The IT Law Wiki

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
 
== Overview ==
 
== Overview ==
   
The '''[http://www.dhs.gov/files/programs/editorial_0404.shtm Protected Critical Infrastructure Information Program]''' ('''PCII Program''') was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The PCII Program is unique because it provides a method for [[critical infrastructure]] owners to submit [[information]] voluntarily to the Federal government to which the government would not otherwise have access. while providing assurances that the [[information]] will be exempt from public [[disclosure]] and will be properly [[safeguard]]ed.
+
The '''Protected Critical Infrastructure Information Program''' ('''PCII Program''')[http://www.pcii-info@dhs.gov] was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The program institutes a means for the voluntary sharing of private sector, State, and local [[CIKR]] information with the Federal Government while providing assurances that the [[information]] will be exempt from public disclosure and will be properly [[safeguard]]ed.
   
 
The PCII Program, which operates under the authority of the [[CII Act]] and the implementing regulations,<ref>6 C.F.R., Part 29 (the Final Rule).</ref> defines both the requirements for submitting [[CII]] and those that governmental entities must meet for [[access]]ing and [[safeguard]]ing [[PCII]]. [[DHS]] remains committed to making [[PCII]] an effective tool for robust [[information sharing]] between [[critical infrastructure]] owners and operators and the government.
Once [[information]] is submitted and the PCII Program has validated it as [[PCII]], Federal, State, and local government entities can use the [[information]] to protect the U.S.'s [[critical infrastructure]].
 
 
The PCII Program, which operates under the authority of the [[CII Act]] and the implementing regulations,<ref>6 C.F.R., Part 29 (the "Final Rule").</ref> defines both the requirements for submitting [[CII]] and those that governmental entities must meet for [[access]]ing and [[safeguard]]ing [[PCII]]. [[DHS]] remains committed to making [[PCII]] an effective tool for robust [[information sharing]] between [[critical infrastructure]] owners and operators and the government.
 
   
 
== References ==
 
== References ==
Line 13: Line 11:
   
 
* [[PCII Program Office]]
 
* [[PCII Program Office]]
* [[Protected Critical Infrastructure Information Program Procedures Manual]]
 
   
== External resource ==
+
== External link ==
   
 
* [http://www.dhs.gov/pcii PCII Program information.]
 
* [http://www.dhs.gov/pcii PCII Program information.]
 
[[Category:Security]]
 
[[Category:Security]]
[[Category:Data]]
 

Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA

Cancel Editing help (opens in new window)