[Congressional Record: February 16, 2011 (Senate)]
[Page S796-S797]




          STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS


      By Mr. CARDIN (for himself and Mr. Whitehouse):
  S. 372. A bill the ability of terrorists, spies, criminals, and other
malicious actors to compromise, disrupt, damage, and destroy computer
networks, critical infrastructure, and key resources, and for other
purposes; to the Committee on Commerce, Science, and Transportation.
  Mr. CARDIN. Mr. President, the Internet has had a profound impact on
the daily lives of millions of Americans by enhancing communications,
commerce, education and socialization between and among persons
regardless of their location. Internationally, we have seen the
transformative power of the Internet in places like Egypt. A free and
open Internet gives strength and a voice to people worldwide and should
be protected from censorship and other forms of suppression. But the
Internet and those who engage in communications and commerce across
cyberspace must be safe--protected from predators like criminals,
terrorists and spies who wish to exploit or compromise information and
systems connected to the Internet. Our Nation is vulnerable to such
attacks, but working together, in partnership with the private sector,
we can find a balance that keeps information flowing freely while
keeping us all safe from harm.
  I have been focusing on cybersecurity issues for quite some time.
More than a year ago, as the former chairman of the Terrorism and
Homeland Security Subcommittee of the Judiciary Committee, I chaired a
Subcommittee hearing titled ``Cybersecurity: Preventing Terrorist
Attacks and Protecting Privacy in Cyberspace.'' The hearing included
witnesses from key federal agencies responsible for cybersecurity, as
well as representatives of the private sector. We reviewed governmental
and private sector efforts to prevent a terrorist cyber attack that
could cripple large sectors of our government, economy, and essential
services.
  The cybersecurity expertise that I have developed has convinced me
that the Government and the private sector can and should work together
to protect the American people in cyberspace. As a result, I am
reintroducing the Cybersecurity and Internet Safety Standards Act,
CISSA. This bill, which is cosponsored by Senator Whitehouse, will
require the Secretary of Homeland Security, in consultation with the
Attorney General, the Secretary of Commerce, and the Director of
National Intelligence, to conduct an analysis to determine the costs
and benefits of requiring internet service providers and others to
develop and enforce minimum voluntary or mandatory cybersecurity and
Internet safety standards. Under this bill, the Secretary of Homeland
Security will be required to report to Congress within one year with
specific recommendations. Cybersecurity must be a top priority. This
bill will help secure our nation's digital future by keeping the
American people and our cyber infrastructure safe without hampering the
freedoms inherently found in an open and accessible Internet.
  Mr. President, I ask unanimous consent that the text of the bill be
printed in the Record.
  There being no objection, the text of the bill was ordered to be
printed in the Record, as follows:

                                 S. 372

       Be it enacted by the Senate and House of Representatives of
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE.

       This Act may be cited as the ``Cybersecurity and Internet
     Safety Standards Act''.

     SEC. 2. DEFINITIONS.

       In this Act:
       (1) Computers.--Except as otherwise specifically provided,
     the term ``computers'' means computers and other devices that
     connect to the Internet.
       (2) Providers.--The term ``providers'' means Internet
     service providers, communications service providers,
     electronic messaging providers, electronic mail providers,
     and other persons who provide a service or capability to
     enable computers to connect to the Internet.
       (3) Secretary.--Except as otherwise specifically provided,
     the term ``Secretary'' means the Secretary of Homeland
     Security.

     SEC. 3. FINDINGS.

       Congress finds the following:
       (1) While the Internet has had a profound impact on the
     daily lives of the people of the United States by enhancing
     communications, commerce, education, and socialization
     between and among persons regardless of their location,
     computers may be used, exploited, and compromised by
     terrorists, criminals, spies, and other malicious actors,
     and, therefore, computers pose a risk to computer networks,
     critical infrastructure, and

[[Page S797]]

     key resources in the United States. Indeed, users of
     computers are generally unaware that their computers may be
     used, exploited, and compromised by others with spam,
     viruses, and other malicious software and agents.
       (2) Since computer networks, critical infrastructure, and
     key resources of the United States are at risk of being
     compromised, disrupted, damaged, or destroyed by terrorists,
     criminals, spies, and other malicious actors who use
     computers, cybersecurity and Internet safety is an urgent
     homeland security issue that needs to be addressed by
     providers, technology companies, and persons who use
     computers.
       (3) The Government and the private sector need to work
     together to develop and enforce minimum voluntary or
     mandatory cybersecurity and Internet safety standards for
     users of computers to prevent terrorists, criminals, spies,
     and other malicious actors from compromising, disrupting,
     damaging, or destroying the computer networks, critical
     infrastructure, and key resources of the United States.

     SEC. 4. COST-BENEFIT ANALYSIS.

       (a) Requirement for Analysis.--The Secretary, in
     consultation with the Attorney General, the Secretary of
     Commerce, and the Director of National Intelligence, shall
     conduct an analysis to determine the costs and benefits of
     requiring providers to develop and enforce voluntary or
     mandatory minimum cybersecurity and Internet safety standards
     for users of computers to prevent terrorists, criminals,
     spies, and other malicious actors from compromising,
     disrupting, damaging, or destroying computer networks,
     critical infrastructure, and key resources.
       (b) Factors.--In conducting the analysis required by
     subsection (a), the Secretary shall consider--
       (1) all relevant factors, including the effect that the
     development and enforcement of minimum voluntary or mandatory
     cybersecurity and Internet safety standards may have on
     homeland security, the global economy, innovation, individual
     liberty, and privacy; and
       (2) any legal impediments that may exist to the
     implementation of such standards.

     SEC. 5. CONSULTATION.

       In conducting the analysis required by section 4, the
     Secretary shall consult with the Attorney General, the
     Secretary of Commerce, the Director of National Intelligence,
     the Federal Communications Commission, and relevant
     stakeholders in the Government and the private sector,
     including the academic community, groups, or other
     institutions, that have scientific and technical expertise
     related to standards for computer networks, critical
     infrastructure, or key resources.

     SEC. 6. REPORT.

       (a) In General.--Not later than 1 year after the date of
     the enactment of this Act, the Secretary shall submit to the
     appropriate committees of Congress a final report on the
     results of the analysis required by section 4. Such report
     shall include the consensus recommendations, if any, for
     minimum voluntary or mandatory cybersecurity and Internet
     safety standards that should be developed and enforced for
     users of computers to prevent terrorists, criminals, spies,
     and other malicious actors from compromising, disrupting,
     damaging, or destroying computer networks, critical
     infrastructure, and key resources.
       (b) Appropriate Committees of Congress.--In this section,
     the term ``appropriate committees of Congress'' means--
       (1) the Committee on Commerce, Science, and Transportation,
     the Committee on Homeland Security and Governmental Affairs,
     and the Committee on the Judiciary of the Senate; and
       (2) the Committee on Energy and Commerce, the Committee on
     Homeland Security, the Committee on the Judiciary, and the
     Committee on Oversight and Government Reform of the House of
     Representatives.
                                 ______