US HB135 | 2017-2018 | 115th Congress
Status
Spectrum: Partisan Bill (Democrat 2-0)
Status: Introduced on January 3 2017 - 25% progression, died in committee
Action: 2017-01-12 - Referred to the Subcommittee on Regulatory Reform, Commercial And Antitrust Law.
Pending: House Subcommittee on Regulatory Reform, Commercial And Antitrust Law Committee
Text: Latest bill text (Introduced) [PDF]
Status: Introduced on January 3 2017 - 25% progression, died in committee
Action: 2017-01-12 - Referred to the Subcommittee on Regulatory Reform, Commercial And Antitrust Law.
Pending: House Subcommittee on Regulatory Reform, Commercial And Antitrust Law Committee
Text: Latest bill text (Introduced) [PDF]
Summary
Cyber Privacy Fortification Act of 2017 This bill amends the federal criminal code to provide criminal penalties for intentional failures to provide required notices regarding security breaches of computerized data that there is reason to believe resulted in improper access to specified sensitive personally identifiable information that is electronic or digital. A person who owns or possesses data in electronic form containing a means of identification, and who has knowledge of a major security breach of the system containing such data, must notify the U.S. Secret Service or the Federal Bureau of Investigation. A "major security breach" involves: (1) a means of identification pertaining to at least 10,000 individuals that is reasonably believed to have been acquired, (2) databases owned by the federal government, or (3) a means of identification of federal employees or contractors involved in national security matters or law enforcement. The Department of Justice and state attorneys general may bring civil actions and obtain injunctive relief for violations of federal laws relating to data security. Federal agencies must prepare and make available to the public privacy impact assessments that describe the impact of certain proposed and final agency rules on the privacy of individuals. Agencies may waive or delay certain privacy impact assessment requirements for emergencies and national security reasons. Federal agencies must: (1) periodically review promulgated rules that have a significant privacy impact on individuals or a privacy impact on a substantial number of individuals, and (2) consider whether each such rule can be amended or rescinded in a manner that minimizes any such impact while remaining in accordance with applicable statutes. The bill provides access to judicial review to individuals adversely affected or aggrieved by final agency action on any such rule.
Title
Cyber Privacy Fortification Act of 2017
Sponsors
Rep. John Conyers [D-MI] | Rep. Henry Johnson [D-GA] |
History
Date | Chamber | Action |
---|---|---|
2017-01-12 | House | Referred to the Subcommittee on Regulatory Reform, Commercial And Antitrust Law. |
2017-01-12 | House | Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. |
2017-01-03 | House | Referred to the House Committee on the Judiciary. |
2017-01-03 | House | Introduced in House |
Subjects
Administrative law and regulatory procedures
Business records
Civil actions and liability
Computer security and identity theft
Computers and information technology
Congressional oversight
Consumer affairs
Consumer credit
Criminal justice information and records
Government information and archives
Health information and medical records
Judicial review and appeals
Right of privacy
Science, technology, communications
Business records
Civil actions and liability
Computer security and identity theft
Computers and information technology
Congressional oversight
Consumer affairs
Consumer credit
Criminal justice information and records
Government information and archives
Health information and medical records
Judicial review and appeals
Right of privacy
Science, technology, communications
US Congress State Sources
Type | Source |
---|---|
Summary | https://www.congress.gov/bill/115th-congress/house-bill/135/all-info |
Text | https://www.congress.gov/115/bills/hr135/BILLS-115hr135ih.pdf |