dd7bc5274e3e940f5cd4f.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "9524b6ca2f4ce24f91b12c77d41f567962376973", "filename": "files/20160726_R43317_9524b6ca2f4ce24f91b12c77d41f567962376973.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 452868, "date": "2016-05-24", "retrieved": "2016-06-21T21:15:00.718819", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nThis report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses. Congress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\nIn the 114th Congress, the House has passed eitght bills:\nH.R. 1073, Critical Infrastructure Protection Act.\nH.R. 1560, Protecting Cyber Networks Act.\nH.R. 1731, National Cybersecurity Protection Advancement Act of 2015.\nH.R. 3490, Strengthening State and Local Cyber Crime Fighting Act.\nH.R. 3510, Department of Homeland Security Cybersecurity Strategy Act of 2015.\nH.R. 3869, State and Local Cyber Protection Act of 2015.\nH.R. 3878, Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015.\nH.R. 4743, National Cybersecurity Preparedness Consortium Act of 2016.\nThe Senate has passed 1 bill in the 114th Congress:\nS. 754, Cybersecurity Information Sharing Act of 2015.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation and a discussion of selected legislative proposals in the 114th Congress, see the Cybersecurity Issue Page at http://www.crs.gov.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "9072f553057c16bb98f615242a7a8247f639a551", "filename": "files/20160524_R43317_9072f553057c16bb98f615242a7a8247f639a551.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "0a16d46f34a79137cdd193d07cab1ccd10271fad", "filename": "files/20160524_R43317_0a16d46f34a79137cdd193d07cab1ccd10271fad.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 451897, "date": "2016-04-20", "retrieved": "2016-05-24T19:20:12.069941", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, in the last days of the 113th Congress, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standard9s\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nIn April 2011, the Obama Administration sent Congress legislative proposals that would have given the federal government new authority to ensure that corporations owning assets most critical to the nation\u2019s security and economic prosperity adequately addressed risks posed by cybersecurity threats. This report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses.\n114th Congress Legislation, House, Table 1\n114th Congress Legislation, Senate, Table 2\n113th Congress, Major Legislation, Table 3 and Table 4\n112th Congress, Major Legislation, Table 5 and Table 7\n112th Congress, Senate Floor Debate: S. 3414, Table 6\n112th Congress, House Floor Debate: H.R. 3523, Table 8\nCongress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\n114th Congress, Senate Hearings, Table 9 and Table 10\n114th Congress, House Hearings, Table 11 and Table 12\n113th Congress, House Hearings, Table 14 and Table 15\n113th Congress, House Committee Markups, Table 16\n113th Congress, Senate Hearings, Table 17 and Table 19\n113th Congress, Other Hearings, Table 18 and Table 20\n112th Congress, House Hearings, Table 21 and Table 22\n112th Congress, House Markups, Table 23\n112th Congress, Senate Hearings, Table 24 and Table 25\n112th Congress, Congressional Committee Investigative Reports, Table 26\nOn April 22, 2015, the House passed H.R. 1560, which will provide liability protection to companies that share cyber threat information with the government and other companies so long as personal information is removed before the sharing of such information. On April 23, 2015, the House passed H.R. 1731, which will encourage information sharing with the Department of Homeland Security by protecting entities from civil liabilities. On November 17, 2015, the House passed H.R. 1073 by voice vote, which will secure critical infrastructure against electromagnetic threats. On November 30, 2015, the House passed H.R. 3490, which would establish in the Department of Homeland Security a National Computer Forensics Institute to be operated by the U.S. Secret Service for the dissemination of homeland security information related to the investigation and prevention of cyber and electronic crime.\nOn October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (CISA), by a vote of 74-21 (Roll call vote 291). The House approved companion legislation in April, so the cybersecurity measure is now on track to reach President Obama's desk and be signed into law, once a conference report is negotiated. CISA attempts to open up communication channels between industry and federal agencies by offering legal immunity to companies that share data with the government. For more information on what is covered in the Senate bill, see CRS Legal Sidebar WSLG1429, Senate Passes Cybersecurity Information Sharing Bill \u2013What\u2019s Next?, by Andrew Nolan. \nOn November 30, 2015, the House passed H.R. 3490, which would establish in the Department of Homeland Security a National Computer Forensics Institute to be operated by the U.S. Secret Service for the dissemination of homeland security information related to the investigation and prevention