<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Engrossed-in-Senate" bill-type="olc" public-print="no" public-private="public" stage-count="1" star-print="no-star-print"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>113 S2521 ES: Federal Information Security Modernization Act of 2014</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date></dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form display="yes">
<congress display="yes">113th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">S. 2521</legis-num><current-chamber display="no">IN THE SENATE OF THE UNITED STATES</current-chamber><legis-type display="yes">AN ACT</legis-type><official-title display="yes">To amend <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, to provide for 
		reform to Federal information security.</official-title></form><legis-body display-enacting-clause="yes-display-enacting-clause" style="OLC"><section commented="no" display-inline="no-display-inline" id="id6c19781bafb24695a071d326f183d582" section-type="section-one"><enum>1.</enum><header display-inline="yes-display-inline">Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Federal Information Security Modernization Act of 2014</short-title></quote>.</text></section><section commented="no" display-inline="no-display-inline" id="id93313EBBCE7344039317DECE3D1910F2" section-type="subsequent-section"><enum>2.</enum><header display-inline="yes-display-inline">FISMA reform</header><subsection commented="no" display-inline="no-display-inline" id="ida99dca0819304cb9b9f439a56d6cd53d"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline"><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">Chapter 35</external-xref> of title 44, United States Code, is amended by striking subchapters II and III and
			 inserting the following:</text><quoted-block display-inline="no-display-inline" id="id6D200A5A5CC34274978C1DBB089C9F22" style="USC"><subchapter commented="no" id="ID0F2B37F2C874476CB18D0546C1E65584" level-type="subsequent"><enum>II</enum><header display-inline="yes-display-inline">Information security</header><section commented="no" display-inline="no-display-inline" id="ID29A30A8EC8264A03A4D3494584BA7240" section-type="subsequent-section"><enum>3551.</enum><header display-inline="yes-display-inline">Purposes</header><text display-inline="no-display-inline">The purposes of this subchapter are to—</text><paragraph commented="no" display-inline="no-display-inline" id="ID93ACEF4816BC48AEBFED45DD7B6670CF"><enum>(1)</enum><text display-inline="yes-display-inline">provide a comprehensive framework for ensuring the effectiveness of information security controls
			 over information resources that support Federal operations and assets;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID7E7144113D484DD1B0DEF2C97D7D8096"><enum>(2)</enum><text display-inline="yes-display-inline">recognize the highly networked nature of the current Federal computing environment and provide
			 effective governmentwide management and oversight of the related
			 information security risks, including coordination of information security
			 efforts throughout the civilian, national security, and law enforcement
			 communities;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID30436A3703DF42AC9B15C05B57E263DD"><enum>(3)</enum><text display-inline="yes-display-inline">provide for development and maintenance of minimum controls required to protect Federal information
			 and information systems;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID4FC38EF76FD3447EBAE4CC475EC1A43C"><enum>(4)</enum><text display-inline="yes-display-inline">provide a mechanism for improved oversight of Federal agency information security programs,
			 including through automated security tools to continuously diagnose and
			 improve security;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDD8D160CBB84C49778578B7A55D8A76BC"><enum>(5)</enum><text display-inline="yes-display-inline">acknowledge that commercially developed information security products offer advanced, dynamic,
			 robust, and effective information security solutions, reflecting market
			 solutions for the protection of critical information infrastructures
			 important to the national defense and economic security of the nation that
			 are designed, built, and operated by the private sector; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID0113CAB27C30411D9E87A67FA31AA37F"><enum>(6)</enum><text display-inline="yes-display-inline">recognize that the selection of specific technical hardware and software information security
			 solutions should be left to individual agencies from among commercially
			 developed products.</text></paragraph></section><section commented="no" display-inline="no-display-inline" id="ID45BCEE4C30C24B5DA9B855C213CF9BCF" section-type="subsequent-section"><enum>3552.</enum><header display-inline="yes-display-inline">Definitions</header><subsection commented="no" display-inline="no-display-inline" id="ID872284FF66D249D5A7F9214CC711D71D"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Except as provided under subsection (b), the definitions under section 3502 shall apply to this
			 subchapter.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="ID22426EA057E6407B83763F8B4CA17602"><enum>(b)</enum><header display-inline="yes-display-inline">Additional definitions</header><text display-inline="yes-display-inline">As used in this subchapter:</text><paragraph commented="no" display-inline="no-display-inline" id="ida271f2e38dcd4c82be519d1d40234d6e"><enum>(1)</enum><text display-inline="yes-display-inline">The term <term>binding operational directive</term> means a compulsory direction to an agency that—</text><subparagraph commented="no" display-inline="no-display-inline" id="idA4AABFE40995421B80732959E78FFD59"><enum>(A)</enum><text display-inline="yes-display-inline">is for purposes of safeguarding Federal information and information systems from a known or
			 reasonably suspected information security threat, vulnerability, or risk;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5C44241F8B4E4A9CA43F7589E9B69D72"><enum>(B)</enum><text display-inline="yes-display-inline">shall be in accordance with policies, principles,
			 standards, and guidelines issued by the Director; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idC5951C858AEC48839026A6D0754D7995"><enum>(C)</enum><text display-inline="yes-display-inline">may be revised or repealed by the Director if the direction issued on behalf of the Director is not
			 in accordance with policies and principles developed by the Director.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8D9ED749625D4D2991E6BD23FD23B391"><enum>(2)</enum><text display-inline="yes-display-inline">The term <term>incident</term> means an occurrence that—</text><subparagraph commented="no" display-inline="no-display-inline" id="id2f28b03b7e044099ab2359a5b78879dc"><enum>(A)</enum><text display-inline="yes-display-inline">actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or
			 availability of information or an information system; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb3dd617465774e928e647604f99b0573"><enum>(B)</enum><text display-inline="yes-display-inline">constitutes a violation or imminent threat of violation of law, security policies, security
			 procedures, or acceptable use policies.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id01433154F1E14379A1B07D283ADB6E56"><enum>(3)</enum><text display-inline="yes-display-inline">The term <term>information security</term> means protecting information and information systems from unauthorized access, use, disclosure,
			 disruption, modification, or destruction in order to provide—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDF3DB9D93F8184761A35B95734238127D"><enum>(A)</enum><text display-inline="yes-display-inline">integrity, which means guarding against improper information modification or destruction, and
			 includes ensuring information nonrepudiation and authenticity;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID881EB10F8CD14F99A08B8D04B51F97A8"><enum>(B)</enum><text display-inline="yes-display-inline">confidentiality, which means preserving authorized restrictions on access and disclosure, including
			 means for protecting personal privacy and proprietary information; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDF5B137AF52DE41189BAD5C09248E638B"><enum>(C)</enum><text display-inline="yes-display-inline">availability, which means ensuring timely and reliable access to and use of information.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id575C198C862A40F2A0DFB408D6C351FB"><enum>(4)</enum><text display-inline="yes-display-inline">The term <term>information technology</term> has the meaning given that term in <external-xref legal-doc="usc" parsable-cite="usc/40/11101">section 11101</external-xref> of title 40.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id694FD4CDC13E4CEF8C6D3F45B2E43CAB"><enum>(5)</enum><text display-inline="yes-display-inline">The term <term>intelligence community</term> has the meaning given that term in section 3(4) of the National Security Act of 1947 (50 U.S.C.
