This document provides a report on a resolution to bring two bills to a vote in the House of Representatives. The resolution provides structured rules for debating and voting on the Cyber Intelligence Sharing and Protection Act (CISPA), allowing for amendments, and the Interest Rate Reduction Act. It also allows for consideration of other cybersecurity bills and appropriations measures. The report explains the resolution's provisions, waivers of procedural rules, and 13 amendments allowed for CISPA concerning its scope, privacy protections, and definitions.
This document is a bill introduced in the North Carolina General Assembly to provide aid to North Carolinians in response to the COVID-19 crisis. It establishes reserves and funds using federal relief money. Key allocations include $50 million to purchase medical supplies, $6 million to food banks, $15 million to assist facilities serving vulnerable older/disabled residents, and $25 million to community colleges for online learning and campus sanitation.
Senate spending bill after appropriations committeeEducationNC
This document is a proposed bill from the General Assembly of North Carolina providing aid to North Carolinians in response to the COVID-19 crisis. It establishes reserves and funds using federal relief money, appropriates over $623 million to the Department of Health and Human Services and other agencies, and allocates the funds for purposes like medical supplies, food banks, foster care assistance, agriculture, healthcare clinics and community colleges.
The document provides state information for Illinois' 2012-2013 block grant application including:
- The Illinois Department of Human Services Division of Mental Health will be the grantee.
- Contact information is provided for Mary Smith, who is responsible for the application submission.
- The most recent state expenditure period that is closed out is July 1, 2009 to June 30, 2010.
2015 amendments to the manual for courts martial eo13696RepentSinner
This executive order amends the Manual for Courts-Martial to update rules related to preliminary hearings and pretrial confinement procedures. Key changes include: (1) Requiring general courts-martial jurisdiction for certain sexual offenses; (2) Providing victims' rights to notice and participation in pretrial confinement reviews; and (3) Requiring disclosure of evidence to the defense following direction of a preliminary hearing. The order takes effect immediately but does not invalidate prior actions or make past acts punishable.
This bill proposes numerous amendments to the Virgin Islands Code related to election processes. Key changes include: 1) defining "provisional ballot" and updating the definition of "vote"; 2) prohibiting board of elections members who have filed for other offices from voting or participating in board activities; 3) increasing compensation for the board chairman and standardizing witness fees; 4) requiring development of a computerized centralized voter registration list; 5) allowing electronic compilation of voter registration information; 6) mandating coordination between elections officials and law enforcement on voter verification; and 7) increasing various penalties related to elections to between $1,000-$5,000. The bill aims to modernize and reform Virgin Islands election laws.
This document is an enrolled copy of House Bill 164 from the 2014 General Session of the Utah Legislature. It proposes an interstate compact to establish a commission to consider mechanisms for transferring federal public lands to state control. Key provisions include establishing membership and procedures for the compact commission, designating a compact administrator, defining funding sources, and setting goals of securing state sovereignty and jurisdiction over western public lands. The bill enacts the full text of the proposed Interstate Compact on the Transfer of Public Lands.
This section of the Information Technology Act 2000 establishes penalties for unauthorized access to or damage of computer systems. It outlines various offenses including accessing a computer without permission, downloading or copying data without authorization, introducing viruses, damaging systems, disrupting access, assisting unauthorized access, and altering or destroying computer information. Individuals who commit such offenses without permission can be held liable and required to pay damages in compensation to affected persons.
This document is a bill introduced in the North Carolina General Assembly to provide aid to North Carolinians in response to the COVID-19 crisis. It establishes reserves and funds using federal relief money. Key allocations include $50 million to purchase medical supplies, $6 million to food banks, $15 million to assist facilities serving vulnerable older/disabled residents, and $25 million to community colleges for online learning and campus sanitation.
Senate spending bill after appropriations committeeEducationNC
This document is a proposed bill from the General Assembly of North Carolina providing aid to North Carolinians in response to the COVID-19 crisis. It establishes reserves and funds using federal relief money, appropriates over $623 million to the Department of Health and Human Services and other agencies, and allocates the funds for purposes like medical supplies, food banks, foster care assistance, agriculture, healthcare clinics and community colleges.
The document provides state information for Illinois' 2012-2013 block grant application including:
- The Illinois Department of Human Services Division of Mental Health will be the grantee.
- Contact information is provided for Mary Smith, who is responsible for the application submission.
- The most recent state expenditure period that is closed out is July 1, 2009 to June 30, 2010.
2015 amendments to the manual for courts martial eo13696RepentSinner
This executive order amends the Manual for Courts-Martial to update rules related to preliminary hearings and pretrial confinement procedures. Key changes include: (1) Requiring general courts-martial jurisdiction for certain sexual offenses; (2) Providing victims' rights to notice and participation in pretrial confinement reviews; and (3) Requiring disclosure of evidence to the defense following direction of a preliminary hearing. The order takes effect immediately but does not invalidate prior actions or make past acts punishable.
This bill proposes numerous amendments to the Virgin Islands Code related to election processes. Key changes include: 1) defining "provisional ballot" and updating the definition of "vote"; 2) prohibiting board of elections members who have filed for other offices from voting or participating in board activities; 3) increasing compensation for the board chairman and standardizing witness fees; 4) requiring development of a computerized centralized voter registration list; 5) allowing electronic compilation of voter registration information; 6) mandating coordination between elections officials and law enforcement on voter verification; and 7) increasing various penalties related to elections to between $1,000-$5,000. The bill aims to modernize and reform Virgin Islands election laws.
This document is an enrolled copy of House Bill 164 from the 2014 General Session of the Utah Legislature. It proposes an interstate compact to establish a commission to consider mechanisms for transferring federal public lands to state control. Key provisions include establishing membership and procedures for the compact commission, designating a compact administrator, defining funding sources, and setting goals of securing state sovereignty and jurisdiction over western public lands. The bill enacts the full text of the proposed Interstate Compact on the Transfer of Public Lands.
This section of the Information Technology Act 2000 establishes penalties for unauthorized access to or damage of computer systems. It outlines various offenses including accessing a computer without permission, downloading or copying data without authorization, introducing viruses, damaging systems, disrupting access, assisting unauthorized access, and altering or destroying computer information. Individuals who commit such offenses without permission can be held liable and required to pay damages in compensation to affected persons.
State of North Dakota's Unopposed Motion to Intervene as Petitioner; State of Wyoming v. United States Department of the Interior; Sally Jewell, in her capacity as Secretary of the Interior; Bureau of Land Management; and Neil Kornze, in his capacity as Director, Bureau of Land Management
Steven Duesing, Nicole Mathis v. The Attorney General of CanadaGuy Boulianne
This is an application for judicial review of a decision by the Minister of Health to quarantine asymptomatic Canadians in federal facilities without due process. The applicants, Steven Duesing and Nicole Mathis, seek an interlocutory injunction suspending mandatory confinement in federal facilities and releasing those currently confined. They also seek declarations that the decision violates sections of the Charter and is unreasonable as it does not balance rights and freedoms. The grounds for the application are that the federal government has not ensured there are no reasonable alternatives to detaining Canadians in facilities against their will.
This document summarizes the Dowry Prohibition Act of 1961 in India, which aims to prohibit the practice of dowry. Some key points:
- It defines dowry as any property or valuable security given by one party to a marriage to the other party, before, during or after the marriage. This does not include customary gifts or dower/mahr for Muslims.
- Giving or taking dowry is punishable by imprisonment of at least 5 years and a fine. Demanding dowry is punishable by 6 months to 2 years imprisonment and a fine.
- Advertising property/money shares for marriage is punishable by 6 months to 5 years imprisonment and a fine.
Attorney Ethics: An Update from the 85th Legislative SessionTWCA
The document summarizes several bills presented at the TWCA Mid-Year Conference on June 16, 2017. HB 53 concerns settlements against governmental units over $30,000 that contain non-disclosure clauses. HB 776 requires removing home addresses from financial disclosure statements. HB 1701 adds requirements for investment policies provided to business organizations. HB 3047 addresses participation in meetings by videoconference. HB 3107 establishes conditions for withdrawn public information requests. The document also provides hypothetical ethics scenarios and summarizes SB 79, SB 255, and SB 302, which concern public information requests, procurement training, and Sunset Advisory Commission reviews.
The Civil Rights Act of 1991 amends the 1964 Civil Rights Act to provide additional protections and remedies against discrimination. Key provisions include allowing compensatory and punitive damages for intentional employment discrimination, codifying standards for disparate impact cases, and facilitating challenges to employment practices resulting from consent decrees. The act aims to strengthen federal civil rights protections and respond to Supreme Court decisions that weakened anti-discrimination laws.
This document discusses Wisconsin municipal OWI law and jurisdiction over OWI offenses. It provides an overview of municipal court jurisdiction over first offense OWIs as civil forfeitures. It also discusses limitations on municipal court jurisdiction if a valid prior conviction exists. The document outlines circuit court jurisdiction over first offense OWIs and contradictory appellate court opinions on jurisdiction if a prior conviction exists. It defines key terms related to OWI offenses like "operate," "motor vehicle," "highway," and premises held out for public use. It also discusses what constitutes being "under the influence" and prohibited alcohol concentrations.