of cyber and electronic crime. On December 10, 2015, the House passed H.R. 3869, the State and Local Cyber Protection Act of 2015, which requires the Department of Homeland Security's (DHS's) national cybersecurity and communications integration center (NCCIC) to assist state and local governments with cybersecurity, and on December 16, 2015, the House passed H.R. 3878, the Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015, which requires DHS to seek to enhance cybersecurity situational awareness and information sharing between and with maritime security stakeholders from federal, state, local, and tribal governments, public safety and emergency response agencies, law enforcement and security organizations, maritime industry participants, port owners and operators, and maritime terminal owners and operators.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation in the 114th Congress, see CRS Report R44069, Cybersecurity and Information Sharing: Comparison of H.R. 1560 (PCNA and NCPAA) and S. 754 (CISA), by Eric A. Fischer.\nFor a side-by-side comparison of cybersecurity and information legislation in the 114th Congress, see CRS Report R43996, Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House, by Eric A. Fischer and Stephanie M. Logan.\nFor an economic analysis of information-sharing legislation, see CRS Report R43821, Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis, by N. Eric Weiss.\nFor a discussion of selected legislative proposals in the 112th and 113th Congresses, see CRS Report R42114, Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation, by Eric A. Fischer.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security. \nExecutive Orders and Presidential Directives, Table 27\nFor a selected list of authoritative reports and resources on cybersecurity, see CRS Report R42507, Cybersecurity: Authoritative Reports and Resources, by Topic, by Rita Tehan. For selected cybersecurity data, statistics, and glossaries, see CRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "73da1483c2ca5cb181e1cf0343812102a2964b53", "filename": "files/20160420_R43317_73da1483c2ca5cb181e1cf0343812102a2964b53.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "4f8d78e7b664380533d3518856295de7be7194bb", "filename": "files/20160420_R43317_4f8d78e7b664380533d3518856295de7be7194bb.pdf", "images": null } ], "topics": [] }, { "source": "EveryCRSReport.com", "id": 451386, "date": "2016-03-30", "retrieved": "2016-04-06T16:50:58.140169", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic.\nDespite many recommendations made over the past decade, most major legislative provisions relating to cybersecurity had been enacted prior to 2002. However, on December 18, 2014, in the last days of the 113th Congress, five cybersecurity bills were signed by the President. These bills change federal cybersecurity programs in a number of ways:\ncodifying the role of the National Institute of Standards and Technology (NIST) in developing a \u201cvoluntary, industry-led set of standards\u201d to reduce cyber risk; \ncodifying the Department of Homeland Security\u2019s (DHS\u2019s) National Cybersecurity and Communications Integration Center as a hub for interactions with the private sector;\nupdating the Federal Information Security Management Act (FISMA) by requiring the Office of Management and Budget (OMB) to \u201celiminate ... inefficient and wasteful reports\u201d; and\nrequiring DHS to develop a \u201ccomprehensive workforce strategy\u201d within a year and giving DHS new authorities for cybersecurity hiring.\nIn April 2011, the Obama Administration sent Congress legislative proposals that would have given the federal government new authority to ensure that corporations owning assets most critical to the nation\u2019s security and economic prosperity adequately addressed risks posed by cybersecurity threats. This report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses.\n114th Congress Legislation, House, Table 1\n114th Congress Legislation, Senate, Table 2\n113th Congress, Major Legislation, Table 3 and Table 4\n112th Congress, Major Legislation, Table 5 and Table 7\n112th Congress, Senate Floor Debate: S. 3414, Table 6\n112th Congress, House Floor Debate: H.R. 3523, Table 8\nCongress has held cybersecurity hearings every year since 2001. This report also provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses.\n114th Congress, Senate Hearings, Table 9 and Table 10\n114th Congress, House Hearings, Table 11 and Table 12\n113th Congress, House Hearings, Table 14 and Table 15\n113th Congress, House Committee Markups, Table 16\n113th Congress, Senate Hearings, Table 17 and Table 19\n113th Congress, Other Hearings, Table 18 and Table 20\n112th Congress, House Hearings, Table 21 and Table 22\n112th Congress, House Markups, Table 23\n112th Congress, Senate Hearings, Table 24 and Table 25\n112th Congress, Congressional Committee Investigative Reports, Table 26\nOn April 22, 2015, the House passed H.R. 1560, which will provide liability protection to companies that share cyber threat information with the government and other companies so long as personal information is removed before the sharing of such information. On April 23, 2015, the House passed H.R. 1731, which will encourage information sharing with the Department of Homeland Security by protecting entities from civil liabilities. On November 17, 2015, the House passed H.R. 1073 by voice vote, which will secure critical infrastructure against electromagnetic threats. On November 30, 2015, the House passed H.R. 3490, which would establish in the Department of Homeland Security a National Computer Forensics Institute to be operated by the U.S. Secret Service for the dissemination of homeland security information related to the investigation and prevention of cyber and electronic crime.