Podcasts about communications integration center

  • 2PODCASTS
  • 4EPISODES
  • 1h 2mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 3, 2019LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about communications integration center

Latest podcast episodes about communications integration center

Cyber Chat with Sean Kelley
Unique partnership between FDA and DHA protects medical devices

Cyber Chat with Sean Kelley

Play Episode Listen Later Jan 3, 2019 27:58


In this edition of Cyber Chat with Sean Kelley, Sean sits down with Dr. Suzanne Schwartz, associate director for Science & Strategic Partnerships at the Center for Devices and Radiological Health, and Christopher Butera, deputy director for Cyber Threat Detection and Analysis at the National Cybersecurity and Communications Integration Center.

Congressional Dish
CD113: CISA is Law

Congressional Dish

Play Episode Listen Later Dec 27, 2015 52:03


Cybersecurity or surveillance? What does the language attached at the last minute to the 2,009 page omnibus government funding bill actually authorize? In this episode, we take a close look at what just became law.   Please support Congressional Dish: Click here to contribute with PayPal or Bitcoin; click the PayPal "Make it Monthly" checkbox to create a monthly subscription Click here to support Congressional Dish for each episode via Patreon Mail Contributions to: 5753 Hwy 85 North #4576 Crestview, FL 32536 Thank you for supporting truly independent media! Cybersecurity Act of 2015 The Cybersecurity Act of 2015 was attached at the last minute to the "omnibus" government funding bill, which was 2,009 pages long and available to read for less than three days before it became law. This is and outline of what became law: TITLE I: Cybersecurity Information Sharing Act of 2015 Section 102: Definitions "Agency": "Any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of Government" Does NOT include the Government Accountability Office, Federal Election Commission, or Government-owned contractor-operated facilities "Cybersecurity threat": An action that "may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system". "Cyber threat indicator": "Information that is necessary to describe or identify"... Spying, including strange patterns of communications that appear to be collecting technical information Security breaches Security vulnerabilities A legitimate user being used to defeat a security system Malicious cyber command and control "The actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat" "Any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law" "Non-Federal entity": "Any private entity, non-Federal government agency or department, or State, tribal, or local government (including a political subdivision, department, or component thereof)" Does not include a foreign power, as defined in the FISA law Section 103: Sharing of Information by the Federal Government Procedures for sharing information both within and outside the Federal government will be created by: Director of National Intelligence Secretary of Homeland Security Secretary of Defense Attorney General The procedures developed must... Allow real time sharing of information Include requirements for the government to protect the information from unauthorized access Require Federal entities to review cyber threat indicators for information not directly related to the threat that contains information that identifies a specific individual and remove the information Include procedures for notifying "any United States person" whose information has been shared by the Federal government Section 104: Authorizations for Preventing, Detecting, Analyzing, and Mitigating Cybersecurity Threats "A non-Federal entity may... share with, or receive from, any other non-Federal entity or the Federal Government a cyber threat indicator or defensive measure" Non-Federal entities sharing information mush "review" the information for "personal information of a specific individual" and "remove such information" OR have a technical way of removing the information it "knows at the time of sharing" to be personal information. Use of Cyber Threat Indicators by Government State, tribal, or local governments and the Federal Government can use the information they receive for... Cybersecurity Preventing a specific threat of death, serious bodily harm, or specific threat of serious economic harm Investigating, prosecuting, and preventing serious threats to minors, including sexual exploitation and threats to physical safety Preventing, investigating, disrupting, or prosecuting... Identity theft, transfers of stolen identification, possession of false identification, Unauthorized use of any card, plate, code, account number, or any equipment that can be used to transfer funds (fraud), Use of a "telecommunication instrument" that's been altered to obtain unauthorized use of telecommunications services", Hacking and releasing government or banking information, Extortion Harboring a criminal, Collection and/or communication of information about United States defense activities and infrastructure, or failure to report a defense data breach Disclosure of classified information Violations, or attempted violations, of NASA regulations Unauthorized use of trade secrets Information shared will be "exempt from disclosure under any provision of State, tribal, or local freedom of Information law, open government law, sunshine law, or similar law requiring disclosure of information or records" Information shared between private entities can not be considered violations of "any provision of antitrust laws" Section 105: Sharing of Cyber Threat Indicators and Defensive Measures with the Federal Government" Policies will be written by... Attorney General Secretary of Homeland Security Policies must create a way to share information "in an automated manner with all of the appropriate Federal entities" "Appropriate Federal entities" Dept. of Commerce Dept. of Defense Dept. of Energy Dept. of Homeland Security Dept. of Justice Dept. of Treasury Office of the Director of National Intelligence Information may be provided to other Federal agencies Privacy and civil liberties guidelines will be written by... Attorney General Secretary of Homeland Security In consultation with the Privacy and Civil Liberties oversight board "Private entities with industry expertise as the Attorney General and the Secretary consider relevant" Guidelines will be reviewed at least every two years Information shared with the Federal Government will go to the Department of Homeland Security Information shared with the Federal government can not be used to regulate the lawful activities of any non-Federal entity Section 106: Protection from Liability