My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 18 - Adopt Resolution for FY 2021 Emergency Management Performance Grant
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2022
>
08/16/2022 Regular
>
Item 18 - Adopt Resolution for FY 2021 Emergency Management Performance Grant
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/18/2024 8:26:35 AM
Creation date
12/18/2024 8:19:33 AM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Police
Item #
18
Date
8/16/2022
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
264
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br /> <br /> TSGP Appendix | February 2021 Page D-8 <br />privacy, civil rights, and civil liberties of the jurisdiction that will purchase, take title to or otherwise use the <br />sUAS equipment. <br /> <br />Acquisition and Use of Technology to Mitigate UAS (Counter-UAS) <br />In August 2020, FEMA alerted of an advisory guidance document issued by DHS, the Department of <br />Justice, the Federal Aviation Administration, and the Federal Communications Commission: <br />https://www.dhs.gov/publication/interagency-legal-advisory-uas-detection-and-mitigation-technologies. <br />The purpose of the advisory guidance document is to help non-federal public and private entities better <br />understand the federal laws and regulations that may apply to the use of capabilities to detect and mitigate <br />threats posed by UAS operations (i.e., Counter-UAS or C-UAS). <br /> <br />The Departments and Agencies issuing the advisory guidance document, and FEMA, do not have the <br />authority to approve non-federal public or private use of UAS detection or mitigation capabilities, nor do <br />they conduct legal reviews of commercially available product compliance with those laws. The advisory <br />does not address state and local laws nor potential civil liability, which UAS detection and mitigation <br />capabilities may also implicate. <br /> <br />It is strongly recommended that, prior to the testing, acquisition, installation, or use of UAS detection <br />and/or mitigation systems, entities seek the advice of counsel experienced with both federal and state <br />criminal, surveillance, and communications laws. Entities should conduct their own legal and technical <br />analysis of each UAS detection and/or mitigation system and should not rely solely on vendors’ <br />representations of the systems’ legality or functionality. Please also see the DHS press release on this <br />topic for further information: https://www.dhs.gov/news/2020/08/17/interagency-issues-advisory-use- <br />technology-detect-and-mitigate-unmanned-aircraft. <br /> <br />Cybersecurity Projects <br />TSGP funds may be used for projects that enhance the cybersecurity of: <br /> <br />• Access controls, sensors, security cameras, badge/ID readers, ICS/SCADA systems, process <br />monitors and controls (such as firewalls, network segmentation, predictive security cloud, etc.) <br />• Passenger/vehicle/cargo security screening equipment (cybersecurity assessments are allowable) <br /> <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />“Framework”) developed by the National Institute of Standards and Technology (NIST). The Framework <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers a way to improve their programs, such as better communication with <br />their leadership and suppliers about management of cyber risks. <br /> <br />The Cybersecurity and Infrastructure Security Agency’s (CISA) Critical Infrastructure Cyber Community <br />C³ Voluntary Program also provides resources to critical infrastructure owners and operators to assist in <br />adoption of the Framework and managing cyber risks. Additional information on the Critical <br />Infrastructure Cyber Community C³ Voluntary Program can be found at http://www.cisa.gov/ccubedvp. <br /> <br />DHS’s Enhanced Cybersecurity Services (ECS) program is an example of a resource that assists in <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />“Detect” and “Protect” functions to deliver an impactful solution relative to the outcomes of the <br />Cybersecurity Framework. Specifically, ECS offers intrusion prevention and analysis services that help
The URL can be used to link to this page
Your browser does not support the video tag.