FAS Note: Following are excerpts on information policy from the Homeland Security Act of 2002, as adopted by the House of Representatives on November 13, 2002.
 
                     HOMELAND SECURITY ACT OF 2002

  Mr. ARMEY. Mr. Speaker, pursuant to House Resolution 600, I call up 
the bill (H.R. 5710) to establish the Department of Homeland Security, 
and for other purposes, and ask for its immediate consideration.
  The Clerk read the title of the bill.
  The text of H.R. 5710 is as follows:

                               H.R. 5710

       Be it enacted by the Senate and House of Representatives of 
     the United States of America in Congress assembled,

     SECTION 1. SHORT TITLE; TABLE OF CONTENTS.

       (a) Short Title.--This Act may be cited as the "Homeland 
     Security Act of 2002".
       (b) Table of Contents.--The table of contents for this Act 
     is as follows:

[...]

      TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

  Subtitle A--Directorate for Information Analysis and Infrastructure 
                   Protection; Access to Information

Sec. 201. Directorate for Information Analysis and Infrastructure 
              Protection.
Sec. 202. Access to information.

            Subtitle B--Critical Infrastructure Information

Sec. 211. Short title.
Sec. 212. Definitions.
Sec. 213. Designation of critical infrastructure protection program.
Sec. 214. Protection of voluntarily shared critical infrastructure 
              information.
Sec. 215. No private right of action.

                    Subtitle C--Information Security

Sec. 221. Procedures for sharing information.
Sec. 222. Privacy Officer.
Sec. 223. Enhancement of non-Federal cybersecurity.
Sec. 224. Net guard.
Sec. 225. Cyber Security Enhancement Act of 2002.

[...]

   TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

Sec. 301. Under Secretary for Science and Technology.
Sec. 302. Responsibilities and authorities of the Under Secretary for 
              Science and Technology.
Sec. 303. Functions transferred.
Sec. 304. Conduct of certain public health-related activities.
Sec. 305. Federally funded research and development centers.
Sec. 306. Miscellaneous provisions.
Sec. 307. Homeland Security Advanced Research Projects Agency.
Sec. 308. Conduct of research, development, demonstration, testing and 
              evaluation.
Sec. 309. Utilization of Department of Energy national laboratories and 
              sites in support of homeland security activities.
Sec. 310. Transfer of Plum Island Animal Disease Center, Department of 
              Agriculture.
Sec. 311. Homeland Security Science and Technology Advisory Committee.
Sec. 312. Homeland Security Institute.
Sec. 313. Technology clearinghouse to encourage and support innovative 
              solutions to enhance homeland security.


TITLE VIII--COORDINATION WITH NON-FEDERAL ENTITIES; INSPECTOR GENERAL; 
     UNITED STATES SECRET SERVICE; COAST GUARD; GENERAL PROVISIONS

[...]

Sec. 880. Prohibition of the Terrorism Information and Prevention 
              System.

[...]

Sec. 886. Sense of Congress reaffirming the continued importance and 
              applicability of the Posse Comitatus Act.

[...]

                    Subtitle I--Information Sharing

Sec. 891. Short title; findings; and sense of Congress.
Sec. 892. Facilitating homeland security information sharing 
              procedures.
Sec. 893. Report.
Sec. 894. Authorization of appropriations.
Sec. 895. Authority to share grand jury information.
Sec. 896. Authority to share electronic, wire, and oral interception 
              information.
Sec. 897. Foreign intelligence information.
Sec. 898. Information acquired from an electronic surveillance.
Sec. 899. Information acquired from a physical search.

[...]

                     TITLE X--INFORMATION SECURITY

Sec. 1001. Information security.
Sec. 1002. Management of information technology.
Sec. 1003. National Institute of Standards and Technology.
Sec. 1004. Information Security and Privacy Advisory Board.
Sec. 1005. Technical and conforming amendments.
Sec. 1006. Construction.


	 [...]
	 
	       TITLE II--INFORMATION ANALYSIS AND INFRASTRUCTURE PROTECTION

  Subtitle A--Directorate for Information Analysis and Infrastructure 
                   Protection; Access to Information

     SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND 
                   INFRASTRUCTURE PROTECTION.

       (a) Under Secretary of Homeland Security for Information 
     Analysis and Infrastructure Protection.--
       (1) In general.--There shall be in the Department a 
     Directorate for Information Analysis and Infrastructure 
     Protection headed by an Under Secretary for Information 
     Analysis and Infrastructure Protection, who shall be 
     appointed by the President, by and with the advice and 
     consent of the Senate.
       (2) Responsibilities.--The Under Secretary shall assist the 
     Secretary in discharging the responsibilities assigned by the 
     Secretary.
       (b) Assistant Secretary for Information Analysis; Assistant 
     Secretary for Infrastructure Protection.--
       (1) Assistant secretary for information analysis.--There 
     shall be in the Department an Assistant Secretary for 
     Information Analysis, who shall be appointed by the 
     President.
       (2) Assistant secretary for infrastructure protection.--
     There shall be in the Department an Assistant Secretary for 
     Infrastructure Protection, who shall be appointed by the 
     President.
       (3) Responsibilities.--The Assistant Secretary for 
     Information Analysis and the Assistant Secretary for 
     Infrastructure Protection shall assist the Under Secretary 
     for Information Analysis and Infrastructure Protection in 
     discharging the responsibilities of the Under Secretary under 
     this section.
       (c) Discharge of Information Analysis and Infrastructure 
     Protection.--The Secretary shall ensure that the 
     responsibilities of the Department regarding information 
     analysis and infrastructure protection are carried out 
     through the Under Secretary for Information Analysis and 
     Infrastructure Protection.
       (d) Responsibilities of Under Secretary.--Subject to the 
     direction and control of the Secretary, the responsibilities 
     of the Under Secretary for Information Analysis and 
     Infrastructure Protection shall be as follows:
       (1) To access, receive, and analyze law enforcement 
     information, intelligence information, and other information 
     from agencies of the Federal Government, State and local 
     government agencies (including law enforcement agencies), and 
     private sector entities, and to integrate such information in 
     order to--
       (A) identify and assess the nature and scope of terrorist 
     threats to the homeland;
       (B) detect and identify threats of terrorism against the 
     United States; and
       (C) understand such threats in light of actual and 
     potential vulnerabilities of the homeland.
       (2) To carry out comprehensive assessments of the 
     vulnerabilities of the key resources and critical 
     infrastructure of the United States, including the 
     performance of risk assessments to determine the risks posed 
     by particular types of terrorist attacks

[[Page H8651]]

     within the United States (including an assessment of the 
     probability of success of such attacks and the feasibility 
     and potential efficacy of various countermeasures to such 
     attacks).
       (3) To integrate relevant information, analyses, and 
     vulnerability assessments (whether such information, 
     analyses, or assessments are provided or produced by the 
     Department or others) in order to identify priorities for 
     protective and support measures by the Department, other 
     agencies of the Federal Government, State and local 
     government agencies and authorities, the private sector, and 
     other entities.
       (4) To ensure, pursuant to section 202, the timely and 
     efficient access by the Department to all information 
     necessary to discharge the responsibilities under this 
     section, including obtaining such information from other 
     agencies of the Federal Government.
       (5) To develop a comprehensive national plan for securing 
     the key resources and critical infrastructure of the United 
     States, including power production, generation, and 
     distribution systems, information technology and 
     telecommunications systems (including satellites), electronic 
     financial and property record storage and transmission 
     systems, emergency preparedness communications systems, and 
     the physical and technological assets that support such 
     systems.
       (6) To recommend measures necessary to protect the key 
     resources and critical infrastructure of the United States in 
     coordination with other agencies of the Federal Government 
     and in cooperation with State and local government agencies 
     and authorities, the private sector, and other entities.
       (7) To administer the Homeland Security Advisory System, 
     including--
       (A) exercising primary responsibility for public advisories 
     related to threats to homeland security; and
       (B) in coordination with other agencies of the Federal 
     Government, providing specific warning information, and 
     advice about appropriate protective measures and 
     countermeasures, to State and local government agencies and 
     authorities, the private sector, other entities, and the 
     public.
       (8) To review, analyze, and make recommendations for 
     improvements in the policies and procedures governing the 
     sharing of law enforcement information, intelligence 
     information, intelligence-related information, and other 
     information relating to homeland security within the Federal 
     Government and between the Federal Government and State and 
     local government agencies and authorities.
       (9) To disseminate, as appropriate, information analyzed by 
     the Department within the Department, to other agencies of 
     the Federal Government with responsibilities relating to 
     homeland security, and to agencies of State and local 
     governments and private sector entities with such 
     responsibilities in order to assist in the deterrence, 
     prevention, preemption of, or response to, terrorist attacks 
     against the United States.
       (10) To consult with the Director of Central Intelligence 
     and other appropriate intelligence, law enforcement, or other 
     elements of the Federal Government to establish collection 
     priorities and strategies for information, including law 
     enforcement-related information, relating to threats of 
     terrorism against the United States through such means as the 
     representation of the Department in discussions regarding 
     requirements and priorities in the collection of such 
     information.
       (11) To consult with State and local governments and 
     private sector entities to ensure appropriate exchanges of 
     information, including law enforcement-related information, 
     relating to threats of terrorism against the United States.
       (12) To ensure that--
       (A) any material received pursuant to this Act is protected 
     from unauthorized disclosure and handled and used only for 
     the performance of official duties; and
       (B) any intelligence information under this Act is shared, 
     retained, and disseminated consistent with the authority of 
     the Director of Central Intelligence to protect intelligence 
     sources and methods under the National Security Act of 1947 
     (50 U.S.C. 401 et seq.) and related procedures and, as 
     appropriate, similar authorities of the Attorney General 
     concerning sensitive law enforcement information.
       (13) To request additional information from other agencies 
     of the Federal Government, State and local government 
     agencies, and the private sector relating to threats of 
     terrorism in the United States, or relating to other areas of 
     responsibility assigned by the Secretary, including the entry 
     into cooperative agreements through the Secretary to obtain 
     such information.
       (14) To establish and utilize, in conjunction with the 
     chief information officer of the Department, a secure 
     communications and information technology infrastructure, 
     including data-mining and other advanced analytical tools, in 
     order to access, receive, and analyze data and information in 
     furtherance of the responsibilities under this section, and 
     to disseminate information acquired and analyzed by the 
     Department, as appropriate.
       (15) To ensure, in conjunction with the chief information 
     officer of the Department, that any information databases and 
     analytical tools developed or utilized by the Department--
       (A) are compatible with one another and with relevant 
     information databases of other agencies of the Federal 
     Government; and
       (B) treat information in such databases in a manner that 
     complies with applicable Federal law on privacy.
       (16) To coordinate training and other support to the 
     elements and personnel of the Department, other agencies of 
     the Federal Government, and State and local governments that 
     provide information to the Department, or are consumers of 
     information provided by the Department, in order to 
     facilitate the identification and sharing of information 
     revealed in their ordinary duties and the optimal utilization 
     of information received from the Department.
       (17) To coordinate with elements of the intelligence 
     community and with Federal, State, and local law enforcement 
     agencies, and the private sector, as appropriate.
       (18) To provide intelligence and information analysis and 
     support to other elements of the Department.
       (19) To perform such other duties relating to such 
     responsibilities as the Secretary may provide.
       (e) Staff.--
       (1) In general.--The Secretary shall provide the 
     Directorate with a staff of analysts having appropriate 
     expertise and experience to assist the Directorate in 
     discharging responsibilities under this section.
       (2) Private sector analysts.--Analysts under this 
     subsection may include analysts from the private sector.
       (3) Security clearances.--Analysts under this subsection 
     shall possess security clearances appropriate for their work 
     under this section.
       (f) Detail of Personnel.--
       (1) In general.--In order to assist the Directorate in 
     discharging responsibilities under this section, personnel of 
     the agencies referred to in paragraph (2) may be detailed to 
     the Department for the performance of analytic functions and 
     related duties.
       (2) Covered agencies.--The agencies referred to in this 
     paragraph are as follows:
       (A) The Department of State.
       (B) The Central Intelligence Agency.
       (C) The Federal Bureau of Investigation.
       (D) The National Security Agency.
       (E) The National Imagery and Mapping Agency.
       (F) The Defense Intelligence Agency.
       (G) Any other agency of the Federal Government that the 
     President considers appropriate.
       (3) Cooperative agreements.--The Secretary and the head of 
     the agency concerned may enter into cooperative agreements 
     for the purpose of detailing personnel under this subsection.
       (4) Basis.--The detail of personnel under this subsection 
     may be on a reimbursable or non-reimbursable basis.
       (g) Functions Transferred.--In accordance with title XV, 
     there shall be transferred to the Secretary, for assignment 
     to the Under Secretary for Information Analysis and 
     Infrastructure Protection under this section, the functions, 
     personnel, assets, and liabilities of the following:
       (1) The National Infrastructure Protection Center of the 
     Federal Bureau of Investigation (other than the Computer 
     Investigations and Operations Section), including the 
     functions of the Attorney General relating thereto.
       (2) The National Communications System of the Department of 
     Defense, including the functions of the Secretary of Defense 
     relating thereto.
       (3) The Critical Infrastructure Assurance Office of the 
     Department of Commerce, including the functions of the 
     Secretary of Commerce relating thereto.
       (4) The National Infrastructure Simulation and Analysis 
     Center of the Department of Energy and the energy security 
     and assurance program and activities of the Department, 
     including the functions of the Secretary of Energy relating 
     thereto.
       (5) The Federal Computer Incident Response Center of the 
     General Services Administration, including the functions of 
     the Administrator of General Services relating thereto.
       (h) Inclusion of Certain Elements of the Department as 
     Elements of the Intelligence Community.--Section 3(4) of the 
     National Security Act of 1947 (50 U.S.C. 401(a)) is amended--
       (1) by striking "and" at the end of subparagraph (I);
       (2) by redesignating subparagraph (J) as subparagraph (K); 
     and
       (3) by inserting after subparagraph (I) the following new 
     subparagraph:
       "(J) the elements of the Department of Homeland Security 
     concerned with the analyses of foreign intelligence 
     information; and".

     SEC. 202. ACCESS TO INFORMATION.

       (a) In General.--
       (1) Threat and vulnerability information.--Except as 
     otherwise directed by the President, the Secretary shall have 
     such access as the Secretary considers necessary to all 
     information, including reports, assessments, analyses, and 
     unevaluated intelligence relating to threats of terrorism 
     against the United States and to other areas of 
     responsibility assigned by the Secretary, and to all 
     information concerning infrastructure or other 
     vulnerabilities of the United States to terrorism, whether or 
     not such information has been analyzed, that may be 
     collected, possessed, or prepared by any agency of the 
     Federal Government.
       (2) Other information.--The Secretary shall also have 
     access to other information

[[Page H8652]]

     relating to matters under the responsibility of the Secretary 
     that may be collected, possessed, or prepared by an agency of 
     the Federal Government as the President may further provide.
       (b) Manner of Access.--Except as otherwise directed by the 
     President, with respect to information to which the Secretary 
     has access pursuant to this section--
       (1) the Secretary may obtain such material upon request, 
     and may enter into cooperative arrangements with other 
     executive agencies to provide such material or provide 
     Department officials with access to it on a regular or 
     routine basis, including requests or arrangements involving 
     broad categories of material, access to electronic databases, 
     or both; and
       (2) regardless of whether the Secretary has made any 
     request or entered into any cooperative arrangement pursuant 
     to paragraph (1), all agencies of the Federal Government 
     shall promptly provide to the Secretary--
       (A) all reports (including information reports containing 
     intelligence which has not been fully evaluated), 
     assessments, and analytical information relating to threats 
     of terrorism against the United States and to other areas of 
     responsibility assigned by the Secretary;
       (B) all information concerning the vulnerability of the 
     infrastructure of the United States, or other vulnerabilities 
     of the United States, to terrorism, whether or not such 
     information has been analyzed;
       (C) all other information relating to significant and 
     credible threats of terrorism against the United States, 
     whether or not such information has been analyzed; and
       (D) such other information or material as the President may 
     direct.
       (c) Treatment Under Certain Laws.--The Secretary shall be 
     deemed to be a Federal law enforcement, intelligence, 
     protective, national defense, immigration, or national 
     security official, and shall be provided with all information 
     from law enforcement agencies that is required to be given to 
     the Director of Central Intelligence, under any provision of 
     the following:
       (1) The USA PATRIOT Act of 2001 (Public Law 107-56).
       (2) Section 2517(6) of title 18, United States Code.
       (3) Rule 6(e)(3)(C) of the Federal Rules of Criminal 
     Procedure.
       (d) Access to Intelligence and Other Information.--
       (1) Access by elements of federal government.--Nothing in 
     this title shall preclude any element of the intelligence 
     community (as that term is defined in section 3(4) of the 
     National Security Act of 1947 (50 U.S.C. 401a(4)), or other 
     any element of the Federal Government with responsibility for 
     analyzing terrorist threat information, from receiving any 
     intelligence or other information relating to terrorism.
       (2) Sharing of information.--The Secretary, in consultation 
     with the Director of Central Intelligence, shall work to 
     ensure that intelligence or other information relating to 
     terrorism to which the Department has access is appropriately 
     shared with the elements of the Federal Government referred 
     to in paragraph (1), as well as with State and local 
     governments, as appropriate.

