FAS Note: Following are excerpts on information policy from the Homeland Security Act of 2002, as adopted by the House of Representatives on November 13, 2002.

                     HOMELAND SECURITY ACT OF 2002

  Mr. ARMEY. Mr. Speaker, pursuant to House Resolution 600, I call up
the bill (H.R. 5710) to establish the Department of Homeland Security,
and for other purposes, and ask for its immediate consideration.
  The Clerk read the title of the bill.
  The text of H.R. 5710 is as follows:

                               H.R. 5710

       Be it enacted by the Senate and House of Representatives of
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

       (a) Short Title.--This Act may be cited as the "Homeland
     Security Act of 2002".
       (b) Table of Contents.--The table of contents for this Act
     is as follows:

[...]

      TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

  Subtitle A--Directorate for Information Analysis and Infrastructure
                   Protection; Access to Information

Sec. 201. Directorate for Information Analysis and Infrastructure
              Protection.
Sec. 202. Access to information.

            Subtitle B--Critical Infrastructure Information

Sec. 211. Short title.
Sec. 212. Definitions.
Sec. 213. Designation of critical infrastructure protection program.
Sec. 214. Protection of voluntarily shared critical infrastructure
              information.
Sec. 215. No private right of action.

                    Subtitle C--Information Security

Sec. 221. Procedures for sharing information.
Sec. 222. Privacy Officer.
Sec. 223. Enhancement of non-Federal cybersecurity.
Sec. 224. Net guard.
Sec. 225. Cyber Security Enhancement Act of 2002.

[...]

   TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

Sec. 301. Under Secretary for Science and Technology.
Sec. 302. Responsibilities and authorities of the Under Secretary for
              Science and Technology.
Sec. 303. Functions transferred.
Sec. 304. Conduct of certain public health-related activities.
Sec. 305. Federally funded research and development centers.
Sec. 306. Miscellaneous provisions.
Sec. 307. Homeland Security Advanced Research Projects Agency.
Sec. 308. Conduct of research, development, demonstration, testing and
              evaluation.
Sec. 309. Utilization of Department of Energy national laboratories and
              sites in support of homeland security activities.
Sec. 310. Transfer of Plum Island Animal Disease Center, Department of
              Agriculture.
Sec. 311. Homeland Security Science and Technology Advisory Committee.
Sec. 312. Homeland Security Institute.
Sec. 313. Technology clearinghouse to encourage and support innovative
              solutions to enhance homeland security.


TITLE VIII--COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL;
     UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS

[...]

Sec. 880. Prohibition of the Terrorism Information and Prevention
              System.

[...]

Sec. 886. Sense of Congress reaffirming the continued importance and
              applicability of the Posse Comitatus Act.

[...]

                    Subtitle I--Information Sharing

Sec. 891. Short title; findings; and sense of Congress.
Sec. 892. Facilitating homeland security information sharing
              procedures.
Sec. 893. Report.
Sec. 894. Authorization of appropriations.
Sec. 895. Authority to share grand jury information.
Sec. 896. Authority to share electronic, wire, and oral interception
              information.
Sec. 897. Foreign intelligence information.
Sec. 898. Information acquired from an electronic surveillance.
Sec. 899. Information acquired from a physical search.

[...]

                     TITLE X--INFORMATION SECURITY

Sec. 1001. Information security.
Sec. 1002. Management of information technology.
Sec. 1003. National Institute of Standards and Technology.
Sec. 1004. Information Security and Privacy Advisory Board.
Sec. 1005. Technical and conforming amendments.
Sec. 1006. Construction.


	 [...]

	       TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

  Subtitle A--Directorate for Information Analysis and Infrastructure
                   Protection; Access to Information

     SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND
                   INFRASTRUCTURE PROTECTION.

       (a) Under Secretary of Homeland Security for Information
     Analysis and Infrastructure Protection.--
       (1) In general.--There shall be in the Department a
     Directorate for Information Analysis and Infrastructure
     Protection headed by an Under Secretary for Information
     Analysis and Infrastructure Protection, who shall be
     appointed by the President, by and with the advice and
     consent of the Senate.
       (2) Responsibilities.--The Under Secretary shall assist the
     Secretary in discharging the responsibilities assigned by the
     Secretary.
       (b) Assistant Secretary for Information Analysis; Assistant
     Secretary for Infrastructure Protection.--
       (1) Assistant secretary for information analysis.--There
     shall be in the Department an Assistant Secretary for
     Information Analysis, who shall be appointed by the
     President.
       (2) Assistant secretary for infrastructure protection.--
     There shall be in the Department an Assistant Secretary for
     Infrastructure Protection, who shall be appointed by the
     President.
       (3) Responsibilities.--The Assistant Secretary for
     Information Analysis and the Assistant Secretary for
     Infrastructure Protection shall assist the Under Secretary
     for Information Analysis and Infrastructure Protection in
     discharging the responsibilities of the Under Secretary under
     this section.
       (c) Discharge of Information Analysis and Infrastructure
     Protection.--The Secretary shall ensure that the
     responsibilities of the Department regarding information
     analysis and infrastructure protection are carried out
     through the Under Secretary for Information Analysis and
     Infrastructure Protection.
       (d) Responsibilities of Under Secretary.--Subject to the
     direction and control of the Secretary, the responsibilities
     of the Under Secretary for Information Analysis and
     Infrastructure Protection shall be as follows:
       (1) To access, receive, and analyze law enforcement
     information, intelligence information, and other information
     from agencies of the Federal Government, State and local
     government agencies (including law enforcement agencies), and
     private sector entities, and to integrate such information in
     order to--
       (A) identify and assess the nature and scope of terrorist
     threats to the homeland;
       (B) detect and identify threats of terrorism against the
     United States; and
       (C) understand such threats in light of actual and
     potential vulnerabilities of the homeland.
       (2) To carry out comprehensive assessments of the
     vulnerabilities of the key resources and critical
     infrastructure of the United States, including the
     performance of risk assessments to determine the risks posed
     by particular types of terrorist attacks

[[Page H8651]]

     within the United States (including an assessment of the
     probability of success of such attacks and the feasibility
     and potential efficacy of various countermeasures to such
     attacks).
       (3) To integrate relevant information, analyses, and
     vulnerability assessments (whether such information,
     analyses, or assessments are provided or produced by the
     Department or others) in order to identify priorities for
     protective and support measures by the Department, other
     agencies of the Federal Government, State and local
     government agencies and authorities, the private sector, and
     other entities.
       (4) To ensure, pursuant to section 202, the timely and
     efficient access by the Department to all information
     necessary to discharge the responsibilities under this
     section, including obtaining such information from other
     agencies of the Federal Government.
       (5) To develop a comprehensive national plan for securing
     the key resources and critical infrastructure of the United
     States, including power production, generation, and
     distribution systems, information technology and
     telecommunications systems (including satellites), electronic
     financial and property record storage and transmission
     systems, emergency preparedness communications systems, and
     the physical and technological assets that support such
     systems.
       (6) To recommend measures necessary to protect the key
     resources and critical infrastructure of the United States in
     coordination with other agencies of the Federal Government
     and in cooperation with State and local government agencies
     and authorities, the private sector, and other entities.
       (7) To administer the Homeland Security Advisory System,
     including--
       (A) exercising primary responsibility for public advisories
     related to threats to homeland security; and
       (B) in coordination with other agencies of the Federal
     Government, providing specific warning information, and
     advice about appropriate protective measures and
     countermeasures, to State and local government agencies and
     authorities, the private sector, other entities, and the
     public.
       (8) To review, analyze, and make recommendations for
     improvements in the policies and procedures governing the
     sharing of law enforcement information, intelligence
     information, intelligence-related information, and other
     information relating to homeland security within the Federal
     Government and between the Federal Government and State and
     local government agencies and authorities.
       (9) To disseminate, as appropriate, information analyzed by
     the Department within the Department, to other agencies of
     the Federal Government with responsibilities relating to
     homeland security, and to agencies of State and local
     governments and private sector entities with such
     responsibilities in order to assist in the deterrence,
     prevention, preemption of, or response to, terrorist attacks
     against the United States.
       (10) To consult with the Director of Central Intelligence
     and other appropriate intelligence, law enforcement, or other
     elements of the Federal Government to establish collection
     priorities and strategies for information, including law
     enforcement-related information, relating to threats of
     terrorism against the United States through such means as the
     representation of the Department in discussions regarding
     requirements and priorities in the collection of such
     information.
       (11) To consult with State and local governments and
     private sector entities to ensure appropriate exchanges of
     information, including law enforcement-related information,
     relating to threats of terrorism against the United States.
       (12) To ensure that--
       (A) any material received pursuant to this Act is protected
     from unauthorized disclosure and handled and used only for
     the performance of official duties; and
       (B) any intelligence information under this Act is shared,
     retained, and disseminated consistent with the authority of
     the Director of Central Intelligence to protect intelligence
     sources and methods under the National Security Act of 1947
     (50 U.S.C. 401 et seq.) and related procedures and, as
     appropriate, similar authorities of the Attorney General
     concerning sensitive law enforcement information.
       (13) To request additional information from other agencies
     of the Federal Government, State and local government
     agencies, and the private sector relating to threats of
     terrorism in the United States, or relating to other areas of
     responsibility assigned by the Secretary, including the entry
     into cooperative agreements through the Secretary to obtain
     such information.
       (14) To establish and utilize, in conjunction with the
     chief information officer of the Department, a secure
     communications and information technology infrastructure,
     including data-mining and other advanced analytical tools, in
     order to access, receive, and analyze data and information in
     furtherance of the responsibilities under this section, and
     to disseminate information acquired and analyzed by the
     Department, as appropriate.
       (15) To ensure, in conjunction with the chief information
     officer of the Department, that any information databases and
     analytical tools developed or utilized by the Department--
       (A) are compatible with one another and with relevant
     information databases of other agencies of the Federal
     Government; and
       (B) treat information in such databases in a manner that
     complies with applicable Federal law on privacy.
       (16) To coordinate training and other support to the
     elements and personnel of the Department, other agencies of
     the Federal Government, and State and local governments that
     provide information to the Department, or are consumers of
     information provided by the Department, in order to
     facilitate the identification and sharing of information
     revealed in their ordinary duties and the optimal utilization
     of information received from the Department.
       (17) To coordinate with elements of the intelligence
     community and with Federal, State, and local law enforcement
     agencies, and the private sector, as appropriate.
       (18) To provide intelligence and information analysis and
     support to other elements of the Department.
       (19) To perform such other duties relating to such
     responsibilities as the Secretary may provide.
       (e) Staff.--
       (1) In general.--The Secretary shall provide the
     Directorate with a staff of analysts having appropriate
     expertise and experience to assist the Directorate in
     discharging responsibilities under this section.
       (2) Private sector analysts.--Analysts under this
     subsection may include analysts from the private sector.
       (3) Security clearances.--Analysts under this subsection
     shall possess security clearances appropriate for their work
     under this section.
       (f) Detail of Personnel.--
       (1) In general.--In order to assist the Directorate in
     discharging responsibilities under this section, personnel of
     the agencies referred to in paragraph (2) may be detailed to
     the Department for the performance of analytic functions and
     related duties.
       (2) Covered agencies.--The agencies referred to in this
     paragraph are as follows:
       (A) The Department of State.
       (B) The Central Intelligence Agency.
       (C) The Federal Bureau of Investigation.
       (D) The National Security Agency.
       (E) The National Imagery and Mapping Agency.
       (F) The Defense Intelligence Agency.
       (G) Any other agency of the Federal Government that the
     President considers appropriate.
       (3) Cooperative agreements.--The Secretary and the head of
     the agency concerned may enter into cooperative agreements
     for the purpose of detailing personnel under this subsection.
       (4) Basis.--The detail of personnel under this subsection
     may be on a reimbursable or non-reimbursable basis.
       (g) Functions Transferred.--In accordance with title XV,
     there shall be transferred to the Secretary, for assignment
     to the Under Secretary for Information Analysis and
     Infrastructure Protection under this section, the functions,
     personnel, assets, and liabilities of the following:
       (1) The National Infrastructure Protection Center of the
     Federal Bureau of Investigation (other than the Computer
     Investigations and Operations Section), including the
     functions of the Attorney General relating thereto.
       (2) The National Communications System of the Department of
     Defense, including the functions of the Secretary of Defense
     relating thereto.
       (3) The Critical Infrastructure Assurance Office of the
     Department of Commerce, including the functions of the
     Secretary of Commerce relating thereto.
       (4) The National Infrastructure Simulation and Analysis
     Center of the Department of Energy and the energy security
     and assurance program and activities of the Department,
     including the functions of the Secretary of Energy relating
     thereto.
       (5) The Federal Computer Incident Response Center of the
     General Services Administration, including the functions of
     the Administrator of General Services relating thereto.
       (h) Inclusion of Certain Elements of the Department as
     Elements of the Intelligence Community.--Section 3(4) of the
     National Security Act of 1947 (50 U.S.C. 401(a)) is amended--
       (1) by striking "and" at the end of subparagraph (I);
       (2) by redesignating subparagraph (J) as subparagraph (K);
     and
       (3) by inserting after subparagraph (I) the following new
     subparagraph:
       "(J) the elements of the Department of Homeland Security
     concerned with the analyses of foreign intelligence
     information; and".

     SEC. 202. ACCESS TO INFORMATION.

       (a) In General.--
       (1) Threat and vulnerability information.--Except as
     otherwise directed by the President, the Secretary shall have
     such access as the Secretary considers necessary to all
     information, including reports, assessments, analyses, and
     unevaluated intelligence relating to threats of terrorism
     against the United States and to other areas of
     responsibility assigned by the Secretary, and to all
     information concerning infrastructure or other
     vulnerabilities of the United States to terrorism, whether or
     not such information has been analyzed, that may be
     collected, possessed, or prepared by any agency of the
     Federal Government.
       (2) Other information.--The Secretary shall also have
     access to other information

[[Page H8652]]

     relating to matters under the responsibility of the Secretary
     that may be collected, possessed, or prepared by an agency of
     the Federal Government as the President may further provide.
       (b) Manner of Access.--Except as otherwise directed by the
     President, with respect to information to which the Secretary
     has access pursuant to this section--
       (1) the Secretary may obtain such material upon request,
     and may enter into cooperative arrangements with other
     executive agencies to provide such material or provide
     Department officials with access to it on a regular or
     routine basis, including requests or arrangements involving
     broad categories of material, access to electronic databases,
     or both; and
       (2) regardless of whether the Secretary has made any
     request or entered into any cooperative arrangement pursuant
     to paragraph (1), all agencies of the Federal Government
     shall promptly provide to the Secretary--
       (A) all reports (including information reports containing
     intelligence which has not been fully evaluated),
     assessments, and analytical information relating to threats
     of terrorism against the United States and to other areas of
     responsibility assigned by the Secretary;
       (B) all information concerning the vulnerability of the
     infrastructure of the United States, or other vulnerabilities
     of the United States, to terrorism, whether or not such
     information has been analyzed;
       (C) all other information relating to significant and
     credible threats of terrorism against the United States,
     whether or not such information has been analyzed; and
       (D) such other information or material as the President may
     direct.
       (c) Treatment Under Certain Laws.--The Secretary shall be
     deemed to be a Federal law enforcement, intelligence,
     protective, national defense, immigration, or national
     security official, and shall be provided with all information
     from law enforcement agencies that is required to be given to
     the Director of Central Intelligence, under any provision of
     the following:
       (1) The USA PATRIOT Act of 2001 (Public Law 107-56).
       (2) Section 2517(6) of title 18, United States Code.
       (3) Rule 6(e)(3)(C) of the Federal Rules of Criminal
     Procedure.
       (d) Access to Intelligence and Other Information.--
       (1) Access by elements of federal government.--Nothing in
     this title shall preclude any element of the intelligence
     community (as that term is defined in section 3(4) of the
     National Security Act of 1947 (50 U.S.C. 401a(4)), or other
     any element of the Federal Government with responsibility for
     analyzing terrorist threat information, from receiving any
     intelligence or other information relating to terrorism.
       (2) Sharing of information.--The Secretary, in consultation
     with the Director of Central Intelligence, shall work to
     ensure that intelligence or other information relating to
     terrorism to which the Department has access is appropriately
     shared with the elements of the Federal Government referred
     to in paragraph (1), as well as with State and local
     governments, as appropriate.

