U.S. House to toughen internal cybersecurity policy

Share this article:

Congressional leaders on Tuesday accepted five new cybersecurity policy recommendations aimed at protecting sensitive information belonging to the U.S. House and securing its IT systems from attack.

The proposed changes were crafted by Daniel Beard, the House's chief administrative officer, who was asked by Speaker Nancy Pelosi and Minority Leader John Boehner to conduct an assessment of the lower chamber's information security policies.

The new guidelines, set to take effect next year, require all House staff and members to undergo an annual cybersecurity training program, according to a letter from Beard to his House colleagues. Employees who travel out of the country will be required to have their wireless devices and laptops screened for malware prior to departing and upon returning.

In addition, the rules dictate that any sensitive information be encrypted when stored on mobile devices, and properly protected when being transmitted across a public network. Mobile devices, such as iPhones and BlackBerries, also must be password protected and locked when not in use.

The new policy additionally calls for the House to deploy additional firewall protocols.

Leaders called on Beard to oversee the review after a now-fired junior staffer for the House Standards Committee leaked confidential information on a peer-to-peer network, a spokesman for the Office of the Chief Administrative Officer told SCMagazineUS.com on Wednesday. The document that the staffer leaked contained information into the ethics probes of a number of Congressional members and their aides.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Reported breaches involving zero-day bug at JPMorgan Chase, ...

Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.

Data on 97K Bugzilla users posted online for about three months

During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.

Chinese national had access to data on 5M Arizona drivers, possible breach ...

Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.