<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 128 STAT. ?>
<?I98 128 STAT. ?>
<?I99 128 STAT. ?>
<?I50 PUBLIC LAW 113–245—DEC. 18, 2014?>
<?I51 PUBLIC LAW 113–245—DEC. 18, 2014?>
<?I52 PUBLIC LAW 113–245—DEC. 18, 2014?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 113–245: To require the Transportation Security Administration to implement best practices and improve transparency with regard to technology acquisition programs, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>245</docNumber>
<citableAs>Public Law 113–245</citableAs><citableAs>128 Stat. 2871</citableAs>
<approvedDate>2014-12-18</approvedDate>
<dc:date>2014-12-18</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-03</processedDate>
<congress>113</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><centerRunningHead>PUBLIC LAW 113–245—DEC. 18, 2014</centerRunningHead>
<page identifier="/us/stat/128/2871">128 STAT. 2871</page>
<dc:type>Public Law</dc:type><docNumber>113–245</docNumber>
<congress value="113">113th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Transportation Security Administration to implement best practices and improve transparency with regard to technology acquisition programs, and for other purposes.<sidenote><p class="centered fontsize8" id="xd6795c53-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2014-12-18">Dec. 18, 2014</approvedDate></p><p class="centered fontsize8" id="xd6795c54-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/113/hr/2719">H.R. 2719</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd6795c55-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Transportation Security Acquisition Reform Act.</p></sidenote>
<section id="d287932e88" identifier="/us/pl/113/245/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd6795c56-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s101">6 USC 101 note</ref>.</p></sidenote><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Transportation Security Acquisition Reform Act</shortTitle>”.</content></section>
<section id="d287932e103" identifier="/us/pl/113/245/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd6795c57-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s561">6 USC 561 note</ref>.</p></sidenote><heading>FINDINGS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xd6798368-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  Congress finds the following:</chapeau><paragraph class="fontsize10" id="yd6798369-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s2/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>The Transportation Security Administration has not consistently implemented Department of Homeland Security policies and Government best practices for acquisition and procurement.</content></paragraph>
<paragraph class="fontsize10" id="yd679836a-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s2/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content>The Transportation Security Administration has only recently developed a multiyear technology investment plan, and has underutilized innovation opportunities within the private sector, including from small businesses.</content></paragraph>
<paragraph class="fontsize10" id="yd679836b-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s2/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><content>The Transportation Security Administration has faced challenges in meeting key performance requirements for several major acquisitions and procurements, resulting in reduced security effectiveness and wasted expenditures.</content></paragraph>
</section>
<section id="d287932e130" identifier="/us/pl/113/245/s3" style="-uslm-lc:I658141"><num class="fontsize12" value="3">SEC. 3. </num><heading>TRANSPORTATION SECURITY ADMINISTRATION ACQUISITION REFORM.</heading><subsection class="firstIndent0 fontsize10" id="yd67ae2fc-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s3/a" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Title XVI of the Homeland Security Act of 2002 (<ref href="/us/pl/107/296">Public Law 107–296</ref>; <ref href="/us/stat/116/2312">116 Stat. 2312</ref>)<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67ae2fd-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6">6 USC </ref>prec. 561.</p></sidenote> <amendingAction type="amend">is amended</amendingAction> to read as follows:<quotedContent><title id="yd67d53fe-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658178"><num class="fontsize14 bold" value="XVI">“TITLE XVI—</num><heading class="fontsize14 bold">TRANSPORTATION SECURITY</heading><subtitle id="yd67d53ff-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658178"><num class="fontsize14 bold" value="A">“Subtitle A—</num><heading class="fontsize14 bold">General Provisions</heading><section class="indentUp2 firstIndent-2" id="yd67d5400-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1601">“SEC. 1601. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d5401-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s561">6 USC 561</ref>.</p></sidenote><heading class="bold">DEFINITIONS.</heading><chapeau class=" fontsize10" style="-uslm-lc:I658120">  “In this title:</chapeau><paragraph class="indentDown1 fontsize10" id="yd67d5402-e884-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Administration</inline>.—</heading><content>The term ‘<term>Administration</term>’ means the Transportation Security Administration.</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="yd67d5403-e884-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Administrator</inline>.—</heading><content>The term ‘<term>Administrator</term>’ means the Administrator of the Transportation Security Administration.<page identifier="/us/stat/128/2872">128 STAT. 2872</page></content></paragraph>
