Capitol Words a project of the Sunlight Foundation

  • and

puerto rico

Occurrences over time

embed
  • Embed Dark
  • Embed Light
  1. '96
  2. '98
  3. '00
  4. '02
  5. '04
  6. '06
  7. '08
  8. '10
  9. '12
  10. '15

Mentioned most often by

Occurrences in the Congressional Record

Entry Title Date
Celebrating The 50Th Anniversary Of Head Start May 20, 2015
Jan Schakowsky, D-IL
"Since its inception, Head Start has served 32 million children in all 50 States, the District of Columbia, Puerto Rico, and the U.S. territories. Last year, in my home State of Illinois, there were 130 early Head Start and Head Start providers providing quality teachers."
The Approaching Medicaid Cliff In Puerto Rico May 13, 2015
Pedro Pierluisi, D-PR
"Mr. Speaker, earlier this week, I sent a letter to President Obama regarding an approaching problem that is unique to Puerto Rico and the other U.S. territories and that can be called the Medicaid funding cliff. This morning, I rise to advise my colleagues about this cliff, which each territory will reach by 2019 and which Puerto Rico could reach by 2018 or even 2017."
An Update On The Puerto Rico Statehood Admission Process Act April 22, 2015
Pedro Pierluisi, D-PR
"Mr. Speaker, for the sixth time this year, I rise to discuss Puerto Rico‘s political status."
Honoring The Life Of David Sanes Rodriguez April 22, 2015
Alan Grayson, D-FL
"Mr. Speaker, this past Sunday, April 19th, marked the anniversary of the death of David Sanes Rodriguez. He was a civilian security guard, employed by the U.S. Navy, who died 16 years ago when two errant bombs were dropped from a fighter jet near his observation post on Vieques, Puerto Rico."
Protecting Cyber Networks Act April 22, 2015
Chris Van Hollen, D-MD
"In this Act: (1) Agency.—The term “agency” has the meaning given the term in section 3502 of title 44, United States Code. (2) Appropriate federal entities.—The term “appropriate Federal entities” means the following: (A) The Department of Commerce. (B) The Department of Defense. (C) The Department of Energy. (D) The Department of Homeland Security. (E) The Department of Justice. (F) The Department of the Treasury. (G) The Office of the Director of National Intelligence. (3) Cybersecurity purpose.—The term “cybersecurity purpose” means the purpose of protecting (including through the use of a defensive measure) an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability or identifying the source of a cybersecurity threat. (4) Cybersecurity threat.— (A) In general.—Except as provided in subparagraph (B), the term “cybersecurity threat” means an action, not protected by the first amendment to the Constitution of the United States, on or through an information system that may result in an unauthorized effort to adversely impact the security, confidentiality, integrity, or availability of an information system or information that is stored on, processed by, or transiting an information system. (B) Exclusion.—The term “cybersecurity threat” does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement. (5) Cyber threat indicator.—The term “cyber threat indicator” means information or a physical object that is necessary to describe or identify— (A) malicious reconnaissance, including anomalous patterns of communications that appear to be transmitted for the purpose of gathering technical information related to a cybersecurity threat or security vulnerability; (B) a method of defeating a security control or exploitation of a security vulnerability; (C) a security vulnerability, including anomalous activity that appears to indicate the existence of a security vulnerability; (D) a method of causing a user with legitimate access to an information system or information that is stored on, processed by, or transiting an information system to unwittingly enable the defeat of a security control or exploitation of a security vulnerability; (E) malicious cyber command and control; (F) the actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat; or (G) any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law. (6) Defensive measure.—The term “defensive measure” means an action, device, procedure, technique, or other measure executed on an information system or information that is stored on, processed by, or transiting an information system that prevents or mitigates a known or suspected cybersecurity threat or security vulnerability. (7) Federal entity.—The term “Federal entity” means a department or agency of the United States or any component of such department or agency. (8) Information system.—The term “information system”— (A) has the meaning given the term in section 3502 of title 44, United States Code; and (B) includes industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers. (9) Local government.—The term “local government” means any borough, city, county, parish, town, township, village, or other political subdivision of a State. (10) Malicious cyber command and control.—The term “malicious cyber command and control” means a method for unauthorized remote identification of, access to, or use of, an information system or information that is stored on, processed by, or transiting an information system. (11) Malicious reconnaissance.—The term “malicious reconnaissance” means a method for actively probing or passively monitoring an information system for the purpose of discerning security vulnerabilities of the information system, if such method is associated with a known or suspected cybersecurity threat. (12) Monitor.—The term “monitor” means to acquire, identify, scan, or otherwise possess information that is stored on, processed by, or transiting an information system. (13) Non-federal entity.— (A) In general.—Except as otherwise provided in this paragraph, the term “non-Federal entity” means any private entity, non-Federal government department or agency, or State, tribal, or local government (including a political subdivision, department, officer, employee, or agent thereof). (B) Inclusions.—The term “non-Federal entity” includes a government department or agency (including an officer, employee, or agent thereof) of the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, the Northern Mariana Islands, and any other territory or possession of the United States. (C) Exclusion.—The term “non-Federal entity” does not include a foreign power or known agent of a foreign power, as both terms are defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). (14) Private entity.— (A) In general.—Except as otherwise provided in this paragraph, the term “private entity” means any person or private group, organization, proprietorship, partnership, trust, cooperative, corporation, or other commercial or nonprofit entity, including an officer, employee, or agent thereof. (B) Inclusion.—The term “private entity” includes a component of a State, tribal, or local government performing electric utility services. (C) Exclusion.—The term “private entity” does not include a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. "

Popularity by state

Popularity by party