Steven Duesing, Nicole Mathis, Blain Gowing, et. al. v. The Attorney General ...Guy Boulianne
This is an application for judicial review of a decision by the Minister of Health to detain Canadian citizens returning from abroad in federal quarantine facilities. The applicants argue this decision violates several of their Charter rights, including liberty, security of the person, arbitrary detention, right to counsel, presumption of innocence, and reasonable bail. They are seeking an injunction to suspend mandatory confinement and release currently confined individuals, as well as declarations that the decision is unconstitutional and an order quashing the decision. The grounds are that the applicants had reasonable quarantine plans and the government has not shown detention is necessary to prevent disease spread.
The Important Cases in Indian Judiciary like Keshavnanda Bharti, Mathura Rape Case, Vishaka Guide Lines
Relationship between Union Territory and Central govt
PESA Act
This document amends the Internal Revenue Code to modify provisions for first-time homebuyers who are members of the armed forces or federal employees. It also makes several amendments to the Public Health Service Act relating to provisions in the Affordable Care Act. Specifically, it strikes certain lines and inserts new text, amends several sections to modify requirements for annual and lifetime limits, nondiscrimination, and data collection and to add protections for gun rights.
The document discusses constitutional amendments in Malaysia. It covers:
1) The methods and requirements for amending the Federal Constitution under Articles 159 and 161E, including amendments requiring a two-thirds majority and consent of the Conference of Rulers or State Governor.
2) Key court cases that shaped the interpretation of constitutional amendment provisions.
3) The controversial 1983 and 1984 amendments regarding legislative seats and royal powers.
4) The 1993 amendments further limiting royal immunity and self-pardons.
West Virginia Senate Bill (SB) 508, introduced in February 2016. The bill prevents anti-drillers from filing frivilous claims of "nuisance" against drillers, aggregating those claims into a class action lawsuit, and attempting to kill a legitimate company via "death by a thousand cuts."
DAP - Justice Antonio Carpio, separate concurring opinionraissarobles
This document contains the separate opinion of Justice Carpio in a case challenging the constitutionality of the Disbursement Acceleration Program (DAP) implemented by the President through the Department of Budget and Management. Justice Carpio outlines the petitioners' arguments that the DAP is unconstitutional because it was not created by law and involved the realignment of funds that were not savings. He then analyzes the presidential power to augment or realign under the Constitution and relevant case law, finding that only savings can be realigned and only to existing items within the same branch or constitutional body.
This document contains an amateur radio license for Brody E. Nagy of Southbury, CT. It provides instructions to cut out the wallet sized license and suggests laminating it after signing. The license lists the licensee's call sign, license grant and expiration dates, file number, and operator privileges. It also contains standard conditions stating that the license does not provide any rights beyond its term and is non-transferable.
The conservation of foreign exchange and prevention of smuggling activities a...Leo Lukose
This document is the Conservation of Foreign Exchange and Prevention of Smuggling Activities Act of 1974. Some key points:
- It allows for preventative detention of persons to conserve foreign exchange and prevent smuggling activities that negatively impact the national economy and security.
- Detention orders can be issued by central or state governments if satisfied a person's actions are prejudicial to exchange/smuggling prevention. Detentions can occur anywhere in India.
- Detainees are subject to conditions set by the appropriate government and can be moved between places of detention.
- Advisory boards must review detentions and report within 11 weeks, except some smuggling-related cases can be detained up to 6 months without review.
Hong kong human_rights_and_democracy_act__h.r._3289ikarocampos
This document is a bill being considered in the US Senate that aims to amend the Hong Kong Policy Act of 1992. Key points:
1) It would require the Secretary of State to annually certify to Congress whether Hong Kong continues to warrant separate treatment from China under US laws based on its autonomy.
2) The certification would consider factors like rule of law, civil liberties, and obligations in the Sino-British Joint Declaration and Hong Kong Basic Law.
3) It also outlines US policy goals of supporting Hong Kong's high degree of autonomy and democratic freedoms as guaranteed in the Joint Declaration and Basic Law.
This document discusses Kenya's commitment to both local and international law under its 2010 Constitution. It notes that some articles support local law prevailing (Article 2(6)), while others affirm Kenya's commitment to international law (Articles 2(5), 21(4), 51(3)(b)). Motivations for this commitment included international pressure, unity, and escaping despotic local rule. Under the 1963 Constitution, treaty practice occurred on an ad hoc basis, with parliamentary action not required for permissive treaties. However, treaties requiring acts not authorized by local law, or containing provisions not catered for locally, did require Acts of Parliament. While the executive could ratify treaties, the legislature amended laws to conform them to treat
The document discusses provisions in the Indian constitution relating to states and territories of India. It states that India shall be a union of states as specified in the First Schedule. Parliament has the power to admit new states into the union or establish new states on terms and conditions. Parliament may also pass laws to form new states, alter boundaries or areas of existing states, or change the names of states. Any laws passed regarding new states or boundary changes must contain provisions to amend the relevant schedules of the constitution and can include other incidental provisions as deemed necessary by Parliament. Such laws will not be considered an amendment of the constitution under Article 368.
US draft sanctions on russia - senate version (Sept 2014)Andrew Gelston
This document is a bill introduced in the US Senate on September 16, 2014 to impose sanctions on Russia and provide additional assistance to Ukraine. It was reported out of committee with amendments on September 18, 2014. The bill defines key terms and outlines a policy of further assisting Ukraine to restore its sovereignty and territorial integrity in response to Russian actions. It proposes sanctions on Russian defense and energy sectors, including on specific entities. The sanctions could include restrictions on US export-import bank assistance, government procurement, arms exports, and dual-use exports.
The COFEPOSA Act of 1974 allows for preventive detention to conserve foreign exchange and prevent smuggling. It gives powers to central and state governments to detain individuals engaging in activities harmful to foreign exchange or involved in smuggling. Detainees may be held for up to one year and are reviewed by advisory boards. The act also protects governments and individuals acting in good faith under the act and repealed a previous ordinance.
This document provides comments on a draft Freedom of Information law in the Philippines. It summarizes key issues and recommendations for improving the draft. Key points include expanding the scope of information covered beyond matters of public concern; strengthening exceptions; including an oversight body; and imposing a duty on public bodies to proactively publish certain information without requiring a request.
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
This document summarizes a report from the ABA Section of Intellectual Property Law's Committee 711 on Online Security & E-Privacy. The committee did not propose any resolutions in its second year. It is planning a CLE seminar on data breach notification for an upcoming ABA conference. The document then summarizes a subcommittee report on spyware that discusses defining spyware and existing federal spyware laws, including the Wiretap Act and Computer Fraud and Abuse Act. It notes there was no consensus to propose a resolution on spyware legislation.
State of North Dakota's Unopposed Motion to Intervene as Petitioner; State of Wyoming v. United States Department of the Interior; Sally Jewell, in her capacity as Secretary of the Interior; Bureau of Land Management; and Neil Kornze, in his capacity as Director, Bureau of Land Management
Steven Duesing, Nicole Mathis v. The Attorney General of CanadaGuy Boulianne
This is an application for judicial review of a decision by the Minister of Health to quarantine asymptomatic Canadians in federal facilities without due process. The applicants, Steven Duesing and Nicole Mathis, seek an interlocutory injunction suspending mandatory confinement in federal facilities and releasing those currently confined. They also seek declarations that the decision violates sections of the Charter and is unreasonable as it does not balance rights and freedoms. The grounds for the application are that the federal government has not ensured there are no reasonable alternatives to detaining Canadians in facilities against their will.
This document summarizes the Dowry Prohibition Act of 1961 in India, which aims to prohibit the practice of dowry. Some key points:
- It defines dowry as any property or valuable security given by one party to a marriage to the other party, before, during or after the marriage. This does not include customary gifts or dower/mahr for Muslims.
- Giving or taking dowry is punishable by imprisonment of at least 5 years and a fine. Demanding dowry is punishable by 6 months to 2 years imprisonment and a fine.
- Advertising property/money shares for marriage is punishable by 6 months to 5 years imprisonment and a fine.
Attorney Ethics: An Update from the 85th Legislative SessionTWCA
The document summarizes several bills presented at the TWCA Mid-Year Conference on June 16, 2017. HB 53 concerns settlements against governmental units over $30,000 that contain non-disclosure clauses. HB 776 requires removing home addresses from financial disclosure statements. HB 1701 adds requirements for investment policies provided to business organizations. HB 3047 addresses participation in meetings by videoconference. HB 3107 establishes conditions for withdrawn public information requests. The document also provides hypothetical ethics scenarios and summarizes SB 79, SB 255, and SB 302, which concern public information requests, procurement training, and Sunset Advisory Commission reviews.