The courts must dismiss any lawsuits against "any private entity" for monitoring information systems or sharing/receiving "cyber threat indicators" Section 107: Oversight of Government Activities Heads of "appropriate Federal entities" will submit a report Inspectors General of the "appropriate Federal entities" will submit reports every two years The Comptroller General of the United States will submit a report on actions taken by the Federal Government to remove personal information. Report will be due in three years. Unclassified portions of the reports will be available to the public. Section 108: Construction and Preemption Lists what this bill is not intended to do Section 109: Report on Cybersecurity Threats Report will be submitted by the Director of National Intelligence NEW Section 110: Exception to Limitation on Authority of Secretary of Defense to Disseminate Certain Information Specifically allows the Secretary of Defense to share information Section 111: Effective Period These provisions expire on September 30, 2015. TITLE II: National Cybersecurity Protection Advancement Act of 2015 Section 203: Information Sharing Structure and Processes The National Cybersecurity and Communications Integration Center will implement the procedures for sharing information that are created by Title I (view this mark-up of the Homeland Security Act of 2002 to see changes made by this provision) Adds functions to the National Cybersecurity and Communications Integration Center including... "Engaging with international partners... to collaborate on cyber threat indicators, defensive measures, and information related to cybersecurity risks and incidents" "Sharing cyber threat indicators, defensive measures, and other information related to cybersecurity risks and incidents with Federal and non-Federal entities... and with State and major urban area fusion centers" Participating in national exercises run by DHS Evaluating cyber threats to public safety communication systems Adds tribal governments and private entities to the list of entities that will have representatives in the National Cybersecurity and Communications Integration Center Adds protection from information "disclosure" to list of the Center's principles Orders the Center to work with the "Privacy Officer" to make sure the Center follows the policies and procedures created by the Attorney General and Secretary of Homeland Security. The Center will be in charge of creating the automated system for information sharing. The Center may partner directly with any "consenting non-Federal entity" for the purpose of sharing "cyber threat indicators" Orders the Center to publicly publish information on how to share information with the Center within 60 days of enactment Sections 206-209: Reports that will expire after 7 years Subtitle B: Federal Cybersecurity Enhancement Act of 2015 Section 223: Improved Federal Network Security Requires the Secretary of Homeland Security and the Director of the Office of Management and Budget to develop a plan to proactively detect, identify, and remove intruders in agency information systems. The plan will not apply to the Department of Defense, a "national security system" or an element of the intelligence community In implementing the plan, the Secretary of Homeland Security can get access to the information transiting or traveling to or from an agency information system The operation of the technology needed to implement the plan can be privatized The actions taken need to be "reasonably necessary" It is illegal for the private entity operating the system to use the information for anything other than protecting the system but the private entity can not be sued in court for their role in assisting the DHS Section 225: Federal Cybersecurity Requirements The Secretary of Homeland Security will issue binding operational directives for agencies to secure their networks within a year. Agencies will have to... Identify sensitive and mission critical data stored by the agency Assess the need to store that data and determine which individuals need access to it Encrypt the data Implement a single sign-on platform for people using the agency website that requires user authentication Require multi-factor authentication for remote access Agencies will not have to comply if they say it's "overly burdensome to implement" or that it's not necessary. These binding operational directives will not apply to the Defense Department, a "national security system", or the intelligence community. Section 227: Termination The directives and reports on them will expire in 7 years, December 2022. Section 229: Direction to Agencies The Secretary of Homeland Security can order the head of other agencies to take "lawful actions" in response to security threats. TITLE III: Federal Cybersecurity Workforce Assessment Act Section 303: National Cybersecurity Workforce Measurement Initiative Requires an assessment of all Federal positions that have cyber-related functions TITLE IV- Other Cyber Matters Section 401: Study on Mobile Device Security Orders a study on the security of mobile devices of the Federal Government Section 402: Department of State International Cyberspace Policy Strategy Orders a State Department report on threats from foreign sources and cooperation strategies within 90 days. Section 403: Apprehension and Prosecution of International Cyber Criminals The Secretary of State must consult with government officials in countries where we don't have an extradition treaty to determine what actions they've taken to catch "cyber criminals" with arrest warrant issued by US judges or Interpol. Section 404: Enhancement of Emergency Services Orders the National Cybersecurity and Communications Integration Center to create a process for information sharing with Statewide Interoperability Coordinators Section 405: Improving Cybersecurity in the Health Care Industry Requires a report that will include a plan so that "the Federal Government and health care industry stakeholders may in real time, share actionable cyber threat indicators and defensive measures" Additional Reading Article: Meet the Lobbyists and Big Money Interests Pushing to End the Oil Exports Ban by Steve Horn, DeSmogBlog, December 16, 2015. Article: 9 Heinous Items Sneaked Into the Budget Bill Congress Doesn't Want You to See by Tom Cahill, U.S. Uncut, December 19, 2015. Article: Hospitality and Gambling Interests Delay Closing of Billion-Dollar Tax Loophole by Eric Lipton and Liz Moyer, New York Times, December 20, 2015. Article: The CISA Secret to Cybersecurity that No One Seems to Get by Mike Gault, Wired, December 20, 2015. Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio) Cover Art Design by Only Child Imaginations

