legislation: 106-s-3188
Data license: Public Domain (U.S. Government data) · Data source: Federal Register API & Regulations.gov API
This data as json
| bill_id | congress | bill_type | bill_number | title | policy_area | introduced_date | latest_action_date | latest_action_text | origin_chamber | sponsor_name | sponsor_state | sponsor_party | sponsor_bioguide_id | cosponsor_count | summary_text | update_date | url |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 106-s-3188 | 106 | s | 3188 | Cyber Security Enhancement Act | Crime and Law Enforcement | 2000-10-11 | 2000-10-11 | Read twice and referred to the Committee on the Judiciary. | Senate | Sen. Kyl, Jon [R-AZ] | AZ | R | K000352 | 0 | Cyber Security Enhancement Act - Prohibits critical infrastructure information, records relating to such information, and information on critical infrastructure protection derived from such information or records that are submitted voluntarily by a non-Federal source to a critical infrastructure protection office or program from being made available under the Freedom of Information Act, if the person submitting such information or records expressly so requests. Allows the withdrawal of such a request at any time. Protects such information or records for five years after their submission and allows an extension for an additional five years.Makes the antitrust laws inapplicable to conduct: (1) facilitating responses intended to correct or avoid a cyber security related problem; or (2) communicating or disclosing information to help correct or avoid the effects of such a problem.Amends the Federal criminal code to: (1) increase the maximum terms of imprisonment for fraud and related activities in connection with the use of computers; and (2) authorize the use of subpoenas in cases involving cyber crime.Requires a plan to encourage: (1) the standardization of Federal, State, and local law enforcement requests to Internet service providers and other entities for electronic information and records used to investigate computer crimes; and (2) such providers to prevent or impede the use of false Internet protocol addresses as a means of access to Internet servers. | 2025-08-20T14:19:56Z |