The Civil Rights Act of 1991 amends the 1964 Civil Rights Act to provide additional protections and remedies against discrimination. Key provisions include allowing compensatory and punitive damages for intentional employment discrimination, codifying standards for disparate impact cases, and facilitating challenges to employment practices resulting from consent decrees. The act aims to strengthen federal civil rights protections and respond to Supreme Court decisions that weakened anti-discrimination laws.
This document discusses Wisconsin municipal OWI law and jurisdiction over OWI offenses. It provides an overview of municipal court jurisdiction over first offense OWIs as civil forfeitures. It also discusses limitations on municipal court jurisdiction if a valid prior conviction exists. The document outlines circuit court jurisdiction over first offense OWIs and contradictory appellate court opinions on jurisdiction if a prior conviction exists. It defines key terms related to OWI offenses like "operate," "motor vehicle," "highway," and premises held out for public use. It also discusses what constitutes being "under the influence" and prohibited alcohol concentrations.
Steven Duesing, Nicole Mathis, Blain Gowing, et. al. v. The Attorney General ...Guy Boulianne
This is an application for judicial review of a decision by the Minister of Health to detain Canadian citizens returning from abroad in federal quarantine facilities. The applicants argue this decision violates several of their Charter rights, including liberty, security of the person, arbitrary detention, right to counsel, presumption of innocence, and reasonable bail. They are seeking an injunction to suspend mandatory confinement and release currently confined individuals, as well as declarations that the decision is unconstitutional and an order quashing the decision. The grounds are that the applicants had reasonable quarantine plans and the government has not shown detention is necessary to prevent disease spread.
The Important Cases in Indian Judiciary like Keshavnanda Bharti, Mathura Rape Case, Vishaka Guide Lines
Relationship between Union Territory and Central govt
PESA Act
This document amends the Internal Revenue Code to modify provisions for first-time homebuyers who are members of the armed forces or federal employees. It also makes several amendments to the Public Health Service Act relating to provisions in the Affordable Care Act. Specifically, it strikes certain lines and inserts new text, amends several sections to modify requirements for annual and lifetime limits, nondiscrimination, and data collection and to add protections for gun rights.
The document discusses constitutional amendments in Malaysia. It covers:
1) The methods and requirements for amending the Federal Constitution under Articles 159 and 161E, including amendments requiring a two-thirds majority and consent of the Conference of Rulers or State Governor.
2) Key court cases that shaped the interpretation of constitutional amendment provisions.
3) The controversial 1983 and 1984 amendments regarding legislative seats and royal powers.
4) The 1993 amendments further limiting royal immunity and self-pardons.
West Virginia Senate Bill (SB) 508, introduced in February 2016. The bill prevents anti-drillers from filing frivilous claims of "nuisance" against drillers, aggregating those claims into a class action lawsuit, and attempting to kill a legitimate company via "death by a thousand cuts."
DAP - Justice Antonio Carpio, separate concurring opinionraissarobles
This document contains the separate opinion of Justice Carpio in a case challenging the constitutionality of the Disbursement Acceleration Program (DAP) implemented by the President through the Department of Budget and Management. Justice Carpio outlines the petitioners' arguments that the DAP is unconstitutional because it was not created by law and involved the realignment of funds that were not savings. He then analyzes the presidential power to augment or realign under the Constitution and relevant case law, finding that only savings can be realigned and only to existing items within the same branch or constitutional body.
This document contains an amateur radio license for Brody E. Nagy of Southbury, CT. It provides instructions to cut out the wallet sized license and suggests laminating it after signing. The license lists the licensee's call sign, license grant and expiration dates, file number, and operator privileges. It also contains standard conditions stating that the license does not provide any rights beyond its term and is non-transferable.
The conservation of foreign exchange and prevention of smuggling activities a...Leo Lukose
This document is the Conservation of Foreign Exchange and Prevention of Smuggling Activities Act of 1974. Some key points:
- It allows for preventative detention of persons to conserve foreign exchange and prevent smuggling activities that negatively impact the national economy and security.
- Detention orders can be issued by central or state governments if satisfied a person's actions are prejudicial to exchange/smuggling prevention. Detentions can occur anywhere in India.
- Detainees are subject to conditions set by the appropriate government and can be moved between places of detention.
- Advisory boards must review detentions and report within 11 weeks, except some smuggling-related cases can be detained up to 6 months without review.
Hong kong human_rights_and_democracy_act__h.r._3289ikarocampos
This document is a bill being considered in the US Senate that aims to amend the Hong Kong Policy Act of 1992. Key points:
1) It would require the Secretary of State to annually certify to Congress whether Hong Kong continues to warrant separate treatment from China under US laws based on its autonomy.
2) The certification would consider factors like rule of law, civil liberties, and obligations in the Sino-British Joint Declaration and Hong Kong Basic Law.
3) It also outlines US policy goals of supporting Hong Kong's high degree of autonomy and democratic freedoms as guaranteed in the Joint Declaration and Basic Law.
This document discusses Kenya's commitment to both local and international law under its 2010 Constitution. It notes that some articles support local law prevailing (Article 2(6)), while others affirm Kenya's commitment to international law (Articles 2(5), 21(4), 51(3)(b)). Motivations for this commitment included international pressure, unity, and escaping despotic local rule. Under the 1963 Constitution, treaty practice occurred on an ad hoc basis, with parliamentary action not required for permissive treaties. However, treaties requiring acts not authorized by local law, or containing provisions not catered for locally, did require Acts of Parliament. While the executive could ratify treaties, the legislature amended laws to conform them to treat
The document discusses provisions in the Indian constitution relating to states and territories of India. It states that India shall be a union of states as specified in the First Schedule. Parliament has the power to admit new states into the union or establish new states on terms and conditions. Parliament may also pass laws to form new states, alter boundaries or areas of existing states, or change the names of states. Any laws passed regarding new states or boundary changes must contain provisions to amend the relevant schedules of the constitution and can include other incidental provisions as deemed necessary by Parliament. Such laws will not be considered an amendment of the constitution under Article 368.
US draft sanctions on russia - senate version (Sept 2014)Andrew Gelston
This document is a bill introduced in the US Senate on September 16, 2014 to impose sanctions on Russia and provide additional assistance to Ukraine. It was reported out of committee with amendments on September 18, 2014. The bill defines key terms and outlines a policy of further assisting Ukraine to restore its sovereignty and territorial integrity in response to Russian actions. It proposes sanctions on Russian defense and energy sectors, including on specific entities. The sanctions could include restrictions on US export-import bank assistance, government procurement, arms exports, and dual-use exports.
The COFEPOSA Act of 1974 allows for preventive detention to conserve foreign exchange and prevent smuggling. It gives powers to central and state governments to detain individuals engaging in activities harmful to foreign exchange or involved in smuggling. Detainees may be held for up to one year and are reviewed by advisory boards. The act also protects governments and individuals acting in good faith under the act and repealed a previous ordinance.
This document provides comments on a draft Freedom of Information law in the Philippines. It summarizes key issues and recommendations for improving the draft. Key points include expanding the scope of information covered beyond matters of public concern; strengthening exceptions; including an oversight body; and imposing a duty on public bodies to proactively publish certain information without requiring a request.
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
This document summarizes a report from the ABA Section of Intellectual Property Law's Committee 711 on Online Security & E-Privacy. The committee did not propose any resolutions in its second year. It is planning a CLE seminar on data breach notification for an upcoming ABA conference. The document then summarizes a subcommittee report on spyware that discusses defining spyware and existing federal spyware laws, including the Wiretap Act and Computer Fraud and Abuse Act. It notes there was no consensus to propose a resolution on spyware legislation.
This document provides a sample proposal outline and guidelines for writing a proposal. It includes sections that would typically be found in a proposal such as an introduction with the problem statement, recommendations, and conclusion. It also provides tips on considering the audience and tone of the proposal.
A PRACTICAL GUIDE TO THE FAR MANDATORY DISCLOSURE RULE FAR 52.203-13dbolton007
This document provides an agenda and summary for a presentation on the FAR Mandatory Disclosure Rule FAR 52.203-13. Key points include:
1) The rule was created in response to low voluntary disclosure rates and high procurement fraud for the Department of Justice. It aims to increase mandatory reporting of violations.
2) The rule has three parts: requirements for disclosure, grounds for suspension/debarment, and a contractor code of business ethics. It requires disclosure of violations dating back to final payment on contracts.
3) Contractors must disclose credible evidence of criminal or civil violations to the agency Inspector General and contracting officer within a certain timeframe. The rule defines principals and mandatory disclosure requirements.
The Department of Defense Office of Inspector General plays a critical role in protecting whistleblowers in DoD intelligence agencies by investigating allegations of reprisal. While early laws exempted intelligence community employees from protections, the ICWPA and IG Act now provide channels for issues of "urgent concern" to be disclosed and investigated. The DoD IG's Civilian Reprisal Investigations directorate specifically investigates cases of whistleblower reprisal in DoD intelligence agencies, including actions involving security clearances which can be tantamount to termination. Notable cases include substantiated reprisal allegations at NSA and CIFA.