            Subtitle B--Critical Infrastructure Information

     SEC. 211. SHORT TITLE.

       This subtitle may be cited as the "Critical Infrastructure 
     Information Act of 2002".

     SEC. 212. DEFINITIONS.

       In this subtitle:
       (1) Agency.--The term "agency" has the meaning given it 
     in section 551 of title 5, United States Code.
       (2) Covered federal agency.--The term "covered Federal 
     agency" means the Department of Homeland Security.
       (3) Critical infrastructure information.--The term 
     "critical infrastructure information" means information not 
     customarily in the public domain and related to the security 
     of critical infrastructure or protected systems--
       (A) actual, potential, or threatened interference with, 
     attack on, compromise of, or incapacitation of critical 
     infrastructure or protected systems by either physical or 
     computer-based attack or other similar conduct (including the 
     misuse of or unauthorized access to all types of 
     communications and data transmission systems) that violates 
     Federal, State, or local law, harms interstate commerce of 
     the United States, or threatens public health or safety;
       (B) the ability of any critical infrastructure or protected 
     system to resist such interference, compromise, or 
     incapacitation, including any planned or past assessment, 
     projection, or estimate of the vulnerability of critical 
     infrastructure or a protected system, including security 
     testing, risk evaluation thereto, risk management planning, 
     or risk audit; or
       (C) any planned or past operational problem or solution 
     regarding critical infrastructure or protected systems, 
     including repair, recovery, reconstruction, insurance, or 
     continuity, to the extent it is related to such interference, 
     compromise, or incapacitation.
       (4) Critical infrastructure protection program.--The term 
     "critical infrastructure protection program" means any 
     component or bureau of a covered Federal agency that has been 
     designated by the President or any agency head to receive 
     critical infrastructure information.
       (5) Information sharing and analysis organization.--The 
     term "Information Sharing and Analysis Organization" means 
     any formal or informal entity or collaboration created or 
     employed by public or private sector organizations, for 
     purposes of--
       (A) gathering and analyzing critical infrastructure 
     information in order to better understand security problems 
     and interdependencies related to critical infrastructure and 
     protected systems, so as to ensure the availability, 
     integrity, and reliability thereof;
       (B) communicating or disclosing critical infrastructure 
     information to help prevent, detect, mitigate, or recover 
     from the effects of a interference, compromise, or a 
     incapacitation problem related to critical infrastructure or 
     protected systems; and
       (C) voluntarily disseminating critical infrastructure 
     information to its members, State, local, and Federal 
     Governments, or any other entities that may be of assistance 
     in carrying out the purposes specified in subparagraphs (A) 
     and (B).
       (6) Protected system.--The term "protected system"--
       (A) means any service, physical or computer-based system, 
     process, or procedure that directly or indirectly affects the 
     viability of a facility of critical infrastructure; and
       (B) includes any physical or computer-based system, 
     including a computer, computer system, computer or 
     communications network, or any component hardware or element 
     thereof, software program, processing instructions, or 
     information or data in transmission or storage therein, 
     irrespective of the medium of transmission or storage.
       (7) Voluntary.--
       (A) In general.--The term "voluntary", in the case of any 
     submittal of critical infrastructure information to a covered 
     Federal agency, means the submittal thereof in the absence of 
     such agency's exercise of legal authority to compel access to 
     or submission of such information and may be accomplished by 
     a single entity or an Information Sharing and Analysis 
     Organization on behalf of itself or its members.
       (B) Exclusions.--The term "voluntary"--
       (i) in the case of any action brought under the securities 
     laws as is defined in section 3(a)(47) of the Securities 
     Exchange Act of 1934 (15 U.S.C. 78c(a)(47))--

       (I) does not include information or statements contained in 
     any documents or materials filed with the Securities and 
     Exchange Commission, or with Federal banking regulators, 
     pursuant to section 12(i) of the Securities Exchange Act of 
     1934 (15 U.S.C. 781(I)); and
       (II) with respect to the submittal of critical 
     infrastructure information, does not include any disclosure 
     or writing that when made accompanied the solicitation of an 
     offer or a sale of securities; and

       (ii) does not include information or statements submitted 
     or relied upon as a basis for making licensing or permitting 
     determinations, or during regulatory proceedings.

     SEC. 213. DESIGNATION OF CRITICAL INFRASTRUCTURE PROTECTION 
                   PROGRAM.

       A critical infrastructure protection program may be 
     designated as such by one of the following:
       (1) The President.
       (2) The Secretary of Homeland Security.

     SEC. 214. PROTECTION OF VOLUNTARILY SHARED CRITICAL 
                   INFRASTRUCTURE INFORMATION.

       (a) Protection.--
       (1) In general.--Notwithstanding any other provision of 
     law, critical infrastructure information (including the 
     identity of the submitting person or entity) that is 
     voluntarily submitted to a covered Federal agency for use by 
     that agency regarding the security of critical infrastructure 
     and protected systems, analysis, warning, interdependency 
     study, recovery, reconstitution, or other informational 
     purpose, when accompanied by an express statement specified 
     in paragraph (2)--
       (A) shall be exempt from disclosure under section 552 of 
     title 5, United States Code (commonly referred to as the 
     Freedom of Information Act);
       (B) shall not be subject to any agency rules or judicial 
     doctrine regarding ex parte communications with a decision 
     making official;
       (C) shall not, without the written consent of the person or 
     entity submitting such information, be used directly by such 
     agency, any other Federal, State, or local authority, or any 
     third party, in any civil action arising under Federal or 
     State law if such information is submitted in good faith;
       (D) shall not, without the written consent of the person or 
     entity submitting such information, be used or disclosed by 
     any officer or employee of the United States for purposes 
     other than the purposes of this subtitle, except--
       (i) in furtherance of an investigation or the prosecution 
     of a criminal act; or
       (ii) when disclosure of the information would be--

       (I) to either House of Congress, or to the extent of matter 
     within its jurisdiction, any committee or subcommittee 
     thereof, any joint committee thereof or subcommittee of any 
     such joint committee; or
       (II) to the Comptroller General, or any authorized 
     representative of the Comptroller General, in the course of 
     the performance of the duties of the General Accounting 
     Office.

       (E) shall not, if provided to a State or local government 
     or government agency--
       (i) be made available pursuant to any State or local law 
     requiring disclosure of information or records;

[[Page H8653]]

       (ii) otherwise be disclosed or distributed to any party by 
     said State or local government or government agency without 
     the written consent of the person or entity submitting such 
     information; or
       (iii) be used other than for the purpose of protecting 
     critical infrastructure or protected systems, or in 
     furtherance of an investigation or the prosecution of a 
     criminal act; and
       (F) does not constitute a waiver of any applicable 
     privilege or protection provided under law, such as trade 
     secret protection.
       (2) Express statement.--For purposes of paragraph (1), the 
     term "express statement", with respect to information or 
     records, means--
       (A) in the case of written information or records, a 
     written marking on the information or records substantially 
     similar to the following: "This information is voluntarily 
     submitted to the Federal Government in expectation of 
     protection from disclosure as provided by the provisions of 
     the Critical Infrastructure Information Act of 2002."; or
       (B) in the case of oral information, a similar written 
     statement submitted within a reasonable period following the 
     oral communication.
       (b) Limitation.--No communication of critical 
     infrastructure information to a covered Federal agency made 
     pursuant to this subtitle shall be considered to be an action 
     subject to the requirements of the Federal Advisory Committee 
     Act (5 U.S.C. App. 2).
       (c) Independently Obtained Information.--Nothing in this 
     section shall be construed to limit or otherwise affect the 
     ability of a State, local, or Federal Government entity, 
     agency, or authority, or any third party, under applicable 
     law, to obtain critical infrastructure information in a 
     manner not covered by subsection (a), including any 
     information lawfully and properly disclosed generally or 
     broadly to the public and to use such information in any 
     manner permitted by law.
       (d) Treatment of Voluntary Submittal of Information.--The 
     voluntary submittal to the Government of information or 
     records that are protected from disclosure by this subtitle 
     shall not be construed to constitute compliance with any 
     requirement to submit such information to a Federal agency 
     under any other provision of law.
       (e) Procedures.--
       (1) In general.--The Secretary of the Department of 
     Homeland Security shall, in consultation with appropriate 
     representatives of the National Security Council and the 
     Office of Science and Technology Policy, establish uniform 
     procedures for the receipt, care, and storage by Federal 
     agencies of critical infrastructure information that is 
     voluntarily submitted to the Government. The procedures shall 
     be established not later than 90 days after the date of the 
     enactment of this subtitle.
       (2) Elements.--The procedures established under paragraph 
     (1) shall include mechanisms regarding--
       (A) the acknowledgement of receipt by Federal agencies of 
     critical infrastructure information that is voluntarily 
     submitted to the Government;
       (B) the maintenance of the identification of such 
     information as voluntarily submitted to the Government for 
     purposes of and subject to the provisions of this subtitle;
       (C) the care and storage of such information; and
       (D) the protection and maintenance of the confidentiality 
     of such information so as to permit the sharing of such 
     information within the Federal Government and with State and 
     local governments, and the issuance of notices and warnings 
     related to the protection of critical infrastructure and 
     protected systems, in such manner as to protect from public 
     disclosure the identity of the submitting person or entity, 
     or information that is proprietary, business sensitive, 
     relates specifically to the submitting person or entity, and 
     is otherwise not appropriately in the public domain.
       (f) Penalties.--Whoever, being an officer or employee of 
     the United States or of any department or agency thereof, 
     knowingly publishes, divulges, discloses, or makes known in 
     any manner or to any extent not authorized by law, any 
     critical infrastructure information protected from disclosure 
     by this subtitle coming to him in the course of this 
     employment or official duties or by reason of any examination 
     or investigation made by, or return, report, or record made 
     to or filed with, such department or agency or officer or 
     employee thereof, shall be fined under title 18 of the United 
     States Code, imprisoned not more than 1 year, or both, and 
     shall be removed from office or employment.
       (g) Authority To Issue Warnings.--The Federal Government 
     may provide advisories, alerts, and warnings to relevant 
     companies, targeted sectors, other governmental entities, or 
     the general public regarding potential threats to critical 
     infrastructure as appropriate. In issuing a warning, the 
     Federal Government shall take appropriate actions to protect 
     from disclosure--
       (1) the source of any voluntarily submitted critical 
     infrastructure information that forms the basis for the 
     warning; or
       (2) information that is proprietary, business sensitive, 
     relates specifically to the submitting person or entity, or 
     is otherwise not appropriately in the public domain.
       (h) Authority To Delegate.--The President may delegate 
     authority to a critical infrastructure protection program, 
     designated under subsection (e), to enter into a voluntary 
     agreement to promote critical infrastructure security, 
     including with any Information Sharing and Analysis 
     Organization, or a plan of action as otherwise defined in 
     section 708 of the Defense Production Act of 1950 (50 U.S.C. 
     App. 2158).

     SEC. 215. NO PRIVATE RIGHT OF ACTION.

       Nothing in this subtitle may be construed to create a 
     private right of action for enforcement of any provision of 
     this Act.

                    Subtitle C--Information Security

     SEC. 221. PROCEDURES FOR SHARING INFORMATION.

       The Secretary shall establish procedures on the use of 
     information shared under this title that--
       (1) limit the redissemination of such information to ensure 
     that it is not used for an unauthorized purpose;
       (2) ensure the security and confidentiality of such 
     information;
       (3) protect the constitutional and statutory rights of any 
     individuals who are subjects of such information; and
       (4) provide data integrity through the timely removal and 
     destruction of obsolete or erroneous names and information.

     SEC. 222. PRIVACY OFFICER.

       The Secretary shall appoint a senior official in the 
     Department to assume primary responsibility for privacy 
     policy, including--
       (1) assuring that the use of technologies sustain, and do 
     not erode, privacy protections relating to the use, 
     collection, and disclosure of personal information;
       (2) assuring that personal information contained in Privacy 
     Act systems of records is handled in full compliance with 
     fair information practices as set out in the Privacy Act of 
     1974;
       (3) evaluating legislative and regulatory proposals 
     involving collection, use, and disclosure of personal 
     information by the Federal Government;
       (4) conducting a privacy impact assessment of proposed 
     rules of the Department or that of the Department on the 
     privacy of personal information, including the type of 
     personal information collected and the number of people 
     affected; and
       (5) preparing a report to Congress on an annual basis on 
     activities of the Department that affect privacy, including 
     complaints of privacy violations, implementation of the 
     Privacy Act of 1974, internal controls, and other matters.

     SEC. 223. ENHANCEMENT OF NON-FEDERAL CYBERSECURITY.

       In carrying out the responsibilities under section 201, the 
     Under Secretary for Information Analysis and Infrastructure 
     Protection shall--
       (1) as appropriate, provide to State and local government 
     entities, and upon request to private entities that own or 
     operate critical information systems--
       (A) analysis and warnings related to threats to, and 
     vulnerabilities of, critical information systems; and
       (B) in coordination with the Under Secretary for Emergency 
     Preparedness and Response, crisis management support in 
     response to threats to, or attacks on, critical information 
     systems; and
       (2) as appropriate, provide technical assistance, upon 
     request, to the private sector and other government entities, 
     in coordination with the Under Secretary for Emergency 
     Preparedness and Response, with respect to emergency recovery 
     plans to respond to major failures of critical information 
     systems.

     SEC. 224. NET GUARD.

       The Under Secretary for Information Analysis and 
     Infrastructure Protection may establish a national technology 
     guard, to be known as "NET Guard", comprised of local teams 
     of volunteers with expertise in relevant areas of science and 
     technology, to assist local communities to respond and 
     recover from attacks on information systems and 
     communications networks.

     SEC. 225. CYBER SECURITY ENHANCEMENT ACT OF 2002.

