HOMELAND SECURITY ACT OF 2002 Mr. ARMEY. Mr. Speaker, pursuant to House Resolution 600, I call up the bill (H.R. 5710) to establish the Department of Homeland Security, and for other purposes, and ask for its immediate consideration. The Clerk read the title of the bill. The text of H.R. 5710 is as follows: H.R. 5710 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) Short Title.--This Act may be cited as the "Homeland Security Act of 2002". (b) Table of Contents.--The table of contents for this Act is as follows: [...] TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION Subtitle A--Directorate for Information Analysis and Infrastructure Protection; Access to Information Sec. 201. Directorate for Information Analysis and Infrastructure Protection. Sec. 202. Access to information. Subtitle B--Critical Infrastructure Information Sec. 211. Short title. Sec. 212. Definitions. Sec. 213. Designation of critical infrastructure protection program. Sec. 214. Protection of voluntarily shared critical infrastructure information. Sec. 215. No private right of action. Subtitle C--Information Security Sec. 221. Procedures for sharing information. Sec. 222. Privacy Officer. Sec. 223. Enhancement of non-Federal cybersecurity. Sec. 224. Net guard. Sec. 225. Cyber Security Enhancement Act of 2002. [...] TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY Sec. 301. Under Secretary for Science and Technology. Sec. 302. Responsibilities and authorities of the Under Secretary for Science and Technology. Sec. 303. Functions transferred. Sec. 304. Conduct of certain public health-related activities. Sec. 305. Federally funded research and development centers. Sec. 306. Miscellaneous provisions. Sec. 307. Homeland Security Advanced Research Projects Agency. Sec. 308. Conduct of research, development, demonstration, testing and evaluation. Sec. 309. Utilization of Department of Energy national laboratories and sites in support of homeland security activities. Sec. 310. Transfer of Plum Island Animal Disease Center, Department of Agriculture. Sec. 311. Homeland Security Science and Technology Advisory Committee. Sec. 312. Homeland Security Institute. Sec. 313. Technology clearinghouse to encourage and support innovative solutions to enhance homeland security. TITLE VIII--COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL; UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS [...] Sec. 880. Prohibition of the Terrorism Information and Prevention System. [...] Sec. 886. Sense of Congress reaffirming the continued importance and applicability of the Posse Comitatus Act. [...] Subtitle I--Information Sharing Sec. 891. Short title; findings; and sense of Congress. Sec. 892. Facilitating homeland security information sharing procedures. Sec. 893. Report. Sec. 894. Authorization of appropriations. Sec. 895. Authority to share grand jury information. Sec. 896. Authority to share electronic, wire, and oral interception information. Sec. 897. Foreign intelligence information. Sec. 898. Information acquired from an electronic surveillance. Sec. 899. Information acquired from a physical search. [...] TITLE X--INFORMATION SECURITY Sec. 1001. Information security. Sec. 1002. Management of information technology. Sec. 1003. National Institute of Standards and Technology. Sec. 1004. Information Security and Privacy Advisory Board. Sec. 1005. Technical and conforming amendments. Sec. 1006. Construction. [...] TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION Subtitle A--Directorate for Information Analysis and Infrastructure Protection; Access to Information SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION. (a) Under Secretary of Homeland Security for Information Analysis and Infrastructure Protection.-- (1) In general.--There shall be in the Department a Directorate for Information Analysis and Infrastructure Protection headed by an Under Secretary for Information Analysis and Infrastructure Protection, who shall be appointed by the President, by and with the advice and consent of the Senate. (2) Responsibilities.--The Under Secretary shall assist the Secretary in discharging the responsibilities assigned by the Secretary. (b) Assistant Secretary for Information Analysis; Assistant Secretary for Infrastructure Protection.-- (1) Assistant secretary for information analysis.--There shall be in the Department an Assistant Secretary for Information Analysis, who shall be appointed by the President. (2) Assistant secretary for infrastructure protection.-- There shall be in the Department an Assistant Secretary for Infrastructure Protection, who shall be appointed by the President. (3) Responsibilities.--The Assistant Secretary for Information Analysis and the Assistant Secretary for Infrastructure Protection shall assist the Under Secretary for Information Analysis and Infrastructure Protection in discharging the responsibilities of the Under Secretary under this section. (c) Discharge of Information Analysis and Infrastructure Protection.--The Secretary shall ensure that the responsibilities of the Department regarding information analysis and infrastructure protection are carried out through the Under Secretary for Information Analysis and Infrastructure Protection. (d) Responsibilities of Under Secretary.--Subject to the direction and control of the Secretary, the responsibilities of the Under Secretary for Information Analysis and Infrastructure Protection shall be as follows: (1) To access, receive, and analyze law enforcement information, intelligence information, and other information from agencies of the Federal Government, State and local government agencies (including law enforcement agencies), and private sector entities, and to integrate such information in order to-- (A) identify and assess the nature and scope of terrorist threats to the homeland; (B) detect and identify threats of terrorism against the United States; and (C) understand such threats in light of actual and potential vulnerabilities of the homeland. (2) To carry out comprehensive assessments of the vulnerabilities of the key resources and critical infrastructure of the United States, including the performance of risk assessments to determine the risks posed by particular types of terrorist attacks [[Page H8651]] within the United States (including an assessment of the probability of success of such attacks and the feasibility and potential efficacy of various countermeasures to such attacks). (3) To integrate relevant information, analyses, and vulnerability assessments (whether such information, analyses, or assessments are provided or produced by the Department or others) in order to identify priorities for protective and support measures by the Department, other agencies of the Federal Government, State and local government agencies and authorities, the private sector, and other entities. (4) To ensure, pursuant to section 202, the timely and efficient access by the Department to all information necessary to discharge the responsibilities under this section, including obtaining such information from other agencies of the Federal Government. (5) To develop a comprehensive national plan for securing the key resources and critical infrastructure of the United States, including power production, generation, and distribution systems, information technology and telecommunications systems (including satellites), electronic financial and property record storage and transmission systems, emergency preparedness communications systems, and the physical and technological assets that support such systems. (6) To recommend measures necessary to protect the key resources and critical infrastructure of the United States in coordination with other agencies of the Federal Government and in cooperation with State and local government agencies and authorities, the private sector, and other entities. (7) To administer the Homeland Security Advisory System, including-- (A) exercising primary responsibility for public advisories related to threats to homeland security; and (B) in coordination with other agencies of the Federal Government, providing specific warning information, and advice about appropriate protective measures and countermeasures, to State and local government agencies and authorities, the private sector, other entities, and the public. (8) To review, analyze, and make recommendations for improvements in the policies and procedures governing the sharing of law enforcement information, intelligence information, intelligence-related information, and other information relating to homeland security within the Federal Government and between the Federal Government and State and local government agencies and authorities. (9) To disseminate, as appropriate, information analyzed by the Department within the Department, to other agencies of the Federal Government with responsibilities relating to homeland security, and to agencies of State and local governments and private sector entities with such responsibilities in order to assist in the deterrence, prevention, preemption of, or response to, terrorist attacks against the United States. (10) To consult with the Director of Central Intelligence and other appropriate intelligence, law enforcement, or other elements of the Federal Government to establish collection priorities and strategies for information, including law enforcement-related information, relating to threats of terrorism against the United States through such means as the representation of the Department in discussions regarding requirements and priorities in the collection of such information. (11) To consult with State and local governments and private sector entities to ensure appropriate exchanges of information, including law enforcement-related information, relating to threats of terrorism against the United States. (12) To ensure that-- (A) any material received pursuant to this Act is protected from unauthorized disclosure and handled and used only for the performance of official duties; and (B) any intelligence information under this Act is shared, retained, and disseminated consistent with the authority of the Director of Central Intelligence to protect intelligence sources and methods under the National Security Act of 1947 (50 U.S.C. 401 et seq.) and related procedures and, as appropriate, similar authorities of the Attorney General concerning sensitive law enforcement information. (13) To request additional information from other agencies of the Federal Government, State and local government agencies, and the private sector relating to threats of terrorism in the United States, or relating to other areas of responsibility assigned by the Secretary, including the entry into cooperative agreements through the Secretary to obtain such information. (14) To establish and utilize, in conjunction with the chief information officer of the Department, a secure communications and information technology infrastructure, including data-mining and other advanced analytical tools, in order to access, receive, and analyze data and information in furtherance of the responsibilities under this section, and to disseminate information acquired and analyzed by the Department, as appropriate. (15) To ensure, in conjunction with the chief information officer of the Department, that any information databases and analytical tools developed or utilized by the Department-- (A) are compatible with one another and with relevant information databases of other agencies of the Federal Government; and (B) treat information in such databases in a manner that complies with applicable Federal law on privacy. (16) To coordinate training and other support to the elements and personnel of the Department, other agencies of the Federal Government, and State and local governments that provide information to the Department, or are consumers of information provided by the Department, in order to facilitate the identification and sharing of information revealed in their ordinary duties and the optimal utilization of information received from the Department. (17) To coordinate with elements of the intelligence community and with Federal, State, and local law enforcement agencies, and the private sector, as appropriate. (18) To provide intelligence and information analysis and support to other elements of the Department. (19) To perform such other duties relating to such responsibilities as the Secretary may provide. (e) Staff.-- (1) In general.--The Secretary shall provide the Directorate with a staff of analysts having appropriate expertise and experience to assist the Directorate in discharging responsibilities under this section. (2) Private sector analysts.--Analysts under this subsection may include analysts from the private sector. (3) Security clearances.--Analysts under this subsection shall possess security clearances appropriate for their work under this section. (f) Detail of Personnel.-- (1) In general.--In order to assist the Directorate in discharging responsibilities under this section, personnel of the agencies referred to in paragraph (2) may be detailed to the Department for the performance of analytic functions and related duties. (2) Covered agencies.--The agencies referred to in this paragraph are as follows: (A) The Department of State. (B) The Central Intelligence Agency. (C) The Federal Bureau of Investigation. (D) The National Security Agency. (E) The National Imagery and Mapping Agency. (F) The Defense Intelligence Agency. (G) Any other agency of the Federal Government that the President considers appropriate. (3) Cooperative agreements.--The Secretary and the head of the agency concerned may enter into cooperative agreements for the purpose of detailing personnel under this subsection. (4) Basis.--The detail of personnel under this subsection may be on a reimbursable or non-reimbursable basis. (g) Functions Transferred.--In accordance with title XV, there shall be transferred to the Secretary, for assignment to the Under Secretary for Information Analysis and Infrastructure Protection under this section, the functions, personnel, assets, and liabilities of the following: (1) The National Infrastructure Protection Center of the Federal Bureau of Investigation (other than the Computer Investigations and Operations Section), including the functions of the Attorney General relating thereto. (2) The National Communications System of the Department of Defense, including the functions of the Secretary of Defense relating thereto. (3) The Critical Infrastructure Assurance Office of the Department of Commerce, including the functions of the Secretary of Commerce relating thereto. (4) The National Infrastructure Simulation and Analysis Center of the Department of Energy and the energy security and assurance program and activities of the Department, including the functions of the Secretary of Energy relating thereto. (5) The Federal Computer Incident Response Center of the General Services Administration, including the functions of the Administrator of General Services relating thereto. (h) Inclusion of Certain Elements of the Department as Elements of the Intelligence Community.--Section 3(4) of the National Security Act of 1947 (50 U.S.C. 401(a)) is amended-- (1) by striking "and" at the end of subparagraph (I); (2) by redesignating subparagraph (J) as subparagraph (K); and (3) by inserting after subparagraph (I) the following new subparagraph: "(J) the elements of the Department of Homeland Security concerned with the analyses of foreign intelligence information; and". SEC. 202. ACCESS TO INFORMATION. (a) In General.-- (1) Threat and vulnerability information.--Except as otherwise directed by the President, the Secretary shall have such access as the Secretary considers necessary to all information, including reports, assessments, analyses, and unevaluated intelligence relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary, and to all information concerning infrastructure or other vulnerabilities of the United States to terrorism, whether or not such information has been analyzed, that may be collected, possessed, or prepared by any agency of the Federal Government. (2) Other information.--The Secretary shall also have access to other information [[Page H8652]] relating to matters under the responsibility of the Secretary that may be collected, possessed, or prepared by an agency of the Federal Government as the President may further provide. (b) Manner of Access.