\nOn October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (CISA), by a vote of 74-21 (Roll call vote 291). The House approved companion legislation in April, so the cybersecurity measure is now on track to reach President Obama's desk and be signed into law, once a conference report is negotiated. CISA attempts to open up communication channels between industry and federal agencies by offering legal immunity to companies that share data with the government. For more information on what is covered in the Senate bill, see CRS Legal Sidebar WSLG1429, Senate Passes Cybersecurity Information Sharing Bill \u2013What\u2019s Next?, by Andrew Nolan. \nOn November 30, 2015, the House passed H.R. 3490, which would establish in the Department of Homeland Security a National Computer Forensics Institute to be operated by the U.S. Secret Service for the dissemination of homeland security information related to the investigation and prevention of cyber and electronic crime. On December 10, 2015, the House passed H.R. 3869, the State and Local Cyber Protection Act of 2015, which requires the Department of Homeland Security's (DHS's) national cybersecurity and communications integration center (NCCIC) to assist state and local governments with cybersecurity, and on December 16, 2015, the House passed H.R. 3878, the Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015, which requires DHS to seek to enhance cybersecurity situational awareness and information sharing between and with maritime security stakeholders from federal, state, local, and tribal governments, public safety and emergency response agencies, law enforcement and security organizations, maritime industry participants, port owners and operators, and maritime terminal owners and operators.\nOn December 18, 2015, H.R. 2029 the Consolidated Appropriations Act, was signed into public law (P.L. 114-113). The omnibus law\u2019s cybersecurity provisions are located in Division N (Cybersecurity Act of 2015), including Title I, Cybersecurity Information Sharing, Title II, National Cybersecurity Advancement, Title III, Federal Cybersecurity Workforce Assessment, and Title IV, Other Cyber Matters. The measure represents a compromise between the House and Senate intelligence committees and the House Homeland Security Committee. It includes various components of three separate information sharing bills: H.R. 1560 and H.R. 1731, passed by the House earlier this year, and S. 754, passed by the Senate in October. The bill encourages private companies to voluntarily share information about cyber threats with each other as well as the government. Firms that participate in the information sharing will receive liability protection.\nFor a comparison of House and Senate information-sharing legislation in the 114th Congress, see CRS Report R44069, Cybersecurity and Information Sharing: Comparison of H.R. 1560 (PCNA and NCPAA) and S. 754 (CISA), by Eric A. Fischer.\nFor a side-by-side comparison of cybersecurity and information legislation in the 114th Congress, see CRS Report R43996, Cybersecurity and Information Sharing: Comparison of H.R. 1560 and H.R. 1731 as Passed by the House, by Eric A. Fischer and Stephanie M. Logan.\nFor an economic analysis of information-sharing legislation, see CRS Report R43821, Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis, by N. Eric Weiss.\nFor a discussion of selected legislative proposals in the 112th and 113th Congresses, see CRS Report R42114, Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation, by Eric A. Fischer.\nExecutive orders authorize the President to manage federal government operations. Presidential directives pertain to all aspects of U.S. national security policy as authorized by the President. This report provides a list of executive orders and presidential directives pertaining to information and computer security. \nExecutive Orders and Presidential Directives, Table 27\nFor a selected list of authoritative reports and resources on cybersecurity, see CRS Report R42507, Cybersecurity: Authoritative Reports and Resources, by Topic, by Rita Tehan. For selected cybersecurity data, statistics, and glossaries, see CRS Report R43310, Cybersecurity: Data, Statistics, and Glossaries, by Rita Tehan.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R43317", "sha1": "d16898eff2db8580808bd3c92d91dca1a161298a", "filename": "files/20160330_R43317_d16898eff2db8580808bd3c92d91dca1a161298a.