       (a) Short Title.--This section may be cited as the "Cyber 
     Security Enhancement Act of 2002".
       (b) Amendment of Sentencing Guidelines Relating to Certain 
     Computer Crimes.--
       (1) Directive to the united states sentencing commission.--
     Pursuant to its authority under section 994(p) of title 28, 
     United States Code, and in accordance with this subsection, 
     the United States Sentencing Commission shall review and, if 
     appropriate, amend its guidelines and its policy statements 
     applicable to persons convicted of an offense under section 
     1030 of title 18, United States Code.
       (2) Requirements.--In carrying out this subsection, the 
     Sentencing Commission shall--
       (A) ensure that the sentencing guidelines and policy 
     statements reflect the serious nature of the offenses 
     described in paragraph (1), the growing incidence of such 
     offenses, and the need for an effective deterrent and 
     appropriate punishment to prevent such offenses;
       (B) consider the following factors and the extent to which 
     the guidelines may or may not account for them--
       (i) the potential and actual loss resulting from the 
     offense;
       (ii) the level of sophistication and planning involved in 
     the offense;
       (iii) whether the offense was committed for purposes of 
     commercial advantage or private financial benefit;
       (iv) whether the defendant acted with malicious intent to 
     cause harm in committing the offense;

[[Page H8654]]

       (v) the extent to which the offense violated the privacy 
     rights of individuals harmed;
       (vi) whether the offense involved a computer used by the 
     government in furtherance of national defense, national 
     security, or the administration of justice;
       (vii) whether the violation was intended to or had the 
     effect of significantly interfering with or disrupting a 
     critical infrastructure; and
       (viii) whether the violation was intended to or had the 
     effect of creating a threat to public health or safety, or 
     injury to any person;
       (C) assure reasonable consistency with other relevant 
     directives and with other sentencing guidelines;
       (D) account for any additional aggravating or mitigating 
     circumstances that might justify exceptions to the generally 
     applicable sentencing ranges;
       (E) make any necessary conforming changes to the sentencing 
     guidelines; and
       (F) assure that the guidelines adequately meet the purposes 
     of sentencing as set forth in section 3553(a)(2) of title 18, 
     United States Code.
       (c) Study and Report on Computer Crimes.--Not later than 
     May 1, 2003, the United States Sentencing Commission shall 
     submit a brief report to Congress that explains any actions 
     taken by the Sentencing Commission in response to this 
     section and includes any recommendations the Commission may 
     have regarding statutory penalties for offenses under section 
     1030 of title 18, United States Code.
       (d) Emergency Disclosure Exception.--
       (1) In general.--Section 2702(b) of title 18, United States 
     Code, is amended--
       (A) in paragraph (5), by striking "or" at the end;
       (B) in paragraph (6)(A), by inserting "or" at the end;
       (C) by striking paragraph (6)(C); and
       (D) by adding at the end the following:
       "(7) to a Federal, State, or local governmental entity, if 
     the provider, in good faith, believes that an emergency 
     involving danger of death or serious physical injury to any 
     person requires disclosure without delay of communications 
     relating to the emergency.".
       (2) Reporting of disclosures.--A government entity that 
     receives a disclosure under section 2702(b) of title 18, 
     United States Code, shall file, not later than 90 days after 
     such disclosure, a report to the Attorney General stating the 
     paragraph of that section under which the disclosure was 
     made, the date of the disclosure, the entity to which the 
     disclosure was made, the number of customers or subscribers 
     to whom the information disclosed pertained, and the number 
     of communications, if any, that were disclosed. The Attorney 
     General shall publish all such reports into a single report 
     to be submitted to Congress 1 year after the date of 
     enactment of this Act.
       (e) Good Faith Exception.--Section 2520(d)(3) of title 18, 
     United States Code, is amended by inserting "or 2511(2)(i)" 
     after "2511(3)".
       (f) Internet Advertising of Illegal Devices.--Section 
     2512(1)(c) of title 18, United States Code, is amended--
       (1) by inserting "or disseminates by electronic means" 
     after "or other publication"; and
       (2) by inserting "knowing the content of the advertisement 
     and" before "knowing or having reason to know".
       (g) Strengthening Penalties.--Section 1030(c) of title 18, 
     United States Code, is amended--
       (1) by striking "and" at the end of paragraph (3);
       (2) in each of subparagraphs (A) and (C) of paragraph (4), 
     by inserting "except as provided in paragraph (5)," before 
     "a fine under this title";
       (3) in paragraph (4)(C), by striking the period at the end 
     and inserting "; and"; and
       (4) by adding at the end the following:
       "(5)(A) if the offender knowingly or recklessly causes or 
     attempts to cause serious bodily injury from conduct in 
     violation of subsection (a)(5)(A)(i), a fine under this title 
     or imprisonment for not more than 20 years, or both; and
       "(B) if the offender knowingly or recklessly causes or 
     attempts to cause death from conduct in violation of 
     subsection (a)(5)(A)(i), a fine under this title or 
     imprisonment for any term of years or for life, or both.".
       (h) Provider Assistance.--
       (1) Section 2703.--Section 2703(e) of title 18, United 
     States Code, is amended by inserting ", statutory 
     authorization" after "subpoena".
       (2) Section 2511.--Section 2511(2)(a)(ii) of title 18, 
     United States Code, is amended by inserting ", statutory 
     authorization," after "court order" the last place it 
     appears.
       (i) Emergencies.--Section 3125(a)(1) of title 18, United 
     States Code, is amended--
       (1) in subparagraph (A), by striking "or" at the end;
       (2) in subparagraph (B), by striking the comma at the end 
     and inserting a semicolon; and
       (3) by adding at the end the following:
       "(C) an immediate threat to a national security interest; 
     or
       "(D) an ongoing attack on a protected computer (as defined 
     in section 1030) that constitutes a crime punishable by a 
     term of imprisonment greater than one year;".
       (j) Protecting Privacy.--
       (1) Section 2511.--Section 2511(4) of title 18, United 
     States Code, is amended--
       (A) by striking paragraph (b); and
       (B) by redesignating paragraph (c) as paragraph (b).
       (2) Section 2701.--Section 2701(b) of title 18, United 
     States Code, is amended--
       (A) in paragraph (1), by inserting ", or in furtherance of 
     any criminal or tortious act in violation of the Constitution 
     or laws of the United States or any State" after 
     "commercial gain";
       (B) in paragraph (1)(A), by striking "one year" and 
     inserting "5 years";
       (C) in paragraph (1)(B), by striking "two years" and 
     inserting "10 years"; and
       (D) by striking paragraph (2) and inserting the following:
       "(2) in any other case--
       "(A) a fine under this title or imprisonment for not more 
     than 1 year or both, in the case of a first offense under 
     this paragraph; and
       "(B) a fine under this title or imprisonment for not more 
     than 5 years, or both, in the case of an offense under this 
     subparagraph that occurs after a conviction of another 
     offense under this section.".

	 [...]
	 
	    TITLE III--SCIENCE AND TECHNOLOGY IN SUPPORT OF HOMELAND SECURITY

     SEC. 301. UNDER SECRETARY FOR SCIENCE AND TECHNOLOGY.

       There shall be in the Department a Directorate of Science 
     and Technology headed by an Under Secretary for Science and 
     Technology.

     SEC. 302. RESPONSIBILITIES AND AUTHORITIES OF THE UNDER 
                   SECRETARY FOR SCIENCE AND TECHNOLOGY.

       The Secretary, acting through the Under Secretary for 
     Science and Technology, shall have the responsibility for--
       (1) advising the Secretary regarding research and 
     development efforts and priorities in support of the 
     Department's missions;
       (2) developing, in consultation with other appropriate 
     executive agencies, a national policy and strategic plan for, 
     identifying priorities, goals, objectives and policies for, 
     and coordinating the Federal Government's civilian efforts to 
     identify and develop countermeasures to chemical, biological, 
     radiological, nuclear, and other emerging terrorist threats, 
     including the development of comprehensive, research-based 
     definable goals for such efforts and development of annual 
     measurable objectives and specific targets to accomplish and 
     evaluate the goals for such efforts;
       (3) supporting the Under Secretary for Information Analysis 
     and Infrastructure Protection, by assessing and testing 
     homeland security vulnerabilities and possible threats;
       (4) conducting basic and applied research, development, 
     demonstration, testing, and evaluation activities that are 
     relevant to any or all elements of the Department, through 
     both intramural and extramural programs, except that such 
     responsibility does not extend to human health-related 
     research and development activities;
       (5) establishing priorities for, directing, funding, and 
     conducting national research, development, test and 
     evaluation, and procurement of technology and systems for--
       (A) preventing the importation of chemical, biological, 
     radiological, nuclear, and related weapons and material; and
       (B) detecting, preventing, protecting against, and 
     responding to terrorist attacks;
       (6) establishing a system for transferring homeland 
     security developments or technologies to federal, state, 
     local government, and private sector entities;
       (7) entering into work agreements, joint sponsorships, 
     contracts, or any other agreements with the Department of 
     Energy regarding the use of the national laboratories or 
     sites and support of the science and technology base at those 
     facilities;
       (8) collaborating with the Secretary of Agriculture and the 
     Attorney General as provided in section 212 of the 
     Agricultural Bioterrorism Protection Act of 2002 (7 U.S.C. 
     8401), as amended by section 1709(b);
       (9) collaborating with the Secretary of Health and Human 
     Services and the Attorney General in determining any new 
     biological agents and toxins that shall be listed as "select 
     agents" in Appendix A of part 72 of title 42, Code of 
     Federal Regulations, pursuant to section 351A of the Public 
     Health Service Act (42 U.S.C. 262a);
       (10) supporting United States leadership in science and 
     technology;
       (11) establishing and administering the primary research 
     and development activities of the Department, including the 
     long-term research and development needs and capabilities for 
     all elements of the Department;
       (12) coordinating and integrating all research, 
     development, demonstration, testing, and evaluation 
     activities of the Department;
       (13) coordinating with other appropriate executive agencies 
     in developing and carrying out the science and technology 
     agenda of the Department to reduce duplication and identify 
     unmet needs; and
       (14) developing and overseeing the administration of 
     guidelines for merit review of research and development 
     projects throughout the Department, and for the dissemination 
     of research conducted or sponsored by the Department.

     SEC. 303. FUNCTIONS TRANSFERRED.

       In accordance with title XV, there shall be transferred to 
     the Secretary the functions, personnel, assets, and 
     liabilities of the following entities:
       (1) The following programs and activities of the Department 
     of Energy, including the functions of the Secretary of Energy 
     relating thereto (but not including programs and activities 
     relating to the strategic nuclear defense posture of the 
     United States):
       (A) The chemical and biological national security and 
     supporting programs and activities of the nonproliferation 
     and verification research and development program.
       (B) The nuclear smuggling programs and activities within 
     the proliferation detection program of the nonproliferation 
     and verification research and development program. The 
     programs and activities described in this subparagraph may be 
     designated by the President either for transfer to the 
     Department or for joint operation by the Secretary and the 
     Secretary of Energy.
       (C) The nuclear assessment program and activities of the 
     assessment, detection, and cooperation program of the 
     international materials protection and cooperation program.
       (D) Such life sciences activities of the biological and 
     environmental research program related to microbial pathogens 
     as may be designated by the President for transfer to the 
     Department.
       (E) The Environmental Measurements Laboratory.
       (F) The advanced scientific computing research program and 
     activities at Lawrence Livermore National Laboratory.
       (2) The National Bio-Weapons Defense Analysis Center of the 
     Department of Defense, including the functions of the 
     Secretary of Defense related thereto.

[[Page H8604]]

       (3) The Plum Island Animal Disease Center of the Department 
     of Agriculture, as provided in section 310.

     SEC. 304. CONDUCT OF CERTAIN PUBLIC HEALTH-RELATED 
                   ACTIVITIES.

       (a) In General.--With respect to civilian human health-
     related research and development activities relating to 
     countermeasures for chemical, biological, radiological, and 
     nuclear and other emerging terrorist threats carried out by 
     the Department of Health and Human Services (including the 
     Public Health Service), the Secretary of Health and Human 
     Services shall set priorities, goals, objectives, and 
     policies and develop a coordinated strategy for such 
     activities in collaboration with the Secretary of Homeland 
     Security to ensure consistency with the national policy and 
     strategic plan developed pursuant to section 302(2).
       (b) Evaluation of Progress.--In carrying out subsection 
     (a), the Secretary of Health and Human Services shall 
     collaborate with the Secretary in developing specific 
     benchmarks and outcome measurements for evaluating progress 
     toward achieving the priorities and goals described in such 
     subsection.
       (c) Administration of Countermeasures Against Smallpox.--
     Section 224 of the Public Health Service Act (42 U.S.C. 233) 
     is amended by adding the following:
       "(p) Administration of Smallpox Countermeasures by Health 
     Professionals.--
       "(1) In general.--For purposes of this section, and 
     subject to other provisions of this subsection, a covered 
     person shall be deemed to be an employee of the Public Health 
     Service with respect to liability arising out of 
     administration of a covered countermeasure against smallpox 
     to an individual during the effective period of a declaration 
     by the Secretary under paragraph (2)(A).
       "(2) Declaration by secretary concerning countermeasure 
     against smallpox.--
       "(A) Authority to issue declaration.--
       "(i) In general.--The Secretary may issue a declaration, 
     pursuant to this paragraph, concluding that an actual or 
     potential bioterrorist incident or other actual or potential 
     public health emergency makes advisable the administration of 
     a covered countermeasure to a category or categories of 
     individuals.
       "(ii) Covered countermeasure.--The Secretary shall specify 
     in such declaration the substance or substances that shall be 
     considered covered countermeasures (as defined in paragraph 
     (8)(A)) for purposes of administration to individuals during 
     the effective period of the declaration.
       "(iii) Effective period.--The Secretary shall specify in 
     such declaration the beginning and ending dates of the 
     effective period of the declaration, and may subsequently 
     amend such declaration to shorten or extend such effective 
     period, provided that the new closing date is after the date 
     when the declaration is amended.
       "(iv) Publication.--The Secretary shall promptly publish 
     each such declaration and amendment in the Federal Register.
       "(B) Liability of united states only for administrations 
     within scope of declaration.--Except as provided in paragraph 
     (5)(B)(ii), the United States shall be liable under this 
     subsection with respect to a claim arising out of the 
     administration of a covered countermeasure to an individual 
     only if--
       "(i) the countermeasure was administered by a qualified 
     person, for a purpose stated in paragraph (7)(A)(i), and 
     during the effective period of a declaration by the Secretary 
     under subparagraph (A) with respect to such countermeasure; 
     and
       "(ii)(I) the individual was within a category of 
     individuals covered by the declaration; or
       "(II) the qualified person administering the 
     countermeasure had reasonable grounds to believe that such 
     individual was within such category.
       "(C) Presumption of administration within scope of 
     declaration in case of accidental vaccinia inoculation.--
       "(i) In general.--If vaccinia vaccine is a covered 
     countermeasure specified in a declaration under subparagraph 
     (A), and an individual to whom the vaccinia vaccine is not 
     administered contracts vaccinia, then, under the 
     circumstances specified in clause (ii), the individual--

       "(I) shall be rebuttably presumed to have contracted 
     vaccinia from an individual to whom such vaccine was 
     administered as provided by clauses (i) and (ii) of 
     subparagraph (B); and
       "(II) shall (unless such presumption is rebutted) be 
     deemed for purposes of this subsection to be an individual to 
     whom a covered countermeasure was administered by a qualified 
     person in accordance with the terms of such declaration and 
     as described by subparagraph (B).

       "(ii) Circumstances in which presumption applies.--The 
     presumption and deeming stated in clause (i) shall apply if--

       "(I) the individual contracts vaccinia during the 
     effective period of a declaration under subparagraph (A) or 
     by the date 30 days after the close of such period; or
       "(II) the individual resides or has resided with an 
     individual to whom such vaccine was administered as provided 
     by clauses (i) and (ii) of subparagraph (B) and contracts 
     vaccinia after such date.