--Except as otherwise directed by the President, with respect to information to which the Secretary has access pursuant to this section-- (1) the Secretary may obtain such material upon request, and may enter into cooperative arrangements with other executive agencies to provide such material or provide Department officials with access to it on a regular or routine basis, including requests or arrangements involving broad categories of material, access to electronic databases, or both; and (2) regardless of whether the Secretary has made any request or entered into any cooperative arrangement pursuant to paragraph (1), all agencies of the Federal Government shall promptly provide to the Secretary-- (A) all reports (including information reports containing intelligence which has not been fully evaluated), assessments, and analytical information relating to threats of terrorism against the United States and to other areas of responsibility assigned by the Secretary; (B) all information concerning the vulnerability of the infrastructure of the United States, or other vulnerabilities of the United States, to terrorism, whether or not such information has been analyzed; (C) all other information relating to significant and credible threats of terrorism against the United States, whether or not such information has been analyzed; and (D) such other information or material as the President may direct. (c) Treatment Under Certain Laws.--The Secretary shall be deemed to be a Federal law enforcement, intelligence, protective, national defense, immigration, or national security official, and shall be provided with all information from law enforcement agencies that is required to be given to the Director of Central Intelligence, under any provision of the following: (1) The USA PATRIOT Act of 2001 (Public Law 107-56). (2) Section 2517(6) of title 18, United States Code. (3) Rule 6(e)(3)(C) of the Federal Rules of Criminal Procedure. (d) Access to Intelligence and Other Information.-- (1) Access by elements of federal government.--Nothing in this title shall preclude any element of the intelligence community (as that term is defined in section 3(4) of the National Security Act of 1947 (50 U.S.C. 401a(4)), or other any element of the Federal Government with responsibility for analyzing terrorist threat information, from receiving any intelligence or other information relating to terrorism. (2) Sharing of information.--The Secretary, in consultation with the Director of Central Intelligence, shall work to ensure that intelligence or other information relating to terrorism to which the Department has access is appropriately shared with the elements of the Federal Government referred to in paragraph (1), as well as with State and local governments, as appropriate. Subtitle B--Critical Infrastructure Information SEC. 211. SHORT TITLE. This subtitle may be cited as the "Critical Infrastructure Information Act of 2002". SEC. 212. DEFINITIONS. In this subtitle: (1) Agency.--The term "agency" has the meaning given it in section 551 of title 5, United States Code. (2) Covered federal agency.--The term "covered Federal agency" means the Department of Homeland Security. (3) Critical infrastructure information.--The term "critical infrastructure information" means information not customarily in the public domain and related to the security of critical infrastructure or protected systems-- (A) actual, potential, or threatened interference with, attack on, compromise of, or incapacitation of critical infrastructure or protected systems by either physical or computer-based attack or other similar conduct (including the misuse of or unauthorized access to all types of communications and data transmission systems) that violates Federal, State, or local law, harms interstate commerce of the United States, or threatens public health or safety; (B) the ability of any critical infrastructure or protected system to resist such interference, compromise, or incapacitation, including any planned or past assessment, projection, or estimate of the vulnerability of critical infrastructure or a protected system, including security testing, risk evaluation thereto, risk management planning, or risk audit; or (C) any planned or past operational problem or solution regarding critical infrastructure or protected systems, including repair, recovery, reconstruction, insurance, or continuity, to the extent it is related to such interference, compromise, or incapacitation. (4) Critical infrastructure protection program.--The term "critical infrastructure protection program" means any component or bureau of a covered Federal agency that has been designated by the President or any agency head to receive critical infrastructure information. (5) Information sharing and analysis organization.--The term "Information Sharing and Analysis Organization" means any formal or informal entity or collaboration created or employed by public or private sector organizations, for purposes of-- (A) gathering and analyzing critical infrastructure information in order to better understand security problems and interdependencies related to critical infrastructure and protected systems, so as to ensure the availability, integrity, and reliability thereof; (B) communicating or disclosing critical infrastructure information to help prevent, detect, mitigate, or recover from the effects of a interference, compromise, or a incapacitation problem related to critical infrastructure or protected systems; and (C) voluntarily disseminating critical infrastructure information to its members, State, local, and Federal Governments, or any other entities that may be of assistance in carrying out the purposes specified in subparagraphs (A) and (B). (6) Protected system.--The term "protected system"-- (A) means any service, physical or computer-based system, process, or procedure that directly or indirectly affects the viability of a facility of critical infrastructure; and (B) includes any physical or computer-based system, including a computer, computer system, computer or communications network, or any component hardware or element thereof, software program, processing instructions, or information or data in transmission or storage therein, irrespective of the medium of transmission or storage. (7) Voluntary.-- (A) In general.--The term "voluntary", in the case of any submittal of critical infrastructure information to a covered Federal agency, means the submittal thereof in the absence of such agency's exercise of legal authority to compel access to or submission of such information and may be accomplished by a single entity or an Information Sharing and Analysis Organization on behalf of itself or its members. (B) Exclusions.--The term "voluntary"-- (i) in the case of any action brought under the securities laws as is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47))-- (I) does not include information or statements contained in any documents or materials filed with the Securities and Exchange Commission, or with Federal banking regulators, pursuant to section 12(i) of the Securities Exchange Act of 1934 (15 U.S.C. 781(I)); and (II) with respect to the submittal of critical infrastructure information, does not include any disclosure or writing that when made accompanied the solicitation of an offer or a sale of securities; and (ii) does not include information or statements submitted or relied upon as a basis for making licensing or permitting determinations, or during regulatory proceedings. SEC. 213. DESIGNATION OF CRITICAL INFRASTRUCTURE PROTECTION PROGRAM. A critical infrastructure protection program may be designated as such by one of the following: (1) The President. (2) The Secretary of Homeland Security. SEC. 214. PROTECTION OF VOLUNTARILY SHARED CRITICAL INFRASTRUCTURE INFORMATION. (a) Protection.-- (1) In general.--Notwithstanding any other provision of law, critical infrastructure information (including the identity of the submitting person or entity) that is voluntarily submitted to a covered Federal agency for use by that agency regarding the security of critical infrastructure and protected systems, analysis, warning, interdependency study, recovery, reconstitution, or other informational purpose, when accompanied by an express statement specified in paragraph (2)-- (A) shall be exempt from disclosure under section 552 of title 5, United States Code (commonly referred to as the Freedom of Information Act); (B) shall not be subject to any agency rules or judicial doctrine regarding ex parte communications with a decision making official; (C) shall not, without the written consent of the person or entity submitting such information, be used directly by such agency, any other Federal, State, or local authority, or any third party, in any civil action arising under Federal or State law if such information is submitted in good faith; (D) shall not, without the written consent of the person or entity submitting such information, be used or disclosed by any officer or employee of the United States for purposes other than the purposes of this subtitle, except-- (i) in furtherance of an investigation or the prosecution of a criminal act; or (ii) when disclosure of the information would be-- (I) to either House of Congress, or to the extent of matter within its jurisdiction, any committee or subcommittee thereof, any joint committee thereof or subcommittee of any such joint committee; or (II) to the Comptroller General, or any authorized representative of the Comptroller General, in the course of the performance of the duties of the General Accounting Office. (E) shall not, if provided to a State or local government or government agency-- (i) be made available pursuant to any State or local law requiring disclosure of information or records; [[Page H8653]] (ii) otherwise be disclosed or distributed to any party by said State or local government or government agency without the written consent of the person or entity submitting such information; or (iii) be used other than for the purpose of protecting critical infrastructure or protected systems, or in furtherance of an investigation or the prosecution of a criminal act; and (F) does not constitute a waiver of any applicable privilege or protection provided under law, such as trade secret protection. (2) Express statement.--For purposes of paragraph (1), the term "express statement", with respect to information or records, means-- (A) in the case of written information or records, a written marking on the information or records substantially similar to the following: "This information is voluntarily submitted to the Federal Government in expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure Information Act of 2002."; or (B) in the case of oral information, a similar written statement submitted within a reasonable period following the oral communication. (b) Limitation.--No communication of critical infrastructure information to a covered Federal agency made pursuant to this subtitle shall be considered to be an action subject to the requirements of the Federal Advisory Committee Act (5 U.S.C. App. 2). (c) Independently Obtained Information.--Nothing in this section shall be construed to limit or otherwise affect the ability of a State, local, or Federal Government entity, agency, or authority, or any third party, under applicable law, to obtain critical infrastructure information in a manner not covered by subsection (a), including any information lawfully and properly disclosed generally or broadly to the public and to use such information in any manner permitted by law. (d) Treatment of Voluntary Submittal of Information.--The voluntary submittal to the Government of information or records that are protected from disclosure by this subtitle shall not be construed to constitute compliance with any requirement to submit such information to a Federal agency under any other provision of law. (e) Procedures.-- (1) In general.--The Secretary of the Department of Homeland Security shall, in consultation with appropriate representatives of the National Security Council and the Office of Science and Technology Policy, establish uniform procedures for the receipt, care, and storage by Federal agencies of critical infrastructure information that is voluntarily submitted to the Government. The procedures shall be established not later than 90 days after the date of the enactment of this subtitle. (2) Elements.--The procedures established under paragraph (1) shall include mechanisms regarding-- (A) the acknowledgement of receipt by Federal agencies of critical infrastructure information that is voluntarily submitted to the Government; (B) the maintenance of the identification of such information as voluntarily submitted to the Government for purposes of and subject to the provisions of this subtitle; (C) the care and storage of such information; and (D) the protection and maintenance of the confidentiality of such information so as to permit the sharing of such information within the Federal Government and with State and local governments, and the issuance of notices and warnings related to the protection of critical infrastructure and protected systems, in such manner as to protect from public disclosure the identity of the submitting person or entity, or information that is proprietary, business sensitive, relates specifically to the submitting person or entity, and is otherwise not appropriately in the public domain. (f) Penalties.--Whoever, being an officer or employee of the United States or of any department or agency thereof, knowingly publishes, divulges, discloses, or makes known in any manner or to any extent not authorized by law, any critical infrastructure information protected from disclosure by this subtitle coming to him in the course of this employment or official duties or by reason of any examination or investigation made by, or return, report, or record made to or filed with, such department or agency or officer or employee thereof, shall be fined under title 18 of the United States Code, imprisoned not more than 1 year, or both, and shall be removed from office or employment. (g) Authority To Issue Warnings.--The Federal Government may provide advisories, alerts, and warnings to relevant companies, targeted sectors, other governmental entities, or the general public regarding potential threats to critical infrastructure as appropriate. In issuing a warning, the Federal Government shall take appropriate actions to protect from disclosure-- (1) the source of any voluntarily submitted critical infrastructure information that forms the basis for the warning; or (2) information that is proprietary, business sensitive, relates specifically to the submitting person or entity, or is otherwise not appropriately in the public domain. (h) Authority To Delegate.--The President may delegate authority to a critical infrastructure protection program, designated under subsection (e), to enter into a voluntary agreement to promote critical infrastructure security, including with any Information Sharing and Analysis Organization, or a plan of action as otherwise defined in section 708 of the Defense Production Act of 1950 (50 U.S.C. App. 2158). SEC. 215. NO PRIVATE RIGHT OF ACTION. Nothing in this subtitle may be construed to create a private right of action for enforcement of any provision of this Act. Subtitle C--Information Security SEC. 221. PROCEDURES FOR SHARING INFORMATION. The Secretary shall establish procedures on the use of information shared under this title that-- (1) limit the redissemination of such information to ensure that it is not used for an unauthorized purpose; (2) ensure the security and confidentiality of such information; (3) protect the constitutional and statutory rights of any individuals who are subjects of such information; and (4) provide data integrity through the timely removal and destruction of obsolete or erroneous names and information. SEC. 222. PRIVACY OFFICER. The Secretary shall appoint a senior official in the Department to assume primary responsibility for privacy policy, including-- (1) assuring that the use of technologies sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information; (2) assuring that personal information contained in Privacy Act systems of records is handled in full compliance with fair information practices as set out in the Privacy Act of 1974; (3) evaluating legislative and regulatory proposals involving collection, use, and disclosure of personal information by the Federal Government; (4) conducting a privacy impact assessment of proposed rules of the Department or that of the Department on the privacy of personal information, including the type of personal information collected and the number of people affected; and (5) preparing a report to Congress on an annual basis on activities of the Department that affect privacy, including complaints of privacy violations, implementation of the Privacy Act of 1974, internal controls, and other matters. SEC. 223. ENHANCEMENT OF NON-FEDERAL CYBERSECURITY. In carrying out the responsibilities under section 201, the Under Secretary for Information Analysis and Infrastructure Protection shall-- (1) as appropriate, provide to State and local government entities, and upon request to private entities that own or operate critical information systems-- (A) analysis and warnings related to threats to, and vulnerabilities of, critical information systems; and (B) in coordination with the Under Secretary for Emergency Preparedness and Response, crisis management support in response to threats to, or attacks on, critical information systems; and (2) as appropriate, provide technical assistance, upon request, to the private sector and other government entities, in coordination with the Under Secretary for Emergency Preparedness and Response, with respect to emergency recovery plans to respond to major failures of critical information systems. SEC. 224. NET GUARD. The Under Secretary for Information Analysis and Infrastructure Protection may establish a national technology guard, to be known as "NET Guard", comprised of local teams of volunteers with expertise in relevant areas of science and technology, to assist local communities to respond and recover from attacks on information systems and communications networks. SEC. 225. CYBER SECURITY ENHANCEMENT ACT OF 2002. (a) Short Title.