Various Constituents of Legal Literature
Understanding the various parts of the statutes
Relevance of General Clauses Act, 1897 in the Interpretation of statutes
Various Parts & Sections of Gazette of India
Distinctiveness of ratio decidendi & obiter dicta
Relation of Logic to Laws
Concept of Deductive and Inductive Reasoning as Tools of Legal Reasoning
NEW WHISTLEBLOWER INCENTIVES AND PROTECTION IN THE DODD-FRANK ACTptcollins
On July 21, 2010, President Obama signed into law the “Dodd-Frank Wall Street Reform and Consumer Protection Act” (“Dodd-Frank Act”). The legislation is primarily designed to increase overall regulation of the financial industry, but it also contains numerous provisions designed to encourage and protect whistleblowers in and outside of the financial industry.
NMM Law Alert
Protection and immunity under Cybersecurity Information Sharing ActDavid Sweigert
This document provides guidance for non-federal entities on sharing cyber threat indicators and defensive measures with federal entities under the Cybersecurity Information Sharing Act of 2015. It defines key terms like cyber threat indicator, defensive measure, and information protected by privacy laws. It also explains how non-federal entities can share indicators and measures through the Department of Homeland Security's Automated Indicator Sharing system or other means. The document aims to help non-federal entities properly share information for cybersecurity purposes while protecting privacy.
CSI 2008, Legal Developments In Security and Privacy Law padler01
The document provides an overview of key developments in security and privacy law from November 2007 to November 2008. It discusses new and proposed federal and state legislation, federal agency rules and guidelines, and agency enforcement actions related to data security and privacy. Key topics covered include proposed amendments to regulations, new data breach notification laws in many states, and emerging state laws requiring businesses to implement data security programs.
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonPatton Boggs LLP
The White House has proposed new cybersecurity legislation that would significantly impact healthcare organizations. The proposals would grant the Department of Homeland Security primary authority over cybersecurity for critical infrastructure like healthcare. This would require healthcare providers to develop cybersecurity plans subject to DHS and third party audits. The proposals would also standardize national data breach notification and preempt state laws, expanding the definition of a breach. Additionally, new tools are proposed to aid law enforcement in cybercrime prosecution. Congress is currently considering these proposals and various bills on cybersecurity reform, so increased regulation of healthcare cybersecurity is imminent.
This document is a Supreme Court of India judgment regarding the constitutionality of Section 66A of the Information Technology Act 2000, which criminalizes sending offensive or annoying messages through a computer or communication device. The petitioners argued that Section 66A infringes the fundamental right to free speech guaranteed by the Constitution. The Court discussed the importance of free speech in a democracy as outlined in previous judgments. It also discussed the "marketplace of ideas" concept that truth emerges from open discussion. The judgment considers the arguments for and against Section 66A's constitutionality in relation to freedom of speech and other rights.
This document is a Supreme Court of India judgment regarding the constitutionality of Section 66A of the Information Technology Act 2000, which criminalizes sending offensive or annoying messages through a computer or communication device. The petitioners argued that Section 66A infringes the fundamental right to free speech guaranteed by the Constitution. The Court discussed the importance of free speech in a democracy as outlined in previous judgments. It also discussed the "marketplace of ideas" concept that truth emerges from open discussion. The judgment considers the arguments for and against Section 66A's constitutionality in relation to freedom of speech and other rights.
This document provides an overview of the Right to Information Act in India. It begins with presenting the act and providing its objectives which are to promote transparency and accountability in public authorities. It then discusses the background leading to the passage of the act. The key aspects covered include the steps to file an RTI request, important definitions in the act like public authority and information, responsibilities of public authorities and public information officers, and grounds for rejection of information requests. In summary, the document outlines the Right to Information Act of India and its provisions to provide citizens access to information from public authorities.
This document discusses three Canadian bills - Bill C-13, Bill C-44, and Bill C-51 - and their impact on privacy rights under the Canadian Charter of Rights and Freedoms. It provides context for each bill and analyzes concerns about how they weaken privacy protections. Bill C-13 was introduced after high-profile cyberbullying cases but expanded law enforcement's ability to access personal data. Bill C-44 increased the powers of CSIS in ways that violate court rulings regarding respecting foreign laws. And Bill C-51 broadly defined security threats in a way that triggers extensive information sharing across government agencies, compromising privacy. The document examines Canadian Supreme Court rulings that found privacy protections apply to modern
The document summarizes the conditions placed by the U.S. Senate on its advice and consent for ratification of the Chemical Weapons Convention. Key conditions include: requiring certification of an independent internal oversight office for the organization; prohibiting use of funds without congressional authorization; maintaining U.S. national export controls; protecting intelligence shared with the organization; and annual certification of the effectiveness of the Australia Group export controls.
This document summarizes key aspects of the 2008 amendments to India's Information Technology Act, including newly added cybercrimes and strengthened government interception powers. It notes the amendments aim to make the law technology neutral and defines cyber terrorism, adding offenses like identity theft and phishing. The amendments impact corporate India by increasing liability for data breaches and requiring intermediaries to exercise due diligence. The presentation encourages companies to implement cybersecurity practices and conduct a due diligence program to limit legal exposure under the new law.
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
This document discusses various sections of the Information Technology Act 2000 of India related to cyber crimes. It begins with providing context on the objectives and structure of the IT Act. It then defines cyber crimes and provides a brief overview of the IT Act of 2000. Next, it discusses some notable features and sections of the Act including Section 43 on penalties for unauthorized access, Section 65 on tampering with computer source documents, Section 66 on computer related offenses, and provides relevant case studies for each. The document is an assignment submitted to a professor providing an overview of key aspects of India's cyber law and the IT Act of 2000.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
GateSecure- "Doing well by doing good. Family freedom as a service"- WHD.Indi...DailyHostNews
This document contains advice from Sascha Beyer, CEO of Gatesecure S.A., on how to approach family safety software. Some of the key recommendations include: don't think of only devices or technology but also educate users; see children as reasonable and don't underestimate their communication skills; provide intelligent tools, reports, and support instead of just restrictions; ensure the software is easy to use and doesn't disrupt internet access or annoy users; target features for children instead of just parents; and offer basic services for free with premium options as the monetization model.
Genetic Information Nondiscrimination ActDailyHostNews
The Genetic Information Nondiscrimination Act (GINA) isn’t new legislation. Passed in 2008, it prohibits the use of genetic information in health insurance and employment. That means that employers can’t making hiring, firing, job placement, or promotions decisions based on genetic information, nor can insurers raise premiums or deny coverage to those with a genetic predisposition for a disease.
Application Privacy, Protection, and Security Act of 2013DailyHostNews
Congressman Hank Johnson proposed the APPS Act early this year. The act is designed to address concerns with the data collection being done through applications on mobile devices and would require that app developers provide greater transparency about their data collection practices, ensure reasonable levels of data security, and allow users to opt out of data collection or have the option to delete data that has been collected on them.
This bill proposes establishing a regulatory framework under the Federal Trade Commission (FTC) for comprehensive protection of personal data. It would give individuals rights relating to: security and accountability of data; transparent notice of data practices; individual participation regarding data use; data minimization; constraints on data distribution; and data integrity. The FTC would enforce these rules along with State attorneys general. It also establishes a safe harbor program for companies that voluntarily strengthen privacy practices and compliance.
The GPS Act, proposed by Representative Jason Chaffetz and Senator Ron Wyden, seeks to give government agencies, commercial entities, and private citizens specific guidelines to when and how geolocation information can be accessed and used. At present, there are no U.S. laws that directly address GPS tracking data, and with the proliferation of trackable devices like cell phones and GPS systems, the act is aiming to update regulations and guidelines to reflect modern sources of privacy concerns.
COPPA isn’t new, either, but it has seen some significant amendments over the past year that are worth mentioning. COPPA, which went into effect in early 2000, protects children under 13 from the online collection of personal information. As a result, many sites today often disallow children under 13 from using their services or require parental permission for disclosure of any personal information. In September 2011, the FTC announced proposed revisions to COPPA that expand the definition of what it means to collect data from children. These new rules would include regulations on data retention and deletion and would require any third parties to whom a child’s information is disclosed to have policies in place to protect the information.
The Electronic Communications Privacy Act is almost 30 years old, so why does it appear on this list? Because it’s likely going to see some major revisions to reflect the increased variety and prevalence of electronic communications. The original act was designed to help expand federal wiretapping and electronic eavesdropping provisions, as well as protect communications that occur via wire, oral, and electronic means and to balance the right to privacy of citizens with the needs of law enforcement. In the years since, the law has been under increased scrutiny for being out of date and failing to protect all communications and consumer records.
The Protecting Children from Internet Pornographers Act of 2011 PDF.DailyHostNews
Proposed by Rep. Lamar Smith of Texas, this bill is designed to increase the enforcement of laws related to child pornography and child sexual exploitation, specifically by requiring Internet service providers (ISPs) to provide data about subscribers to law enforcement officials. While still on the table for debate, the law has attracted a lot of attention from those who believe it has serious implications with regard to consumer privacy.