			 3003(4)).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID0C769BC7C1A047A482215737260B1AB3"><enum>(6)</enum><subparagraph commented="no" display-inline="yes-display-inline" id="ID04EB59368B134A0CA6B6118B141CB58D"><enum>(A)</enum><text display-inline="yes-display-inline">The term <term>national security system</term> means any information system (including any telecommunications system) used or operated by an
			 agency or by a contractor of an agency, or other organization on behalf of
			 an agency—</text><clause commented="no" display-inline="no-display-inline" id="IDDE89513D272847D3A019C27F816E00C3" indent="up1"><enum>(i)</enum><text display-inline="yes-display-inline">the function, operation, or use of which—</text><subclause commented="no" display-inline="no-display-inline" id="ID98E7DF87EE9B4557B06FC589CB01AF39"><enum>(I)</enum><text display-inline="yes-display-inline">involves intelligence activities;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ID2F60D420C89F47C682CBEC16172A3ABF"><enum>(II)</enum><text display-inline="yes-display-inline">involves cryptologic activities related to national security;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ID68BF5EAEE42147C0BC2FAD6C53BCF3CF"><enum>(III)</enum><text display-inline="yes-display-inline">involves command and control of military forces;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ID4F361F7C4AB146FB9579FF943C732823"><enum>(IV)</enum><text display-inline="yes-display-inline">involves equipment that is an integral part of a weapon or weapons system; or</text></subclause><subclause commented="no" display-inline="no-display-inline" id="IDDFFCEA0D5F3844DDB0913ED5B66E7939"><enum>(V)</enum><text display-inline="yes-display-inline">subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence
			 missions; or</text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="ID8281CDD0D7A545CEA06F9B1277B32866" indent="up1"><enum>(ii)</enum><text display-inline="yes-display-inline">is protected at all times by procedures established for information that have been specifically
			 authorized under criteria established by an Executive order or an Act of
			 Congress to be kept classified in the interest of national defense or
			 foreign policy.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDF628947C192848AD807CBBA1B1B5DECA" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">Subparagraph (A)(i)(V) does not include a system that is to be used for routine administrative and
			 business applications (including payroll, finance, logistics, and
			 personnel management applications).</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id73a94dc154e94831bd07264b3bee727c"><enum>(7)</enum><text display-inline="yes-display-inline">The term <term>Secretary</term> means the Secretary of Homeland Security.</text></paragraph></subsection></section><section commented="no" display-inline="no-display-inline" id="ID4178B29272C7437D8EF27328DFEF16EC" section-type="subsequent-section"><enum>3553.</enum><header display-inline="yes-display-inline">Authority and functions of the Director and the Secretary</header><subsection commented="no" display-inline="no-display-inline" id="ID4928087A962F4EE9A78DB3BAD3D6D99F"><enum>(a)</enum><header display-inline="yes-display-inline">Director</header><text display-inline="yes-display-inline">The Director shall oversee agency information security policies and practices, including—</text><paragraph commented="no" display-inline="no-display-inline" id="ID74F32C42743D4C10B009702D60C61EC7"><enum>(1)</enum><text display-inline="yes-display-inline">developing and overseeing the implementation of policies, principles, standards, and guidelines on
			 information security, including through ensuring timely agency adoption of
			 and compliance with standards promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID2FC93593975048DE88B1E268E05C74C3"><enum>(2)</enum><text display-inline="yes-display-inline">requiring agencies, consistent with the standards promulgated under such section 11331 and the
			 requirements of this subchapter, to identify and provide information
			 security protections commensurate with the risk and magnitude of the harm
			 resulting from the unauthorized access, use, disclosure, disruption,
			 modification, or destruction of—</text><subparagraph commented="no" display-inline="no-display-inline" id="ID6FB7576664A648A48A114FA82E1C65D1"><enum>(A)</enum><text display-inline="yes-display-inline">information collected or maintained by or on behalf of an agency; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID4B7235A48EA64348A7542C94EF0A7ED1"><enum>(B)</enum><text display-inline="yes-display-inline">information systems used or operated by an agency or by a contractor of an agency or other
			 organization on behalf of an agency;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2681eba60b184281baa093d74b5fd2e0"><enum>(3)</enum><text display-inline="yes-display-inline">ensuring that the Secretary carries out the authorities and functions under subsection (b);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDA8C51A76D3F34486BB5294DBF2F4F06B"><enum>(4)</enum><text display-inline="yes-display-inline">coordinating the development of standards and guidelines under section 20 of the National Institute
			 of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3</external-xref>) with agencies and
			 offices operating or exercising control of national security systems
			 (including the National Security Agency) to assure, to the maximum extent
			 feasible, that such standards and guidelines are complementary with
			 standards and guidelines developed for national security systems;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDEFF871340A2141DB81F23854DDCDED60"><enum>(5)</enum><text display-inline="yes-display-inline">overseeing agency compliance with the requirements of this subchapter, including through any
			 authorized action under <external-xref legal-doc="usc" parsable-cite="usc/40/11303">section 11303</external-xref> of title 40, to enforce
			 accountability for compliance with such requirements; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID820EF13542184941AC25BE80C6C09D45"><enum>(6)</enum><text display-inline="yes-display-inline">coordinating information security policies and procedures with related information resources
			 management policies and procedures.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id5d1403d264494fdea08fb35a87f053d7"><enum>(b)</enum><header display-inline="yes-display-inline">Secretary</header><text display-inline="yes-display-inline">The Secretary, in consultation with the Director, shall administer the implementation  of agency
			 information security policies and practices for information systems,
			 except for national security systems and information systems described in
			 paragraph (2) or (3) of subsection (e),
			 including—</text><paragraph commented="no" display-inline="no-display-inline" id="iddbc9325fe77248c09ed444f957c3b8ae"><enum>(1)</enum><text display-inline="yes-display-inline">assisting the Director in carrying out the authorities and functions under paragraphs (1), (2),
			 (3), (5), and (6) of subsection (a);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id20391150e57b4da0a506cc41c5e642ef"><enum>(2)</enum><text display-inline="yes-display-inline">developing and overseeing the implementation of binding operational directives to agencies to
			 implement the policies, principles, standards, and guidelines developed by
			 the Director under subsection (a)(1) and the requirements of this
			 subchapter, which may be revised or repealed by the Director if the
			 operational
			 directives issued on behalf of the Director are not in
			 accordance with policies, principles, standards, and guidelines developed
			 by the Director, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="id7fa0fc8642b9436da022dd22011a8df6"><enum>(A)</enum><text display-inline="yes-display-inline">requirements for reporting security incidents to the Federal information security incident center
			 established under  section 3556;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id3004398f346a4ef19c8381b0add56b9c"><enum>(B)</enum><text display-inline="yes-display-inline">requirements for the contents of the annual reports required to be submitted under section
			 3554(c)(1);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idea503faaabf543a7b7a68ac5e0358b13"><enum>(C)</enum><text display-inline="yes-display-inline">requirements for the mitigation of exigent risks to information systems; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2ee82fd60f064e5f8c328d56af435036"><enum>(D)</enum><text display-inline="yes-display-inline">other operational requirements as the Director or Secretary, in consultation with the Director, may
			 determine necessary;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id18ec2d759ba843859c3c52707a8534f4"><enum>(3)</enum><text display-inline="yes-display-inline">monitoring agency implementation of information security policies and practices;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4ef1175b8697436abfcf263bb5562c6a"><enum>(4)</enum><text display-inline="yes-display-inline">convening meetings with senior agency officials to help ensure effective implementation of
			 information security policies and practices;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id01922182645844389b5a2857f1d91f37"><enum>(5)</enum><text display-inline="yes-display-inline">coordinating Government-wide efforts on information security policies and practices, including
			 consultation with the Chief Information Officers Council established under
			 section 3603 and the Director of the National Institute of Standards and
			 Technology;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id3b9a8e7ee77143ac9a51dcc7987c8574"><enum>(6)</enum><text display-inline="yes-display-inline">providing operational and technical assistance to agencies in implementing policies, principles,
			 standards, and guidelines on information security, including
			 implementation of standards promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40,
			 including by—</text><subparagraph commented="no" display-inline="no-display-inline" id="idd3de127e04b84a789e4d14f881cd9764"><enum>(A)</enum><text display-inline="yes-display-inline">operating the Federal information security incident center established under section 3556;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ida9f56dc3dcc342f7aae724f5266655dd"><enum>(B)</enum><text display-inline="yes-display-inline">upon request by an agency, deploying technology to assist the agency to continuously diagnose and
			 mitigate against cyber threats and vulnerabilities, with or without
