Reply to post:

Feds may have to explain knowledge of security holes – if draft law comes into play

tom dial Silver badge

It would not have been hard to put the entire essential content in the article:

"a) Report

Not later than 240 days after the date of the enactment of this Act, the Secretary of Homeland Security shall submit to the Committee on Homeland Security of the House of Representatives and the Committee on Homeland Security and Governmental Affairs of the Senate a report that contains a description of the policies and procedures developed for coordinating cyber vulnerability disclosures, in accordance with section 227(m) of the Homeland Security Act of 2002 (6 U.S.C. 148(m)). To the extent possible, such report shall include an annex with information on instances in which such policies and procedures were used to disclose cyber vulnerabilities in the year prior to the date such report is required and, where available, information on the degree to which such information was acted upon by industry and other stakeholders. Such report may also contain a description of how the Secretary is working with other Federal entities and critical infrastructure owners and operators to prevent, detect, and mitigate cyber vulnerabilities.

(b) Form

The report required under subsection (b) shall be submitted in unclassified form but may contain a classified annex."

If I were at DHS this would not bother me a lot, larded as it is with weasel phrases like "to the extent possible," "where available," and "may contain;" especially as I could put anything touchy in a classified annex.

A feel-good act on a par with the best of them, this will take a fraction of an analyst's year to compile and arrange. As written and, on January 9 passed by the US House of Representatives, it seems to be required only once. Representative Lee ought, at the least, to have required it to be updated annually.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2021