tailieunhanh - GOVERNMENT NETWORK SECURITY ACT OF 2003

Companies, including Internet Service Providers (ISPs) and security and software vendors, are already conducting active operations to mitigate cybersecurity attacks. However, these are largely done independently according to their individual business interests and priorities. Congress should facilitate an organization outside of government to act as a clearing house of information and intelligence sharing between the government and critical infrastructure to improve security and disseminate real-time information designed to help target and defeat malicious cyber activity. . | AUTHENTICATED . GOVERNMENT INFORMATION GPỌ 108th Congress 1st Session I HOUSE OF representatives Report 108-305 government network security act of 2003 October 7 2003. Committed to the Committee of the Whole House on the State of the Union and order to be printed Mr. Tom Davis of Virginia from the Committee on Government Reform submitted the following r e p o r t To accompany . 3159 Including cost estimate of the Congressional Budget Office The Committee on Government Reform to whom was referred the bill . 3159 to require Federal agencies to develop and implement plans to protect the security and privacy of government computer systems from the risks posed by peer-to-peer file sharing having considered the same report favorably thereon without amendment and recommend that the bill do pass. contents Page Committee Statement and Views . 1 Section-by-Section . 4 Explanation of Amendments . 5 Committee Consideration. 5 Rollcall votes . 5 Application of Law to the Legislative Branch . 5 Statement of Oversight Findings and Recommendations of the Committee . 5 Statement of General Performance Goals and Objectives . 6 Constitutional Authority Statement . 6 Unfunded Mandate Statement . 6 Committee Estimate . 6 Changes in Existing Law Made by the Bill as Reported. 6 Budget Authority and Congressional Budget Office Cost Estimate . 6 committee statement and views Purpose . 3159 requires that federal agencies address the security and privacy risks posed by peer-to-peer file sharing programs when developing their network policies and procedures. Agencies must ensure that federal computers and the important information they 29-006 2 store remain secure private and protected but agencies are given the flexibility to develop the most appropriate means of accomplishing this goal through a combination of technological means such as firewalls or non-technological means such as employee training . Background and need for the legislation Peer-to-peer file-sharing programs are