<paragraph class="indentDown1 fontsize10" id="yd67d5404-e884-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><heading class="fontsize10"><inline class="smallCaps">Plan</inline>.—</heading><content>The term ‘<term>Plan</term>’ means the strategic 5-year technology investment plan developed by the Administrator under section 1611.</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="yd67d5405-e884-11f0-a1e4-69761a48a15a" role="definitions" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><heading class="fontsize10"><inline class="smallCaps">Security-related technology</inline>.—</heading><content>The term ‘<term>security-related technology</term>’ means any technology that assists the Administration in the prevention of, or defense against, threats to United States transportation systems, including threats to people, property, and information.</content></paragraph>
</section>
</subtitle>
<subtitle id="yd67d5406-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658178"><num class="fontsize14 bold" value="B">“Subtitle B—</num><heading class="fontsize14 bold">Transportation Security Administration Acquisition Improvements</heading><section class="indentUp2 firstIndent-2" id="yd67d5407-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1611">“SEC. 1611. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d5408-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563">6 USC 563</ref>.</p></sidenote><heading class="bold">5-YEAR TECHNOLOGY INVESTMENT PLAN.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d5409-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d540a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p></sidenote>—</heading><chapeau>The Administrator shall—</chapeau><paragraph class="fontsize10" id="yd67d540b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>not later than 180 days after the date of the enactment of the Transportation Security Acquisition Reform Act, develop and submit to Congress a strategic 5-year technology investment plan, that may include a classified addendum to report sensitive transportation security risks, technology vulnerabilities, or other sensitive security information; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d540c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d540d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Publication.</p><p class="leftAlign firstIndent0 fontsize8" id="xd67d540e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Public information.</p></sidenote><content>to the extent possible, publish the Plan in an unclassified format in the public domain.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d540f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Consultation</inline>.—</heading><chapeau>The Administrator shall develop the Plan in consultation with—</chapeau><paragraph class="fontsize10" id="yd67d5410-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>the Under Secretary for Management;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5411-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>the Under Secretary for Science and Technology;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5412-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>the Chief Information Officer; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d5413-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>the aviation industry stakeholder advisory committee established by the Administrator.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d5414-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Approval</inline>.—</heading><content>The Administrator may not publish the Plan under subsection (a)(2) until it has been approved by the Secretary.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d5415-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="d">“(d) </num><heading class="fontsize10"><inline class="smallCaps">Contents of Plan</inline>.—</heading><chapeau>The Plan shall include—</chapeau><paragraph class="fontsize10" id="yd67d5416-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>an analysis of transportation security risks and the associated capability gaps that would be best addressed by security-related technology, including consideration of the most recent quadrennial homeland security review under section 707;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5417-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><chapeau>a set of security-related technology acquisition needs that—</chapeau><subparagraph class="fontsize10" id="yd67d5418-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>is prioritized based on risk and associated capability gaps identified under paragraph (1); and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d5419-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>includes planned technology programs and projects with defined objectives, goals, timelines, and measures;</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d541a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>an analysis of current and forecast trends in domestic and international passenger travel;</content></paragraph>
<paragraph class="fontsize10" id="yd67d541b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>an identification of currently deployed security-related technologies that are at or near the end of their lifecycles;</content></paragraph>
<paragraph class="fontsize10" id="yd67d541c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>an identification of test, evaluation, modeling, and simulation capabilities, including target methodologies, rationales, and timelines necessary to support the acquisition of the security-related technologies expected to meet the needs under paragraph (2);</content></paragraph>
<paragraph class="fontsize10" id="yd67d541d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>an identification of opportunities for public-private partnerships, small and disadvantaged company participation, intragovernment collaboration, university centers of excellence, and national laboratory technology transfer;<page identifier="/us/stat/128/2873">128 STAT. 2873</page></content></paragraph>