The document discusses the evolution of domain names from yesterday to tomorrow. It notes that originally domains were restricted to .com, but now brands can own country-specific TLDs like .in or .au. It also discusses how new gTLDs through ICANN allow brands to own words in any language. The document outlines changing trends like the importance of domains for branding, securing multiple TLDs, growth in country-specific and device-specific TLDs. It predicts continued growth in Internet users and domains for new technologies/trends. Finally, it invites the reader to a webinar on enhancing domain ROI and participating in the growing industry.
1. 112th CONGRESS
2d Session
} HOUSE OF REPRESENTATIVES f REPORT
112-
PROVIDING FOR CONSIDERATION OF THE BILL (H.R. 3523) TO
PROVIDE FOR THE SHARING OF CERTAIN CYBER THREAT
INTELLIGENCE AND CYBER THREAT INFORMATION
BETWEEN THE INTELLIGENCE COMMUNITY AND
CYBERSECURITY ENTITIES, AND FOR OTHER PURPOSES;
PROVIDING FOR CONSIDERATION OF MOTIONS TO SUSPEND
THE RULES; PROVIDING FOR CONSIDERATION OF THE BILL
(H.R. 4628) TO EXTEND STUDENT LOAN INTEREST RATES
FOR UNDERGRADUATE FEDERAL DIRECT STAFFORD LOANS;
AND FOR OTHER PURPOSES
April25, 2012.-Referred to the House Calendar and ordered to be printed.
MR. NUGENT, from the Committee on Rules, submitted the following
REPORT
[To accompany H. Res._j
The Committee on Rules, having had under consideration House
Resolution__ , by a nonrecord vote, report the same to the House with the
recommendation that the resolution be adopted.
SUMMARY OF PROVISIONS OF THE RESOLUTION
The resolution provides for consideration of H.R. 3523, the Cyber
Intelligence Sharing and Protection Act of 2011, under a structured rule.
The resolution provides one hour of general debate equally divided and
controlled by the chair and ranking minority member of the Permanent
Select Committee on Intelligence. The resolution waives all points of order
against consideration of the bill. The resolution makes in order as original
text for purpose of amendment the amendment in the nature of a substitute
consisting of the text of Rules Committee Print 112-20 and provides that it
shall be considered as read. The resolution waives all points of order against
the amendment in the nature of a substitute. The resolution makes in order
only those amendments printed in this report. Each such amendment may
be offered only in the order printed in this report, may be offered only by a
Member designated in this report, shall be considered as read, shall be
debatable for the time specified in this report equally divided and controlled
2. by the proponent and an opponent, shall not be subject to amendment, and
shall not be subject to a demand for division of the question in the House or
in the Committee of the Whole. The resolution waives all points of order
against the amendments printed in this report. The resolution provides one
motion to recommit with or without instructions.
Section 2 of the resolution provides that it shall be in order at any
time through the legislative day of April 27, 2012, for the Speaker to
entertain motions that the House suspend the rules, as though under clause
1 of rule XV, relating to the following measures: H.R. 2096, the
Cybersecurity Enhancement Act of 2011; H.R. 3834, the Advancing
America's Networking and Information Technology Research and
Development Act of 2012; and H.R. 4257, the Federal Information Security
Amendments Act of 2012.
Section 3 of the resolution provides for consideration of H.R. 4628,
the Interest Rate Reduction Act, under a closed rule. The resolution
provides one hour of debate equally divided and controlled by the chair and
ranking minority member of the Committee on Education and the
Workforce. The resolution waives all points of order against consideration of
the bill and provides that it shall be considered as read. The resolution
waives all points of order against provisions in the bill. The resolution
provides one motion to recommit.
Section 4 of the resolution provides that the Committee on
Appropriations may, at any time before 6 p.m. on Wednesday, May 2, 2012,
file privileged reports to accompany measures making appropriations for the
fiscal year ending September 30, 2013.
EXPLANATION OF WAIVERS
The waiver of all points .of order against consideration of H.R. 3523
includes a waiver of clause 3(c)(4) of rule XIII, which requires a statement of
general performance goals and objectives. The report filed by the
Permanent Select Committee on Intelligence did not adequately fulfill this
requirement.
Although the resolution waives all points of order against the
amendment in the nature of a substitute to H.R. 3523 made in order as
original text, the Committee is not aware of any points of order. The waiver
is prophylactic in nature.
Although the resolution waives all points of order against the
amendments printed in this report, the Committee is not aware of any
points of order. The waiver is prophylactic in nature.
The waiver of all points of order against consideration ofH.R. 4628
includes a waiver of clause 10 of rule XXI, prohibiting the consideration of a
measure if the provisions of such measure have the net effect of increasing
mandatory spending for the period of either the first five-year or ten-year
period. While it is expected that H.R. 4628 would be in violation of the rule
over the first five-year period, it is expected to have a net decrease in
mandatory spending over the ten-year period.
The waiver of all points of order against consideration of H.R. 4628
also includes a waiver of section 302(f) of the Congressional Budget Act of
1974, prohibiting the consideration of a measure which causes the applicable
allocation of new budget authority under subsections 302(a) or (b) to be
exceeded.
3. IfH.R. 4628 is considered before Friday, April27, 2012~ the waiver
of all points of order will include a waiver of clause 11 of rule XXI,
prohibiting the consideration of an unreported bill or joint resolution until
the third calendar day on which it has been available.
Although the resolution waives all points of order against provisions
in the H.R. 4628, the Committee is not aware of any points of order. The
waiver is prophylactic in nature.
4. SUMMARY OF THE AMENDMENTS TO H.R. 3523 MADE IN ORDER
1. Langevin (RI), Lungren (CA): Would expand eligibility to participate in
the voluntary information sharing program created in the bill to include
critical infrastructure owners and operators, which allows entities that
are not entirely privately owned, such as airports, utilities, and public
transit systems, to receive vital cybersecurity information and better
secure their networks against cyber threats. (10 minutes)
2. Conyers (Ml): Would strike the exemption from criminal liability, strike
the civil liability exemption for decisions made based upon cyber threat
information identified, obtained, or shared under the bill, and ensure
that those who negligently cause injury through the use of cybersecurity
systems or the sharing of information are not exempt from potential
civil liability. (10 minutes)
3. Pompeo (KS): Would make clear in the bill's liability provision that the
reference to the use of cybersecurity systems is the use of such systems
to identify and obtain cyber threat information. (10 minutes)
4. Rogers, Mike (MI), Ruppersberger (MD), Issa (CA), Langevin (RI):
Would make clear that regulatory information already required to be
provided remains FOIAable under current law. (10 minutes)
5. Jackson Lee (TX): Would authorize the Secretary to intercept and deploy
countermeasure with regard to system traffic for cybersecurity purposes
in effect identification of cybersecurity risks to federal systems. (10
minutes)
6. Quayle (AZ), Eshoo (CA), Thompson, Mike (CA), Broun (GA): Would
limit government use of shared cyber threat information to only 5
purposes: 1) cybersecurity; 2) investigation and prosecution of
cybersecurity crimes; 3) protection of individuals from the danger of
death or physical injury; 4) protection of minors from physical or
psychological harm; and 5) protection of the national security of the
United States. (10 minutes)
7. Amash (MI), Labrador (ID), Paul (TX), Nadler (NY), Polis (CO): Would
prohibit the federal government from using, inter alia, library records,
firearms sales records, and tax returns that it receives from private
entities under CISPA. (10 minutes)
8. Mulvaney (SC), Dicks (WA): Would provide clear authority to the
government to create reasonable procedures to protect privacy and civil
liberties, consistent with the need of the government to protect federal
systems and cybersecurity. Would also prohibit the federal government
from retaining or using information shared pursuant to paragraph (b)(1)
for anything other than a use permitted under paragraph (cX1). (10
minutes)
9. Flake, Jeff(AZ): Would add a requirement to include a list of all federal
agencies receiving information shared with the government in the report
by the Inspector General ofthe Intelligence Community required under
the legislation. (10 minutes)
10. Richardson (CA): Would make explicit that nothing in the legislation
would prohibit a department or agency of the federal government from
providing cyber threat information to owners and operators of critical
5. infrastructure. (10 minutes)
11. Pompeo (KS): Would clarify that nothing in the bill would alter existing
authorities or provide new authority to any federal agency, including
DOD, NSA, DHS or the Intelligence Community to install, employ, or
otherwise use cybersecurity systems on private sector networks. (10
minutes)
12. Woodall (GA): Would ensure that those who choose not to participate in
the voluntary program authorized by this bill are not subject to new
liabilities.
(10 minutes)
13. Goodlatte (VA): Would narrow definitions in the bill regarding what
information may be identified, obtained, and shared.
