My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Agenda Packet_2023-11-07
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2023
>
11/07/2023 Regular
>
Agenda Packet_2023-11-07
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/1/2023 11:15:01 AM
Creation date
11/1/2023 11:07:46 AM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Clerk of the Council
Date
11/7/2023
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
930
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
IPR Appendix | 2023 Page F-8 <br />Acquisition and Use of Technology to Mitigate UAS (Counter-UAS) <br />In August 2020, FEMA was alerted you of an advisory guidance document issued by DHS, the <br />Department of Justice, the Federal Aviation Administration, and the Federal Communications <br />Commission: https://www.dhs.gov/publication/interagency-legal-advisory-uas-detection-and-mitigation- <br />technologies. The purpose of the advisory guidance document is to help non-federal public and private <br />entities better understand the federal laws and regulations that may apply to the use of capabilities to <br />detect and mitigate threats posed by UAS operations (i.e., Counter-UAS or C-UAS). <br />The Departments and Agencies issuing the advisory guidance document, and FEMA, do not have the <br />authority to approve non-federal public or private use of UAS detection or mitigation capabilities, nor do <br />they conduct legal reviews of commercially available product compliance with those laws. The advisory <br />does not address state and local laws nor potential civil liability, which UAS detection and mitigation <br />capabilities may also implicate. <br />It is strongly recommended that, prior to the testing, acquisition, installation, or use of UAS detection <br />and/or mitigation systems, entities seek the advice of counsel experienced with both federal and state <br />criminal, surveillance, and communications laws. Entities should conduct their own legal and technical <br />analysis of each UAS detection and/or mitigation system and should not rely solely on vendors’ <br />representations of the systems’ legality or functionality. Please also see the DHS press release on this <br />topic for further information: https://www.dhs.gov/news/2020/08/17/interagency-issues-advisory-use- <br />technology-detect-and-mitigate-unmanned-aircraft. <br />Cybersecurity Projects <br />IPR funds may be used for projects that enhance the cybersecurity of: <br />•Access controls, sensors; security cameras, badge/ID readers, ICS/SCADA systems, process <br />monitors and controls (such as firewalls, network segmentation, predictive security cloud, etc.); <br />and <br />•Passenger/vehicle/cargo security screening equipment (cybersecurity assessments are allowable). <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />“Framework”), developed by the National Institute of Standards and Technology (NIST). The Framework <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers ways to improve their programs, such as through better communication <br />with their leadership and suppliers about management of cyber risks. <br />The Cybersecurity and Infrastructure Security Agency’s (CISA) Critical Infrastructure Cyber Community <br />C³ Voluntary Program also provides resources to critical infrastructure owners and operators to assist in <br />adoption of the Framework and managing cyber risks. Additional information on the Critical <br />Infrastructure Cyber Community C³ Voluntary Program can be found at www.cisa.gov/ccubedvp. <br />DHS’s Enhanced Cybersecurity Services (ECS) program is an example of a resource that assists in <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />“Detect” and “Protect” functions to deliver an impactful solution relative to the outcomes of the <br />Framework. Specifically, ECS offers intrusion prevention and analysis services that help U.S.-based <br />companies and SLTT governments defend their computer systems against unauthorized access, <br />exploitation, and data exfiltration. ECS works by sourcing timely, actionable cyber threat indicators from <br /> <br /> <br />City Council 35 – 163 11/7/2023
The URL can be used to link to this page
Your browser does not support the video tag.