<paragraph class="fontsize10" id="yd67d541e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>an identification of the Administration’s acquisition workforce needs for the management of planned security-related technology acquisitions, including consideration of leveraging acquisition expertise of other Federal agencies;</content></paragraph>
<paragraph class="fontsize10" id="yd67d541f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><content>an identification of the security resources, including information security resources, that will be required to protect security-related technology from physical or cyber theft, diversion, sabotage, or attack;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5420-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="9">“(9) </num><content>an identification of initiatives to streamline the Administration’s acquisition process and provide greater predictability and clarity to small, medium, and large businesses, including the timeline for testing and evaluation;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5421-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="10">“(10) </num><content>an assessment of the impact to commercial aviation passengers;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5422-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="11">“(11) </num><content>a strategy for consulting airport management, air carrier representatives, and Federal security directors whenever an acquisition will lead to the removal of equipment at airports, and how the strategy for consulting with such officials of the relevant airports will address potential negative impacts on commercial passengers or airport operations; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d5423-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="12">“(12) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d5424-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>in consultation with the National Institutes of Standards and Technology, an identification of security-related technology interface standards, in existence or if implemented, that could promote more interoperable passenger, baggage, and cargo screening systems.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d5425-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="e">“(e) </num><heading class="fontsize10"><inline class="smallCaps">Leveraging the Private Sector</inline>.—</heading><chapeau>To the extent possible, and in a manner that is consistent with fair and equitable practices, the Plan shall—</chapeau><paragraph class="fontsize10" id="yd67d5426-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>leverage emerging technology trends and research and development investment trends within the public and private sectors;</content></paragraph>
<paragraph class="fontsize10" id="yd67d5427-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>incorporate private sector input, including from the aviation industry stakeholder advisory committee established by the Administrator, through requests for information, industry days, and other innovative means consistent with the Federal Acquisition Regulation; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d5428-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d5429-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>in consultation with the Under Secretary for Science and Technology, identify technologies in existence or in development that, with or without adaptation, are expected to be suitable to meeting mission needs.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d542a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="f">“(f) </num><heading class="fontsize10"><inline class="smallCaps">Disclosure</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d542b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Lists.</p></sidenote>—</heading><content>The Administrator shall include with the Plan a list of nongovernment persons that contributed to the writing of the Plan.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d542c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="g">“(g) </num><heading class="fontsize10"><inline class="smallCaps">Update and Report</inline>.—</heading><chapeau>Beginning 2 years after the date the Plan is submitted to Congress under subsection (a), and biennially thereafter, the Administrator shall submit to Congress—</chapeau><paragraph class="fontsize10" id="yd67d542d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>an update of the Plan; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d542e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>a report on the extent to which each security-related technology acquired by the Administration since the last issuance or update of the Plan is consistent with the planned technology programs and projects identified under subsection (d)(2) for that security-related technology.</content></paragraph>
</subsection>
</section>
<section class="indentUp2 firstIndent-2" id="yd67d542f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1612">“SEC. 1612. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d5430-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563a">6 USC 563a</ref>.</p></sidenote><heading class="bold">ACQUISITION JUSTIFICATION AND REPORTS.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a41-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Acquisition Justification</inline>.—</heading><chapeau><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a42-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Determination.</p></sidenote>Before the Administration implements any security-related technology acquisition, the Administrator, in accordance with the Department’s policies and <page identifier="/us/stat/128/2874">128 STAT. 2874</page>
