Legislating for security

At least 10 states have passed laws addressing information security, according to a report released last week by the Task Force on Protecting Democracy.

Examples include:

* Florida now allows police to investigate attacks on protected computers owned by financial institutions and government agencies.

* Until Jan. 1, 2006, California's legislature can hold closed sessions on potential threats of terrorist activity against state-owned personnel and property, including electronic data.

* Michigan imposed penalties against people who use the Internet or telecommunications systems or devices to disrupt critical infrastructure or government operations.

Featured

  • Defense
    Essye Miller, Director at Defense Information Management, speaks during the Breaking the Gender Barrier panel at the Air Space, Cyber Conference in National Harbor, Md., Sept. 19, 2017. (U.S. Air Force photo/Staff Sgt. Chad Trujillo)

    Essye Miller: The exit interview

    Essye Miller, DOD's outgoing principal deputy CIO, talks about COVID, the state of the tech workforce and the hard conversations DOD has to have to prepare personnel for the future.

  • innovation (Sergey Nivens/Shutterstock.com)

    VA embraces procurement challenges at scale

    Steve Kelman applauds the Department of Veterans Affairs' ambitious attempt to move beyond one-off prize-based contests to combat veteran suicides more effectively.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.