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R43317", "sha1": "ce44e677b75f5fd20f07a35d8cfeee335e7ad933", "filename": "files/20160330_R43317_ce44e677b75f5fd20f07a35d8cfeee335e7ad933.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc824775/", "id": "R43317_2016Jan15", "date": "2016-01-15", "retrieved": "2016-04-04T14:48:17", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20160115_R43317_4d703ee9062a68683e727910d7f3ab3cf559b5a5.pdf" }, { "format": "HTML", "filename": "files/20160115_R43317_4d703ee9062a68683e727910d7f3ab3cf559b5a5.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc795396/", "id": "R43317_2015Nov17", "date": "2015-11-17", "retrieved": "2016-01-13T14:26:20", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20151117_R43317_6234e5bdd9388bb7f536c171e3456d59fc73db3a.pdf" }, { "format": "HTML", "filename": "files/20151117_R43317_6234e5bdd9388bb7f536c171e3456d59fc73db3a.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc795583/", "id": "R43317_2015Oct29", "date": "2015-10-29", "retrieved": "2016-01-13T14:26:20", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses and a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20151029_R43317_58032d4b6a288a70fc94fc14b4df562b76f79c38.pdf" }, { "format": "HTML", "filename": "files/20151029_R43317_58032d4b6a288a70fc94fc14b4df562b76f79c38.html" } ], "topics": [ { "source": "LIV", "id": "Congress", "name": "Congress" }, { "source": "LIV", "id": "Congressional liaison", "name": "Congressional liaison" }, { "source": "LIV", "id": "Executive departments", "name": "Executive departments" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc795375/", "id": "R43317_2015Oct21", "date": "2015-10-21", "retrieved": "2016-01-13T14:26:20", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20151021_R43317_a70692e7c415af4e5790a7ab6d86c28e2ec2174f.pdf" }, { "format": "HTML", "filename": "files/20151021_R43317_a70692e7c415af4e5790a7ab6d86c28e2ec2174f.html" } ], "topics": [ { "source": "LIV", "id": "Congress", "name": "Congress" }, { "source": "LIV", "id": "Congressional liaison", "name": "Congressional liaison" }, { "source": "LIV", "id": "Executive departments", "name": "Executive departments" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc795812/", "id": "R43317_2015Oct02", "date": "2015-10-02", "retrieved": "2016-01-13T14:26:20", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity legislation in the 112th, 113th, and 114th Congresses.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20151002_R43317_30b6b0c1156e8e961cc30cc2085ceafd8b87816a.pdf" }, { "format": "HTML", "filename": "files/20151002_R43317_30b6b0c1156e8e961cc30cc2085ceafd8b87816a.html" } ], "topics": [ { "source": "LIV", "id": "Congress", "name": "Congress" }, { "source": "LIV", "id": "Congressional liaison", "name": "Congressional liaison" }, { "source": "LIV", "id": "Executive departments", "name": "Executive departments" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc743621/", "id": "R43317_2015Sep08", "date": "2015-09-08", "retrieved": "2015-10-20T21:35:54", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides a list of executive orders and presidential directives pertaining to information and computer security. Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have various targets, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists; additionally attributing an attack to a specific location can be difficult, which may make responding problematic.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150908_R43317_3eeae3e4e345650dbe8f62c56e41f2403701a220.pdf" }, { "format": "HTML", "filename": "files/20150908_R43317_3eeae3e4e345650dbe8f62c56e41f2403701a220.html" } ], "topics": [ { "source": "LIV", "id": "Congress", "name": "Congress" }, { "source": "LIV", "id": "Congressional liaison", "name": "Congressional liaison" }, { "source": "LIV", "id": "Executive departments", "name": "Executive departments" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc743631/", "id": "R43317_2015Aug18", "date": "2015-08-18", "retrieved": "2015-10-20T21:35:54", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity committee hearings and legislation from the 112th, 113th, and 114th Congresses, as well as a list of executive orders and presidential directives pertaining to information and computer security. Summaries of activities and findings are included as a series of tables.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150818_R43317_2c5e5ecdc1e1080c9b77253bc90601d98c3536d0.pdf" }, { "format": "HTML", "filename": "files/20150818_R43317_2c5e5ecdc1e1080c9b77253bc90601d98c3536d0.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc700752/", "id": "R43317_2015Jul15", "date": "2015-07-15", "retrieved": "2015-08-27T16:20:31", "title": "Cybersecurity: Legislation, Hearings, and Executive Branch Documents", "summary": "This report provides links to cybersecurity-related committee hearings in the 112th and 113th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20150715_R43317_651c09d07695994c123423023a279095070d835b.pdf" }, { "format": "HTML", "filename": "files/20150715_R43317_651c09d07695994c123423023a279095070d835b.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" } ] } ], "topics": [ "Economic Policy", "Foreign Affairs", "National Defense" ] }