There is 1 version of this bill. View text

Click the check-box to add or remove the section, click the text link to scroll to that section.
Titles Actions Overview All Actions Cosponsors Committees Related Bills Subjects Latest Summary All Summaries

Titles (2)

Short Titles

Short Titles - Senate

Short Titles as Introduced

Promoting Good Cyber Hygiene Act of 2017

Official Titles

Official Titles - Senate

Official Titles as Introduced

A bill to provide for the identification and documentation of best practices for cyber hygiene by the National Institute of Standards and Technology, and for other purposes.


Actions Overview (1)

Date
06/29/2017Introduced in Senate

All Actions (1)

Date
06/29/2017Read twice and referred to the Committee on Commerce, Science, and Transportation.
Action By: Senate

Cosponsors (1)

* = Original cosponsor
CosponsorDate Cosponsored
Sen. Markey, Edward J. [D-MA]* 06/29/2017

Committees (1)

Committees, subcommittees and links to reports associated with this bill are listed here, as well as the nature and date of committee activity and Congressional report number.

Committee / Subcommittee Date Activity Reports
Senate Commerce, Science, and Transportation06/29/2017 Referred to

A related bill may be a companion measure, an identical bill, a procedurally-related measure, or one with text similarities. Bill relationships are identified by the House, the Senate, or CRS, and refer only to same-congress measures.


Latest Summary (1)

There is one summary for S.1475. View summaries

Shown Here:
Introduced in Senate (06/29/2017)

Promoting Good Cyber Hygiene Act of 2017

This bill requires the National Institute of Standards and Technology to establish for use by the federal government, the private sector, and any person utilizing an information system or device a list of best practices to defend against common cybersecurity threats or risks. 

The Department of Homeland Security must assess cybersecurity threats, the effect of such threats on the federal government's information systems and networks, and submit recommendations for addressing such threats.