To amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes.
(Sec. 4) Requires the Institute to develop uniform standards for the cost-effective security and privacy of sensitive information in certain Federal systems, provide a list of certified commercial computer system security products, and report annually on Federal computer system evaluations.
(Sec. 5) Directs the Institute to solicit Computer System Security and Privacy Advisory Board recommendations regarding standards. Authorizes appropriations for FY 2002 and 2003 to enable the Board to identify emerging computer security, privacy, and cryptography issues.
(Sec. 6) Prohibits the Institute from adopting encryption and electronic authentication standards for other than Federal computer systems.
(Sec. 7) Authorizes (current law requires) the Institute to draw upon National Security Agency computer security guidelines.
(Sec. 8) Amends the Computer Security Act of 1987 to require Federal computer security training to emphasize protecting information accessible through public networks.
(Sec. 9) Authorizes appropriations for FY 2002 and 2003 for fellowships to students in computer security.
(Sec. 10) Requires a National Research Council of the National Academy of Sciences to: (1) conduct a study of electronic authentication technologies; and (2) report to specified congressional committees on its findings, conclusions, and recommendations for public policy related to such technologies. Authorizes appropriations for FY 2002.
(Sec. 11) Directs the Under Secretary of Commerce for Technology to promote an increased use of security technologies for the nation's information infrastructure, establish a central repository of information on security vulnerability and risks, and promote the development of national infrastructures for encryption technologies.
(Sec. 12) Directs the Institute's Director to develop technology-neutral electronic authentication infrastructure standards for Federal agencies, provide a list of commercially available authentication products, establish core specifications for Federal electronic certification and management technologies, provide a list of conforming systems, and report annually on infrastructure implementation.
(Sec. 13) Authorizes appropriations for FY 2002 and 2003.
Introduced in House
Introduced in House
Referred to the House Committee on Science.
Mrs. Morella moved to suspend the rules and pass the bill, as amended.
Considered under suspension of the rules. (consideration: CR H8351-8356)
DEBATE - The House proceeded with forty minutes of debate on H.R. 1259.
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Considered as unfinished business. (consideration: CR H8391)
Passed/agreed to in House: On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 391 - 4 (Roll no. 449).(text: CR H8351-8353)
Roll Call #449 (House)On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 391 - 4 (Roll no. 449). (text: CR H8351-8353)
Roll Call #449 (House)checking server…
Ask anything about this bill. The AI reads the full text to answer.
Enter to send · Shift+Enter for new line
Motion to reconsider laid on the table Agreed to without objection.
Received in the Senate and Read twice and referred to the Committee on Commerce, Science, and Transportation.