Oversight, Investigations, and Accountability Subcommittee, Homeland Security Committee
Introduced
In Committee
On Floor
Passed Chamber
Enacted
Securing the Homeland Security Supply Chain Act of 2019 This bill authorizes the Department of Homeland Security (DHS) to restrict procurement of information technology, telecommunications equipment and services, and related products or services from a vendor that poses a risk to the DHS supply chain. A vendor poses a risk if a malicious actor may manipulate the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of a vendor's covered article. DHS must report to specified congressional committees on cybersecurity threats posed by terrorist actors and foreign state-owned entities to the information technology and communications systems of DHS.
Securing the Homeland Security Supply Chain Act of 2018
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Oversight, Management, and Accountability.
Ordered to be Reported (Amended) by Unanimous Consent.
Subcommittee on Oversight, Management, and Accountability Discharged.
Committee Consideration and Mark-up Session Held.
Placed on the Union Calendar, Calendar No. 146.
Reported (Amended) by the Committee on Homeland Security. H. Rept. 116-188.
Government Operations and Politics
Administrative remediesComputers and information technologyComputer security and identity theftCongressional oversightDepartment of Homeland SecurityExecutive agency funding and structureForeign and international corporationsGovernment information and archivesGovernment studies and investigationsHomeland securityIntelligence activities, surveillance, classified informationPublic contracts and procurementTelephone and wireless communicationTerrorism
Securing the Homeland Security Supply Chain Act of 2019
USA116th CongressHR-3320| House
| Updated: 8/27/2019
Securing the Homeland Security Supply Chain Act of 2019 This bill authorizes the Department of Homeland Security (DHS) to restrict procurement of information technology, telecommunications equipment and services, and related products or services from a vendor that poses a risk to the DHS supply chain. A vendor poses a risk if a malicious actor may manipulate the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of a vendor's covered article. DHS must report to specified congressional committees on cybersecurity threats posed by terrorist actors and foreign state-owned entities to the information technology and communications systems of DHS.
Oversight, Investigations, and Accountability Subcommittee, Homeland Security Committee
Government Operations and Politics
Introduced
In Committee
On Floor
Passed Chamber
Enacted
Administrative remediesComputers and information technologyComputer security and identity theftCongressional oversightDepartment of Homeland SecurityExecutive agency funding and structureForeign and international corporationsGovernment information and archivesGovernment studies and investigationsHomeland securityIntelligence activities, surveillance, classified informationPublic contracts and procurementTelephone and wireless communicationTerrorism