directives, shall determine whether the acquisition is justified by conducting an analysis that includes—</chapeau><paragraph class="fontsize10" id="yd67d7a43-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>an identification of the scenarios and level of risk to transportation security from those scenarios that would be addressed by the security-related technology acquisition;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a44-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><content>an assessment of how the proposed acquisition aligns to the Plan;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a45-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>a comparison of the total expected lifecycle cost against the total expected quantitative and qualitative benefits to transportation security;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a46-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><content>an analysis of alternative security solutions, including policy or procedure solutions, to determine if the proposed security-related technology acquisition is the most effective and cost-efficient solution based on cost-benefit considerations;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a47-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><content>an assessment of the potential privacy and civil liberties implications of the proposed acquisition that includes, to the extent practicable, consultation with organizations that advocate for the protection of privacy and civil liberties;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a48-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><content>a determination that the proposed acquisition is consistent with fair information practice principles issued by the Privacy Officer of the Department;</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a49-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="7">“(7) </num><content>confirmation that there are no significant risks to human health or safety posed by the proposed acquisition; and</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a4a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="8">“(8) </num><content>an estimate of the benefits to commercial aviation passengers.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a4b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a4c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Time periods.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Reports and Certification to Congress</inline>.—</heading><paragraph class="fontsize10" id="yd67d7a4d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a4e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Contracts.</p></sidenote>—</heading><chapeau>Not later than the end of the 30-day period preceding the award by the Administration of a contract for any security-related technology acquisition exceeding $30,000,000, the Administrator shall submit to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Homeland Security of the House of Representatives—</chapeau><subparagraph class="fontsize10" id="yd67d7a4f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the results of the comprehensive acquisition justification under subsection (a); and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a50-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>a certification by the Administrator that the benefits to transportation security justify the contract cost.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a51-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Extension due to imminent terrorist threat</inline>.—</heading><chapeau>If there is a known or suspected imminent threat to transportation security, the Administrator—</chapeau><subparagraph class="fontsize10" id="yd67d7a52-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>may reduce the 30-day period under paragraph (1) to 5 days to rapidly respond to the threat; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a53-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a54-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Notification.</p></sidenote><content>shall immediately notify the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Homeland Security of the House of Representatives of the known or suspected imminent threat.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section class="indentUp2 firstIndent-2" id="yd67d7a55-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1613">“SEC. 1613. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a56-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563b">6 USC 563b</ref>.</p></sidenote><heading class="bold">ACQUISITION BASELINE ESTABLISHMENT AND REPORTS.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a57-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">Baseline Requirements</inline>.—</heading><paragraph class="fontsize10" id="yd67d7a58-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Before the Administration implements any security-related technology acquisition, the appropriate acquisition official of the Department shall establish and document a set of formal baseline requirements.</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a59-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Contents</inline>.—</heading><chapeau>The baseline requirements under paragraph (1) shall—</chapeau><page identifier="/us/stat/128/2875">128 STAT. 2875</page>
