Skip to main content

An Analysis of Cybersecurity Legislation and Policy Creation on the State Level

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track (NCS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1055))

Included in the following conference series:

Abstract

To best create an effective cybersecurity strategy, it is imperative to understand the policy discussions and trends on a federal and state level. Effective cybersecurity legislation is vital to maintaining our country’s infrastructure and protecting our citizenry. Since cybersecurity is often decided on the state level, states need to be aware of the trends in cybersecurity legislation. The purpose of this research was to conduct an analysis of cybersecurity policy from across the United States in an effort to assist the State-level understanding on their cybersecurity risk profile. This analysis included an examination of common trends in cybersecurity legislation. It involved researching cybersecurity policies from all 50 states and the federal government. After creating this baseline, the next phase of the research was to find and record relevant metadata for each policy. This data contained additional data, such as did it pass, who were the supporters, was it revised and other information that is useful to cybersecurity policy creators. The final goal of the research was to provide a searchable tool that could be utilized to fashion a successful cybersecurity bill and a summary of cybersecurity trends from 2011 to Spring 2018.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. National Governors Association: Meet the threat: a compact to improve State Cybersecurity (2017). https://www.in.gov/cybersecurity/files/NGA%20Cyber%20Compact.pdf

  2. Holcomb, E.J.: Exec. Order No. 17-11. Continuing the Indiana Executive Council on cybersecurity. State of Indiana Executive Department, 9 January 2017. https://www.in.gov/cybersecurity/3812.htm

  3. Lowry, C.: What’s in your mobile wallet? An analysis of trends in mobile payments and regulation. Fed. Commun. Law J. 68(2), 353–384 (2016). http://www.fclj.org/wp-content/uploads/2016/09/68.2.4-Carolyn-Lowry.pdf

    Google Scholar 

  4. Sales, N.A.: Regulating cyber-security. Northwest. Univ. Law Rev. 107(4), 1503–1568 (2013)

    Google Scholar 

  5. Clarke, R.: War from cyberspace. Natl. Interest 104, 31–36 (2009). https://nationalinterest.org/article/war-from-cyberspace-3278

    Google Scholar 

  6. Glennon, M.J.: State-level cybersecurity. Policy Rev. 171, 85–102 (2012)

    Google Scholar 

  7. Bosch, C.: Securing the smart grid: protecting national security and privacy through mandatory, enforceable interoperability standards. Fordham Urban Law J. 41(4), 1349–1406 (2014)

    Google Scholar 

  8. Schneider, F.: Impediments with policy interventions to foster cybersecurity. Commun. ACM 61(3), 36–38 (2018)

    Article  Google Scholar 

  9. Godara, S.: Role of ‘intermediaries’ in the cyber world: a comparative study of the legislative policies & recent judicial trends. VIDHIGYA J. Legal Aware. 8(1), 69–80 (2013)

    Google Scholar 

  10. Bulger, M., Burton, P., O’Neill, B., Staksrud, E.: Where policy and practice collide: comparing United States, South African and European Union approaches to protecting children online. New Media Soc. 19(5), 750–764 (2017)

    Article  Google Scholar 

  11. State of Cybersecurity, Airtable: https://airtable.com/shrCcYzKJGH1jyvrx

  12. Brown Jr., E.G.: Exec. Order No. B-34-15. Establishing the California Cybersecurity Integration Center, CA.Gov (2015). https://www.calhospitalprepare.org/sites/main/files/file-attachments/b-34-15_cal-csic.pdf

  13. Brown Jr., E.G.: Governor’s Veto Message, California Legislative Information, 11 October 2017. https://leginfo.legislature.ca.gov/faces/billStatusClient.xhtml?bill_id=201720180AB1306

  14. Brown Jr., E.G.: Governor’s Veto Message, California Legislative Information, 14 October 2017. http://leginfo.legislature.ca.gov/faces/billStatusClient.xhtml?billid=201720180AB531

  15. Martinez, S.: House Executive Message No. 57, New Mexico Secretary of State, 7 April 2017. https://static.votesmart.org/static/vetotext/61925.pdf

  16. Ducey, D.A.: Re:Senate Bill 1434, Office of the Governor, May 18, 2016. https://azgovernor.gov/sites/default/files/sb_1434_veto_letter.pdf

  17. Ducey, D.A.: RE: House Bill 2566, Arizona State Legislature, 9 April 2015. https://www.azleg.gov/govlettr/52leg/1R/HB2566.pdf

Download references

Acknowledgement

We would like to thank the State of Indiana and INSuRE Program for their support and valuable inputs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tania Williams .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alexander, A., Graham, P., Jackson, E., Johnson, B., Williams, T., Park, J. (2020). An Analysis of Cybersecurity Legislation and Policy Creation on the State Level. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_3

Download citation

Publish with us

Policies and ethics