       "(3) Exclusivity of remedy.--The remedy provided by 
     subsection (a) shall be exclusive of any other civil action 
     or proceeding for any claim or suit this subsection 
     encompasses.
       "(4) Certification of action by attorney general.--
     Subsection (c) applies to actions under this subsection, 
     subject to the following provisions:
       "(A) Nature of certification.--The certification by the 
     Attorney General that is the basis for deeming an action or 
     proceeding to be against the United States, and for removing 
     an action or proceeding from a State court, is a 
     certification that the action or proceeding is against a 
     covered person and is based upon a claim alleging personal 
     injury or death arising out of the administration of a 
     covered countermeasure.
       "(B) Certification of attorney general conclusive.--The 
     certification of the Attorney General of the facts specified 
     in subparagraph (A) shall conclusively establish such facts 
     for purposes of jurisdiction pursuant to this subsection.
       "(5) Defendant to cooperate with united states.--
       "(A) In general.--A covered person shall cooperate with 
     the United States in the processing and defense of a claim or 
     action under this subsection based upon alleged acts or 
     omissions of such person.
       "(B) Consequences of failure to cooperate.--Upon the 
     motion of the United States or any other party and upon 
     finding that such person has failed to so cooperate--
       "(i) the court shall substitute such person as the party 
     defendant in place of the United States and, upon motion, 
     shall remand any such suit to the court in which it was 
     instituted if it appears that the court lacks subject matter 
     jurisdiction;
       "(ii) the United States shall not be liable based on the 
     acts or omissions of such person; and
       "(iii) the Attorney General shall not be obligated to 
     defend such action.
       "(6) Recourse against covered person in case of gross 
     misconduct or contract violation.--
       "(A) In general.--Should payment be made by the United 
     States to any claimant bringing a claim under this 
     subsection, either by way of administrative determination, 
     settlement, or court judgment, the United States shall have, 
     notwithstanding any provision of State law, the right to 
     recover for that portion of the damages so awarded or paid, 
     as well as interest and any costs of litigation, resulting 
     from the failure of any covered person to carry out any 
     obligation or responsibility assumed by such person under a 
     contract with the United States or from any grossly 
     negligent, reckless, or illegal conduct or willful misconduct 
     on the part of such person.
       "(B) Venue.--The United States may maintain an action 
     under this paragraph against such person in the district 
     court of the United States in which such person resides or 
     has its principal place of business.
       "(7) Definitions.--As used in this subsection, terms have 
     the following meanings:
       "(A) Covered countermeasure.--The term `covered 
     countermeasure', or `covered countermeasure against 
     smallpox', means a substance that is--
       "(i)(I) used to prevent or treat smallpox (including the 
     vaccinia or another vaccine); or
       "(II) vaccinia immune globulin used to control or treat 
     the adverse effects of vaccinia inoculation; and
       "(ii) specified in a declaration under paragraph (2).
       "(B) Covered person.--The term `covered person', when used 
     with respect to the administration of a covered 
     countermeasure, includes any person who is--
       "(i) a manufacturer or distributor of such countermeasure;
       "(ii) a health care entity under whose auspices such 
     countermeasure was administered;
       "(iii) a qualified person who administered such 
     countermeasure; or
       "(iv) an official, agent, or employee of a person 
     described in clause (i), (ii), or (iii).
       "(C) Qualified person.--The term `qualified person', when 
     used with respect to the administration of a covered 
     countermeasure, means a licensed health professional or other 
     individual who is authorized to administer such 
     countermeasure under the law of the State in which the 
     countermeasure was administered.".

     SEC. 305. FEDERALLY FUNDED RESEARCH AND DEVELOPMENT CENTERS.

       The Secretary, acting through the Under Secretary for 
     Science and Technology, shall have the authority to establish 
     or contract with 1 or more federally funded research and 
     development centers to provide independent analysis of 
     homeland security issues, or to carry out other 
     responsibilities under this Act, including coordinating and 
     integrating both the extramural and intramural programs 
     described in section 308.

     SEC. 306. MISCELLANEOUS PROVISIONS.

       (a) Classification.--To the greatest extent practicable, 
     research conducted or supported by the Department shall be 
     unclassified.
       (b) Construction.--Nothing in this title shall be construed 
     to preclude any Under Secretary of the Department from 
     carrying out research, development, demonstration, or 
     deployment activities, as long as such activities are 
     coordinated through the Under Secretary for Science and 
     Technology.
       (c) Regulations.--The Secretary, acting through the Under 
     Secretary for Science and Technology, may issue necessary 
     regulations with respect to research, development, 
     demonstration, testing, and evaluation activities

[[Page H8605]]

     of the Department, including the conducting, funding, and 
     reviewing of such activities.
       (d) Notification of Presidential Life Sciences 
     Designations.--Not later than 60 days before effecting any 
     transfer of Department of Energy life sciences activities 
     pursuant to section 303(1)(D) of this Act, the President 
     shall notify the appropriate congressional committees of the 
     proposed transfer and shall include the reasons for the 
     transfer and a description of the effect of the transfer on 
     the activities of the Department of Energy.

     SEC. 307. HOMELAND SECURITY ADVANCED RESEARCH PROJECTS 
                   AGENCY.

       (a) Definitions.--In this section:
       (1) Fund.--The term "Fund" means the Acceleration Fund 
     for Research and Development of Homeland Security 
     Technologies established in subsection (c).
       (2) Homeland security research.--The term "homeland 
     security research" means research relevant to the detection 
     of, prevention of, protection against, response to, 
     attribution of, and recovery from homeland security threats, 
     particularly acts of terrorism.
       (3) Hsarpa.--The term "HSARPA" means the Homeland 
     Security Advanced Research Projects Agency established in 
     subsection (b).
       (4) Under secretary.--The term "Under Secretary" means 
     the Under Secretary for Science and Technology.
       (b) HSARPA.--
       (1) Establishment.--There is established the Homeland 
     Security Advanced Research Projects Agency.
       (2) Director.--HSARPA shall be headed by a Director, who 
     shall be appointed by the Secretary. The Director shall 
     report to the Under Secretary.
       (3) Responsibilities.--The Director shall administer the 
     Fund to award competitive, merit-reviewed grants, cooperative 
     agreements or contracts to public or private entities, 
     including businesses, federally funded research and 
     development centers, and universities. The Director shall 
     administer the Fund to--
       (A) support basic and applied homeland security research to 
     promote revolutionary changes in technologies that would 
     promote homeland security;
       (B) advance the development, testing and evaluation, and 
     deployment of critical homeland security technologies; and
       (C) accelerate the prototyping and deployment of 
     technologies that would address homeland security 
     vulnerabilities.
       (4) Targeted competitions.--The Director may solicit 
     proposals to address specific vulnerabilities identified by 
     the Director.
       (5) Coordination.--The Director shall ensure that the 
     activities of HSARPA are coordinated with those of other 
     relevant research agencies, and may run projects jointly with 
     other agencies.
       (6) Personnel.--In hiring personnel for HSARPA, the 
     Secretary shall have the hiring and management authorities 
     described in section 1101 of the Strom Thurmond National 
     Defense Authorization Act for Fiscal Year 1999 (5 U.S.C. 3104 
     note; Public Law 105-261). The term of appointments for 
     employees under subsection (c)(1) of that section may not 
     exceed 5 years before the granting of any extension under 
     subsection (c)(2) of that section.
       (7) Demonstrations.--The Director, periodically, shall hold 
     homeland security technology demonstrations to improve 
     contact among technology developers, vendors and acquisition 
     personnel.
       (c) Fund.--
       (1) Establishment.--There is established the Acceleration 
     Fund for Research and Development of Homeland Security 
     Technologies, which shall be administered by the Director of 
     HSARPA.
       (2) Authorization of appropriations.--There are authorized 
     to be appropriated $500,000,000 to the Fund for fiscal year 
     2003 and such sums as may be necessary thereafter.
       (3) Coast guard.--Of the funds authorized to be 
     appropriated under paragraph (2), not less than 10 percent of 
     such funds for each fiscal year through fiscal year 2005 
     shall be authorized only for the Under Secretary, through 
     joint agreement with the Commandant of the Coast Guard, to 
     carry out research and development of improved ports, 
     waterways and coastal security surveillance and perimeter 
     protection capabilities for the purpose of minimizing the 
     possibility that Coast Guard cutters, aircraft, helicopters, 
     and personnel will be diverted from non-homeland security 
     missions to the ports, waterways and coastal security 
     mission.

     SEC. 308. CONDUCT OF RESEARCH, DEVELOPMENT, DEMONSTRATION, 
                   TESTING AND EVALUATION.

       (a) In General.--The Secretary, acting through the Under 
     Secretary for Science and Technology, shall carry out the 
     responsibilities under section 302(4) through both extramural 
     and intramural programs.
       (b) Extramural Programs.--
       (1) In general.--The Secretary, acting through the Under 
     Secretary for Science and Technology, shall operate 
     extramural research, development, demonstration, testing, and 
     evaluation programs so as to--
       (A) ensure that colleges, universities, private research 
     institutes, and companies (and consortia thereof) from as 
     many areas of the United States as practicable participate;
       (B) ensure that the research funded is of high quality, as 
     determined through merit review processes developed under 
     section 302(14); and
       (C) distribute funds through grants, cooperative 
     agreements, and contracts.
       (2) University-based centers for homeland security.--
       (A) Establishment.--The Secretary, acting through the Under 
     Secretary for Science and Technology, shall establish within 
     1 year of the date of enactment of this Act a university-
     based center or centers for homeland security. The purpose of 
     this center or centers shall be to establish a coordinated, 
     university-based system to enhance the Nation's homeland 
     security.
       (B) Criteria for selection.--In selecting colleges or 
     universities as centers for homeland security, the Secretary 
     shall consider the following criteria:
       (i) Demonstrated expertise in the training of first 
     responders.
       (ii) Demonstrated expertise in responding to incidents 
     involving weapons of mass destruction and biological warfare.
       (iii) Demonstrated expertise in emergency medical services.
       (iv) Demonstrated expertise in chemical, biological, 
     radiological, and nuclear countermeasures.
       (v) Strong affiliations with animal and plant diagnostic 
     laboratories.
       (vi) Demonstrated expertise in food safety.
       (vii) Affiliation with Department of Agriculture 
     laboratories or training centers.
       (viii) Demonstrated expertise in water and wastewater 
     operations.
       (ix) Demonstrated expertise in port and waterway security.
       (x) Demonstrated expertise in multi-modal transportation.
       (xi) Nationally recognized programs in information 
     security.
       (xii) Nationally recognized programs in engineering.
       (xiii) Demonstrated expertise in educational outreach and 
     technical assistance.
       (xiv) Demonstrated expertise in border transportation and 
     security.
       (xv) Demonstrated expertise in interdisciplinary public 
     policy research and communication outreach regarding science, 
     technology, and public policy.
       (C) Discretion of secretary.--The Secretary shall have the 
     discretion to establish such centers and to consider 
     additional criteria as necessary to meet the evolving needs 
     of homeland security and shall report to Congress concerning 
     the implementation of this paragraph as necessary.
       (D) Authorization of appropriations.--There are authorized 
     to be appropriated such sums as may be necessary to carry out 
     this paragraph.
       (c) Intramural Programs.--
       (1) Consultation.--In carrying out the duties under section 
     302, the Secretary, acting through the Under Secretary for 
     Science and Technology, may draw upon the expertise of any 
     laboratory of the Federal Government, whether operated by a 
     contractor or the Government.
       (2) Laboratories.--The Secretary, acting through the Under 
     Secretary for Science and Technology, may establish a 
     headquarters laboratory for the Department at any laboratory 
     or site and may establish additional laboratory units at 
     other laboratories or sites.
       (3) Criteria for headquarters laboratory.--If the Secretary 
     chooses to establish a headquarters laboratory pursuant to 
     paragraph (2), then the Secretary shall do the following:
       (A) Establish criteria for the selection of the 
     headquarters laboratory in consultation with the National 
     Academy of Sciences, appropriate Federal agencies, and other 
     experts.
       (B) Publish the criteria in the Federal Register.
       (C) Evaluate all appropriate laboratories or sites against 
     the criteria.
       (D) Select a laboratory or site on the basis of the 
     criteria.
       (E) Report to the appropriate congressional committees on 
     which laboratory was selected, how the selected laboratory 
     meets the published criteria, and what duties the 
     headquarters laboratory shall perform.
       (4) Limitation on operation of laboratories.--No laboratory 
     shall begin operating as the headquarters laboratory of the 
     Department until at least 30 days after the transmittal of 
     the report required by paragraph (3)(E).

     SEC. 309. UTILIZATION OF DEPARTMENT OF ENERGY NATIONAL 
                   LABORATORIES AND SITES IN SUPPORT OF HOMELAND 
                   SECURITY ACTIVITIES.

       (a) Authority to Utilize National Laboratories and Sites.--
       (1) In general.--In carrying out the missions of the 
     Department, the Secretary may utilize the Department of 
     Energy national laboratories and sites through any 1 or more 
     of the following methods, as the Secretary considers 
     appropriate:
       (A) A joint sponsorship arrangement referred to in 
     subsection (b).
       (B) A direct contract between the Department and the 
     applicable Department of Energy laboratory or site, subject 
     to subsection (c).
       (C) Any "work for others" basis made available by that 
     laboratory or site.
       (D) Any other method provided by law.
       (2) Acceptance and Performance by Labs and Sites.--
     Notwithstanding any other law governing the administration, 
     mission, use, or operations of any of the Department of 
     Energy national laboratories and sites, such laboratories and 
     sites are authorized to accept and perform work for the 
     Secretary,

[[Page H8606]]

     consistent with resources provided, and perform such work on 
     an equal basis to other missions at the laboratory and not on 
     a noninterference basis with other missions of such 
     laboratory or site.
       (b) Joint Sponsorship Arrangements.--
       (1) Laboratories.--The Department may be a joint sponsor, 
     under a multiple agency sponsorship arrangement with the 
     Department of Energy, of 1 or more Department of Energy 
     national laboratories in the performance of work.
       (2) Sites.--The Department may be a joint sponsor of a 
     Department of Energy site in the performance of work as if 
     such site were a federally funded research and development 
     center and the work were performed under a multiple agency 
     sponsorship arrangement with the Department.
       (3) Primary sponsor.--The Department of Energy shall be the 
     primary sponsor under a multiple agency sponsorship 
     arrangement referred to in paragraph (1) or (2).
       (4) Lead agent.--The Secretary of Energy shall act as the 
     lead agent in coordinating the formation and performance of a 
     joint sponsorship arrangement under this subsection between 
     the Department and a Department of Energy national laboratory 
     or site.
       (5) Federal acquisition regulation.--Any work performed by 
     a Department of Energy national laboratory or site under a 
     joint sponsorship arrangement under this subsection shall 
     comply with the policy on the use of federally funded 
     research and development centers under the Federal 
     Acquisition Regulations.
       (6) Funding.--The Department shall provide funds for work 
     at the Department of Energy national laboratories or sites, 
     as the case may be, under a joint sponsorship arrangement 
     under this subsection under the same terms and conditions as 
     apply to the primary sponsor of such national laboratory 
     under section 303(b)(1)(C) of the Federal Property and 
     Administrative Services Act of 1949 (41 U.S.C. 253 (b)(1)(C)) 
     or of such site to the extent such section applies to such 
     site as a federally funded research and development center by 
     reason of this subsection.
       (c) Separate Contracting.--To the extent that programs or 
     activities transferred by this Act from the Department of 
     Energy to the Department of Homeland Security are being 
     carried out through direct contracts with the operator of a 
     national laboratory or site of the Department of Energy, the 
     Secretary of Homeland Security and the Secretary of Energy 
     shall ensure that direct contracts for such programs and 
     activities between the Department of Homeland Security and 
     such operator are separate from the direct contracts of the 
     Department of Energy with such operator.
       (d) Authority With Respect to Cooperative Research and 
     Development Agreements and Licensing Agreements.--In 
     connection with any utilization of the Department of Energy 
     national laboratories and sites under this section, the 
     Secretary may permit the director of any such national 
     laboratory or site to enter into cooperative research and 
     development agreements or to negotiate licensing agreements 
     with any person, any agency or instrumentality, of the United 
     States, any unit of State or local government, and any other 
     entity under the authority granted by section 12 of the 
     Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C. 
     3710a). Technology may be transferred to a non-Federal party 
     to such an agreement consistent with the provisions of 
     sections 11 and 12 of that Act (15 U.S.C. 3710, 3710a).
       (e) Reimbursement of Costs.--In the case of an activity 
     carried out by the operator of a Department of Energy 
     national laboratory or site in connection with any 
     utilization of such laboratory or site under this section, 
     the Department of Homeland Security shall reimburse the 
     Department of Energy for costs of such activity through a 
     method under which the Secretary of Energy waives any 
     requirement for the Department of Homeland Security to pay 
     administrative charges or personnel costs of the Department 
     of Energy or its contractors in excess of the amount that the 
     Secretary of Energy pays for an activity carried out by such 
     contractor and paid for by the Department of Energy.
       (f) Laboratory Directed Research and Development by the 
     Department of Energy.--No funds authorized to be appropriated 
     or otherwise made available to the Department in any fiscal 
     year may be obligated or expended for laboratory directed 
     research and development activities carried out by the 
     Department of Energy unless such activities support the 
     missions of the Department of Homeland Security.
       (g) Office for National Laboratories.--There is established 
     within the Directorate of Science and Technology an Office 
     for National Laboratories, which shall be responsible for the 
     coordination and utilization of the Department of Energy 
     national laboratories and sites under this section in a 
     manner to create a networked laboratory system for the 
     purpose of supporting the missions of the Department.
       (h) Department of Energy Coordination on Homeland Security 
     Related Research.--The Secretary of Energy shall ensure that 
     any research, development, test, and evaluation activities 
     conducted within the Department of Energy that are directly 
     or indirectly related to homeland security are fully 
     coordinated with the Secretary to minimize duplication of 
     effort and maximize the effective application of Federal 
     budget resources.

