Computer Security Act of 1987shorttitle Security Act of 1987 | othershorttitles = | longtitle = BureStandards, to provide for the training in of persons who are involved in the management, operation, and use of Federal computer systems, and for other purposes. | colloquia | nickname = | enacted by = 100th | effective date = January 8, 1988 | public law url = http://www.gpo.gov/fdsys/pkg/STATUTE-101/pdf/STATUTE-101-Pg1724.pdf | cite public law = 100-235 | cite statutes at large = 101 Stat. 1724 | acts amended = | acts repealed = | title amended = 15 U.S.C.: Commerce and Trade | sections created = | sections amended = | leghisturl = http://thomas.loc.gov/cgi-bin/bdquery/z?d100:HR00145:@@@R | introducedin = House | introducedbill = H.R. 145 | introducedby = Dan Glickman (D-KS) | introduceddate = January 6, 1987 | committees = House Government Operations, House Science, Space and Technology | passedbody1 = House | passeddate1 = June 22, 1987 | passedvote1 = passed voice vote | passedbody2 = Senate | passedas2 = | passeddate2 = December 21, 1987 | passedvote2 = passed voice vote | conferencedate = | passedbody3 = | passeddate3 = | passedvote3 = | agreedbody3 = | agreeddate3 = | agreedvote3 = | agreedbody4 = | agreeddate4 = | agreedvote4 = | passedbody4 = | passeddate4 = | passedvote4 = | signedpresident = Ronald Reagan | signeddate = January 8, 1988 | unsignedpresident = | unsigneddate = | vetoedpresident = | vetoeddate = | overriddenbody1 = | overriddendate1 = | overriddenvote1 = | overriddenbody2 = | overriddendate2 = | overriddenvote2 = | amendments = | SCOTUS cases = }} The Computer Security Act of 1987, Public Law No. 100-235 (H.R. 145), (Jan. 8, 1988), is a United States federal law enacted in 1987. It is intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for such systems. It required the creation of computer security plans, and appropriate training of system users or owners where the systems would display, process or store sensitive information. Provisions
References
External links
|