Difference between revisions of "Cybersecurity Enhancement Act of 2014"
Jump to navigation
Jump to search
(Creating Federal Cybersecurity Enhancement Act) |
m |
||
Line 3: | Line 3: | ||
'''[https://www.congress.gov/114/bills/s754/BILLS-114s754es.pdf Text of Law]''' | '''[https://www.congress.gov/114/bills/s754/BILLS-114s754es.pdf Text of Law]''' | ||
− | '''Related harms under the Solove Taxonomy:''' Sec. 230(b)(2)- | + | '''Related harms under the Solove Taxonomy:''' Sec. 230(b)(2)-Insecurity, (c)(1) & (2)-Surveillance, Disclosure, (c)(3)-Disclosure, Surveillance, (c)(4)-Insecurity, (c)(7)(A)-Insecurity, Secondary Use, (c)(7)(B)-Secondary Use, (c)(7)(C)-Insecurity(informing users), (c)(7)(D)-Insecurity, (d)(1)(A)-Disclosure, Decisional Interference, (d)(1)(B)-Secondary Use, (c)-Insecurity (agency's responsibilities), Sec. 204(a)(1)-Insecurity (Advanced internal defense), (c)-Insecurity, Exclusion (transparency), Sec. 205 (federal cybersecurity requirements)-Insecurity?, Sec. 206-Insecurity, Sec. 208-(a)(1)(A)-Aggregation, Surveillance, Sec.209-(3)-Insecurity |
'''Scope of the Law''' ''Cybersecurity'' | '''Scope of the Law''' ''Cybersecurity'' |
Revision as of 05:54, 21 February 2020
Federal Cybersecurity Enhancement Act of 2016
Related harms under the Solove Taxonomy: Sec. 230(b)(2)-Insecurity, (c)(1) & (2)-Surveillance, Disclosure, (c)(3)-Disclosure, Surveillance, (c)(4)-Insecurity, (c)(7)(A)-Insecurity, Secondary Use, (c)(7)(B)-Secondary Use, (c)(7)(C)-Insecurity(informing users), (c)(7)(D)-Insecurity, (d)(1)(A)-Disclosure, Decisional Interference, (d)(1)(B)-Secondary Use, (c)-Insecurity (agency's responsibilities), Sec. 204(a)(1)-Insecurity (Advanced internal defense), (c)-Insecurity, Exclusion (transparency), Sec. 205 (federal cybersecurity requirements)-Insecurity?, Sec. 206-Insecurity, Sec. 208-(a)(1)(A)-Aggregation, Surveillance, Sec.209-(3)-Insecurity
Scope of the Law Cybersecurity