--This section may be cited as the "Cyber Security Enhancement Act of 2002". (b) Amendment of Sentencing Guidelines Relating to Certain Computer Crimes.-- (1) Directive to the united states sentencing commission.-- Pursuant to its authority under section 994(p) of title 28, United States Code, and in accordance with this subsection, the United States Sentencing Commission shall review and, if appropriate, amend its guidelines and its policy statements applicable to persons convicted of an offense under section 1030 of title 18, United States Code. (2) Requirements.--In carrying out this subsection, the Sentencing Commission shall-- (A) ensure that the sentencing guidelines and policy statements reflect the serious nature of the offenses described in paragraph (1), the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses; (B) consider the following factors and the extent to which the guidelines may or may not account for them-- (i) the potential and actual loss resulting from the offense; (ii) the level of sophistication and planning involved in the offense; (iii) whether the offense was committed for purposes of commercial advantage or private financial benefit; (iv) whether the defendant acted with malicious intent to cause harm in committing the offense; [[Page H8654]] (v) the extent to which the offense violated the privacy rights of individuals harmed; (vi) whether the offense involved a computer used by the government in furtherance of national defense, national security, or the administration of justice; (vii) whether the violation was intended to or had the effect of significantly interfering with or disrupting a critical infrastructure; and (viii) whether the violation was intended to or had the effect of creating a threat to public health or safety, or injury to any person; (C) assure reasonable consistency with other relevant directives and with other sentencing guidelines; (D) account for any additional aggravating or mitigating circumstances that might justify exceptions to the generally applicable sentencing ranges; (E) make any necessary conforming changes to the sentencing guidelines; and (F) assure that the guidelines adequately meet the purposes of sentencing as set forth in section 3553(a)(2) of title 18, United States Code. (c) Study and Report on Computer Crimes.--Not later than May 1, 2003, the United States Sentencing Commission shall submit a brief report to Congress that explains any actions taken by the Sentencing Commission in response to this section and includes any recommendations the Commission may have regarding statutory penalties for offenses under section 1030 of title 18, United States Code. (d) Emergency Disclosure Exception.-- (1) In general.--Section 2702(b) of title 18, United States Code, is amended-- (A) in paragraph (5), by striking "or" at the end; (B) in paragraph (6)(A), by inserting "or" at the end; (C) by striking paragraph (6)(C); and (D) by adding at the end the following: "(7) to a Federal, State, or local governmental entity, if the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay of communications relating to the emergency.". (2) Reporting of disclosures.--A government entity that receives a disclosure under section 2702(b) of title 18, United States Code, shall file, not later than 90 days after such disclosure, a report to the Attorney General stating the paragraph of that section under which the disclosure was made, the date of the disclosure, the entity to which the disclosure was made, the number of customers or subscribers to whom the information disclosed pertained, and the number of communications, if any, that were disclosed. The Attorney General shall publish all such reports into a single report to be submitted to Congress 1 year after the date of enactment of this Act. (e) Good Faith Exception.--Section 2520(d)(3) of title 18, United States Code, is amended by inserting "or 2511(2)(i)" after "2511(3)". (f) Internet Advertising of Illegal Devices.--Section 2512(1)(c) of title 18, United States Code, is amended-- (1) by inserting "or disseminates by electronic means" after "or other publication"; and (2) by inserting "knowing the content of the advertisement and" before "knowing or having reason to know". (g) Strengthening Penalties.--Section 1030(c) of title 18, United States Code, is amended-- (1) by striking "and" at the end of paragraph (3); (2) in each of subparagraphs (A) and (C) of paragraph (4), by inserting "except as provided in paragraph (5)," before "a fine under this title"; (3) in paragraph (4)(C), by striking the period at the end and inserting "; and"; and (4) by adding at the end the following: "(5)(A) if the offender knowingly or recklessly causes or attempts to cause serious bodily injury from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for not more than 20 years, or both; and "(B) if the offender knowingly or recklessly causes or attempts to cause death from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for any term of years or for life, or both.". (h) Provider Assistance.-- (1) Section 2703.--Section 2703(e) of title 18, United States Code, is amended by inserting ", statutory authorization" after "subpoena". (2) Section 2511.--Section 2511(2)(a)(ii) of title 18, United States Code, is amended by inserting ", statutory authorization," after "court order" the last place it appears. (i) Emergencies.--Section 3125(a)(1) of title 18, United States Code, is amended-- (1) in subparagraph (A), by striking "or" at the end; (2) in subparagraph (B), by striking the comma at the end and inserting a semicolon; and (3) by adding at the end the following: "(C) an immediate threat to a national security interest; or "(D) an ongoing attack on a protected computer (as defined in section 1030) that constitutes a crime punishable by a term of imprisonment greater than one year;". (j) Protecting Privacy.-- (1) Section 2511.--Section 2511(4) of title 18, United States Code, is amended-- (A) by striking paragraph (b); and (B) by redesignating paragraph (c) as paragraph (b). (2) Section 2701.--Section 2701(b) of title 18, United States Code, is amended-- (A) in paragraph (1), by inserting ", or in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State" after "commercial gain"; (B) in paragraph (1)(A), by striking "one year" and inserting "5 years"; (C) in paragraph (1)(B), by striking "two years" and inserting "10 years"; and (D) by striking paragraph (2) and inserting the following: "(2) in any other case-- "(A) a fine under this title or imprisonment for not more than 1 year or both, in the case of a first offense under this paragraph; and "(B) a fine under this title or imprisonment for not more than 5 years, or both, in the case of an offense under this subparagraph that occurs after a conviction of another offense under this section.". [...] TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY SEC. 301. UNDER SECRETARY FOR SCIENCE AND TECHNOLOGY. There shall be in the Department a Directorate of Science and Technology headed by an Under Secretary for Science and Technology. SEC. 302. RESPONSIBILITIES AND AUTHORITIES OF THE UNDER SECRETARY FOR SCIENCE AND TECHNOLOGY. The Secretary, acting through the Under Secretary for Science and Technology, shall have the responsibility for-- (1) advising the Secretary regarding research and development efforts and priorities in support of the Department's missions; (2) developing, in consultation with other appropriate executive agencies, a national policy and strategic plan for, identifying priorities, goals, objectives and policies for, and coordinating the Federal Government's civilian efforts to identify and develop countermeasures to chemical, biological, radiological, nuclear, and other emerging terrorist threats, including the development of comprehensive, research-based definable goals for such efforts and development of annual measurable objectives and specific targets to accomplish and evaluate the goals for such efforts; (3) supporting the Under Secretary for Information Analysis and Infrastructure Protection, by assessing and testing homeland security vulnerabilities and possible threats; (4) conducting basic and applied research, development, demonstration, testing, and evaluation activities that are relevant to any or all elements of the Department, through both intramural and extramural programs, except that such responsibility does not extend to human health-related research and development activities; (5) establishing priorities for, directing, funding, and conducting national research, development, test and evaluation, and procurement of technology and systems for-- (A) preventing the importation of chemical, biological, radiological, nuclear, and related weapons and material; and (B) detecting, preventing, protecting against, and responding to terrorist attacks; (6) establishing a system for transferring homeland security developments or technologies to federal, state, local government, and private sector entities; (7) entering into work agreements, joint sponsorships, contracts, or any other agreements with the Department of Energy regarding the use of the national laboratories or sites and support of the science and technology base at those facilities; (8) collaborating with the Secretary of Agriculture and the Attorney General as provided in section 212 of the Agricultural Bioterrorism Protection Act of 2002 (7 U.S.C. 8401), as amended by section 1709(b); (9) collaborating with the Secretary of Health and Human Services and the Attorney General in determining any new biological agents and toxins that shall be listed as "select agents" in Appendix A of part 72 of title 42, Code of Federal Regulations, pursuant to section 351A of the Public Health Service Act (42 U.S.C. 262a); (10) supporting United States leadership in science and technology; (11) establishing and administering the primary research and development activities of the Department, including the long-term research and development needs and capabilities for all elements of the Department; (12) coordinating and integrating all research, development, demonstration, testing, and evaluation activities of the Department; (13) coordinating with other appropriate executive agencies in developing and carrying out the science and technology agenda of the Department to reduce duplication and identify unmet needs; and (14) developing and overseeing the administration of guidelines for merit review of research and development projects throughout the Department, and for the dissemination of research conducted or sponsored by the Department. SEC. 303. FUNCTIONS TRANSFERRED. In accordance with title XV, there shall be transferred to the Secretary the functions, personnel, assets, and liabilities of the following entities: (1) The following programs and activities of the Department of Energy, including the functions of the Secretary of Energy relating thereto (but not including programs and activities relating to the strategic nuclear defense posture of the United States): (A) The chemical and biological national security and supporting programs and activities of the nonproliferation and verification research and development program. (B) The nuclear smuggling programs and activities within the proliferation detection program of the nonproliferation and verification research and development program. The programs and activities described in this subparagraph may be designated by the President either for transfer to the Department or for joint operation by the Secretary and the Secretary of Energy. (C) The nuclear assessment program and activities of the assessment, detection, and cooperation program of the international materials protection and cooperation program. (D) Such life sciences activities of the biological and environmental research program related to microbial pathogens as may be designated by the President for transfer to the Department. (E) The Environmental Measurements Laboratory. (F) The advanced scientific computing research program and activities at Lawrence Livermore National Laboratory. (2) The National Bio-Weapons Defense Analysis Center of the Department of Defense, including the functions of the Secretary of Defense related thereto. [[Page H8604]] (3) The Plum Island Animal Disease Center of the Department of Agriculture, as provided in section 310. SEC. 304. CONDUCT OF CERTAIN PUBLIC HEALTH-RELATED ACTIVITIES. (a) In General.--With respect to civilian human health- related research and development activities relating to countermeasures for chemical, biological, radiological, and nuclear and other emerging terrorist threats carried out by the Department of Health and Human Services (including the Public Health Service), the Secretary of Health and Human Services shall set priorities, goals, objectives, and policies and develop a coordinated strategy for such activities in collaboration with the Secretary of Homeland Security to ensure consistency with the national policy and strategic plan developed pursuant to section 302(2). (b) Evaluation of Progress.--In carrying out subsection (a), the Secretary of Health and Human Services shall collaborate with the Secretary in developing specific benchmarks and outcome measurements for evaluating progress toward achieving the priorities and goals described in such subsection. (c) Administration of Countermeasures Against Smallpox.-- Section 224 of the Public Health Service Act (42 U.S.C. 233) is amended by adding the following: "(p) Administration of Smallpox Countermeasures by Health Professionals.-- "(1) In general.--For purposes of this section, and subject to other provisions of this subsection, a covered person shall be deemed to be an employee of the Public Health Service with respect to liability arising out of administration of a covered countermeasure against smallpox to an individual during the effective period of a declaration by the Secretary under paragraph (2)(A). "(2) Declaration by secretary concerning countermeasure against smallpox.-- "(A) Authority to issue declaration.-- "(i) In general.--The Secretary may issue a declaration, pursuant to this paragraph, concluding that an actual or potential bioterrorist incident or other actual or potential public health emergency makes advisable the administration of a covered countermeasure to a category or categories of individuals. "(ii) Covered countermeasure.--The Secretary shall specify in such declaration the substance or substances that shall be considered covered countermeasures (as defined in paragraph (8)(A)) for purposes of administration to individuals during the effective period of the declaration. "(iii) Effective period.--The Secretary shall specify in such declaration the beginning and ending dates of the effective period of the declaration, and may subsequently amend such declaration to shorten or extend such effective period, provided that the new closing date is after the date when the declaration is amended. "(iv) Publication.--The Secretary shall promptly publish each such declaration and amendment in the Federal Register. "(B) Liability of united states only for administrations within scope of declaration.--Except as provided in paragraph (5)(B)(ii), the United States shall be liable under this subsection with respect to a claim arising out of the administration of a covered countermeasure to an individual only if-- "(i) the countermeasure was administered by a qualified person, for a purpose stated in paragraph (7)(A)(i), and during the effective period of a declaration by the Secretary under subparagraph (A) with respect to such countermeasure; and "(ii)(I) the individual was within a category of individuals covered by the declaration; or "(II) the qualified person administering the countermeasure had reasonable grounds to believe that such individual was within such category. "(C) Presumption of administration within scope of declaration in case of accidental vaccinia inoculation.-- "(i) In general.--If vaccinia vaccine is a covered countermeasure specified in a declaration under subparagraph (A), and an individual to whom the vaccinia vaccine is not administered contracts vaccinia, then, under the circumstances specified in clause (ii), the individual-- "(I) shall be rebuttably presumed to have contracted vaccinia from an individual to whom such vaccine was administered as provided by clauses (i) and (ii) of subparagraph (B); and "(II) shall (unless such presumption is rebutted) be deemed for purposes of this subsection to be an individual to whom a covered countermeasure was administered by a qualified person in accordance with the terms of such declaration and as described by subparagraph (B). "(ii) Circumstances in which presumption applies.