<subparagraph class="fontsize10" id="yd67d7a5a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>include the estimated costs (including lifecycle costs), schedule, and performance milestones for the planned duration of the acquisition;</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a5b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>identify the acquisition risks and a plan for mitigating those risks; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a5c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>assess the personnel necessary to manage the acquisition process, manage the ongoing program, and support training and other operations as necessary.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a5d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a5e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Feasibility</inline>.—</heading><content>In establishing the performance milestones under paragraph (2)(A), the appropriate acquisition official of the Department, to the extent possible and in consultation with the Under Secretary for Science and Technology, shall ensure that achieving those milestones is technologically feasible.</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a5f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">“(4) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a60-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Test and evaluation plan</inline>.—</heading><chapeau>The Administrator, in consultation with the Under Secretary for Science and Technology, shall develop a test and evaluation plan that describes—</chapeau><subparagraph class="fontsize10" id="yd67d7a61-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the activities that are expected to be required to assess acquired technologies against the performance milestones established under paragraph (2)(A);</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a62-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>the necessary and cost-effective combination of laboratory testing, field testing, modeling, simulation, and supporting analysis to ensure that such technologies meet the Administration’s mission needs;</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a63-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>an efficient planning schedule to ensure that test and evaluation activities are completed without undue delay; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a64-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">“(D) </num><content>if commercial aviation passengers are expected to interact with the security-related technology, methods that could be used to measure passenger acceptance of and familiarization with the security-related technology.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a65-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">“(5) </num><heading class="fontsize10"><inline class="smallCaps">Verification and validation</inline>.—</heading><chapeau>The appropriate acquisition official of the Department—</chapeau><subparagraph class="fontsize10" id="yd67d7a66-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>subject to subparagraph (B), shall utilize independent reviewers to verify and validate the performance milestones and cost estimates developed under paragraph (2) for a security-related technology that pursuant to section 1611(d)(2) has been identified as a high priority need in the most recent Plan; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a67-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>shall ensure that the use of independent reviewers does not unduly delay the schedule of any acquisition.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a68-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="6">“(6) </num><heading class="fontsize10"><inline class="smallCaps">Streamlining access for interested vendors</inline>.—</heading><content>The Administrator shall establish a streamlined process for an interested vendor of a security-related technology to request and receive appropriate access to the baseline requirements and test and evaluation plans that are necessary for the vendor to participate in the acquisitions process for that technology.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a69-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Review of Baseline Requirements and Deviation; Report to Congress</inline>.—</heading><paragraph class="fontsize10" id="yd67d7a6a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">Review</inline>.—</heading><subparagraph class="fontsize10" id="yd67d7a6b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The appropriate acquisition official of the Department shall review and assess each implemented acquisition to determine if the acquisition is meeting the baseline requirements established under subsection (a).</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a6c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><heading class="fontsize10"><inline class="smallCaps">Test and evaluation assessment</inline>.—</heading><chapeau>The review shall include an assessment of whether—</chapeau><page identifier="/us/stat/128/2876">128 STAT. 2876</page>
<clause class="fontsize10" id="yd67d7a6d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the planned testing and evaluation activities have been completed; and</content></clause>
<clause class="fontsize10" id="yd67d7a6e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the results of that testing and evaluation demonstrate that the performance milestones are technologically feasible.</content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a6f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Report</inline>.—</heading><chapeau>Not later than 30 days after making a finding described in clause (i), (ii), or (iii) of subparagraph (A), the Administrator shall submit a report to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Homeland Security of the House of Representatives that includes—</chapeau><subparagraph class="fontsize10" id="yd67d7a70-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><chapeau>the results of any assessment that finds that—</chapeau><clause class="fontsize10" id="yd67d7a71-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><content>the actual or planned costs exceed the baseline costs by more than 10 percent;</content></clause>
<clause class="fontsize10" id="yd67d7a72-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>the actual or planned schedule for delivery has been delayed by more than 180 days; or</content></clause>
