This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (November 2021)
This article may have been created or edited in return for undisclosed payments, a violation of Wikipedia's terms of use. It may require cleanup to comply with Wikipedia's content policies, particularly neutral point of view. (November 2021)
Protecting Cyber Networks Act
Long title
To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, to amend the Homeland Security Act of 2002 to enhance multi-directional sharing of information related to cybersecurity risks and strengthen privacy and civil liberties protections, and for other purposes.
Acronyms (colloquial)
PCNA
Announced in
the 114th United States Congress
Sponsored by
Devin Nunes
Number of co-sponsors
8
Codification
Acts affected
National Security Act of 1947, Intelligence Reform and Terrorism Prevention Act of 2004, Homeland Security Act of 2002
Office of the Director of National Intelligence, United States Attorney General, Inspector General of the Department of Homeland Security, Inspector General of the Intelligence Community, Inspector General of the Department of Justice, Inspector General of the Department of Defense, Council of Inspectors General on Financial Oversight, Under Secretary for Cybersecurity and Infrastructure Protection
Legislative history
Introduced in the House as H.R. 1560 by Devin Nunes on March 24, 2015
Committee consideration by House Permanent Select Committee on Intelligence
Passed the House on April 22, 2015 (307-116)
The Protecting Cyber Networks Act (H.R. 1560) is a bill introduced in the 114th Congress by Rep. Devin Nunes (R-CA), chairman of the House Permanent Select Committee on Intelligence.[1] The legislation would allow companies and the government to share information concerning cyber threats. To overcome privacy concerns, the bill expressly forbids companies from sharing information with the National Security Agency (NSA) or Department of Defense (DOD).[2]
The ProtectingCyberNetworksAct (H.R. 1560) is a bill introduced in the 114th Congress by Rep. Devin Nunes (R-CA), chairman of the House Permanent Select...
penetrate another nation's computers or networks for the purposes of causing damage or disruption". The target's own cyber-physical infrastructure may be used...
treat cyber as a domain; employ more active defenses; support the Department of Homeland Security in protecting critical infrastructure networks; practice...
The current NATO Definition of cyber terrorism is: 'A cyberattack using or exploiting computer or communication networks to cause sufficient destruction...
Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of...
responsible for protecting computer networks and networked infrastructure. The third priority of the FBI is to: "Protect the United States against cyber-based attacks...
21, 2013. Retrieved November 15, 2015. "Stranger Danger: Protecting Your Children from Cyber Bullying, Sexting, & Social Media". Archived from the original...
responding to current cyber related crime. The most recent cyber related law, according to NIST, was the NIST Small Business Cybersecurity Act, which came out...
Cyber-insurance is a specialty insurance product intended to protect businesses from Internet-based risks, and more generally from risks relating to information...
Union. It has been compared[by whom?] to the criticized Cyber Intelligence Sharing and Protection Act proposals of 2012 and 2013, which passed the United...
In internet governance, network sovereignty, also called digital sovereignty or cyber sovereignty, is the effort of a governing entity, such as a state...
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime...
The PROTECT IP Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act, or PIPA) was a proposed law with the...
States Cyber Command centralizes command of cyberspace operations, organizes existing cyber resources and synchronizes defense of U.S. military networks. It...
security (COMSEC), protecting federal government electronic information and communication networks, and is the technical authority for cyber security and information...
systems for protecting systems by intentionally increasing the complexity or variability of systems to make it harder to attack. The cyber resilience approach...
Proactive cyber defense, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood...
action. Cyber threats involve the use of computers, storage devices, software networks and cloud-based repositories. Prior to, during or after a cyber attack...
Illusive Networks Raises $22M Series B, Looks To Protect Through Deception". TechCrunch. Retrieved 2015-10-21. "Cyber security co illusive networks raises...
in order to counter a potential mass scale cyber attack. The Protecting Cyberspace as a National Asset Act of 2010 expired at the end of the 2009–2010...
Network segmentation in computer networking is the act or practice of splitting a computer network into subnetworks, each being a network segment. Advantages...
to celebrate the Act's 30th birthday, the CyberUp Campaign wrote an open letter to the prime minister on behalf of a number of cyber security industry...
The BSI is also responsible for protecting the IT systems of the federal government. This involves defending against cyber attacks and other technical threats...
Defence Act. The agency holds that it only uses metadata to identify foreign intelligence targets and their social networks, and possible cyber threats...
responsible for protecting an organization against cyber threats. SOC analysts perform round-the-clock monitoring of an organization’s network and investigate...
He is the co-founder of cyber-security companies Check Point and Imperva, as well as Cato Networks, a cloud-based network security provider. As of January...