--The presumption and deeming stated in clause (i) shall apply if-- "(I) the individual contracts vaccinia during the effective period of a declaration under subparagraph (A) or by the date 30 days after the close of such period; or "(II) the individual resides or has resided with an individual to whom such vaccine was administered as provided by clauses (i) and (ii) of subparagraph (B) and contracts vaccinia after such date. "(3) Exclusivity of remedy.--The remedy provided by subsection (a) shall be exclusive of any other civil action or proceeding for any claim or suit this subsection encompasses. "(4) Certification of action by attorney general.-- Subsection (c) applies to actions under this subsection, subject to the following provisions: "(A) Nature of certification.--The certification by the Attorney General that is the basis for deeming an action or proceeding to be against the United States, and for removing an action or proceeding from a State court, is a certification that the action or proceeding is against a covered person and is based upon a claim alleging personal injury or death arising out of the administration of a covered countermeasure. "(B) Certification of attorney general conclusive.--The certification of the Attorney General of the facts specified in subparagraph (A) shall conclusively establish such facts for purposes of jurisdiction pursuant to this subsection. "(5) Defendant to cooperate with united states.-- "(A) In general.--A covered person shall cooperate with the United States in the processing and defense of a claim or action under this subsection based upon alleged acts or omissions of such person. "(B) Consequences of failure to cooperate.--Upon the motion of the United States or any other party and upon finding that such person has failed to so cooperate-- "(i) the court shall substitute such person as the party defendant in place of the United States and, upon motion, shall remand any such suit to the court in which it was instituted if it appears that the court lacks subject matter jurisdiction; "(ii) the United States shall not be liable based on the acts or omissions of such person; and "(iii) the Attorney General shall not be obligated to defend such action. "(6) Recourse against covered person in case of gross misconduct or contract violation.-- "(A) In general.--Should payment be made by the United States to any claimant bringing a claim under this subsection, either by way of administrative determination, settlement, or court judgment, the United States shall have, notwithstanding any provision of State law, the right to recover for that portion of the damages so awarded or paid, as well as interest and any costs of litigation, resulting from the failure of any covered person to carry out any obligation or responsibility assumed by such person under a contract with the United States or from any grossly negligent, reckless, or illegal conduct or willful misconduct on the part of such person. "(B) Venue.--The United States may maintain an action under this paragraph against such person in the district court of the United States in which such person resides or has its principal place of business. "(7) Definitions.--As used in this subsection, terms have the following meanings: "(A) Covered countermeasure.--The term `covered countermeasure', or `covered countermeasure against smallpox', means a substance that is-- "(i)(I) used to prevent or treat smallpox (including the vaccinia or another vaccine); or "(II) vaccinia immune globulin used to control or treat the adverse effects of vaccinia inoculation; and "(ii) specified in a declaration under paragraph (2). "(B) Covered person.--The term `covered person', when used with respect to the administration of a covered countermeasure, includes any person who is-- "(i) a manufacturer or distributor of such countermeasure; "(ii) a health care entity under whose auspices such countermeasure was administered; "(iii) a qualified person who administered such countermeasure; or "(iv) an official, agent, or employee of a person described in clause (i), (ii), or (iii). "(C) Qualified person.--The term `qualified person', when used with respect to the administration of a covered countermeasure, means a licensed health professional or other individual who is authorized to administer such countermeasure under the law of the State in which the countermeasure was administered.". SEC. 305. FEDERALLY FUNDED RESEARCH AND DEVELOPMENT CENTERS. The Secretary, acting through the Under Secretary for Science and Technology, shall have the authority to establish or contract with 1 or more federally funded research and development centers to provide independent analysis of homeland security issues, or to carry out other responsibilities under this Act, including coordinating and integrating both the extramural and intramural programs described in section 308. SEC. 306. MISCELLANEOUS PROVISIONS. (a) Classification.--To the greatest extent practicable, research conducted or supported by the Department shall be unclassified. (b) Construction.--Nothing in this title shall be construed to preclude any Under Secretary of the Department from carrying out research, development, demonstration, or deployment activities, as long as such activities are coordinated through the Under Secretary for Science and Technology. (c) Regulations.--The Secretary, acting through the Under Secretary for Science and Technology, may issue necessary regulations with respect to research, development, demonstration, testing, and evaluation activities [[Page H8605]] of the Department, including the conducting, funding, and reviewing of such activities. (d) Notification of Presidential Life Sciences Designations.--Not later than 60 days before effecting any transfer of Department of Energy life sciences activities pursuant to section 303(1)(D) of this Act, the President shall notify the appropriate congressional committees of the proposed transfer and shall include the reasons for the transfer and a description of the effect of the transfer on the activities of the Department of Energy. SEC. 307. HOMELAND SECURITY ADVANCED RESEARCH PROJECTS AGENCY. (a) Definitions.--In this section: (1) Fund.--The term "Fund" means the Acceleration Fund for Research and Development of Homeland Security Technologies established in subsection (c). (2) Homeland security research.--The term "homeland security research" means research relevant to the detection of, prevention of, protection against, response to, attribution of, and recovery from homeland security threats, particularly acts of terrorism. (3) Hsarpa.--The term "HSARPA" means the Homeland Security Advanced Research Projects Agency established in subsection (b). (4) Under secretary.--The term "Under Secretary" means the Under Secretary for Science and Technology. (b) HSARPA.-- (1) Establishment.--There is established the Homeland Security Advanced Research Projects Agency. (2) Director.--HSARPA shall be headed by a Director, who shall be appointed by the Secretary. The Director shall report to the Under Secretary. (3) Responsibilities.--The Director shall administer the Fund to award competitive, merit-reviewed grants, cooperative agreements or contracts to public or private entities, including businesses, federally funded research and development centers, and universities. The Director shall administer the Fund to-- (A) support basic and applied homeland security research to promote revolutionary changes in technologies that would promote homeland security; (B) advance the development, testing and evaluation, and deployment of critical homeland security technologies; and (C) accelerate the prototyping and deployment of technologies that would address homeland security vulnerabilities. (4) Targeted competitions.--The Director may solicit proposals to address specific vulnerabilities identified by the Director. (5) Coordination.--The Director shall ensure that the activities of HSARPA are coordinated with those of other relevant research agencies, and may run projects jointly with other agencies. (6) Personnel.--In hiring personnel for HSARPA, the Secretary shall have the hiring and management authorities described in section 1101 of the Strom Thurmond National Defense Authorization Act for Fiscal Year 1999 (5 U.S.C. 3104 note; Public Law 105-261). The term of appointments for employees under subsection (c)(1) of that section may not exceed 5 years before the granting of any extension under subsection (c)(2) of that section. (7) Demonstrations.--The Director, periodically, shall hold homeland security technology demonstrations to improve contact among technology developers, vendors and acquisition personnel. (c) Fund.-- (1) Establishment.--There is established the Acceleration Fund for Research and Development of Homeland Security Technologies, which shall be administered by the Director of HSARPA. (2) Authorization of appropriations.--There are authorized to be appropriated $500,000,000 to the Fund for fiscal year 2003 and such sums as may be necessary thereafter. (3) Coast guard.--Of the funds authorized to be appropriated under paragraph (2), not less than 10 percent of such funds for each fiscal year through fiscal year 2005 shall be authorized only for the Under Secretary, through joint agreement with the Commandant of the Coast Guard, to carry out research and development of improved ports, waterways and coastal security surveillance and perimeter protection capabilities for the purpose of minimizing the possibility that Coast Guard cutters, aircraft, helicopters, and personnel will be diverted from non-homeland security missions to the ports, waterways and coastal security mission. SEC. 308. CONDUCT OF RESEARCH, DEVELOPMENT, DEMONSTRATION, TESTING AND EVALUATION. (a) In General.--The Secretary, acting through the Under Secretary for Science and Technology, shall carry out the responsibilities under section 302(4) through both extramural and intramural programs. (b) Extramural Programs.-- (1) In general.--The Secretary, acting through the Under Secretary for Science and Technology, shall operate extramural research, development, demonstration, testing, and evaluation programs so as to-- (A) ensure that colleges, universities, private research institutes, and companies (and consortia thereof) from as many areas of the United States as practicable participate; (B) ensure that the research funded is of high quality, as determined through merit review processes developed under section 302(14); and (C) distribute funds through grants, cooperative agreements, and contracts. (2) University-based centers for homeland security.-- (A) Establishment.--The Secretary, acting through the Under Secretary for Science and Technology, shall establish within 1 year of the date of enactment of this Act a university- based center or centers for homeland security. The purpose of this center or centers shall be to establish a coordinated, university-based system to enhance the Nation's homeland security. (B) Criteria for selection.--In selecting colleges or universities as centers for homeland security, the Secretary shall consider the following criteria: (i) Demonstrated expertise in the training of first responders. (ii) Demonstrated expertise in responding to incidents involving weapons of mass destruction and biological warfare. (iii) Demonstrated expertise in emergency medical services. (iv) Demonstrated expertise in chemical, biological, radiological, and nuclear countermeasures. (v) Strong affiliations with animal and plant diagnostic laboratories. (vi) Demonstrated expertise in food safety. (vii) Affiliation with Department of Agriculture laboratories or training centers. (viii) Demonstrated expertise in water and wastewater operations. (ix) Demonstrated expertise in port and waterway security. (x) Demonstrated expertise in multi-modal transportation. (xi) Nationally recognized programs in information security. (xii) Nationally recognized programs in engineering. (xiii) Demonstrated expertise in educational outreach and technical assistance. (xiv) Demonstrated expertise in border transportation and security. (xv) Demonstrated expertise in interdisciplinary public policy research and communication outreach regarding science, technology, and public policy. (C) Discretion of secretary.--The Secretary shall have the discretion to establish such centers and to consider additional criteria as necessary to meet the evolving needs of homeland security and shall report to Congress concerning the implementation of this paragraph as necessary. (D) Authorization of appropriations.--There are authorized to be appropriated such sums as may be necessary to carry out this paragraph. (c) Intramural Programs.-- (1) Consultation.--In carrying out the duties under section 302, the Secretary, acting through the Under Secretary for Science and Technology, may draw upon the expertise of any laboratory of the Federal Government, whether operated by a contractor or the Government. (2) Laboratories.--The Secretary, acting through the Under Secretary for Science and Technology, may establish a headquarters laboratory for the Department at any laboratory or site and may establish additional laboratory units at other laboratories or sites. (3) Criteria for headquarters laboratory.--If the Secretary chooses to establish a headquarters laboratory pursuant to paragraph (2), then the Secretary shall do the following: (A) Establish criteria for the selection of the headquarters laboratory in consultation with the National Academy of Sciences, appropriate Federal agencies, and other experts. (B) Publish the criteria in the Federal Register. (C) Evaluate all appropriate laboratories or sites against the criteria. (D) Select a laboratory or site on the basis of the criteria. (E) Report to the appropriate congressional committees on which laboratory was selected, how the selected laboratory meets the published criteria, and what duties the headquarters laboratory shall perform. (4) Limitation on operation of laboratories.--No laboratory shall begin operating as the headquarters laboratory of the Department until at least 30 days after the transmittal of the report required by paragraph (3)(E). SEC. 309. UTILIZATION OF DEPARTMENT OF ENERGY NATIONAL LABORATORIES AND SITES IN SUPPORT OF HOMELAND SECURITY ACTIVITIES. (a) Authority to Utilize National Laboratories and Sites.-- (1) In general.--In carrying out the missions of the Department, the Secretary may utilize the Department of Energy national laboratories and sites through any 1 or more of the following methods, as the Secretary considers appropriate: (A) A joint sponsorship arrangement referred to in subsection (b). (B) A direct contract between the Department and the applicable Department of Energy laboratory or site, subject to subsection (c). (C) Any "work for others" basis made available by that laboratory or site. (D) Any other method provided by law. (2) Acceptance and Performance by Labs and Sites.-- Notwithstanding any other law governing the administration, mission, use, or operations of any of the Department of Energy national laboratories and sites, such laboratories and sites are authorized to accept and perform work for the Secretary, [[Page H8606]] consistent with resources provided, and perform such work on an equal basis to other missions at the laboratory and not on a noninterference basis with other missions of such laboratory or site. (b) Joint Sponsorship Arrangements.-- (1) Laboratories.--The Department may be a joint sponsor, under a multiple agency sponsorship arrangement with the Department of Energy, of 1 or more Department of Energy national laboratories in the performance of work. (2) Sites.--The Department may be a joint sponsor of a Department of Energy site in the performance of work as if such site were a federally funded research and development center and the work were performed under a multiple agency sponsorship arrangement with the Department. (3) Primary sponsor.--The Department of Energy shall be the primary sponsor under a multiple agency sponsorship arrangement referred to in paragraph (1) or (2). (4) Lead agent.--The Secretary of Energy shall act as the lead agent in coordinating the formation and performance of a joint sponsorship arrangement under this subsection between the Department and a Department of Energy national laboratory or site. (5) Federal acquisition regulation.--Any work performed by a Department of Energy national laboratory or site under a joint sponsorship arrangement under this subsection shall comply with the policy on the use of federally funded research and development centers under the Federal Acquisition Regulations. (6) Funding.--The Department shall provide funds for work at the Department of Energy national laboratories or sites, as the case may be, under a joint sponsorship arrangement under this subsection under the same terms and conditions as apply to the primary sponsor of such national laboratory under section 303(b)(1)(C) of the Federal Property and Administrative Services Act of 1949 (41 U.S.C. 253 (b)(1)(C)) or of such site to the extent such section applies to such site as a federally funded research and development center by reason of this subsection. (c) Separate Contracting.