			 reimbursement;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfbd820effcec4df18471dc1e2dfce645"><enum>(C)</enum><text display-inline="yes-display-inline">compiling and analyzing data on agency information security; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id893ff04859b745c9ae218e5ced769b6d"><enum>(D)</enum><text display-inline="yes-display-inline">developing and conducting targeted operational evaluations, including threat and vulnerability
			 assessments, on the information systems; and</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id4687cac56d84434c9f0a8ddeb50e63ac"><enum>(7)</enum><text display-inline="yes-display-inline">other actions as the Director or the Secretary, in consultation with the Director, may determine
			 necessary to carry out this subsection.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id177932565eb7448cb21efa16ed6903d9"><enum>(c)</enum><header display-inline="yes-display-inline">Report</header><text display-inline="yes-display-inline">Not later than March 1 of each year, the Director, in consultation with the Secretary, shall submit
			 to Congress a report on the effectiveness of information security policies
			 and
			 practices during the preceding year, including—</text><paragraph commented="no" display-inline="no-display-inline" id="id5c9f43d48ef54a7a82e5a45614741fa5"><enum>(1)</enum><text display-inline="yes-display-inline">a summary of the incidents described in the annual reports required to be submitted under section
			 3554(c)(1), including a summary of the information required under section
			 3554(c)(1)(A)(iii);</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8461D0669C6E4D508133221852DF07E7"><enum>(2)</enum><text display-inline="yes-display-inline">a description of the threshold for reporting major information security incidents;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8215887c5ab54d2e8d0b25ea9063d6da"><enum>(3)</enum><text display-inline="yes-display-inline">a summary of the results of evaluations required to be performed under section 3555;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id51c01acc141d438d9d6c68eb11131773"><enum>(4)</enum><text display-inline="yes-display-inline">an assessment of agency compliance with standards promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5386B6397F34402EBFEE22E5CB135288"><enum>(5)</enum><text display-inline="yes-display-inline">an assessment of agency compliance with data breach notification policies and procedures issued by
			 the Director.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ID4FAF1C12351D4B27B6C05B4A9EC4F783"><enum>(d)</enum><header display-inline="yes-display-inline">National security systems</header><text display-inline="yes-display-inline">Except for the authorities and functions described in subsection (a)(5) and subsection (c), the
			 authorities and functions of the Director and the Secretary under this
			 section shall not
			 apply to national security systems.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="IDF72B3C07F233466F8DF429AC142D3364"><enum>(e)</enum><header display-inline="yes-display-inline">Department of Defense and Intelligence community systems</header><paragraph commented="no" display-inline="yes-display-inline" id="IDCB80A1753BFE4C0AAFAAE10DFC1E977F"><enum>(1)</enum><text display-inline="yes-display-inline">The authorities of the Director described in paragraphs (1) and (2) of subsection (a) shall be
			 delegated to the Secretary of Defense in the case of systems described in
			 paragraph (2) and to the Director of National Intelligence in the case of
			 systems described in paragraph (3).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID4E3395051331458DA2E1EAA726AD4CAD" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">The systems described in this paragraph are systems that are operated by the Department of Defense,
			 a contractor of the Department of Defense, or another entity on behalf of
			 the Department of Defense that processes any information the unauthorized
			 access, use, disclosure, disruption, modification, or destruction of which
			 would have a debilitating impact on the mission of the Department of
			 Defense.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDB3DC1AA54C8945F9A3FD7949E804216D" indent="up1"><enum>(3)</enum><text display-inline="yes-display-inline">The systems described in this paragraph are systems that are operated by an element of the 
			 intelligence community, a contractor of an element of the intelligence
			 community, or another entity on behalf of an element of the intelligence
			 community that processes any information the unauthorized access, use,
			 disclosure, disruption, modification, or destruction of which would have a
			 debilitating impact on the mission of an element of the intelligence
			 community.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id3675a4c10c234d3eb4f7988d6f914cfe"><enum>(f)</enum><header display-inline="yes-display-inline">Consideration</header><paragraph commented="no" display-inline="no-display-inline" id="id6E8259969ADD491DA4F0243D4D678F95"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">In carrying out the responsibilities under subsection (b), the Secretary shall consider any
			 applicable standards or guidelines developed by the National Institute of
			 Standards and Technology and issued by the Secretary of Commerce under
			 <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idBDD29D4735D54DB882809290C8A9350E"><enum>(2)</enum><header display-inline="yes-display-inline">Directives</header><text display-inline="yes-display-inline">The Secretary shall—</text><subparagraph commented="no" display-inline="no-display-inline" id="id93B4062A82B946EFA729D51AB663CE21"><enum>(A)</enum><text display-inline="yes-display-inline">consult with the Director of the National Institute of Standards and Technology regarding any
			 binding operational directive that implements standards and guidelines
			 developed by the National Institute of Standards and Technology; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id557E4AD6BA49495EA5B05FC53FA8C25E"><enum>(B)</enum><text display-inline="yes-display-inline">ensure that binding operational directives issued under subsection (b)(2) do not conflict with the
			 standards and guidelines issued under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idCB968E8185E34D2A9C658EB56A0FCE65"><enum>(3)</enum><header display-inline="yes-display-inline">Rule of construction</header><text display-inline="yes-display-inline">Nothing in this subchapter shall be construed as authorizing the Secretary to direct the Secretary
			 of Commerce in the development and promulgation of standards and
			 guidelines under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id64f4ccfb04a54d7182f0c27b23c87d7e"><enum>(g)</enum><header display-inline="yes-display-inline">Exercise of authority</header><text display-inline="yes-display-inline">To ensure fiscal and policy consistency, the Secretary shall exercise the authority under this
			 section subject to direction by the President, in coordination with the
			 Director.</text></subsection></section><section commented="no" display-inline="no-display-inline" id="ID58BC782979CC4EA59B49C3D556FEE281" section-type="subsequent-section"><enum>3554.</enum><header display-inline="yes-display-inline">Federal agency responsibilities</header><subsection commented="no" display-inline="no-display-inline" id="ID7259532AC334426983A073F1CF017CE7"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The head of each agency shall—</text><paragraph commented="no" display-inline="no-display-inline" id="ID640B5118984D45DC9A42D629A919ACC3"><enum>(1)</enum><text display-inline="yes-display-inline">be responsible for—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDD10FF77A0E814712B19A23446F425D71"><enum>(A)</enum><text display-inline="yes-display-inline">providing information security protections commensurate with the risk and magnitude of the harm
			 resulting from unauthorized access, use, disclosure, disruption,
			 modification, or destruction of—</text><clause commented="no" display-inline="no-display-inline" id="IDD9C11A9E54BB45CBBC1CD2B81FF7E876"><enum>(i)</enum><text display-inline="yes-display-inline">information collected or maintained by or on behalf of the agency; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ID0B4C41CC17E54338A741DB3F04F8FF53"><enum>(ii)</enum><text display-inline="yes-display-inline">information systems used or operated by an agency or by a contractor of an agency or other
			 organization on behalf of an agency;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDDEE183ACDF594C058744B27629A7B409"><enum>(B)</enum><text display-inline="yes-display-inline">complying with the requirements of this subchapter and related policies, procedures, standards, and
			 guidelines, including—</text><clause commented="no" display-inline="no-display-inline" id="ID7800D12E54AD422FAC68FBD522586F9C"><enum>(i)</enum><text display-inline="yes-display-inline">information security standards promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></clause><clause commented="no" display-inline="no-display-inline" id="idC5E3F275B3CF4929B226A3920090AD9C"><enum>(ii)</enum><text display-inline="yes-display-inline">operational directives developed by the Secretary under section 3553(b);</text></clause><clause commented="no" display-inline="no-display-inline" id="ID809D14F3F00A4494BFB11B51E42DC4AA"><enum>(iii)</enum><text display-inline="yes-display-inline">policies and procedures issued by the Director; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idEB3D062DFD7E4FEABDF94747D4A9CE6B"><enum>(iv)</enum><text display-inline="yes-display-inline">information security standards and guidelines for national security systems issued in accordance
			 with law and as directed by the President; and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID9A1F41F25FF341469D7D3A55EA719932"><enum>(C)</enum><text display-inline="yes-display-inline">ensuring that information security management processes are integrated with agency strategic,
			 operational, and budgetary planning processes;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDC3322EDA004F408F8CAA6CC25649BECD"><enum>(2)</enum><text display-inline="yes-display-inline">ensure that senior agency officials provide information security for the information and
			 information systems that support the operations and assets under their
			 control, including through—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDEB51ADF90DA84F05AC1FA200B7F33634"><enum>(A)</enum><text display-inline="yes-display-inline">assessing the risk and magnitude of the harm that could result from the unauthorized access, use,
			 disclosure, disruption, modification, or destruction of such information
			 or information systems;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID07A00EC65E89480C9969435ADFD22D72"><enum>(B)</enum><text display-inline="yes-display-inline">determining the levels of information security appropriate to protect such information and
			 information systems in accordance with standards promulgated under section
			 11331 of title 40, for information security classifications and related
