[Congressional Record Volume 157, Number 142 (Thursday, September 22, 2011)]
[Senate]
[Page S5902]
From the Congressional Record Online through the Government Publishing Office [www.gpo.gov]




                         REPORTS OF COMMITTEES

  The following reports of committees were submitted:

       By Mr. HARKIN, from the Committee on Appropriations, 
     without amendment:
       S. 1599. An original bill making appropriations for 
     Departments of Labor, Health and Human Services, and 
     Education, and related agencies for the fiscal year ending 
     September 30, 2012, and for other purposes (Rept. No. 112-
     84).
       By Mr. LEAHY, from the Committee on Appropriations, without 
     amendment:
       S. 1601. An original bill making appropriations for the 
     Department of State, foreign operations, and related programs 
     for the fiscal year ending September 30, 2012, and for other 
     purposes (Rept. No. 112-85).
       By Mr. INOUYE, from the Committee on Appropriations:
       Special Report entitled ``Further Revised Allocation to 
     Subcommittees of Budget Totals for Fiscal Year 2012'' (Rept. 
     No. 112-86).
       By Mr. LEAHY, from the Committee on the Judiciary, with an 
     amendment:
       H.R. 2480. A bill to amend title 5, United States Code, to 
     authorize appropriations for the Administrative Conference of 
     the United States for fiscal years 2012, 2013, and 2014, and 
     for other purposes.
       By Mr. LEAHY, from the Committee on the Judiciary, with an 
     amendment in the nature of a substitute:
       S. 1151. A bill to prevent and mitigate identity theft, to 
     ensure privacy, to provide notice of security breaches, and 
     to enhance criminal penalties, law enforcement assistance, 
     and other protections against security breaches, fraudulent 
     access, and misuse of personally identifiable information.
       S. 1535. A bill to protect consumers by mitigating the 
     vulnerability of personally identifiable information to theft 
     through a security breach, providing notice and remedies to 
     consumers in the wake of such a breach, holding companies 
     accountable for preventable breaches, facilitating the 
     sharing of post-breach technical information between 
     companies, and enhancing criminal and civil penalties and 
     other protections against the unauthorized collection or use 
     of personally identifiable information.

                          ____________________