Congressional Dish
CD106: CISA and Friends

Congressional Dish

Play Episode Listen Later Nov 8, 2015 75:52


CISA - the Cybersecurity Information Sharing Act - has officially passed the Senate. While Congress is busy merging CISA with two other so-called cybersecurity bills that passed the House of Representatives, in this episode, by taking an in-depth look at the contents of all three bills, we discover that these bills are not what you're being lead to believe. Please support Congressional Dish: Click here to contribute with PayPal or Bitcoin; click the PayPal "Make it Monthly" checkbox to create a monthly subscription Click here to support Congressional Dish for each episode via Patreon Mail Contributions to: 5753 Hwy 85 North #4576 Crestview, FL 32536 Thank you for supporting truly independent media! S. 754: Cybersecurity Information Sharing Act of 2015 Passed the Senate 74-21 on October 27, 2015. Sponsored by Sen. Richard Burr of North Carolina 118 pages Outline of the Bill Definitions: "Agency" = "Any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency, but does not include — The Government Accountability Office Federal Election Commission The governments of the District of Columbia and of the territories and possessions of the United States, and their various subdivisions Government-owned contractor-operated facilities, including laboratories engaged in national defense research and production activities "Cybersecurity threat" = An action "not protected by the First Amendment to the Constitution" that "may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system." A "cybersecurity threat" does not include "any action that soley involves a violation of a consumer term of service or a consumer licensing agreement. "Cyber threat indicator" = Information that is needed to identify - Spying, including strange patterns of communications that appear to be collecting technical information Security breaches Security vulnerabilities A legitimate user being used to defeat a security system Malicious cyber command and control The harm caused by a cybersecurity incident, including the information taken as a result "Any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law" "Entity" = "Any private entity, non-Federal government agency or department, or State, tribal, or local government (including a political subdivision, department, or component thereof) Does not include "a "foreign power", which means a foreign government or a foreign based political organization. Sharing of Information by the Federal Government Executive branch officials will write procedures for sharing classified and unclassified "cyber threat indicators" and Federal government information that would help the "entities" to prevent cybersecurity threats. The officials writing the rules will be the Director of National Intelligence, the Secretary of Homeland Security, the Secretary of Defense, and the Attorney General. The rules they write have to: Ensure "cyber threat indicators" can be shared in real time Include notification procedures for false alarms Include requirements for the Federal government agencies to protect against unauthorized access to the information Requires a Federal entity sharing information to remove personal information Include notification procedures for people whose personal information is shared by the government. Their procedures will be due 60 days after CISA becomes law. Monitoring Authorizations Private companies can monitor their own information systems, other private information systems or Federal information systems with permission, and monitor "information that is stored on, processed by, or transiting these information systems" Entities can share with and receive information from any other entity or the Federal government. Before sharing information, it must be reviewed and information known to be personal information "at the time of the sharing" must be removed. With the written consent of the sharing entity, information shared with a State, tribal, or local government may be used for "preventing, investigating, or prosecuting"...* An "imminent threat of death, serious bodily harm, or serious economic harm" Identity theft, transfers of stolen identification, possession of false identification, Unauthorized use of any card, plate, code, account number, or any equipment that can be used to transfer funds (fraud), Use of a "telecommunication instrument" that's been altered to obtain unauthorized use of telecommunications services", Hacking and releasing government or banking information, Extortion Harboring a criminal, Collection and/or communication of information about United States defense activities and infrastructure, or failure to report a defense data breach Disclosure of classified information Violations, or attempted violations, of NASA regulations Unauthorized use of trade secrets The information shared with the government as a "cyber threat indicator" will be except from public disclosure under any State, tribal or local law. Companies will not be punished under antitrust laws for sharing information with each other "for cybersecurity purposes" Sharing of Information by "Entities" with the Federal Government The Attorney General and Secretary of Homeland Security will write the policies and procedures governing receipt of information from private entities and local governments. The policies must include... An automated system for sharing information with "all of the appropriate Federal entities" as quickly as possible Rules governing "the retention, use, and dissemination" of the information received by the Federal Government. Audit capabilities "Sanctions" for Federal employees who break the law The Attorney General and Secretary of Homeland will publicly publish guidelines explaining what qualifies as a cyber threat indicator The Attorney General, with help from "private entities", will have 180 days to create guidelines for privacy and civil liberties that will govern how the Federal Government uses the information it receives The privacy guidelines will be reviewed every two years The Attorney General will determine how long the information will be kept by the government The Department of Homeland Security will receive and distribute all of the cyber threat indicators shared with the government. Information shared will be withheld from the public under the Freedom of Information Act and all State, tribal, and local laws. In addition to the items of the list of allowed uses of information by State, tribal, and local governments (see Monitoring Authorizations section), the Federal Government can also use the information to... "Prevent or mitigate a serious threat to a minor, including sexual exploitation and threats to their physical safety" Protection from Liability No private entity can be successfully sued in court for sharing information with the government under CISA regulations. The only way a private entity can be sued is in the cast of "gross negligence or willful misconduct" Oversight of Government Activities Federal Inspectors General will complete a report every two years. The report may include recommendations for improvement Other Rules This bill does not permit price-fixing, attempting to monopolize a market, boycotting, or exchanges of price or cost information, customer lists, or information regarding future competitive planning. Intrusion