			 requirements;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID3D542D6C183A49C5B7841FA82EFAA597"><enum>(C)</enum><text display-inline="yes-display-inline">implementing policies and procedures to cost-effectively reduce risks to an acceptable level; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDA4BD7FE2F7CF4A71B367AEA3B0E43699"><enum>(D)</enum><text display-inline="yes-display-inline">periodically testing and evaluating information security controls and techniques to ensure that
			 they are effectively implemented;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID9685556DCBDE4C8D8BA3574F1FB7CB72"><enum>(3)</enum><text display-inline="yes-display-inline">delegate to the agency Chief Information Officer established under section 3506 (or comparable
			 official in an agency not covered by such section) the authority to ensure
			 compliance with the requirements imposed on the agency under this
			 subchapter, including—</text><subparagraph commented="no" display-inline="no-display-inline" id="ID0C0CD94E72C34A938986CDD3756D944A"><enum>(A)</enum><text display-inline="yes-display-inline">designating a senior agency information security officer who shall—</text><clause commented="no" display-inline="no-display-inline" id="ID346357D9127948B0B813DAC3AE853774"><enum>(i)</enum><text display-inline="yes-display-inline">carry out the Chief Information Officer's responsibilities under this section;</text></clause><clause commented="no" display-inline="no-display-inline" id="ID3966FB7B85754B1796B23952876D501C"><enum>(ii)</enum><text display-inline="yes-display-inline">possess professional qualifications, including training and experience, required to administer the
			 functions described under this section;</text></clause><clause commented="no" display-inline="no-display-inline" id="IDDCD834A5D7134249B0FE1B6C11132087"><enum>(iii)</enum><text display-inline="yes-display-inline">have information security duties as that official's primary duty; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ID95DED1513B1744FB8AAA715E12B3CFB7"><enum>(iv)</enum><text display-inline="yes-display-inline">head an office with the mission and resources to assist in ensuring agency compliance with this
			 section;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDB768A1B855B447A2ADC31042662BB4CE"><enum>(B)</enum><text display-inline="yes-display-inline">developing and maintaining an agencywide information security program as required by subsection
			 (b);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID45B9F40A37914FF781C766AEFCA29313"><enum>(C)</enum><text display-inline="yes-display-inline">developing and maintaining information security policies, procedures, and control techniques to
			 address all applicable requirements, including those issued under section
			 3553 of this title and <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID1A98B9DA993F44D4B86E7448A1359546"><enum>(D)</enum><text display-inline="yes-display-inline">training and overseeing personnel with significant responsibilities for information security with
			 respect to such responsibilities; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDBA882EE2076042EBACEF15BBC41F97A9"><enum>(E)</enum><text display-inline="yes-display-inline">assisting senior agency officials concerning their responsibilities under paragraph (2);</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID4F4ECF96F9C043DEA822EEC2B8ED4B92"><enum>(4)</enum><text display-inline="yes-display-inline">ensure that the agency has trained personnel sufficient to assist the agency in complying with the
			 requirements of this subchapter and related policies, procedures,
			 standards, and guidelines;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDBA10AEF435704179A38AE6F7380DFC8A"><enum>(5)</enum><text display-inline="yes-display-inline">ensure that the agency Chief Information Officer, in coordination with other senior agency
			 officials, reports annually to the agency head on the effectiveness of the
			 agency information security program, including progress of remedial
			 actions;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idF796BEE727ED4ACBA8BB7572FFE9B806"><enum>(6)</enum><text display-inline="yes-display-inline">ensure that senior agency officials, including chief information officers of component agencies or
			 equivalent
			 officials, carry out responsibilities under this subchapter as directed by
			 the official delegated authority under paragraph (3); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id2FF3BE5596B8476895DB436C8339DAD6"><enum>(7)</enum><text display-inline="yes-display-inline">ensure that all personnel are held accountable for complying with the agency-wide information
			 security program implemented under subsection (b).</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDC7C980ED167B4C1C8AB6DFAF911E1CCF"><enum>(b)</enum><header display-inline="yes-display-inline">Agency program</header><text display-inline="yes-display-inline">Each agency shall develop, document, and implement an agency-wide information security program to
			 provide information
			 security for the information and information systems that support the
			 operations and assets of the agency, including those provided or managed
			 by another agency, contractor, or other source, that includes—</text><paragraph commented="no" display-inline="no-display-inline" id="ID71C818101022473B94A53860408474ED"><enum>(1)</enum><text display-inline="yes-display-inline">periodic assessments of the risk and magnitude of the harm that could result from the unauthorized
			 access, use, disclosure, disruption, modification, or destruction of
			 information and information systems that support the operations and assets
			 of the agency, which may include using automated tools consistent
			 with standards and guidelines promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDFB9E6231C9104F2E89CF7312605730A0"><enum>(2)</enum><text display-inline="yes-display-inline">policies and procedures that—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDC1FE4AED01B24888B1A9AB3CDA4A0E11"><enum>(A)</enum><text display-inline="yes-display-inline">are based on the risk assessments required by paragraph (1);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDC4B3338F40B642AD9187E3FAA3101FC7"><enum>(B)</enum><text display-inline="yes-display-inline">cost-effectively reduce information security risks to an acceptable level;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID320974CC29FE47EBB8EDAB238919703C"><enum>(C)</enum><text display-inline="yes-display-inline">ensure that information security is addressed throughout the life cycle of each agency information
			 system; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDFAFDAA5B94C14D12BD4ADE54F01DB69B"><enum>(D)</enum><text display-inline="yes-display-inline">ensure compliance with—</text><clause commented="no" display-inline="no-display-inline" id="IDBC40FECFECB442089DC88EAD0680B222"><enum>(i)</enum><text display-inline="yes-display-inline">the requirements of this subchapter;</text></clause><clause commented="no" display-inline="no-display-inline" id="IDDDEFFCC5DEC44CF69F909319C0C874E1"><enum>(ii)</enum><text display-inline="yes-display-inline">policies and procedures as may be prescribed by the Director, and information security standards
			 promulgated under <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></clause><clause commented="no" display-inline="no-display-inline" id="ID3E33C52932F64C45AA2753386B2FCD40"><enum>(iii)</enum><text display-inline="yes-display-inline">minimally acceptable system configuration requirements, as determined by the agency; and</text></clause><clause commented="no" display-inline="no-display-inline" id="IDB2BCD95DA1A34826AE28499F0CA63AB3"><enum>(iv)</enum><text display-inline="yes-display-inline">any other applicable requirements, including standards and guidelines for national security systems
			 issued in accordance with law and as directed by the President;</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID688AA4A8ED444FE0BE984CA9AAEE9D8D"><enum>(3)</enum><text display-inline="yes-display-inline">subordinate plans for providing adequate information security for networks, facilities, and systems
			 or groups of information systems, as appropriate;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDE490322674854D3A99DE9A9246C3A13F"><enum>(4)</enum><text display-inline="yes-display-inline">security awareness training to inform personnel, including contractors and other users of
			 information systems that support the operations and assets of the agency,
			 of—</text><subparagraph commented="no" display-inline="no-display-inline" id="ID2550817F4D434B9295244D78D0324979"><enum>(A)</enum><text display-inline="yes-display-inline">information security risks associated with their activities; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDC66FE308C3E147A4BF498F180423C9DF"><enum>(B)</enum><text display-inline="yes-display-inline">their responsibilities in complying with agency policies and procedures designed to reduce these
			 risks;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDBAB58E096FF24DAE92D00F945B36D024"><enum>(5)</enum><text display-inline="yes-display-inline">periodic testing and evaluation of the effectiveness of information security policies, procedures,
			 and practices, to be performed with a frequency depending on risk, but no
			 less than annually, of which such testing—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDA90669BC69F54EEAA3B3581FEFA2584D"><enum>(A)</enum><text display-inline="yes-display-inline">shall include testing of management, operational, and technical controls of every information
			 system identified in the inventory required under section 3505(c);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDC6DB618ABC86441792EE81145CDE90DE"><enum>(B)</enum><text display-inline="yes-display-inline">may include testing relied on in an evaluation under section 3555; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6F5B45AC62844D77A92C57B758B0CA14"><enum>(C)</enum><text display-inline="yes-display-inline">shall include using automated tools, consistent with standards and guidelines promulgated under
			 <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40;</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDDFC0C3E1DC1B4C6F9E20D09B475996BA"><enum>(6)</enum><text display-inline="yes-display-inline">a process for planning, implementing, evaluating, and documenting remedial action to address any
			 deficiencies in the information security policies, procedures, and
			 practices of the agency;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID02774CCF773D47B591589CE0AFDEAC18"><enum>(7)</enum><text display-inline="yes-display-inline">procedures for detecting, reporting, and responding to security incidents, which—</text><subparagraph commented="no" display-inline="no-display-inline" id="id64D8764DC767425888FFCDEEB83DDCA1"><enum>(A)</enum><text display-inline="yes-display-inline">shall be consistent with