(10 minutes)
14. Turner (OH): Would make a technical correction to definitions in Section
2 (g) to provide consistency with other cyber security policies within the
Executive branch and the Department of Defense. (10 minutes)
15. Mulvaney (SC): Would sunset the provisions of the bill five years after
the date of enactment. (10 minutes)
16. Paulsen (MN): Would encourage international cooperation on cyber
security where feasible. (10 minutes)
7. 1. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
LANGEVIN OF RHODE ISLAND OR HIS DESIGNEE, DEBATABLE
FOR 10 MINUTES
8. F:M12LANGE
AMENDMENT TO THE RULES Co:MMITmE PRINT
OF H.R. 3523
OFFERED BY MR. LANGEVIN OF RHODE ISLAND
Page 1, line 13, strike "UTILITIES" and insert
"CRITICAL INFRASTRUCTURE OWNERS AND OPERA-
TORS".
Page 2, line 1, strike "utilities" and insert "critical
infrastructure owners and operators''.
Page 3, line 13, strike "utility" and insert "critical
infrastructure owner or operator".
Page 3, line 16, strike "utility" each place it ap-
pears and insert "critical infrastructure owner or oper-
a tor".
Page 17, strike lines 12 through 16.
f:VHLC042412042412.002.xml (52395012)
April24, 2012 (9:15a.m.)
9. 2. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
CONYERS JR. OF MICHIGAN OR HIS DESIGNEE, DEBATABLE
FOR 10 MINUTES
10. F:PKBINT112
AME ....TT'Io.........-r.oNT TO THE RULES COMMITTEE P
/ OF H.R. 3523
OFFERED BY M.r_. Cnn3.£f"'S
Page 8, beginning on line 11 strike "or criminal".
Page 8, strike lines 17 through 23 and insert the
following: "good faith for using cybersecurity systems or
sharing information in accordance with this section un-
less such protected entity, self-protected entity, cyber se-
curity provider, or an officer, agent, or employee of a
cyber security provider negligently shares information ob-
tained in accordance with this section, and that neg-
ligence proximately causes injury.".
f:VHLC042412042412.622.xml (52371012)
April 24, 2012 (5:45 p.m.)
11. 3. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
POMPEO OF KANSAS OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
12. ------
F'PKBUNT112H3523PLR-~
--------
T TO TSE RULES COMMITTEE PRINT
OF H.R. 35' 3
2
OFFERED BY M 12..
Pc ge . , heg-inuiuo· n li n l l strike "<H' sharing in-
form tion" and in. rt "to id -nti :, or obtain •b ;> r thr at
inf'o rmnt ion OJ' for sharin(J' .·uch information" .
1VHLC042412104241 2 .375.xml
-
: (52357214)
April24, 2012 (2:25p.m.)
13. 4. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
ROGERS OF MICHIGAN OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
14. AMENDMENT TO THE RULES COMMITrEKJlRINT
OF H.R. 3523
Page 9, beginning on line 2, strike "affect any" and
insert ''affect-".
Page 9, strike lines 3 through 5 and insert the fol-
lowing:
1 ''(A) any requirement under any other pro-
2 vision of law for a person or entity to provide
3 information to the Federal Government; or
4 "(B) the applicability of other provisions of
5 law, including section 552 of title 5, United
6 States Code (commonly known as the 'Freedom
7 of Information Act'), with respect to informa-
8 tion required to be provided to the Federal Gov-
9 ernment under such other provision of law.
f:VHLC042412042412 .149.xml (52359012)
April24, 2012 (11 :32 a.m.)
15. 5. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
JACKSON LEE OF TEXAS OR HER DESIGNEE, DEBATABLE FOR
lOMINUTES
16. NDMENT TO THE RULES COMMITTEE PRINT
OF H.R. 3523
OFFERED BY Ms. JACKSON LEE OF TEXAS
Page 9, after line 5, insert the following:
1 "(c) CYBERSECURITY OPERATIONAL ACTIVITY.-
2 "(1) IN GENERAL.-ln receiving· information
3 authorized to be shared with the Federal Govern-
4 ment under this section, the Secretary of Homeland
5 Security is authorized, notwithstanding any other
6 provision of law, to acquire, intercept, retain, use,
7 and disclose communications and other system traf-
8 fie that are transiting to or from or stored on Fed-
9 eral systems and to deploy countermeasures with re-
10 gard to such communications and system traffic for
11 cybersecurity purposes provided that the Secretary
12 certifies that-
13 ''(A) such acquisitions, interceptions, and
14 countermeasures are reasonable necessary for
15 the purpose of protection Federal systems from
16 cybersecurity threats;
17 "(B) the content of communications will be
18 collected and retained only when the commu-
19 nication is associated with known or reasonably
f:VHLC042412042412.370.xml (52420211)
April24, 2012 (2:19p.m.)
17. F:Ml2JACKSOJACKS0_375.XML
2
1 suspected cybersecurity threat, and communica-
2 tions and system traffic will not be subject to
3 the operation of a countermeasure unless asso-
4 ciated with such threats;
5 "(C) information obtained pursuant to ac-
6 tivities authorized under this subsection will
7 only be retained, used or disclosed to protect
8 Federal systems from cybersecurity threats,
9 mitigate against such threats, or, with the ap-
10 proval of the Attorney General, for law enforce-
11 ment purposes when the information is evidence
12 of a crime which has been, is being, or is about
13 to be committed; and
14 ''(D) notice has been provided to users of
15 Federal systems concerning· the potential for ac-
16 quisition, interception, retention, use, and dis-
17 closure of communications and other system
18 traffic.
19 "(2) CONTRACTS.- The Secretary may enter
20 into contracts or other agreements, or otherwise re-
21 quest and obtain the assistance of, private entities
22 that provide electronic communication or
23 cybersecurity services to acquire, intercept, retain,
24 use, and disclose communications and other system
25 traffic consistent with paragraph (1).
f:VHLC042412042412.370.xml (52420211)
April24, 2012 (2:19p.m.)
18. F:M12JACKSOJACKS0_375.XML
3
1 "(3) PRIVILEGED COMJ'vlUNICATIONS.-No oth-
2 erwise privileged communication obtained in accord-
3 ance with, or in violation of, this section shall lose
4 its privileged character.
5 " (4) POLICIES AND PROCEDURES.- The Sec-
6 retary of Homeland Security shall establish policies
7 and procedures that-
8 ''(A) minimize the impact on privacy and
9 civil liberties, consistent with the need to pro-
10 teet Federal systems and critical information
11 infrastructure from cybersecurity threats and
12 mitigate cybersecurity threats;
13 "(B) reasonably limit the acquisition,
14 interception, retention, use, and disclosure of
15 communications, records, system traffic, or
16 other information associated with specific per-
17 sons consistent with the need to carry out the
18 responsibilities of this section, including· estab-
19 lishing a process for the timely destruction on
20 recognition of communications, records, system
21 traffic, or other information that is acquired or
22 intercepted pursuant to this section that does
23 not reasonably appear to be related to pro-
24 tecting Federal systems and critical information
f:VHLC042412042412.370.xml (52420211)
April24, 2012 (2:19p.m.)
19. F:Ml2VACKSOVACKS0_375.XML
4
1 infrastructure from cybersecurity threats and
2 mitigating cybersecurity threats;
3 "(C) include requirements to safeguard
4 communications, records, system traffic, or
5 other information that can be used to identify
6 specific persons from unauthorized access or ac-
7 quisition; and
8 "(D) protect the confidentiality of dis-
9 closed communications, records, system traffic,
10 or other information associated with specific
11 persons to the greatest extent practicable and
12 require recipients of such information to be in-
13 formed that the communications, records, sys-
14 tem traffic, or other information disclosed may
15 only be used for protecting information systems
16 against cybersecurity threats, mitigating
17 against cybersecurity threats, or law enforce-
18 ment purposes when the information is evidence
19 of a crime that has been, is being, or is about
20 to be committed, as specified by the Secretary.
Page 14, after line 24, insert the following:
21 "(2) COUNTERMEASURE.-The term 'counter-
22 measure' means an automated action with defensive
23 intent to modify or block data packets associated
24 with electronic or wire communications, internet
f:VHLC042412042412.370.xml (52420211)
April24, 2012 (2:19p.m.)
20. F:Ml2JACKS0JACKS0_375.XML
5
1 traffic program od , or oth r ystem tr ffic
2 transiting to or from or stored on an information
3 ystem to counteract a yb r ecm'ity threat." .
f:VHLC042412042412,370.xml (52420211)
April24, 2012 (2:19p.m.)
21. 6. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
QUAYLE OF ARIZONA OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
22. AMENDMENT TO THE RULES COMMITTEE PRINT
OF H.R. 3523
OFFERED BY M(l. . - . ll -___;_----1-
lowing:
1 "(1) LIMITATION.-The Federal Government
2 may use cyber threat information shared with the
3 Federal Government in accordance with subsection
4 (b)-
5 ''(A) for cybersecurity purposes;
6 "(B) for the investigation and prosecution
7 of cybersecurity crimes;
8 '' (C) for the protection of individuals from
9 the danger of death or serious bodily harm and
10 the investigation and prosecution of crimes in-
11 volving such danger of death or serious bodily
12 harm;
13 "(D) for the protection of nunors from
14 child pornography, any risk of se},.llal ex:ploi-
15 tation, and serious threats to the physical safe-
16 ty of such minor, including kidnapping and
17 trafficking and the investigation and prosecu-
18 tion of crimes involving child pornography, any
f:VHLC042412042412.144.xml (52351312)
April 24, 2012 (11 :30 a.m.)
