Ifill plus, from hippie to corporate c. E. O. The head of Aetna Insurance on the payoff for a nontraditional approach to leadership, reducing the bottom line. I came to work one day, and i said, you know what . I think we should do meditation and yoga at work. And everyone went, uhhh you know . The eye roll, right . And its because the c. E. O. Does yoga and meditation, weve all got to do yoga and meditation. Woodruff those are some of the stories were covering on tonights pbs newshour. Major funding for the pbs newshour has been provided by lincoln financial committed to helping you take charge of your life and become youre own chief life officer. Supported by the john d. And catherine t. Macarthur foundation. Committed to building a more just, verdant and peaceful world. More information at macfound. Org and by the alfred p. Sloan foundation. Supporting science, technology and improved Economic Performance and Financial Literacy in the 21st century. And with the ongoing support of th
The head of Aetna Insurance on the payoff for a nontraditional approach to leadership, reducing the bottom line. I came to work one day, and i said, you know what . I think we should do meditation and yoga at work. And everyone went, uhhh you know . The eye roll, right . And its because the c. E. O. Does yoga and meditation, weve all got to do yoga and meditation. Woodruff those are some of the stories were covering on tonights pbs newshour. Major funding for the pbs newshour has been provided by lincoln financial committed to helping you take charge of your life and become youre own chief life officer. Supported by the john d. And catherine t. Macarthur foundation. Committed to building a more just, verdant and peaceful world. More information at macfound. Org and by the alfred p. Sloan foundation. Supporting science, technology and improved Economic Performance and Financial Literacy in the 21st century. And with the ongoing support of these institutions and. This program was made po
Gdancin each peonife wherves inthis room. G th theisdom to takup theutie today. Jam sf a mike widom,e fve w prayfo wiom in t tmentnd mey r judgment. Wihoutwe canthing, y c things. Maye n behtened by e probhat ro us as nation buve tnk that yo with i ts hour. Mayouwordbe a lam unto our feetnd lit un our i n our sviors name. The eaker pursuant to cl 1 oruthe jonalnds ro pledgece will ld by the gentl frnew hashire,r. Uinta. R. Uint ileallegi to tlag of t unitestates endthe republic rhi ids, one nati r isle libti f t speak without cti the gentlemn from sth rolina,vaney nized for on mine. Mr. Mney is withreat onor and prilege introce toheouse verend tom tucke who is aastort sisc memori st chuar my. Hid hwas called mistrwhenwas 18 an fout thatilheas 3 he presintf thouth carolina ptis stors con coeren hes featureevoal votnal spear r th blly grah e ofhom, ystal marr to d r, themy gorireid ribfrom wisin. Eapro tempore the chair witeaio 15 rther ruests for onete speees on ea side ofhe aisle foros
Accounts were hacked. This is snapchat which is an account that allows data to come in and disappear. They were hacked. Our privacy is under attack. The problem today, there is virtually zero relationship between private industry and government. Private industry which has 85 of the networks and government has 15 of the networks but has vast resources that could help protect individuals against attacks. Our government has a duty, a responsibility to protect the American People. And thats what this bill seeks to do. It does it in a number of ways. First and foremost, this is a voluntary program thats being created. No business is required to turn over their breach or hack information to the government. Instead there is a format, a procedure, that is now in place that will incentivize them to work with the government to identify in a way that strips out through a number of protections personal identifiable information. The first way it is stripped out when the business that has been hacke
It only authorizes the sharing of cyber threat indicators, tech of Technical Information like malware signatures and malicious code. Companies must remove all personal information. If those acquirements are not followed, there is no Liability Protection. An agency that receives the information must scrub it a second time. This will ensure that personal information is removed. Only then can that information be forwarded. It provides for strong oversight by requiring a biannual Inspector General report related to dissemination of cyber threat indicators. The privacy and Civil Liberties Oversight Board must also submit a biannual report on the privacy and Civil Liberties impact of the bill. The scope of Cyber Attacks cannot be ignored. This bill will strengthen our defenses so consumers and businesses will not be at the mercy of cyber criminals. I look forward to passing this legislation. The chair the gentleman reserves the balance of his time. I rise in support of hr 1560, the protectin