--To the extent that programs or activities transferred by this Act from the Department of Energy to the Department of Homeland Security are being carried out through direct contracts with the operator of a national laboratory or site of the Department of Energy, the Secretary of Homeland Security and the Secretary of Energy shall ensure that direct contracts for such programs and activities between the Department of Homeland Security and such operator are separate from the direct contracts of the Department of Energy with such operator. (d) Authority With Respect to Cooperative Research and Development Agreements and Licensing Agreements.--In connection with any utilization of the Department of Energy national laboratories and sites under this section, the Secretary may permit the director of any such national laboratory or site to enter into cooperative research and development agreements or to negotiate licensing agreements with any person, any agency or instrumentality, of the United States, any unit of State or local government, and any other entity under the authority granted by section 12 of the Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C. 3710a). Technology may be transferred to a non-Federal party to such an agreement consistent with the provisions of sections 11 and 12 of that Act (15 U.S.C. 3710, 3710a). (e) Reimbursement of Costs.--In the case of an activity carried out by the operator of a Department of Energy national laboratory or site in connection with any utilization of such laboratory or site under this section, the Department of Homeland Security shall reimburse the Department of Energy for costs of such activity through a method under which the Secretary of Energy waives any requirement for the Department of Homeland Security to pay administrative charges or personnel costs of the Department of Energy or its contractors in excess of the amount that the Secretary of Energy pays for an activity carried out by such contractor and paid for by the Department of Energy. (f) Laboratory Directed Research and Development by the Department of Energy.--No funds authorized to be appropriated or otherwise made available to the Department in any fiscal year may be obligated or expended for laboratory directed research and development activities carried out by the Department of Energy unless such activities support the missions of the Department of Homeland Security. (g) Office for National Laboratories.--There is established within the Directorate of Science and Technology an Office for National Laboratories, which shall be responsible for the coordination and utilization of the Department of Energy national laboratories and sites under this section in a manner to create a networked laboratory system for the purpose of supporting the missions of the Department. (h) Department of Energy Coordination on Homeland Security Related Research.--The Secretary of Energy shall ensure that any research, development, test, and evaluation activities conducted within the Department of Energy that are directly or indirectly related to homeland security are fully coordinated with the Secretary to minimize duplication of effort and maximize the effective application of Federal budget resources. SEC. 310. TRANSFER OF PLUM ISLAND ANIMAL DISEASE CENTER, DEPARTMENT OF AGRICULTURE. (a) In General.--In accordance with title XV, the Secretary of Agriculture shall transfer to the Secretary of Homeland Security the Plum Island Animal Disease Center of the Department of Agriculture, including the assets and liabilities of the Center. (b) Continued Department of Agriculture Access.--On completion of the transfer of the Plum Island Animal Disease Center under subsection (a), the Secretary of Homeland Security and the Secretary of Agriculture shall enter into an agreement to ensure that the Department of Agriculture is able to carry out research, diagnostic, and other activities of the Department of Agriculture at the Center. (c) Direction of Activities.--The Secretary of Agriculture shall continue to direct the research, diagnostic, and other activities of the Department of Agriculture at the Center described in subsection (b). (d) Notification.-- (1) In general.--At least 180 days before any change in the biosafety level at the Plum Island Animal Disease Center, the President shall notify Congress of the change and describe the reasons for the change. (2) Limitation.--No change described in paragraph (1) may be made earlier than 180 days after the completion of the transition period (as defined in section 1501. SEC. 311. HOMELAND SECURITY SCIENCE AND TECHNOLOGY ADVISORY COMMITTEE. (a) Establishment.--There is established within the Department a Homeland Security Science and Technology Advisory Committee (in this section referred to as the "Advisory Committee"). The Advisory Committee shall make recommendations with respect to the activities of the Under Secretary for Science and Technology, including identifying research areas of potential importance to the security of the Nation. (b) Membership.-- (1) Appointment.--The Advisory Committee shall consist of 20 members appointed by the Under Secretary for Science and Technology, which shall include emergency first-responders or representatives of organizations or associations of emergency first-responders. The Advisory Committee shall also include representatives of citizen groups, including economically disadvantaged communities. The individuals appointed as members of the Advisory Committee-- (A) shall be eminent in fields such as emergency response, research, engineering, new product development, business, and management consulting; (B) shall be selected solely on the basis of established records of distinguished service; (C) shall not be employees of the Federal Government; and (D) shall be so selected as to provide representation of a cross-section of the research, development, demonstration, and deployment activities supported by the Under Secretary for Science and Technology. (2) National research council.--The Under Secretary for Science and Technology may enter into an arrangement for the National Research Council to select members of the Advisory Committee, but only if the panel used by the National Research Council reflects the representation described in paragraph (1). (c) Terms of Office.-- (1) In general.--Except as otherwise provided in this subsection, the term of office of each member of the Advisory Committee shall be 3 years. (2) Original appointments.--The original members of the Advisory Committee shall be appointed to three classes of three members each. One class shall have a term of 1 year, 1 a term of 2 years, and the other a term of 3 years. (3) Vacancies.--A member appointed to fill a vacancy occurring before the expiration of the term for which the member's predecessor was appointed shall be appointed for the remainder of such term. (d) Eligibility.--A person who has completed two consecutive full terms of service on the Advisory Committee shall thereafter be ineligible for appointment during the 1- year period following the expiration of the second such term. (e) Meetings.--The Advisory Committee shall meet at least quarterly at the call of the Chair or whenever one-third of the members so request in writing. Each member shall be given appropriate notice of the call of each meeting, whenever possible not less than 15 days before the meeting. (f) Quorum.--A majority of the members of the Advisory Committee not having a conflict of interest in the matter being considered by the Advisory Committee shall constitute a quorum. (g) Conflict of Interest Rules.--The Advisory Committee shall establish rules for determining when 1 of its members has a conflict of interest in a matter being considered by the Advisory Committee. (h) Reports.-- (1) Annual report.--The Advisory Committee shall render an annual report to the Under Secretary for Science and Technology for transmittal to Congress on or before January 31 of each year. Such report shall describe the activities and recommendations of the Advisory Committee during the previous year. [[Page H8607]] (2) Additional reports.--The Advisory Committee may render to the Under Secretary for transmittal to Congress such additional reports on specific policy matters as it considers appropriate. (i) FACA Exemption.--Section 14 of the Federal Advisory Committee Act shall not apply to the Advisory Committee. (j) Termination.--The Department of Homeland Security Science and Technology Advisory Committee shall terminate 3 years after the effective date of this Act. SEC. 312. HOMELAND SECURITY INSTITUTE. (a) Establishment.--The Secretary shall establish a federally funded research and development center to be known as the "Homeland Security Institute" (in this section referred to as the "Institute"). (b) Administration.--The Institute shall be administered as a separate entity by the Secretary. (c) Duties.--The duties of the Institute shall be determined by the Secretary, and may include the following: (1) Systems analysis, risk analysis, and simulation and modeling to determine the vulnerabilities of the Nation's critical infrastructures and the effectiveness of the systems deployed to reduce those vulnerabilities. (2) Economic and policy analysis to assess the distributed costs and benefits of alternative approaches to enhancing security. (3) Evaluation of the effectiveness of measures deployed to enhance the security of institutions, facilities, and infrastructure that may be terrorist targets. (4) Identification of instances when common standards and protocols could improve the interoperability and effective utilization of tools developed for field operators and first responders. (5) Assistance for Federal agencies and departments in establishing testbeds to evaluate the effectiveness of technologies under development and to assess the appropriateness of such technologies for deployment. (6) Design of metrics and use of those metrics to evaluate the effectiveness of homeland security programs throughout the Federal Government, including all national laboratories. (7) Design of and support for the conduct of homeland security-related exercises and simulations. (8) Creation of strategic technology development plans to reduce vulnerabilities in the Nation's critical infrastructure and key resources. (d) Consultation on Institute Activities.--In carrying out the duties described in subsection (c), the Institute shall consult widely with representatives from private industry, institutions of higher education, nonprofit institutions, other Government agencies, and federally funded reseach and development centers. (e) Use of Centers.--The Institute shall utilize the capabilities of the National Infrastructure Simulation and Analysis Center. (f) Annual Reports.--The Institute shall transmit to the Secretary and Congress an annual report on the activities of the Institute under this section. (g) Termination.--The Homeland Security Institute shall terminate 3 years after the effective date of this Act. SEC. 313. TECHNOLOGY CLEARINGHOUSE TO ENCOURAGE AND SUPPORT INNOVATIVE SOLUTIONS TO ENHANCE HOMELAND SECURITY. (a) Establishment of Program.--The Secretary, acting through the Under Secretary for Science and Technology, shall establish and promote a program to encourage technological innovation in facilitating the mission of the Department (as described in section 101). (b) Elements of Program.--The program described in subsection (a) shall include the following components: (1) The establishment of a centralized Federal clearinghouse for information relating to technologies that would further the mission of the Department for dissemination, as appropriate, to Federal, State, and local government and private sector entities for additional review, purchase, or use. (2) The issuance of announcements seeking unique and innovative technologies to advance the mission of the Department. (3) The establishment of a technical assistance team to assist in screening, as appropriate, proposals submitted to the Secretary (except as provided in subsection (c)(2)) to assess the feasibility, scientific and technical merits, and estimated cost of such proposals, as appropriate. (4) The provision of guidance, recommendations, and technical assistance, as appropriate, to assist Federal, State, and local government and private sector efforts to evaluate and implement the use of technologies described in paragraph (1) or (2). (5) The provision of information for persons seeking guidance on how to pursue proposals to develop or deploy technologies that would enhance homeland security, including information relating to Federal funding, regulation, or acquisition. (c) Miscellaneous Provisions.-- (1) In general.--Nothing in this section shall be construed as authorizing the Secretary or the technical assistance team established under subsection (b)(3) to set standards for technology to be used by the Department, any other executive agency, any State or local government entity, or any private sector entity. (2) Certain proposals.--The technical assistance team established under subsection (b)(3) shall not consider or evaluate proposals submitted in response to a solicitation for offers for a pending procurement or for a specific agency requirement. (3) Coordination.--In carrying out this section, the Secretary shall coordinate with the Technical Support Working Group (organized under the April 1982 National Security Decision Directive Numbered 30). [...] SEC. 880. PROHIBITION OF THE TERRORISM INFORMATION AND PREVENTION SYSTEM. Any and all activities of the Federal Government to implement the proposed component program of the Citizen Corps known as Operation TIPS (Terrorism Information and Prevention System) are hereby prohibited. [...] SEC. 886. SENSE OF CONGRESS REAFFIRMING THE CONTINUED IMPORTANCE AND APPLICABILITY OF THE POSSE COMITATUS ACT. (a) Findings.--Congress finds the following: (1) Section 1385 of title 18, United States Code (commonly known as the "Posse Comitatus Act"), prohibits the use of the Armed Forces as a posse comitatus to execute the laws except in cases and under circumstances expressly authorized by the Constitution or Act of Congress. (2) Enacted in 1878, the Posse Comitatus Act was expressly intended to prevent United States Marshals, on their own initiative, from calling on the Army for assistance in enforcing Federal law. (3) The Posse Comitatus Act has served the Nation well in limiting the use of the Armed Forces to enforce the law. (4) Nevertheless, by its express terms, the Posse Comitatus Act is not a complete barrier to the use of the Armed Forces for a range of domestic purposes, including law enforcement functions, when the use of the Armed Forces is authorized by Act of Congress or the President determines that the use of the Armed Forces is required to fulfill the President's obligations under the Constitution to respond promptly in time of war, insurrection, or other serious emergency. (5) Existing laws, including chapter 15 of title 10, United States Code (commonly known as the "Insurrection Act"), and the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5121 et seq.), grant the President broad powers that may be invoked in the event of domestic emergencies, including an attack against the Nation using weapons of mass destruction, and these laws specifically authorize the President to use the Armed Forces to help restore public order. (b) Sense of Congress.--Congress reaffirms the continued importance of section 1385 of title 18, United States Code, and it is the sense of Congress that nothing in this Act should be construed to alter the applicability of such section to any use of the Armed Forces as a posse comitatus to execute the laws. [...] Subtitle I--Information Sharing SEC. 891. SHORT TITLE; FINDINGS; AND SENSE OF CONGRESS. (a) Short Title.--This subtitle may be cited as the "Homeland Security Information Sharing Act". (b) Findings.