Assessment Plan The Secretary of Homeland Security will create a plan to identify and remove intruders on agency information systems. The plan will not apply to the Department of Defense, a national security system or an element of the intelligence community. The deployment and operation of the new monitoring system can be privatized The private contractor would not be allowed to disclose any of the information they access without permission from the government The private contractor will have immunity from prosecution Internet service providers can not use their immunity to break a user agreement with a customer without their customer's consent The activities carried out in this new monitoring plan need to be "reasonably necessary" to protect agency information systems from cybersecurity risks Federal Cybersecurity Requirements Agencies will have to encrypt or render indecipherable information that is stored or transmitted by their information systems, create a single sign-in method for individuals accessing their websites, and implement identity management systems for remote access for each user account. This will not apply to the Department of Defense, a national security system, or elements of the intelligence community. Emergencies The Secretary of Homeland Security can authorize "intrusion detection and prevention capabilities" on another agency's information systems in the case of an "imminent threat" Study on Mobile Device Security The Secretary of Homeland Security will study threats caused by the shift of technology from desktops to mobile in the Federal Government Health Care Industry Sharing Creates a task force to create a plan for sharing with private health care entities specifically Strategy for Protecting Critical Infrastructure The Secretary of Homeland Security will have 180 days to develop a strategy ensuring that cyber security incidents would probably not be catastrophic for public health or safety, economic security, or national security. The strategy must include... An assessment of whether each entity should be required to report cyber security incidents A description of security gaps Additional power needed Some of this report can be classified. Sunset The provisions of this bill would expire 10 years after enactment H.R. 1731: National Cybersecurity Protection Advancement Act of 2015 For reference, here's the text as of March 2015 of the Homeland Security Act, which is amended by this bill. This bill: Adds "private entities" to the list of groups that will be part of the National Cybersecurity and Communications Integration Center, which coordinates information sharing between the Federal government and other entities. Adds new groups to the list of who will be included in the National Cybersecurity and Communications Integration Center who will coordinate with all sizes of businesses. Expands the type of information that the National Cybersecurity and Communications Integration Center will share between the Federal government, local governments, and private sector. Authorizes the National Cybersecurity and Communications Integration Center to share information internationally. Requires the government and businesses to use existing technology to "rapidly advance" implementation of "automated mechanisms" for sharing between the National Cybersecurity and Communications Integration Center and Federal agencies. Participation by non-Federal entities will be voluntary. Agreements that exist before this bill is signed into law will be deemed compliant with this law. All participating entities need to take "reasonable efforts to remove information that can be used to identity specific persons". There's no listed punishments if they don't. The Under Secretary for Cybersecurity and Infrastructure Protection will create policies for governing the use of information shared with the National Cybersecurity and Communications Integration Center 180 days AFTER the bill becomes law. He/she will also be responsible for creating "sanctions" for government employees who disregard his/her privacy policies. Private entities that share information will have immunity from lawsuits, if they share information according to this law. If the Federal government breaks this law, it will have to pay the person actual damages or $1,000, whichever is higher, plus attorneys fees. There is a two year statute of limitations. This law will trump state laws that limit information sharing. The law would sunset 7 years after enactment. Passed 355-63 in the House Sponsored by Rep. Michael McCaul of Texas 60 pages H.R. 1560: Protecting Cyber Networks Act Contains the text of H.R. 1731: National Cybersecurity Protection Advancement Act Within 90 days of enactment, the Director of National Intelligence must develop procedures for sharing classified "cyber threat indicators" with "non-Federal entities" Allows cybersecurity monitoring of government systems to be privatized Allows "non-Federal entities" to share information to with anyone other than the Defense Department. The entity sharing information must "take reasonable efforts" to remove personally identifiable information on people "not directly related" to the cybersecurity threat. The President will develop polices governing what happens to information received by the Federal Government, within 90 days of the bill becoming law. The Attorney General will create policies relating to privacy and civil liberties, within 90 days of the bill becoming law. A new branch, with 50 or less employees, will be created within the Office of the Director of National Intelligence called the Cyber Threat Intelligence Integration Center, which will "serve as the primary organization within the Federal Government for analyzing and integrating all intelligence possessed or acquired by the United States pertaining to cyber threats." Information shared with the government is exempt from public disclosure. Information given to the government "shall not be subject to a rule of any Federal department or agency or any judicial doctrine regarding ex parte communications with a decision-making official." The government can keep and use information given to it to investigate, prosecute, prevent or mitigate a threat of "death or serious bodily harm or an offense arising out of such a threat" and to investigate, prosecute, prevent or mitigate a threat to a minor. The information can also be used to prevent, investigation, disrupt, or prosecute fraud, unauthorized access to computers and transmission of information taken from it, "serious violent felonies" including murder, manslaughter, assault, sexual abuse, kidnapping, robbery, carjacking, extortion, firearms use, firearms possession, or attempt to commit any of these crimes, espionage including photographing or sketching defense installations, and theft of trade secrets. Passed 307-116 in the House Sponsored by Rep. Devin Nunes of California 121 pages Audio Sources Senate Floor Proceeding CISA debate, October 27, 2015 (Transcript) House Rules Committee: Hearing about HR 1731 and HR 1560, the House cybersecurity bills, April 21, 2015 Additional Information Article: The fight over CISA is far from over by Eric Geller, The Daily Dot, October 28, 2015. Webpage: About the National Cybersecurity and Communications Integration Center, Department of Homeland Security. Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio)

