H.R. 2577 Moves Ahead

Published On July 29, 2011 | By Randy Sabett | Privacy
TwitterLinkedInFacebookRedditCopy LinkEmailPrint

A pending cybersecurity bill has made some progress in the House.  Unlike the dangerous impasse over the debt ceiling and budget cuts in which the Congress and the White House currently finds themselves, the Secure and Fortify Electronic (SAFE) Data Act has passed out of the Subcommittee on Commerce, Manufacturing, and Trade within the Committee on Energy and Commerce.  On a voice vote, H.R. 2577 was approved by the subcommittee with numerous amendments offered by Democrats being rejected by the Republican majority.  The amendments were intended to expand the scope of personal information that would be covered by the bill.  The bill will now be debated and voted upon by the full committee.  While Rep. Bono Mack pushes to continue moving the bill forward, several Democratic lawmakers have publicly opposed the bill’s preemption of state laws (that are, in some cases, stronger) and what many view as its inadequate coverage (in that it doesn’t cover a number of different types of personal information).  Consideration by the full Committee could occur as early as next week and will likely be as lively (or perhaps even more lively) than the subcommittee markup.

About The Author

Randy V. Sabett joined ZwillGen as Counsel in 2011. He advises clients on information security, privacy, IT licensing, and intellectual property. Randy has over 20 years of infosec experience, including as an NSA crypto engineer and a CISSP. He works closely with companies in helping them develop strategies to protect and exploit their information and IP based on various evolving business models, including SaaS, mobile applications, cloud, and more traditional client/server architectures. Specific areas on which he focuses include information security, privacy, IT licensing, IP strategy, big data, metrics, active defense, venture capital, legislative matters, government contracting, digital and electronic signatures, federated identity, state and federal information security and privacy laws, identity theft, and data breaches. He also drafts and negotiates a variety of technology transaction agreements.

Leave a Reply

Your email address will not be published. Required fields are marked *