Homeland Security Committee, Homeland Security and Governmental Affairs Committee, Cybersecurity and Infrastructure Protection Subcommittee
Introduced
In Committee
On Floor
Passed Chamber
Enacted
DHS Roles and Responsibilities in Cyber Space Act This bill requires the Department of Homeland Security (DHS) to report on its roles and responsibilities, as well as those of its components, for responding to cyber incidents. DHS must coordinate with the Cybersecurity and Infrastructure Security Agency on the report.
Get AI-generated questions to help you understand this bill better
Timeline
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Ordered to be Reported (Amended) by Voice Vote.
Committee Consideration and Mark-up Session Held.
Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation Discharged.
Placed on the Union Calendar, Calendar No. 175.
Reported (Amended) by the Committee on Homeland Security. H. Rept. 117-245.
Mr. Malinowski moved to suspend the rules and pass the bill, as amended.
Considered under suspension of the rules. (consideration: CR H4989-4990)
DEBATE - The House proceeded with forty minutes of debate on H.R. 5658.
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Considered as unfinished business. (consideration: CR H5004-5005)
On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 313 - 105 (Roll no. 185). (text: CR H4989-4990)
Motion to reconsider laid on the table Agreed to without objection.
Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs.
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Ordered to be Reported (Amended) by Voice Vote.
Committee Consideration and Mark-up Session Held.
Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation Discharged.
Placed on the Union Calendar, Calendar No. 175.
Reported (Amended) by the Committee on Homeland Security. H. Rept. 117-245.
Mr. Malinowski moved to suspend the rules and pass the bill, as amended.
Considered under suspension of the rules. (consideration: CR H4989-4990)
DEBATE - The House proceeded with forty minutes of debate on H.R. 5658.
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Considered as unfinished business. (consideration: CR H5004-5005)
On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 313 - 105 (Roll no. 185). (text: CR H4989-4990)
Computer security and identity theftCongressional oversightDepartment of Homeland SecurityExecutive agency funding and structurePublic-private cooperation
DHS Roles and Responsibilities in Cyber Space Act
USA117th CongressHR-5658| House
| Updated: 5/17/2022
DHS Roles and Responsibilities in Cyber Space Act This bill requires the Department of Homeland Security (DHS) to report on its roles and responsibilities, as well as those of its components, for responding to cyber incidents. DHS must coordinate with the Cybersecurity and Infrastructure Security Agency on the report.
Get AI-generated questions to help you understand this bill better
Timeline
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Ordered to be Reported (Amended) by Voice Vote.
Committee Consideration and Mark-up Session Held.
Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation Discharged.
Placed on the Union Calendar, Calendar No. 175.
Reported (Amended) by the Committee on Homeland Security. H. Rept. 117-245.
Mr. Malinowski moved to suspend the rules and pass the bill, as amended.
Considered under suspension of the rules. (consideration: CR H4989-4990)
DEBATE - The House proceeded with forty minutes of debate on H.R. 5658.
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Considered as unfinished business. (consideration: CR H5004-5005)
On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 313 - 105 (Roll no. 185). (text: CR H4989-4990)
Motion to reconsider laid on the table Agreed to without objection.
Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs.
Introduced in House
Referred to the House Committee on Homeland Security.
Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation.
Ordered to be Reported (Amended) by Voice Vote.
Committee Consideration and Mark-up Session Held.
Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation Discharged.
Placed on the Union Calendar, Calendar No. 175.
Reported (Amended) by the Committee on Homeland Security. H. Rept. 117-245.
Mr. Malinowski moved to suspend the rules and pass the bill, as amended.
Considered under suspension of the rules. (consideration: CR H4989-4990)
DEBATE - The House proceeded with forty minutes of debate on H.R. 5658.
At the conclusion of debate, the Yeas and Nays were demanded and ordered. Pursuant to the provisions of clause 8, rule XX, the Chair announced that further proceedings on the motion would be postponed.
Considered as unfinished business. (consideration: CR H5004-5005)
On motion to suspend the rules and pass the bill, as amended Agreed to by the Yeas and Nays: (2/3 required): 313 - 105 (Roll no. 185). (text: CR H4989-4990)
Computer security and identity theftCongressional oversightDepartment of Homeland SecurityExecutive agency funding and structurePublic-private cooperation