Chapter
Chapter 2 LETTER FOR PROPOSED CYBERSECURITY LEGISLATION
Chapter 3 LEGISLATIVE LANGUAGE:LAW ENFORCEMENT PROVISIONS RELATED TO COMPUTER SECURITY
PART 1. SPECIFIC CRIMINALIZATION OF DAMAGING CRITICAL INFRASTRUCTURE COMPUTERS
PART 2. CLARIFYING THE SCOPE AND PENALTIES FOR OFFENSES UNDER THE COMPUTER FRAUD AND ABUSE ACT
Cybersecurity Regulatory Framework for Covered Critical Infrastructure Act
Personnel Authorities Related to Cybersecuirty Positions
PREVENTING RESTRICTIONSON DATA CENTER LOCATIONS
Chapter 4 SECTION BY SECTION ANALYSIS: LAW ENFORCEMENT PROVISIONS RELATED TO COMPUTER SECURITY
DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY AND INFORMATION SHARING
Sec. 1. Department of Homeland Security Cybersecurity Authority
CYBERSECURITY REGULATORY FRAMEWORK FOR COVERED CRITICAL INFRASTRUCTURE ACT
Sec. 3. Designation of Covered Critical Infrastructure
Sec. 4. Risk Mitigation for Covered Critical Infrastructure
Sec. 5. Cybersecurity Plans
AMENDMENTS TO THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT OF 2002
Sec. 1. Coordination of Federal Information Security Policy
PERSONNEL AUTHORITIES RELATED TO CYBERSECURITY POSITIONS
PREVENTING RESTRICTIONS ON DATA CENTER LOCATIONS