PROTECTING YOUR DATA

The original wiki was heavily criticized for leakage of various IPs and editor residences.

This page is a recital of several laws from the

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

Ensuring to all users of Chads of /A/ that we are a safe and stable site that does not exchange

personal user statistics/data to any other third parties.

An Act

To codify an existing operations center for cybersecurity. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

This Act may be cited as the ‘‘National Cybersecurity Protection Act of 2014’’.

SEC. 2. DEFINITIONS.

In this Act—

(1) the term ‘‘Center’’ means the national cybersecurity and communications integration center under section 226 of the Homeland Security Act of 2002, as added by section 3;

(2) the term ‘‘critical infrastructure’’ has the meaning given that term in section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101);

(3) the term ‘‘cybersecurity risk’’ has the meaning given that term in section 226 of the Homeland Security Act of 2002, as added by section 3;

(4) the term ‘‘information sharing and analysis organization’’ has the meaning given that term in section 212(5) of the Homeland Security Act of 2002 (6 U.S.C. 131(5));

(5) the term ‘‘information system’’ has the meaning given that term in section 3502(8) of title 44, United States Code; and

(6) the term ‘‘Secretary’’ means the Secretary of Homeland Security.

SEC. 3. NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER.

(a) IN GENERAL.—Subtitle C of title II of the Homeland Security Act of 2002 (6 U.S.C. 141 et seq.) is amended by adding at the end the following:

‘‘SEC. 226. NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER. ‘‘(a) DEFINITIONS.—In this section— ‘‘(1) the term ‘cybersecurity risk’ means threats to and vulnerabilities of information or information systems and any related consequences caused by or resulting from unauthorized access, use, disclosure, degradation, disruption, modification, or destruction of information or information systems, including such related consequences caused by an act of terrorism; ‘‘(2) the term ‘incident’ means an occurrence that—

‘‘(A) actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system;

or

‘‘(B) constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies;

‘ ‘‘(3) the term ‘information sharing and analysis organization’ has the meaning given that term in section 212(5); and

‘‘(4) the term ‘information system’ has the meaning given that term in section 3502(8) of title 44, United States Code.

(b) CENTER.

‘‘—There is in the Department a national cybersecurity and communications integration center (referred to in this section as the ‘Center’) to carry out certain responsibilities of the Under Secretary appointed under section 103(a)(1)(H).

(c) FUNCTIONS.

The cybersecurity functions of the Center shall include

‘‘(1) being a Federal civilian interface for the multi-directional and cross-sector sharing of information related to cybersecurity risks, incidents, analysis, and warnings for Federal and non-Federal entities;

‘‘(2) providing shared situational awareness to enable realtime, integrated, and operational actions across the Federal Government and non-Federal entities to address cybersecurity risks and incidents to Federal and non-Federal entities;

‘‘(3) coordinating the sharing of information related to cybersecurity risks and incidents across the Federal Government;

‘‘(4) facilitating cross-sector coordination to address cybersecurity risks and incidents, including cybersecurity risks and incidents that may be related or could have consequential impacts across multiple sectors;

‘‘(5)(A) conducting integration and analysis, including crosssector integration and analysis, of cybersecurity risks and incidents; and

‘‘(B) sharing the analysis conducted under subparagraph (A) with Federal and non-Federal entities;

‘‘(6) upon request, providing timely technical assistance, risk management support, and incident response capabilities to Federal and non-Federal entities with respect to cybersecurity risks and incidents, which may include attribution, mitigation, and remediation; and

‘‘(7) providing information and recommendations on security and resilience measures to Federal and non-Federal entities, including information and recommendations to

‘‘(A) facilitate information security; and

‘‘(B) strengthen information systems against cybersecurity risks and incidents.