or Login to see your representatives.

Access Candidates' and Representatives' Biographies, Voting Records, Interest Group Ratings, Issue Positions, Public Statements, and Campaign Finances

Simply enter your zip code above to get to all of your candidates and representatives, or enter a name. Then, just click on the person you are interested in, and you can navigate to the categories of information we track for them.

Key Votes

HR 3523 - Cyber Intelligence Sharing and Protection Act - Key Vote

National Key Votes

Mike Turner voted Yea (Passage) on this Legislation.

Read statements Mike Turner made in this general time period.

Stages

Family

Issues

Stage Details

Legislation - Referred to Committee (Senate) -
Legislation - Bill Passed (House) (248-168) - (Key vote)

Title: Cyber Intelligence Sharing and Protection Act

Vote Smart's Synopsis:

Vote to pass a bill that authorizes the federal government to share cyber threat information with private-sector entities and utilities.

Highlights:
  • Requires the Director of National Intelligence to establish procedures for sharing cyber threat information with private-sector entities and utilities (Sec. 2).
  • Defines “cyber threat information” as information directly pertaining to the following for any government or private entity's computer system or network (Sec. 2):
    • A vulnerability of the network;
    • A threat to the integrity, confidentiality, or availability of the network;
    • Efforts to deny access to or degrade, disrupt, or destroy the network; or
    • Efforts to gain unauthorized access to the network.
  • Limits the sharing of cyber threat information to the following (Sec. 2):
    • Sharing with protected or self-protected entities;
    • Sharing with an individual with appropriate security clearance; or
    • Sharing consistent with the need to protect the national security of the United States.
  • Defines “protected entity” as an entity, other than an individual, that contracts with a cybersecurity provider for cybersecurity goods or services (Sec. 2).
  • Defines “self-protected entity” as an entity, other than an individual, that provides cybersecurity goods or services to itself (Sec. 2).
  • Prohibits the federal government from using the following information to pursue cyber threats (Sec. 2):
    • Library circulation records and patron lists;
    • Book sales records and customer lists;
    • Firearms sales records;
    • Tax returns;
    • Educational records; or
    • Medical records.
  • Prohibits the federal government from disclosing cyber threat information to an entity outside the federal government except as authorized by the entity sharing the information (Sec. 2).
  • Prohibits the federal government from using cyber threat information for regulatory purposes (Sec. 2).
  • Authorizes the federal government to use cyber threat information for any of the following purposes (Sec. 2):
    • For cybersecurity purposes;
    • For the investigation and prosecution of cybersecurity crimes;
    • For the protection of individuals from death or serious bodily harm;
    • For the protection of minors from threats including, but not limited to, child pornography, sexual exploitation and kidnapping; or
    • To protect the national security of the United States.
Legislation - Introduced (House) -

Title: Cyber Intelligence Sharing and Protection Act

Sponsors

Co-sponsors

Back to top