CYBERSECURITY INFORMATION SHARING ACT
Amendments
Enact (S. 754), S6243, S6244 [3AU], S6300, S6301, S6303, S6304, S6305, S6306, S6307, S6309, S6310, S6311, S6312, S6313, S6315, S6316, S6320, S6321, S6322 [4AU], S6406, S6410, S6411, S6412, S6415, S6416, S6419, S6420, S6421 [5AU], S7305 [19OC], S7333, S7334, S7335, S7336, S7339, S7347, S7353, S7365 [20OC], S7381, S7415, S7416, S7417, S7418, S7419, S7422 [21OC], S7508, S7549 [27OC]
Articles and editorials
Cyber Defense Bill, at Last—Data Sharing Can Improve Security and Consumer Privacy, S7500 [27OC]
Senate Should Take a Crucial First Step on Cybersecurity, S7500 [27OC]
Bills and resolutions
Enact (see S. 754), S1585 [17MR]
Cloture motions
Enact (S. 754), S7342 [20OC], S7434 [22OC]
——— motion to proceed, S6228 [3AU]
Letters
Ensure personally identifiable information is stripped out of shared cybersecurity information if the entities reasonably believe the information is not related to a cyber threat: Adam Brandon, FreedomWorks (organization), S7504 [27OC]
Provisions: Dean C. Garfield, Information Technology Industry Council, S6259 [4AU]
——— James C. Ballentine, American Bankers Association, S6258 [4AU]
——— Protecting America’s Cyber Networks Coalition, S6259 [4AU]
——— R. Bruce Josten, U.S. Chamber of Commerce, S6260 [4AU]
——— several electric power organizations, S6258 [4AU]
——— several financial industry organizations, S6258 [4AU]
——— Victoria A. Espinel, BSA/The Software Alliance, S6259 [4AU]
Lists
Organizations supporting S. 754, provisions, S6330 [5AU], S7329 [20OC]
Motions
Enact (S. 754), S6228 [3AU]
Remarks in House
Enact (S. 754), H9686 [17DE]
Remarks in Senate
Computers: clarify definition of ‘‘access without authorization,’’ eliminate redundant laws allowing charges to be brought for violations of such access, and reform penalties for violations, S7336 [20OC]
Congress: accomplishments of the 114th Congress, S8325 [3DE], S8433–S8435 [7DE]
Dept. of Homeland Security: codify the National Cybersecurity and Communications Integration Center, S7389 [21OC]
——— conduct automated privacy scrub in real time of irrelevant or erroneous data from cyber threat information, S7390 [21OC]
——— require entities that operate designated critical infrastructure to report cybersecurity intrusions that could result in catastrophic effects on public health, safety, economic security, or national security, S6338 [5AU], S7483 [26OC]
——— review all cyber threat indicators and countermeasures in order to remove certain personal information, S7520 [27OC]
——— strengthen ability to detect and prevent intrusions against, and use countermeasures to protect, Government agency information systems, S6338 [5AU], S7482 [26OC]
Enact (S. 754), S4557, S4558 [24JN], S7327–S7340 [20OC], S7368, S7374, S7376–S7379, S7381, S7383–S7398, S7404, S7407 [21OC], S7427, S7430–S7435, S7452 [22OC], S7479, S7481–S7484, S7486, S7496 [26OC], S7497–S7505, S7507–S7512, S7518–S7522 [27OC], S7551, S7557 [28OC], S7802 [5NO], S8197, S8198 [1DE]
——— motion to proceed, S6228 [3AU], S6247, S6249–S6251, S6257–S6264, S6266, S6267, S6270–S6272, S6278 [4AU], S6327–S6331, S6337–S6339, S6342–S6344 [5AU]
——— unanimous-consent agreement, S7407 [21OC], S7439 [22OC], S7508 [27OC]
——— unanimous-consent request, S4086 [11JN], S6266 [4AU], S7336 [20OC], S7407 [21OC]
Federal agencies and departments: improve Federal network security and authorize and enhance an existing intrusion detection and prevention system for civilian Federal networks, S7391 [21OC], S7433, S7434 [22OC]
——— require Inspectors General and GAO to report on use of logical access controls and other security practices to safeguard information on Federal computer systems, S7337 [20OC]
Intelligence services: clarify definitions of ‘‘cybersecurity threat’’ and ‘‘cyber threat indicator’’, S7496 [26OC], S7509 [27OC]
——— ensure personally identifiable information is stripped out of shared cybersecurity information if the entities reasonably believe the information is not related to a cyber threat, S6271 [4AU], S7387 [21OC], S7430 [22OC], S7486 [26OC], S7502–S7505 [27OC]
——— prohibit Freedom of Information Act exemption relative to enhanced sharing of information about cybersecurity threats, S7507 [27OC]
——— prohibit liability immunity from applying to private entities that break user or privacy agreements with customers, S7435 [22OC]
——— prohibit trafficking of financial information, increase penalties for intrusion on critical infrastructure, and remove botnets, S7388, S7389 [21OC]
——— provide liability protection to businesses that share cybersecurity threats with FBI or the Secret Service rather than just Dept. of Homeland Security, S7511, S7519–S7521 [27OC]
Land and Water Conservation Fund: reauthorize, S7407 [21OC]
Sunset, S7404 [21OC], S7509 [27OC]
Reports filed
Provisions: Committee on Intelligence (Senate, Select) (S. 754), S1585 [17MR]
——— Committee on Intelligence (Senate, Select) (S. 754) (S. Rept. 114–32), S2220 [15AP]
Rulings of the Chair
Enact (S. 754), S7503 [27OC]
Texts of