S. 2111 (112th): Cyber Crime Protection Security Act

Introduced:
Feb 15, 2012 (112th Congress, 2011–2013)
Status:
Died (Reported by Committee)
Sponsor
Patrick Leahy
Senior Senator from Vermont
Party
Democrat
Text
Read Text »
Last Updated
Feb 16, 2012
Length
12 pages
Related Bills
S. 3342 (Related)
SECURE IT

Reported by Committee
Last Action: Jun 28, 2012

H.R. 4263 (Related)
SECURE IT Act of 2012

Referred to Committee
Last Action: Mar 27, 2012

 
Status

This bill was introduced on February 16, 2012, in a previous session of Congress, but was not enacted.

Progress
Introduced Feb 15, 2012
Reported by Committee Feb 16, 2012
 
Full Title

A bill to enhance punishment for identity theft and other violations of data privacy and security.

Summary

No summaries available.

Cosponsors
none
 
Primary Source

THOMAS.gov (The Library of Congress)

GovTrack gets most information from THOMAS, which is updated generally one day after events occur. Activity since the last update may not be reflected here. Data comes via the congress project.

Widget

Get a bill status widget for your website »

Citation

Click a format for a citation suggestion:

Notes

S. stands for Senate bill.

A bill must be passed by both the House and Senate in identical form and then be signed by the president to become law.

The bill’s title was written by its sponsor.

GovTrack’s Bill Summary

We don’t have a summary available yet.

Library of Congress Summary

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.


2/15/2012--Introduced.
Cyber Crime Protection Security Act - Amends the federal criminal code to make fraud in connection with the unauthorized access of personally identifiable information (in electronic or digital form) a predicate for instituting a prosecution for racketeering.
Increases penalties for fraud and related activity in connection with computers.
Expands the prohibition against trafficking in passwords to include trafficking through any means by which a protected computer may be accessed without authorization.
Imposes criminal penalties for attempts and conspiracies to commit fraud and related activity in connection with computers.
Modifies criminal and civil forfeiture provisions, including requiring certain civil forfeiture seizures and forfeitures to be performed by persons designated for that purpose by the Secretary of Homeland Security (DHS) or the Attorney General (DOJ).
Prohibits, during and in relation to a felony violation of provisions regarding fraud and related activity in connection with computers, intentionally causing or attempting to cause damage to a critical infrastructure computer if such damage results in (or, in the case of an attempt, would, if completed have resulted in) the substantial impairment of the operation of that computer or of the critical infrastructure associated with the computer.
Imposes a prison term of between 3 and 20 years, a fine, or both.
Prohibits probation for any person convicted of such a violation.
Provides for concurrent sentences under specified circumstances.
Excludes from the definition of "exceeds authorized access" for purposes of the prohibition against fraudulent use of computers, access in violation of a contractual obligation or agreement, such as an acceptable use policy or terms of service agreement, with an Internet service provider, Internet website, or nongovernment employer, if such violation constitutes the sole basis for determining that access to a protected computer is unauthorized.

House Republican Conference Summary

The summary below was written by the House Republican Conference, which is the caucus of Republicans in the House of Representatives.


No summary available.

House Democratic Caucus Summary

The House Democratic Caucus does not provide summaries of bills.

So, yes, we display the House Republican Conference’s summaries when available even if we do not have a Democratic summary available. That’s because we feel it is better to give you as much information as possible, even if we cannot provide every viewpoint.

We’ll be looking for a source of summaries from the other side in the meanwhile.

Use the comment space below for discussion of the merits of S. 2111 (112th) with other GovTrack users.
Your comments are not read by Congressional staff.

comments powered by Disqus