The IT Law Wiki
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Overview ==
 
== Overview ==
   
The '''Protected Critical Infrastructure Information Program''' ('''PCII Program''')[http://www.pcii-info@dhs.gov] was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The PCII Program is unique because it provides a method for [[critical infrastructure]] owners to submit [[information]] voluntarily to the Federal government to which the government would not otherwise have access. while providing assurances that the [[information]] will be exempt from public [[disclosure]] and will be properly [[safeguard]]ed.
+
The '''[http://www.dhs.gov/files/programs/editorial_0404.shtm Protected Critical Infrastructure Information Program]''' ('''PCII Program''') was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The PCII Program is unique because it provides a method for [[critical infrastructure]] owners to submit [[information]] voluntarily to the Federal government to which the government would not otherwise have access. while providing assurances that the [[information]] will be exempt from public [[disclosure]] and will be properly [[safeguard]]ed.
   
Once [[information]] is submitted and the PCII Program has validated it as [[PCII]], Federal, State, and local government entities can use the [[information]] to protect the U.S.'s c[[ritical infrastructure]].
+
Once [[information]] is submitted and the PCII Program has validated it as [[PCII]], Federal, State, and local government entities can use the [[information]] to protect the U.S.'s [[critical infrastructure]].
   
 
The PCII Program, which operates under the authority of the [[CII Act]] and the implementing regulations,<ref>6 C.F.R., Part 29 (the "Final Rule").</ref> defines both the requirements for submitting [[CII]] and those that governmental entities must meet for [[access]]ing and [[safeguard]]ing [[PCII]]. [[DHS]] remains committed to making [[PCII]] an effective tool for robust [[information sharing]] between [[critical infrastructure]] owners and operators and the government.
 
The PCII Program, which operates under the authority of the [[CII Act]] and the implementing regulations,<ref>6 C.F.R., Part 29 (the "Final Rule").</ref> defines both the requirements for submitting [[CII]] and those that governmental entities must meet for [[access]]ing and [[safeguard]]ing [[PCII]]. [[DHS]] remains committed to making [[PCII]] an effective tool for robust [[information sharing]] between [[critical infrastructure]] owners and operators and the government.
Line 15: Line 15:
 
* [[Protected Critical Infrastructure Information Program Procedures Manual]]
 
* [[Protected Critical Infrastructure Information Program Procedures Manual]]
   
== External link ==
+
== External resource ==
   
 
* [http://www.dhs.gov/pcii PCII Program information.]
 
* [http://www.dhs.gov/pcii PCII Program information.]
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:Data]]

Latest revision as of 05:06, 18 April 2014

Overview[]

The Protected Critical Infrastructure Information Program (PCII Program) was established pursuant to the Critical Infrastructure Information Act of 2002 (CII Act). The PCII Program is unique because it provides a method for critical infrastructure owners to submit information voluntarily to the Federal government to which the government would not otherwise have access. while providing assurances that the information will be exempt from public disclosure and will be properly safeguarded.

Once information is submitted and the PCII Program has validated it as PCII, Federal, State, and local government entities can use the information to protect the U.S.'s critical infrastructure.

The PCII Program, which operates under the authority of the CII Act and the implementing regulations,[1] defines both the requirements for submitting CII and those that governmental entities must meet for accessing and safeguarding PCII. DHS remains committed to making PCII an effective tool for robust information sharing between critical infrastructure owners and operators and the government.

References[]

  1. 6 C.F.R., Part 29 (the "Final Rule").

See also[]

External resource[]