Congressional Dish
CD099: April Takes a Turn

Congressional Dish

Play Episode Listen Later Jun 27, 2015 95:23


Medicare, cybersecurity, favors for banks, mortgages, IRS bullying, a tax cut for the rich, and a couple of good ideas are highlighted from the law and bills that passed Congress in April. Please support Congressional Dish: Click here to contribute with PayPal or Bitcoin; click the PayPal "Make it Monthly" checkbox to create a monthly subscription Click here to support Congressional Dish for each episode via Patreon Mail Contributions to: 5753 Hwy 85 North #4576 Crestview, FL 32536 Thank you for supporting truly independent media! Laws H.R. 2: Medicare Access and CHIP Reauthorization Act of 2015 Sustainable Growth Rate (SGR): Enacted in 1997, the SGR paid doctors for Medicare patients based on the growth in gross domestic product (GDP). If Medicare costs increased more than GDP, doctors payments were cut across the board. According to the American College of Physicians, this formula for payment has meant that the Medicare payment rate to doctors is essentially the same as it was in 2001 and cuts have been postponed so many times that doctors' payments would have been cut by 21% if this bill was not signed into law by April 1. This new law: Repeals the Sustainable Growth Rate formula for Medicare payments to doctors. Increases payments to doctors by 0.5% through 2019 while the payment rate transitions away from a pay-per-service model. The new system will be based on scores assessed by a "Merit-based Incentive Payment System" which will be created by the Secretary of Health and Human Services which will go into effect on January 1, 2019. A list of "quality measures" will be posted every November and doctors can choose which one's will be used in their performance assessments. Doctors will be rated and paid based on a performance score from 0 to 100, which will take improvement into account starting in the second year of the program. The GAO will report on the effectiveness of the system by October 1, 2021. An advisory committee will be created to propose alternative payment models, which will be lump sum payments to group practices and medical homes. Sets a goal for Medicare records to be electronic nation-wide by December 31, 2018. Extends a bunch of existing Medicare programs, including the Children's Health Insurance Program (which covers low income kids whose parents make too much for Medicaid) for two years. Doubles the length of Medicare administrator contracts from five to ten years. Expands nationally a prior authorization requirement for "repetitive scheduled non-emergent ambulance transport" Prohibits the printing of social security numbers on Medicare cards Pays for the new system by... Denying access to policies with no out of pocket costs to people who enter Medicare after January 1, 2020. For all future beneficiaries, they will have to pay at least $147 per year (the cost of the Medicare Part B deductible). Increasing the premiums for relatively high income individuals. People who have a gross income between $133,501 and $160,000 ($267,000 and $320,000 for a couple) will pay a 65% premium instead of 50%, and people above that will pay an 80% premium rate. This would increase with inflation beginning in 2020. Has a huge increase in the levy that the Treasury Department can impose on tax delinquent service providers, increasing it from 30% to 100%, effective on October 16, 2015. Will have auditors distribute information about improper payments to help reduce the number of them. Creates a paper-free option for Medicare notices, saving mail fees. The effect this bill will have on the budget will not be counted. The Congressional Budget Office (CBO) estimates this bill will increase the budget deficit by $141 billion. Passed 392-37 in the House and 92-8 in the Senate Sponsored by Rep. Michael Burgess of Texas 95 pages Bills H.R. 1731: National Cybersecurity Protection Advancement Act of 2015 For reference, here's the text as of March 2015 of the Homeland Security Act, which is amended by this bill. This bill: Adds "private entities" to the list of groups that will be part of the National Cybersecurity and Communications Integration Center, which coordinates information sharing between the Federal government and other entities. Adds new groups to the list of who will be included in the National Cybersecurity and Communications Integration Center who will coordinate with all sizes of businesses. Expands the type of information that the National Cybersecurity and Communications Integration Center will share between the Federal government, local governments, and private sector. Authorizes the National Cybersecurity and Communications Integration Center to share information internationally. Requires the government and businesses to use existing technology to "rapidly advance" implementation of "automated mechanisms" for sharing between the National Cybersecurity and Communications Integration Center and Federal agencies. Participation by non-Federal entities will be voluntary. Agreements that exist before this bill is signed into law will be deemed compliant with this law. All participating entities need to take "reasonable efforts to remove information that can be used to identity specific persons". There's no listed punishments if they don't. The Under Secretary for Cybersecurity and Infrastructure Protection will create policies for governing the use of information shared with the National Cybersecurity and Communications Integration Center 180 days AFTER the bill becomes law. He/she will also be responsible for creating "sanctions" for government employees who disregard his/her privacy policies. Private entities that share information will have immunity from lawsuits, if they share information according to this law. If the Federal government breaks this law, it will have to pay the person actual damages or $1,000, whichever is higher, plus attorneys fees. There is a two year statute of limitations. This law will trump state laws that limit information sharing. The law would sunset 7 years after enactment. Passed 355-63 in the House Sponsored by Rep. Michael McCaul of Texas 60 pages H.R. 1560: Protecting Cyber Networks Act Contains the text of H.R. 1731: National Cybersecurity Protection Advancement Act Within 90 days of enactment, the Director of National Intelligence must develop procedures for sharing classified "cyber threat indicators" with "non-Federal entities" Allows cybersecurity monitoring of government systems to be privatized Allows "non-Federal entities" to share information to with anyone other than the Defense Department. The entity sharing information must "take reasonable efforts" to remove personally identifiable information on people "not directly related" to the cybersecurity threat. The President will develop polices governing what happens to information received by the Federal Government, within 90 days of the bill becoming law. The Attorney General will create policies relating to privacy and civil liberties, within 90 days of the bill becoming law. A new branch, with 50 or less employees, will be created within the Office of the Director of National Intelligence called the Cyber Threat Intelligence Integration Center, which will "serve as the primary organization within the Federal Government for analyzing and integrating all intelligence possessed or acquired