     SEC. 310. TRANSFER OF PLUM ISLAND ANIMAL DISEASE CENTER, 
                   DEPARTMENT OF AGRICULTURE.

       (a) In General.--In accordance with title XV, the Secretary 
     of Agriculture shall transfer to the Secretary of Homeland 
     Security the Plum Island Animal Disease Center of the 
     Department of Agriculture, including the assets and 
     liabilities of the Center.
       (b) Continued Department of Agriculture Access.--On 
     completion of the transfer of the Plum Island Animal Disease 
     Center under subsection (a), the Secretary of Homeland 
     Security and the Secretary of Agriculture shall enter into an 
     agreement to ensure that the Department of Agriculture is 
     able to carry out research, diagnostic, and other activities 
     of the Department of Agriculture at the Center.
       (c) Direction of Activities.--The Secretary of Agriculture 
     shall continue to direct the research, diagnostic, and other 
     activities of the Department of Agriculture at the Center 
     described in subsection (b).
       (d) Notification.--
       (1) In general.--At least 180 days before any change in the 
     biosafety level at the Plum Island Animal Disease Center, the 
     President shall notify Congress of the change and describe 
     the reasons for the change.
       (2) Limitation.--No change described in paragraph (1) may 
     be made earlier than 180 days after the completion of the 
     transition period (as defined in section 1501.

     SEC. 311. HOMELAND SECURITY SCIENCE AND TECHNOLOGY ADVISORY 
                   COMMITTEE.

       (a) Establishment.--There is established within the 
     Department a Homeland Security Science and Technology 
     Advisory Committee (in this section referred to as the 
     "Advisory Committee"). The Advisory Committee shall make 
     recommendations with respect to the activities of the Under 
     Secretary for Science and Technology, including identifying 
     research areas of potential importance to the security of the 
     Nation.
       (b) Membership.--
       (1) Appointment.--The Advisory Committee shall consist of 
     20 members appointed by the Under Secretary for Science and 
     Technology, which shall include emergency first-responders or 
     representatives of organizations or associations of emergency 
     first-responders. The Advisory Committee shall also include 
     representatives of citizen groups, including economically 
     disadvantaged communities. The individuals appointed as 
     members of the Advisory Committee--
       (A) shall be eminent in fields such as emergency response, 
     research, engineering, new product development, business, and 
     management consulting;
       (B) shall be selected solely on the basis of established 
     records of distinguished service;
       (C) shall not be employees of the Federal Government; and
       (D) shall be so selected as to provide representation of a 
     cross-section of the research, development, demonstration, 
     and deployment activities supported by the Under Secretary 
     for Science and Technology.
       (2) National research council.--The Under Secretary for 
     Science and Technology may enter into an arrangement for the 
     National Research Council to select members of the Advisory 
     Committee, but only if the panel used by the National 
     Research Council reflects the representation described in 
     paragraph (1).
       (c) Terms of Office.--
       (1) In general.--Except as otherwise provided in this 
     subsection, the term of office of each member of the Advisory 
     Committee shall be 3 years.
       (2) Original appointments.--The original members of the 
     Advisory Committee shall be appointed to three classes of 
     three members each. One class shall have a term of 1 year, 1 
     a term of 2 years, and the other a term of 3 years.
       (3) Vacancies.--A member appointed to fill a vacancy 
     occurring before the expiration of the term for which the 
     member's predecessor was appointed shall be appointed for the 
     remainder of such term.
       (d) Eligibility.--A person who has completed two 
     consecutive full terms of service on the Advisory Committee 
     shall thereafter be ineligible for appointment during the 1-
     year period following the expiration of the second such term.
       (e) Meetings.--The Advisory Committee shall meet at least 
     quarterly at the call of the Chair or whenever one-third of 
     the members so request in writing. Each member shall be given 
     appropriate notice of the call of each meeting, whenever 
     possible not less than 15 days before the meeting.
       (f) Quorum.--A majority of the members of the Advisory 
     Committee not having a conflict of interest in the matter 
     being considered by the Advisory Committee shall constitute a 
     quorum.
       (g) Conflict of Interest Rules.--The Advisory Committee 
     shall establish rules for determining when 1 of its members 
     has a conflict of interest in a matter being considered by 
     the Advisory Committee.
       (h) Reports.--
       (1) Annual report.--The Advisory Committee shall render an 
     annual report to the Under Secretary for Science and 
     Technology for transmittal to Congress on or before January 
     31 of each year. Such report shall describe the activities 
     and recommendations of the Advisory Committee during the 
     previous year.

[[Page H8607]]

       (2) Additional reports.--The Advisory Committee may render 
     to the Under Secretary for transmittal to Congress such 
     additional reports on specific policy matters as it considers 
     appropriate.
       (i) FACA Exemption.--Section 14 of the Federal Advisory 
     Committee Act shall not apply to the Advisory Committee.
       (j) Termination.--The Department of Homeland Security 
     Science and Technology Advisory Committee shall terminate 3 
     years after the effective date of this Act.

     SEC. 312. HOMELAND SECURITY INSTITUTE.

       (a) Establishment.--The Secretary shall establish a 
     federally funded research and development center to be known 
     as the "Homeland Security Institute" (in this section 
     referred to as the "Institute").
       (b) Administration.--The Institute shall be administered as 
     a separate entity by the Secretary.
       (c) Duties.--The duties of the Institute shall be 
     determined by the Secretary, and may include the following:
       (1) Systems analysis, risk analysis, and simulation and 
     modeling to determine the vulnerabilities of the Nation's 
     critical infrastructures and the effectiveness of the systems 
     deployed to reduce those vulnerabilities.
       (2) Economic and policy analysis to assess the distributed 
     costs and benefits of alternative approaches to enhancing 
     security.
       (3) Evaluation of the effectiveness of measures deployed to 
     enhance the security of institutions, facilities, and 
     infrastructure that may be terrorist targets.
       (4) Identification of instances when common standards and 
     protocols could improve the interoperability and effective 
     utilization of tools developed for field operators and first 
     responders.
       (5) Assistance for Federal agencies and departments in 
     establishing testbeds to evaluate the effectiveness of 
     technologies under development and to assess the 
     appropriateness of such technologies for deployment.
       (6) Design of metrics and use of those metrics to evaluate 
     the effectiveness of homeland security programs throughout 
     the Federal Government, including all national laboratories.
       (7) Design of and support for the conduct of homeland 
     security-related exercises and simulations.
       (8) Creation of strategic technology development plans to 
     reduce vulnerabilities in the Nation's critical 
     infrastructure and key resources.
       (d) Consultation on Institute Activities.--In carrying out 
     the duties described in subsection (c), the Institute shall 
     consult widely with representatives from private industry, 
     institutions of higher education, nonprofit institutions, 
     other Government agencies, and federally funded reseach and 
     development centers.
       (e) Use of Centers.--The Institute shall utilize the 
     capabilities of the National Infrastructure Simulation and 
     Analysis Center.
       (f) Annual Reports.--The Institute shall transmit to the 
     Secretary and Congress an annual report on the activities of 
     the Institute under this section.
       (g) Termination.--The Homeland Security Institute shall 
     terminate 3 years after the effective date of this Act.

     SEC. 313. TECHNOLOGY CLEARINGHOUSE TO ENCOURAGE AND SUPPORT 
                   INNOVATIVE SOLUTIONS TO ENHANCE HOMELAND 
                   SECURITY.

       (a) Establishment of Program.--The Secretary, acting 
     through the Under Secretary for Science and Technology, shall 
     establish and promote a program to encourage technological 
     innovation in facilitating the mission of the Department (as 
     described in section 101).
       (b) Elements of Program.--The program described in 
     subsection (a) shall include the following components:
       (1) The establishment of a centralized Federal 
     clearinghouse for information relating to technologies that 
     would further the mission of the Department for 
     dissemination, as appropriate, to Federal, State, and local 
     government and private sector entities for additional review, 
     purchase, or use.
       (2) The issuance of announcements seeking unique and 
     innovative technologies to advance the mission of the 
     Department.
       (3) The establishment of a technical assistance team to 
     assist in screening, as appropriate, proposals submitted to 
     the Secretary (except as provided in subsection (c)(2)) to 
     assess the feasibility, scientific and technical merits, and 
     estimated cost of such proposals, as appropriate.
       (4) The provision of guidance, recommendations, and 
     technical assistance, as appropriate, to assist Federal, 
     State, and local government and private sector efforts to 
     evaluate and implement the use of technologies described in 
     paragraph (1) or (2).
       (5) The provision of information for persons seeking 
     guidance on how to pursue proposals to develop or deploy 
     technologies that would enhance homeland security, including 
     information relating to Federal funding, regulation, or 
     acquisition.
       (c) Miscellaneous Provisions.--
       (1) In general.--Nothing in this section shall be construed 
     as authorizing the Secretary or the technical assistance team 
     established under subsection (b)(3) to set standards for 
     technology to be used by the Department, any other executive 
     agency, any State or local government entity, or any private 
     sector entity.
       (2) Certain proposals.--The technical assistance team 
     established under subsection (b)(3) shall not consider or 
     evaluate proposals submitted in response to a solicitation 
     for offers for a pending procurement or for a specific agency 
     requirement.
       (3) Coordination.--In carrying out this section, the 
     Secretary shall coordinate with the Technical Support Working 
     Group (organized under the April 1982 National Security 
     Decision Directive Numbered 30).

	 [...]
	 
	 
	      SEC. 880. PROHIBITION OF THE TERRORISM INFORMATION AND 
                   PREVENTION SYSTEM.

       Any and all activities of the Federal Government to 
     implement the proposed component program of the Citizen Corps 
     known as Operation TIPS (Terrorism Information and Prevention 
     System) are hereby prohibited.
	 
	 [...]
	 
	      SEC. 886. SENSE OF CONGRESS REAFFIRMING THE CONTINUED 
                   IMPORTANCE AND APPLICABILITY OF THE POSSE 
                   COMITATUS ACT.

       (a) Findings.--Congress finds the following:
       (1) Section 1385 of title 18, United States Code (commonly 
     known as the "Posse Comitatus Act"), prohibits the use of 
     the Armed Forces as a posse comitatus to execute the laws 
     except in cases and under circumstances expressly authorized 
     by the Constitution or Act of Congress.
       (2) Enacted in 1878, the Posse Comitatus Act was expressly 
     intended to prevent United States Marshals, on their own 
     initiative, from calling on the Army for assistance in 
     enforcing Federal law.
       (3) The Posse Comitatus Act has served the Nation well in 
     limiting the use of the Armed Forces to enforce the law.
       (4) Nevertheless, by its express terms, the Posse Comitatus 
     Act is not a complete barrier to the use of the Armed Forces 
     for a range of domestic purposes, including law enforcement 
     functions, when the use of the Armed Forces is authorized by 
     Act of Congress or the President determines that the use of 
     the Armed Forces is required to fulfill the President's 
     obligations under the Constitution to respond promptly in 
     time of war, insurrection, or other serious emergency.
       (5) Existing laws, including chapter 15 of title 10, United 
     States Code (commonly known as the "Insurrection Act"), and 
     the Robert T. Stafford Disaster Relief and Emergency 
     Assistance Act (42 U.S.C. 5121 et seq.), grant the President 
     broad powers that may be invoked in the event of domestic 
     emergencies, including an attack against the Nation using 
     weapons of mass destruction, and these laws specifically 
     authorize the President to use the Armed Forces to help 
     restore public order.
       (b) Sense of Congress.--Congress reaffirms the continued 
     importance of section 1385 of title 18, United States Code, 
     and it is the sense of Congress that nothing in this Act 
     should be construed to alter the applicability of such 
     section to any use of the Armed Forces as a posse comitatus 
     to execute the laws.


	 [...]
	 
	                     Subtitle I--Information Sharing

     SEC. 891. SHORT TITLE; FINDINGS; AND SENSE OF CONGRESS.

       (a) Short Title.--This subtitle may be cited as the 
     "Homeland Security Information Sharing Act".
       (b) Findings.--Congress finds the following:
       (1) The Federal Government is required by the Constitution 
     to provide for the common defense, which includes terrorist 
     attack.
       (2) The Federal Government relies on State and local 
     personnel to protect against terrorist attack.
       (3) The Federal Government collects, creates, manages, and 
     protects classified and sensitive but unclassified 
     information to enhance homeland security.
       (4) Some homeland security information is needed by the 
     State and local personnel to prevent and prepare for 
     terrorist attack.
       (5) The needs of State and local personnel to have access 
     to relevant homeland security information to combat terrorism 
     must be reconciled with the need to preserve the protected 
     status of such information and to protect the sources and 
     methods used to acquire such information.
       (6) Granting security clearances to certain State and local 
     personnel is one way to facilitate the sharing of information 
     regarding specific terrorist threats among Federal, State, 
     and local levels of government.
       (7) Methods exist to declassify, redact, or otherwise adapt 
     classified information so it may be shared with State and 
     local personnel without the need for granting additional 
     security clearances.
       (8) State and local personnel have capabilities and 
     opportunities to gather information on suspicious activities 
     and terrorist threats not possessed by Federal agencies.
       (9) The Federal Government and State and local governments 
     and agencies in other jurisdictions may benefit from such 
     information.
       (10) Federal, State, and local governments and 
     intelligence, law enforcement, and other emergency 
     preparation and response agencies must act in partnership to 
     maximize the benefits of information gathering and analysis 
     to prevent and respond to terrorist attacks.
       (11) Information systems, including the National Law 
     Enforcement Telecommunications System and the Terrorist 
     Threat Warning System, have been established for rapid 
     sharing of classified and sensitive but unclassified 
     information among Federal, State, and local entities.
       (12) Increased efforts to share homeland security 
     information should avoid duplicating existing information 
     systems.
       (c) Sense of Congress.--It is the sense of Congress that 
     Federal, State, and local entities should share homeland 
     security information to the maximum extent practicable, with 
     special emphasis on hard-to-reach urban and rural 
     communities.