--Congress finds the following: (1) The Federal Government is required by the Constitution to provide for the common defense, which includes terrorist attack. (2) The Federal Government relies on State and local personnel to protect against terrorist attack. (3) The Federal Government collects, creates, manages, and protects classified and sensitive but unclassified information to enhance homeland security. (4) Some homeland security information is needed by the State and local personnel to prevent and prepare for terrorist attack. (5) The needs of State and local personnel to have access to relevant homeland security information to combat terrorism must be reconciled with the need to preserve the protected status of such information and to protect the sources and methods used to acquire such information. (6) Granting security clearances to certain State and local personnel is one way to facilitate the sharing of information regarding specific terrorist threats among Federal, State, and local levels of government. (7) Methods exist to declassify, redact, or otherwise adapt classified information so it may be shared with State and local personnel without the need for granting additional security clearances. (8) State and local personnel have capabilities and opportunities to gather information on suspicious activities and terrorist threats not possessed by Federal agencies. (9) The Federal Government and State and local governments and agencies in other jurisdictions may benefit from such information. (10) Federal, State, and local governments and intelligence, law enforcement, and other emergency preparation and response agencies must act in partnership to maximize the benefits of information gathering and analysis to prevent and respond to terrorist attacks. (11) Information systems, including the National Law Enforcement Telecommunications System and the Terrorist Threat Warning System, have been established for rapid sharing of classified and sensitive but unclassified information among Federal, State, and local entities. (12) Increased efforts to share homeland security information should avoid duplicating existing information systems. (c) Sense of Congress.--It is the sense of Congress that Federal, State, and local entities should share homeland security information to the maximum extent practicable, with special emphasis on hard-to-reach urban and rural communities. SEC. 892. FACILITATING HOMELAND SECURITY INFORMATION SHARING PROCEDURES. (a) Procedures for Determining Extent of Sharing of Homeland Security Information.-- (1) The President shall prescribe and implement procedures under which relevant Federal agencies-- (A) share relevant and appropriate homeland security information with other Federal agencies, including the Department, and appropriate State and local personnel; (B) identify and safeguard homeland security information that is sensitive but unclassified; and (C) to the extent such information is in classified form, determine whether, how, and to what extent to remove classified information, as appropriate, and with which such personnel it may be shared after such information is removed. (2) The President shall ensure that such procedures apply to all agencies of the Federal Government. (3) Such procedures shall not change the substantive requirements for the classification and safeguarding of classified information. (4) Such procedures shall not change the requirements and authorities to protect sources and methods. (b) Procedures for Sharing of Homeland Security Information.-- (1) Under procedures prescribed by the President, all appropriate agencies, including the intelligence community, shall, through information sharing systems, share homeland security information with Federal agencies and appropriate State and local personnel to the extent such information may be shared, as determined in accordance with [[Page H8681]] subsection (a), together with assessments of the credibility of such information. (2) Each information sharing system through which information is shared under paragraph (1) shall-- (A) have the capability to transmit unclassified or classified information, though the procedures and recipients for each capability may differ; (B) have the capability to restrict delivery of information to specified subgroups by geographic location, type of organization, position of a recipient within an organization, or a recipient's need to know such information; (C) be configured to allow the efficient and effective sharing of information; and (D) be accessible to appropriate State and local personnel. (3) The procedures prescribed under paragraph (1) shall establish conditions on the use of information shared under paragraph (1)-- (A) to limit the redissemination of such information to ensure that such information is not used for an unauthorized purpose; (B) to ensure the security and confidentiality of such information; (C) to protect the constitutional and statutory rights of any individuals who are subjects of such information; and (D) to provide data integrity through the timely removal and destruction of obsolete or erroneous names and information. (4) The procedures prescribed under paragraph (1) shall ensure, to the greatest extent practicable, that the information sharing system through which information is shared under such paragraph include existing information sharing systems, including, but not limited to, the National Law Enforcement Telecommunications System, the Regional Information Sharing System, and the Terrorist Threat Warning System of the Federal Bureau of Investigation. (5) Each appropriate Federal agency, as determined by the President, shall have access to each information sharing system through which information is shared under paragraph (1), and shall therefore have access to all information, as appropriate, shared under such paragraph. (6) The procedures prescribed under paragraph (1) shall ensure that appropriate State and local personnel are authorized to use such information sharing systems-- (A) to access information shared with such personnel; and (B) to share, with others who have access to such information sharing systems, the homeland security information of their own jurisdictions, which shall be marked appropriately as pertaining to potential terrorist activity. (7) Under procedures prescribed jointly by the Director of Central Intelligence and the Attorney General, each appropriate Federal agency, as determined by the President, shall review and assess the information shared under paragraph (6) and integrate such information with existing intelligence. (c) Sharing of Classified Information and Sensitive but Unclassified Information With State and Local Personnel.-- (1) The President shall prescribe procedures under which Federal agencies may, to the extent the President considers necessary, share with appropriate State and local personnel homeland security information that remains classified or otherwise protected after the determinations prescribed under the procedures set forth in subsection (a). (2) It is the sense of Congress that such procedures may include 1 or more of the following means: (A) Carrying out security clearance investigations with respect to appropriate State and local personnel. (B) With respect to information that is sensitive but unclassified, entering into nondisclosure agreements with appropriate State and local personnel. (C) Increased use of information-sharing partnerships that include appropriate State and local personnel, such as the Joint Terrorism Task Forces of the Federal Bureau of Investigation, the Anti-Terrorism Task Forces of the Department of Justice, and regional Terrorism Early Warning Groups. (d) Responsible Officials.--For each affected Federal agency, the head of such agency shall designate an official to administer this Act with respect to such agency. (e) Federal Control of Information.--Under procedures prescribed under this section, information obtained by a State or local government from a Federal agency under this section shall remain under the control of the Federal agency, and a State or local law authorizing or requiring such a government to disclose information shall not apply to such information. (f) Definitions.--As used in this section: (1) The term "homeland security information" means any information possessed by a Federal, State, or local agency that-- (A) relates to the threat of terrorist activity; (B) relates to the ability to prevent, interdict, or disrupt terrorist activity; (C) would improve the identification or investigation of a suspected terrorist or terrorist organization; or (D) would improve the response to a terrorist act. (2) The term "intelligence community" has the meaning given such term in section 3(4) of the National Security Act of 1947 (50 U.S.C. 401a(4)). (3) The term "State and local personnel" means any of the following persons involved in prevention, preparation, or response for terrorist attack: (A) State Governors, mayors, and other locally elected officials. (B) State and local law enforcement personnel and firefighters. (C) Public health and medical professionals. (D) Regional, State, and local emergency management agency personnel, including State adjutant generals. (E) Other appropriate emergency response agency personnel. (F) Employees of private-sector entities that affect critical infrastructure, cyber, economic, or public health security, as designated by the Federal government in procedures developed pursuant to this section. (4) The term "State" includes the District of Columbia and any commonwealth, territory, or possession of the United States. (g) Construction.--Nothing in this Act shall be construed as authorizing any department, bureau, agency, officer, or employee of the Federal Government to request, receive, or transmit to any other Government entity or personnel, or transmit to any State or local entity or personnel otherwise authorized by this Act to receive homeland security information, any information collected by the Federal Government solely for statistical purposes in violation of any other provision of law relating to the confidentiality of such information. SEC. 893. REPORT. (a) Report Required.--Not later than 12 months after the date of the enactment of this Act, the President shall submit to the congressional committees specified in subsection (b) a report on the implementation of section 892. The report shall include any recommendations for additional measures or appropriation requests, beyond the requirements of section 892, to increase the effectiveness of sharing of information between and among Federal, State, and local entities. (b) Specified Congressional Committees.--The congressional committees referred to in subsection (a) are the following committees: (1) The Permanent Select Committee on Intelligence and the Committee on the Judiciary of the House of Representatives. (2) The Select Committee on Intelligence and the Committee on the Judiciary of the Senate. SEC. 894. AUTHORIZATION OF APPROPRIATIONS. There are authorized to be appropriated such sums as may be necessary to carry out section 892. SEC. 895. AUTHORITY TO SHARE GRAND JURY INFORMATION. Rule 6(e) of the Federal Rules of Criminal Procedure is amended-- (1) in paragraph (2), by inserting ", or of guidelines jointly issued by the Attorney General and Director of Central Intelligence pursuant to Rule 6," after "Rule 6"; and (2) in paragraph (3)-- (A) in subparagraph (A)(ii), by inserting "or of a foreign government" after "(including personnel of a state or subdivision of a state"; (B) in subparagraph (C)(i)-- (i) in subclause (I), by inserting before the semicolon the following: "or, upon a request by an attorney for the government, when sought by a foreign court or prosecutor for use in an official criminal investigation"; (ii) in subclause (IV)-- (I) by inserting "or foreign" after "may disclose a violation of State"; (II) by inserting "or of a foreign government" after "to an appropriate official of a State or subdivision of a State"; and (III) by striking "or" at the end; (iii) by striking the period at the end of subclause (V) and inserting "; or"; and (iv) by adding at the end the following: "(VI) when matters involve a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, to any appropriate federal, state, local, or foreign government official for the purpose of preventing or responding to such a threat."; and (C) in subparagraph (C)(iii)-- (i) by striking "Federal"; (ii) by inserting "or clause (i)(VI)" after "clause (i)(V)"; and (iii) by adding at the end the following: "Any state, local, or foreign official who receives information pursuant to clause (i)(VI) shall use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.". SEC. 896. AUTHORITY TO SHARE ELECTRONIC, WIRE, AND ORAL INTERCEPTION INFORMATION. Section 2517 of title 18, United States Code, is amended by adding at the end the following: "(7) Any investigative or law enforcement officer, or other Federal official in carrying out official duties as such Federal official, who by any means authorized by this chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived therefrom, may disclose such contents or derivative evidence to a foreign investigative or law enforcement officer to the extent that such disclosure is appropriate to the proper performance of the [[Page H8682]] official duties of the officer making or receiving the disclosure, and foreign investigative or law enforcement officers may use or disclose such contents or derivative evidence to the extent such use or disclosure is appropriate to the proper performance of their official duties. "(8) Any investigative or law enforcement officer, or other Federal official in carrying out official duties as such Federal official, who by any means authorized by this chapter, has obtained knowledge of the contents of any wire, oral, or electronic communication, or evidence derived therefrom, may disclose such contents or derivative evidence to any appropriate Federal, State, local, or foreign government official to the extent that such contents or derivative evidence reveals a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, for the purpose of preventing or responding to such a threat. Any official who receives information pursuant to this provision may use that information only as necessary in the conduct of that person's official duties subject to any limitations on the unauthorized disclosure of such information, and any State, local, or foreign official who receives information pursuant to this provision may use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.". SEC. 897. FOREIGN INTELLIGENCE INFORMATION. (a) Dissemination Authorized.--Section 203(d)(1) of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Public Law 107-56; 50 U.S.C. 403- 5d) is amended by adding at the end the following: "Consistent with the responsibility of the Director of Central Intelligence to protect intelligence sources and methods, and the responsibility of the Attorney General to protect sensitive law enforcement information, it shall be lawful for information revealing a threat of actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power, domestic or international sabotage, domestic or international terrorism, or clandestine intelligence gathering activities by an intelligence service or network of a foreign power or by an agent of a foreign power, within the United States or elsewhere, obtained as part of a criminal investigation to be disclosed to any appropriate Federal, State, local, or foreign government official for the purpose of preventing or responding to such a threat. Any official who receives information pursuant to this provision may use that information only as necessary in the conduct of that person's official duties subject to any limitations on the unauthorized disclosure of such information, and any State, local, or foreign official who receives information pursuant to this provision may use that information only consistent with such guidelines as the Attorney General and Director of Central Intelligence shall jointly issue.". (b) Conforming Amendments.--Section 203(c) of that Act is amended-- (1) by striking "section 2517(6)" and inserting "paragraphs (6) and (8) of section 2517 of title 18, United States Code,"; and (2) by inserting "and (VI)" after "Rule 6(e)(3)(C)(i)(V)". SEC. 898. INFORMATION ACQUIRED FROM AN ELECTRONIC SURVEILLANCE. Section 106(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1806) is amended by inserting after "law enforcement officers" the following: "or law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)". SEC. 899. INFORMATION ACQUIRED FROM A PHYSICAL SEARCH. Section 305(k)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1825) is amended by inserting after "law enforcement officers" the following: "or law enforcement personnel of a State or political subdivision of a State (including the chief executive officer of that State or political subdivision who has the authority to appoint or direct the chief law enforcement officer of that State or political subdivision)". [...] TITLE X--INFORMATION SECURITY SEC. 1001. INFORMATION SECURITY. (a) Short Title.--This title may be cited as the "Federal Information Security Management Act of 2002". (b) Information Security.-- (1) In general.