			 the standards and guidelines described in section 3556(b);</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id93733129634847AE95A1A18E2602BE30"><enum>(B)</enum><text display-inline="yes-display-inline">may include
			 using automated tools; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2C6BA06828914149936C0565CE96F584"><enum>(C)</enum><text display-inline="yes-display-inline">shall include—</text><clause commented="no" display-inline="no-display-inline" id="ID722FFA3A89B94F5B9D46D03977118053"><enum>(i)</enum><text display-inline="yes-display-inline">mitigating risks associated with such incidents before substantial damage is done;</text></clause><clause commented="no" display-inline="no-display-inline" id="IDC0476C0ECCC74A0D846E0842FBA5CB3E"><enum>(ii)</enum><text display-inline="yes-display-inline">notifying and consulting with the Federal information security incident center established  in
			 section 3556; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ID10CD9FFDB442465D84626F6683A76D20"><enum>(iii)</enum><text display-inline="yes-display-inline">notifying and consulting with, as appropriate—</text><subclause commented="no" display-inline="no-display-inline" id="ID1246E25DEFED499894132EAB22AA2A35"><enum>(I)</enum><text display-inline="yes-display-inline">law enforcement agencies and relevant Offices of Inspector General and Offices of General Counsel;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ID2E1C26405C324E4480CFA06AD00D08E2"><enum>(II)</enum><text display-inline="yes-display-inline">an office designated by the President for any incident involving a national security system;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id4e18530917b54f5187cf6dcb06ff59fc"><enum>(III)</enum><text display-inline="yes-display-inline">for a major incident, the committees of Congress described in subsection (c)(1)—</text><item commented="no" display-inline="no-display-inline" id="idC08FFD8AC74E49FC915968701810D13E"><enum>(aa)</enum><text display-inline="yes-display-inline">not later
			 than 7 days after the date on which there is a reasonable basis to
			 conclude that the major incident has occurred; and</text></item><item commented="no" display-inline="no-display-inline" id="idDEA3E0713D42414980B9A78E90E929E0"><enum>(bb)</enum><text display-inline="yes-display-inline">after the initial notification under item (aa), within a reasonable period of time after
			 additional information relating to the incident is discovered, including
			 the summary required under subsection (c)(1)(A)(i);  and</text></item></subclause><subclause commented="no" display-inline="no-display-inline" id="IDD95DCD19F69E47DEAB9BE23DBA14EFDB"><enum>(IV)</enum><text display-inline="yes-display-inline">any other agency or office, in accordance with law or as directed by the President; and</text></subclause></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDC78D81943C5C40A39A5ECDFA533562AB"><enum>(8)</enum><text display-inline="yes-display-inline">plans and procedures to ensure continuity of operations for information systems that support the
			 operations and assets of the agency.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ID7CB4338D7CF84DAFB76632A66D29B772"><enum>(c)</enum><header display-inline="yes-display-inline">Agency reporting</header><paragraph commented="no" display-inline="no-display-inline" id="id91E42354344F453882457DA1FDD8321B"><enum>(1)</enum><header display-inline="yes-display-inline">Annual report</header><subparagraph commented="no" display-inline="no-display-inline" id="id1DB895722AEC4DE99840368EC2BD79E3"><enum>(A)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Each agency shall submit to the Director, the Secretary, the Committee on Government Reform,
			 the Committee on Homeland
			 Security, and the Committee on Science of the House of
			 Representatives, the Committee on Homeland Security and Governmental
			 Affairs and the Committee on Commerce,
			 Science, and Transportation of the Senate, the appropriate authorization
			 and appropriations committees of Congress, and the Comptroller General a
			 report on the adequacy and effectiveness of information security policies,
			 procedures, and practices, including—</text><clause commented="no" display-inline="no-display-inline" id="idc342532395b94b139ae49b45d7cf8955"><enum>(i)</enum><text display-inline="yes-display-inline">a description of each major information security incident or related sets of incidents, including
			 summaries of—</text><subclause commented="no" display-inline="no-display-inline" id="id5bd773dbfef34c66aba9ea6385fa9a2e"><enum>(I)</enum><text display-inline="yes-display-inline">the threats and threat actors, vulnerabilities, and impacts relating to the incident;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id860d18e5cf4244f69e39ee54b383ea03"><enum>(II)</enum><text display-inline="yes-display-inline">the risk assessments conducted under section 3554(a)(2)(A) of the affected information systems 
			 before
			 the date on which  the
			 incident occurred;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id721b94e0b73d4bc498046be081ea0846"><enum>(III)</enum><text display-inline="yes-display-inline">the status of compliance of the affected information systems with applicable security requirements
			 at
			 the time of the incident; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id9f3aeec910214ebcbd7be9e39bbbac8a"><enum>(IV)</enum><text display-inline="yes-display-inline">the detection, response, and remediation actions;</text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="idb01dc1149e9a4a2398137daa497c583f"><enum>(ii)</enum><text display-inline="yes-display-inline">the total number of information security incidents, including a description of incidents resulting
			 in significant compromise of information security, system impact levels,
			 types of incident, and locations of affected systems;</text></clause><clause commented="no" display-inline="no-display-inline" id="ida410c58e2cba4b7b89bff2ea95aaec20"><enum>(iii)</enum><text display-inline="yes-display-inline">a description of each  major information security incident that involved a breach of personally
			 identifiable information, as defined by the Director, including—</text><subclause commented="no" display-inline="no-display-inline" id="id91E81CFED5094C3A95777AC171B6DD88"><enum>(I)</enum><text display-inline="yes-display-inline">the number of individuals whose information was affected by the major information security
			 incident; and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idD3A811F5F5E3419C84CFDDDC739E0B07"><enum>(II)</enum><text display-inline="yes-display-inline">a description of the information that was breached or exposed; and</text></subclause></clause><clause commented="no" display-inline="no-display-inline" id="id8b5b9610a0164b168f8b71cd0b67e088"><enum>(iv)</enum><text display-inline="yes-display-inline">any other information as the Director or the Secretary, in consultation with the Director, may
			 require.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb230cf9212cf49baaa8a2b9b99365480"><enum>(B)</enum><header display-inline="yes-display-inline">Unclassified report</header><clause commented="no" display-inline="no-display-inline" id="idD4B8A7A5757D4B1AB72B090387C4D550"><enum>(i)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">Each report submitted under subparagraph (A) shall be in
			 unclassified form, but may include a classified annex.</text></clause><clause commented="no" display-inline="no-display-inline" id="idBCBAE6830876498EA6DAF718D937F9C5"><enum>(ii)</enum><header display-inline="yes-display-inline">Access to information</header><text display-inline="yes-display-inline">The head of an agency shall ensure that, to the greatest extent practicable, information is
			 included in the unclassified version of the reports submitted by the
			 agency under subparagraph (A).</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID46AAA509F1574A6E9B90F81F2B40046F"><enum>(2)</enum><header display-inline="yes-display-inline">Other plans and reports</header><text display-inline="yes-display-inline">Each agency shall address the adequacy and effectiveness of information security policies,
			 procedures,
			 and practices
			 in management plans and reports.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDC58FBEA2676747CCA0A46CD099B885D4"><enum>(d)</enum><header display-inline="yes-display-inline">Performance plan</header><paragraph commented="no" display-inline="yes-display-inline" id="ID272B1D75FD5540EE938E259D47855040"><enum>(1)</enum><text display-inline="yes-display-inline">In addition to the requirements of subsection (c), each agency, in consultation with the Director,
			 shall include as part of the performance plan required under section 1115
			 of title 31 a description of—</text><subparagraph commented="no" display-inline="no-display-inline" id="IDE5AEA369E6C343FFB4A051B48CF43A7D" indent="up1"><enum>(A)</enum><text display-inline="yes-display-inline">the time periods; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID1624B3B6EF3744D0BF562D6D903DB2A2" indent="up1"><enum>(B)</enum><text display-inline="yes-display-inline">the resources, including budget, staffing, and training,</text></subparagraph></paragraph><continuation-text commented="no" continuation-text-level="subsection">that are necessary to implement the program required under subsection (b).</continuation-text><paragraph commented="no" display-inline="no-display-inline" id="IDC267FD4A4C0C403C999F1F134A04DBF2" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">The description under paragraph (1) shall be based on the risk assessments required under
			 subsection (b)(1).</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDD86A988A0BBA412CAC16BA68444F0991"><enum>(e)</enum><header display-inline="yes-display-inline">Public notice and comment</header><text display-inline="yes-display-inline">Each agency shall provide the public with timely notice and opportunities for comment on proposed
			 information security policies and procedures to the extent that such
			 policies and procedures affect communication with the public.</text></subsection></section><section commented="no" display-inline="no-display-inline" id="IDE9E584017EB646068C39C67102FAA22F" section-type="subsequent-section"><enum>3555.</enum><header display-inline="yes-display-inline">Annual independent evaluation</header><subsection commented="no" display-inline="no-display-inline" id="ID718319A8CDF1457AA4F6FCAAB5EEC4E7"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><paragraph commented="no" display-inline="yes-display-inline" id="IDC9EEE6DAD09B49E69351150E0879289D"><enum>(1)</enum><text display-inline="yes-display-inline">Each year each agency shall have performed an independent evaluation of the information security
			 program and practices of that agency to determine the effectiveness of
