{ "id": "RL33273", "type": "CRS Report", "typeId": "REPORTS", "number": "RL33273", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 344272, "date": "2008-06-06", "retrieved": "2016-04-07T03:22:50.823772", "title": "Data Security: Federal Legislative Approaches", "summary": "During the First Session of the 110th Congress, three data security bills were reported favorably out of Senate committees\u2014S. 239 (Feinstein), a bill to require federal agencies, and persons engaged in interstate commerce, in possession of data containing sensitive personally identifiable information, to disclose any breach of such information; S. 495 (Leahy), a bill to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal penalties, law enforcement assistance, and other protections against security breaches, fraudulent access, and misuse of personally identifiable information; and S. 1178 (Inouye), a bill to strengthen data protection and safeguards, require data breach notification, and further prevent identity theft. On June 3, 2008, H.R. 4791 (Clay), a bill to strengthen requirements for ensuring the effectiveness of information security controls over information resources that support federal operations and assets and to protect personally identifiable information of individuals that is maintained in or transmitted by federal agency information systems, was passed by the House by voice vote under suspension of the rules.\nOther data security bills were also introduced including S. 1202 (Sessions), S. 1260 (Carper), S. 1558 (Coleman), H.R. 516 (Davis), H.R. 836 (Smith), H.R. 958 (Rush), H.R. 1685 (Price), H.R. 2124 (Davis), and H.R. 4175 (Conyers).\nThis report discusses the core areas addressed in federal legislation. For related reports, see CRS Report RL34120, Federal Information Security and Data Breach Notification Laws, by Gina Stevens. Also see the Current Legislative Issues web page for \u201cPrivacy and Data Security\u201d available at http://apps.crs.gov/\u00bfcli/\u00bfcli.aspx?PRDS_CLI_ITEM_ID=2105. This report will be updated as warranted.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL33273", "sha1": "cac4c58200a15c51bc46672128875a2aaac1dc21", "filename": "files/20080606_RL33273_cac4c58200a15c51bc46672128875a2aaac1dc21.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL33273", "sha1": "5db3018f75704c98d9d7b85644fe65ac334feb41", "filename": "files/20080606_RL33273_5db3018f75704c98d9d7b85644fe65ac334feb41.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc819097/", "id": "RL33273_2008Jan30", "date": "2008-01-30", "retrieved": "2016-03-19T13:57:26", "title": "Data Security: Federal Legislative Approaches", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20080130_RL33273_a06d9ac7eb3b68f893311abb73466f6947bd21cc.pdf" }, { "format": "HTML", "filename": "files/20080130_RL33273_a06d9ac7eb3b68f893311abb73466f6947bd21cc.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815008/", "id": "RL33273_2007Jan25", "date": "2007-01-25", "retrieved": "2016-03-19T13:57:26", "title": "Data Security: Federal Legislative Approaches", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070125_RL33273_f852c713dac9dd8b955dbc9f09fdefff6b7071fc.pdf" }, { "format": "HTML", "filename": "files/20070125_RL33273_f852c713dac9dd8b955dbc9f09fdefff6b7071fc.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812132/", "id": "RL33273_2006May09", "date": "2006-05-09", "retrieved": "2016-03-19T13:57:26", "title": "Data Security: Federal Legislative Approaches", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060509_RL33273_cc7090e5be7c91543a076ccb72c9f182de302591.pdf" }, { "format": "HTML", "filename": "files/20060509_RL33273_cc7090e5be7c91543a076ccb72c9f182de302591.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs9019/", "id": "RL33273 2006-02-09", "date": "2006-02-09", "retrieved": "2006-07-03T15:13:35", "title": "Data Security: Federal Legislative Approaches", "summary": "This report discusses the core areas addressed in federal legislation, including the scope of coverage (who is covered and what information is covered); data privacy and security safeguards for sensitive personal information; requirements for security breach notification (when, how, triggers, frequency, and exceptions); restrictions on social security numbers (collection, use, and sale); credit freezes on consumer reports; identity theft penalties; causes of action; and preemption.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060209_RL33273_2aee173edaa2197c872807b9157b4c76941e3167.pdf" }, { "format": "HTML", "filename": "files/20060209_RL33273_2aee173edaa2197c872807b9157b4c76941e3167.html" } ], "topics": [ { "source": "LIV", "id": "Law", "name": "Law" }, { "source": "LIV", "id": "Electronic data processing - Security measures - Law and legislation", "name": "Electronic data processing - Security measures - Law and legislation" }, { "source": "LIV", "id": "Right of privacy", "name": "Right of privacy" }, { "source": "LIV", "id": "Electronic data processing - Security measures - State laws", "name": "Electronic data processing - Security measures - State laws" }, { "source": "LIV", "id": "Civil liberties", "name": "Civil liberties" }, { "source": "LIV", "id": "Technology", "name": "Technology" } ] } ], "topics": [] }