Federal Computer Security Act

1/11/2023, 1:29 PM

Congressional Summary of S 1990

Federal Computer Security Act

Directs the Inspector General of each executive agency that operates a federal computer system that provides access to classified information or personally identifiable information to submit to the Comptroller General and specified congressional committees a report that includes:

  • a description of the logical access standards used by the agency to access such system, including whether the agency is using multi-factor logical access controls for such access;
  • if the agency does not use such access controls, a description of the reasons for not doing so;
  • a description of the data security management practices used by the agency, including the policies and procedures for conducting inventories of software and associated licenses, an indication that the agency has entered into a licensing agreement for the use of software security controls to monitor and detect threats, or an explanation for why it has not entered such an agreement; and
  • a description of agency policies and procedures for ensuring that entities that provide services to the agency are implementing data security management practices.

Directs the Comptroller General to submit a report on any impediments to agency use of effective security software and security devices.

Current Status of Bill S 1990

Bill S 1990 is currently in the status of Bill Introduced since August 5, 2015. Bill S 1990 was introduced during Congress 114 and was introduced to the Senate on August 5, 2015.  Bill S 1990's most recent activity was Read twice and referred to the Committee on Homeland Security and Governmental Affairs. as of August 5, 2015

Bipartisan Support of Bill S 1990

Total Number of Sponsors
1
Democrat Sponsors
0
Republican Sponsors
1
Unaffiliated Sponsors
0
Total Number of Cosponsors
1
Democrat Cosponsors
1
Republican Cosponsors
0
Unaffiliated Cosponsors
0

Policy Area and Potential Impact of Bill S 1990

Primary Policy Focus

Government Operations and Politics

Potential Impact Areas

Computer security and identity theftCongressional oversightGovernment studies and investigationsIntelligence activities, surveillance, classified informationRight of privacy
Start holding our government accountable!

Comments