23. F:PKBIN'I112H3523FLR-FED-USE_OOI .X:ML
2
1 r1 k of A al
'll :A
-ploitation, aud s ·non.· tlu·eat.
2 to the 1 hysi a! saf .t-y of minors, in luding kid-
3 napping an 1 tr affickiJtg and an. r r im refen d
4 to in 225 J (a)(2) f t itl 1 , nit d
5 Co 1e; or
6 "(E) ·o } ote t th na.tioual ecurjty of t h
lr
7 United ates.
a · 16 b fm e lin 1 in 'ert th following:
8 l'13ER E URIT RiliiE. -rrhe tern
9 ' yb r ecurity m·ime' means-
10 ''(A) a crim uud r a ~ ed -ral or tate law
11 tha m olve -
12 '' (i) effort o deoTacle, disrupt, or de-
13 stro. a ystem or network;
14 "(ii) e 'fort. to gain nnat tl 01 iz cl a -
15 cess o a s. stem or 11 ~"' ork; or
16 '(iii) efforts to exfiltra e il forn ation
17 from a sy·tcm or net ork 1.tho It autho r-
18 izati n·I or
19 "(B) the ,rjolation of a 1 rovisiou of Fed ral
20 .law relatiu · to omputer rimes, in luding a
21 violation of a n. prov1S10n of title 1 nit d
22 om-
f:VH LC042412042412: 144,xml (52351312)
April 24, 2012 (11 :30 a.m.)
24. F:PKBIN1112H3523FLR-FED-USE_OOI.XML
3
1 puter Fraud and Abuse Act of 1986 (Public
2 Law 99-474).".
f:VHLC042412042412.144.xml (52351312)
April 24, 2012 (11 :30 a.m.)
25. 7. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE AMASH
OF MICHIGAN OR HIS DESIGNEE, DEBATABLE FOR 10 MINUTES
26. -
AMENDMEN-F-'TO THE RULES COMMITTEE ~.1.-...rrfl
-~---
OF H.R. 3523
OFFERED BY MR. AMAsH OF MICHIGAN
Page 10, after line 10, insert the following new
paragraph:
1 " ( 4) PROTECTION OF SENSITIVE PERSONAL
2 DOCUMENTS.-The Federal Government may not
3 use the following information, containing informa-
4 tion that identifies a person, shared with the Federal
5 Government in accordance with subsection (b):
6 "(A) Library circulation records.
7 "(B) Library patron lists.
8 " (C) Book sales records.
9 "(D) Book customer lists.
10 "(E) Firearms sales records.
11 "(F) Tax return records.
12 "(G) Educational records.
13 "(H) Medical records.
f:VHLC042412042412.478.xml (52412014)
April24, 2012 (3:56p.m.)
27. 8. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
MULVANEY OF SOUTH CAROLINA OR HIS DESIGNEE,
DEBATABLE FOR 10 MINUTES
28. F:PKBfNT112H3523FLR":~nN-RET-USE_OOI.XML
_....
.AMENDMENTTO THE RULES COMMITTEE PRINT
..-
Page 10, after line 10 insert the following:
1 "(4) NOTIFICATION' OF N'ON'-CYBER THREAT TN'-
2 FORl1ATTO~.-If a department or agency of the Fed-
3 eral Government receiving information pursuant to
4 . subsection (b)(]) determines that such information
5 is not cyber threat information, such department or
6 agency shall notify the entity or provider sharing
7 such information pursuant to subsection (b)(1).
8 " ( 5) RwrEN'TION AN'D USE OJ<, CYT-3ER THHEAT
9 J~rpoRMATHH.-No department or agency of the
10 Federal Government shall retain or use information
11 shared pursuant to subsection (b)(1) for any use
12 other than a use permitted under subsection (c)(1).
13 "(6) PROTECTTO~ OF TNDT'TDUATj T~'FORMA-
14 TTO:' .-The Federal Government may, consistent
15 Yrith the need to protect Federal systems and critical
16 information infrastn1cture from cybersecurity
17 threats and to mitigate such threats, undertake rea-
18 sonable efforts to limit the impact on privacy and
19 civil liberties of the sharing of cyber threat informa-
f:VHLC042412042412 .352.xml (52413712)
April 24, 2012 (2:02 p.m.)
29. F:PKBTNl112113523FLR-MlN-RET-USE_OO 1.XML
2
1 tion with the Fedei'HI GoYemment. pnrsuant. to this
2 ~uhsection.
P~1ge 1 ~~ . after l·i11e 1:-3, im;ert t.he following:
3 "( 4) U:-;E ,:'1) HE'l'Ei'TTO:' OF f NFORi l i1'10~. -
4 Nothing in this seetion shall be constmecl to author-
S iz.e, or to mocli(v any existing author·ity of, a clepart-
6 ment 01· agency of the F edel'al Government to retain
7 01· nsc information shared pursuant to subsecti o11
8 (b)(l) fm· any use oiher ihau a usc pe11nitled under
9 sui>S<'<'t.ion (c)( 1).".
f:VHLC0424 12042412.352.xml (524 13712)
April24, 2012 (2:02p.m.)
30. 9. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE FLAKE
OF ARIZONA OR HIS DESIGNEE, DEBATABLE FOR 10 MINUTES
31. F:Ml2FLAKEFLAKE_214'JCMb
#~-
O:FFJQJJEQ llY MB. ~-OF ARizONA
Page 12, after line 18, insert the following new sub-
paragraph:
1 "(E) a list of the department o1· agency re-
2 ceiving such information;
I:VHL0042012042012.325.xml (52345616)
April20, 2012 (5:15p.m.)
32. 10. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
RICHARDSON OF CALIFORNIA OR HER DESIGNEE, DEBATABLE
FOR 10 MINUTES
33. F: MJ2~4.
AMENDMENT TO THE RULES COMMI1"l'EE
..- PRJNP
QF H.R. 3323
0FFEREn BY Ms. RICHARDSON OF CALIFORNIA
P ag 14, after line , ins rt the following new sub-
paragTaph:
11
1 ( ) prohibit a d :partment or a · ncy o£
2 the Federal Government from providing cyber
3 threat informc tion to owners and op rator of
4 cdtical infrastructur ·
1:VHLC04·2312042312.037.xml (52362612)
Ap ril 23, 2012 (1 0:42 a.m.)
34. 11. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
POMPEO OF KANSAS OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
35. HE RULES COMMITTEE PRINT
OF H.R. 3523
OFFERED BY M~. PoMfeo
Page 14, after line 13, insert the following:
"( 4) J_;Il'IITATIOK 0:' F'EDERAI1 GOVERNlTEKT
2 nm OF CYBERSECI;RITY SYSTEMS.-Nothing in this
3 section shall be construed to provide additional au-
4 thority to, or modify an existing authority of, any
5 entity to use a cybersecurity system .mvned or con-
6 trolled by the Federal Government on a private-sec-
7 tor system or network to protect such private-sector
8 system or netvi'Ork.".
f:VHLC042412042412.282 .xml {52349812)
April 24, 2012 (1 :05 p.m.)
36. 12. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
WOODALL OF GEORGIA OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
37. - --
-----
AMENDMENT- TO -THE RULES COMMI'ITEE PRINT
.
-
OF H.R. 3523
OFFERED BY MR. WOODALL OF GEORGIA
Page 14, after line 13 insert the following:
1 ' (4) N L ILITY F 1 N-PARTI IP '1'1 I .-
2 Nothing in thi. ction hall be con tru ct t ubject
3 protected ntity self-protected ntity cy er cu-
4 rity rovid r or an officer, employ , or ag nt of a
5 I rotccted entity, lf-prote ted ntit , r yber ·e u-
6 rity provider, to liability for hoo in · not to enoag
7 in the voluntary a tivities au horiz d under thi
8 1 n.
f:VHLC042012042012.066.xml (5233361
3)
April 20, 2012 (10:52 a.m.)
38. 13. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
GOODLATTE OF VIRGINIA OR HIS DESIGNEE, DEBATABLE FOR
lOMINUTES
39. ~ULES COMMITTEE PR-
OF H.R. 3523
OFFERED BY Mt2.. ~
Page 14, after line 14 insert the follmving:
1 "(1) AvAILABILI'rY.-The term 'availability'
2 means ensuring timely and reliable access to and use
3 of information.
Page 15, strilm lines 1 through 25 and insert the
following:
4 "(2) CoN:F'IDENTIALITY.-The term 'confiden-
5 tiality' means preserving authorized restrictions on
6 access and disclosure, including means for protecting
7 personal privacy and proprietary information.