<clause class="fontsize10" id="yd67d7a73-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">“(iii) </num><content>there is a failure to meet any performance milestone that directly impacts security effectiveness;</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="yd67d7a74-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>the cause for such excessive costs, delay, or failure; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a75-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a76-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Plans.</p></sidenote><content>a plan for corrective action.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section class="indentUp2 firstIndent-2" id="yd67d7a77-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1614">“SEC. 1614. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a78-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Contracts.</p><p class="leftAlign firstIndent0 fontsize8" id="xd67d7a79-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563c">6 USC 563c</ref>.</p></sidenote><heading class="bold">INVENTORY UTILIZATION.</heading><subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a7a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">“(a) </num><heading class="fontsize10"><inline class="smallCaps">In General</inline>.—</heading><content>Before the procurement of additional quantities of equipment to fulfill a mission need, the Administrator, to the extent practicable, shall utilize any existing units in the Administration’s inventory to meet that need.</content></subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a7b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">“(b) </num><heading class="fontsize10"><inline class="smallCaps">Tracking of Inventory</inline>.—</heading><paragraph class="fontsize10" id="yd67d7a7c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau>The Administrator shall establish a process for tracking—</chapeau><subparagraph class="fontsize10" id="yd67d7a7d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>the location of security-related equipment in the inventory under subsection (a);</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a7e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>the utilization status of security-related technology in the inventory under subsection (a); and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67d7a7f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">“(C) </num><content>the quantity of security-related equipment in the inventory under subsection (a).</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67d7a80-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Internal controls</inline>.—</heading><content>The Administrator shall implement internal controls to ensure up-to-date accurate data on security-related technology owned, deployed, and in use.</content></paragraph>
</subsection>
<subsection class="indentDown2 firstIndent0 fontsize10" id="yd67d7a81-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">“(c) </num><heading class="fontsize10"><inline class="smallCaps">Logistics Management</inline>.—</heading><paragraph class="fontsize10" id="yd67d7a82-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>The Administrator shall establish logistics principles for managing inventory in an effective and efficient manner.</content></paragraph>
<paragraph class="fontsize10" id="yd67d7a83-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><heading class="fontsize10"><inline class="smallCaps">Limitation on just-in-time logistics</inline>.—</heading><chapeau>The Administrator may not use just-in-time logistics if doing so—</chapeau><subparagraph class="fontsize10" id="yd67d7a84-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>would inhibit necessary planning for large-scale delivery of equipment to airports or other facilities; or</content></subparagraph>
<subparagraph class="fontsize10" id="yd67da195-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><content>would unduly diminish surge capacity for response to a terrorist threat.</content></subparagraph>
</paragraph>
</subsection>
</section>
<section class="indentUp2 firstIndent-2" id="yd67da196-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1615">“SEC. 1615. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da197-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563d">6 USC 563d</ref>.</p></sidenote><heading class="bold">SMALL BUSINESS CONTRACTING GOALS.</heading><chapeau class=" fontsize10" style="-uslm-lc:I658120">  <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da198-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p><p class="leftAlign firstIndent0 fontsize8" id="xd67da199-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote>“Not later than 90 days after the date of enactment of the Transportation Security Acquisition Reform Act, and annually thereafter, the Administrator shall submit a report to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Homeland Security of the House of Representatives that includes—</chapeau><page identifier="/us/stat/128/2877">128 STAT. 2877</page>
<paragraph class="indentDown1 fontsize10" id="yd67da19a-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">“(1) </num><content>the Administration’s performance record with respect to meeting its published small-business contracting goals during the preceding fiscal year;</content></paragraph>
<paragraph class="indentDown1 fontsize10" id="yd67da19b-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">“(2) </num><chapeau>if the goals described in paragraph (1) were not met or the Administration’s performance was below the published small-business contracting goals of the Department—</chapeau><subparagraph class="fontsize10" id="yd67da19c-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">“(A) </num><content>a list of challenges, including deviations from the Administration’s subcontracting plans, and factors that contributed to the level of performance during the preceding fiscal year;</content></subparagraph>
