My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 35 - FY 2022 Emergency Management Performance Grant
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2023
>
11/07/2023 Regular
>
Item 35 - FY 2022 Emergency Management Performance Grant
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/1/2023 1:48:15 PM
Creation date
11/1/2023 1:40:55 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Police
Item #
35
Date
11/7/2023
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
305
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
IPR Appendix | 2023 Page F-8 <br />Acquisition and Use of Technology to Mitigate UAS (Counter-UAS) <br />In August 2020, FEMA was alerted you of an advisory guidance document issued by DHS, the <br />Department of Justice, the Federal Aviation Administration, and the Federal Communications <br />Commission: https://www.dhs.gov/publication/interagency-legal-advisory-uas-detection-and-mitigation- <br />technologies. The purpose of the advisory guidance document is to help non-federal public and private <br />entities better understand the federal laws and regulations that may apply to the use of capabilities to <br />detect and mitigate threats posed by UAS operations (i.e., Counter-UAS or C-UAS). <br />The Departments and Agencies issuing the advisory guidance document, and FEMA, do not have the <br />authority to approve non-federal public or private use of UAS detection or mitigation capabilities, nor do <br />they conduct legal reviews of commercially available product compliance with those laws. The advisory <br />does not address state and local laws nor potential civil liability, which UAS detection and mitigation <br />capabilities may also implicate. <br />It is strongly recommended that, prior to the testing, acquisition, installation, or use of UAS detection <br />and/or mitigation systems, entities seek the advice of counsel experienced with both federal and state <br />criminal, surveillance, and communications laws. Entities should conduct their own legal and technical <br />analysis of each UAS detection and/or mitigation system and should not rely solely on vendors’ <br />representations of the systems’ legality or functionality. Please also see the DHS press release on this <br />topic for further information: https://www.dhs.gov/news/2020/08/17/interagency-issues-advisory-use- <br />technology-detect-and-mitigate-unmanned-aircraft. <br />Cybersecurity Projects <br />IPR funds may be used for projects that enhance the cybersecurity of: <br />•Access controls, sensors; security cameras, badge/ID readers, ICS/SCADA systems, process <br />monitors and controls (such as firewalls, network segmentation, predictive security cloud, etc.); <br />and <br />•Passenger/vehicle/cargo security screening equipment (cybersecurity assessments are allowable). <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />“Framework”), developed by the National Institute of Standards and Technology (NIST). The Framework <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers ways to improve their programs, such as through better communication <br />with their leadership and suppliers about management of cyber risks. <br />The Cybersecurity and Infrastructure Security Agency’s (CISA) Critical Infrastructure Cyber Community <br />C³ Voluntary Program also provides resources to critical infrastructure owners and operators to assist in <br />adoption of the Framework and managing cyber risks. Additional information on the Critical <br />Infrastructure Cyber Community C³ Voluntary Program can be found at www.cisa.gov/ccubedvp. <br />DHS’s Enhanced Cybersecurity Services (ECS) program is an example of a resource that assists in <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />“Detect” and “Protect” functions to deliver an impactful solution relative to the outcomes of the <br />Framework. Specifically, ECS offers intrusion prevention and analysis services that help U.S.-based <br />companies and SLTT governments defend their computer systems against unauthorized access, <br />exploitation, and data exfiltration. ECS works by sourcing timely, actionable cyber threat indicators from
The URL can be used to link to this page
Your browser does not support the video tag.