			 such program and practices.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID7316712DCA444445B8C2B1C71367B8B0" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">Each evaluation under this section shall include—</text><subparagraph commented="no" display-inline="no-display-inline" id="ID74E0878B4960447F9369CFF49363B656"><enum>(A)</enum><text display-inline="yes-display-inline">testing of the effectiveness of information security policies, procedures, and practices of a
			 representative subset of the agency's information systems;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ID125BE9CED6024ECD81A17ED234AA7D77"><enum>(B)</enum><text display-inline="yes-display-inline">an assessment of the effectiveness of the information security policies, procedures, and practices
			 of the agency; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="IDA130571D0DEE4DCBB1DC9C869B02903C"><enum>(C)</enum><text display-inline="yes-display-inline">separate presentations, as appropriate, regarding information security relating to national
			 security systems.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDF95153291E4A4D869F72F80229C50AFB"><enum>(b)</enum><header display-inline="yes-display-inline">Independent auditor</header><text display-inline="yes-display-inline">Subject to subsection (c)—</text><paragraph commented="no" display-inline="no-display-inline" id="IDC06665F1EDB74B42B7CEDCCB0ED5EDA9"><enum>(1)</enum><text display-inline="yes-display-inline">for each agency with an Inspector General appointed under the Inspector General Act of 1978, the
			 annual evaluation required by this section shall be performed by the
			 Inspector General or by an independent external auditor, as determined by
			 the Inspector General of the agency; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID17FB219490144611B205CEF3B200D4A9"><enum>(2)</enum><text display-inline="yes-display-inline">for each agency to which paragraph (1) does not apply, the head of the agency shall engage an
			 independent external auditor to perform the evaluation.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ID465D402BD62B490ABD5D851F09975955"><enum>(c)</enum><header display-inline="yes-display-inline">National security systems</header><text display-inline="yes-display-inline">For each agency operating or exercising control of a national security system, that portion of the
			 evaluation required by this section directly relating to a national
			 security system shall be performed—</text><paragraph commented="no" display-inline="no-display-inline" id="IDC697FFD2C53E4571BD712E4C764A56EA"><enum>(1)</enum><text display-inline="yes-display-inline">only by an entity designated by the agency head; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID20FBA6E7DA8A4CD4B8C80745B4C8FD33"><enum>(2)</enum><text display-inline="yes-display-inline">in such a manner as to ensure appropriate protection for information associated with any
			 information security vulnerability in such system commensurate with the
			 risk and in accordance with all applicable laws.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDCF7CE5AEC2A642539433E50FD4E94C01"><enum>(d)</enum><header display-inline="yes-display-inline">Existing evaluations</header><text display-inline="yes-display-inline">The evaluation required by this section may be based in whole or in part on an audit, evaluation,
			 or report relating to programs or practices of the applicable agency.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="ID2597E3A47CAC4E3FA6FE9FF44FB924C0"><enum>(e)</enum><header display-inline="yes-display-inline">Agency reporting</header><paragraph commented="no" display-inline="yes-display-inline" id="IDD17F2566EE374BB1B734E7B7974E7166"><enum>(1)</enum><text display-inline="yes-display-inline">Each year, not later than such date established by the Director, the head of each agency shall
			 submit to the Director the results of the evaluation required under this
			 section.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID7F19149D9D4E4ECCA7892EDEEBA980BA" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">To the extent an evaluation required under this section directly relates to a national security
			 system, the evaluation results submitted to the Director shall contain
			 only a summary and assessment of that portion of the evaluation directly
			 relating to a national security system.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="IDD05EDF34DD5747ACABBEFF266B682532"><enum>(f)</enum><header display-inline="yes-display-inline">Protection of information</header><text display-inline="yes-display-inline">Agencies and evaluators shall take appropriate steps to ensure the protection of information which,
			 if disclosed, may adversely affect information security. Such protections
			 shall be commensurate with the risk and comply with all applicable laws
			 and regulations.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="ID93B42E263EA34864AF4D90043B4D3077"><enum>(g)</enum><header display-inline="yes-display-inline">OMB reports to Congress</header><paragraph commented="no" display-inline="yes-display-inline" id="IDD54409D5586A41BE83C732766951F0FE"><enum>(1)</enum><text display-inline="yes-display-inline">The Director shall summarize the results of the evaluations conducted under this section in the
			 report to Congress required under section 3553(c).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDE51476D80ED041549CF3A9DF170F5AFC" indent="up1"><enum>(2)</enum><text display-inline="yes-display-inline">The Director's report to Congress under this subsection shall summarize information regarding
			 information security relating to national security systems in such a
			 manner as to ensure appropriate protection for information associated with
			 any information security vulnerability in such system commensurate with
			 the risk and in accordance with all applicable laws.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDE11244E5C5B14281B7A9F455088F051A" indent="up1"><enum>(3)</enum><text display-inline="yes-display-inline">Evaluations and any other descriptions of information systems under the authority and control of
			 the Director of National Intelligence or of National Foreign Intelligence
			 Programs systems under the authority and control of the Secretary of
			 Defense shall be made available to Congress only through the appropriate
			 oversight committees of Congress, in accordance with applicable laws.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ID9F8DB5D0758E41359B6220C33C100278"><enum>(h)</enum><header display-inline="yes-display-inline">Comptroller General</header><text display-inline="yes-display-inline">The Comptroller General shall periodically evaluate and report to Congress on—</text><paragraph commented="no" display-inline="no-display-inline" id="IDC6ACA6B5BB274B17BDFB6EABE9F8AD5D"><enum>(1)</enum><text display-inline="yes-display-inline">the adequacy and effectiveness of agency information security policies and practices; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID24AABA617CC644AFB9D2E875BC62A936"><enum>(2)</enum><text display-inline="yes-display-inline">implementation of the requirements of this subchapter.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id17c315fc28bc457ca9d044906b45a2b9"><enum>(i)</enum><header display-inline="yes-display-inline">Assessment technical assistance</header><text display-inline="yes-display-inline">The Comptroller General may provide technical assistance to an Inspector General or the head of an
			 agency, as applicable, to assist the Inspector General or head of an
			 agency in
			 carrying out the duties under this section, including
			 by testing information security controls and procedures.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id29d1756853264053ad37c77671d47ced"><enum>(j)</enum><header display-inline="yes-display-inline">Guidance</header><text display-inline="yes-display-inline">The Director, in consultation with the Secretary, the Chief Information Officers Council
			 established under section 3603, the Council of the Inspectors General on
			 Integrity and Efficiency, and other interested parties as appropriate,
			 shall ensure the development of guidance for evaluating the effectiveness
			 of an information security program and practices.</text></subsection></section><section commented="no" display-inline="no-display-inline" id="ID343BBCF7AF42492C92609F43BA07EE6A" section-type="subsequent-section"><enum>3556.</enum><header display-inline="yes-display-inline">Federal information security incident center</header><subsection commented="no" display-inline="no-display-inline" id="IDD900803C44414C389BC10CDF500A78D0"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Secretary shall ensure the operation of a central Federal information security incident center
			 to—</text><paragraph commented="no" display-inline="no-display-inline" id="ID1ED2ED267EC546C0BDF426D3FCB75B52"><enum>(1)</enum><text display-inline="yes-display-inline">provide timely technical assistance to operators of agency information systems regarding security
			 incidents, including guidance on detecting and handling information
			 security incidents;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDDC7A65962D8241B79EEA57363DB37D57"><enum>(2)</enum><text display-inline="yes-display-inline">compile and analyze information about incidents that threaten information security;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID91B9977DA5674BC78D63A4D7C62340D5"><enum>(3)</enum><text display-inline="yes-display-inline">inform operators of agency information systems about current and potential information security
			 threats, and vulnerabilities;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id037ee11277a44cc6be9400beccfc4a19"><enum>(4)</enum><text display-inline="yes-display-inline">provide, as appropriate, intelligence and other information about cyber threats, vulnerabilities,
			 and incidents to agencies to assist in risk assessments conducted under
			 section 3554(b); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDD97EDB0A91AD4268B54A120A959A33DB"><enum>(5)</enum><text display-inline="yes-display-inline">consult with the National Institute of Standards and Technology, agencies or offices operating or
			 exercising control of national security systems (including the National
			 Security Agency), and such other agencies or offices in accordance with
			 law and as directed by the President regarding information security
			 incidents and related matters.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ID45CEED3D14C543D99D2C9B43E9359115"><enum>(b)</enum><header display-inline="yes-display-inline">National security systems</header><text display-inline="yes-display-inline">Each agency operating or exercising control of a national security system shall share information
			 about information security incidents, threats, and vulnerabilities with