<subparagraph class="fontsize10" id="yd67da19d-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">“(B) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da19e-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Action plan.</p></sidenote><chapeau>an action plan, with benchmarks, for addressing each of the challenges identified in subparagraph (A) that—</chapeau><clause class="fontsize10" id="yd67da19f-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">“(i) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da1a0-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Consultation.</p></sidenote><content>is prepared after consultation with the Secretary of Defense and the heads of Federal departments and agencies that achieved their published goals for prime contracting with small and minority-owned businesses, including small and disadvantaged businesses, in prior fiscal years; and</content></clause>
<clause class="fontsize10" id="yd67da1a1-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">“(ii) </num><content>identifies policies and procedures that could be incorporated by the Administration in furtherance of achieving the Administration’s published goal for such contracting; and</content></clause>
</subparagraph>
</paragraph>
<paragraph class="indentDown1 fontsize10" id="yd67da1a2-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">“(3) </num><content>a status report on the implementation of the action plan that was developed in the preceding fiscal year in accordance with paragraph (2)(B), if such a plan was required.</content></paragraph>
</section>
<section class="indentUp2 firstIndent-2" id="yd67da1a3-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658144"><num class="bold" value="1616">“SEC. 1616. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da1a4-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s563e">6 USC 563e</ref>.</p></sidenote><heading class="bold">CONSISTENCY WITH THE FEDERAL ACQUISITION REGULATION AND DEPARTMENTAL POLICIES AND DIRECTIVES.</heading><content class="indentDown2 firstIndent0 fontsize10" style="-uslm-lc:I658120">  “The Administrator shall execute the responsibilities set forth in this subtitle in a manner consistent with, and not duplicative of, the Federal Acquisition Regulation and the Department’s policies and directives.”</content></section>
</subtitle>
</title>
</quotedContent>.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yd67da1a5-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s3/b" role="instruction" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Conforming Amendment</inline>.—</heading><content>The table of contents in section 1(b) of the Homeland Security Act of 2002 <amendingAction type="amend">is amended</amendingAction> by <amendingAction type="delete">striking</amendingAction> the items relating to title XVI and <amendingAction type="insert">inserting</amendingAction> the following:<quotedContent><toc>
<referenceItem role="title" style="-uslm-lc:I658274">
<designator>“TITLE XVI—</designator>
<label>TRANSPORTATION SECURITY</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle A—</designator>
<label>General Provisions</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1601. </designator>
<label>Definitions.</label>
</referenceItem><referenceItem role="subtitle" style="-uslm-lc:I658274">
<designator>“Subtitle B—</designator>
<label>Transportation Security Administration Acquisition Improvements</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1611. </designator>
<label>5-year technology investment plan.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1612. </designator>
<label>Acquisition justification and reports.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1613. </designator>
<label>Acquisition baseline establishment and reports.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1614. </designator>
<label>Inventory utilization.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1615. </designator>
<label>Small business contracting goals.</label>
</referenceItem><referenceItem role="section" style="-uslm-lc:I658242">
<designator>“Sec. 1616. </designator>
<label>Consistency with the Federal acquisition regulation and departmental policies and directives.”.<?GPOvSpace 04?></label>
</referenceItem></toc>
</quotedContent></content></subsection>
<subsection class="firstIndent0 fontsize10" id="yd67da1a6-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s3/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Prior Amendments Not Affected</inline>.<sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67da1a7-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180"><ref href="/us/usc/t6/s561">6 USC 561 note</ref>.</p></sidenote>—</heading><content>Nothing in this section may be construed to affect any amendment made by title XVI of the Homeland Security Act of 2002 as in effect before the date of enactment of this Act.</content></subsection>
</section>
<section id="d287932e1061" identifier="/us/pl/113/245/s4" style="-uslm-lc:I658141"><num class="fontsize12" value="4">SEC. 4. </num><heading>GOVERNMENT ACCOUNTABILITY OFFICE REPORTS.</heading><subsection class="firstIndent0 fontsize10" id="yd67dc8b8-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s4/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67dc8b9-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Assessment.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Implementation of Previous Recommendations</inline>.—</heading><content>Not later than 1 year after the date of enactment of this Act, the Comptroller General of the United States shall submit a report to Congress that contains an assessment of the Transportation Security Administration’s implementation of recommendations <page identifier="/us/stat/128/2878">128 STAT. 2878</page>