by the United States pertaining to cyber threats." Information shared with the government is exempt from public disclosure. Information given to the government "shall not be subject to a rule of any Federal department or agency or any judicial doctrine regarding ex parte communications with a decision-making official." The government can keep and use information given to it to investigate, prosecute, prevent or mitigate a threat of "death or serious bodily harm or an offense arising out of such a threat" and to investigate, prosecute, prevent or mitigate a threat to a minor. The information can also be used to prevent, investigation, disrupt, or prosecute fraud, unauthorized access to computers and transmission of information taken from it, "serious violent felonies" including murder, manslaughter, assault, sexual abuse, kidnapping, robbery, carjacking, extortion, firearms use, firearms possession, or attempt to commit any of these crimes, espionage including photographing or sketching defense installations, and theft of trade secrets. Passed 307-116 in the House Sponsored by Rep. Devin Nunes of California 121 pages H.R. 650: Preserving Access to Manufactured Housing Act of 2015 Changes the definition of "Mortgage originator" to exclude mobile home retailers who take mortgage loan applications, negotiate loans, or advise consumers on loan terms (including rates, fees, and other costs) This exempts mobile home dealers from licensing, registry, a law prohibiting payment based on the terms of the loan, regulations prohibiting steering customers towards loans they can't repay or with excessive fees, regulations prohibiting mischaracterizing a customer's credit history, regulations prohibiting the mischaracterization of the appraised value of the home, or steering a customer towards a loan that's more expensive than others that they qualify for. Increases the interest banks can charge people buying a home for under $75,000 without the loan being labeled as "high-cost", which subjects the loans to Consumer Financial Protection Bureau regulations. The regulations this would exempt the loans from: Ban balloon payments, which is an oversized payment due at the end of a mortgage Prohibit banks from charging prepayment penalties and fees Restrict late fees to four percent of the payment that is past due Bans fees for loan modification Require banks make sure the loan can be repaid before offering it Prohibit banks from recommending that a customer default on a loan Require that banks receive a confirmation that the customer has received homeownership counseling before they accept a high-cost mortgage. Would allow banks to charge $3,000 or 5% in fees for loans under $75,000, whichever is greater. Current law says banks can charge 5% for loans over $20,000, so the $3,000 fee option would hit the smaller loans the hardest. Passed the House 263-162. Rep. Walter Jones of North Carolina was the only Republican no vote. The bill would be vetoed by President Obama. Sponsored by Rep. Stephen Fincher of Tennessee He took $15,150 from Clayton Homes for the 2014 election, his #4 donor and Clayton Home's #1 recipient of funds. Jeb Hensarling, the Chairman of the House Financial Services Committee was Clayton Homes #2 recipient in 2014, giving him $8,750. 4 pages H.R. 685: Mortgage Choice Act of 2015 By changing the definition of what charges count as "points and fees", this bill... Reverses a Dodd-Frank requirement that charges for title insurance be counted as points and fees if they're paid to an affiliate of the bank/creditor that issued the loan. Currently, points and fees can not be greater than 3% of the loan amount, which include fees charged by affiliated settlement providers. Every thing that gets exempted from counting as "points and fees" therefore becomes additional charges the lender is allowed to tack on to a mortgage. Exempts money held in escrow for insurance from being considered points and fees, which exempt insurance charges from the fee caps. The change in definition allows more fees to be charged to mortgages, while keeping those mortgages from being classified as "high-cost" and being subject to greater restrictions. This is a zombie bill from the 113th Congress; it passed by voice vote on June 9, 2014. Passed the House 286-140. Rep. Walter Jones of North Carolina was the only Republican no vote. Sponsored by Rep. Bill Huizenga of Michigan His top three contributing industries are - in this order - Insurance ($273,265), Real Estate ($218,175), and Commercial Banks ($193,000). 4 pages H.R. 299: Capital Access for Small Community Financial Institutions Act of 2015 Federal Home Loan Banks are privately owned cooperatives, funded by the global credit market, which provide money to local banks. There are twelve of them around the country and they are owned by the member banks. Most local banks are members of least one Federal Home Loan Bank. Allows privately insured credit unions to become members of Federal Home Loan Banks if they are FDIC eligible or are certified by the State. If the State doesn't get to it in under 6 months, the application is deemed approved. Zombie bill from the 113th Congress Passed the House by voice vote Sponsored by Rep. Steve Stivers of Ohio His top three contributing industries over the course of his four year Congressional career have been Insurance ($898,858), Commercial Banks ($534,622), and Securities and Investment ($502,098). 6 pages H.R. 1259: Helping Expand Lending Practices in Rural Communities Act Orders the Consumer Financial Protection Bureau to create an application process for people or companies to have their location designated as "rural" This would allow residents to become eligible for certain mortgages and exempt lenders from regulations intended for urban areas, according to Phil Hall of National Mortgage Professional Magazine Sunsets after 2 years. Zombie bill from the 113th Congress Passed the House 401-1. Nydia Valazquez of New York was the only no vote. Sponsored by Rep. Andy Barr of Kentucky He has taken $333,800 from the Securities & Investment industry during his 3 years in Congress. 4 pages H.R. 1195: Bureau of Consumer Financial Protection Advisory Boards Act Creates paid advisory boards for the Consumer Financial Protection Bureau made up of bankers Places limits on funding for the Consumer Financial Protection Bureau Passed the House 235-183, with 4 Democrat Ayes and 5 Republican Nays President Obama would veto the bill Sponsored by Rep. Robert Pittenger of North Carolina His #4 and #5 contributing industries are Securities & Investment and Commercial Banks; he's taken a combined $189,450 during his 3 years in Congress 7 pages H.R. 1314: Ensuring Tax Exempt Organizations the Right to Appeal Act Became the vehicle for Trade Promotion Authority in the Senate Creates an appeal process for organizations that are denied tax-exempt status Would apply to decisions made on or after May 19, 2014. Passed the House by voice vote Sponsored by Rep. Patrick Meehan of Pennsylvania 4 pages H.R. 1026: Taxpayer Knowledge of IRS Investigations Act Gives the Treasury Secretary the option of telling organizations if they are investigating a claim of unauthorized information disclosure by a government, if the investigation substantiated their claim, and if any action, including prosecution, is planned. Passed the House by a voice vote Sponsored by Rep. Mike Kelly