			 the Federal information security incident center to the extent consistent
			 with standards and guidelines for national security systems, issued in
			 accordance with law and as directed by the President.</text></subsection></section><section commented="no" display-inline="no-display-inline" id="ID82FA8B77577148B7A758C66D2615F9D5" section-type="subsequent-section"><enum>3557.</enum><header display-inline="yes-display-inline">National security systems</header><text display-inline="no-display-inline">The head of each agency operating or exercising control of a national security system shall be
			 responsible for ensuring that the agency—</text><paragraph commented="no" display-inline="no-display-inline" id="ID05AD6D680E6C4C8C948424A399F6889F"><enum>(1)</enum><text display-inline="yes-display-inline">provides information security protections commensurate with the risk and magnitude of the harm
			 resulting from the unauthorized access, use, disclosure, disruption,
			 modification, or destruction of the information contained in such system;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ID0B6B3CE91F2D4190A8FB5DD45AA9BE16"><enum>(2)</enum><text display-inline="yes-display-inline">implements information security policies and practices as required by standards and guidelines for
			 national security systems, issued in accordance with law and as directed
			 by the President; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="IDA867C857880C44E1B507156D71703F2B"><enum>(3)</enum><text display-inline="yes-display-inline">complies with the requirements of this subchapter.</text></paragraph></section><section commented="no" display-inline="no-display-inline" id="ID16461FFE62F64CD5AF0D85A5AA87FEE2" section-type="subsequent-section"><enum>3558.</enum><header display-inline="yes-display-inline">Effect on existing law</header><text display-inline="no-display-inline">Nothing in this subchapter, <external-xref legal-doc="usc" parsable-cite="usc/40/11331">section 11331</external-xref> of title 40, or section 20 of the National Standards and
			 Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3</external-xref>) may be construed as affecting the
			 authority of the President, the Office of Management and Budget or the
			 Director thereof, the National Institute of Standards and Technology, or
			 the head of any agency, with respect to the authorized use or disclosure
			 of information, including with regard to the protection of personal
			 privacy under <external-xref legal-doc="usc" parsable-cite="usc/5/552a">section 552a</external-xref> of title 5, the disclosure of information under
			 <external-xref legal-doc="usc" parsable-cite="usc/5/552">section 552</external-xref> of title 5, the management and disposition of records under
			 chapters 29, 31, or 33 of title 44, the management of information
			 resources under subchapter I of chapter 35 of this title, or the
			 disclosure of information to the Congress or the Comptroller General of
			 the United States.</text></section></subchapter><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection commented="no" display-inline="no-display-inline" id="idea4ce491cda84ad3a7645567cf93e991"><enum>(b)</enum><header display-inline="yes-display-inline">Major incident</header><text display-inline="yes-display-inline">The Director of the Office of Management and Budget shall—</text><paragraph commented="no" display-inline="no-display-inline" id="id0fdb152320224bc5a804bd4daf5ad281"><enum>(1)</enum><text display-inline="yes-display-inline">develop guidance on what constitutes a major incident for purposes of <external-xref legal-doc="usc" parsable-cite="usc/44/3554">section 3554(b)</external-xref> of title 44,
			 United States Code, as added by subsection (a); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9fbfd90c8e1d4b6f94b227b325a3c78f"><enum>(2)</enum><text display-inline="yes-display-inline">provide to Congress periodic briefings on the status of the developing of the guidance until the
			 date on which the guidance is issued.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idafe816ada66f499f87d0f387a78b593c"><enum>(c)</enum><header display-inline="yes-display-inline">Continuous diagnostics</header><text display-inline="yes-display-inline">During the 2 year period beginning on the date of enactment of this Act, the Director of the Office
			 of Management and Budget, with the assistance of the Secretary of Homeland
			 Security, shall include in each report submitted under
			 <external-xref legal-doc="usc" parsable-cite="usc/44/3553">section 3553(c)</external-xref> of title 44, United States Code, as added by subsection
			 (a),  an assessment of the adoption by
			 agencies of continuous diagnostics technologies, including through the
			 Continuous Diagnostics and Mitigation program, and other advanced security
			 tools to provide information security, including challenges to the
			 adoption of such technologies or security tools.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="id4A14E7B044184E62AE222C624D066117"><enum>(d)</enum><header display-inline="yes-display-inline">Breaches</header><paragraph commented="no" display-inline="no-display-inline" id="id9B7F9CE284F64FB592CFC1F8E86182DA"><enum>(1)</enum><header display-inline="yes-display-inline">Requirements</header><text display-inline="yes-display-inline">The Director of the Office of Management and Budget shall ensure that data breach notification
			 policies and guidelines are updated periodically and require—</text><subparagraph commented="no" display-inline="no-display-inline" id="idE679405B18CD4541ADF7DD9A92316A75"><enum>(A)</enum><text display-inline="yes-display-inline">except as provided in paragraph (4), notice by the affected agency to each committee of Congress
			 described in <external-xref legal-doc="usc" parsable-cite="usc/44/3554">section 3554(c)(1)</external-xref> of title 44, United States
			 Code, as added by subsection (a), the Committee on the Judiciary of the
			 Senate, and the Committee on the Judiciary of the House of
			 Representatives, which shall—</text><clause commented="no" display-inline="no-display-inline" id="id2941CFF3FA864FDFA303111CBF29FF10"><enum>(i)</enum><text display-inline="yes-display-inline">be provided expeditiously and not later
			 than 30 days after the date on which the agency discovered the
			 unauthorized acquisition or access; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idCC2206BC8E7940839F6AC7231D26CACE"><enum>(ii)</enum><text display-inline="yes-display-inline">include—</text><subclause commented="no" display-inline="no-display-inline" id="id068798dafaec4492881f2b77d1318e5f"><enum>(I)</enum><text display-inline="yes-display-inline">information about the breach, including a summary of any information that the agency knows on the
			 date on which notification is provided about how
			 the breach occurred;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="ide74b172196b146afa508d154e45bbc1c"><enum>(II)</enum><text display-inline="yes-display-inline">an estimate of the number of individuals affected by the breach, based on information that the
			 agency knows on the date on which notification is provided,
			 including an assessment of the risk of harm to affected
			 individuals;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="id6bfd6cb7e62b410585603e1df2d7eab4"><enum>(III)</enum><text display-inline="yes-display-inline">a description of any circumstances necessitating a delay in providing notice to affected
			 individuals;
			 and</text></subclause><subclause commented="no" display-inline="no-display-inline" id="iddbbb9d42b1794acdbd44c3e114a2dff7"><enum>(IV)</enum><text display-inline="yes-display-inline">an estimate of whether and when the agency will provide notice to affected individuals;
			 and</text></subclause></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id1d0af45b72db416ba65203ee4cd20a4a"><enum>(B)</enum><text display-inline="yes-display-inline">notice by the affected agency to affected individuals,
			 pursuant to data breach notification policies and guidelines, which shall
			 be
			 provided as expeditiously as practicable and without unreasonable delay
			 after the agency discovers the unauthorized acquisition	or access.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf707955dc1484044a1ade36f784ab980"><enum>(2)</enum><header display-inline="yes-display-inline">National security; law enforcement; remediation</header><text display-inline="yes-display-inline">The Attorney General, the head of an element of the intelligence community (as such term is defined
			 under section 3(4) of the National Security Act of 1947 (50 U.S.C.
			 3003(4)), or the Secretary of Homeland Security may delay the notice to
			 affected individuals
			 under paragraph (1)(B) if the notice would disrupt a law enforcement
			 investigation, endanger national security, or hamper security remediation
			 actions.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf76e0749b775479fbb1a8f5b5cd3d9a0"><enum>(3)</enum><header display-inline="yes-display-inline">Reports</header><subparagraph commented="no" display-inline="no-display-inline" id="id52AEB20086BF4E1E842212B1023B820C"><enum>(A)</enum><header display-inline="yes-display-inline">Director of OMB</header><text display-inline="yes-display-inline">During the first 2 years beginning after the date of enactment of this Act, the Director of
			 the Office of Management and Budget shall, on an annual basis—</text><clause commented="no" display-inline="no-display-inline" id="idC06F47AC72F3458F8606011D78222193"><enum>(i)</enum><text display-inline="yes-display-inline">assess agency implementation of data breach notification policies and guidelines in aggregate; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idA0F3522E55994624885558EFC6DB5AAB"><enum>(ii)</enum><text display-inline="yes-display-inline">include the assessment described in clause (i) in the report required under section 3553(c) of
			 title 44, United States Code.</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id0694E2A1CD794F80B1B05CCAA70A8C03"><enum>(B)</enum><header display-inline="yes-display-inline">Secretary of Homeland Security</header><text display-inline="yes-display-inline">During the first 2 years beginning after the date of enactment of this Act, the Secretary of
			 Homeland Security shall include an assessment of the status of agency
			 implementation of data breach notification policies and guidelines in the
			 requirements under <external-xref legal-doc="usc" parsable-cite="usc/44/3553">section 3553(b)(2)(B)</external-xref> of title 44, United States Code.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id06B0CC2C35B747F193661AEB6B25D3C2"><enum>(4)</enum><header display-inline="yes-display-inline">Exception</header><text display-inline="yes-display-inline">Any element of the intelligence community  (as such term is defined
			 under section 3(4) of the National Security Act of 1947 (50 U.S.C.