            Subtitle B--Critical Infrastructure Information

     SEC. 211. SHORT TITLE.

       This subtitle may be cited as the "Critical Infrastructure
     Information Act of 2002".

     SEC. 212. DEFINITIONS.

       In this subtitle:
       (1) Agency.--The term "agency" has the meaning given it
     in section 551 of title 5, United States Code.
       (2) Covered federal agency.--The term "covered Federal
     agency" means the Department of Homeland Security.
       (3) Critical infrastructure information.--The term
     "critical infrastructure information" means information not
     customarily in the public domain and related to the security
     of critical infrastructure or protected systems--
       (A) actual, potential, or threatened interference with,
     attack on, compromise of, or incapacitation of critical
     infrastructure or protected systems by either physical or
     computer-based attack or other similar conduct (including the
     misuse of or unauthorized access to all types of
     communications and data transmission systems) that violates
     Federal, State, or local law, harms interstate commerce of
     the United States, or threatens public health or safety;
       (B) the ability of any critical infrastructure or protected
     system to resist such interference, compromise, or
     incapacitation, including any planned or past assessment,
     projection, or estimate of the vulnerability of critical
     infrastructure or a protected system, including security
     testing, risk evaluation thereto, risk management planning,
     or risk audit; or
       (C) any planned or past operational problem or solution
     regarding critical infrastructure or protected systems,
     including repair, recovery, reconstruction, insurance, or
     continuity, to the extent it is related to such interference,
     compromise, or incapacitation.
       (4) Critical infrastructure protection program.--The term
     "critical infrastructure protection program" means any
     component or bureau of a covered Federal agency that has been
     designated by the President or any agency head to receive
     critical infrastructure information.
       (5) Information sharing and analysis organization.--The
     term "Information Sharing and Analysis Organization" means
     any formal or informal entity or collaboration created or
     employed by public or private sector organizations, for
     purposes of--
       (A) gathering and analyzing critical infrastructure
     information in order to better understand security problems
     and interdependencies related to critical infrastructure and
     protected systems, so as to ensure the availability,
     integrity, and reliability thereof;
       (B) communicating or disclosing critical infrastructure
     information to help prevent, detect, mitigate, or recover
     from the effects of a interference, compromise, or a
     incapacitation problem related to critical infrastructure or
     protected systems; and
       (C) voluntarily disseminating critical infrastructure
     information to its members, State, local, and Federal
     Governments, or any other entities that may be of assistance
     in carrying out the purposes specified in subparagraphs (A)
     and (B).
       (6) Protected system.--The term "protected system"--
       (A) means any service, physical or computer-based system,
     process, or procedure that directly or indirectly affects the
     viability of a facility of critical infrastructure; and
       (B) includes any physical or computer-based system,
     including a computer, computer system, computer or
     communications network, or any component hardware or element
     thereof, software program, processing instructions, or
     information or data in transmission or storage therein,
     irrespective of the medium of transmission or storage.
       (7) Voluntary.--
       (A) In general.--The term "voluntary", in the case of any
     submittal of critical infrastructure information to a covered
     Federal agency, means the submittal thereof in the absence of
     such agency's exercise of legal authority to compel access to
     or submission of such information and may be accomplished by
     a single entity or an Information Sharing and Analysis
     Organization on behalf of itself or its members.
       (B) Exclusions.--The term "voluntary"--
       (i) in the case of any action brought under the securities
     laws as is defined in section 3(a)(47) of the Securities
     Exchange Act of 1934 (15 U.S.C. 78c(a)(47))--

       (I) does not include information or statements contained in
     any documents or materials filed with the Securities and
     Exchange Commission, or with Federal banking regulators,
     pursuant to section 12(i) of the Securities Exchange Act of
     1934 (15 U.S.C. 781(I)); and
       (II) with respect to the submittal of critical
     infrastructure information, does not include any disclosure
     or writing that when made accompanied the solicitation of an
     offer or a sale of securities; and

       (ii) does not include information or statements submitted
     or relied upon as a basis for making licensing or permitting
     determinations, or during regulatory proceedings.

     SEC. 213. DESIGNATION OF CRITICAL INFRASTRUCTURE PROTECTION
                   PROGRAM.

       A critical infrastructure protection program may be
     designated as such by one of the following:
       (1) The President.
       (2) The Secretary of Homeland Security.

     SEC. 214. PROTECTION OF VOLUNTARILY SHARED CRITICAL
                   INFRASTRUCTURE INFORMATION.

       (a) Protection.--
       (1) In general.--Notwithstanding any other provision of
     law, critical infrastructure information (including the
     identity of the submitting person or entity) that is
     voluntarily submitted to a covered Federal agency for use by
     that agency regarding the security of critical infrastructure
     and protected systems, analysis, warning, interdependency
     study, recovery, reconstitution, or other informational
     purpose, when accompanied by an express statement specified
     in paragraph (2)--
       (A) shall be exempt from disclosure under section 552 of
     title 5, United States Code (commonly referred to as the
     Freedom of Information Act);
       (B) shall not be subject to any agency rules or judicial
     doctrine regarding ex parte communications with a decision
     making official;
       (C) shall not, without the written consent of the person or
     entity submitting such information, be used directly by such
     agency, any other Federal, State, or local authority, or any
     third party, in any civil action arising under Federal or
     State law if such information is submitted in good faith;
       (D) shall not, without the written consent of the person or
     entity submitting such information, be used or disclosed by
     any officer or employee of the United States for purposes
     other than the purposes of this subtitle, except--
       (i) in furtherance of an investigation or the prosecution
     of a criminal act; or
       (ii) when disclosure of the information would be--

       (I) to either House of Congress, or to the extent of matter
     within its jurisdiction, any committee or subcommittee
     thereof, any joint committee thereof or subcommittee of any
     such joint committee; or
       (II) to the Comptroller General, or any authorized
     representative of the Comptroller General, in the course of
     the performance of the duties of the General Accounting
     Office.

       (E) shall not, if provided to a State or local government
     or government agency--
       (i) be made available pursuant to any State or local law
     requiring disclosure of information or records;

[[Page H8653]]

       (ii) otherwise be disclosed or distributed to any party by
     said State or local government or government agency without
     the written consent of the person or entity submitting such
     information; or
       (iii) be used other than for the purpose of protecting
     critical infrastructure or protected systems, or in
     furtherance of an investigation or the prosecution of a
     criminal act; and
       (F) does not constitute a waiver of any applicable
     privilege or protection provided under law, such as trade
     secret protection.
       (2) Express statement.--For purposes of paragraph (1), the
     term "express statement", with respect to information or
     records, means--
       (A) in the case of written information or records, a
     written marking on the information or records substantially
     similar to the following: "This information is voluntarily
     submitted to the Federal Government in expectation of
     protection from disclosure as provided by the provisions of
     the Critical Infrastructure Information Act of 2002."; or
       (B) in the case of oral information, a similar written
     statement submitted within a reasonable period following the
     oral communication.
       (b) Limitation.--No communication of critical
     infrastructure information to a covered Federal agency made
     pursuant to this subtitle shall be considered to be an action
     subject to the requirements of the Federal Advisory Committee
     Act (5 U.S.C. App. 2).
       (c) Independently Obtained Information.--Nothing in this
     section shall be construed to limit or otherwise affect the
     ability of a State, local, or Federal Government entity,
     agency, or authority, or any third party, under applicable
     law, to obtain critical infrastructure information in a
     manner not covered by subsection (a), including any
     information lawfully and properly disclosed generally or
     broadly to the public and to use such information in any
     manner permitted by law.
       (d) Treatment of Voluntary Submittal of Information.--The
     voluntary submittal to the Government of information or
     records that are protected from disclosure by this subtitle
     shall not be construed to constitute compliance with any
     requirement to submit such information to a Federal agency
     under any other provision of law.
       (e) Procedures.--
       (1) In general.--The Secretary of the Department of
     Homeland Security shall, in consultation with appropriate
     representatives of the National Security Council and the
     Office of Science and Technology Policy, establish uniform
     procedures for the receipt, care, and storage by Federal
     agencies of critical infrastructure information that is
     voluntarily submitted to the Government. The procedures shall
     be established not later than 90 days after the date of the
     enactment of this subtitle.
       (2) Elements.--The procedures established under paragraph
     (1) shall include mechanisms regarding--
       (A) the acknowledgement of receipt by Federal agencies of
     critical infrastructure information that is voluntarily
     submitted to the Government;
       (B) the maintenance of the identification of such
     information as voluntarily submitted to the Government for
     purposes of and subject to the provisions of this subtitle;
       (C) the care and storage of such information; and
       (D) the protection and maintenance of the confidentiality
     of such information so as to permit the sharing of such
     information within the Federal Government and with State and
     local governments, and the issuance of notices and warnings
     related to the protection of critical infrastructure and
     protected systems, in such manner as to protect from public
     disclosure the identity of the submitting person or entity,
     or information that is proprietary, business sensitive,
     relates specifically to the submitting person or entity, and
     is otherwise not appropriately in the public domain.
       (f) Penalties.--Whoever, being an officer or employee of
     the United States or of any department or agency thereof,
     knowingly publishes, divulges, discloses, or makes known in
     any manner or to any extent not authorized by law, any
     critical infrastructure information protected from disclosure
     by this subtitle coming to him in the course of this
     employment or official duties or by reason of any examination
     or investigation made by, or return, report, or record made
     to or filed with, such department or agency or officer or
     employee thereof, shall be fined under title 18 of the United
     States Code, imprisoned not more than 1 year, or both, and
     shall be removed from office or employment.
       (g) Authority To Issue Warnings.--The Federal Government
     may provide advisories, alerts, and warnings to relevant
     companies, targeted sectors, other governmental entities, or
     the general public regarding potential threats to critical
     infrastructure as appropriate. In issuing a warning, the
     Federal Government shall take appropriate actions to protect
     from disclosure--
       (1) the source of any voluntarily submitted critical
     infrastructure information that forms the basis for the
     warning; or
       (2) information that is proprietary, business sensitive,
     relates specifically to the submitting person or entity, or
     is otherwise not appropriately in the public domain.
       (h) Authority To Delegate.--The President may delegate
     authority to a critical infrastructure protection program,
     designated under subsection (e), to enter into a voluntary
     agreement to promote critical infrastructure security,
     including with any Information Sharing and Analysis
     Organization, or a plan of action as otherwise defined in
     section 708 of the Defense Production Act of 1950 (50 U.S.C.
     App. 2158).

     SEC. 215. NO PRIVATE RIGHT OF ACTION.

       Nothing in this subtitle may be construed to create a
     private right of action for enforcement of any provision of
     this Act.

                    Subtitle C--Information Security

     SEC. 221. PROCEDURES FOR SHARING INFORMATION.

       The Secretary shall establish procedures on the use of
     information shared under this title that--
       (1) limit the redissemination of such information to ensure
     that it is not used for an unauthorized purpose;
       (2) ensure the security and confidentiality of such
     information;
       (3) protect the constitutional and statutory rights of any
     individuals who are subjects of such information; and
       (4) provide data integrity through the timely removal and
     destruction of obsolete or erroneous names and information.

     SEC. 222. PRIVACY OFFICER.

       The Secretary shall appoint a senior official in the
     Department to assume primary responsibility for privacy
     policy, including--
       (1) assuring that the use of technologies sustain, and do
     not erode, privacy protections relating to the use,
     collection, and disclosure of personal information;
       (2) assuring that personal information contained in Privacy
     Act systems of records is handled in full compliance with
     fair information practices as set out in the Privacy Act of
     1974;
       (3) evaluating legislative and regulatory proposals
     involving collection, use, and disclosure of personal
     information by the Federal Government;
       (4) conducting a privacy impact assessment of proposed
     rules of the Department or that of the Department on the
     privacy of personal information, including the type of
     personal information collected and the number of people
     affected; and
       (5) preparing a report to Congress on an annual basis on
     activities of the Department that affect privacy, including
     complaints of privacy violations, implementation of the
     Privacy Act of 1974, internal controls, and other matters.

     SEC. 223. ENHANCEMENT OF NON-FEDERAL CYBERSECURITY.

       In carrying out the responsibilities under section 201, the
     Under Secretary for Information Analysis and Infrastructure
     Protection shall--
       (1) as appropriate, provide to State and local government
     entities, and upon request to private entities that own or
     operate critical information systems--
       (A) analysis and warnings related to threats to, and
     vulnerabilities of, critical information systems; and
       (B) in coordination with the Under Secretary for Emergency
     Preparedness and Response, crisis management support in
     response to threats to, or attacks on, critical information
     systems; and
       (2) as appropriate, provide technical assistance, upon
     request, to the private sector and other government entities,
     in coordination with the Under Secretary for Emergency
     Preparedness and Response, with respect to emergency recovery
     plans to respond to major failures of critical information
     systems.

     SEC. 224. NET GUARD.

       The Under Secretary for Information Analysis and
     Infrastructure Protection may establish a national technology
     guard, to be known as "NET Guard", comprised of local teams
     of volunteers with expertise in relevant areas of science and
     technology, to assist local communities to respond and
     recover from attacks on information systems and
     communications networks.

     SEC. 225. CYBER SECURITY ENHANCEMENT ACT OF 2002.