8 "(3) CYBER THREAT 11TFORMATION.-
9 "(A) IN GENERAL.-The term 'cyber
10 threat information' means information directly
11 pertaining to-
12 "(i) a vulnerability of a system or net-
13 work of a government or private entity;
14 "(ii) a threat to the integrity, con-
15 fidentiality, or availability of a system or
16 network of a government or private entity
f:VHLC042412042412.331.xml (52350113)
April 24, 2012 (1 :43 p.m.)
40. F:PKBINT112H3523FLR-CYBER-DEFS_OOl.XML
2
1 or any information stored on, processed on,
2 or transiting such a system or network;
3 "(iii) efforts to degrade, disrupt, or
4 destroy a system or network of a govern-
5 ment or private entity; or
6 "(iv) efforts to gain unauthorized ac-
7 cess to a system or network of a govern-
8 ment or private entity, including to gain
9 such unauthorized access for the purpose
10 of exfiltrating information stored on, proc-
11 essed on, or transiting a system or network
12 of a government or private entity.
13 "(B) EXCLUSION.- Such term does not
14 include information pertaining to efforts to gain
15 unauthorized access to a system or network of
16 a govenm1ent or private entity that solely in-
17 volve violations of consumer terms of service or
18 consumer licensing agreements and do not oth-
19 erwise constitute unauthorized access.
20 "( 4) CYBER 'fHREAT INTELLIGENCE.-
21 "(A) IN GEl"'ERAL.-The term 'cyber
22 threat intelligence' means intelligence in the
23 possession of an element of the intelligence
24 community directly pertaining to-
f:VHLC042412042412.331.xml (52350113)
April 24, 2012 (1 :43 p.m.)
41. F:PKBINT112H3523FLR-CYBER-DEFS_OO l.XML
3
1 "(i) a vulnerability of a system or net-
2 ·work of a government or private entity;
3 "(ii) a threat tb the integrity, con-
4 fidentiality, or availability of a system or
5 net,.vork of a government or private entity
6 or any information stored on, processed on,
7 or transiting such a system or network;
8 "(iii) efforts to degrade, disrupt, or
9 destroy a system or network of a govern-
10 mentor private entity; or
11 "(iv) efforts to gain unauthorized ac-
12 cess to a system or network of a govern-
13 ment or private entity, including to gain
14 such unauthorized access for the purpose
15 of exfiltrating information stored on, proc-
16 essed on, or transiting a system or network
17 of a g·overnment or private entity.
-
18 "(B) ExcLusroN . - Such term does not
19 include intelligence pertaining to efforts to gain
20 unauthorized access to a system or network of
21 a govenm1ent or private entity that solely in-
22 volve violations of consumer terms of service or
23 consumer licensing agreements and do not oth-
24 e:rwise constitute unauthorized access.
f:VHLC042412042412.331.xml (52350113)
April 24, 2012 (1 :43 p.m.)
42. F:PKBIN1112H3523FLR-CYBER-DEFS_OO l.XML
4
I ag • J 6, ·trike ln1c 5 and all h a follow. thr ngh
pag 17 li11e 2, and insert the fo U 10':
owi1
1 cc ( 5) YBERSE IUT PURP E.-
2 I , 'Er-..TER.AL.-The term
3 b 1·s m·ity puq' s ' m ans t he purpo of
4 ensuring the int grity, conf iclentiality, or ava il-
5 abilit. of, or safe 11ardi.J · e: •• r em 1· 11 tv r k,
6 il1 u ding prot ting a m or n tvork
7 fr011 -
8
9
10 "(ii) a tlu~ at t th integTit.r' ·on-
11 fi entia lity or av ila ility of a y tern or
12 netvork or any inf rmation tor l on,
13 pro •esscd n 01· transit i:n · . n 1 a sy · en
14 or 11 t ork;
15 1
(iii) ff rts l oTa l di rup or
16
17 "Uv) ff rt. t ain una 1thorized ac-
18 c to a s. t m r n · ~' ork, in luding to
19 ·< in such unauth riz d a ·ss for th pm·-
20 po of "x.tutrating inform ti n . tor d on,
21 pr es d on, or trausiti.J1 · a r
22 network.
f:VHLC042412042412.331.xml (523501 1
3)
April24, 2012 (1:43 p.m.)
43. F:PKBINT112H3523FLR-CYBER-DEFS_OO l.XML
5
1 ''(B) ExcLUSION.- Such term does not
2 include the puq)ose of protecting a system or
3 network from efforts to gain unauthorized ac-
4 cess to such system or network that solely in-
5 volve violations of consumer terms of service or
6 consumer licensing agreements and do not oth-
7 erwise constitute unauthorized access.
8 "(6) CYBERSECURITY SYSTEM.-
9 "(A) IN GE:r--.TERAL.-The term
10 'cybersecurity system' means a system designed
11 or employed to ensure the integTity, confiden-
12 tiality, or availability of, or safeguard, a system
13 or netvvork, including protecting a system or
14 network from-
15 "(i) a vulnerability of a system or net-
16 work·
'
17 "(ii) a threat to the integrity, con-
18 fidentiality, or availability of a system or
19 network or any information stored on,
20 processed on, or transiting such a system
21 or network·
'
22 "(iii) efforts to degrade, disrupt, or
23 destroy a system or netvvork; or
24 "(iv) efforts to gain unauthorized ac-
25 cess to a system or network, including to
f:VHLC042412042412.331.xml (52350113)
April 24, 2012 (1 :43 p.m.)
44. F:PKBINT112H3523FLR-CYBER-DEFS_OOl.XML
1
2 po ' of ex.5ltrC~ting inf rmatiou s red on
3 proc '. s d n ' or tran itino· a
b
, tcm or
4 net vork
5 ' ( ) Ex r-' n b erm doc · not
6 in lud a sy 't m design d or n plo. d t pro-
7 •c a r n twork from effort to oam
8 .m auth rize] ace ·t .·u h ) , en or network
9 that ol ly invo1v violation.· of •ou. un cr terms
10 of . crvi e r ou um r li u, in · a.oTe mer ts and
11 d n t th rwis c(mstitute unauthoriz d a ces .
Pag 17, after lin 2 il1 ert t.h following:
12 "(7) Ir'rEGI ITY.-Th • tern integrit. ' m an.
13 ouarding ao-ainR im] TO] r infor11 ation moclifi ation
14 or c1 tru tion, includino· en uring information non-
15 repudiation and autheu i ity.
I:VHLC042412042412.331.xml (52360113)
April24, 2012 (1:43 p.m.)
45. 14. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
TURNER OF OHIO OR HIS DESIGNEE, DEBATABLE FOR 10
MINUTES
46. F:Ml2TURNERTURNER_090.XML
-
AMEND~:NT-TO -n.ULEs COMMITI'EE PRINT OF
R.R. 8523
OFFERED BY MR. TURNED. oF Omo
Pa ·e 15, line 7 insert d ny ace s to or" b for
'deoTc de".
age 5, ill e 20 in ert 'den: , cce to or" b fo r
"degrade" .
Pag l 6, line 10, insert "deny acces · to or" before
'degrad ' .
P age 16, line 21 h sert Hd n access to or' before
'c1 grad '
1:VHLC042012042012.067 .xml (52340211)
April 20, 2012 (1 0:53a.m.)
47. 15. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
MULVANEY OF SOUTH CAROLINA OR HIS DESIGNEE,
DEBATABLE FOR 10 MINUTES
48. AMENDMENT TO THE RULES COMMITTE:E PRINT
~ OF H.R. 3523
OFFERED BY MR. MULVANEY OF SOUTH
CAROLINA
At the end of the bill, add the following· new section:
1 SEC. 3. SUNSET.
2 Effective on the date that is five years after the date
3 of the enactment of this Act-
4 (1) section 1104 of the National Security Act of
5 19 4 7, as added by section 2 (a) of this Act, is re-
6 pealed; and
7 (2) the table of contents in the first section of
8 the National Security Act of 1947, as amended by
9 section 2(d) of this Act, is amended by striking the
10 item relating to section 1104, as added by such sec-
11 tion 2(d).
f:VHLC042412042412.418 .xml (52423811)
April 24, 2012 (3:03p.m.)
49. 16. AN AMENDMENT TO BE OFFERED BY REPRESENTATIVE
PAULSEN OF MINNESOTA OR HIS DESIGNEE, DEBATABLE FOR
lOMINUTES
50. F:M12PAULSEPAULSE_066.XML
-·AMENDMENT TO THE RULES CoMMITTEE PRINT
.
OF H.R. 3523
OFFERED BY MR. PAULSEN OF MINNESOTA
At the end of the bill, add the following new section:
1 SEC. 3. INTERNATIONAL COOPERATION.
2 International cooperation with regard to
3 cybersecurity should be encouraged wherever possible
4 under this Act and the amendments made by this Act.
f:VHLC041912041912.457.xml (52337711}
April19, 2012 (5:38p.m.)