HR-3869 : Still Just a Bill


State and Local Cyber Protection Act of 2015

This bill amends the Homeland Security Act of 2002 to require the Department of Homeland Security's (DHS's) national cybersecurity and communications integration center (NCCIC) to assist state and local governments with cybersecurity by:

  • upon request, identifying system vulnerabilities and information security protections to address unauthorized access, use, disclosure, disruption, modification, or destruction of information collected or maintained by, or information systems used or operated by, state or local governments or other organizations or contractors on their behalf;
  • providing via a web portal updated resources and guidelines related to information security;
  • coordinating through national associations to implement information security tools and policies to ensure the resiliency of state and local information systems;
  • providing training on cybersecurity, privacy, and civil liberties;
  • providing requested technical assistance to deploy technology that continuously diagnoses and mitigates cyber threats and to conduct threat and vulnerability assessments;
  • coordinating vulnerability disclosures under standards developed by the National Institute of Standards and Technology; and
  • ensuring that state and local governments are aware of DHS resources and other federal tools to ensure the security and resiliency of federal civilian information systems.

The NCCIC's privacy and civil liberties training must include: (1) reasonable limits on the receipt, retention, use, and disclosure of information associated with specific persons that is not necessary for cybersecurity purposes; (2) data integrity standards requiring the prompt removal and destruction of obsolete or erroneous names and personal information that is unrelated to the risk or incident information; and (3) safeguards and confidentiality protections for cyber threat indicators and defensive measures, including information that is proprietary or business-sensitive that may be used to identify specific persons from unauthorized access or acquisition.

Action Timeline

Action DateTypeTextSource
2015-12-14IntroReferralReceived in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs.Senate
2015-12-10FloorThe title of the measure was amended. Agreed to without objection.House floor actions
2015-12-10FloorMotion to reconsider laid on the table Agreed to without objection.House floor actions
2015-12-10FloorOn motion to suspend the rules and pass the bill, as amended Agreed to by voice vote. (text: CR H9255)House floor actions
2015-12-10FloorDEBATE - The House proceeded with forty minutes of debate on H.R. 3869.House floor actions
2015-12-10FloorConsidered under suspension of the rules. (consideration: CR H9255-9257)House floor actions
2015-12-10FloorMr. Hurd (TX) moved to suspend the rules and pass the bill, as amended.House floor actions
2015-12-03CalendarsPlaced on the Union Calendar, Calendar No. 276.House floor actions
2015-12-03CommitteeReported by the Committee on Homeland Security. H. Rept. 114-363.House floor actions
2015-11-04CommitteeOrdered to be Reported by Voice Vote.House committee actions
2015-11-04CommitteeCommittee Consideration and Mark-up Session Held.House committee actions
2015-11-02IntroReferralReferred to the House Committee on Homeland Security.House floor actions
2015-11-02IntroReferralIntroduced in HouseLibrary of Congress

Policy Area :

Government Operations and Politics
Related Subjects
  • Computer security and identity theft
  • Congressional oversight
  • Government information and archives
  • Intergovernmental relations
  • Right of privacy
  • State and local government operations
Related Geographic Entities
Related Organizations

Related Bills

See Related Bills