of Pennsylvania 3 pages H.R. 709: Prevent Targeting at the IRS Act Allows the IRS to fire employees who steer and audit for a political purpose or for personal gain. Passed the House by a voice vote Sponsored by Rep. James Renacci of Ohio 2 pages H.R. 1104: Fair Treatment for All Gifts Act Makes gifts made to 501(c)4 "social welfare" groups, 501(c)5 labor and agricultural groups, and 501(c)6 business groups (including chambers of commerce, real-estate boards, and professional football leagues) tax exempt. Passed the House by voice vote Sponsored by Rep. Peter Roskam of Illinois 3 pages H.R. 1058: Taxpayer Bill of Rights Act Tells the IRS Commissioner to "ensure" that IRS employees are "familiar with and act in accord" with a list of "taxpayer rights" including The right to be informed The right to quality service The right to pay no more than the correct amount of tax The right to challenge the position of the Internal Revenue Service and be heard The right to appeal a decision of the Internal Revenue Service in an independent forum The right to finality The right to privacy The right to confidentiality The right to retain representation The right to a fair and just tax system Passed the House by a voice vote Sponsored by Rep. Peter Roskam of Illinois 3 pages H.R. 1152: IRS Email Transparency Act Prohibits IRS employees from using personal email accounts for official business Passed the House by a voice vote Sponsored by Rep. Kenny Marchant of Texas 2 pages H.R. 1105: Death Tax Repeal Act Repeals the estate tax for anyone who dies after the bill is signed Repeals the generation-skipping transfer tax, which is a tax on gifts and transfers of wealth to unrelated people who are more than 37.5 years younger than the donor, or to related people who are one generation younger. Would lower the top gift tax rate from 40 to 35 percent. The effects of this on the budget would not be counted. The CBO says this would increase the deficit by $269 billion over the next 10 years President Obama would veto the bill. Passed by 240-179 Sponsored by Rep. Kevin Brady of Texas 7 pages H.R. 622: State and Local Sales Tax Deduction Fairness Act Permanently extends the law that allows taxpayers who itemize their claims to deduct their state's sales taxes instead of getting a deduction for their state's income taxes. The effect of this bill on the budget would not be counted. CBO says this would increase the Federal deficit by $42 billion over the next ten years. President Obama would veto the bill. Passed the House 272-152. Rep. Walter Jones of North Carolina was the only Republican no vote Sponsored by Rep. Kevin Brady of Texas 2 pages H.R. 1562: Contracting and Tax Accountability Act of 2015 Stops Federal agencies from contracting with companies that are tax delinquent A waiver can be issued and the contract granted if a report is submitted to Congress saying that the contract "significantly affects the interests of the United States" Passed the House 424-0 Sponsored by Rep. Jason Chaffetz of Utah 9 pages H.R. 471: Ensuring Patient Access and Effective Drug Enforcement Act Makes the Attorney General list specific laws and regulations that a drug company is accused of violating in their notices to the companies regarding the possible suspension of their drug's registration. Allows drug companies to submit a "corrective action plan" when their drug registration may be suspended Passed the House by a voice vote Sponsored by Rep. Tom Marino of Pennsylvania His top contributing industry for the last election was the pharmaceutical industry; they gave him $55,250. 6 pages S. 971: Medicare Independence at Home Medical Practice Demonstration Improvement Act Increases the length of Medicare contracts for at-home care from 3 years to 5 years Passed the Senate by a voice vote Sponsored by Senator Ron Wyden of Oregon 2 pages H.R. 373: Good Samaritan Search and Recovery Act Clarifies that search and rescue volunteers are not Federal volunteers and are not entitled to Federal compensation. Releases the government from liability for allowing search and rescue teams onto Federal land so that they won't have to get insurance. The government as to approve or deny a request for a search and rescue mission within 48 hours. Passed the House 413-0 Sponsored by Rep. Joe Heck of Nevada Rep. Heck introduced the bill in response to the murder of Keith Goldberg; the search for his body in the Lake Mead National Recreation Area was delayed because the search team needed a special use permit and a $1 million insurance policy. It took 10 months to get the insurance; his body was found 3 hours after their search began. The National Association for Search and Rescue and the National Park Service, however, don't think access is a problem. 6 pages S. 304: Motor Vehicle Safety Whistleblower Act Protects the identity of whistleblowers who provide information relating to motor vehicle defects or other dangerous safety problems. Allows the government to give up to 30% of the fine collected from a car company that breaks the law to the whistleblower whose information lead to the conviction. The whistleblower is not allowed to be represented by a lawyer. Passed the Senate by a voice vote Sponsored by Senator John Thune of South Dakota Senator Thune has taken over $380,000 from the automotive industry 11 pages S. 984: Steve Gleason Act of 2015 Starting in 2016, Medicare would cover speech generating devices. Allows people to own their speech generating devices (as opposed to renting them) if purchased between October 1, 2015 and October 1, 2018. Named after former NFL football player Steve Gleason, who played for the New Orleans Saints before being diagnosed with ALS Passed the Senate of a voice vote Sponsored by Senator David Vitter of Louisiana 3 pages Hearings Rules Committee: April 13 on HR 650 and HR 685, about housing bills. Rules Committee: April 21 on HR 1731 and HR 1560 on Cybersecurity House Committee on Financial Services: March 18 hearing on deregulation for banks titled "Preserving Consumer Choice and Financial Independence" Information Presented in This Episode Article: 'Doc fix' headed to president's desk after easily clearing Senate by Paul Demko, Modern Healthcare, April 14, 2015. Article: The mobile-home trap: How a Warren Buffett empire preys on the poor by Mike Baker and Daniel Wagner, The Seattle Times, April 2, 2015. Article: MBA's Mortgage Action Alliance: A Message from MAA Chairman Fowler Williams by Fowler Williams, National Mortgage Professional Magazine, June 11, 2015. Article: U.S. Bank Profits Near Record Levels by Robin Sidel and Saabira Chaudhuri, Wall Street Journal, August 11, 2014 Article: Bureaucracy hindered search for slain brother by Anjeanette Damon, USA Today, March 8, 2014. Webpage: About the National Cybersecurity and Communications Integration Center, Department of Homeland Security. Webpage: Team Gleason Press Release: Rep. Kelly Introduces Taxpayer Knowledge of IRS Investigations Act Additional Information Kickstarter: Explore Campaign Finance App by Soloman Kahn. Jen's Podcast Appearances Episode 66: Talk Nerdy with Cara Santa Maria Episode 42: Podcast Junkies with Harry Duran Music Presented in This Episode Intro & Exit: Tired of Being Lied To by David Ippolito (found on Music Alley by mevio) Ask Your Doctor by Neal Fox (found on Music Alley by mevio) Thank you by Ben Willmott (found on Music Alley by mevio)