     SEC. 892. FACILITATING HOMELAND SECURITY INFORMATION SHARING 
                   PROCEDURES.

       (a) Procedures for Determining Extent of Sharing of 
     Homeland Security Information.--
       (1) The President shall prescribe and implement procedures 
     under which relevant Federal agencies--
       (A) share relevant and appropriate homeland security 
     information with other Federal agencies, including the 
     Department, and appropriate State and local personnel;
       (B) identify and safeguard homeland security information 
     that is sensitive but unclassified; and
       (C) to the extent such information is in classified form, 
     determine whether, how, and to what extent to remove 
     classified information, as appropriate, and with which such 
     personnel it may be shared after such information is removed.
       (2) The President shall ensure that such procedures apply 
     to all agencies of the Federal Government.
       (3) Such procedures shall not change the substantive 
     requirements for the classification and safeguarding of 
     classified information.
       (4) Such procedures shall not change the requirements and 
     authorities to protect sources and methods.
       (b) Procedures for Sharing of Homeland Security 
     Information.--
       (1) Under procedures prescribed by the President, all 
     appropriate agencies, including the intelligence community, 
     shall, through information sharing systems, share homeland 
     security information with Federal agencies and appropriate 
     State and local personnel to the extent such information may 
     be shared, as determined in accordance with

[[Page H8681]]

     subsection (a), together with assessments of the credibility 
     of such information.
       (2) Each information sharing system through which 
     information is shared under paragraph (1) shall--
       (A) have the capability to transmit unclassified or 
     classified information, though the procedures and recipients 
     for each capability may differ;
       (B) have the capability to restrict delivery of information 
     to specified subgroups by geographic location, type of 
     organization, position of a recipient within an organization, 
     or a recipient's need to know such information;
       (C) be configured to allow the efficient and effective 
     sharing of information; and
       (D) be accessible to appropriate State and local personnel.
       (3) The procedures prescribed under paragraph (1) shall 
     establish conditions on the use of information shared under 
     paragraph (1)--
       (A) to limit the redissemination of such information to 
     ensure that such information is not used for an unauthorized 
     purpose;
       (B) to ensure the security and confidentiality of such 
     information;
       (C) to protect the constitutional and statutory rights of 
     any individuals who are subjects of such information; and
       (D) to provide data integrity through the timely removal 
     and destruction of obsolete or erroneous names and 
     information.
       (4) The procedures prescribed under paragraph (1) shall 
     ensure, to the greatest extent practicable, that the 
     information sharing system through which information is 
     shared under such paragraph include existing information 
     sharing systems, including, but not limited to, the National 
     Law Enforcement Telecommunications System, the Regional 
     Information Sharing System, and the Terrorist Threat Warning 
     System of the Federal Bureau of Investigation.
       (5) Each appropriate Federal agency, as determined by the 
     President, shall have access to each information sharing 
     system through which information is shared under paragraph 
     (1), and shall therefore have access to all information, as 
     appropriate, shared under such paragraph.
       (6) The procedures prescribed under paragraph (1) shall 
     ensure that appropriate State and local personnel are 
     authorized to use such information sharing systems--
       (A) to access information shared with such personnel; and
       (B) to share, with others who have access to such 
     information sharing systems, the homeland security 
     information of their own jurisdictions, which shall be marked 
     appropriately as pertaining to potential terrorist activity.
       (7) Under procedures prescribed jointly by the Director of 
     Central Intelligence and the Attorney General, each 
     appropriate Federal agency, as determined by the President, 
     shall review and assess the information shared under 
     paragraph (6) and integrate such information with existing 
     intelligence.
       (c) Sharing of Classified Information and Sensitive but 
     Unclassified Information With State and Local Personnel.--
       (1) The President shall prescribe procedures under which 
     Federal agencies may, to the extent the President considers 
     necessary, share with appropriate State and local personnel 
     homeland security information that remains classified or 
     otherwise protected after the determinations prescribed under 
     the procedures set forth in subsection (a).
       (2) It is the sense of Congress that such procedures may 
     include 1 or more of the following means:
       (A) Carrying out security clearance investigations with 
     respect to appropriate State and local personnel.
       (B) With respect to information that is sensitive but 
     unclassified, entering into nondisclosure agreements with 
     appropriate State and local personnel.
       (C) Increased use of information-sharing partnerships that 
     include appropriate State and local personnel, such as the 
     Joint Terrorism Task Forces of the Federal Bureau of 
     Investigation, the Anti-Terrorism Task Forces of the 
     Department of Justice, and regional Terrorism Early Warning 
     Groups.
       (d) Responsible Officials.--For each affected Federal 
     agency, the head of such agency shall designate an official 
     to administer this Act with respect to such agency.
       (e) Federal Control of Information.--Under procedures 
     prescribed under this section, information obtained by a 
     State or local government from a Federal agency under this 
     section shall remain under the control of the Federal agency, 
     and a State or local law authorizing or requiring such a 
     government to disclose information shall not apply to such 
     information.
       (f) Definitions.--As used in this section:
       (1) The term "homeland security information" means any 
     information possessed by a Federal, State, or local agency 
     that--
       (A) relates to the threat of terrorist activity;
       (B) relates to the ability to prevent, interdict, or 
     disrupt terrorist activity;
       (C) would improve the identification or investigation of a 
     suspected terrorist or terrorist organization; or
       (D) would improve the response to a terrorist act.
       (2) The term "intelligence community" has the meaning 
     given such term in section 3(4) of the National Security Act 
     of 1947 (50 U.S.C. 401a(4)).
       (3) The term "State and local personnel" means any of the 
     following persons involved in prevention, preparation, or 
     response for terrorist attack:
       (A) State Governors, mayors, and other locally elected 
     officials.
       (B) State and local law enforcement personnel and 
     firefighters.
       (C) Public health and medical professionals.
       (D) Regional, State, and local emergency management agency 
     personnel, including State adjutant generals.
       (E) Other appropriate emergency response agency personnel.
       (F) Employees of private-sector entities that affect 
     critical infrastructure, cyber, economic, or public health 
     security, as designated by the Federal government in 
     procedures developed pursuant to this section.
       (4) The term "State" includes the District of Columbia 
     and any commonwealth, territory, or possession of the United 
     States.
       (g) Construction.--Nothing in this Act shall be construed 
     as authorizing any department, bureau, agency, officer, or 
     employee of the Federal Government to request, receive, or 
     transmit to any other Government entity or personnel, or 
     transmit to any State or local entity or personnel otherwise 
     authorized by this Act to receive homeland security 
     information, any information collected by the Federal 
     Government solely for statistical purposes in violation of 
     any other provision of law relating to the confidentiality of 
     such information.

     SEC. 893. REPORT.

       (a) Report Required.--Not later than 12 months after the 
     date of the enactment of this Act, the President shall submit 
     to the congressional committees specified in subsection (b) a 
     report on the implementation of section 892. The report shall 
     include any recommendations for additional measures or 
     appropriation requests, beyond the requirements of section 
     892, to increase the effectiveness of sharing of information 
     between and among Federal, State, and local entities.
       (b) Specified Congressional Committees.--The congressional 
     committees referred to in subsection (a) are the following 
     committees:
       (1) The Permanent Select Committee on Intelligence and the 
     Committee on the Judiciary of the House of Representatives.
       (2) The Select Committee on Intelligence and the Committee 
     on the Judiciary of the Senate.

     SEC. 894. AUTHORIZATION OF APPROPRIATIONS.

       There are authorized to be appropriated such sums as may be 
     necessary to carry out section 892.

     SEC. 895. AUTHORITY TO SHARE GRAND JURY INFORMATION.

       Rule 6(e) of the Federal Rules of Criminal Procedure is 
     amended--
       (1) in paragraph (2), by inserting ", or of guidelines 
     jointly issued by the Attorney General and Director of 
     Central Intelligence pursuant to Rule 6," after "Rule 6"; 
     and
       (2) in paragraph (3)--
       (A) in subparagraph (A)(ii), by inserting "or of a foreign 
     government" after "(including personnel of a state or 
     subdivision of a state";
       (B) in subparagraph (C)(i)--
       (i) in subclause (I), by inserting before the semicolon the 
     following: "or, upon a request by an attorney for the 
     government, when sought by a foreign court or prosecutor for 
     use in an official criminal investigation";
       (ii) in subclause (IV)--

       (I) by inserting "or foreign" after "may disclose a 
     violation of State";
       (II) by inserting "or of a foreign government" after "to 
     an appropriate official of a State or subdivision of a 
     State"; and
       (III) by striking "or" at the end;

       (iii) by striking the period at the end of subclause (V) 
     and inserting "; or"; and
       (iv) by adding at the end the following:
       "(VI) when matters involve a threat of actual or potential 
     attack or other grave hostile acts of a foreign power or an 
     agent of a foreign power, domestic or international sabotage, 
     domestic or international terrorism, or clandestine 
     intelligence gathering activities by an intelligence service 
     or network of a foreign power or by an agent of a foreign 
     power, within the United States or elsewhere, to any 
     appropriate federal, state, local, or foreign government 
     official for the purpose of preventing or responding to such 
     a threat."; and
       (C) in subparagraph (C)(iii)--
       (i) by striking "Federal";
       (ii) by inserting "or clause (i)(VI)" after "clause 
     (i)(V)"; and
       (iii) by adding at the end the following: "Any state, 
     local, or foreign official who receives information pursuant 
     to clause (i)(VI) shall use that information only consistent 
     with such guidelines as the Attorney General and Director of 
     Central Intelligence shall jointly issue.".

     SEC. 896. AUTHORITY TO SHARE ELECTRONIC, WIRE, AND ORAL 
                   INTERCEPTION INFORMATION.

       Section 2517 of title 18, United States Code, is amended by 
     adding at the end the following:
       "(7) Any investigative or law enforcement officer, or 
     other Federal official in carrying out official duties as 
     such Federal official, who by any means authorized by this 
     chapter, has obtained knowledge of the contents of any wire, 
     oral, or electronic communication, or evidence derived 
     therefrom, may disclose such contents or derivative evidence 
     to a foreign investigative or law enforcement officer to the 
     extent that such disclosure is appropriate to the proper 
     performance of the

[[Page H8682]]

     official duties of the officer making or receiving the 
     disclosure, and foreign investigative or law enforcement 
     officers may use or disclose such contents or derivative 
     evidence to the extent such use or disclosure is appropriate 
     to the proper performance of their official duties.
       "(8) Any investigative or law enforcement officer, or 
     other Federal official in carrying out official duties as 
     such Federal official, who by any means authorized by this 
     chapter, has obtained knowledge of the contents of any wire, 
     oral, or electronic communication, or evidence derived 
     therefrom, may disclose such contents or derivative evidence 
     to any appropriate Federal, State, local, or foreign 
     government official to the extent that such contents or 
     derivative evidence reveals a threat of actual or potential 
     attack or other grave hostile acts of a foreign power or an 
     agent of a foreign power, domestic or international sabotage, 
     domestic or international terrorism, or clandestine 
     intelligence gathering activities by an intelligence service 
     or network of a foreign power or by an agent of a foreign 
     power, within the United States or elsewhere, for the purpose 
     of preventing or responding to such a threat. Any official 
     who receives information pursuant to this provision may use 
     that information only as necessary in the conduct of that 
     person's official duties subject to any limitations on the 
     unauthorized disclosure of such information, and any State, 
     local, or foreign official who receives information pursuant 
     to this provision may use that information only consistent 
     with such guidelines as the Attorney General and Director of 
     Central Intelligence shall jointly issue.".

     SEC. 897. FOREIGN INTELLIGENCE INFORMATION.

       (a) Dissemination Authorized.--Section 203(d)(1) of the 
     Uniting and Strengthening America by Providing Appropriate 
     Tools Required to Intercept and Obstruct Terrorism (USA 
     PATRIOT ACT) Act of 2001 (Public Law 107-56; 50 U.S.C. 403-
     5d) is amended by adding at the end the following: 
     "Consistent with the responsibility of the Director of 
     Central Intelligence to protect intelligence sources and 
     methods, and the responsibility of the Attorney General to 
     protect sensitive law enforcement information, it shall be 
     lawful for information revealing a threat of actual or 
     potential attack or other grave hostile acts of a foreign 
     power or an agent of a foreign power, domestic or 
     international sabotage, domestic or international terrorism, 
     or clandestine intelligence gathering activities by an 
     intelligence service or network of a foreign power or by an 
     agent of a foreign power, within the United States or 
     elsewhere, obtained as part of a criminal investigation to be 
     disclosed to any appropriate Federal, State, local, or 
     foreign government official for the purpose of preventing or 
     responding to such a threat. Any official who receives 
     information pursuant to this provision may use that 
     information only as necessary in the conduct of that person's 
     official duties subject to any limitations on the 
     unauthorized disclosure of such information, and any State, 
     local, or foreign official who receives information pursuant 
     to this provision may use that information only consistent 
     with such guidelines as the Attorney General and Director of 
     Central Intelligence shall jointly issue.".
       (b) Conforming Amendments.--Section 203(c) of that Act is 
     amended--
       (1) by striking "section 2517(6)" and inserting 
     "paragraphs (6) and (8) of section 2517 of title 18, United 
     States Code,"; and
       (2) by inserting "and (VI)" after "Rule 
     6(e)(3)(C)(i)(V)".

     SEC. 898. INFORMATION ACQUIRED FROM AN ELECTRONIC 
                   SURVEILLANCE.

       Section 106(k)(1) of the Foreign Intelligence Surveillance 
     Act of 1978 (50 U.S.C. 1806) is amended by inserting after 
     "law enforcement officers" the following: "or law 
     enforcement personnel of a State or political subdivision of 
     a State (including the chief executive officer of that State 
     or political subdivision who has the authority to appoint or 
     direct the chief law enforcement officer of that State or 
     political subdivision)".

     SEC. 899. INFORMATION ACQUIRED FROM A PHYSICAL SEARCH.

       Section 305(k)(1) of the Foreign Intelligence Surveillance 
     Act of 1978 (50 U.S.C. 1825) is amended by inserting after 
     "law enforcement officers" the following: "or law 
     enforcement personnel of a State or political subdivision of 
     a State (including the chief executive officer of that State 
     or political subdivision who has the authority to appoint or 
     direct the chief law enforcement officer of that State or 
     political subdivision)".

	 [...]
	 
	                      TITLE X--INFORMATION SECURITY

     SEC. 1001. INFORMATION SECURITY.

       (a) Short Title.--This title may be cited as the "Federal 
     Information Security Management Act of 2002".
       (b) Information Security.--
       (1) In general.--Subchapter II of chapter 35 of title 44, 
     United States Code, is amended to read as follows:

                 "SUBCHAPTER II--INFORMATION SECURITY

     "Sec. 3531. Purposes

       "The purposes of this subchapter are to--
       "(1) provide a comprehensive framework for ensuring the 
     effectiveness of information security controls over 
     information resources that support Federal operations and 
     assets;
       "(2) recognize the highly networked nature of the current 
     Federal computing environment and provide effective 
     governmentwide management and oversight of the related 
     information security risks, including coordination of 
     information security efforts throughout the civilian, 
     national security, and law enforcement communities;
       "(3) provide for development and maintenance of minimum 
     controls required to protect Federal information and 
     information systems;
       "(4) provide a mechanism for improved oversight of Federal 
     agency information security programs;
       "(5) acknowledge that commercially developed information 
     security products offer advanced, dynamic, robust, and 
     effective information security solutions, reflecting market 
     solutions for the protection of critical information 
     infrastructures important to the national defense and 
     economic security of the nation that are designed, built, and 
     operated by the private sector; and
       "(6) recognize that the selection of specific technical 
     hardware and software information security solutions should 
     be left to individual agencies from among commercially 
     developed products.".