       (a) Short Title.--This section may be cited as the "Cyber
     Security Enhancement Act of 2002".
       (b) Amendment of Sentencing Guidelines Relating to Certain
     Computer Crimes.--
       (1) Directive to the united states sentencing commission.--
     Pursuant to its authority under section 994(p) of title 28,
     United States Code, and in accordance with this subsection,
     the United States Sentencing Commission shall review and, if
     appropriate, amend its guidelines and its policy statements
     applicable to persons convicted of an offense under section
     1030 of title 18, United States Code.
       (2) Requirements.--In carrying out this subsection, the
     Sentencing Commission shall--
       (A) ensure that the sentencing guidelines and policy
     statements reflect the serious nature of the offenses
     described in paragraph (1), the growing incidence of such
     offenses, and the need for an effective deterrent and
     appropriate punishment to prevent such offenses;
       (B) consider the following factors and the extent to which
     the guidelines may or may not account for them--
       (i) the potential and actual loss resulting from the
     offense;
       (ii) the level of sophistication and planning involved in
     the offense;
       (iii) whether the offense was committed for purposes of
     commercial advantage or private financial benefit;
       (iv) whether the defendant acted with malicious intent to
     cause harm in committing the offense;

[[Page H8654]]

       (v) the extent to which the offense violated the privacy
     rights of individuals harmed;
       (vi) whether the offense involved a computer used by the
     government in furtherance of national defense, national
     security, or the administration of justice;
       (vii) whether the violation was intended to or had the
     effect of significantly interfering with or disrupting a
     critical infrastructure; and
       (viii) whether the violation was intended to or had the
     effect of creating a threat to public health or safety, or
     injury to any person;
       (C) assure reasonable consistency with other relevant
     directives and with other sentencing guidelines;
       (D) account for any additional aggravating or mitigating
     circumstances that might justify exceptions to the generally
     applicable sentencing ranges;
       (E) make any necessary conforming changes to the sentencing
     guidelines; and
       (F) assure that the guidelines adequately meet the purposes
     of sentencing as set forth in section 3553(a)(2) of title 18,
     United States Code.
       (c) Study and Report on Computer Crimes.--Not later than
     May 1, 2003, the United States Sentencing Commission shall
     submit a brief report to Congress that explains any actions
     taken by the Sentencing Commission in response to this
     section and includes any recommendations the Commission may
     have regarding statutory penalties for offenses under section
     1030 of title 18, United States Code.
       (d) Emergency Disclosure Exception.--
       (1) In general.--Section 2702(b) of title 18, United States
     Code, is amended--
       (A) in paragraph (5), by striking "or" at the end;
       (B) in paragraph (6)(A), by inserting "or" at the end;
       (C) by striking paragraph (6)(C); and
       (D) by adding at the end the following:
       "(7) to a Federal, State, or local governmental entity, if
     the provider, in good faith, believes that an emergency
     involving danger of death or serious physical injury to any
     person requires disclosure without delay of communications
     relating to the emergency.".
       (2) Reporting of disclosures.--A government entity that
     receives a disclosure under section 2702(b) of title 18,
     United States Code, shall file, not later than 90 days after
     such disclosure, a report to the Attorney General stating the
     paragraph of that section under which the disclosure was
     made, the date of the disclosure, the entity to which the
     disclosure was made, the number of customers or subscribers
     to whom the information disclosed pertained, and the number
     of communications, if any, that were disclosed. The Attorney
     General shall publish all such reports into a single report
     to be submitted to Congress 1 year after the date of
     enactment of this Act.
       (e) Good Faith Exception.--Section 2520(d)(3) of title 18,
     United States Code, is amended by inserting "or 2511(2)(i)"
     after "2511(3)".
       (f) Internet Advertising of Illegal Devices.--Section
     2512(1)(c) of title 18, United States Code, is amended--
       (1) by inserting "or disseminates by electronic means"
     after "or other publication"; and
       (2) by inserting "knowing the content of the advertisement
     and" before "knowing or having reason to know".
       (g) Strengthening Penalties.--Section 1030(c) of title 18,
     United States Code, is amended--
       (1) by striking "and" at the end of paragraph (3);
       (2) in each of subparagraphs (A) and (C) of paragraph (4),
     by inserting "except as provided in paragraph (5)," before
     "a fine under this title";
       (3) in paragraph (4)(C), by striking the period at the end
     and inserting "; and"; and
       (4) by adding at the end the following:
       "(5)(A) if the offender knowingly or recklessly causes or
     attempts to cause serious bodily injury from conduct in
     violation of subsection (a)(5)(A)(i), a fine under this title
     or imprisonment for not more than 20 years, or both; and
       "(B) if the offender knowingly or recklessly causes or
     attempts to cause death from conduct in violation of
     subsection (a)(5)(A)(i), a fine under this title or
     imprisonment for any term of years or for life, or both.".
       (h) Provider Assistance.--
       (1) Section 2703.--Section 2703(e) of title 18, United
     States Code, is amended by inserting ", statutory
     authorization" after "subpoena".
       (2) Section 2511.--Section 2511(2)(a)(ii) of title 18,
     United States Code, is amended by inserting ", statutory
     authorization," after "court order" the last place it
     appears.
       (i) Emergencies.--Section 3125(a)(1) of title 18, United
     States Code, is amended--
       (1) in subparagraph (A), by striking "or" at the end;
       (2) in subparagraph (B), by striking the comma at the end
     and inserting a semicolon; and
       (3) by adding at the end the following:
       "(C) an immediate threat to a national security interest;
     or
       "(D) an ongoing attack on a protected computer (as defined
     in section 1030) that constitutes a crime punishable by a
     term of imprisonment greater than one year;".
       (j) Protecting Privacy.--
       (1) Section 2511.--Section 2511(4) of title 18, United
     States Code, is amended--
       (A) by striking paragraph (b); and
       (B) by redesignating paragraph (c) as paragraph (b).
       (2) Section 2701.--Section 2701(b) of title 18, United
     States Code, is amended--
       (A) in paragraph (1), by inserting ", or in furtherance of
     any criminal or tortious act in violation of the Constitution
     or laws of the United States or any State" after
     "commercial gain";
       (B) in paragraph (1)(A), by striking "one year" and
     inserting "5 years";
       (C) in paragraph (1)(B), by striking "two years" and
     inserting "10 years"; and
       (D) by striking paragraph (2) and inserting the following:
       "(2) in any other case--
       "(A) a fine under this title or imprisonment for not more
     than 1 year or both, in the case of a first offense under
     this paragraph; and
       "(B) a fine under this title or imprisonment for not more
     than 5 years, or both, in the case of an offense under this
     subparagraph that occurs after a conviction of another
     offense under this section.".

	 [...]

	    TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

     SEC. 301. UNDER SECRETARY FOR SCIENCE AND TECHNOLOGY.

       There shall be in the Department a Directorate of Science
     and Technology headed by an Under Secretary for Science and
     Technology.

     SEC. 302. RESPONSIBILITIES AND AUTHORITIES OF THE UNDER
                   SECRETARY FOR SCIENCE AND TECHNOLOGY.

       The Secretary, acting through the Under Secretary for
     Science and Technology, shall have the responsibility for--
       (1) advising the Secretary regarding research and
     development efforts and priorities in support of the
     Department's missions;
       (2) developing, in consultation with other appropriate
     executive agencies, a national policy and strategic plan for,
     identifying priorities, goals, objectives and policies for,
     and coordinating the Federal Government's civilian efforts to
     identify and develop countermeasures to chemical, biological,
     radiological, nuclear, and other emerging terrorist threats,
     including the development of comprehensive, research-based
     definable goals for such efforts and development of annual
     measurable objectives and specific targets to accomplish and
     evaluate the goals for such efforts;
       (3) supporting the Under Secretary for Information Analysis
     and Infrastructure Protection, by assessing and testing
     homeland security vulnerabilities and possible threats;
       (4) conducting basic and applied research, development,
     demonstration, testing, and evaluation activities that are
     relevant to any or all elements of the Department, through
     both intramural and extramural programs, except that such
     responsibility does not extend to human health-related
     research and development activities;
       (5) establishing priorities for, directing, funding, and
     conducting national research, development, test and
     evaluation, and procurement of technology and systems for--
       (A) preventing the importation of chemical, biological,
     radiological, nuclear, and related weapons and material; and
       (B) detecting, preventing, protecting against, and
     responding to terrorist attacks;
       (6) establishing a system for transferring homeland
     security developments or technologies to federal, state,
     local government, and private sector entities;
       (7) entering into work agreements, joint sponsorships,
     contracts, or any other agreements with the Department of
     Energy regarding the use of the national laboratories or
     sites and support of the science and technology base at those
     facilities;
       (8) collaborating with the Secretary of Agriculture and the
     Attorney General as provided in section 212 of the
     Agricultural Bioterrorism Protection Act of 2002 (7 U.S.C.
     8401), as amended by section 1709(b);
       (9) collaborating with the Secretary of Health and Human
     Services and the Attorney General in determining any new
     biological agents and toxins that shall be listed as "select
     agents" in Appendix A of part 72 of title 42, Code of
     Federal Regulations, pursuant to section 351A of the Public
     Health Service Act (42 U.S.C. 262a);
       (10) supporting United States leadership in science and
     technology;
       (11) establishing and administering the primary research
     and development activities of the Department, including the
     long-term research and development needs and capabilities for
     all elements of the Department;
       (12) coordinating and integrating all research,
     development, demonstration, testing, and evaluation
     activities of the Department;
       (13) coordinating with other appropriate executive agencies
     in developing and carrying out the science and technology
     agenda of the Department to reduce duplication and identify
     unmet needs; and
       (14) developing and overseeing the administration of
     guidelines for merit review of research and development
     projects throughout the Department, and for the dissemination
     of research conducted or sponsored by the Department.

     SEC. 303. FUNCTIONS TRANSFERRED.

       In accordance with title XV, there shall be transferred to
     the Secretary the functions, personnel, assets, and
     liabilities of the following entities:
       (1) The following programs and activities of the Department
     of Energy, including the functions of the Secretary of Energy
     relating thereto (but not including programs and activities
     relating to the strategic nuclear defense posture of the
     United States):
       (A) The chemical and biological national security and
     supporting programs and activities of the nonproliferation
     and verification research and development program.
       (B) The nuclear smuggling programs and activities within
     the proliferation detection program of the nonproliferation
     and verification research and development program. The
     programs and activities described in this subparagraph may be
     designated by the President either for transfer to the
     Department or for joint operation by the Secretary and the
     Secretary of Energy.
       (C) The nuclear assessment program and activities of the
     assessment, detection, and cooperation program of the
     international materials protection and cooperation program.
       (D) Such life sciences activities of the biological and
     environmental research program related to microbial pathogens
     as may be designated by the President for transfer to the
     Department.
       (E) The Environmental Measurements Laboratory.
       (F) The advanced scientific computing research program and
     activities at Lawrence Livermore National Laboratory.
       (2) The National Bio-Weapons Defense Analysis Center of the
     Department of Defense, including the functions of the
     Secretary of Defense related thereto.

[[Page H8604]]

       (3) The Plum Island Animal Disease Center of the Department
     of Agriculture, as provided in section 310.

     SEC. 304. CONDUCT OF CERTAIN PUBLIC HEALTH-RELATED
                   ACTIVITIES.

       (a) In General.--With respect to civilian human health-
     related research and development activities relating to
     countermeasures for chemical, biological, radiological, and
     nuclear and other emerging terrorist threats carried out by
     the Department of Health and Human Services (including the
     Public Health Service), the Secretary of Health and Human
     Services shall set priorities, goals, objectives, and
     policies and develop a coordinated strategy for such
     activities in collaboration with the Secretary of Homeland
     Security to ensure consistency with the national policy and
     strategic plan developed pursuant to section 302(2).
       (b) Evaluation of Progress.--In carrying out subsection
     (a), the Secretary of Health and Human Services shall
     collaborate with the Secretary in developing specific
     benchmarks and outcome measurements for evaluating progress
     toward achieving the priorities and goals described in such
     subsection.
       (c) Administration of Countermeasures Against Smallpox.--
     Section 224 of the Public Health Service Act (42 U.S.C. 233)
     is amended by adding the following:
       "(p) Administration of Smallpox Countermeasures by Health
     Professionals.--
       "(1) In general.--For purposes of this section, and
     subject to other provisions of this subsection, a covered
     person shall be deemed to be an employee of the Public Health
     Service with respect to liability arising out of
     administration of a covered countermeasure against smallpox
     to an individual during the effective period of a declaration
     by the Secretary under paragraph (2)(A).
       "(2) Declaration by secretary concerning countermeasure
     against smallpox.--
       "(A) Authority to issue declaration.--
       "(i) In general.--The Secretary may issue a declaration,
     pursuant to this paragraph, concluding that an actual or
     potential bioterrorist incident or other actual or potential
     public health emergency makes advisable the administration of
     a covered countermeasure to a category or categories of
     individuals.
       "(ii) Covered countermeasure.--The Secretary shall specify
     in such declaration the substance or substances that shall be
     considered covered countermeasures (as defined in paragraph
     (8)(A)) for purposes of administration to individuals during
     the effective period of the declaration.
       "(iii) Effective period.--The Secretary shall specify in
     such declaration the beginning and ending dates of the
     effective period of the declaration, and may subsequently
     amend such declaration to shorten or extend such effective
     period, provided that the new closing date is after the date
     when the declaration is amended.
       "(iv) Publication.--The Secretary shall promptly publish
     each such declaration and amendment in the Federal Register.
       "(B) Liability of united states only for administrations
     within scope of declaration.--Except as provided in paragraph
     (5)(B)(ii), the United States shall be liable under this
     subsection with respect to a claim arising out of the
     administration of a covered countermeasure to an individual
     only if--
       "(i) the countermeasure was administered by a qualified
     person, for a purpose stated in paragraph (7)(A)(i), and
     during the effective period of a declaration by the Secretary
     under subparagraph (A) with respect to such countermeasure;
     and
       "(ii)(I) the individual was within a category of
     individuals covered by the declaration; or
       "(II) the qualified person administering the
     countermeasure had reasonable grounds to believe that such
     individual was within such category.
       "(C) Presumption of administration within scope of
     declaration in case of accidental vaccinia inoculation.--
       "(i) In general.--If vaccinia vaccine is a covered
     countermeasure specified in a declaration under subparagraph
     (A), and an individual to whom the vaccinia vaccine is not
     administered contracts vaccinia, then, under the
     circumstances specified in clause (ii), the individual--

       "(I) shall be rebuttably presumed to have contracted
     vaccinia from an individual to whom such vaccine was
     administered as provided by clauses (i) and (ii) of
     subparagraph (B); and
       "(II) shall (unless such presumption is rebutted) be
     deemed for purposes of this subsection to be an individual to
     whom a covered countermeasure was administered by a qualified
     person in accordance with the terms of such declaration and
     as described by subparagraph (B).

       "(ii) Circumstances in which presumption applies.--The
     presumption and deeming stated in clause (i) shall apply if--

       "(I) the individual contracts vaccinia during the
     effective period of a declaration under subparagraph (A) or
     by the date 30 days after the close of such period; or
       "(II) the individual resides or has resided with an
     individual to whom such vaccine was administered as provided
     by clauses (i) and (ii) of subparagraph (B) and contracts
     vaccinia after such date.

