Status: Pending While government has no monopoly on the means of access to cyber-space, it has a duty to provide cybersecurity as citizens’ expectations of free- Status: Failed--adjourned Provides that each community water system shall create a plan that establishes policies and procedures for identifying and mitigating cyber risk. Relates to the secretary of state, creates a technology and cybersecurity account, provides for technology and cybersecurity maintenance. Concerns security breaches of election systems or election data including by foreign entities. Federal Cybersecurity Laws. Status: Failed--adjourned Status: Failed--adjourned Creates an Election Systems Cybersecurity Review Board to provide a security analysis of the elections systems and facilities, creates a Cybersecurity Incident Response Group to establish protocols and policy planning for cybersecurity threats at any state agency. Establishes the Cybersecurity Coordination and Operations Office within the Emergency Management Agency to help improve statewide cybersecurity readiness and response, requires the director of MEMA to appoint an executive director as head of the office, requires the office to be provided with sufficient staff to perform the office's functions, requires the office to establish regional assistance groups to deliver or coordinate support services to political subdivisions and agencies. Provides for qualifications of volunteers to cyber response and recovery support efforts with the Governor's Office of Homeland Security and Emergency Preparedness. Status: Pending Establishes the offenses of phishing in the third degree, phishing in the second degree and phishing in the first degree, relates to the time in which prosecution of such offenses must be commenced. Relates to cybersecurity insurance preference in state contracts. At its 24th session, HLCP tasked the Group, under the leadership of ITU and UNODC, to develop a draft policy on cybercrime and cyber security that focused on the external dimension of the issue, in particular on how the UN system mainstreamed cybercrime and cyber security issues into programmes delivered to Member States. Customers visit the Apple store of the Grand Central Terminal in New York, the United States, March 1, 2016. Facilitates the sharing of information and reporting of cyberattacks, requires governmental agencies and utilities to report any cyberattacks to the director of emergency management and homeland security, provides for the director to promulgate certain rules and regulations, provides for proceedings related to cybersecurity to be held in executive session, provides for certain information, data, and reports related to cybersecurity and cyberattacks to be exempt from public disclosure and inspection. Relates to elections, provides for election technology and cybersecurity assessment, maintenance and enhancement, requires certain election security notifications. Status: Pending MN S 4269 Relates to elections, transfers and appropriates money for purposes of the Help America Vote Act. Establishes a cybercrime investigation, requires the Department of Public Safety to investigate crimes with a nexus to the internet or computer technology including crimes involving child exploitation and cyber intrusion. Specifically, in the United States, the problem of cybersecurity is not being given proper attention or funding and it is putting our nation’s (Special session) Establishes the State Cybersecurity and Information Technology Fund; provides for the dedication and use of monies in the fund; provides for deposits into the fund; provides for the powers and duties of the Joint Legislative Committee on the Budget and the Joint Legislative Committee on Technology and Cybersecurity; provides restrictions on use of the monies. IA S 575 FL H 821 Status: Failed--adjourned IL H 4444 Supporting programs or incentives for cybersecurity training and education. The difficulty of reaching multilateral agreement on cybersecurity and space issues means the United States should address space cybersecurity in plurilateral and bilateral contexts. MA H 223 Provides for the mandatory training in cybersecurity awareness for all state and local employees, officials and contractors. FL S 1170 Relates to emergency reporting, requires a county or municipality to report certain incidents to the State Watch Office within the Division of Emergency Management, authorizes the division to establish guidelines to specify additional information that must be provided by a reporting county or municipality. NC S 284 MD H 635 PA H 140 United States, thus face a stiff challenge: how to reduce vulnerability, optimize commercial and national security, and respect individual liberty. OK S 1204 GA H 1049 MN H 2743 Status: Failed--adjourned Requires manufacturers of connected devices to equip such devices with reasonable security features. Status: Enacted input, textarea { padding: 4px; border-radius: 