regarding the acquisition of security-related technology that were made by the Government Accountability Office before the date of the enactment of this Act.</content></subsection>
<subsection class="firstIndent0 fontsize10" id="yd67dc8ba-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s4/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67dc8bb-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Evaluation.</p></sidenote><heading class="fontsize10"><inline class="smallCaps">Implementation of Subtitle B of Title XVI</inline>.—</heading><content>Not later than 1 year after the date of enactment of this Act and 3 years thereafter, the Comptroller General of the United States shall submit a report to Congress that contains an evaluation of the Transportation Security Administration’s progress in implementing subtitle B of title XVI of the Homeland Security Act of 2002, as amended by section 3, including any efficiencies, cost savings, or delays that have resulted from such implementation.</content></subsection>
</section>
<section id="d287932e1094" identifier="/us/pl/113/245/s5" style="-uslm-lc:I658141"><num class="fontsize12" value="5">SEC. 5. </num><heading>REPORT ON FEASIBILITY OF INVENTORY TRACKING.</heading><content style="-uslm-lc:I658120">  Not later than 90 days after the date of enactment of this Act, the Administrator of the Transportation Security Administration shall submit a report to Congress on the feasibility of tracking security-related technology, including software solutions, of the Administration through automated information and data capture technologies.</content></section>
<section id="d287932e1101" identifier="/us/pl/113/245/s6" style="-uslm-lc:I658141"><num class="fontsize12" value="6">SEC. 6. </num><heading>GOVERNMENT ACCOUNTABILITY OFFICE REVIEW OF TSA’S TEST AND EVALUATION PROCESS.</heading><chapeau class="indentUp0 firstIndent0 fontsize10" id="xd67e16dc-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658120">  <sidenote><p class="leftAlign firstIndent0 fontsize8" id="xd67e16dd-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadline.</p><p class="leftAlign firstIndent0 fontsize8" id="xd67e16de-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Reports.</p></sidenote>Not later than 1 year after the date of enactment of this Act, the Comptroller General of the United States shall submit a report to Congress that includes—</chapeau><paragraph class="fontsize10" id="yd67e16df-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><content>an evaluation of the Transportation Security Administration’s testing and evaluation activities related to security-related technology;</content></paragraph>
<paragraph class="fontsize10" id="yd67e16e0-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><chapeau>information on the extent to which—</chapeau><subparagraph class="fontsize10" id="yd67e16e1-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the execution of such testing and evaluation activities is aligned, temporally and otherwise, with the Administration’s annual budget request, acquisition needs, planned procurements, and acquisitions for technology programs and projects; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67e16e2-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>security-related technology that has been tested, evaluated, and certified for use by the Administration but was not procured by the Administration, including the reasons the procurement did not occur; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="yd67e16e3-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><chapeau>recommendations—</chapeau><subparagraph class="fontsize10" id="yd67e16e4-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/3/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>to improve the efficiency and efficacy of such testing and evaluation activities; and</content></subparagraph>
<subparagraph class="fontsize10" id="yd67e16e5-e884-11f0-a1e4-69761a48a15a" identifier="/us/pl/113/245/s6/3/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>to better align such testing and evaluation with the acquisitions process.<page identifier="/us/stat/128/2879">128 STAT. 2879</page></content></subparagraph>
</paragraph>
</section>
<section id="d287932e1152" identifier="/us/pl/113/245/s7" style="-uslm-lc:I658141"><num class="fontsize12" value="7">SEC. 7. </num><heading>NO ADDITIONAL AUTHORIZATION OF APPROPRIATIONS.</heading><content style="-uslm-lc:I658120">  No additional funds are authorized to be appropriated to carry out this Act or the amendments made by this Act.</content></section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2014-12-18">December 18, 2014</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/113/hr/2719">H.R. 2719</ref> (<ref href="/us/bill/113/s/1893">S. 1893</ref>):</heading>
<note>
<headingText style="-uslm-lc:I658032">HOUSE REPORTS:</headingText> ┐No. <ref href="/us/hrpt/113/275">113–275</ref> (<committee>Comm. on Homeland Security</committee>).
</note>
<note><headingText style="-uslm-lc:I658032">SENATE REPORTS:</headingText> ┐No. <ref href="/us/srpt/113/274">113–274</ref> (<committee>Comm. on Commerce, Science, and Transpor-<br/>            tation</committee>) accompanying <ref href="/us/bill/113/s/1893">S. 1893</ref>.
</note>

<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD:</heading>
<subheading style="-uslm-lc:I658033">Vol. 159 (2013):</subheading>
<p class="indentUp2 firstIndent-1" id="xd67e3df6-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 3, considered and passed House.</p><subheading style="-uslm-lc:I658033">Vol. 160 (2014):</subheading>
<p class="indentUp2 firstIndent-1" id="xd67e3df7-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 9, considered and passed Senate, amended.</p><p class="indentUp2 firstIndent-1" id="xd67e3df8-e884-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658034">Dec. 10, House concurred in Senate amendment.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>