       "(3) Exclusivity of remedy.--The remedy provided by
     subsection (a) shall be exclusive of any other civil action
     or proceeding for any claim or suit this subsection
     encompasses.
       "(4) Certification of action by attorney general.--
     Subsection (c) applies to actions under this subsection,
     subject to the following provisions:
       "(A) Nature of certification.--The certification by the
     Attorney General that is the basis for deeming an action or
     proceeding to be against the United States, and for removing
     an action or proceeding from a State court, is a
     certification that the action or proceeding is against a
     covered person and is based upon a claim alleging personal
     injury or death arising out of the administration of a
     covered countermeasure.
       "(B) Certification of attorney general conclusive.--The
     certification of the Attorney General of the facts specified
     in subparagraph (A) shall conclusively establish such facts
     for purposes of jurisdiction pursuant to this subsection.
       "(5) Defendant to cooperate with united states.--
       "(A) In general.--A covered person shall cooperate with
     the United States in the processing and defense of a claim or
     action under this subsection based upon alleged acts or
     omissions of such person.
       "(B) Consequences of failure to cooperate.--Upon the
     motion of the United States or any other party and upon
     finding that such person has failed to so cooperate--
       "(i) the court shall substitute such person as the party
     defendant in place of the United States and, upon motion,
     shall remand any such suit to the court in which it was
     instituted if it appears that the court lacks subject matter
     jurisdiction;
       "(ii) the United States shall not be liable based on the
     acts or omissions of such person; and
       "(iii) the Attorney General shall not be obligated to
     defend such action.
       "(6) Recourse against covered person in case of gross
     misconduct or contract violation.--
       "(A) In general.--Should payment be made by the United
     States to any claimant bringing a claim under this
     subsection, either by way of administrative determination,
     settlement, or court judgment, the United States shall have,
     notwithstanding any provision of State law, the right to
     recover for that portion of the damages so awarded or paid,
     as well as interest and any costs of litigation, resulting
     from the failure of any covered person to carry out any
     obligation or responsibility assumed by such person under a
     contract with the United States or from any grossly
     negligent, reckless, or illegal conduct or willful misconduct
     on the part of such person.
       "(B) Venue.--The United States may maintain an action
     under this paragraph against such person in the district
     court of the United States in which such person resides or
     has its principal place of business.
       "(7) Definitions.--As used in this subsection, terms have
     the following meanings:
       "(A) Covered countermeasure.--The term `covered
     countermeasure', or `covered countermeasure against
     smallpox', means a substance that is--
       "(i)(I) used to prevent or treat smallpox (including the
     vaccinia or another vaccine); or
       "(II) vaccinia immune globulin used to control or treat
     the adverse effects of vaccinia inoculation; and
       "(ii) specified in a declaration under paragraph (2).
       "(B) Covered person.--The term `covered person', when used
     with respect to the administration of a covered
     countermeasure, includes any person who is--
       "(i) a manufacturer or distributor of such countermeasure;
       "(ii) a health care entity under whose auspices such
     countermeasure was administered;
       "(iii) a qualified person who administered such
     countermeasure; or
       "(iv) an official, agent, or employee of a person
     described in clause (i), (ii), or (iii).
       "(C) Qualified person.--The term `qualified person', when
     used with respect to the administration of a covered
     countermeasure, means a licensed health professional or other
     individual who is authorized to administer such
     countermeasure under the law of the State in which the
     countermeasure was administered.".

     SEC. 305. FEDERALLY FUNDED RESEARCH AND DEVELOPMENT CENTERS.

       The Secretary, acting through the Under Secretary for
     Science and Technology, shall have the authority to establish
     or contract with 1 or more federally funded research and
     development centers to provide independent analysis of
     homeland security issues, or to carry out other
     responsibilities under this Act, including coordinating and
     integrating both the extramural and intramural programs
     described in section 308.

     SEC. 306. MISCELLANEOUS PROVISIONS.

       (a) Classification.--To the greatest extent practicable,
     research conducted or supported by the Department shall be
     unclassified.
       (b) Construction.--Nothing in this title shall be construed
     to preclude any Under Secretary of the Department from
     carrying out research, development, demonstration, or
     deployment activities, as long as such activities are
     coordinated through the Under Secretary for Science and
     Technology.
       (c) Regulations.--The Secretary, acting through the Under
     Secretary for Science and Technology, may issue necessary
     regulations with respect to research, development,
     demonstration, testing, and evaluation activities

[[Page H8605]]

     of the Department, including the conducting, funding, and
     reviewing of such activities.
       (d) Notification of Presidential Life Sciences
     Designations.--Not later than 60 days before effecting any
     transfer of Department of Energy life sciences activities
     pursuant to section 303(1)(D) of this Act, the President
     shall notify the appropriate congressional committees of the
     proposed transfer and shall include the reasons for the
     transfer and a description of the effect of the transfer on
     the activities of the Department of Energy.

     SEC. 307. HOMELAND SECURITY ADVANCED RESEARCH PROJECTS
                   AGENCY.

       (a) Definitions.--In this section:
       (1) Fund.--The term "Fund" means the Acceleration Fund
     for Research and Development of Homeland Security
     Technologies established in subsection (c).
       (2) Homeland security research.--The term "homeland
     security research" means research relevant to the detection
     of, prevention of, protection against, response to,
     attribution of, and recovery from homeland security threats,
     particularly acts of terrorism.
       (3) Hsarpa.--The term "HSARPA" means the Homeland
     Security Advanced Research Projects Agency established in
     subsection (b).
       (4) Under secretary.--The term "Under Secretary" means
     the Under Secretary for Science and Technology.
       (b) HSARPA.--
       (1) Establishment.--There is established the Homeland
     Security Advanced Research Projects Agency.
       (2) Director.--HSARPA shall be headed by a Director, who
     shall be appointed by the Secretary. The Director shall
     report to the Under Secretary.
       (3) Responsibilities.--The Director shall administer the
     Fund to award competitive, merit-reviewed grants, cooperative
     agreements or contracts to public or private entities,
     including businesses, federally funded research and
     development centers, and universities. The Director shall
     administer the Fund to--
       (A) support basic and applied homeland security research to
     promote revolutionary changes in technologies that would
     promote homeland security;
       (B) advance the development, testing and evaluation, and
     deployment of critical homeland security technologies; and
       (C) accelerate the prototyping and deployment of
     technologies that would address homeland security
     vulnerabilities.
       (4) Targeted competitions.--The Director may solicit
     proposals to address specific vulnerabilities identified by
     the Director.
       (5) Coordination.--The Director shall ensure that the
     activities of HSARPA are coordinated with those of other
     relevant research agencies, and may run projects jointly with
     other agencies.
       (6) Personnel.--In hiring personnel for HSARPA, the
     Secretary shall have the hiring and management authorities
     described in section 1101 of the Strom Thurmond National
     Defense Authorization Act for Fiscal Year 1999 (5 U.S.C. 3104
     note; Public Law 105-261). The term of appointments for
     employees under subsection (c)(1) of that section may not
     exceed 5 years before the granting of any extension under
     subsection (c)(2) of that section.
       (7) Demonstrations.--The Director, periodically, shall hold
     homeland security technology demonstrations to improve
     contact among technology developers, vendors and acquisition
     personnel.
       (c) Fund.--
       (1) Establishment.--There is established the Acceleration
     Fund for Research and Development of Homeland Security
     Technologies, which shall be administered by the Director of
     HSARPA.
       (2) Authorization of appropriations.--There are authorized
     to be appropriated $500,000,000 to the Fund for fiscal year
     2003 and such sums as may be necessary thereafter.
       (3) Coast guard.--Of the funds authorized to be
     appropriated under paragraph (2), not less than 10 percent of
     such funds for each fiscal year through fiscal year 2005
     shall be authorized only for the Under Secretary, through
     joint agreement with the Commandant of the Coast Guard, to
     carry out research and development of improved ports,
     waterways and coastal security surveillance and perimeter
     protection capabilities for the purpose of minimizing the
     possibility that Coast Guard cutters, aircraft, helicopters,
     and personnel will be diverted from non-homeland security
     missions to the ports, waterways and coastal security
     mission.

     SEC. 308. CONDUCT OF RESEARCH, DEVELOPMENT, DEMONSTRATION,
                   TESTING AND EVALUATION.

       (a) In General.--The Secretary, acting through the Under
     Secretary for Science and Technology, shall carry out the
     responsibilities under section 302(4) through both extramural
     and intramural programs.
       (b) Extramural Programs.--
       (1) In general.--The Secretary, acting through the Under
     Secretary for Science and Technology, shall operate
     extramural research, development, demonstration, testing, and
     evaluation programs so as to--
       (A) ensure that colleges, universities, private research
     institutes, and companies (and consortia thereof) from as
     many areas of the United States as practicable participate;
       (B) ensure that the research funded is of high quality, as
     determined through merit review processes developed under
     section 302(14); and
       (C) distribute funds through grants, cooperative
     agreements, and contracts.
       (2) University-based centers for homeland security.--
       (A) Establishment.--The Secretary, acting through the Under
     Secretary for Science and Technology, shall establish within
     1 year of the date of enactment of this Act a university-
     based center or centers for homeland security. The purpose of
     this center or centers shall be to establish a coordinated,
     university-based system to enhance the Nation's homeland
     security.
       (B) Criteria for selection.--In selecting colleges or
     universities as centers for homeland security, the Secretary
     shall consider the following criteria:
       (i) Demonstrated expertise in the training of first
     responders.
       (ii) Demonstrated expertise in responding to incidents
     involving weapons of mass destruction and biological warfare.
       (iii) Demonstrated expertise in emergency medical services.
       (iv) Demonstrated expertise in chemical, biological,
     radiological, and nuclear countermeasures.
       (v) Strong affiliations with animal and plant diagnostic
     laboratories.
       (vi) Demonstrated expertise in food safety.
       (vii) Affiliation with Department of Agriculture
     laboratories or training centers.
       (viii) Demonstrated expertise in water and wastewater
     operations.
       (ix) Demonstrated expertise in port and waterway security.
       (x) Demonstrated expertise in multi-modal transportation.
       (xi) Nationally recognized programs in information
     security.
       (xii) Nationally recognized programs in engineering.
       (xiii) Demonstrated expertise in educational outreach and
     technical assistance.
       (xiv) Demonstrated expertise in border transportation and
     security.
       (xv) Demonstrated expertise in interdisciplinary public
     policy research and communication outreach regarding science,
     technology, and public policy.
       (C) Discretion of secretary.--The Secretary shall have the
     discretion to establish such centers and to consider
     additional criteria as necessary to meet the evolving needs
     of homeland security and shall report to Congress concerning
     the implementation of this paragraph as necessary.
       (D) Authorization of appropriations.--There are authorized
     to be appropriated such sums as may be necessary to carry out
     this paragraph.
       (c) Intramural Programs.--
       (1) Consultation.--In carrying out the duties under section
     302, the Secretary, acting through the Under Secretary for
     Science and Technology, may draw upon the expertise of any
     laboratory of the Federal Government, whether operated by a
     contractor or the Government.
       (2) Laboratories.--The Secretary, acting through the Under
     Secretary for Science and Technology, may establish a
     headquarters laboratory for the Department at any laboratory
     or site and may establish additional laboratory units at
     other laboratories or sites.
       (3) Criteria for headquarters laboratory.--If the Secretary
     chooses to establish a headquarters laboratory pursuant to
     paragraph (2), then the Secretary shall do the following:
       (A) Establish criteria for the selection of the
     headquarters laboratory in consultation with the National
     Academy of Sciences, appropriate Federal agencies, and other
     experts.
       (B) Publish the criteria in the Federal Register.
       (C) Evaluate all appropriate laboratories or sites against
     the criteria.
       (D) Select a laboratory or site on the basis of the
     criteria.
       (E) Report to the appropriate congressional committees on
     which laboratory was selected, how the selected laboratory
     meets the published criteria, and what duties the
     headquarters laboratory shall perform.
       (4) Limitation on operation of laboratories.--No laboratory
     shall begin operating as the headquarters laboratory of the
     Department until at least 30 days after the transmittal of
     the report required by paragraph (3)(E).

     SEC. 309. UTILIZATION OF DEPARTMENT OF ENERGY NATIONAL
                   LABORATORIES AND SITES IN SUPPORT OF HOMELAND
                   SECURITY ACTIVITIES.

       (a) Authority to Utilize National Laboratories and Sites.--
       (1) In general.--In carrying out the missions of the
     Department, the Secretary may utilize the Department of
     Energy national laboratories and sites through any 1 or more
     of the following methods, as the Secretary considers
     appropriate:
       (A) A joint sponsorship arrangement referred to in
     subsection (b).
       (B) A direct contract between the Department and the
     applicable Department of Energy laboratory or site, subject
     to subsection (c).
       (C) Any "work for others" basis made available by that
     laboratory or site.
       (D) Any other method provided by law.
       (2) Acceptance and Performance by Labs and Sites.--
     Notwithstanding any other law governing the administration,
     mission, use, or operations of any of the Department of
     Energy national laboratories and sites, such laboratories and
     sites are authorized to accept and perform work for the
     Secretary,

[[Page H8606]]

     consistent with resources provided, and perform such work on
     an equal basis to other missions at the laboratory and not on
     a noninterference basis with other missions of such
     laboratory or site.
       (b) Joint Sponsorship Arrangements.--
       (1) Laboratories.--The Department may be a joint sponsor,
     under a multiple agency sponsorship arrangement with the
     Department of Energy, of 1 or more Department of Energy
     national laboratories in the performance of work.
       (2) Sites.--The Department may be a joint sponsor of a
     Department of Energy site in the performance of work as if
     such site were a federally funded research and development
     center and the work were performed under a multiple agency
     sponsorship arrangement with the Department.
       (3) Primary sponsor.--The Department of Energy shall be the
     primary sponsor under a multiple agency sponsorship
     arrangement referred to in paragraph (1) or (2).
       (4) Lead agent.--The Secretary of Energy shall act as the
     lead agent in coordinating the formation and performance of a
     joint sponsorship arrangement under this subsection between
     the Department and a Department of Energy national laboratory
     or site.
       (5) Federal acquisition regulation.--Any work performed by
     a Department of Energy national laboratory or site under a
     joint sponsorship arrangement under this subsection shall
     comply with the policy on the use of federally funded
     research and development centers under the Federal
     Acquisition Regulations.
       (6) Funding.--The Department shall provide funds for work
     at the Department of Energy national laboratories or sites,
     as the case may be, under a joint sponsorship arrangement
     under this subsection under the same terms and conditions as
     apply to the primary sponsor of such national laboratory
     under section 303(b)(1)(C) of the Federal Property and
     Administrative Services Act of 1949 (41 U.S.C. 253 (b)(1)(C))
     or of such site to the extent such section applies to such
     site as a federally funded research and development center by
     reason of this subsection.
       (c) Separate Contracting.--To the extent that programs or
     activities transferred by this Act from the Department of
     Energy to the Department of Homeland Security are being
     carried out through direct contracts with the operator of a
     national laboratory or site of the Department of Energy, the
     Secretary of Homeland Security and the Secretary of Energy
     shall ensure that direct contracts for such programs and
     activities between the Department of Homeland Security and
     such operator are separate from the direct contracts of the
     Department of Energy with such operator.
       (d) Authority With Respect to Cooperative Research and
     Development Agreements and Licensing Agreements.--In
     connection with any utilization of the Department of Energy
     national laboratories and sites under this section, the
     Secretary may permit the director of any such national
     laboratory or site to enter into cooperative research and
     development agreements or to negotiate licensing agreements
     with any person, any agency or instrumentality, of the United
     States, any unit of State or local government, and any other
     entity under the authority granted by section 12 of the
     Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C.
     3710a). Technology may be transferred to a non-Federal party
     to such an agreement consistent with the provisions of
     sections 11 and 12 of that Act (15 U.S.C. 3710, 3710a).
       (e) Reimbursement of Costs.--In the case of an activity
     carried out by the operator of a Department of Energy
     national laboratory or site in connection with any
     utilization of such laboratory or site under this section,
     the Department of Homeland Security shall reimburse the
     Department of Energy for costs of such activity through a
     method under which the Secretary of Energy waives any
     requirement for the Department of Homeland Security to pay
     administrative charges or personnel costs of the Department
     of Energy or its contractors in excess of the amount that the
     Secretary of Energy pays for an activity carried out by such
     contractor and paid for by the Department of Energy.
       (f) Laboratory Directed Research and Development by the
     Department of Energy.--No funds authorized to be appropriated
     or otherwise made available to the Department in any fiscal
     year may be obligated or expended for laboratory directed
     research and development activities carried out by the
     Department of Energy unless such activities support the
     missions of the Department of Homeland Security.
       (g) Office for National Laboratories.--There is established
     within the Directorate of Science and Technology an Office
     for National Laboratories, which shall be responsible for the
     coordination and utilization of the Department of Energy
     national laboratories and sites under this section in a
     manner to create a networked laboratory system for the
     purpose of supporting the missions of the Department.
       (h) Department of Energy Coordination on Homeland Security
     Related Research.--The Secretary of Energy shall ensure that
     any research, development, test, and evaluation activities
     conducted within the Department of Energy that are directly
     or indirectly related to homeland security are fully
     coordinated with the Secretary to minimize duplication of
     effort and maximize the effective application of Federal
     budget resources.