5px; margin-bottom: 10px; } Removes the specified amount economic harm requirement from the felony commercial bribery statutes, expands the crime of larceny to include theft of personal identifying information, computer data, computer programs, and services, to adapt to modern technological realities, provides state jurisdiction and county venue over cases involving larceny of personal identifying information, computer data, and computer programs, where the victim is located in the state or the county. This … It may be surprising that an overarching federal cybersecurity law doesn’t yet exist in the United States. MI S 205 Creates an elections systems cybersecurity review board to provide a security analyses of the elections systems and facilities and would create a cybersecurity incident response group to establish protocols and policy planning for cybersecurity threats at any state agency. Creates specific computer crimes as well as increasing penalties for crimes committed with the aid of a computer, provides for civil relief in cases of pornography on the internet, and penal sanctions in such cases. Status: Pending Status: Failed--adjourned The internet increasingly depends on space-enabled communication and information services. Requires that the Commissioner of Emergency Services and Public Protection analyze municipal cybersecurity needs throughout the state and determine the feasibility of the Department of Emergency Services and Public Protection providing individualized assistance to municipalities most at risk of suffering cybersecurity attacks. Status: Failed--adjourned The CFAA prohibits: (1) unauthorised access (or exceeding authorised access) to a computer and obtaining national security information; (2) unauthorised access (or exceeding authorised access) to a computer that is used in interstate or foreign commerce and obtaining information; (3) unauthorised access to a non-public computer used by the United States government; (4) knowingly accessing a protected computer … Status: Failed--adjourned WA S 6285 Creates and provides for the Joint Legislative Committee on Technology and Cybersecurity. IA SSB 3010 Regulating cybersecurity within the insurance industry or addressing cybersecurity insurance. Relates to the insurance data security law. Relates to insurance, establishes an Insurance Data Security Law. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. Status: Enacted MD S 30 GA S 493 Status: Failed--adjourned FL H 865 NY A 291 Status: Failed--adjourned IL H 4559 SC H 4293 WI A 819 We have to see cyber security not only from the sectoral perspective, but also from the national perspective." Orders the House Committees on Finance and Public Security to investigate the information systems of the Department of the Treasury, its maintenance and the reasons for a cyber virus that caused on Jan. 6, 2017, the Department of the Treasury to raise about $20 million, determines if the information from taxpayers and the government hosted on the servers of the Department of the Treasury was affected as a result of this cyber virus. Defending America’s cyberfrontier with a 5G ‘clean path’. MD H 1618 Status: Pending Concerns enhancing cybersecurity by eliminating the return of ballots by fax and email. VA S 378 Status: Pending VT H 157 Status: Pending Prohibits the state and political subdivisions of the state from exStatus: Pending public money for payment to persons responsible for ransomware attacks. Relates to General Appropriations Act, provides moneys for annual period beginning on a specified date, and ending on a specified date, and supplemental appropriations for period ending on a specified date, to pay salaries and other expenses, capital outlay-buildings and other improvements, and for other specified purposes of various agencies of state government, includes funding for certain coronavirus response items. IL HJR 1 (Constitutional Amendment) Establishes the State Cybersecurity and Information Technology Fund, dedicates revenues to the fund. Status: Enacted A host of new and evolving cybersecurity threats has the information security industry on high alert. But what public policy issues are the statehouses so busy with? NH S 694 Creates a credit against income tax for qualified software or cybersecurity employees. NY A 7682 DC B 612 IL S 1719 The need to better protect military systems is well recognized. Designates October of each year as Cyber Security Awareness Month. Status: Failed--adjourned Status: Enacted Status: Enacted Amends the Election Code, requires the State Board of Elections, in consultation with the Department of Innovation and Technology, to study and evaluate the use of blockchain technology to protect voter records and election results with the assistance of specified experts, requires the board to submit a report on the use of blockchain technology to the governor and General Assembly, repeals the provisions on Jan. 1, 2023.