     "Sec. 3532. Definitions

       "(a) In General.--Except as provided under subsection (b), 
     the definitions under section 3502 shall apply to this 
     subchapter.
       "(b) Additional Definitions.--As used in this subchapter--
       "(1) the term `information security' means protecting 
     information and information systems from unauthorized access, 
     use, disclosure, disruption, modification, or destruction in 
     order to provide--
       "(A) integrity, which means guarding against improper 
     information modification or destruction, and includes 
     ensuring information nonrepudiation and authenticity;
       "(B) confidentiality, which means preserving authorized 
     restrictions on access and disclosure, including means for 
     protecting personal privacy and proprietary information;
       "(C) availability, which means ensuring timely and 
     reliable access to and use of information; and
       "(D) authentication, which means utilizing digital 
     credentials to assure the identity of users and validate 
     their access;
       "(2) the term `national security system' means any 
     information system (including any telecommunications system) 
     used or operated by an agency or by a contractor of an 
     agency, or other organization on behalf of an agency, the 
     function, operation, or use of which--
       "(A) involves intelligence activities;
       "(B) involves cryptologic activities related to national 
     security;
       "(C) involves command and control of military forces;
       "(D) involves equipment that is an integral part of a 
     weapon or weapons system; or
       "(E) is critical to the direct fulfillment of military or 
     intelligence missions provided that this definition does not 
     apply to a system that is used for routine administrative and 
     business applications (including payroll, finance, logistics, 
     and personnel management applications);
       "(3) the term `information technology' has the meaning 
     given that term in section 11101 of title 40; and
       "(4) the term `information system' means any equipment or 
     interconnected system or subsystems of equipment that is used 
     in the

[[Page H8683]]

     automatic acquisition, storage, manipulation, management, 
     movement, control, display, switching, interchange, 
     transmission, or reception of data or information, and 
     includes--
       "(A) computers and computer networks;
       "(B) ancillary equipment;
       "(C) software, firmware, and related procedures;
       "(D) services, including support services; and
       "(E) related resources.".

     "Sec. 3533. Authority and functions of the Director

       "(a) The Director shall oversee agency information 
     security policies and practices, by--
       "(1) promulgating information security standards under 
     section 11331 of title 40;
       "(2) overseeing the implementation of policies, 
     principles, standards, and guidelines on information 
     security;
       "(3) requiring agencies, consistent with the standards 
     promulgated under such section 11331 and the requirements of 
     this subchapter, to identify and provide information security 
     protections commensurate with the risk and magnitude of the 
     harm resulting from the unauthorized access, use, disclosure, 
     disruption, modification, or destruction of--
       "(A) information collected or maintained by or on behalf 
     of an agency; or
       "(B) information systems used or operated by an agency or 
     by a contractor of an agency or other organization on behalf 
     of an agency;
       "(4) coordinating the development of standards and 
     guidelines under section 20 of the National Institute of 
     Standards and Technology Act (15 U.S.C. 278g-3) with agencies 
     and offices operating or exercising control of national 
     security systems (including the National Security Agency) to 
     assure, to the maximum extent feasible, that such standards 
     and guidelines are complementary with standards and 
     guidelines developed for national security systems;
       "(5) overseeing agency compliance with the requirements of 
     this subchapter, including through any authorized action 
     under section 11303(b)(5) of title 40, to enforce 
     accountability for compliance with such requirements;
       "(6) reviewing at least annually, and approving or 
     disapproving, agency information security programs required 
     under section 3534(b);
       "(7) coordinating information security policies and 
     procedures with related information resources management 
     policies and procedures; and
       "(8) reporting to Congress no later than March 1 of each 
     year on agency compliance with the requirements of this 
     subchapter, including--
       "(A) a summary of the findings of evaluations required by 
     section 3535;
       "(B) significant deficiencies in agency information 
     security practices;
       "(C) planned remedial action to address such deficiencies; 
     and
       "(D) a summary of, and the views of the Director on, the 
     report prepared by the National Institute of Standards and 
     Technology under section 20(e)(7) of the National Institute 
     of Standards and Technology Act (15 U.S.C. 278g-3).".
       "(b) Except for the authorities described in paragraphs 
     (4) and (7) of subsection (a), the authorities of the 
     Director under this section shall not apply to national 
     security systems.

     "Sec. 3534. Federal agency responsibilities

       "(a) The head of each agency shall--
       "(1) be responsible for--
       "(A) providing information security protections 
     commensurate with the risk and magnitude of the harm 
     resulting from unauthorized access, use, disclosure, 
     disruption, modification, or destruction of--
       "(i) information collected or maintained by or on behalf 
     of the agency; and
       "(ii) information systems used or operated by an agency or 
     by a contractor of an agency or other organization on behalf 
     of an agency;
       "(B) complying with the requirements of this subchapter 
     and related policies, procedures, standards, and guidelines, 
     including--
       "(i) information security standards promulgated by the 
     Director under section 11331 of title 40; and
       "(ii) information security standards and guidelines for 
     national security systems issued in accordance with law and 
     as directed by the President; and
       "(C) ensuring that information security management 
     processes are integrated with agency strategic and 
     operational planning processes;
       "(2) ensure that senior agency officials provide 
     information security for the information and information 
     systems that support the operations and assets under their 
     control, including through--
       "(A) assessing the risk and magnitude of the harm that 
     could result from the unauthorized access, use, disclosure, 
     disruption, modification, or destruction of such information 
     or information systems;
       "(B) determining the levels of information security 
     appropriate to protect such information and information 
     systems in accordance with standards promulgated under 
     section 11331 of title 40 for information security 
     classifications and related requirements;
       "(C) implementing policies and procedures to cost-
     effectively reduce risks to an acceptable level; and
       "(D) periodically testing and evaluating information 
     security controls and techniques to ensure that they are 
     effectively implemented;
       "(3) delegate to the agency Chief Information Officer 
     established under section 3506 (or comparable official in an 
     agency not covered by such section) the authority to ensure 
     compliance with the requirements imposed on the agency under 
     this subchapter, including--
       "(A) designating a senior agency information security 
     officer who shall--
       "(i) carry out the Chief Information Officer's 
     responsibilities under this section;
       "(ii) possess professional qualifications, including 
     training and experience, required to administer the functions 
     described under this section;
       "(iii) have information security duties as that official's 
     primary duty; and
       "(iv) head an office with the mission and resources to 
     assist in ensuring agency compliance with this section;
       "(B) developing and maintaining an agencywide information 
     security program as required by subsection (b);
       "(C) developing and maintaining information security 
     policies, procedures, and control techniques to address all 
     applicable requirements, including those issued under section 
     3533 of this title, and section 11331 of title 40;
       "(D) training and overseeing personnel with significant 
     responsibilities for information security with respect to 
     such responsibilities; and
       "(E) assisting senior agency officials concerning their 
     responsibilities under paragraph (2);
       "(4) ensure that the agency has trained personnel 
     sufficient to assist the agency in complying with the 
     requirements of this subchapter and related policies, 
     procedures, standards, and guidelines; and
       "(5) ensure that the agency Chief Information Officer, in 
     coordination with other senior agency officials, reports 
     annually to the agency head on the effectiveness of the 
     agency information security program, including progress of 
     remedial actions.
       "(b) Each agency shall develop, document, and implement an 
     agencywide information security program, approved by the 
     Director under section 3533(a)(5), to provide information 
     security for the information and information systems that 
     support the operations and assets of the agency, including 
     those provided or managed by another agency, contractor, or 
     other source, that includes--
       "(1) periodic assessments of the risk and magnitude of the 
     harm that could result from the unauthorized access, use, 
     disclosure, disruption, modification, or destruction of 
     information and information systems that support the 
     operations and assets of the agency;
       "(2) policies and procedures that--
       "(A) are based on the risk assessments required by 
     paragraph (1);
       "(B) cost-effectively reduce information security risks to 
     an acceptable level;
       "(C) ensure that information security is addressed 
     throughout the life cycle of each agency information system; 
     and
       "(D) ensure compliance with--
       "(i) the requirements of this subchapter;
       "(ii) policies and procedures as may be prescribed by the 
     Director, and information security standards promulgated 
     under section 11331 of title 40;
       "(iii) minimally acceptable system configuration 
     requirements, as determined by the agency; and
       "(iv) any other applicable requirements, including 
     standards and guidelines for national security systems issued 
     in accordance with law and as directed by the President;
       "(3) subordinate plans for providing adequate information 
     security for networks, facilities, and systems or groups of 
     information systems, as appropriate;
       "(4) security awareness training to inform personnel, 
     including contractors and other users of information systems 
     that support the operations and assets of the agency, of--
       "(A) information security risks associated with their 
     activities; and
       "(B) their responsibilities in complying with agency 
     policies and procedures designed to reduce these risks;
       "(5) periodic testing and evaluation of the effectiveness 
     of information security policies, procedures, and practices, 
     to be performed with a frequency depending on risk, but no 
     less than annually, of which such testing--
       "(A) shall include testing of management, operational, and 
     technical controls of every information system identified in 
     the inventory required under section 3505(c); and
       "(B) may include testing relied on in a evaluation under 
     section 3535;
       "(6) a process for planning, implementing, evaluating, and 
     documenting remedial action to address any deficiencies in 
     the information security policies, procedures, and practices 
     of the agency;
       "(7) procedures for detecting, reporting, and responding 
     to security incidents, including--
       "(A) mitigating risks associated with such incidents 
     before substantial damage is done; and
       "(B) notifying and consulting with, as appropriate--
       "(i) law enforcement agencies and relevant Offices of 
     Inspector General;
       "(ii) an office designated by the President for any 
     incident involving a national security system; and
       "(iii) any other agency or office, in accordance with law 
     or as directed by the President; and

[[Page H8684]]

       "(8) plans and procedures to ensure continuity of 
     operations for information systems that support the 
     operations and assets of the agency.
       "(c) Each agency shall--
       "(1) report annually to the Director, the Committees on 
     Government Reform and Science of the House of 
     Representatives, the Committees on Governmental Affairs and 
     Commerce, Science, and Transportation of the Senate, the 
     appropriate authorization and appropriations committees of 
     Congress, and the Comptroller General on the adequacy and 
     effectiveness of information security policies, procedures, 
     and practices, and compliance with the requirements of this 
     subchapter, including compliance with each requirement of 
     subsection (b);
       "(2) address the adequacy and effectiveness of information 
     security policies, procedures, and practices in plans and 
     reports relating to--
       "(A) annual agency budgets;
       "(B) information resources management under subchapter 1 
     of this chapter;
       "(C) information technology management under subtitle III 
     of title 40;
       "(D) program performance under sections 1105 and 1115 
     through 1119 of title 31, and sections 2801 and 2805 of title 
     39;
       "(E) financial management under chapter 9 of title 31, and 
     the Chief Financial Officers Act of 1990 (31 U.S.C. 501 note; 
     Public Law 101-576) (and the amendments made by that Act);
       "(F) financial management systems under the Federal 
     Financial Management Improvement Act (31 U.S.C. 3512 note); 
     and
       "(G) internal accounting and administrative controls under 
     section 3512 of title 31, United States Code, (known as the 
     `Federal Managers Financial Integrity Act'); and
       "(3) report any significant deficiency in a policy, 
     procedure, or practice identified under paragraph (1) or 
     (2)--
       "(A) as a material weakness in reporting under section 
     3512 of title 31; and
       "(B) if relating to financial management systems, as an 
     instance of a lack of substantial compliance under the 
     Federal Financial Management Improvement Act (31 U.S.C. 3512 
     note).
       "(d)(1) In addition to the requirements of subsection (c), 
     each agency, in consultation with the Director, shall include 
     as part of the performance plan required under section 1115 
     of title 31 a description of--
       "(A) the time periods, and
       "(B) the resources, including budget, staffing, and 
     training,

     that are necessary to implement the program required under 
     subsection (b).
       "(2) The description under paragraph (1) shall be based on 
     the risk assessments required under subsection (b)(2)(1).
       "(e) Each agency shall provide the public with timely 
     notice and opportunities for comment on proposed information 
     security policies and procedures to the extent that such 
     policies and procedures affect communication with the public.

     "Sec. 3535. Annual independent evaluation

       "(a)(1) Each year each agency shall have performed an 
     independent evaluation of the information security program 
     and practices of that agency to determine the effectiveness 
     of such program and practices.
       "(2) Each evaluation by an agency under this section shall 
     include--
       "(A) testing of the effectiveness of information security 
     policies, procedures, and practices of a representative 
     subset of the agency's information systems;
       "(B) an assessment (made on the basis of the results of 
     the testing) of compliance with--
       "(i) the requirements of this subchapter; and
       "(ii) related information security policies, procedures, 
     standards, and guidelines; and
       "(C) separate presentations, as appropriate, regarding 
     information security relating to national security systems.
       "(b) Subject to subsection (c)--
       "(1) for each agency with an Inspector General appointed 
     under the Inspector General Act of 1978, the annual 
     evaluation required by this section shall be performed by the 
     Inspector General or by an independent external auditor, as 
     determined by the Inspector General of the agency; and
       "(2) for each agency to which paragraph (1) does not 
     apply, the head of the agency shall engage an independent 
     external auditor to perform the evaluation.
       "(c) For each agency operating or exercising control of a 
     national security system, that portion of the evaluation 
     required by this section directly relating to a national 
     security system shall be performed--
       "(1) only by an entity designated by the agency head; and
       "(2) in such a manner as to ensure appropriate protection 
     for information associated with any information security 
     vulnerability in such system commensurate with the risk and 
     in accordance with all applicable laws.
       "(d) The evaluation required by this section--
       "(1) shall be performed in accordance with generally 
     accepted government auditing standards; and
       "(2) may be based in whole or in part on an audit, 
     evaluation, or report relating to programs or practices of 
     the applicable agency.
       "(e) Each year, not later than such date established by 
     the Director, the head of each agency shall submit to the 
     Director the results of the evaluation required under this 
     section.
       "(f) Agencies and evaluators shall take appropriate steps 
     to ensure the protection of information which, if disclosed, 
     may adversely affect information security. Such protections 
     shall be commensurate with the risk and comply with all 
     applicable laws and regulations.
       "(g)(1) The Director shall summarize the results of the 
     evaluations conducted under this section in the report to 
     Congress required under section 3533(a)(8).
       "(2) The Director's report to Congress under this 
     subsection shall summarize information regarding information 
     security relating to national security systems in such a 
     manner as to ensure appropriate protection for information 
     associated with any information security vulnerability in 
     such system commensurate with the risk and in accordance with 
     all applicable laws.
       "(3) Evaluations and any other descriptions of information 
     systems under the authority and control of the Director of 
     Central Intelligence or of National Foreign Intelligence 
     Programs systems under the authority and control of the 
     Secretary of Defense shall be made available to Congress only 
     through the appropriate oversight committees of Congress, in 
     accordance with applicable laws.
       "(h) The Comptroller General shall periodically evaluate 
     and report to Congress on--
       "(1) the adequacy and effectiveness of agency information 
     security policies and practices; and
       "(2) implementation of the requirements of this 
     subchapter.

     "Sec. 3536. National security systems

       "The head of each agency operating or exercising control 
     of a national security system shall be responsible for 
     ensuring that the agency--
       "(1) provides information security protections 
     commensurate with the risk and magnitude of the harm 
     resulting from the unauthorized access, use, disclosure, 
     disruption, modification, or destruction of the information 
     contained in such system;
       "(2) implements information security policies and 
     practices as required by standards and guidelines for 
     national security systems, issued in accordance with law and 
     as directed by the President; and
       "(3) complies with the requirements of this subchapter.

     "Sec. 3537. Authorization of appropriations

       "There are authorized to be appropriated to carry out the 
     provisions of this subchapter such sums as may be necessary 
     for each of fiscal years 2003 through 2007.