     SEC. 310. TRANSFER OF PLUM ISLAND ANIMAL DISEASE CENTER,
                   DEPARTMENT OF AGRICULTURE.

       (a) In General.--In accordance with title XV, the Secretary
     of Agriculture shall transfer to the Secretary of Homeland
     Security the Plum Island Animal Disease Center of the
     Department of Agriculture, including the assets and
     liabilities of the Center.
       (b) Continued Department of Agriculture Access.--On
     completion of the transfer of the Plum Island Animal Disease
     Center under subsection (a), the Secretary of Homeland
     Security and the Secretary of Agriculture shall enter into an
     agreement to ensure that the Department of Agriculture is
     able to carry out research, diagnostic, and other activities
     of the Department of Agriculture at the Center.
       (c) Direction of Activities.--The Secretary of Agriculture
     shall continue to direct the research, diagnostic, and other
     activities of the Department of Agriculture at the Center
     described in subsection (b).
       (d) Notification.--
       (1) In general.--At least 180 days before any change in the
     biosafety level at the Plum Island Animal Disease Center, the
     President shall notify Congress of the change and describe
     the reasons for the change.
       (2) Limitation.--No change described in paragraph (1) may
     be made earlier than 180 days after the completion of the
     transition period (as defined in section 1501.

     SEC. 311. HOMELAND SECURITY SCIENCE AND TECHNOLOGY ADVISORY
                   COMMITTEE.

       (a) Establishment.--There is established within the
     Department a Homeland Security Science and Technology
     Advisory Committee (in this section referred to as the
     "Advisory Committee"). The Advisory Committee shall make
     recommendations with respect to the activities of the Under
     Secretary for Science and Technology, including identifying
     research areas of potential importance to the security of the
     Nation.
       (b) Membership.--
       (1) Appointment.--The Advisory Committee shall consist of
     20 members appointed by the Under Secretary for Science and
     Technology, which shall include emergency first-responders or
     representatives of organizations or associations of emergency
     first-responders. The Advisory Committee shall also include
     representatives of citizen groups, including economically
     disadvantaged communities. The individuals appointed as
     members of the Advisory Committee--
       (A) shall be eminent in fields such as emergency response,
     research, engineering, new product development, business, and
     management consulting;
       (B) shall be selected solely on the basis of established
     records of distinguished service;
       (C) shall not be employees of the Federal Government; and
       (D) shall be so selected as to provide representation of a
     cross-section of the research, development, demonstration,
     and deployment activities supported by the Under Secretary
     for Science and Technology.
       (2) National research council.--The Under Secretary for
     Science and Technology may enter into an arrangement for the
     National Research Council to select members of the Advisory
     Committee, but only if the panel used by the National
     Research Council reflects the representation described in
     paragraph (1).
       (c) Terms of Office.--
       (1) In general.--Except as otherwise provided in this
     subsection, the term of office of each member of the Advisory
     Committee shall be 3 years.
       (2) Original appointments.--The original members of the
     Advisory Committee shall be appointed to three classes of
     three members each. One class shall have a term of 1 year, 1
     a term of 2 years, and the other a term of 3 years.
       (3) Vacancies.--A member appointed to fill a vacancy
     occurring before the expiration of the term for which the
     member's predecessor was appointed shall be appointed for the
     remainder of such term.
       (d) Eligibility.--A person who has completed two
     consecutive full terms of service on the Advisory Committee
     shall thereafter be ineligible for appointment during the 1-
     year period following the expiration of the second such term.
       (e) Meetings.--The Advisory Committee shall meet at least
     quarterly at the call of the Chair or whenever one-third of
     the members so request in writing. Each member shall be given
     appropriate notice of the call of each meeting, whenever
     possible not less than 15 days before the meeting.
       (f) Quorum.--A majority of the members of the Advisory
     Committee not having a conflict of interest in the matter
     being considered by the Advisory Committee shall constitute a
     quorum.
       (g) Conflict of Interest Rules.--The Advisory Committee
     shall establish rules for determining when 1 of its members
     has a conflict of interest in a matter being considered by
     the Advisory Committee.
       (h) Reports.--
       (1) Annual report.--The Advisory Committee shall render an
     annual report to the Under Secretary for Science and
     Technology for transmittal to Congress on or before January
     31 of each year. Such report shall describe the activities
     and recommendations of the Advisory Committee during the
     previous year.

[[Page H8607]]

       (2) Additional reports.--The Advisory Committee may render
     to the Under Secretary for transmittal to Congress such
     additional reports on specific policy matters as it considers
     appropriate.
       (i) FACA Exemption.--Section 14 of the Federal Advisory
     Committee Act shall not apply to the Advisory Committee.
       (j) Termination.--The Department of Homeland Security
     Science and Technology Advisory Committee shall terminate 3
     years after the effective date of this Act.

     SEC. 312. HOMELAND SECURITY INSTITUTE.

       (a) Establishment.--The Secretary shall establish a
     federally funded research and development center to be known
     as the "Homeland Security Institute" (in this section
     referred to as the "Institute").
       (b) Administration.--The Institute shall be administered as
     a separate entity by the Secretary.
       (c) Duties.--The duties of the Institute shall be
     determined by the Secretary, and may include the following:
       (1) Systems analysis, risk analysis, and simulation and
     modeling to determine the vulnerabilities of the Nation's
     critical infrastructures and the effectiveness of the systems
     deployed to reduce those vulnerabilities.
       (2) Economic and policy analysis to assess the distributed
     costs and benefits of alternative approaches to enhancing
     security.
       (3) Evaluation of the effectiveness of measures deployed to
     enhance the security of institutions, facilities, and
     infrastructure that may be terrorist targets.
       (4) Identification of instances when common standards and
     protocols could improve the interoperability and effective
     utilization of tools developed for field operators and first
     responders.
       (5) Assistance for Federal agencies and departments in
     establishing testbeds to evaluate the effectiveness of
     technologies under development and to assess the
     appropriateness of such technologies for deployment.
       (6) Design of metrics and use of those metrics to evaluate
     the effectiveness of homeland security programs throughout
     the Federal Government, including all national laboratories.
       (7) Design of and support for the conduct of homeland
     security-related exercises and simulations.
       (8) Creation of strategic technology development plans to
     reduce vulnerabilities in the Nation's critical
     infrastructure and key resources.
       (d) Consultation on Institute Activities.--In carrying out
     the duties described in subsection (c), the Institute shall
     consult widely with representatives from private industry,
     institutions of higher education, nonprofit institutions,
     other Government agencies, and federally funded reseach and
     development centers.
       (e) Use of Centers.--The Institute shall utilize the
     capabilities of the National Infrastructure Simulation and
     Analysis Center.
       (f) Annual Reports.--The Institute shall transmit to the
     Secretary and Congress an annual report on the activities of
     the Institute under this section.
       (g) Termination.--The Homeland Security Institute shall
     terminate 3 years after the effective date of this Act.

     SEC. 313. TECHNOLOGY CLEARINGHOUSE TO ENCOURAGE AND SUPPORT
                   INNOVATIVE SOLUTIONS TO ENHANCE HOMELAND
                   SECURITY.

       (a) Establishment of Program.--The Secretary, acting
     through the Under Secretary for Science and Technology, shall
     establish and promote a program to encourage technological
     innovation in facilitating the mission of the Department (as
     described in section 101).
       (b) Elements of Program.--The program described in
     subsection (a) shall include the following components:
       (1) The establishment of a centralized Federal
     clearinghouse for information relating to technologies that
     would further the mission of the Department for
     dissemination, as appropriate, to Federal, State, and local
     government and private sector entities for additional review,
     purchase, or use.
       (2) The issuance of announcements seeking unique and
     innovative technologies to advance the mission of the
     Department.
       (3) The establishment of a technical assistance team to
     assist in screening, as appropriate, proposals submitted to
     the Secretary (except as provided in subsection (c)(2)) to
     assess the feasibility, scientific and technical merits, and
     estimated cost of such proposals, as appropriate.
       (4) The provision of guidance, recommendations, and
     technical assistance, as appropriate, to assist Federal,
     State, and local government and private sector efforts to
     evaluate and implement the use of technologies described in
     paragraph (1) or (2).
       (5) The provision of information for persons seeking
     guidance on how to pursue proposals to develop or deploy
     technologies that would enhance homeland security, including
     information relating to Federal funding, regulation, or
     acquisition.
       (c) Miscellaneous Provisions.--
       (1) In general.--Nothing in this section shall be construed
     as authorizing the Secretary or the technical assistance team
     established under subsection (b)(3) to set standards for
     technology to be used by the Department, any other executive
     agency, any State or local government entity, or any private
     sector entity.
       (2) Certain proposals.--The technical assistance team
     established under subsection (b)(3) shall not consider or
     evaluate proposals submitted in response to a solicitation
     for offers for a pending procurement or for a specific agency
     requirement.
       (3) Coordination.--In carrying out this section, the
     Secretary shall coordinate with the Technical Support Working
     Group (organized under the April 1982 National Security
     Decision Directive Numbered 30).

	 [...]


	      SEC. 880. PROHIBITION OF THE TERRORISM INFORMATION AND
                   PREVENTION SYSTEM.

       Any and all activities of the Federal Government to
     implement the proposed component program of the Citizen Corps
     known as Operation TIPS (Terrorism Information and Prevention
     System) are hereby prohibited.

	 [...]

	      SEC. 886. SENSE OF CONGRESS REAFFIRMING THE CONTINUED
                   IMPORTANCE AND APPLICABILITY OF THE POSSE
                   COMITATUS ACT.

       (a) Findings.--Congress finds the following:
       (1) Section 1385 of title 18, United States Code (commonly
     known as the "Posse Comitatus Act"), prohibits the use of
     the Armed Forces as a posse comitatus to execute the laws
     except in cases and under circumstances expressly authorized
     by the Constitution or Act of Congress.
       (2) Enacted in 1878, the Posse Comitatus Act was expressly
     intended to prevent United States Marshals, on their own
     initiative, from calling on the Army for assistance in
     enforcing Federal law.
       (3) The Posse Comitatus Act has served the Nation well in
     limiting the use of the Armed Forces to enforce the law.
       (4) Nevertheless, by its express terms, the Posse Comitatus
     Act is not a complete barrier to the use of the Armed Forces
     for a range of domestic purposes, including law enforcement
     functions, when the use of the Armed Forces is authorized by
     Act of Congress or the President determines that the use of
     the Armed Forces is required to fulfill the President's
     obligations under the Constitution to respond promptly in
     time of war, insurrection, or other serious emergency.
       (5) Existing laws, including chapter 15 of title 10, United
     States Code (commonly known as the "Insurrection Act"), and
     the Robert T. Stafford Disaster Relief and Emergency
     Assistance Act (42 U.S.C. 5121 et seq.), grant the President
     broad powers that may be invoked in the event of domestic
     emergencies, including an attack against the Nation using
     weapons of mass destruction, and these laws specifically
     authorize the President to use the Armed Forces to help
     restore public order.
       (b) Sense of Congress.--Congress reaffirms the continued
     importance of section 1385 of title 18, United States Code,
     and it is the sense of Congress that nothing in this Act
     should be construed to alter the applicability of such
     section to any use of the Armed Forces as a posse comitatus
     to execute the laws.


	 [...]

	                     Subtitle I--Information Sharing

     SEC. 891. SHORT TITLE; FINDINGS; AND SENSE OF CONGRESS.

       (a) Short Title.--This subtitle may be cited as the
     "Homeland Security Information Sharing Act".
       (b) Findings.--Congress finds the following:
       (1) The Federal Government is required by the Constitution
     to provide for the common defense, which includes terrorist
     attack.
       (2) The Federal Government relies on State and local
     personnel to protect against terrorist attack.
       (3) The Federal Government collects, creates, manages, and
     protects classified and sensitive but unclassified
     information to enhance homeland security.
       (4) Some homeland security information is needed by the
     State and local personnel to prevent and prepare for
     terrorist attack.
       (5) The needs of State and local personnel to have access
     to relevant homeland security information to combat terrorism
     must be reconciled with the need to preserve the protected
     status of such information and to protect the sources and
     methods used to acquire such information.
       (6) Granting security clearances to certain State and local
     personnel is one way to facilitate the sharing of information
     regarding specific terrorist threats among Federal, State,
     and local levels of government.
       (7) Methods exist to declassify, redact, or otherwise adapt
     classified information so it may be shared with State and
     local personnel without the need for granting additional
     security clearances.
       (8) State and local personnel have capabilities and
     opportunities to gather information on suspicious activities
     and terrorist threats not possessed by Federal agencies.
       (9) The Federal Government and State and local governments
     and agencies in other jurisdictions may benefit from such
     information.
       (10) Federal, State, and local governments and
     intelligence, law enforcement, and other emergency
     preparation and response agencies must act in partnership to
     maximize the benefits of information gathering and analysis
     to prevent and respond to terrorist attacks.
       (11) Information systems, including the National Law
     Enforcement Telecommunications System and the Terrorist
     Threat Warning System, have been established for rapid
     sharing of classified and sensitive but unclassified
     information among Federal, State, and local entities.
       (12) Increased efforts to share homeland security
     information should avoid duplicating existing information
     systems.
       (c) Sense of Congress.--It is the sense of Congress that
     Federal, State, and local entities should share homeland
     security information to the maximum extent practicable, with
     special emphasis on hard-to-reach urban and rural
     communities.

     SEC. 892. FACILITATING HOMELAND SECURITY INFORMATION SHARING
                   PROCEDURES.

