The IT Law Wiki
Line 1: Line 1:
  +
== Overview ==
  +
 
The '''Protected Critical Infrastructure Information Program''' ('''PCII Program''')[http://www.pcii-info@dhs.gov] was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The program institutes a means for the voluntary sharing of private sector, State, and local [[CIKR]] information with the Federal Government while providing assurances that the [[information]] will be exempt from public disclosure and will be properly [[safeguard]]ed.
 
The '''Protected Critical Infrastructure Information Program''' ('''PCII Program''')[http://www.pcii-info@dhs.gov] was established pursuant to the [[Critical Infrastructure Information Act of 2002]] ([[CII Act]]). The program institutes a means for the voluntary sharing of private sector, State, and local [[CIKR]] information with the Federal Government while providing assurances that the [[information]] will be exempt from public disclosure and will be properly [[safeguard]]ed.
   
Line 12: Line 14:
 
== External link ==
 
== External link ==
   
* [http://www.dhs.gov/pcii PCII Program information]
+
* [http://www.dhs.gov/pcii PCII Program information.]
 
[[Category:Security]]
 
[[Category:Security]]

Revision as of 04:08, 4 January 2011

Overview

The Protected Critical Infrastructure Information Program (PCII Program)[1] was established pursuant to the Critical Infrastructure Information Act of 2002 (CII Act). The program institutes a means for the voluntary sharing of private sector, State, and local CIKR information with the Federal Government while providing assurances that the information will be exempt from public disclosure and will be properly safeguarded.

The PCII Program, which operates under the authority of the CII Act and the implementing regulations,[1] defines both the requirements for submitting CII and those that governmental entities must meet for accessing and safeguarding PCII. DHS remains committed to making PCII an effective tool for robust information sharing between critical infrastructure owners and operators and the government.

References

  1. 6 C.F.R., Part 29 (the Final Rule).

See also

External link