--Subchapter II of chapter 35 of title 44, United States Code, is amended to read as follows: "SUBCHAPTER II--INFORMATION SECURITY "Sec. 3531. Purposes "The purposes of this subchapter are to-- "(1) provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets; "(2) recognize the highly networked nature of the current Federal computing environment and provide effective governmentwide management and oversight of the related information security risks, including coordination of information security efforts throughout the civilian, national security, and law enforcement communities; "(3) provide for development and maintenance of minimum controls required to protect Federal information and information systems; "(4) provide a mechanism for improved oversight of Federal agency information security programs; "(5) acknowledge that commercially developed information security products offer advanced, dynamic, robust, and effective information security solutions, reflecting market solutions for the protection of critical information infrastructures important to the national defense and economic security of the nation that are designed, built, and operated by the private sector; and "(6) recognize that the selection of specific technical hardware and software information security solutions should be left to individual agencies from among commercially developed products.". "Sec. 3532. Definitions "(a) In General.--Except as provided under subsection (b), the definitions under section 3502 shall apply to this subchapter. "(b) Additional Definitions.--As used in this subchapter-- "(1) the term `information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide-- "(A) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; "(B) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; "(C) availability, which means ensuring timely and reliable access to and use of information; and "(D) authentication, which means utilizing digital credentials to assure the identity of users and validate their access; "(2) the term `national security system' means any information system (including any telecommunications system) used or operated by an agency or by a contractor of an agency, or other organization on behalf of an agency, the function, operation, or use of which-- "(A) involves intelligence activities; "(B) involves cryptologic activities related to national security; "(C) involves command and control of military forces; "(D) involves equipment that is an integral part of a weapon or weapons system; or "(E) is critical to the direct fulfillment of military or intelligence missions provided that this definition does not apply to a system that is used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications); "(3) the term `information technology' has the meaning given that term in section 11101 of title 40; and "(4) the term `information system' means any equipment or interconnected system or subsystems of equipment that is used in the [[Page H8683]] automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information, and includes-- "(A) computers and computer networks; "(B) ancillary equipment; "(C) software, firmware, and related procedures; "(D) services, including support services; and "(E) related resources.". "Sec. 3533. Authority and functions of the Director "(a) The Director shall oversee agency information security policies and practices, by-- "(1) promulgating information security standards under section 11331 of title 40; "(2) overseeing the implementation of policies, principles, standards, and guidelines on information security; "(3) requiring agencies, consistent with the standards promulgated under such section 11331 and the requirements of this subchapter, to identify and provide information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of-- "(A) information collected or maintained by or on behalf of an agency; or "(B) information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency; "(4) coordinating the development of standards and guidelines under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3) with agencies and offices operating or exercising control of national security systems (including the National Security Agency) to assure, to the maximum extent feasible, that such standards and guidelines are complementary with standards and guidelines developed for national security systems; "(5) overseeing agency compliance with the requirements of this subchapter, including through any authorized action under section 11303(b)(5) of title 40, to enforce accountability for compliance with such requirements; "(6) reviewing at least annually, and approving or disapproving, agency information security programs required under section 3534(b); "(7) coordinating information security policies and procedures with related information resources management policies and procedures; and "(8) reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this subchapter, including-- "(A) a summary of the findings of evaluations required by section 3535; "(B) significant deficiencies in agency information security practices; "(C) planned remedial action to address such deficiencies; and "(D) a summary of, and the views of the Director on, the report prepared by the National Institute of Standards and Technology under section 20(e)(7) of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3).". "(b) Except for the authorities described in paragraphs (4) and (7) of subsection (a), the authorities of the Director under this section shall not apply to national security systems. "Sec. 3534. Federal agency responsibilities "(a) The head of each agency shall-- "(1) be responsible for-- "(A) providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of-- "(i) information collected or maintained by or on behalf of the agency; and "(ii) information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency; "(B) complying with the requirements of this subchapter and related policies, procedures, standards, and guidelines, including-- "(i) information security standards promulgated by the Director under section 11331 of title 40; and "(ii) information security standards and guidelines for national security systems issued in accordance with law and as directed by the President; and "(C) ensuring that information security management processes are integrated with agency strategic and operational planning processes; "(2) ensure that senior agency officials provide information security for the information and information systems that support the operations and assets under their control, including through-- "(A) assessing the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of such information or information systems; "(B) determining the levels of information security appropriate to protect such information and information systems in accordance with standards promulgated under section 11331 of title 40 for information security classifications and related requirements; "(C) implementing policies and procedures to cost- effectively reduce risks to an acceptable level; and "(D) periodically testing and evaluating information security controls and techniques to ensure that they are effectively implemented; "(3) delegate to the agency Chief Information Officer established under section 3506 (or comparable official in an agency not covered by such section) the authority to ensure compliance with the requirements imposed on the agency under this subchapter, including-- "(A) designating a senior agency information security officer who shall-- "(i) carry out the Chief Information Officer's responsibilities under this section; "(ii) possess professional qualifications, including training and experience, required to administer the functions described under this section; "(iii) have information security duties as that official's primary duty; and "(iv) head an office with the mission and resources to assist in ensuring agency compliance with this section; "(B) developing and maintaining an agencywide information security program as required by subsection (b); "(C) developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements, including those issued under section 3533 of this title, and section 11331 of title 40; "(D) training and overseeing personnel with significant responsibilities for information security with respect to such responsibilities; and "(E) assisting senior agency officials concerning their responsibilities under paragraph (2); "(4) ensure that the agency has trained personnel sufficient to assist the agency in complying with the requirements of this subchapter and related policies, procedures, standards, and guidelines; and "(5) ensure that the agency Chief Information Officer, in coordination with other senior agency officials, reports annually to the agency head on the effectiveness of the agency information security program, including progress of remedial actions. "(b) Each agency shall develop, document, and implement an agencywide information security program, approved by the Director under section 3533(a)(5), to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source, that includes-- "(1) periodic assessments of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency; "(2) policies and procedures that-- "(A) are based on the risk assessments required by paragraph (1); "(B) cost-effectively reduce information security risks to an acceptable level; "(C) ensure that information security is addressed throughout the life cycle of each agency information system; and "(D) ensure compliance with-- "(i) the requirements of this subchapter; "(ii) policies and procedures as may be prescribed by the Director, and information security standards promulgated under section 11331 of title 40; "(iii) minimally acceptable system configuration requirements, as determined by the agency; and "(iv) any other applicable requirements, including standards and guidelines for national security systems issued in accordance with law and as directed by the President; "(3) subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate; "(4) security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency, of-- "(A) information security risks associated with their activities; and "(B) their responsibilities in complying with agency policies and procedures designed to reduce these risks; "(5) periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, to be performed with a frequency depending on risk, but no less than annually, of which such testing-- "(A) shall include testing of management, operational, and technical controls of every information system identified in the inventory required under section 3505(c); and "(B) may include testing relied on in a evaluation under section 3535; "(6) a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of the agency; "(7) procedures for detecting, reporting, and responding to security incidents, including-- "(A) mitigating risks associated with such incidents before substantial damage is done; and "(B) notifying and consulting with, as appropriate-- "(i) law enforcement agencies and relevant Offices of Inspector General; "(ii) an office designated by the President for any incident involving a national security system; and "(iii) any other agency or office, in accordance with law or as directed by the President; and [[Page H8684]] "(8) plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. "(c) Each agency shall-- "(1) report annually to the Director, the Committees on Government Reform and Science of the House of Representatives, the Committees on Governmental Affairs and Commerce, Science, and Transportation of the Senate, the appropriate authorization and appropriations committees of Congress, and the Comptroller General on the adequacy and effectiveness of information security policies, procedures, and practices, and compliance with the requirements of this subchapter, including compliance with each requirement of subsection (b); "(2) address the adequacy and effectiveness of information security policies, procedures, and practices in plans and reports relating to-- "(A) annual agency budgets; "(B) information resources management under subchapter 1 of this chapter; "(C) information technology management under subtitle III of title 40; "(D) program performance under sections 1105 and 1115 through 1119 of title 31, and sections 2801 and 2805 of title 39; "(E) financial management under chapter 9 of title 31, and the Chief Financial Officers Act of 1990 (31 U.S.C. 501 note; Public Law 101-576) (and the amendments made by that Act); "(F) financial management systems under the Federal Financial Management Improvement Act (31 U.S.C. 3512 note); and "(G) internal accounting and administrative controls under section 3512 of title 31, United States Code, (known as the `Federal Managers Financial Integrity Act'); and "(3) report any significant deficiency in a policy, procedure, or practice identified under paragraph (1) or (2)-- "(A) as a material weakness in reporting under section 3512 of title 31; and "(B) if relating to financial management systems, as an instance of a lack of substantial compliance under the Federal Financial Management Improvement Act (31 U.S.C. 3512 note). "(d)(1) In addition to the requirements of subsection (c), each agency, in consultation with the Director, shall include as part of the performance plan required under section 1115 of title 31 a description of-- "(A) the time periods, and "(B) the resources, including budget, staffing, and training, that are necessary to implement the program required under subsection (b). "(2) The description under paragraph (1) shall be based on the risk assessments required under subsection (b)(2)(1). "(e) Each agency shall provide the public with timely notice and opportunities for comment on proposed information security policies and procedures to the extent that such policies and procedures affect communication with the public. "Sec. 3535. Annual independent evaluation "(a)(1) Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such program and practices. "(2) Each evaluation by an agency under this section shall include-- "(A) testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agency's information systems; "(B) an assessment (made on the basis of the results of the testing) of compliance with-- "(i) the requirements of this subchapter; and "(ii) related information security policies, procedures, standards, and guidelines; and "(C) separate presentations, as appropriate, regarding information security relating to national security systems. "(b) Subject to subsection (c)-- "(1) for each agency with an Inspector General appointed under the Inspector General Act of 1978, the annual evaluation required by this section shall be performed by the Inspector General or by an independent external auditor, as determined by the Inspector General of the agency; and "(2) for each agency to which paragraph (1) does not apply, the head of the agency shall engage an independent external auditor to perform the evaluation. "(c) For each agency operating or exercising control of a national security system, that portion of the evaluation required by this section directly relating to a national security system shall be performed-- "(1) only by an entity designated by the agency head; and "(2) in such a manner as to ensure appropriate protection for information associated with any information security vulnerability in such system commensurate with the risk and in accordance with all applicable laws. "(d) The evaluation required by this section-- "(1) shall be performed in accordance with generally accepted government auditing standards; and "(2) may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable agency. "(e) Each year, not later than such date established by the Director, the head of each agency shall submit to the Director the results of the evaluation required under this section. "(f) Agencies and evaluators shall take appropriate steps to ensure the protection of information which, if disclosed, may adversely affect information security. Such protections shall be commensurate with the risk and comply with all applicable laws and regulations. "(g)(1) The Director shall summarize the results of the evaluations conducted under this section in the report to Congress required under section 3533(a)(8). "(2) The Director's report to Congress under this subsection shall summarize information regarding information security relating to national security systems in such a manner as to ensure appropriate protection for information associated with any information security vulnerability in such system commensurate with the risk and in accordance with all applicable laws. "(3) Evaluations and any other descriptions of information systems under the authority and control of the Director of Central Intelligence or of National Foreign Intelligence Programs systems under the authority and control of the Secretary of Defense shall be made available to Congress only through the appropriate oversight committees of Congress, in accordance with applicable laws. "(h) The Comptroller General shall periodically evaluate and report to Congress on-- "(1) the adequacy and effectiveness of agency information security policies and practices; and "(2) implementation of the requirements of this subchapter. "Sec. 3536. National security systems "The head of each agency operating or exercising control of a national security system shall be responsible for ensuring that the agency-- "(1) provides information security protections commensurate with the risk and magnitude of the harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information contained in such system; "(2) implements information security policies and practices as required by standards and guidelines for national security systems, issued in accordance with law and as directed by the President; and "(3) complies with the requirements of this subchapter. "Sec. 3537. Authorization of appropriations "There are authorized to be appropriated to carry out the provisions of this subchapter such sums as may be necessary for each of fiscal years 2003 through 2007. "Sec. 3538. Effect on existing law "Nothing in this subchapter, section 11331 of title 40, or section 20 of the National Standards and Technology Act (15 U.S.C. 278g-3) may be construed as affecting the authority of the President, the Office of Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized use or disclosure of information, including with regard to the protection of personal privacy under section 552a of title 5, the disclosure of information under section 552 of title 5, the management and disposition of records under chapters 29, 31, or 33 of title 44, the management of information resources under subchapter I of chapter 35 of this title, or the disclosure of information to Congress or the Comptroller General of the United States.". (2) Clerical amendment.