       (a) Procedures for Determining Extent of Sharing of
     Homeland Security Information.--
       (1) The President shall prescribe and implement procedures
     under which relevant Federal agencies--
       (A) share relevant and appropriate homeland security
     information with other Federal agencies, including the
     Department, and appropriate State and local personnel;
       (B) identify and safeguard homeland security information
     that is sensitive but unclassified; and
       (C) to the extent such information is in classified form,
     determine whether, how, and to what extent to remove
     classified information, as appropriate, and with which such
     personnel it may be shared after such information is removed.
       (2) The President shall ensure that such procedures apply
     to all agencies of the Federal Government.
       (3) Such procedures shall not change the substantive
     requirements for the classification and safeguarding of
     classified information.
       (4) Such procedures shall not change the requirements and
     authorities to protect sources and methods.
       (b) Procedures for Sharing of Homeland Security
     Information.--
       (1) Under procedures prescribed by the President, all
     appropriate agencies, including the intelligence community,
     shall, through information sharing systems, share homeland
     security information with Federal agencies and appropriate
     State and local personnel to the extent such information may
     be shared, as determined in accordance with

[[Page H8681]]

     subsection (a), together with assessments of the credibility
     of such information.
       (2) Each information sharing system through which
     information is shared under paragraph (1) shall--
       (A) have the capability to transmit unclassified or
     classified information, though the procedures and recipients
     for each capability may differ;
       (B) have the capability to restrict delivery of information
     to specified subgroups by geographic location, type of
     organization, position of a recipient within an organization,
     or a recipient's need to know such information;
       (C) be configured to allow the efficient and effective
     sharing of information; and
       (D) be accessible to appropriate State and local personnel.
       (3) The procedures prescribed under paragraph (1) shall
     establish conditions on the use of information shared under
     paragraph (1)--
       (A) to limit the redissemination of such information to
     ensure that such information is not used for an unauthorized
     purpose;
       (B) to ensure the security and confidentiality of such
     information;
       (C) to protect the constitutional and statutory rights of
     any individuals who are subjects of such information; and
       (D) to provide data integrity through the timely removal
     and destruction of obsolete or erroneous names and
     information.
       (4) The procedures prescribed under paragraph (1) shall
     ensure, to the greatest extent practicable, that the
     information sharing system through which information is
     shared under such paragraph include existing information
     sharing systems, including, but not limited to, the National
     Law Enforcement Telecommunications System, the Regional
     Information Sharing System, and the Terrorist Threat Warning
     System of the Federal Bureau of Investigation.
       (5) Each appropriate Federal agency, as determined by the
     President, shall have access to each information sharing
     system through which information is shared under paragraph
     (1), and shall therefore have access to all information, as
     appropriate, shared under such paragraph.
       (6) The procedures prescribed under paragraph (1) shall
     ensure that appropriate State and local personnel are
     authorized to use such information sharing systems--
       (A) to access information shared with such personnel; and
       (B) to share, with others who have access to such
     information sharing systems, the homeland security
     information of their own jurisdictions, which shall be marked
     appropriately as pertaining to potential terrorist activity.
       (7) Under procedures prescribed jointly by the Director of
     Central Intelligence and the Attorney General, each
     appropriate Federal agency, as determined by the President,
     shall review and assess the information shared under
     paragraph (6) and integrate such information with existing
     intelligence.
       (c) Sharing of Classified Information and Sensitive but
     Unclassified Information With State and Local Personnel.--
       (1) The President shall prescribe procedures under which
     Federal agencies may, to the extent the President considers
     necessary, share with appropriate State and local personnel
     homeland security information that remains classified or
     otherwise protected after the determinations prescribed under
     the procedures set forth in subsection (a).
       (2) It is the sense of Congress that such procedures may
     include 1 or more of the following means:
       (A) Carrying out security clearance investigations with
     respect to appropriate State and local personnel.
       (B) With respect to information that is sensitive but
     unclassified, entering into nondisclosure agreements with
     appropriate State and local personnel.
       (C) Increased use of information-sharing partnerships that
     include appropriate State and local personnel, such as the
     Joint Terrorism Task Forces of the Federal Bureau of
     Investigation, the Anti-Terrorism Task Forces of the
     Department of Justice, and regional Terrorism Early Warning
     Groups.
       (d) Responsible Officials.--For each affected Federal
     agency, the head of such agency shall designate an official
     to administer this Act with respect to such agency.
       (e) Federal Control of Information.--Under procedures
     prescribed under this section, information obtained by a
     State or local government from a Federal agency under this
     section shall remain under the control of the Federal agency,
     and a State or local law authorizing or requiring such a
     government to disclose information shall not apply to such
     information.
       (f) Definitions.--As used in this section:
       (1) The term "homeland security information" means any
     information possessed by a Federal, State, or local agency
     that--
       (A) relates to the threat of terrorist activity;
       (B) relates to the ability to prevent, interdict, or
     disrupt terrorist activity;
       (C) would improve the identification or investigation of a
     suspected terrorist or terrorist organization; or
       (D) would improve the response to a terrorist act.
       (2) The term "intelligence community" has the meaning
     given such term in section 3(4) of the National Security Act
     of 1947 (50 U.S.C. 401a(4)).
       (3) The term "State and local personnel" means any of the
     following persons involved in prevention, preparation, or
     response for terrorist attack:
       (A) State Governors, mayors, and other locally elected
     officials.
       (B) State and local law enforcement personnel and
     firefighters.
       (C) Public health and medical professionals.
       (D) Regional, State, and local emergency management agency
     personnel, including State adjutant generals.
       (E) Other appropriate emergency response agency personnel.
       (F) Employees of private-sector entities that affect
     critical infrastructure, cyber, economic, or public health
     security, as designated by the Federal government in
     procedures developed pursuant to this section.
       (4) The term "State" includes the District of Columbia
     and any commonwealth, territory, or possession of the United
     States.
       (g) Construction.--Nothing in this Act shall be construed
     as authorizing any department, bureau, agency, officer, or
     employee of the Federal Government to request, receive, or
     transmit to any other Government entity or personnel, or
     transmit to any State or local entity or personnel otherwise
     authorized by this Act to receive homeland security
     information, any information collected by the Federal
     Government solely for statistical purposes in violation of
     any other provision of law relating to the confidentiality of
     such information.

     SEC. 893. REPORT.

       (a) Report Required.--Not later than 12 months after the
     date of the enactment of this Act, the President shall submit
     to the congressional committees specified in subsection (b) a
     report on the implementation of section 892. The report shall
     include any recommendations for additional measures or
     appropriation requests, beyond the requirements of section
     892, to increase the effectiveness of sharing of information
     between and among Federal, State, and local entities.
       (b) Specified Congressional Committees.--The congressional
     committees referred to in subsection (a) are the following
     committees:
       (1) The Permanent Select Committee on Intelligence and the
     Committee on the Judiciary of the House of Representatives.
       (2) The Select Committee on Intelligence and the Committee
     on the Judiciary of the Senate.

     SEC. 894. AUTHORIZATION OF APPROPRIATIONS.

       There are authorized to be appropriated such sums as may be
     necessary to carry out section 892.

     SEC. 895. AUTHORITY TO SHARE GRAND JURY INFORMATION.

       Rule 6(e) of the Federal Rules of Criminal Procedure is
     amended--
       (1) in paragraph (2), by inserting ", or of guidelines
     jointly issued by the Attorney General and Director of
     Central Intelligence pursuant to Rule 6," after "Rule 6";
     and
       (2) in paragraph (3)--
       (A) in subparagraph (A)(ii), by inserting "or of a foreign
     government" after "(including personnel of a state or
     subdivision of a state";
       (B) in subparagraph (C)(i)--
       (i) in subclause (I), by inserting before the semicolon the
     following: "or, upon a request by an attorney for the
     government, when sought by a foreign court or prosecutor for
     use in an official criminal investigation";
       (ii) in subclause (IV)--

       (I) by inserting "or foreign" after "may disclose a
     violation of State";
       (II) by inserting "or of a foreign government" after "to
     an appropriate official of a State or subdivision of a
     State"; and
       (III) by striking "or" at the end;

       (iii) by striking the period at the end of subclause (V)
     and inserting "; or"; and
       (iv) by adding at the end the following:
       "(VI) when matters involve a threat of actual or potential
     attack or other grave hostile acts of a foreign power or an
     agent of a foreign power, domestic or international sabotage,
     domestic or international terrorism, or clandestine
     intelligence gathering activities by an intelligence service
     or network of a foreign power or by an agent of a foreign
     power, within the United States or elsewhere, to any
     appropriate federal, state, local, or foreign government
     official for the purpose of preventing or responding to such
     a threat."; and
       (C) in subparagraph (C)(iii)--
       (i) by striking "Federal";
       (ii) by inserting "or clause (i)(VI)" after "clause
     (i)(V)"; and
       (iii) by adding at the end the following: "Any state,
     local, or foreign official who receives information pursuant
     to clause (i)(VI) shall use that information only consistent
     with such guidelines as the Attorney General and Director of
     Central Intelligence shall jointly issue.".

     SEC. 896. AUTHORITY TO SHARE ELECTRONIC, WIRE, AND ORAL
                   INTERCEPTION INFORMATION.

       Section 2517 of title 18, United States Code, is amended by
     adding at the end the following:
       "(7) Any investigative or law enforcement officer, or
     other Federal official in carrying out official duties as
     such Federal official, who by any means authorized by this
     chapter, has obtained knowledge of the contents of any wire,
     oral, or electronic communication, or evidence derived
     therefrom, may disclose such contents or derivative evidence
     to a foreign investigative or law enforcement officer to the
     extent that such disclosure is appropriate to the proper
     performance of the

[[Page H8682]]

     official duties of the officer making or receiving the
     disclosure, and foreign investigative or law enforcement
     officers may use or disclose such contents or derivative
     evidence to the extent such use or disclosure is appropriate
     to the proper performance of their official duties.
       "(8) Any investigative or law enforcement officer, or
     other Federal official in carrying out official duties as
     such Federal official, who by any means authorized by this
     chapter, has obtained knowledge of the contents of any wire,
     oral, or electronic communication, or evidence derived
     therefrom, may disclose such contents or derivative evidence
     to any appropriate Federal, State, local, or foreign
     government official to the extent that such contents or
     derivative evidence reveals a threat of actual or potential
     attack or other grave hostile acts of a foreign power or an
     agent of a foreign power, domestic or international sabotage,
     domestic or international terrorism, or clandestine
     intelligence gathering activities by an intelligence service
     or network of a foreign power or by an agent of a foreign
     power, within the United States or elsewhere, for the purpose
     of preventing or responding to such a threat. Any official
     who receives information pursuant to this provision may use
     that information only as necessary in the conduct of that
     person's official duties subject to any limitations on the
     unauthorized disclosure of such information, and any State,
     local, or foreign official who receives information pursuant
     to this provision may use that information only consistent
     with such guidelines as the Attorney General and Director of
     Central Intelligence shall jointly issue.".

     SEC. 897. FOREIGN INTELLIGENCE INFORMATION.

       (a) Dissemination Authorized.--Section 203(d)(1) of the
     Uniting and Strengthening America by Providing Appropriate
     Tools Required to Intercept and Obstruct Terrorism (USA
     PATRIOT ACT) Act of 2001 (Public Law 107-56; 50 U.S.C. 403-
     5d) is amended by adding at the end the following:
     "Consistent with the responsibility of the Director of
     Central Intelligence to protect intelligence sources and
     methods, and the responsibility of the Attorney General to
     protect sensitive law enforcement information, it shall be
     lawful for information revealing a threat of actual or
     potential attack or other grave hostile acts of a foreign
     power or an agent of a foreign power, domestic or
     international sabotage, domestic or international terrorism,
     or clandestine intelligence gathering activities by an
     intelligence service or network of a foreign power or by an
     agent of a foreign power, within the United States or
     elsewhere, obtained as part of a criminal investigation to be
     disclosed to any appropriate Federal, State, local, or
     foreign government official for the purpose of preventing or
     responding to such a threat. Any official who receives
     information pursuant to this provision may use that
     information only as necessary in the conduct of that person's
     official duties subject to any limitations on the
     unauthorized disclosure of such information, and any State,
     local, or foreign official who receives information pursuant
     to this provision may use that information only consistent
     with such guidelines as the Attorney General and Director of
     Central Intelligence shall jointly issue.".
       (b) Conforming Amendments.--Section 203(c) of that Act is
     amended--
       (1) by striking "section 2517(6)" and inserting
     "paragraphs (6) and (8) of section 2517 of title 18, United
     States Code,"; and
       (2) by inserting "and (VI)" after "Rule
     6(e)(3)(C)(i)(V)".

     SEC. 898. INFORMATION ACQUIRED FROM AN ELECTRONIC
                   SURVEILLANCE.

       Section 106(k)(1) of the Foreign Intelligence Surveillance
     Act of 1978 (50 U.S.C. 1806) is amended by inserting after
     "law enforcement officers" the following: "or law
     enforcement personnel of a State or political subdivision of
     a State (including the chief executive officer of that State
     or political subdivision who has the authority to appoint or
     direct the chief law enforcement officer of that State or
     political subdivision)".

     SEC. 899. INFORMATION ACQUIRED FROM A PHYSICAL SEARCH.

       Section 305(k)(1) of the Foreign Intelligence Surveillance
     Act of 1978 (50 U.S.C. 1825) is amended by inserting after
     "law enforcement officers" the following: "or law
     enforcement personnel of a State or political subdivision of
     a State (including the chief executive officer of that State
     or political subdivision who has the authority to appoint or
     direct the chief law enforcement officer of that State or
     political subdivision)".

	 [...]

	                      TITLE X--INFORMATION SECURITY

     SEC. 1001. INFORMATION SECURITY.

       (a) Short Title.--This title may be cited as the "Federal
     Information Security Management Act of 2002".
       (b) Information Security.--
       (1) In general.--Subchapter II of chapter 35 of title 44,
     United States Code, is amended to read as follows:

                 "SUBCHAPTER II--INFORMATION SECURITY

     "Sec. 3531. Purposes

       "The purposes of this subchapter are to--
       "(1) provide a comprehensive framework for ensuring the
     effectiveness of information security controls over
     information resources that support Federal operations and
     assets;
       "(2) recognize the highly networked nature of the current
     Federal computing environment and provide effective
     governmentwide management and oversight of the related
     information security risks, including coordination of
     information security efforts throughout the civilian,
     national security, and law enforcement communities;
       "(3) provide for development and maintenance of minimum
     controls required to protect Federal information and
     information systems;
       "(4) provide a mechanism for improved oversight of Federal
     agency information security programs;
       "(5) acknowledge that commercially developed information
     security products offer advanced, dynamic, robust, and
     effective information security solutions, reflecting market
     solutions for the protection of critical information
     infrastructures important to the national defense and
     economic security of the nation that are designed, built, and
     operated by the private sector; and
       "(6) recognize that the selection of specific technical
     hardware and software information security solutions should
     be left to individual agencies from among commercially
     developed products.".

