The IT Law Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
 
== Citation ==
 
== Citation ==
   
'''Critical Infrastructure Information Act of 2002,''' presented as subtitle B of title II of the Homeland Security Act (§§211-15), ''codified at'' 6 U.S.C. §§131 ''et seq.'' ([http://www.dhs.gov/xlibrary/assets/CII_Act.pdf full-text])
+
'''Critical Infrastructure Information Act of 2002,''' presented as subtitle B of title II of the Homeland Security Act (§§211-15), ''codified at'' 6 U.S.C. 131 ''et seq.'' ([http://www.dhs.gov/xlibrary/assets/CII_Act.pdf full-text])
   
 
== Overview ==
 
== Overview ==
   
Enacted as part of the [[Homeland Security Act of 2002]], the Act created a framework that enables members of the private sector and others to voluntarily submit [[sensitive information]] regarding the Nation’s [[CIKR]] to [[DHS]] with the assurance that the [[information]], if it satisfies certain requirements, will be protected from public disclosure.
+
Enacted as part of the [[Homeland Security Act of 2002]], the '''Critical Infrastructure Information Act of 2002''' created a framework that enables members of the private sector and others to voluntarily submit [[sensitive information]] regarding the Nation’s [[CIKR]] to [[DHS]] with the assurance that the [[information]], if it satisfies certain requirements, will be protected from public disclosure.
   
== Protected Critical Infrastructure Information Program ==
+
== PCII Program ==
   
The [[Protected Critical Infrastructure Information Program]] ([[PCII Program]]), created under the authority of the Act, is central to the [[information-sharing]] and protection strategy of the [[NIPP]]. By protecting [[sensitive information]] submitted through the program, the private sector is assured that the [[information]] will remain secure and only be used to further [[CIKR]] protection efforts.<ref>Procedures for Handling Critical Infrastructure Information, 68 Fed. Reg. 8079 (Feb. 20, 2004), ''codified at'' 6 C.F.R. Part 29.</ref>
+
The [[PCII Program]], created under the authority of the Act, is central to the [[information-sharing]] and protection strategy of the [[NIPP]]. By protecting [[sensitive information]] submitted through the program, the private sector is assured that the [[information]] will remain secure and only be used to further [[CIKR]] protection efforts.<ref>Procedures for Handling Critical Infrastructure Information, 68 Fed. Reg. 8079 (Feb. 20, 2004), ''codified at'' 6 C.F.R. Part 29.</ref>
   
 
== References ==
 
== References ==
Line 17: Line 17:
 
[[Category:Legislation-U.S.-Security]]
 
[[Category:Legislation-U.S.-Security]]
 
[[Category:Security]]
 
[[Category:Security]]
[[Category:2002]]
 

Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA

Cancel Editing help (opens in new window)