			 3003(4)) that is required to provide notice under paragraph (1)(A) shall
			 only
			 provide such notice to appropriate committees of Congress.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id46DDF7CED7E046E39DDD11CFA2C586FB"><enum>(5)</enum><header display-inline="yes-display-inline">Rule of construction</header><text display-inline="yes-display-inline">Nothing in paragraph (1) shall be construed to alter any authority of a Federal agency or
			 department.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idd9efe50c6b4c4e73bfc72fa84ecec9fc"><enum>(e)</enum><header display-inline="yes-display-inline">Technical and conforming amendments</header><paragraph commented="no" display-inline="no-display-inline" id="id69D79E02612F4AD6BCEA646232364D23"><enum>(1)</enum><header display-inline="yes-display-inline">Table of sections</header><text display-inline="yes-display-inline">The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code is amended by striking the
			 matter relating to subchapters II and III and inserting the following:</text><quoted-block display-inline="no-display-inline" id="id77f61243-d5f5-413a-aaaf-0c94660420ac" style="USC"><toc><toc-entry bold="off" idref="ID0F2B37F2C874476CB18D0546C1E65584" level="subchapter">SUBCHAPTER II—Information security</toc-entry><toc-entry bold="off" idref="ID29A30A8EC8264A03A4D3494584BA7240" level="section">3551. Purposes.</toc-entry><toc-entry bold="off" idref="ID45BCEE4C30C24B5DA9B855C213CF9BCF" level="section">3552. Definitions.</toc-entry><toc-entry bold="off" idref="ID4178B29272C7437D8EF27328DFEF16EC" level="section">3553. Authority and functions of the Director and the Secretary.</toc-entry><toc-entry bold="off" idref="ID58BC782979CC4EA59B49C3D556FEE281" level="section">3554. Federal agency responsibilities.</toc-entry><toc-entry bold="off" idref="IDE9E584017EB646068C39C67102FAA22F" level="section">3555. Annual independent evaluation.</toc-entry><toc-entry bold="off" idref="ID343BBCF7AF42492C92609F43BA07EE6A" level="section">3556. Federal information security incident center.</toc-entry><toc-entry bold="off" idref="ID82FA8B77577148B7A758C66D2615F9D5" level="section">3557. National security systems.</toc-entry><toc-entry bold="off" idref="ID16461FFE62F64CD5AF0D85A5AA87FEE2" level="section">3558. Effect on existing law.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id01FAEB025C364B1B91E56F64BA9FA41A"><enum>(2)</enum><header display-inline="yes-display-inline">Cybersecurity Research and Development Act</header><text display-inline="yes-display-inline">Section 8(d)(1) of the Cybersecurity Research and Development Act (<external-xref legal-doc="usc" parsable-cite="usc/15/7406">15 U.S.C. 7406</external-xref>) is amended by
			 striking <quote>section 3534</quote> and inserting <quote>section 3554</quote>.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id5EF65505B820434F893125B60D2B381F"><enum>(3)</enum><header display-inline="yes-display-inline">Homeland Security Act of 2002</header><text display-inline="yes-display-inline">The Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101 et seq.</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id78b0b3059f164600ab15a5871401b5a4"><enum>(A)</enum><text display-inline="yes-display-inline">in section 223 (<external-xref legal-doc="usc" parsable-cite="usc/6/143">6 U.S.C. 143</external-xref>)</text><clause commented="no" display-inline="no-display-inline" id="id441a0d2ba2124f11bf4c323cb80b7255"><enum>(i)</enum><text display-inline="yes-display-inline">in the section heading, by inserting <quote><header-in-text level="section" style="OLC">Federal and</header-in-text></quote> before <quote><header-in-text level="section" style="OLC">non-Federal</header-in-text></quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="ide4d2660d37b14a13b48f437c792b621a"><enum>(ii)</enum><text display-inline="yes-display-inline">in the matter preceding paragraph (1), by striking <quote>the Under Secretary for Intelligence and Analysis, in cooperation with the Assistant Secretary for
			 Infrastructure Protection</quote> and inserting <quote>the Under Secretary appointed under section 103(a)(1)(H)</quote>;</text></clause><clause commented="no" display-inline="no-display-inline" id="id5a9b4d59741148ba80287603707b9cd6"><enum>(iii)</enum><text display-inline="yes-display-inline">in paragraph (2), by striking the period at the end and inserting <quote>; and</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id3aceaefbd113416fb79376fcdc707666"><enum>(iv)</enum><text display-inline="yes-display-inline">by adding at the end the following:</text><quoted-block display-inline="no-display-inline" id="id717805923cc5434f967277e03836aaef" style="OLC"><paragraph commented="no" display-inline="no-display-inline" id="ide30749797efc4a8c814d29438492ef81"><enum>(3)</enum><text display-inline="yes-display-inline">fulfill the responsibilities of the Secretary to protect Federal information systems under
			 subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code.</text></paragraph><after-quoted-block>; </after-quoted-block></quoted-block></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id315DA2B96EB847D18849BD710ECE2F0A"><enum>(B)</enum><text display-inline="yes-display-inline">in section 1001(c)(1)(A) (<external-xref legal-doc="usc" parsable-cite="usc/6/511">6 U.S.C. 511(c)(1)(A)</external-xref>), by striking <quote>section 3532(3)</quote> and inserting <quote>section 3552(b)(5)</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idEFF7D24F6DE944939AD671D0AFAA9E8C"><enum>(C)</enum><text display-inline="yes-display-inline">in the table of contents in section 1(b), by striking the item relating to section 223 and
			 inserting the following:</text><quoted-block display-inline="no-display-inline" id="id4e072268-7119-4fab-8bf6-8c0900ae5de7" style="OLC"><toc><toc-entry bold="off" level="section">Sec. 223. Enhancement of Federal and non-Federal cybersecurity.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id780DAC96ABB24CDAA65202123278B5CB"><enum>(4)</enum><header display-inline="yes-display-inline">National Institute of Standards and Technology Act</header><text display-inline="yes-display-inline">Section 20 of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3</external-xref>) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id25BB90CAEB984F38A259631A7D1E2E1A"><enum>(A)</enum><text display-inline="yes-display-inline">in subsection (a)(2), by striking <quote>section 3532(b)(2)</quote> and inserting <quote>section 3552(b)(5)</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idBC8AF84A1A1A48358E6CC7F775064007"><enum>(B)</enum><text display-inline="yes-display-inline">in subsection (e)—</text><clause commented="no" display-inline="no-display-inline" id="id6E6F450BFCE5402983CBB97DFE13F841"><enum>(i)</enum><text display-inline="yes-display-inline">in paragraph (2), by striking <quote>section 3532(1)</quote> and inserting <quote>section 3552(b)(2)</quote>; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id4DDBD7B4BFC84821A2629CFF1EFC5343"><enum>(ii)</enum><text display-inline="yes-display-inline">in paragraph (5), by striking <quote>section 3532(b)(2)</quote> and inserting <quote>section 3552(b)(5)</quote>.</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idF04EBA7E2E3D407185E68305FF28CE68"><enum>(5)</enum><header display-inline="yes-display-inline">Title 10</header><text display-inline="yes-display-inline">Title 10, United States Code, is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id06C79E6C228E47D7A0D2EB1FEAF7D5B4"><enum>(A)</enum><text display-inline="yes-display-inline">in section 2222(j)(5), by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)(5)</quote>;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idABEE366578224816AB1DE7CEE7533D6C"><enum>(B)</enum><text display-inline="yes-display-inline">in section 2223(c)(3), by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)(5)</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id0E80B083D1C2457D93CEBED013B6D7B9"><enum>(C)</enum><text display-inline="yes-display-inline">in section 2315, by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)(5)</quote>.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id1e121fd76f8646cebcbd31dd669404b8"><enum>(f)</enum><header display-inline="yes-display-inline">Other provisions</header><paragraph commented="no" display-inline="no-display-inline" id="idec50473a94644fd9a689bd566e4d5952"><enum>(1)</enum><header display-inline="yes-display-inline">Circular A–130</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of this Act, the Director of the Office of
			 Management and Budget shall amend or revise Office of Management and
			 Budget
			 Circular A–130 to eliminate inefficient or wasteful reporting. The
			 Director of the Office of Management and Budget shall provide quarterly
			 briefings to Congress on the status of the amendment or revision required
			 under this paragraph.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idea2fed424dfe4abe9bd65d545eacd96c"><enum>(2)</enum><header display-inline="yes-display-inline">ISPAB</header><text display-inline="yes-display-inline">Section 21(b) of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-4">15 U.S.C. 278g–4(b)</external-xref>) is
			 amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id8767A3EC530B4C4DB41BF1AFB2F2CE04"><enum>(A)</enum><text display-inline="yes-display-inline">in paragraph (2), by inserting <quote>, the Secretary of Homeland Security,</quote> after <quote>the Institute</quote>; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id5A53960E00F043BCB827D0BED0B000BA"><enum>(B)</enum><text display-inline="yes-display-inline">in paragraph (3), by inserting <quote>the Secretary of Homeland Security,</quote> after <quote>the Secretary of Commerce,</quote>.</text></subparagraph></paragraph></subsection></section></legis-body><attestation><attestation-group><attestation-date chamber="Senate" date="20141208">Passed the Senate December 8, 2014.</attestation-date><attestor display="no"></attestor><role>Secretary</role></attestation-group></attestation><endorsement display="yes"></endorsement></bill>