     "Sec. 3532. Definitions

       "(a) In General.--Except as provided under subsection (b),
     the definitions under section 3502 shall apply to this
     subchapter.
       "(b) Additional Definitions.--As used in this subchapter--
       "(1) the term `information security' means protecting
     information and information systems from unauthorized access,
     use, disclosure, disruption, modification, or destruction in
     order to provide--
       "(A) integrity, which means guarding against improper
     information modification or destruction, and includes
     ensuring information nonrepudiation and authenticity;
       "(B) confidentiality, which means preserving authorized
     restrictions on access and disclosure, including means for
     protecting personal privacy and proprietary information;
       "(C) availability, which means ensuring timely and
     reliable access to and use of information; and
       "(D) authentication, which means utilizing digital
     credentials to assure the identity of users and validate
     their access;
       "(2) the term `national security system' means any
     information system (including any telecommunications system)
     used or operated by an agency or by a contractor of an
     agency, or other organization on behalf of an agency, the
     function, operation, or use of which--
       "(A) involves intelligence activities;
       "(B) involves cryptologic activities related to national
     security;
       "(C) involves command and control of military forces;
       "(D) involves equipment that is an integral part of a
     weapon or weapons system; or
       "(E) is critical to the direct fulfillment of military or
     intelligence missions provided that this definition does not
     apply to a system that is used for routine administrative and
     business applications (including payroll, finance, logistics,
     and personnel management applications);
       "(3) the term `information technology' has the meaning
     given that term in section 11101 of title 40; and
       "(4) the term `information system' means any equipment or
     interconnected system or subsystems of equipment that is used
     in the

[[Page H8683]]

     automatic acquisition, storage, manipulation, management,
     movement, control, display, switching, interchange,
     transmission, or reception of data or information, and
     includes--
       "(A) computers and computer networks;
       "(B) ancillary equipment;
       "(C) software, firmware, and related procedures;
       "(D) services, including support services; and
       "(E) related resources.".

     "Sec. 3533. Authority and functions of the Director

       "(a) The Director shall oversee agency information
     security policies and practices, by--
       "(1) promulgating information security standards under
     section 11331 of title 40;
       "(2) overseeing the implementation of policies,
     principles, standards, and guidelines on information
     security;
       "(3) requiring agencies, consistent with the standards
     promulgated under such section 11331 and the requirements of
     this subchapter, to identify and provide information security
     protections commensurate with the risk and magnitude of the
     harm resulting from the unauthorized access, use, disclosure,
     disruption, modification, or destruction of--
       "(A) information collected or maintained by or on behalf
     of an agency; or
       "(B) information systems used or operated by an agency or
     by a contractor of an agency or other organization on behalf
     of an agency;
       "(4) coordinating the development of standards and
     guidelines under section 20 of the National Institute of
     Standards and Technology Act (15 U.S.C. 278g-3) with agencies
     and offices operating or exercising control of national
     security systems (including the National Security Agency) to
     assure, to the maximum extent feasible, that such standards
     and guidelines are complementary with standards and
     guidelines developed for national security systems;
       "(5) overseeing agency compliance with the requirements of
     this subchapter, including through any authorized action
     under section 11303(b)(5) of title 40, to enforce
     accountability for compliance with such requirements;
       "(6) reviewing at least annually, and approving or
     disapproving, agency information security programs required
     under section 3534(b);
       "(7) coordinating information security policies and
     procedures with related information resources management
     policies and procedures; and
       "(8) reporting to Congress no later than March 1 of each
     year on agency compliance with the requirements of this
     subchapter, including--
       "(A) a summary of the findings of evaluations required by
     section 3535;
       "(B) significant deficiencies in agency information
     security practices;
       "(C) planned remedial action to address such deficiencies;
     and
       "(D) a summary of, and the views of the Director on, the
     report prepared by the National Institute of Standards and
     Technology under section 20(e)(7) of the National Institute
     of Standards and Technology Act (15 U.S.C. 278g-3).".
       "(b) Except for the authorities described in paragraphs
     (4) and (7) of subsection (a), the authorities of the
     Director under this section shall not apply to national
     security systems.

     "Sec. 3534. Federal agency responsibilities

       "(a) The head of each agency shall--
       "(1) be responsible for--
       "(A) providing information security protections
     commensurate with the risk and magnitude of the harm
     resulting from unauthorized access, use, disclosure,
     disruption, modification, or destruction of--
       "(i) information collected or maintained by or on behalf
     of the agency; and
       "(ii) information systems used or operated by an agency or
     by a contractor of an agency or other organization on behalf
     of an agency;
       "(B) complying with the requirements of this subchapter
     and related policies, procedures, standards, and guidelines,
     including--
       "(i) information security standards promulgated by the
     Director under section 11331 of title 40; and
       "(ii) information security standards and guidelines for
     national security systems issued in accordance with law and
     as directed by the President; and
       "(C) ensuring that information security management
     processes are integrated with agency strategic and
     operational planning processes;
       "(2) ensure that senior agency officials provide
     information security for the information and information
     systems that support the operations and assets under their
     control, including through--
       "(A) assessing the risk and magnitude of the harm that
     could result from the unauthorized access, use, disclosure,
     disruption, modification, or destruction of such information
     or information systems;
       "(B) determining the levels of information security
     appropriate to protect such information and information
     systems in accordance with standards promulgated under
     section 11331 of title 40 for information security
     classifications and related requirements;
       "(C) implementing policies and procedures to cost-
     effectively reduce risks to an acceptable level; and
       "(D) periodically testing and evaluating information
     security controls and techniques to ensure that they are
     effectively implemented;
       "(3) delegate to the agency Chief Information Officer
     established under section 3506 (or comparable official in an
     agency not covered by such section) the authority to ensure
     compliance with the requirements imposed on the agency under
     this subchapter, including--
       "(A) designating a senior agency information security
     officer who shall--
       "(i) carry out the Chief Information Officer's
     responsibilities under this section;
       "(ii) possess professional qualifications, including
     training and experience, required to administer the functions
     described under this section;
       "(iii) have information security duties as that official's
     primary duty; and
       "(iv) head an office with the mission and resources to
     assist in ensuring agency compliance with this section;
       "(B) developing and maintaining an agencywide information
     security program as required by subsection (b);
       "(C) developing and maintaining information security
     policies, procedures, and control techniques to address all
     applicable requirements, including those issued under section
     3533 of this title, and section 11331 of title 40;
       "(D) training and overseeing personnel with significant
     responsibilities for information security with respect to
     such responsibilities; and
       "(E) assisting senior agency officials concerning their
     responsibilities under paragraph (2);
       "(4) ensure that the agency has trained personnel
     sufficient to assist the agency in complying with the
     requirements of this subchapter and related policies,
     procedures, standards, and guidelines; and
       "(5) ensure that the agency Chief Information Officer, in
     coordination with other senior agency officials, reports
     annually to the agency head on the effectiveness of the
     agency information security program, including progress of
     remedial actions.
       "(b) Each agency shall develop, document, and implement an
     agencywide information security program, approved by the
     Director under section 3533(a)(5), to provide information
     security for the information and information systems that
     support the operations and assets of the agency, including
     those provided or managed by another agency, contractor, or
     other source, that includes--
       "(1) periodic assessments of the risk and magnitude of the
     harm that could result from the unauthorized access, use,
     disclosure, disruption, modification, or destruction of
     information and information systems that support the
     operations and assets of the agency;
       "(2) policies and procedures that--
       "(A) are based on the risk assessments required by
     paragraph (1);
       "(B) cost-effectively reduce information security risks to
     an acceptable level;
       "(C) ensure that information security is addressed
     throughout the life cycle of each agency information system;
     and
       "(D) ensure compliance with--
       "(i) the requirements of this subchapter;
       "(ii) policies and procedures as may be prescribed by the
     Director, and information security standards promulgated
     under section 11331 of title 40;
       "(iii) minimally acceptable system configuration
     requirements, as determined by the agency; and
       "(iv) any other applicable requirements, including
     standards and guidelines for national security systems issued
     in accordance with law and as directed by the President;
       "(3) subordinate plans for providing adequate information
     security for networks, facilities, and systems or groups of
     information systems, as appropriate;
       "(4) security awareness training to inform personnel,
     including contractors and other users of information systems
     that support the operations and assets of the agency, of--
       "(A) information security risks associated with their
     activities; and
       "(B) their responsibilities in complying with agency
     policies and procedures designed to reduce these risks;
       "(5) periodic testing and evaluation of the effectiveness
     of information security policies, procedures, and practices,
     to be performed with a frequency depending on risk, but no
     less than annually, of which such testing--
       "(A) shall include testing of management, operational, and
     technical controls of every information system identified in
     the inventory required under section 3505(c); and
       "(B) may include testing relied on in a evaluation under
     section 3535;
       "(6) a process for planning, implementing, evaluating, and
     documenting remedial action to address any deficiencies in
     the information security policies, procedures, and practices
     of the agency;
       "(7) procedures for detecting, reporting, and responding
     to security incidents, including--
       "(A) mitigating risks associated with such incidents
     before substantial damage is done; and
       "(B) notifying and consulting with, as appropriate--
       "(i) law enforcement agencies and relevant Offices of
     Inspector General;
       "(ii) an office designated by the President for any
     incident involving a national security system; and
       "(iii) any other agency or office, in accordance with law
     or as directed by the President; and

[[Page H8684]]

       "(8) plans and procedures to ensure continuity of
     operations for information systems that support the
     operations and assets of the agency.
       "(c) Each agency shall--
       "(1) report annually to the Director, the Committees on
     Government Reform and Science of the House of
     Representatives, the Committees on Governmental Affairs and
     Commerce, Science, and Transportation of the Senate, the
     appropriate authorization and appropriations committees of
     Congress, and the Comptroller General on the adequacy and
     effectiveness of information security policies, procedures,
     and practices, and compliance with the requirements of this
     subchapter, including compliance with each requirement of
     subsection (b);
       "(2) address the adequacy and effectiveness of information
     security policies, procedures, and practices in plans and
     reports relating to--
       "(A) annual agency budgets;
       "(B) information resources management under subchapter 1
     of this chapter;
       "(C) information technology management under subtitle III
     of title 40;
       "(D) program performance under sections 1105 and 1115
     through 1119 of title 31, and sections 2801 and 2805 of title
     39;
       "(E) financial management under chapter 9 of title 31, and
     the Chief Financial Officers Act of 1990 (31 U.S.C. 501 note;
     Public Law 101-576) (and the amendments made by that Act);
       "(F) financial management systems under the Federal
     Financial Management Improvement Act (31 U.S.C. 3512 note);
     and
       "(G) internal accounting and administrative controls under
     section 3512 of title 31, United States Code, (known as the
     `Federal Managers Financial Integrity Act'); and
       "(3) report any significant deficiency in a policy,
     procedure, or practice identified under paragraph (1) or
     (2)--
       "(A) as a material weakness in reporting under section
     3512 of title 31; and
       "(B) if relating to financial management systems, as an
     instance of a lack of substantial compliance under the
     Federal Financial Management Improvement Act (31 U.S.C. 3512
     note).
       "(d)(1) In addition to the requirements of subsection (c),
     each agency, in consultation with the Director, shall include
     as part of the performance plan required under section 1115
     of title 31 a description of--
       "(A) the time periods, and
       "(B) the resources, including budget, staffing, and
     training,

     that are necessary to implement the program required under
     subsection (b).
       "(2) The description under paragraph (1) shall be based on
     the risk assessments required under subsection (b)(2)(1).
       "(e) Each agency shall provide the public with timely
     notice and opportunities for comment on proposed information
     security policies and procedures to the extent that such
     policies and procedures affect communication with the public.

     "Sec. 3535. Annual independent evaluation

       "(a)(1) Each year each agency shall have performed an
     independent evaluation of the information security program
     and practices of that agency to determine the effectiveness
     of such program and practices.
       "(2) Each evaluation by an agency under this section shall
     include--
       "(A) testing of the effectiveness of information security
     policies, procedures, and practices of a representative
     subset of the agency's information systems;
       "(B) an assessment (made on the basis of the results of
     the testing) of compliance with--
       "(i) the requirements of this subchapter; and
       "(ii) related information security policies, procedures,
     standards, and guidelines; and
       "(C) separate presentations, as appropriate, regarding
     information security relating to national security systems.
       "(b) Subject to subsection (c)--
       "(1) for each agency with an Inspector General appointed
     under the Inspector General Act of 1978, the annual
     evaluation required by this section shall be performed by the
     Inspector General or by an independent external auditor, as
     determined by the Inspector General of the agency; and
       "(2) for each agency to which paragraph (1) does not
     apply, the head of the agency shall engage an independent
     external auditor to perform the evaluation.
       "(c) For each agency operating or exercising control of a
     national security system, that portion of the evaluation
     required by this section directly relating to a national
     security system shall be performed--
       "(1) only by an entity designated by the agency head; and
       "(2) in such a manner as to ensure appropriate protection
     for information associated with any information security
     vulnerability in such system commensurate with the risk and
     in accordance with all applicable laws.
       "(d) The evaluation required by this section--
       "(1) shall be performed in accordance with generally
     accepted government auditing standards; and
       "(2) may be based in whole or in part on an audit,
     evaluation, or report relating to programs or practices of
     the applicable agency.
       "(e) Each year, not later than such date established by
     the Director, the head of each agency shall submit to the
     Director the results of the evaluation required under this
     section.
       "(f) Agencies and evaluators shall take appropriate steps
     to ensure the protection of information which, if disclosed,
     may adversely affect information security. Such protections
     shall be commensurate with the risk and comply with all
     applicable laws and regulations.
       "(g)(1) The Director shall summarize the results of the
     evaluations conducted under this section in the report to
     Congress required under section 3533(a)(8).
       "(2) The Director's report to Congress under this
     subsection shall summarize information regarding information
     security relating to national security systems in such a
     manner as to ensure appropriate protection for information
     associated with any information security vulnerability in
     such system commensurate with the risk and in accordance with
     all applicable laws.
       "(3) Evaluations and any other descriptions of information
     systems under the authority and control of the Director of
     Central Intelligence or of National Foreign Intelligence
     Programs systems under the authority and control of the
     Secretary of Defense shall be made available to Congress only
     through the appropriate oversight committees of Congress, in
     accordance with applicable laws.
       "(h) The Comptroller General shall periodically evaluate
     and report to Congress on--
       "(1) the adequacy and effectiveness of agency information
     security policies and practices; and
       "(2) implementation of the requirements of this
     subchapter.

     "Sec. 3536. National security systems

       "The head of each agency operating or exercising control
     of a national security system shall be responsible for
     ensuring that the agency--
       "(1) provides information security protections
     commensurate with the risk and magnitude of the harm
     resulting from the unauthorized access, use, disclosure,
     disruption, modification, or destruction of the information
     contained in such system;
       "(2) implements information security policies and
     practices as required by standards and guidelines for
     national security systems, issued in accordance with law and
     as directed by the President; and
       "(3) complies with the requirements of this subchapter.

     "Sec. 3537. Authorization of appropriations

       "There are authorized to be appropriated to carry out the
     provisions of this subchapter such sums as may be necessary
     for each of fiscal years 2003 through 2007.