united states new york director california texas president health house starting nfl state office doctors ohio barack obama search north carolina oregon pennsylvania congress north current zombies illinois utah bitcoin republicans real estate investment louisiana rescue private senate wall street journal insurance places federal named paypal secretary increasing usa today cybersecurity heck physicians creates pays irs national association mortgage medicare releases bureau warren buffett congressional gdp requires passed bans participation homeland security attorney general new orleans saints medicaid require american colleges federal government adds human services increases agreements ban merit doubles securities expands denying contracting extends national park service seattle times treasury department under secretary cbo fdic defense department gao restrict devin nunes national intelligence reverses internal revenue service hwy dodd frank mike kelly consumer financial protection bureau treasury secretary talk nerdy modern healthcare house financial services committee ron wyden mike baker prohibit medicare part b jason chaffetz kevin brady walter jones authorizes congressional dish ask your doctor music alley podcast junkies prohibits sgr steve gleason john thune daniel wagner crestview andy barr phil hall michael burgess federal home loan bank national cybersecurity fair treatment medicare access infrastructure protection chip reauthorization act commercial banks congressional budget office cbo taxpayer bill patrick meehan clayton homes irs commissioner trade promotion authority david vitter tom marino peter roskam incentive payment system federal home loan banks david ippolito joe heck children's health insurance program homeland security act ben willmott paul demko communications integration center ensuring patient access