DNS Abuse Responses: Difference between revisions
Line 60: | Line 60: | ||
Government responses tend to focus on what can be adjudicated; include content abuse, such as child pornography; and outline how and when electronic evidence can be collected. | Government responses tend to focus on what can be adjudicated; include content abuse, such as child pornography; and outline how and when electronic evidence can be collected. | ||
=====Domestic Legislation===== | =====Domestic Legislation===== | ||
======Federal====== | ======U.S. Federal====== | ||
American cybersecurity legislation thus far has focused on standardizing and formalizing preventative measures.<ref>[https://www.congress.gov/bill/115th-congress/house-bill/3359 CISA Act of 2018]</ref> Congress passed | |||
* [[FISMA|The Federal Information Security Management Act of 2002]] | * [[FISMA|The Federal Information Security Management Act of 2002]] | ||
* [[National Institute for Standards and Technology#Cybersecurity Framework|The Cybersecurity Enhancement Act of 2014 (CEA)]] | * [[National Institute for Standards and Technology#Cybersecurity Framework|The Cybersecurity Enhancement Act of 2014 (CEA)]] | ||
* [[Cybersecurity and Infrastructure Security Agency#History|The Cybersecurity and Infrastructure Security Agency Act of 2018]] | * [[Cybersecurity and Infrastructure Security Agency#History|The Cybersecurity and Infrastructure Security Agency Act of 2018]] | ||
======State====== | ======State====== | ||
* [https://www.ncsl.org/research/telecommunications-and-information-technology/cybersecurity-legislation-2021.aspx Statewide Cybersecurity Legislation] | * [https://www.ncsl.org/research/telecommunications-and-information-technology/cybersecurity-legislation-2021.aspx Statewide Cybersecurity Legislation] |