     "Sec. 3538. Effect on existing law

       "Nothing in this subchapter, section 11331 of title 40, or
     section 20 of the National Standards and Technology Act (15
     U.S.C. 278g-3) may be construed as affecting the authority of
     the President, the Office of Management and Budget or the
     Director thereof, the National Institute of Standards and
     Technology, or the head of any agency, with respect to the
     authorized use or disclosure of information, including with
     regard to the protection of personal privacy under section
     552a of title 5, the disclosure of information under section
     552 of title 5, the management and disposition of records
     under chapters 29, 31, or 33 of title 44, the management of
     information resources under subchapter I of chapter 35 of
     this title, or the disclosure of information to Congress or
     the Comptroller General of the United States.".
       (2) Clerical amendment.--The items in the table of sections
     at the beginning of such chapter 35 under the heading
     "SUBCHAPTER II" are amended to read as follows:

"3531. Purposes.
"3532. Definitions.
"3533. Authority and functions of the Director.
"3534. Federal agency responsibilities.
"3535. Annual independent evaluation.
"3536. National security systems.
"3537. Authorization of appropriations.
"3538. Effect on existing law.".
       (c) Information Security Responsibilities of Certain
     Agencies.--
       (1) National security responsibilities.--(A) Nothing in
     this Act (including any amendment made by this Act) shall
     supersede any authority of the Secretary of Defense, the
     Director of Central Intelligence, or other agency head, as
     authorized by law and as directed by the President, with
     regard to the operation, control, or management of national
     security systems, as defined by section 3532(3) of title 44,
     United States Code.
       (B) Section 2224 of title 10, United States Code, is
     amended--
       (i) in subsection 2224(b), by striking "(b) Objectives and
     Minimum Requirements.--(1)" and inserting "(b) Objectives
     of the Program.--";
       (ii) in subsection 2224(b), by striking "(2) the program
     shall at a minimum meet the requirements of section 3534 and
     3535 of title 44, United States Code."; and
       (iii) in subsection 2224(c), by inserting ", including
     through compliance with subtitle II of chapter 35 of title
     44" after "infrastructure".
       (2) Atomic energy act of 1954.--Nothing in this Act shall
     supersede any requirement made by or under the Atomic Energy
     Act of 1954 (42 U.S.C. 2011 et seq.). Restricted Data or
     Formerly Restricted Data shall be handled, protected,
     classified, downgraded, and declassified in conformity with
     the Atomic Energy Act of 1954 (42 U.S.C. 2011 et seq.).

[[Page H8685]]

     SEC. 1002. MANAGEMENT OF INFORMATION TECHNOLOGY.

       (a) In General.--Section 11331 of title 40, United States
     Code, is amended to read as follows:

     "Sec. 11331. Responsibilities for Federal information
       systems standards

       "(a) Definition.--In this section, the term `information
     security' has the meaning given that term in section
     3532(b)(1) of title 44.
       "(b) Requirement to Prescribe Standards.--
       "(1) In general.--
       "(A) Requirement.--Except as provided under paragraph (2),
     the Director of the Office of Management and Budget shall, on
     the basis of proposed standards developed by the National
     Institute of Standards and Technology pursuant to paragraphs
     (2) and (3) of section 20(a) of the National Institute of
     Standards and Technology Act (15 U.S.C. 278g-3(a)) and in
     consultation with the Secretary of Homeland Security,
     promulgate information security standards pertaining to
     Federal information systems.
       "(B) Required standards.--Standards promulgated under
     subparagraph (A) shall include--
       "(i) standards that provide minimum information security
     requirements as determined under section 20(b) of the
     National Institute of Standards and Technology Act (15 U.S.C.
     278g-3(b)); and
       "(ii) such standards that are otherwise necessary to
     improve the efficiency of operation or security of Federal
     information systems.
       "(C) Required standards binding.--Information security
     standards described under subparagraph (B) shall be
     compulsory and binding.
       "(2) Standards and guidelines for national security
     systems.--Standards and guidelines for national security
     systems, as defined under section 3532(3) of title 44, shall
     be developed, promulgated, enforced, and overseen as
     otherwise authorized by law and as directed by the President.
       "(c) Application of More Stringent Standards.--The head of
     an agency may employ standards for the cost-effective
     information security for all operations and assets within or
     under the supervision of that agency that are more stringent
     than the standards promulgated by the Director under this
     section, if such standards--
       "(1) contain, at a minimum, the provisions of those
     applicable standards made compulsory and binding by the
     Director; and
       "(2) are otherwise consistent with policies and guidelines
     issued under section 3533 of title 44.
       "(d) Requirements Regarding Decisions by Director.--
       "(1) Deadline.--The decision regarding the promulgation of
     any standard by the Director under subsection (b) shall occur
     not later than 6 months after the submission of the proposed
     standard to the Director by the National Institute of
     Standards and Technology, as provided under section 20 of the
     National Institute of Standards and Technology Act (15 U.S.C.
     278g-3).
       "(2) Notice and comment.--A decision by the Director to
     significantly modify, or not promulgate, a proposed standard
     submitted to the Director by the National Institute of
     Standards and Technology, as provided under section 20 of the
     National Institute of Standards and Technology Act (15 U.S.C.
     278g-3), shall be made after the public is given an
     opportunity to comment on the Director's proposed
     decision.".
       (b) Clerical Amendment.--The table of sections at the
     beginning of chapter 113 of title 40, United States Code, is
     amended by striking the item relating to section 11331 and
     inserting the following:

"11331. Responsibilities for Federal information systems standards.".

     SEC. 1003. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY.

       Section 20 of the National Institute of Standards and
     Technology Act (15 U.S.C. 278g-3), is amended by striking the
     text and inserting the following:
       "(a) The Institute shall--
       "(1) have the mission of developing standards, guidelines,
     and associated methods and techniques for information
     systems;
       "(2) develop standards and guidelines, including minimum
     requirements, for information systems used or operated by an
     agency or by a contractor of an agency or other organization
     on behalf of an agency, other than national security systems
     (as defined in section 3532(b)(2) of title 44, United States
     Code);
       "(3) develop standards and guidelines, including minimum
     requirements, for providing adequate information security for
     all agency operations and assets, but such standards and
     guidelines shall not apply to national security systems; and
       "(4) carry out the responsibilities described in paragraph
     (3) through the Computer Security Division.
       "(b) The standards and guidelines required by subsection
     (a) shall include, at a minimum--
       "(1)(A) standards to be used by all agencies to categorize
     all information and information systems collected or
     maintained by or on behalf of each agency based on the
     objectives of providing appropriate levels of information
     security according to a range of risk levels;
       "(B) guidelines recommending the types of information and
     information systems to be included in each such category; and
       "(C) minimum information security requirements for
     information and information systems in each such category;
       "(2) a definition of and guidelines concerning detection
     and handling of information security incidents; and
       "(3) guidelines developed in coordination with the
     National Security Agency for identifying an information
     system as a national security system consistent with
     applicable requirements for national security systems, issued
     in accordance with law and as directed by the President.
       "(c) In developing standards and guidelines required by
     subsections (a) and (b), the Institute shall--
       "(1) consult with other agencies and offices (including,
     but not limited to, the Director of the Office of Management
     and Budget, the Departments of Defense and Energy, the
     National Security Agency, the General Accounting Office, and
     the Secretary of Homeland Security) to assure--
       "(A) use of appropriate information security policies,
     procedures, and techniques, in order to improve information
     security and avoid unnecessary and costly duplication of
     effort; and
       "(B) that such standards and guidelines are complementary
     with standards and guidelines employed for the protection of
     national security systems and information contained in such
     systems;
       "(2) provide the public with an opportunity to comment on
     proposed standards and guidelines;
       "(3) submit to the Director of the Office of Management
     and Budget for promulgation under section 11331 of title 40,
     United States Code--
       "(A) standards, as required under subsection (b)(1)(A), no
     later than 12 months after the date of the enactment of this
     section; and
       "(B) minimum information security requirements for each
     category, as required under subsection (b)(1)(C), no later
     than 36 months after the date of the enactment of this
     section;
       "(4) issue guidelines as required under subsection
     (b)(1)(B), no later than 18 months after the date of the
     enactment of this Act;
       "(5) ensure that such standards and guidelines do not
     require specific technological solutions or products,
     including any specific hardware or software security
     solutions;
       "(6) ensure that such standards and guidelines provide for
     sufficient flexibility to permit alternative solutions to
     provide equivalent levels of protection for identified
     information security risks; and
       "(7) use flexible, performance-based standards and
     guidelines that, to the greatest extent possible, permit the
     use of off-the-shelf commercially developed information
     security products.
       "(d) The Institute shall--
       "(1) submit standards developed pursuant to subsection
     (a), along with recommendations as to the extent to which
     these should be made compulsory and binding, to the Director
     of the Office of Management and Budget for promulgation under
     section 11331 of title 40, United States Code;
       "(2) provide assistance to agencies regarding--
       "(A) compliance with the standards and guidelines
     developed under subsection (a);
       "(B) detecting and handling information security
     incidents; and
       "(C) information security policies, procedures, and
     practices;
       "(3) conduct research, as needed, to determine the nature
     and extent of information security vulnerabilities and
     techniques for providing cost-effective information security;
       "(4) develop and periodically revise performance
     indicators and measures for agency information security
     policies and practices;
       "(5) evaluate private sector information security policies
     and practices and commercially available information
     technologies to assess potential application by agencies to
     strengthen information security;
       "(6) evaluate security policies and practices developed
     for national security systems to assess potential application
     by agencies to strengthen information security;
       "(7) periodically assess the effectiveness of standards
     and guidelines developed under this section and undertake
     revisions as appropriate;
       "(8) solicit and consider the recommendations of the
     Information Security and Privacy Advisory Board, established
     by section 21, regarding standards and guidelines developed
     under subsection (a) and submit such recommendations to the
     Director of the Office of Management and Budget with such
     standards submitted to the Director; and
       "(9) prepare an annual public report on activities
     undertaken in the previous year, and planned for the coming
     year, to carry out responsibilities under this section.
       "(e) As used in this section--
       "(1) the term `agency' has the same meaning as provided in
     section 3502(1) of title 44, United States Code;
       "(2) the term `information security' has the same meaning
     as provided in section 3532(1) of such title;
       "(3) the term `information system' has the same meaning as
     provided in section 3502(8) of such title;
       "(4) the term `information technology' has the same
     meaning as provided in section 11101 of title 40, United
     States Code; and
       "(5) the term `national security system' has the same
     meaning as provided in section 3532(b)(2) of such title.".

[[Page H8686]]

     SEC. 1004. INFORMATION SECURITY AND PRIVACY ADVISORY BOARD.

       Section 21 of the National Institute of Standards and
     Technology Act (15 U.S.C. 278g-4), is amended--
       (1) in subsection (a), by striking "Computer System
     Security and Privacy Advisory Board" and inserting
     "Information Security and Privacy Advisory Board";
       (2) in subsection (a)(1), by striking "computer or
     telecommunications" and inserting "information
     technology";
       (3) in subsection (a)(2)--
       (A) by striking "computer or telecommunications
     technology" and inserting "information technology"; and
       (B) by striking "computer or telecommunications
     equipment" and inserting "information technology";
       (4) in subsection (a)(3)--
       (A) by striking "computer systems" and inserting
     "information system"; and
       (B) by striking "computer systems security" and inserting
     "information security";
       (5) in subsection (b)(1) by striking "computer systems
     security" and inserting "information security";
       (6) in subsection (b) by striking paragraph (2) and
     inserting the following:
       "(2) to advise the Institute and the Director of the
     Office of Management and Budget on information security and
     privacy issues pertaining to Federal Government information
     systems, including through review of proposed standards and
     guidelines developed under section 20; and";
       (7) in subsection (b)(3) by inserting "annually" after
     "report";
       (8) by inserting after subsection (e) the following new
     subsection:
       "(f) The Board shall hold meetings at such locations and
     at such time and place as determined by a majority of the
     Board.";
       (9) by redesignating subsections (f) and (g) as subsections
     (g) and (h), respectively; and
       (10) by striking subsection (h), as redesignated by
     paragraph (9), and inserting the following:
       "(h) As used in this section, the terms "information
     system" and "information technology" have the meanings
     given in section 20.".

     SEC. 1005. TECHNICAL AND CONFORMING AMENDMENTS.

       (a) Federal Computer System Security Training and Plan.--
       (1) Repeal.--Section 11332 of title 40, United States Code,
     is repealed.
       (2) Clerical amendment.--The table of sections at the
     beginning of chapter 113 of title 40, United States Code, as
     amended by striking the item relating to section 11332.
       (b) Floyd D. Spence National Defense Authorization Act for
     Fiscal Year 2001.--The Floyd D. Spence National Defense
     Authorization Act for Fiscal Year 2001 (Public Law 106-398)
     is amended by striking subtitle G of title X (44 U.S.C. 3531
     note).
       (c) Paperwork Reduction Act.--(1) Section 3504(g) of title
     44, United States Code, is amended--
       (A) by adding "and" at the end of paragraph (1);
       (B) in paragraph (2)--
       (i) by striking "sections 11331 and 11332(b) and (c) of
     title 40" and inserting "section 11331 of title 40 and
     subchapter II of this title"; and
       (ii) by striking the semicolon and inserting a period; and
       (C) by striking paragraph (3).
       (2) Section 3505 of such title is amended by adding at the
     end the following:
       "(c) Inventory of Information Systems.--(1) The head of
     each agency shall develop and maintain an inventory of the
     information systems (including national security systems)
     operated by or under the control of such agency;
       "(2) The identification of information systems in an
     inventory under this subsection shall include an
     identification of the interfaces between each such system and
     all other systems or networks, including those not operated
     by or under the control of the agency;
       "(3) Such inventory shall be--
       "(A) updated at least annually;
       "(B) made available to the Comptroller General; and
       "(C) used to support information resources management,
     including--
       "(i) preparation and maintenance of the inventory of
     information resources under section 3506(b)(4);
       "(ii) information technology planning, budgeting,
     acquisition, and management under section 3506(h), subtitle
     III of title 40, and related laws and guidance;
       "(iii) monitoring, testing, and evaluation of information
     security controls under subchapter II;
       "(iv) preparation of the index of major information
     systems required under section 552(g) of title 5, United
     States Code; and
       "(v) preparation of information system inventories
     required for records management under chapters 21, 29, 31,
     and 33.
       "(4) The Director shall issue guidance for and oversee the
     implementation of the requirements of this subsection.".
       (3) Section 3506(g) of such title is amended--
       (A) by adding "and" at the end of paragraph (1);
       (B) in paragraph (2)--
       (i) by striking "section 11332 of title 40" and inserting
     "subchapter II of this chapter"; and
       (ii) by striking "; and" and inserting a period; and
       (C) by striking paragraph (3).

     SEC. 1006. CONSTRUCTION.

       Nothing in this Act, or the amendments made by this Act,
     affects the authority of the National Institute of Standards
     and Technology or the Department of Commerce relating to the
     development and promulgation of standards or guidelines under
     paragraphs (1) and (2) of section 20(a) of the National
     Institute of Standards and Technology Act (15 U.S.C. 278g-
     3(a)).

	 [...]