     "Sec. 3538. Effect on existing law

       "Nothing in this subchapter, section 11331 of title 40, or 
     section 20 of the National Standards and Technology Act (15 
     U.S.C. 278g-3) may be construed as affecting the authority of 
     the President, the Office of Management and Budget or the 
     Director thereof, the National Institute of Standards and 
     Technology, or the head of any agency, with respect to the 
     authorized use or disclosure of information, including with 
     regard to the protection of personal privacy under section 
     552a of title 5, the disclosure of information under section 
     552 of title 5, the management and disposition of records 
     under chapters 29, 31, or 33 of title 44, the management of 
     information resources under subchapter I of chapter 35 of 
     this title, or the disclosure of information to Congress or 
     the Comptroller General of the United States.".
       (2) Clerical amendment.--The items in the table of sections 
     at the beginning of such chapter 35 under the heading 
     "SUBCHAPTER II" are amended to read as follows:

"3531. Purposes.
"3532. Definitions.
"3533. Authority and functions of the Director.
"3534. Federal agency responsibilities.
"3535. Annual independent evaluation.
"3536. National security systems.
"3537. Authorization of appropriations.
"3538. Effect on existing law.".
       (c) Information Security Responsibilities of Certain 
     Agencies.--
       (1) National security responsibilities.--(A) Nothing in 
     this Act (including any amendment made by this Act) shall 
     supersede any authority of the Secretary of Defense, the 
     Director of Central Intelligence, or other agency head, as 
     authorized by law and as directed by the President, with 
     regard to the operation, control, or management of national 
     security systems, as defined by section 3532(3) of title 44, 
     United States Code.
       (B) Section 2224 of title 10, United States Code, is 
     amended--
       (i) in subsection 2224(b), by striking "(b) Objectives and 
     Minimum Requirements.--(1)" and inserting "(b) Objectives 
     of the Program.--";
       (ii) in subsection 2224(b), by striking "(2) the program 
     shall at a minimum meet the requirements of section 3534 and 
     3535 of title 44, United States Code."; and
       (iii) in subsection 2224(c), by inserting ", including 
     through compliance with subtitle II of chapter 35 of title 
     44" after "infrastructure".
       (2) Atomic energy act of 1954.--Nothing in this Act shall 
     supersede any requirement made by or under the Atomic Energy 
     Act of 1954 (42 U.S.C. 2011 et seq.). Restricted Data or 
     Formerly Restricted Data shall be handled, protected, 
     classified, downgraded, and declassified in conformity with 
     the Atomic Energy Act of 1954 (42 U.S.C. 2011 et seq.).

[[Page H8685]]

     SEC. 1002. MANAGEMENT OF INFORMATION TECHNOLOGY.

       (a) In General.--Section 11331 of title 40, United States 
     Code, is amended to read as follows:

     "Sec. 11331. Responsibilities for Federal information 
       systems standards

       "(a) Definition.--In this section, the term `information 
     security' has the meaning given that term in section 
     3532(b)(1) of title 44.
       "(b) Requirement to Prescribe Standards.--
       "(1) In general.--
       "(A) Requirement.--Except as provided under paragraph (2), 
     the Director of the Office of Management and Budget shall, on 
     the basis of proposed standards developed by the National 
     Institute of Standards and Technology pursuant to paragraphs 
     (2) and (3) of section 20(a) of the National Institute of 
     Standards and Technology Act (15 U.S.C. 278g-3(a)) and in 
     consultation with the Secretary of Homeland Security, 
     promulgate information security standards pertaining to 
     Federal information systems.
       "(B) Required standards.--Standards promulgated under 
     subparagraph (A) shall include--
       "(i) standards that provide minimum information security 
     requirements as determined under section 20(b) of the 
     National Institute of Standards and Technology Act (15 U.S.C. 
     278g-3(b)); and
       "(ii) such standards that are otherwise necessary to 
     improve the efficiency of operation or security of Federal 
     information systems.
       "(C) Required standards binding.--Information security 
     standards described under subparagraph (B) shall be 
     compulsory and binding.
       "(2) Standards and guidelines for national security 
     systems.--Standards and guidelines for national security 
     systems, as defined under section 3532(3) of title 44, shall 
     be developed, promulgated, enforced, and overseen as 
     otherwise authorized by law and as directed by the President.
       "(c) Application of More Stringent Standards.--The head of 
     an agency may employ standards for the cost-effective 
     information security for all operations and assets within or 
     under the supervision of that agency that are more stringent 
     than the standards promulgated by the Director under this 
     section, if such standards--
       "(1) contain, at a minimum, the provisions of those 
     applicable standards made compulsory and binding by the 
     Director; and
       "(2) are otherwise consistent with policies and guidelines 
     issued under section 3533 of title 44.
       "(d) Requirements Regarding Decisions by Director.--
       "(1) Deadline.--The decision regarding the promulgation of 
     any standard by the Director under subsection (b) shall occur 
     not later than 6 months after the submission of the proposed 
     standard to the Director by the National Institute of 
     Standards and Technology, as provided under section 20 of the 
     National Institute of Standards and Technology Act (15 U.S.C. 
     278g-3).
       "(2) Notice and comment.--A decision by the Director to 
     significantly modify, or not promulgate, a proposed standard 
     submitted to the Director by the National Institute of 
     Standards and Technology, as provided under section 20 of the 
     National Institute of Standards and Technology Act (15 U.S.C. 
     278g-3), shall be made after the public is given an 
     opportunity to comment on the Director's proposed 
     decision.".
       (b) Clerical Amendment.--The table of sections at the 
     beginning of chapter 113 of title 40, United States Code, is 
     amended by striking the item relating to section 11331 and 
     inserting the following:

"11331. Responsibilities for Federal information systems standards.".

     SEC. 1003. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY.

       Section 20 of the National Institute of Standards and 
     Technology Act (15 U.S.C. 278g-3), is amended by striking the 
     text and inserting the following:
       "(a) The Institute shall--
       "(1) have the mission of developing standards, guidelines, 
     and associated methods and techniques for information 
     systems;
       "(2) develop standards and guidelines, including minimum 
     requirements, for information systems used or operated by an 
     agency or by a contractor of an agency or other organization 
     on behalf of an agency, other than national security systems 
     (as defined in section 3532(b)(2) of title 44, United States 
     Code);
       "(3) develop standards and guidelines, including minimum 
     requirements, for providing adequate information security for 
     all agency operations and assets, but such standards and 
     guidelines shall not apply to national security systems; and
       "(4) carry out the responsibilities described in paragraph 
     (3) through the Computer Security Division.
       "(b) The standards and guidelines required by subsection 
     (a) shall include, at a minimum--
       "(1)(A) standards to be used by all agencies to categorize 
     all information and information systems collected or 
     maintained by or on behalf of each agency based on the 
     objectives of providing appropriate levels of information 
     security according to a range of risk levels;
       "(B) guidelines recommending the types of information and 
     information systems to be included in each such category; and
       "(C) minimum information security requirements for 
     information and information systems in each such category;
       "(2) a definition of and guidelines concerning detection 
     and handling of information security incidents; and
       "(3) guidelines developed in coordination with the 
     National Security Agency for identifying an information 
     system as a national security system consistent with 
     applicable requirements for national security systems, issued 
     in accordance with law and as directed by the President.
       "(c) In developing standards and guidelines required by 
     subsections (a) and (b), the Institute shall--
       "(1) consult with other agencies and offices (including, 
     but not limited to, the Director of the Office of Management 
     and Budget, the Departments of Defense and Energy, the 
     National Security Agency, the General Accounting Office, and 
     the Secretary of Homeland Security) to assure--
       "(A) use of appropriate information security policies, 
     procedures, and techniques, in order to improve information 
     security and avoid unnecessary and costly duplication of 
     effort; and
       "(B) that such standards and guidelines are complementary 
     with standards and guidelines employed for the protection of 
     national security systems and information contained in such 
     systems;
       "(2) provide the public with an opportunity to comment on 
     proposed standards and guidelines;
       "(3) submit to the Director of the Office of Management 
     and Budget for promulgation under section 11331 of title 40, 
     United States Code--
       "(A) standards, as required under subsection (b)(1)(A), no 
     later than 12 months after the date of the enactment of this 
     section; and
       "(B) minimum information security requirements for each 
     category, as required under subsection (b)(1)(C), no later 
     than 36 months after the date of the enactment of this 
     section;
       "(4) issue guidelines as required under subsection 
     (b)(1)(B), no later than 18 months after the date of the 
     enactment of this Act;
       "(5) ensure that such standards and guidelines do not 
     require specific technological solutions or products, 
     including any specific hardware or software security 
     solutions;
       "(6) ensure that such standards and guidelines provide for 
     sufficient flexibility to permit alternative solutions to 
     provide equivalent levels of protection for identified 
     information security risks; and
       "(7) use flexible, performance-based standards and 
     guidelines that, to the greatest extent possible, permit the 
     use of off-the-shelf commercially developed information 
     security products.
       "(d) The Institute shall--
       "(1) submit standards developed pursuant to subsection 
     (a), along with recommendations as to the extent to which 
     these should be made compulsory and binding, to the Director 
     of the Office of Management and Budget for promulgation under 
     section 11331 of title 40, United States Code;
       "(2) provide assistance to agencies regarding--
       "(A) compliance with the standards and guidelines 
     developed under subsection (a);
       "(B) detecting and handling information security 
     incidents; and
       "(C) information security policies, procedures, and 
     practices;
       "(3) conduct research, as needed, to determine the nature 
     and extent of information security vulnerabilities and 
     techniques for providing cost-effective information security;
       "(4) develop and periodically revise performance 
     indicators and measures for agency information security 
     policies and practices;
       "(5) evaluate private sector information security policies 
     and practices and commercially available information 
     technologies to assess potential application by agencies to 
     strengthen information security;
       "(6) evaluate security policies and practices developed 
     for national security systems to assess potential application 
     by agencies to strengthen information security;
       "(7) periodically assess the effectiveness of standards 
     and guidelines developed under this section and undertake 
     revisions as appropriate;
       "(8) solicit and consider the recommendations of the 
     Information Security and Privacy Advisory Board, established 
     by section 21, regarding standards and guidelines developed 
     under subsection (a) and submit such recommendations to the 
     Director of the Office of Management and Budget with such 
     standards submitted to the Director; and
       "(9) prepare an annual public report on activities 
     undertaken in the previous year, and planned for the coming 
     year, to carry out responsibilities under this section.
       "(e) As used in this section--
       "(1) the term `agency' has the same meaning as provided in 
     section 3502(1) of title 44, United States Code;
       "(2) the term `information security' has the same meaning 
     as provided in section 3532(1) of such title;
       "(3) the term `information system' has the same meaning as 
     provided in section 3502(8) of such title;
       "(4) the term `information technology' has the same 
     meaning as provided in section 11101 of title 40, United 
     States Code; and
       "(5) the term `national security system' has the same 
     meaning as provided in section 3532(b)(2) of such title.".

[[Page H8686]]

     SEC. 1004. INFORMATION SECURITY AND PRIVACY ADVISORY BOARD.

       Section 21 of the National Institute of Standards and 
     Technology Act (15 U.S.C. 278g-4), is amended--
       (1) in subsection (a), by striking "Computer System 
     Security and Privacy Advisory Board" and inserting 
     "Information Security and Privacy Advisory Board";
       (2) in subsection (a)(1), by striking "computer or 
     telecommunications" and inserting "information 
     technology";
       (3) in subsection (a)(2)--
       (A) by striking "computer or telecommunications 
     technology" and inserting "information technology"; and
       (B) by striking "computer or telecommunications 
     equipment" and inserting "information technology";
       (4) in subsection (a)(3)--
       (A) by striking "computer systems" and inserting 
     "information system"; and
       (B) by striking "computer systems security" and inserting 
     "information security";
       (5) in subsection (b)(1) by striking "computer systems 
     security" and inserting "information security";
       (6) in subsection (b) by striking paragraph (2) and 
     inserting the following:
       "(2) to advise the Institute and the Director of the 
     Office of Management and Budget on information security and 
     privacy issues pertaining to Federal Government information 
     systems, including through review of proposed standards and 
     guidelines developed under section 20; and";
       (7) in subsection (b)(3) by inserting "annually" after 
     "report";
       (8) by inserting after subsection (e) the following new 
     subsection:
       "(f) The Board shall hold meetings at such locations and 
     at such time and place as determined by a majority of the 
     Board.";
       (9) by redesignating subsections (f) and (g) as subsections 
     (g) and (h), respectively; and
       (10) by striking subsection (h), as redesignated by 
     paragraph (9), and inserting the following:
       "(h) As used in this section, the terms "information 
     system" and "information technology" have the meanings 
     given in section 20.".

     SEC. 1005. TECHNICAL AND CONFORMING AMENDMENTS.

       (a) Federal Computer System Security Training and Plan.--
       (1) Repeal.--Section 11332 of title 40, United States Code, 
     is repealed.
       (2) Clerical amendment.--The table of sections at the 
     beginning of chapter 113 of title 40, United States Code, as 
     amended by striking the item relating to section 11332.
       (b) Floyd D. Spence National Defense Authorization Act for 
     Fiscal Year 2001.--The Floyd D. Spence National Defense 
     Authorization Act for Fiscal Year 2001 (Public Law 106-398) 
     is amended by striking subtitle G of title X (44 U.S.C. 3531 
     note).
       (c) Paperwork Reduction Act.--(1) Section 3504(g) of title 
     44, United States Code, is amended--
       (A) by adding "and" at the end of paragraph (1);
       (B) in paragraph (2)--
       (i) by striking "sections 11331 and 11332(b) and (c) of 
     title 40" and inserting "section 11331 of title 40 and 
     subchapter II of this title"; and
       (ii) by striking the semicolon and inserting a period; and
       (C) by striking paragraph (3).
       (2) Section 3505 of such title is amended by adding at the 
     end the following:
       "(c) Inventory of Information Systems.--(1) The head of 
     each agency shall develop and maintain an inventory of the 
     information systems (including national security systems) 
     operated by or under the control of such agency;
       "(2) The identification of information systems in an 
     inventory under this subsection shall include an 
     identification of the interfaces between each such system and 
     all other systems or networks, including those not operated 
     by or under the control of the agency;
       "(3) Such inventory shall be--
       "(A) updated at least annually;
       "(B) made available to the Comptroller General; and
       "(C) used to support information resources management, 
     including--
       "(i) preparation and maintenance of the inventory of 
     information resources under section 3506(b)(4);
       "(ii) information technology planning, budgeting, 
     acquisition, and management under section 3506(h), subtitle 
     III of title 40, and related laws and guidance;
       "(iii) monitoring, testing, and evaluation of information 
     security controls under subchapter II;
       "(iv) preparation of the index of major information 
     systems required under section 552(g) of title 5, United 
     States Code; and
       "(v) preparation of information system inventories 
     required for records management under chapters 21, 29, 31, 
     and 33.
       "(4) The Director shall issue guidance for and oversee the 
     implementation of the requirements of this subsection.".
       (3) Section 3506(g) of such title is amended--
       (A) by adding "and" at the end of paragraph (1);
       (B) in paragraph (2)--
       (i) by striking "section 11332 of title 40" and inserting 
     "subchapter II of this chapter"; and
       (ii) by striking "; and" and inserting a period; and
       (C) by striking paragraph (3).

     SEC. 1006. CONSTRUCTION.

       Nothing in this Act, or the amendments made by this Act, 
     affects the authority of the National Institute of Standards 
     and Technology or the Department of Commerce relating to the 
     development and promulgation of standards or guidelines under 
     paragraphs (1) and (2) of section 20(a) of the National 
     Institute of Standards and Technology Act (15 U.S.C. 278g-
     3(a)).

	 [...]