US HB3402 | 2015-2016 | 114th Congress
Status
Spectrum: Partisan Bill (Democrat 1-0)
Status: Introduced on July 29 2015 - 25% progression, died in committee
Action: 2015-07-29 - Referred to the House Committee on Oversight and Government Reform.
Pending: House Oversight And Government Reform Committee
Text: Latest bill text (Introduced) [PDF]
Status: Introduced on July 29 2015 - 25% progression, died in committee
Action: 2015-07-29 - Referred to the House Committee on Oversight and Government Reform.
Pending: House Oversight And Government Reform Committee
Text: Latest bill text (Introduced) [PDF]
Summary
Federal Information Security Management Reform Act of 2015 Requires the Department of Homeland Security (DHS), in administering federal agencies' implementation of information system security policies, to: (1) operate consolidated intrusion detection, prevention, or protective capabilities and use of associated countermeasures to protect agency information and systems from security threats; (2) provide incident detection, analysis, mitigation, and response information and remote or onsite technical assistance; (3) develop and conduct impact assessments in consultation with other agencies and private entities; (4) foster development of technologies for use across multiple agencies in conjunction with other agencies and the private sector; and (5) coordinate such information security policies with standards for national security systems and policies issued by the Department of Defense (DOD) and the Director of National Intelligence. Authorizes the DHS Secretary to acquire, intercept, retain, use, and disclose communications and system traffic transiting to or from or stored on agency information systems and deploy countermeasures if the Secretary certifies that: (1) the measures are reasonably necessary to protect agency information systems from security threats; (2) content of communications will not be retained, and traffic will not be subject to countermeasures, unless associated with a known or reasonably suspected information security threat; (3) the information will be used for law enforcement purposes only with the Attorney General's approval when the information is evidence of a crime; (4) system users have been notified of the potential for such an acquisition or disclosure; and (5) the procedures have been approved by the Attorney General. Allows agency heads to disclose such information to the Secretary notwithstanding any other law that would otherwise restrict or prevent such disclosures. Provides liability protections to private entities authorized to assist the Secretary for such purposes. Authorizes the Secretary to: (1) issue a directive to an agency to take any lawful action with respect to the operation of a system that maintains agency information in response to a known or reasonably suspected information security threat, vulnerability, or incident that represents a substantial threat to an agency's information security; or (2) authorize, without prior consultation with the affected agency, the use of protective capabilities under the Secretary's control if there is an imminent threat and a directive is unlikely to be timely. Exempts DOD and the intelligence community from such procedures.
Title
Federal Information Security Management Reform Act of 2015
Sponsors
Rep. C.A. Ruppersberger [D-MD] |
History
Date | Chamber | Action |
---|---|---|
2015-07-29 | House | Referred to the House Committee on Oversight and Government Reform. |
2015-07-29 | House | Introduced in House |
Same As/Similar To
SB1828 (Same As) 2015-07-22 - Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (Sponsor introductory remarks on measure: CR S5456-5458)
HB3313 (Related) 2015-08-11 - Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.
HB3313 (Related) 2015-08-11 - Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.
Subjects
Administrative law and regulatory procedures
Computer security and identity theft
Criminal investigation, prosecution, interrogation
Department of Homeland Security
Government information and archives
Government operations and politics
Technology assessment
Computer security and identity theft
Criminal investigation, prosecution, interrogation
Department of Homeland Security
Government information and archives
Government operations and politics
Technology assessment
US Congress State Sources
Type | Source |
---|---|
Summary | https://www.congress.gov/bill/114th-congress/house-bill/3402/all-info |
Text | https://www.congress.gov/114/bills/hr3402/BILLS-114hr3402ih.pdf |