--The items in the table of sections at the beginning of such chapter 35 under the heading "SUBCHAPTER II" are amended to read as follows: "3531. Purposes. "3532. Definitions. "3533. Authority and functions of the Director. "3534. Federal agency responsibilities. "3535. Annual independent evaluation. "3536. National security systems. "3537. Authorization of appropriations. "3538. Effect on existing law.". (c) Information Security Responsibilities of Certain Agencies.-- (1) National security responsibilities.--(A) Nothing in this Act (including any amendment made by this Act) shall supersede any authority of the Secretary of Defense, the Director of Central Intelligence, or other agency head, as authorized by law and as directed by the President, with regard to the operation, control, or management of national security systems, as defined by section 3532(3) of title 44, United States Code. (B) Section 2224 of title 10, United States Code, is amended-- (i) in subsection 2224(b), by striking "(b) Objectives and Minimum Requirements.--(1)" and inserting "(b) Objectives of the Program.--"; (ii) in subsection 2224(b), by striking "(2) the program shall at a minimum meet the requirements of section 3534 and 3535 of title 44, United States Code."; and (iii) in subsection 2224(c), by inserting ", including through compliance with subtitle II of chapter 35 of title 44" after "infrastructure". (2) Atomic energy act of 1954.--Nothing in this Act shall supersede any requirement made by or under the Atomic Energy Act of 1954 (42 U.S.C. 2011 et seq.). Restricted Data or Formerly Restricted Data shall be handled, protected, classified, downgraded, and declassified in conformity with the Atomic Energy Act of 1954 (42 U.S.C. 2011 et seq.). [[Page H8685]] SEC. 1002. MANAGEMENT OF INFORMATION TECHNOLOGY. (a) In General.--Section 11331 of title 40, United States Code, is amended to read as follows: "Sec. 11331. Responsibilities for Federal information systems standards "(a) Definition.--In this section, the term `information security' has the meaning given that term in section 3532(b)(1) of title 44. "(b) Requirement to Prescribe Standards.-- "(1) In general.-- "(A) Requirement.--Except as provided under paragraph (2), the Director of the Office of Management and Budget shall, on the basis of proposed standards developed by the National Institute of Standards and Technology pursuant to paragraphs (2) and (3) of section 20(a) of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3(a)) and in consultation with the Secretary of Homeland Security, promulgate information security standards pertaining to Federal information systems. "(B) Required standards.--Standards promulgated under subparagraph (A) shall include-- "(i) standards that provide minimum information security requirements as determined under section 20(b) of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3(b)); and "(ii) such standards that are otherwise necessary to improve the efficiency of operation or security of Federal information systems. "(C) Required standards binding.--Information security standards described under subparagraph (B) shall be compulsory and binding. "(2) Standards and guidelines for national security systems.--Standards and guidelines for national security systems, as defined under section 3532(3) of title 44, shall be developed, promulgated, enforced, and overseen as otherwise authorized by law and as directed by the President. "(c) Application of More Stringent Standards.--The head of an agency may employ standards for the cost-effective information security for all operations and assets within or under the supervision of that agency that are more stringent than the standards promulgated by the Director under this section, if such standards-- "(1) contain, at a minimum, the provisions of those applicable standards made compulsory and binding by the Director; and "(2) are otherwise consistent with policies and guidelines issued under section 3533 of title 44. "(d) Requirements Regarding Decisions by Director.-- "(1) Deadline.--The decision regarding the promulgation of any standard by the Director under subsection (b) shall occur not later than 6 months after the submission of the proposed standard to the Director by the National Institute of Standards and Technology, as provided under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3). "(2) Notice and comment.--A decision by the Director to significantly modify, or not promulgate, a proposed standard submitted to the Director by the National Institute of Standards and Technology, as provided under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3), shall be made after the public is given an opportunity to comment on the Director's proposed decision.". (b) Clerical Amendment.--The table of sections at the beginning of chapter 113 of title 40, United States Code, is amended by striking the item relating to section 11331 and inserting the following: "11331. Responsibilities for Federal information systems standards.". SEC. 1003. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-3), is amended by striking the text and inserting the following: "(a) The Institute shall-- "(1) have the mission of developing standards, guidelines, and associated methods and techniques for information systems; "(2) develop standards and guidelines, including minimum requirements, for information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency, other than national security systems (as defined in section 3532(b)(2) of title 44, United States Code); "(3) develop standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets, but such standards and guidelines shall not apply to national security systems; and "(4) carry out the responsibilities described in paragraph (3) through the Computer Security Division. "(b) The standards and guidelines required by subsection (a) shall include, at a minimum-- "(1)(A) standards to be used by all agencies to categorize all information and information systems collected or maintained by or on behalf of each agency based on the objectives of providing appropriate levels of information security according to a range of risk levels; "(B) guidelines recommending the types of information and information systems to be included in each such category; and "(C) minimum information security requirements for information and information systems in each such category; "(2) a definition of and guidelines concerning detection and handling of information security incidents; and "(3) guidelines developed in coordination with the National Security Agency for identifying an information system as a national security system consistent with applicable requirements for national security systems, issued in accordance with law and as directed by the President. "(c) In developing standards and guidelines required by subsections (a) and (b), the Institute shall-- "(1) consult with other agencies and offices (including, but not limited to, the Director of the Office of Management and Budget, the Departments of Defense and Energy, the National Security Agency, the General Accounting Office, and the Secretary of Homeland Security) to assure-- "(A) use of appropriate information security policies, procedures, and techniques, in order to improve information security and avoid unnecessary and costly duplication of effort; and "(B) that such standards and guidelines are complementary with standards and guidelines employed for the protection of national security systems and information contained in such systems; "(2) provide the public with an opportunity to comment on proposed standards and guidelines; "(3) submit to the Director of the Office of Management and Budget for promulgation under section 11331 of title 40, United States Code-- "(A) standards, as required under subsection (b)(1)(A), no later than 12 months after the date of the enactment of this section; and "(B) minimum information security requirements for each category, as required under subsection (b)(1)(C), no later than 36 months after the date of the enactment of this section; "(4) issue guidelines as required under subsection (b)(1)(B), no later than 18 months after the date of the enactment of this Act; "(5) ensure that such standards and guidelines do not require specific technological solutions or products, including any specific hardware or software security solutions; "(6) ensure that such standards and guidelines provide for sufficient flexibility to permit alternative solutions to provide equivalent levels of protection for identified information security risks; and "(7) use flexible, performance-based standards and guidelines that, to the greatest extent possible, permit the use of off-the-shelf commercially developed information security products. "(d) The Institute shall-- "(1) submit standards developed pursuant to subsection (a), along with recommendations as to the extent to which these should be made compulsory and binding, to the Director of the Office of Management and Budget for promulgation under section 11331 of title 40, United States Code; "(2) provide assistance to agencies regarding-- "(A) compliance with the standards and guidelines developed under subsection (a); "(B) detecting and handling information security incidents; and "(C) information security policies, procedures, and practices; "(3) conduct research, as needed, to determine the nature and extent of information security vulnerabilities and techniques for providing cost-effective information security; "(4) develop and periodically revise performance indicators and measures for agency information security policies and practices; "(5) evaluate private sector information security policies and practices and commercially available information technologies to assess potential application by agencies to strengthen information security; "(6) evaluate security policies and practices developed for national security systems to assess potential application by agencies to strengthen information security; "(7) periodically assess the effectiveness of standards and guidelines developed under this section and undertake revisions as appropriate; "(8) solicit and consider the recommendations of the Information Security and Privacy Advisory Board, established by section 21, regarding standards and guidelines developed under subsection (a) and submit such recommendations to the Director of the Office of Management and Budget with such standards submitted to the Director; and "(9) prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this section. "(e) As used in this section-- "(1) the term `agency' has the same meaning as provided in section 3502(1) of title 44, United States Code; "(2) the term `information security' has the same meaning as provided in section 3532(1) of such title; "(3) the term `information system' has the same meaning as provided in section 3502(8) of such title; "(4) the term `information technology' has the same meaning as provided in section 11101 of title 40, United States Code; and "(5) the term `national security system' has the same meaning as provided in section 3532(b)(2) of such title.". [[Page H8686]] SEC. 1004. INFORMATION SECURITY AND PRIVACY ADVISORY BOARD. Section 21 of the National Institute of Standards and Technology Act (15 U.S.C. 278g-4), is amended-- (1) in subsection (a), by striking "Computer System Security and Privacy Advisory Board" and inserting "Information Security and Privacy Advisory Board"; (2) in subsection (a)(1), by striking "computer or telecommunications" and inserting "information technology"; (3) in subsection (a)(2)-- (A) by striking "computer or telecommunications technology" and inserting "information technology"; and (B) by striking "computer or telecommunications equipment" and inserting "information technology"; (4) in subsection (a)(3)-- (A) by striking "computer systems" and inserting "information system"; and (B) by striking "computer systems security" and inserting "information security"; (5) in subsection (b)(1) by striking "computer systems security" and inserting "information security"; (6) in subsection (b) by striking paragraph (2) and inserting the following: "(2) to advise the Institute and the Director of the Office of Management and Budget on information security and privacy issues pertaining to Federal Government information systems, including through review of proposed standards and guidelines developed under section 20; and"; (7) in subsection (b)(3) by inserting "annually" after "report"; (8) by inserting after subsection (e) the following new subsection: "(f) The Board shall hold meetings at such locations and at such time and place as determined by a majority of the Board."; (9) by redesignating subsections (f) and (g) as subsections (g) and (h), respectively; and (10) by striking subsection (h), as redesignated by paragraph (9), and inserting the following: "(h) As used in this section, the terms "information system" and "information technology" have the meanings given in section 20.". SEC. 1005. TECHNICAL AND CONFORMING AMENDMENTS. (a) Federal Computer System Security Training and Plan.-- (1) Repeal.--Section 11332 of title 40, United States Code, is repealed. (2) Clerical amendment.--The table of sections at the beginning of chapter 113 of title 40, United States Code, as amended by striking the item relating to section 11332. (b) Floyd D. Spence National Defense Authorization Act for Fiscal Year 2001.--The Floyd D. Spence National Defense Authorization Act for Fiscal Year 2001 (Public Law 106-398) is amended by striking subtitle G of title X (44 U.S.C. 3531 note). (c) Paperwork Reduction Act.--(1) Section 3504(g) of title 44, United States Code, is amended-- (A) by adding "and" at the end of paragraph (1); (B) in paragraph (2)-- (i) by striking "sections 11331 and 11332(b) and (c) of title 40" and inserting "section 11331 of title 40 and subchapter II of this title"; and (ii) by striking the semicolon and inserting a period; and (C) by striking paragraph (3). (2) Section 3505 of such title is amended by adding at the end the following: "(c) Inventory of Information Systems.--(1) The head of each agency shall develop and maintain an inventory of the information systems (including national security systems) operated by or under the control of such agency; "(2) The identification of information systems in an inventory under this subsection shall include an identification of the interfaces between each such system and all other systems or networks, including those not operated by or under the control of the agency; "(3) Such inventory shall be-- "(A) updated at least annually; "(B) made available to the Comptroller General; and "(C) used to support information resources management, including-- "(i) preparation and maintenance of the inventory of information resources under section 3506(b)(4); "(ii) information technology planning, budgeting, acquisition, and management under section 3506(h), subtitle III of title 40, and related laws and guidance; "(iii) monitoring, testing, and evaluation of information security controls under subchapter II; "(iv) preparation of the index of major information systems required under section 552(g) of title 5, United States Code; and "(v) preparation of information system inventories required for records management under chapters 21, 29, 31, and 33. "(4) The Director shall issue guidance for and oversee the implementation of the requirements of this subsection.". (3) Section 3506(g) of such title is amended-- (A) by adding "and" at the end of paragraph (1); (B) in paragraph (2)-- (i) by striking "section 11332 of title 40" and inserting "subchapter II of this chapter"; and (ii) by striking "; and" and inserting a period; and (C) by striking paragraph (3). SEC. 1006. CONSTRUCTION. Nothing in this Act, or the amendments made by this Act, affects the authority of the National Institute of Standards and Technology or the Department of Commerce relating to the development and promulgation of standards or guidelines under paragraphs (1) and (2) of section 20(a) of the National Institute of Standards and Technology Act (15 U.S.C. 278g- 3(a)). [...]