My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 36 - Resolution, Agreement, and Appropriation Adjustment Accepting the FY 2023 Emergency Management Performance Grant
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2024
>
08/20/2024
>
Item 36 - Resolution, Agreement, and Appropriation Adjustment Accepting the FY 2023 Emergency Management Performance Grant
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
9/20/2024 10:49:20 AM
Creation date
8/21/2024 12:19:23 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Police
Item #
36
Date
8/20/2024
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
317
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Acquisition and Use of Technology to Mitigate UAS (Counter-UAS) <br />In August 2020, FEMA was alerted you of an advisory guidance document issued by DHS, the <br />Department of Justice, the Federal Aviation Administration, and the Federal Communications <br />Commission: https://www.dhs.gov/publication/interagency-legal-advisory-uas-detection-and-miti atg ion - <br />technologies. The purpose of the advisory guidance document is to help non-federal public and private <br />entities better understand the federal laws and regulations that may apply to the use of capabilities to <br />detect and mitigate threats posed by UAS operations (i.e., Counter-UAS or C-UAS). <br />The Departments and Agencies issuing the advisory guidance document, and FEMA, do not have the <br />authority to approve non-federal public or private use of UAS detection or mitigation capabilities, nor do <br />they conduct legal reviews of commercially available product compliance with those laws. The advisory <br />does not address state and local laws nor potential civil liability, which UAS detection and mitigation <br />capabilities may also implicate. <br />It is strongly recommended that, prior to the testing, acquisition, installation, or use of UAS detection <br />and/or mitigation systems, entities seek the advice of counsel experienced with both federal and state <br />criminal, surveillance, and communications laws. Entities should conduct their own legal and technical <br />analysis of each UAS detection and/or mitigation system and should not rely solely on vendors' <br />representations of the systems' legality or functionality. Please also see the DHS press release on this <br />topic for further information: https://www.dhs.gov/news/2020/08/17/interagency-issues-advisory-use- <br />technology-detect-and-mitigate-unmanned-aircraft. <br />Cybersecurity Projects <br />IPR funds may be used for projects that enhance the cybersecurity of: <br />• Access controls, sensors; security cameras, badge/ID readers, ICS/SCADA systems, process <br />monitors and controls (such as firewalls, network segmentation, predictive security cloud, etc.); <br />and <br />• Passenger/vehicle/cargo security screening equipment (cybersecurity assessments are allowable). <br />When requesting funds for cybersecurity, applicants are encouraged to propose projects that would aid in <br />implementation of all or part of the Framework for Improving Critical Infrastructure Cybersecurity (the <br />"Fr amewor k" ) , d e v e 1 o p e d by t he Nat i o.ThaHramdwnrk t i t ut <br />gathers existing international standards and practices to help organizations understand, communicate, and <br />manage their cyber risks. For organizations that do not know where to start with developing a <br />cybersecurity program, the Framework provides initial guidance. For organizations with more advanced <br />practices, the Framework offers ways to improve their programs, such as through better communication <br />with their leadership and suppliers about management of cyber risks. <br />T h e C y b e r s e c u r i t y a n d I fi I8A) rarilidal AnfrasWuctum QybelSCbrnmmnit} t y A g <br />C3 Voluntary Program also provides resources to critical infrastructure owners and operators to assist in <br />adoption of the Framework and managing cyber risks. Additional information on the Critical <br />Infrastructure Cyber Community C3 Voluntary Program can be found at www.cisa.gov/ccubedvp. <br />DHS ' s E n h a n c e d Cy b e r s e c u r i t y S e r v i c e s ( E C S) p r o g <br />protecting U.S.-based public and private entities and combines key elements of capabilities under the <br />" De t ercdt '°` Pa o f e c t" f u n c t i o n s t o d e l i v e r a n i mp a c t f <br />Framework. Specifically, ECS offers intrusion prevention and analysis services that help U.S.-based <br />companies and SLTT governments defend their computer systems against unauthorized access, <br />exploitation, and data exfrltration. ECS works by sourcing timely, actionable cyber threat indicators from <br />���Nos��. e <br />��� <br />FEMA IPR Appendix 12023 Page F-8 <br />
The URL can be used to link to this page
Your browser does not support the video tag.